
Labeled a threat by the Trump administration due to its Chinese connections, TikTok has constantly found itself accused of siphoning off user data for use overseas.
“This project is a bit different from my other projects. TikTok is a data collection engine disguised as a social media platform. It’s legitimate spyware, so I thought I would reverse engineer the Android application,” wrote ‘augustgl’ on his now-removed Github repo.
The source reportedly published includes that dedicated to location tracking, phone calls, screenshots, WiFi networks, and facial recognition. None of these features appear to have sat particularly well with ‘augustgl’, who signed off with the message, “China, I’ll see you when you send the hitmen to my house.”
While that did not happen, at least as far as we know, TikTok did become aware that reverse-engineered source was being made available online. Unsurprisingly, the social media company then used copyright law to have it taken down.
Reverse engineered source code to the android tiktok app.
Background
This project is a bit different from my other projects. TikTok is a data collection engine disguised as a social media platform. It’s legitimate spyware, so I thought I would reverse engineer the Android application
Included are the compiled classes.jar and classes.dex. You can find all of the source in the classes/ folder in each part of the app.
The main functionality of the app is in df_miniapp. The rest is just included for the sake of completeness. Most of it is useless.
China, I’ll see you when you send the hitmen to my house.
Here is the full reverse engineered source code. Enjoy
NOTE : this is where I got the APK. https://apkpure.com/tiktok/com.ss.android.ugc.trill
Interesting Code
Location tracking:
Phone calls:
Screenshot code:
Wierd List in the screenshot code (this is nothing particularly special)
static final String[] KEYWORDS = new String[] {
"screenshot", "screen_shot", "screen-shot", "screen shot", "screencapture", "screen_capture", "screen-capture", "screen capture", "screencap", "screen_cap",
"screen-cap", "screen cap", "截屏" };
Get Wifi networks:
Facial recognition:
Update 9/11/2020
Sketchy Address code
TODO LIST
- Decode all android manifests
Update 11/03/2020
I apologize for confusion. This is not leaked source code. This is reverse engineered. Thank you for your time.
Done by
📥 Project Repository
GitHub : github.com/huaji233333/tiktok_source
Disclaimer
This content has been shared for Educational And Non-Profit Purpose ONLY
No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.
hackgence has no control over the shared content and nature of the external sites.