Jump to content

NoFear

Moderators
  • Posts

    3,002
  • Joined

  • Last visited

  • Days Won

    249

Everything posted by NoFear

  1. The blue is an address location. Need to calculate the offset from start of lib to that address. That will be your offset that you would go-to in ida if using ida. But the lib hit on your screen shot is system and not game lib... Can't debug on emulator if that's what you're attempting...
  2. I used GG... One could use ida or ghidra. But GG worked fine for finding it this time.
  3. pkg install gdb
  4. Armv8 C80E42B8r;081540FDr::3809 Edit 28008052r;E803679Er And if you want to set so you can claim all without playing (set number of keys collected). Offset (Version 6.9.5) 3FBCA54 Edit 00FA8052r
  5. OpCodes changed slightly. But still works.
  6. NoFear

    Device ban

    This doesn't mean it was done correctly. I know in Android Faker, can do all those toggles and randomize. But if correct apps/services aren't selected, it won't matter what you change.
  7. NoFear

    Device ban

    Then I can't help you. I had recommendation on tools that would work. It's your choice. Good luck
  8. NoFear

    Device ban

    When module activated, what did you select for apps to apply it to?
  9. NoFear

    Device ban

    If not done correctly, it won't help.
  10. NoFear

    Device ban

    If familiar with xposed framework, can try lsposed with either Android Faker or Geergit module.
  11. Inbox full
  12. It's not patched... He's just not selling anymore.
  13. Yes. They are all pointers... You need to follow the pointer to see the "value".
  14. That's a pointer. You're on the right track... Follow it.
  15. Fairly certain dump is incomplete and of no use... Hybridclr https://github.com/AkiKurisu/HybridCLR_IL2CPP_Modding But even with that, I don't think you'll have much luck either.
  16. You have VIP at iosgods? It's exactly the same method.
  17. It is possible with GG if that helps you any...
  18. Gdb and lldb. Install termux from fdroid. I prefer gdb (more familiar with it). Don't need PC.
  19. In theory, yes, should be able to work backwards from a protected value/function to find what's monitoring and disable either the monitoring or the branch that triggers detected.
  20. "Clear App Data" Should clear .ca without root.
  21. Think friend is still selling, so his method not patched (yet).
  22. Depends if developer did it correctly... you'd be surprised which games the developers did this incorrectly.
  23. Not posting his info publicly.... can DM for info.
  24. If editing is correct (xor with the dword) detection shouldn't get flagged to begin with. Nice tutorial though.
  25. I'll post lib offsets later... might be easier that way.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.