Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 10/16/2025 in all areas

  1. Version 7.1.0

    1,219 downloads

    SCRIPT MENU: Mode Bomb Menu • FreeWeapons • LocateC4 • FastDefuse • EnablePersistentShop • ForceMatchEnd • ForceTeamSwap • NoMoneyLoss Misc Menu • Unlock All Characters + Skins • RegenBoost • OneKillAdvance • Avatar Selector • Phantom Lock • Radar • BypassLevelRestrictions • CustomFov • FastAutoFire • NoSpread • NoRecoil • Unlimited Ammo • RewardScaler • ExplosiveSmoke • ActiveVIPBonus • Speed • HighDamage • CustomPlayerLevel • NukeGrenade • AllGunsSniperMode • NoFlashEffect • SoftGodMode • WallPierce • FullClipReload • ExtendedClip • OneKillWin Attention: ExplosiveSmoke When active, this feature turns the smoke grenade into an **invisible explosion**. The visual remains as a regular smoke for other players — but it deals **real damage**. Supports **Default**, **Global**, or **Custom Radius**, with an option to **edit the damage**. Use with caution: highly powerful and visually undetectable in-game.
    3 points
  2. Version 2.0.0

    398 downloads

    Script Includes: (64 bit only) ❥Fish Basin/Woodstack Capacity Editor ❥Fish/Wood Amount Editor ❥Dragon Price Editor ❥Big Reward From Mission
    2 points
  3. Junior = 1,776,749,182 Comp JP2 = 1,739,976,340 Pyroraptor Dominion = -1,853,388,446
    2 points
  4. VID_20251102002314.mp4
    2 points
  5. The warnings were meant to clarify each function and prevent confusion. But since they’re affecting usability on some devices, I’ve added a way to disable them.
    2 points
  6. That version was disabled temporarily because I found some issues I’m currently fixing. As soon as it’s ready, I’ll reactivate it.
    2 points
  7. That's weird, because the version is still 7.57, and the Unlimited Ammo still works fine on my device
    2 points
  8. Help me i don't know how to use this mod
    1 point
  9. View File Rise of Berk Script Script Includes: ❥Fish Basin/Woodstack Capacity Editor ❥Fish/Wood Amount Editor ❥Dragon Price Editor ❥Big Reward From Mission Submitter luckyday-999 Submitted 11/06/2025 Category LUA scripts  
    1 point
    It works well when you use it!
    1 point
  10. Guys is there a way to unlock the dino so that you can purchase it with dna in future instead of js buying it thru hacks?
    1 point
  11. Version 1.0.0

    366 downloads

    Join the Discord server for script updates: https://discord.gg/TFtZUgfTs9 Script Informations: • Enables In-App Purchases Bypass – it means you can buy everything for free that’s normally only buyable with real money • Made for 64-bit (x64) version of the game • Works for all game versions – Auto Update YouTube Tutorial to use the script below:
    1 point
  12. Version 1.0.0

    419 downloads

    Includes: High Damage , Underground (Mushroom) Password:999
    1 point
  13. Version 1.0.0

    343 downloads

    Script Includes: Long Jump Crouch Speed Slider Jump Gravity Editor God Mode (After Damaged) Weapon Price Editor Ak-47 High HS Damage FOV Slider Wall Climb Glow Chams Teleport Up Fly Hack Super Jump
    1 point
  14. sorry. but can no longer update the bullet echo scripts . it's now been removed from list
    1 point
    Works like a charm good job m8
    1 point
  15. For me all values were just simple Dword search, refine & edit in Ca memory range (might be Other on some devices).
    1 point
  16. Could you increase the gain on the RewardScaler function?
    1 point
  17. Version 1.0.0

    378 downloads

    ▪︎ Buy Samurai Chicken Get Gems ▪︎ High Jump ▪︎ Long Jump ▪︎ Fly Hack ▪︎ Speed Hack ▪︎ Jump Speed Hack ▪︎ Teleport Up ▪︎ Glow Chams ▪︎ Instant Reload ▪︎ God Mode (After Death)
    1 point
  18. That happened to me too. I went to check the game's Discord server, and they had reported me, so we probably got banned... It probably happened because I used the functions that make it obvious I'm cheating.
    1 point
  19. New file says unable to use because it is shutdown by the owner.
    1 point
  20. I tested with all features activated and Unlimited Ammo still works fine here. So it doesn’t seem to be a conflict — not sure exactly what might be happening on your side.
    1 point
  21. 1 point
    pretty great script but is there away to break block faster? any idea?
    1 point
  22. Version v2.4.27

    82 downloads

    LIFE IS A GAME IS A RUNNING GAME. YOUR LIFE AND APPEARANCE CHANGES BASED ON THE TYPE AND AMOUNT OF COINS YOU OBTAIN, AND THE CHOICES YOU MAKE USING THE CHOICE BUTTON THROUGHOUT THE GAME. FOR EXAMPLE, IF YOU PAINTED A LOT WHEN YOU WERE A CHILD, YOUR CHARACTER DEVELOPS INTO AN ARTISTIC TEENAGER AND SHOWS THEIR TALENTS IN ART. IF THEY PLAY A MUSICAL INSTRUMENT, THERE IS A HIGHER CHANCE THAT YOUR CHARACTER DEVELOPS INTO A SINGER. GAME LINK: APKCOMBO SCRIPT MENU: - FREE SHOPING
    1 point
  23. Update: I have found a way to cheat the “create an extra cell” part, u no longer have to be level 100 to be able to have max cells
    1 point
  24. This method never worked for me, always crash
    1 point
  25. Can you make it work with version 2.2.2 please?
    1 point
  26. Hello, Game Guardian community! I’m looking for an Asphalt 8 account where all the cars have been unlocked using a cheat table or other cheats. If anyone has such an account and is willing to share or guide me on how to achieve this, I’d really appreciate it. Please feel free to reach out or share any tips. Thanks in advance for your help!
    1 point
  27. How to set Game Guardian with Apktool M for Android 14 Compatibility This guide will walk you through editing SDK target of Game Guardian (GG) using Apktool M to ensure compatibility with newer Android versions "Android 14" Hey Darklord aka OREW here again --------------------------------------- 1. Download Required Tools: Game Guardian (GG) Apktool M --- 2. Decompile the Game Guardian APK: Open Apktool M. Locate the GG APK file. Select the GG APK, then click "Decompile" and wait until the process completes. --- 3. Edit the apktool.json File: Open the decompiled GG folder. Locate and open the apktool.json file. Find lines 29 and 30: "minSdkVersion": "10", "targetSdkVersion": "22" Change both versions to: "minSdkVersion": "24", "targetSdkVersion": "24" Example of apktool.json After Editing: { "apkFileName": "GameGuardian.101.1_src.apk", "PackageInfo": { "forcedPackageId": "127", "renameManifestPackage": null }, "doNotCompress": [ "resources.arsc", "png", "res/raw/ydwsh" ], "compressionType": false, "sparseResources": true, "version": "2.4.0-241015", "sharedLibrary": false, "VersionInfo": { "versionName": "101.1", "versionCode": "16142" }, "UsesFramework": { "ids": [1], "tag": null }, "unknownFiles": {}, "apkFilePath": "/storage/emulated/0/Download/GameGuardian.101.1.apk", "compactEntries": false, "isFrameworkApk": false, "sdkInfo": { "minSdkVersion": "24", "targetSdkVersion": "24" } } Save and exit the file. --- 4. Recompile the Modified APK: In Apktool M, click the "Compile" button at the top of the folder structure. Check the box for "Use aapt" and press OK. Wait for the process to finish. --- 5. Install the Recompiled APK: After recompilation, press the "Install" button. When prompted, grant root access through Magisk Manager or KernelSU Manager (as applicable). Open GG, select the default configuration, and enable the "Install from unknown sources" permission if required. --- 6. Handle Installation Issues: If GG doesn't install directly after the package name randomizer process, follow these steps: Exit and navigate to: Android > data > com.catch_.me_.if_.you_.can_ (GG data folder) > cache > tmpe.apk This tmpe.apk file is the new GG package. In Apktool M, open it and select "Quick Edit." Set the Main SDK and Target SDK versions to 24. Press "Save", install the new package, and you're done! --- Enjoy using Game Guardian on your device! ^_^
    1 point
  28. Version 2

    1,282 downloads

    import this lib to your script : • setup ! XEK = nil load_lib = gg.makeRequest('https://raw.githubusercontent.com/chihaamin/XEKEX/main/xLIB.lua') if load_lib.code == 200 then -- check the status of the request XEK = load(load_lib.content,'bt')() end • Comment if you find a bug / error or if you have Idea for implementation. • All the file is documented and commented for beginners. ♥ Add "XEKEX was here" in your script if it was helful ------------------------------------------------------------------------------- IMPORT : JSON = XEK.import('https://raw.githubusercontent.com/rxi/json.lua/master/json.lua') -- this will import a lib into your script JSON.decode(response.content) Text2Dword : -- Text2Dword function Convert a text to dword value local DWORD = XEK.Text2Dword("berry") -- Print the result print(DWORD) --> Output: '6619234;7471218;121::9' Dword2Text : -- Dword2Text function Convert a Dword value to text local sampleValue = "6619234;7471218;121" local text = XEK.Dword2Text(sampleValue) -- Print the result print(text) --> Output: 'berry' hex : The 'hex' function takes two arguments: a value to convert to hexadecimal and a boolean 'hx' indicating whether to add '0x' or 'h' prefix to the output. --[[ If hx is true, the function returns the hexadecimal value with '0x' prefix. If hx is false, the function returns the hexadecimal value with 'h' suffix. If hx is not provided or not a boolean, the function returns the hexadecimal value without any prefix or suffix. The function uses string formatting to convert the value to hexadecimal. ]] --> Examples: --Convert decimal value to hexadecimal with '0x' prefix print(XEK.hex(255, true)) --> Output: 0xFF --Convert decimal value to hexadecimal with 'h' suffix print(XEK.hex(255, false)) --> Output: FFh --Convert decimal value to hexadecimal without any prefix or suffix print(XEK.hex(255)) --> Output: FF dump : --[[ dump function takes a table as input and returns a string representation of the table. If the input is not a table, it returns a string representation of the input. Parameters: tab (table): the table to be dumped Returns: (string): the string representation of the table ]] --> Example usage: local myTable = {name = "John", age = 30, hobbies = {"reading", "running"}} print(XEK.Dump(myTable)) -- Output: { ["name"] = "John", ["age"] = 30, ["hobbies"] = { [1] = "reading", [2] = "running", } } split : --split function splits a string into a table of substrings using a specified delimiter --The function takes two parameters: s, which is the string to be split, and delimiter, which is the character or string used to separate the substrings --> Example usage: local myString = "apple,banana,cherry,orange" local myTable = XEK.split(myString, ",") -- The above code will split the string "apple,banana,cherry,orange" into substrings using the comma as the delimiter and store the result in a table called myTable --The resulting table will contain the following values: myTable[1] = "apple" myTable[2] = "banana" myTable[3] = "cherry" myTable[4] = "orange" ARMIT fix : --# Example 1: Converting an Integer to Assembly Instructions local instructions = XEK.ARMIT(123456, "int", true) --The above function call will generate assembly instructions to move the value 123456 into a register in AArch64. --> Output: instructions = { [1] = '~A8 MOVK W0, #0xE240, LSL #16', [2] = '~A8 MOVK W0, #0x0001, LSL #32', [3] = '~A8 RET', } --# Example 2: Converting a Boolean to Assembly Instructions local instructions = XEK.ARMIT(true, "bool") --The above function call will generate assembly instructions to move the value 1 (true) into a register in AArch32. --> Output: instructions = { [1] = '~A MOV R0, #0x1', [2] = '~A BX LR', } --# Example 3: Converting a Float to Assembly Instructions local instructions = XEK.ARMIT(3.14159, "f", true) --The above function call will generate assembly instructions to move the value 3.14159 into a floating point register in AArch64. --> Output: instructions = { [1] = '~A8 MOVK W0, #0x0FD0, LSL #16', [2] = '~A8 MOVK W0, #0x4049, LSL #32', [3] = '~A8 FMOV S0, W0', [4] = '~A8 RET', } --# Example 4: Converting a Double to Assembly Instructions local instructions = XEK.ARMIT(123456789.987654321, "d") --The above function call will generate assembly instructions to move the value 123456789.987654321 into a double precision floating point register in AArch32. --> Output: instructions = { [1] = '~A MOVW R0, #0x5BA8', [2] = '~A MOVT R0, #0x57F3', [3] = '~A MOVW R1, #0x6F34', [4] = '~A MOVT R1, #0x419D', [5] = '~A VMOV D0, R1, R0', [6] = '~A BX LR', } readBytes | readWord | readDword | readFloat | readDouble : local words = XEK.readWord(addr, size, ';') <-| return a string local dwords = XEK.readDword(addr, size, '-') <-| return a string local floats = XEK.readFloat(addr, size, '|') <-| return a string local doubles = XEK.readDouble(addr, size, ':') <-| return a string -- OR local words = XEK.readWord(addr, size) <-| return a table local dwords = XEK.readDword(addr, size) <-| return a table local floats = XEK.readFloat(addr, size) <-| return a table local doubles = XEK.readDouble(addr, size) <-| return a table --<< these function purpose is to read values from memory for comparison >>-- getResults : --# Example usage of getResults function and its returned table local t = XEK.getResults(10) or t = XEK.getResults() <-|-- Get 10 results or all result | you can specified parameter same as GG print(t.data[1].address) <-|-- Print the address of the first result --# Example usage of focus function t:focus() <-|-- Save original values of results table print(t.original[1]) <-|-- Print the original value of the first result --# Example usage of update function t:update(999) <-|-- Set all values in result table to 999 --# Example usage of reset function t:reset() <-|-- Reset all values in result table to their original values --# Example usage of offset function t:offset(0x8) <-|-- Add 8 to the address of each result --# Example usage of append function local t2 = XEK.getResults(5) <-|-- Get 5 more results t:append(t2) <-|-- Append t2 results to t print(#t.data) <-|-- Print the total number of results in t --# Example usage of get function t:get() <-|-- Refresh the results table --# Example usage of clear function t:clear() <-|-- Destroy the results table and clear garbage MakeMenu : -- Create a new menu object local myMenu = XEK.MakeMenu().Menu:new({"Option 1", "Option 2", "Option 3"}) | this will add Menues -- Add a new action to the menu myMenu.actions:new(1, function() -- argument 1 is the index of menu ( option 1 function ) | index must be a number print("Option 1 was selected!") end) myMenu.actions:new(2, function() print("Option 2 was selected!") end) -- etc -- . -- . -- . -- Display the menu and wait for the user to make a selection myMenu:display() --whenever the user select a menu item it will trigger the functions inside myMenu.actions ( created with myMenu.actions:new(index, function) )
    1 point
  29. NOP is an arm instruction ARM Patching (ADVANCED) (#c3izs8gh) https://chat.openai.com/share/8927367c-0eb2-462c-a73c-f55d7973795d
    1 point
  30. if people that knowns somethings about something shares, it's like opening a pandora box at first i thought i can just EOL revolted on v3 and move on, but after watching a series of video by some internet security and such, the dude name in youtube was LiveOverflow, i thought myself, what if i can tamper the connection, so i tried to bruteforce the encryption first, but then i realize this is not a normal data transfer, so i look up the source and as expected it's encrypted, and since then ive been snooping the request and such, but like always, just if the community just like Unknowncheats, this game will be dead eons ago. anyway, i found a modifier that modify the search quantity accidentally when i trying to find alternative for leveling let's say you search a pharmacy, you'll get 1-4 amount of certain meds, and since i found this modifier, you know can get 10K+ i also found alot of multiplayer settings, unprotected, just as it, Gift Limit, Chat cooldown, banned items, opening gift cooldown, i kinda want to scrap the idea to try replay attacks on websocket connection. cuz like i dont find anything special from it, i'll try to unban myself without slash command by mod, if i do, i wouldnt be surprised i think i should make YT tutorials for day r hacking lmao imma start with caps, cuz all i see on yt is "this hacks doesn't work after 766, devs patched it"
    1 point
  31. No, it's not weird. And don't wait for a patch like that. So look, first of all, backend devs who know what they do are expensive. And they are pretty much always in demand. A game with s*** budget like this one won't have enough money to afford a strong team of backend devs to basically reimplement every front-end interaction on the backend as a verification. And this is the best practice whether in game dev, web dev or wherever. Clients are known to be unreliable. Maybe less so for mobile/console clients given how they don't come with root. Most likely, they hired a contractor or used to have a team member who made all the backend development for them. Basic as it is. Basically, an MVP. Then they figured that 95% of further progress in the game development can be done via front-end only, so they likely fired that person and continued developing the front-end for years. But really, if you look at it, there are not many people who are comfortable with rooting stuff and hacking at the memory. In fact, we're a bit odd people. Maybe we enjoy the process of hacking more than the process of playing? I know I often do. The point is, it's not like the game is dead now that we can do almost everything. A lot of kids and non-technical people will keep paying the greedy devs for the stuff that we casually hack. And the devs dramatically limited player interactions and implemented this soft ban logic exactly to prevent stronger players and hackers from busting their "economy", prevent them from giving away stuff that the devs are trying to sell to poor kids. I guess if we really wanted, we could kill the game by removing the bans and the limitations on the items you can give to other players (or the timeout) and starting giving away top level gear. But I don't see why we would. Loki and Angel are now leading hackers for this game. They target different segments of players, but they both charge or plan to charge, so they're interested in the game continuing as it is. Everyone's happy. AAA games (like diablo immoral), however, almost always do their backend checks, so we tend to not touch them unless we do it professionally for large profit.
    1 point
  32. Version 1.13.0

    1,807 downloads

    *cheat menu - max resource - long trajectory line - no wind - no obstacles - no ads my telegram channel t.me/Logic_lua my youtube https://youtube.com/@100Logic Password: 899667
    1 point
  33. View File SAS 4 Mega Script Features : • Skill Hack (Default SAS Skills) - Reload Speed. - Fast Movement. - Toughness. - Recovery Time. - Health Regen. - Pay Grade. - Body Armor Expert. - Energy Boost. - Energy Regen. - Field Supplies. - Grenade Damage. - Critical Shot. • Skill Hack (Assault) - Overpowered Adrenaline. - Overpowered Killing Spree. • Skill Hack (Medic) | Coming Soon • Skill Hack (Heavy) | Coming Soon • Skill Hack (Global Character) - Long Skill Duration [Except Medic] - No Skill Cooldown. - No Skill Energy Cost. [NEW] • Mastery Hack - Set Mastery Level To Max. - High Mastery Bonus. • Weapon Hack - High Crit DMG/Chance Bonus. - High Pierce. [Coming Soon] - High Rocket Explosion Radius. [Coming Soon] - High AOE. [Coming Soon] • Others - God Mode. - No-Clip. - F.O.V. If you face some problems with the script contact me via telegram. Game Link Submitter xLuaR Submitted 01/19/2023 Category LUA scripts  
    1 point
  34. Name : Harvest Town Playstore link : https://play.google.com/store/apps/details?id=com.harvest.android.gr Download link: https://apkpure.com/harvest-town/com.harvest.android.gr hack request: - gold - gem - stamina - health - clock freeze - Anything can be hacked
    1 point
  35. I thought I was the only one, but it turns out I'm not. The same, I tried to scour the Internet in the hope of finding at least a tiny hack, even in YouTube I searched, but there was only a divorce, "AFK arena hacking game currency", and the hack was through some left-wing site. I even tried to hack this game myself, but it didn't work out. I think that one day, at some point, someone will hack this game. (I apologize in advance for mistakes)
    1 point
  36. Bypassing XOR encryption in mobile games with Game Guardian In the last few months we noticed increased number of mobile games that uses some sort of encryption. Some of them are simple, like multiplying value with some random number (example: let’s say random number is 8 – in that case, 10 gold in our in-game inventory will be stored as 80 in memory). This simple kinds of encryption can’t trick anyone. But XOR encryption is different story. It is one of the simplest encryption methods, but in most cases it can’t be broken (if data and key have the same length). It is often used as a part in more advanced ciphers. But we will cover this latter. There are lot of tutorials that teach us how to bypass XOR encryption in mobile games, but most of them don’t show us process that lies behind. So before we start, we need to read some theory about the subject. If you learn this, you will be able to bypass XOR encryption with only basic memory editor, paper and pen. Of course, this is some sort of advanced tutorial – we assume that you are at least familiar with basics of memory editing. Cryptography 101 (logic for dummies) In the beginning, there was Boolean algebra. For those who haven’t overslept math and logic classes, you can skip this chapter. If you have overslept, read carefully. George Boole was mathematician, logician and philosopher who published his most famous notes in the middle of the 19th century. You probably asked yourself why are you reading about some dude who lived 100 years before ENIAC. This dude is father of all computers – every digital circuit on our planet works on his principles. For our story, it is important to notice that every algebra has own values and operations. Imagine that, in some sort of simple algebra, values are set of natural numbers from 1 to 10 [1,2,3,4,5,6,7,8,9], and only operations are addition(+), subtraction(-), multiplication(*), and division(/). From our knowledge of elementary algebra (math from school), you can tell that 1+1 =2, or 2*4=8. While elementary algebra deals with numbers, Boolean algebra use only two values – TRUEand FALSE. They are represented as 1(true) and 0(false). All operations are done on this two values. Of course, you can’t preform multiplication or subtraction on this values. We need some other operations that can be preformed on TRUE and FALSE. These operations are called bitwise operations. There are three basic operations in Boolean algebra – NOT(¬), AND (∧) and OR (∨), and they are really simple to understand. Take a look at this image, and everything will be clear. Source: Wikipedia Just kidding, forget this and let’s move on. Basic bitwise operations I know this will maybe be hard to understand, especially if this is your first time you read about logic. So I will try to make it simple. Boolean algebra (and any other logic) are made to teach us how to make correct conclusions. In elementary algebra, correct conclusion is when we write that 1+1=2. As we said, in Boolean algebra there are only two values, and we can only preform operations on them. Now imagine that we have a few true or false statements: Tom is a cat (TRUE or 1) Jerry is a mouse (TRUE or 1) Sky is green (FALSE or 0) NOT operator This is fairly simple examples. Let’s see our first operator, NOT(¬). “Tom in not a cat”, is this statement true or false? Of course, it is FALSE. Jerry is not a mouse = FALSE or 0. Sky is not green = TRUE or 1. This operator preforms logical negation on a given statement. 0 become 1, and 1 become 0. We can write it like this: ¬0 = 1 ¬1 = 0 AND operator AND(∧) operator takes two arguments, and returns TRUE only if both arguments are TRUE. Tom is a cat AND Jerry is a mouse = TRUE(1). Tom is a cat AND Sky is green = FALSE(0). You can easily remember this operator – just multiply two arguments and you have correct result. We can write it like this: 1 ∧ 1 = 1 1 ∧ 0 = 0 0 ∧ 1 = 0 0 ∧ 0 = 0 OR operator OR (∨) operator takes two arguments, and return FALSE only if both of the statements are FALSE. In every other case it returns TRUE. Tom is car OR Sky is green = TRUE(1). Sky is green OR Sky is red = FALSE(0). 1 ∨ 1 = 1 1 ∨ 0 = 1 0 ∨ 1 = 1 0 ∨ 0 = 0 Maybe you wonder why are we talking about Tom and Jerry. In computer world, everything is made in binary system. There are only two states in computer – there is current flow (1) and there isn’t current flow (0). So every information is stored in binary numeral system. Each digit (0 or 1) is called bit. Group of 8 bits are called byte. Any information can be translated into binary system. So our “tom” will be 01110100 01101111 01101101 in binary, and “sky” will be 01110011 01101011 01111001. Guess what? You can preform this bitwise operations on binary values. So, “tom” OR “sky”? 01110100 01101111 01101101 tom ∨ 01110011 01101011 01111001 sky ____________________________ 01110111 01101111 01111101 wo} If we want preform AND operator, this will be result: 01110100 01101111 01101101 tom ∧ 01110011 01101011 01111001 sky _______________________________ 01110000 01101011 01101001 pki Well, this was not very useful. But it is important to remember this, because now you will learn another bitwise operation – exclusive disjunction (exclusive OR, known as XOR). XOR (exclusive OR) bitwise operator I hope you understand these basic bitwise operators. There is also so-called “secondary operators or operations”, which can be derived from basic operators. One of these secondary operators is XOR, or exclusive OR. You will understand why is it called “exclusive OR” when you see the following table. 1 XOR 1 = 0 1 XOR 0 = 1 0 XOR 1 = 1 0 XOR 0 = 0 As you can see, if you perform XOR operation on two different values, it will return 1 or true. If values are the same, it will return 0 or false. So what is the catch? Why are XOR so special, and why is it used in cryptography? Now, look again our previous example, and you will see. From now on, we will preform XOR operation on original data (“tom” in our case) with the key (“sky” in our case). 01110100 01101111 01101101 tom XOR 01110011 01101011 01111001 sky _____________________________________ 00000111 00000100 00010100 //this can't be converted to meaningful text But what will happen if we XOR out new value (00000111 00000100 00010100) with the same key (sky or 01110011 01101011 01111001)? Let’s try it. 00000111 00000100 00010100 XOR 01110011 01101011 01111001 sky ___________________________________ 01110100 01101111 01101101 tom Right, we got our original data. But there is more -what if we don’t know the key (“sky”) 01110100 01101111 01101101 tom XOR 00000111 00000100 00010100 ___________________________________ 01110011 01101011 01111001 sky We have out original key. This is the reason why XOR operator is special. We can’t achieve this with other operators. XOR encryption in mobile games So let’s see some real world example – using XOR encryption in mobile games. Imagine that you have 1000 gold in some game. Developers implemented that all values are XOR-ed with the key 1337, and stored in memory. So look at the example. For conversion for decimal to binary you can use Windows calculator, or some online tools [BINARY TO DECIMAL CONVERTER] 0000001111101000 1000 XOR 0000010100111001 1337 _________________________ 0000011011010001 1745 This means that “1000” gold is stored as “1745” in memory. If you earn more gold (let’s say you got 1050 gold now), it will be stored in memory like this. 0000010000011010 1050 XOR 0000010100111001 1337 _________________________ 0000000100100011 291 So how we can bypass this sort of encryption? Bypassing XOR encryption with Game Guardian We already saw that: original value XOR key = encrypted value encrypted value XOR key = original value original value XOR encrypted value = key With this principle, we can bypass XOR encryption even if we don’t know that key developers used. So let’s start with practical work. If you aren’t familiar with fuzzy search, it will be useful to first read this tutorial [GAME GUARDIAN FUZZY SEARCH TUTORIAL]. We are going to use examples from previous paragraph. Our first step is to find address where the encrypted value is stored. This step is simple. First, scan for unknown starting value – this is done by selecting Fuzzy search from Game Guardian. As value type, you can choose DWORD (it was DWORD in all games that we cheated). Change the amount of gold in-game, then search for changed value. Repeat this step until only one address has left on the list. Now it is time to check if XOR encryption is used. Let’s say you got 1000 gold in game, but with fuzzy search you found value 1745. Preform XOR operation on this two values. 0000001111101000 1000 //Ingame gold XOR 0000011011010001 1745 //Value that you have found with fuzzy search _________________________ 0000010100111001 1337 //Key? --write it down Now change original value – earn or spend some gold. Let’s say you have 1050 gold now. Look at the address that you found with fuzzy search, and read the value. Again, preform XOR operation with in-game value and in-memory value. 0000010000011010 1050 //In-game value XOR 0000000100100011 291 //Value which is stored in memory _________________________ 0000010100111001 1337 //KEY!! If two keys are the same, XOR encryption is used and you have found the key. If they are not, XOR encryption is not used. Now, let’s change our gold (it was our primary goal, right?). We want 9999 gold. Again, preform XOR operation on it with key that you found (1337 in our case). 0010011100001111 9999 XOR 0000010100111001 1337 ___________________________ 0010001000110110 8758 Change the value that you found with fuzzy search – as new value set 8758. Open game again, and you should have 9999 gold. You can now cheat game using paper and pen, as we promised on the beginning. But it would be smarter if you use XOR calculator built in Game Guardian Second method to bypass XOR encryption Now, you will see the true power of Game Guardian. For this method, it is important to note that in most games, encrypted value and key are stored next to each other in memory – for DWORD type,one value occupies 4 bytes,so the key is usually 4 bytes away from encrypted value. Look at this picture. In Game Guardian, there is builtin method which automatically search for values, and XOR them with value which is X bytes away. That means that we don’t need to do fuzzy search, or calculate XOR values. Game Guardian can do it for us. Let’s get back to our previous example and imagine that encrypted value and key are 4 bytes away. If you have 1000 gold in-game, click on Known search, as type choose Dword (it can be some other types too, but it is usually dword.). As value, put in 1000X4, and click on search. In this example, first number “1000” is amount of currency that we want to change. Second part, “X4“, marks how many bytes away is the key. For dword values it can be X4,X8, X12, X16… Earn or spend some currency – let’s say that you have 900 gold now. Now input 900X4, and click on refine. Repeat previous step until you have only one address left (or few addresses if you want). Click on Edit, and as a value input 9999X4. And that’s it. Game Guardian will automatically search for encrypted values, and XOR them with key which is X bytes away. Pretty impressive feature. With this, our tutorial has finished. There will be reference links bellow, if you want to know more about this subject. Any suggestions are appreciated. Happy cheating. Reference links [Algebraic operation – Wikipedia article] [Binary numbers] [Boolean algebra] [Exclusive OR – XOR, Wikipedia] [NoFear’s tutorial – Xor search guide] [Binary to decimal online calculator]
    1 point
  37. Game Guardian group search BY GAMECHEETAH.ORG · MAY 29, 2017 In previous article from this series, we learned basics on how to use Game Guardian to change known values [LINK]. This method is useful when we are dealing with values that can be changed, so we can refine our search multiple times, until we find the right address. In many cases, you will need to find values that can’t be changed from the game (ex. prices from the in-game shop), or to find two or more similar values faster (health and mana). In this tutorial you will find out how to use Game Guardian group search. But first, let us explain what exactly is group search. All data from some game are stored in memory when game is started, and every in-game value is stored in different address. If you used Game Guardian, Cheat Engine, or any similar program, you maybe noticed that there is usually hundreds millions unique addresses occupied by the same game. All addresses are marked with unique code (ex. 9D786251 or 895D2314). When we scan for only one value, Game Guardian will search through all addresses and save the ones that stores wanted value. On repeated search with different value, it will search through saved list, and make smaller list that contain only changed values that stores new wanted value. Game Guardian group search When we do Game Guardian group search, we are searching for two or more values that are close to each other. All addresses are marked with unique hexadecimal number. The reason behind this is that hexadecimal system is more suitable for computer systems, because each digit (from 0 to F) represent 4 bits. So one byte (8bits), let’s say 00000000 in binary, can be written as 00 in hexadecimal. Biggest value that can be stored in one byte is 11111111 binary, or FF in hexadecimal. If you want to know more about this, please read this article [LINK] on Wikipedia, as you will need to understand this if you want do use Game Guardian for something more advanced. Basic syntax for group search is “VALUE1;VALUE2;VALUE2:RANGE“, without quotes. You need 2 values minimum, and you don’t need to define RANGE explicitly. If you don’t define range, Game Guardian will define it as 512. This can be difficult to understand, but let us see the example. Game Guardian group search examples Here we will imagine that this values are stored in some addresses. 8D7C6B00 12 8D7C6B01 13 8D7C6B02 14 8D7C6B03 15 8D7C6B04 16 8D7C6B05 17 8D7C6B06 18 So we want to find the addresses that contains values 13, 15 and 16, we can use this line. 13;15;16:500 Game Guardian will search all addresses that contain values 13, 15 and 16, and there are up to 500 addresses between them. There is probably a lot of addresses that contains 13,15 and 16, and which are close to each other. In most cases, you will search similar values (gold and silver, or price and product) , so they will be close to each other. We could do the same search again, with smaller range. If we run this query, 13;15;16:5, we will find our values too, but with less false positives. It will search all values 13,15 and 16 that are up to 5 addresses from each other. It will drastically narrow our search. Game Guardian ordered group search There is one similar search, ordered group search. Syntax is almost the same, except the range is defined with mark “::“ , without quotes. We could use this search if we are sure that numbers are in exact order as we typed in. In the upper example, 15;13;16:5, 16;13;15:5, 16;15;13:5, 13;16;15:5 will find the same addresses (8D7C6B01, 8D7C6B3, 8D7C6B4). But if we search for 15;13;16::5, it wont find anything, because the values are not in the right order. But if we search for 13;15;16::5, it will show us right addresses. Let’s see how this looks like in practice. This is screenshot from the game SimCity BuildIt. Note how some values occupies more space. Remember what we learned about value types in last tutorial [LINK]!! Now, we will see how to use this knowledge in practice. Using group search for cheating SimCity BuildIt As we already show in this article [LINK], cheating SimCity BuildIt is really easy with group search. Now we will only show how to cheat on the achievements screen, as we do not need to use incremental change (we will cover this latter). In SimCitz, go to the achievement screen. Choose one of the achievements – in video there is one where you need to have 1500000 Sims living in your city to get 32 Simoleans. Make DWORD union search – 1500000;32. You will find only two addresses. Edit the 1500000 to 1 and 32 to, let’s say, 10000. Now claim your hard earned 10000 Simoleans. And this is all for now. In next tutorial, we will expand this knowledge with incremental editing the value – this will allow us to refine results, even if we can’t change values directly from the game.
    1 point
    The unique program with an excellent set of features. Distinctive features: support x86 and x64 devices and emulators (BlueStacks, Droid4X, Genymotion etc.); support Android 5+ and 6+; deceleration / acceleration speed games (ARM devices only); direct and fuzzy search; multiple fuzzy search for equality; search encrypted XOR values; search for fractional values; modify all the values found at once; show search progress; advanced filtering of search results; search value not only for equality but also in terms of more / less. Unique features GameGuardian Availability Search for encrypted values. Group Search supports all data types, including float and xor. Search in the application code. Changing the application code. Support of "data type" xor, are often used to protect the values of the changes in the games. Displays an unlimited number of search results, the main thing that you have enough memory. Filtering the search results according to various criteria. Autofill on values change. The ability to enter data in hexadecimal. The rollback feature values change if you do not need. Extended freeze values. Advanced application settings system. Viewing the game screen, without closing the program interface. The input history. Unique in-memory data storage system that allows you to store data in memory and avoid crashes the program when available memory runs out. Speedhack runs on x86 devices. Speedhack runs on android 7. speedhack Function: time jump, which allows you to go forward in time, to the exact distance. Unique speedhack configuration allows fine-tune the desired intercept timers in the game without touching unnecessary. The unique masking system unable to detect the fact of installing and running the program for the protection systems of most games. Extremely high stability. Active support. Constant updating. Localization into many languages. Special tricks against some common protective systems.
    1 point
  38. 1 point
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.