Leaderboard
Popular Content
Showing content with the highest reputation since 01/20/2025 in all areas
-
Hey I'm sorry I don't understand what you're asking, but I have clearly stated what I want to hack in the further messages if you read the whole thing, I have also stated the game name, here I'll paste the whole thing here again for you to read to understand what I'm trying to do "Additional info: I'm trying to hack the value of Total number of points on a leaderboard (I know some might say it's server side but it's quite new game and we can hack anything in the game there's not even a protection against lucky patcher in this game despite being fully multiplayer based) Now I got down to one value after earning some points in matches repeatedly, the amount you earn after a match is added to your total everytime and you progress through the leaderboard, now I have lost that value while trying something and yes that was not a Dword value but a Word value, so I might even be wrong in finding that value but I narrowed it down after 7-8 tries so I think it should be accurate I used encrypted search everytime with Auto mode (not Dword only) Update: I have figured out to search the value in Dword and it's not encrypted I but there's two of them and they both increased with the actual increase in the total points so I can't figure out which one is it, I've tried changing one but the change is reflected in both the values after I play a match and the points are added, but the change doesn't actually reflect in the game, and I don't know if it is happening at the backend and not just visually Or if there's some problem and the value can't be edited and it's server side, but what I don't understand is if it's server side how come the value is changing according to what I changed it to and not how the game is showing it For Instance- the value was 100 before, i got 22 points, the value became 122 and I found 2 values with 122, I changed one of them to 200 and the table still showed me on 122 points, so I went and played a match to see if it reflects the change after I get some more points but after I got 20 points in the match, the value showed 142 on the table, but on the game guardian search, both the values had now become 220 (200 is what I changed it to and 20 points is what I got so 220 is what the table is supposed to show if it's hacked correctly) and now there are two instances going on of the same value One in the game table where it's continuing from what it actually was i.e 142 + whatever point I get in further matches but on the game guardian search I had made for both the values, a different instance is going on where it adds whatever points I get in the next matches to 220 that was supposed to be after I hacked the value, So I don't get it please, please help" The game is GOKA Street5 points
-
So I'm very new to game guardian and I use this on a rooted emulated Android 11 in MSI App Player I have narrowed down an encrypted value to the last, I have found the one, but I don't know how to change the value to what I want Before you suggest, I have read the few threads on this and they don't help, I didn't understand what they were trying to say, as I said I'm very new, I tried to figure out the xor or whatever it is like some guy suggested in the old thread but my encrypted value doesn't seem to work like that For eg. I have a value 1927 which has 22 as the encrypted counterpart, when it was increased by 55 and became 1982 the encrypted value became 176 further when it was increased by 547 and became 2529, the encrypted value became 10, so frankly I see no pattern here Please help me or link me to a youtube video, I've searched for hours but people touch on this issue but I haven't a solution to my exact problem P.S - I don't know what offset is, XOR is, Key is, I can just see/read and then understand it but words without demonstration mean nothing to me right now so please be cooperative and try to explain like I'm 5 or something4 points
-
4 points
-
For people who're still watching this thread: I don't know to replace the selling items on Nopaew shop, but I was able to find a way to get the IDs of the items, and was successfully get the Cat Express Ticket. Basically, on this thread there are 3 things: Hack Nopaew existing items to buy a lot of it without gems: https://sbupload.com/ea247239cf61d449 Hack Red / Green keys by locking the IDs: https://pixeldrain.com/u/YmYyqKaK Hack items that are not in Nopaew shop by swapping the IDs, this is similar to the 2nd hack, except that you have to find the IDs for the items you want. I'll give the steps to get the IDs you want in step 3, but I'm too lazy to record a video. If anyone can do it successfully and have the time, please help record and upload a video. I would rather share this with everyone or let the developers fix it, than letting shameless people getting benefits from this. Here are the steps: Download and install apk from apkpure, select the armv8 architecture. This step may not be required, it's simply the version I use since I cannot download from Google Play. Follow the 2nd hack, you should save 3 variables: amount of item, the top 2 pointers (purple color). I believe that only the 2nd is needed, but haven't tested. Search for the ID of the item you want to swap, I hacked only the Cat Express Ticket, so I'll share it: Cat Express Ticket has a text ID: dungeon_ticket.skip Search using :dungeon_ticket.skip (note the semicolon in the beginning, it means text search) Refine the search with :. (semicolon, then dot) There should be 2 - 6 items left Tap on one of the results, then select Go To On this screen, you can tap on the top right corner, in the screenshot, it's where the h,S,D,F is showing. You can config how to display the values for the addresses in this screen, you should tick the Hex, String and DWORD boxes Scroll it down a few addresses, pass the end of the text ID a bit, you should see 2 pointer variables (purple) As in the screenshots, the 2 values you're looking for are 505 087 712 and 504 682 272, on my device, I can easily identify them because there are two 120D value under them, it could be different on different devices If you cannot find these ID, try with other search results Once you have the 2 values, replace the 2 pointer variables you saved before with these values, in their respective order. Like I said, probably only the latter matters but I didn't test. Continue with the hack I'm not good at Game Guardian so these steps are not that refined, and as you can see, it doesn't change the items sold in Nopaew like in the screenshots of the guys who cracked it, but the result should be the same. I hope from these steps, some smart people will refine it and share more detailed steps with everyone. You can use the same steps to hack Opus, and I guess it's possible to hack Cat Coin this way too. All the memoirs should have the prefix: job_rank_item, (e.g: job_rank_item.zodiac_fellislord, job_rank_item.zodiac_blazehero...). You can use text search to find all of them. Another way may be to unzip the downloaded APK file, there should be a localization file that would contain similar IDs. I'll leave that to other people, as for me the skip tickets are enough, as I believe the ability to skip dungeons should be free for everyone, I don't appreciate WFS lock it behind pay wall.4 points
-
Version v75.0.1
71 downloads
IDLE MONSTER TD: MONSTER GAMES IS AN ENDLESS IDLE TOWER DEFENSE GAMES OF EPIC MONSTERS VS EVIL HUMANS SET IN A FANTASY RPG WORLD. UNLOCK, UPGRADE, AND EVOLVE YOUR MONSTER TO DEFEND YOUR TOWER FROM INVADING HUMANS. STRATEGIZE AN EPIC MONSTER BATTLE TO OPTIMIZE THEIR POWERFUL ABILITIES. MANAGEMENT IS CRUCIAL IN THIS IDLE, TAP TO WIN THESE BATTLE GAMES! GAME LINK: APKCOMBO SCRIPT MENU: - LEVEL COST - HIGH DAMAGE - SPEED ATTACK - ALWAYS CRITICAL - SLOW ENEMY - EXP MULTIPLIER3 points -
For the new season points : UTF-8 search = :SSPSuit19SVDPoints.amount Dword group search(ordered) = 25D;1,397,773,139D;829,712,757D;1,146,508,089D;1,852,403,536D;1,630,434,164D;1,853,189,997D::25 HEX search = h 00 53 53 50 53 75 69 74 31 39 53 56 44 50 6F 69 6E 74 73 2E 61 6D 6F 75 6E 74 00 - Season pass unlock by @NoFear is still working. - Armv8 only.3 points
-
Version 1.40.0
165 downloads
I tried To Hack This 2-3 years ago but . I couldn't hack it because it wasn't Working On X8sandbox (Android 5.0 emulator) because game required Android 7+ Otherwise [unfortunately Game Has Stopped Error] . But Now, i had Find 2-3 ways to hack this game cheats • Gems - Coins - Crystal hack from dropped items • Free Chest Shop Menu • Event Special Coin Hack For LeaderBoard I had Also Find mine Level Hack + mineshaft level in dword https://youtube.com/shorts/hgvquCo9sv8?si=bHfg13XE-mwPhC-b Video_2025_02_11_10_32_58.mp43 points -
Version 10.04.24
8,352 downloads
OVER 200+ Games/Scripts New Scripts Added Daily / Weekly 100% Created by APEX[GG]v2 UPDATED 06 Feb 2025 ( 201 Total Games ) 1945 Air Force 3D Pool Ball ACE Fighter Agent J Aliens vs Zombies Almost A Hero Angry Birds 2 AnimA Archero Arrow Quest Attack Hole Auto Hero Awesome Tanks Ball Blast Bang Bang Rabbit Battle Strategy TD BeatStar Beyblade Rivals Bladebound Blitz: R.o.Heroes Boom Castle Boom Stick BounceMasters Bowmasters Box Head ZMD Brawl Fighter Brick Inc Bricks Breaker GB Bullet Echo Bullet Echo India CarX Highway Catapult King Clan Race Clash of Destiny Conquer the Tower Conquer the Tower 2 Crossy Road Cyber Surfer DC Heroes & Villains Dead Ahead ZW Dead Raid ZS 3D Dead Trigger Dead Trigger 2 Dead Warfare Death Invasion Surv Defenders 2 Defense Legend 5 Demon Blade Devil Eater Dice Dreams Disney Heroes BM Doomsland Dragon Ball Legends Dragon POW! Dream Defense Dust Settle Dye Hard Endless Frontier Epic Stickman Faily Brakes 2 Fight for America Fire Hero 2 Forged Fantasy Frozen: Free Fall Fruit Ninja 1 Fruit Ninja 2 Galaxiga Gems of War Grow Castle Grunt Rush Gun War Hero Factory Heroes of Mavia Heroes vs Hordes Hockey All Stars 24 Honor Bound Horizon Chase Hyper Heroes Idle Hero TD Impossible Space Imposter Battle Royale Impostor Shooter MR Infinity Ops Injustice Gods A.U. Into the Dead 2 Island War Jewel World Museum Jurassic Monster World King of Defense Kingdom Clash Last Hero S.A Left to Survive Legion Master Lilys Garden Lonely Survivor Mad Skills MX3 Magic Rampage Magic Siege Major Gun 2 MARVEL C.o.Champions Match Hit Meow Hunter Merge Archers Mini Golf King Mob Control Moto Rider BRG Mr. Autofire NFL Rivals Ninja Turtle Legends NonStop Knight 2 Otherworld Legends Pac Man 256 Panda Pop BS Pocket Necromancer Pokemon Quest Pool Stars Puzzle Brawl Quest 4 Fuel R.A.C.E. Racing Legends Raid Royal 2 TD Raid Rush Ramboat 2 Real Steel Boxing Champ Realm Defense Red Siren Rival Kingdoms Robot Warfare Rodeo Stampede Royal Match Shadow Gun ESW Shadow Knights Shadow Legends S.F. Shadow of Death Shadow Slayer Shadowgun Legends Shooter.io.WS SkullGirls Sky Force Reloaded Slash and Girl Slime Castle Smash Bandits Sniper 3d Sniper Strike Sonic Boom 2 Space Shooter GA Squad Alpha Star Force Steampunk Tower Steel Rage Stick Ninja 3v3 Stick War Saga Stickman Archer Online Storm Blades Street Racing 3D Stupid Zombies 1 Subway Match Survive Squad Swamp Attack 2 Tacticool Tank Combat WB Tank Hero Tank Stars Tap Titans 2 Tiny Gladiators 1 Tiny Gladiators 2 Top Troops Tower Conquest Tower Gunner ZS Towerlands Toy Blast Traffic Rider Transformers Bumblebee Transformers E.W. Transmute: GB Turret Defense King Undead City ZS Undead VS Demon Unkilled Wacky Battles War Commander R.A. War Heroes War Inc : Rise War Strategy Game Warhammer 40k Tacticus Warzone Commander Wind Wings World of Artillery World Robot Boxing World Robot Boxing 2 WWE Mayhem WWII Defence Zombeast Zombie Defense Zombie Fire 3d Zombie Hunter Zombie State Zombie Warfare TDP Zombies Boom Zombtube3 points -
Version 101.1
202,502,162 downloads
Overview: Play games your way! “GameGuardian” is a game cheat / hack / alteration tool. With it, you can modify money, HP, SP, and much more. You can enjoy the fun part of a game without suffering from its unseasonable design. Requires Android: 2.3.3+ GameGuardian Features Summary Runs on ARM, x64 and x86 devices, including x86 emulators (LDPlayer, Droid4X, MOMO, KOPlayer, Andy, Memu, Leapdroid, AMIDuOS, Windroye, RemixOS, PhoenixOS, AVD, Genymotion, Nox, BlueStacks etc.) Supports Android 2.3.3+ (Gingerbread) through Lollipop (5+), Marshmallow (6+), Nougat (7+), Oreo (8+), Pie (9+), 10+. Support work without root via different virtual spaces. Support different emulators like PPSSPP, ePSXe, GameBoy etc. Game deceleration and acceleration (speedhack) for ARM and x86 devices, including x86 emulators. Also supports both 32-bit and 64-bit applications on 64-bit devices using speedhack. Search feature: encrypted values. Search of unknown values when specifying the difference between values. Search addresses by mask. Explicit and "fuzzy" numeric searches. Text (String, Hex, AoB) search. Supports: Double, Float, Qword, Dword, XOR, Word, Byte, or Auto data-type searches. Lua scripting support. Modify all search results at once. Filtering of search results (address greater than and less than, value greater than and less than). Search in the background feature. 'The fill' feature. Time jump feature. Dump memory. Copy memory. Customizable UI. App locale for over 50 languages. And, much, much more. Notes: ** ROOT or VIRTUAL ENVIRONMENT ONLY ** This tool only works on rooted devices or in virtual environment (without root in limited mode)! GG can work in limited mode without root, through a virtual environment. For example, through Parallel Space, VirtualXposed, Parallel Space Lite, GO multiple, 2Face and many others. Read the help for more details. You can find more information about rooting your device at XDA Developers. Want to help us improve, or add a translation? Then please visit thread "If you want to add a new translation or improve an existing". If you are having issues with the app, please visit thread "Gathering information about GG errors". Want to donate and help keep the project going? That's awesome! You can donate any amount (anything helps) here: Donate Need help with how to use this application? Please visit "Video tutorials" and forum "Guides". Credit: @d2dyno - Owner, lead designer, project management. @Enyby - Lead coder, project management. @Trasd - Technical consultant, project management. @Aqua - Creator (retired).3 points -
Version v1.4.5
78 downloads
ARE YOU LOOKING FOR A NINJA SHADOW FIGHT BATTLE GAME WITH A BLEND OF NINJA WARRIOR AND SAMURAI REGIONS FIGHTING GAMEPLAY? RYUKO RPG IS A SHADOW NINJA GAME PACKED WITH FIVE REGIONS OF KUROME, ADDICTIVE GAMEPLAY, EPIC BOSS FIGHTS, OFFLINE BATTLES, AND AN OPEN WORLD ADVENTURE GAMEPLAY EXPERIENCE. GAME LINK: APKCOMBO SCRIPT MENU: - HITKILL - DUMMY ENEMY - REMOVE ADS2 points -
Settings on top right, then filter then check "string representation".2 points
-
I don't care if you're a new member or someone posing as a fake account. What you should improve. Make a clear title... for example how to get star coins in the game roomscapes (playrix)... This way everyone will learn it in their own style... and they will explain what methods were used...2 points
-
Hey man, what is happening here? Did I offend someone here I don't get it What have I said wrong, I have provided every information that I know of I'm new and I don't understand how any of this works, why are you guys being rude and vague Please explain to me if something's wrong2 points
-
No no, I gave the reason why I was reluctant, and I never refused I just didn't want to put it on a public forum is all, but the game is GOKA Street and do read my update I've mentioned the method of how I found it without encryption through Dword search and it still doesn't quite work2 points
-
2 points
-
Nopaew: https://pixeldrain.com/u/tkwGUKct SkpTicket (old): https://pixeldrain.com/u/ME2PiaS9 Will try to do a video using bobokill method2 points
-
Version v2.02
289 downloads
GET READY FOR INTENSE 3D TANK BATTLES IN SUPER TANK HERO. EXPERIENCE ONE OF THE TOP OFFLINE TANK WARFARE GAMES, WHERE PRECISION AND STRATEGY ARE KEY. AIM CAREFULLY, FIND THE PERFECT SHOT, AND DOMINATE ENEMY WAR MACHINES WITH YOUR UNSTOPPABLE IRON FORCE. BUT BEWARE, QUICK REFLEXES ARE ESSENTIAL! MISS YOUR CHANCE, AND IT COULD BE GAME OVER! GAME LINK: APKCOMBO SCRIPT MENU: - SKILL MENU BULLET MULTIPLIER ROCKET MULTIPLIER INSTANT MINEBOT ALWAYS CRITICAL INFINITY INVINCIBILITY - INFINITE COIN - INFINITE GEM - REMOVE ADS - INFINITE ENERGY2 points -
-- set ranges -- clear results gg.searchNumber x=gg.getResulrs(gg.getResultsCount()) for i, v in ipairs(x) do v.address=v.address-0x1C end -- change 0x1C to your offset gg.loadResults(x) gg.refineNumber2 points
-
could be better if you can give the game name so people can took a look into it more specific.2 points
-
Version v2.38.0
52 downloads
YOU’RE RICK SANCHEZ, EVERYONE’S FAVORITE UNSTABLE GENIUS. YOU’RE YELLING AT MORTY IN YOUR GARAGE WHEN A MYSTERIOUS RICK POPS OUT OF A PORTAL AND RUINS YOUR LIFE. HE TRAPS YOU IN AN UNFAMILIAR DIMENSION WHERE YOU DISCOVER THAT MORTY COLLECTING AND FIGHTING IS THE HOTTEST NEW TREND IN THE MULTIVERSE! SOME MORE STUFF HAPPENS AND LONG STORY SHORT THE COUNCIL OF RICKS TAKES YOUR PORTAL GUN. NOW YOU HAVE TO DEFEAT RICKS ACROSS THE MULTIVERSE AND COLLECT BADGES TO GET IT BACK. GAME LINK: APKCOMBO SCRIPT MENU: - GOD MODE (OFFLINE) - HIGH DAMAGE (OFFLINE) - HIGH DEFENSE (OFFLINE) - HIGH SPEED (OFFLINE) - INFINITE COINS (OFFLINE) - INFINITE COUPONS (OFFLINE)2 points -
I also use super su app it fixed my issue. With Android 14 introducing stricter security measures, many root users have faced issues like bootloops, loss of root access, and app incompatibility. However, if you successfully used SuperSU to fix your Android 14, it proves that the app still holds value in managing root permissions effectively.2 points
-
Version v1.4.3
128 downloads
SET SAIL ON A THRILLING ADVENTURE TO BECOME THE LEGENDARY FISH HUNTER! EXPLORE VAST OCEANS, FILLED WITH COLORFUL FISH, DANGEROUS SEA MONSTERS, HIDDEN TREASURES, AND MORE! GAME LINK: APKCOMBO SCRIPT MENU: - REMOVE ADS - CATCH FISH FASTER - INCREASE LEGENDARY CHANCE - BOOST LEVEL - BOOST FUEL REGEN - INCREASE FUEL STORAGE - BOOST MONEY - BOOST SHIP SPEED - INCREASE SHIP HEALTH - BOOST WEAPON DAMAGE - NO RELOAD - DAMAGE MULTIPLIER2 points -
For the new season points : UTF-8 search = :SSPSuit18CNYPoints.amount Dword group search (Ordered) = 25D;1,397,773,139D;829,712,757D;1,498,301,240D;1,852,403,536D;1,630,434,164D;1,853,189,997D::25 HEX search = h 00 53 53 50 53 75 69 74 31 38 43 4E 59 50 6F 69 6E 74 73 2E 61 6D 6F 75 6E 74 00 - Season pass unlock by @NoFear still working - Armv8 only2 points
-
2 points
-
When we find coin, bullet, gems value in game, the address changes after we restart our game. Making it confusing for new gg Lua developers. To solve that, we use group search method. And this script will help you by: 1. Automatically generating Search code 2. Increasing search speed 3. Will find the value even if the main value changes, like bullet values which keeps changing and is not same 4. Will stores values in a table in a txt file, so you can analyse it later on (This script is meant for new gg users to make it easy for searching values using script) GG_Search_Code_Generator.lua2 points
-
Latest hack Gardenscapes Stars Level Coins 2025 [ not blocked] GameGuardian No Root https://youtu.be/0raDQZhVDzo?si=L6uQ3NL8N2Y0C3la2 points
-
For hooking void you need to call the void method by modifying another method to call it. This might be confusing for new gg users so i created an script template which allows you to hook void in gg with parameters (basic data types). With inbuild switch off code and ability to choose how many times you want to call the void method. These are the steps to use the template : 1. Download this code which i like to call method patching library , then paste it at the very top of your script 2. Now copy code for voidHook and then paste this anywhere, you can paste this in your script menu or how you would like to make your cheat active 3. Find the offset from dump.cs file or anywhere, and use those offsets to apply patches Below you can see an example of usage of this code : -- RVA: 0x1000 Offset: 0x1000 -- public static void Update() { } -- RVA: 0x2000 Offset: 0x2000 -- public void AddHealth(float health) { } HackersHouse.voidHook({ { ['libName'] = "libil2cpp", ['targetOffset'] = 0x1000, ['destinationOffset'] = 0x2000, ['parameters'] ={ { "float", 999999} }, ['repeat'] = 1, ['libIndex'] = 'auto' } }) HackersHouse.voidHookOff({ { ['libName'] = "libil2cpp", ['targetOffset'] = 0x1000, ['destinationOffset'] = 0x2000, } }) This probably has some bugs you can either report in the comments or you can come to telegram.2 points
-
Version v0.909
82 downloads
UNCHARTED ISLAND SURVIVAL IS A MEDIEVAL SURVIVAL GAME IN AN OPEN WORLD. STRANDED ON AN UNINHABITED ISLAND IN THE MIDDLE OF THE OCEAN, YOU MUST GATHER RESOURCES, CRAFT TOOLS, BUILD SHELTERS AND FIGHT MONSTERS. DIVE INTO THE WORLD OF ISLAND SURVIVAL GAMES AND TEST YOUR SURVIVAL SKILLS! GAME LINK: APKCOMBO SCRIPT MENU: - INFINITE STAMINA - EXP MULTIPLIER - SPEED HACK - SUPER JUMP - NO FALL DAMAGE - GOD MODE - HITKILL - FAST MINE - FREE COIN - REMOVE ADS - FREE CRAFT (BUILDING) - KEEP INVENTORY - LEVEL HACK (JUMP TO 5000)2 points -
Scorpius Rex Gen 2 = -708,142,142 The Spino = -858,940,3492 points
-
2 points
-
Minion Rush v10.5.0c latest hacking method Tokens GameGuardian No Root https://youtu.be/Emw5hf7GGIY?si=YnMNONv7iOMsoYp91 point
-
Simply put, I think it's your RAM. I had the same problem with my old Redmi Note 11, there just wasn't enough RAM available1 point
-
Are you familiar with checksum verification method? This checksum can be written in file itself. There can be several of them in file, to control different areas. One for game currency, one for items, one for character stats. And so on. Without knowing file (.hl) structure, your actions are meaningless.1 point
-
Quick Notes: Low Registers (R0 to R7): Accessible by all instructions using general-purpose registers. High Registers (R8 to R12): Accessible by 32-bit instructions specifying a general-purpose register, not all 16-bit instructions. Stack Pointer (R13): Used as the Stack Pointer (SP). Autoaligned to a word, four-byte boundary, ignoring writes to bits [1:0]. Link Register (R14): Subroutine Link Register (LR). Receives return address from PC during Branch and Link (BL) or Branch and Link with Exchange (BLX). Also used for exception return. Treat as a general-purpose register. Program Counter (R15): PC. FPU (Floating Point Unit): Supports single-precision operations - add, subtract, multiply, divide, multiply and accumulate, and square root. Also handles conversions between fixed-point and floating-point formats, and floating-point constant instructions. FPU Registers: Sixteen 64-bit doubleword registers: D0-D15. Thirty-two 32-bit single-word registers: S0-S31. ->Source <- --------------------------------------------------------------------------------------------------------------------------------- In Arm Patching we are using only Low Registers and the FPU. True and false Editing. ~A MOV R0, #1 MOV means Move , by this instruction we are telling the proccessor to move the value 1 to register R0 similar when you assign a variable name : R0 = 1 in most programing languages the true statment always = 1 and the false statment = 0 so #1 = true and #0 = false ~A BX LR BX Means branch exit LR or in another way return the value we stored to the caller. Int Editing : we can use MOV R0, # aswell for the int value but you need to know the integral data types. • byte : Signed: From −128 to 127 : Unsigned: From 0 to 255 we can use MOV here if the int value we want is between -128 and 255 so the instruction will be : ~A MOV R0, #-128 or #255 at max • short : Signed: From −32,768 to 32,767 : Unsigned: From 0 to 65,535 in this case we use MOVW the W stands for Word so same as above the instruction will be : ~A MOVW R0, #−32,768 or #65,535 at max NOTE : • Don't forget to return (~A BX LR) • We can Use MVN which mean Move Negative so the Max Negative Value will be #255 for Byte and MVNW for Short #65,535 (Don't add "-" since we already telling the proccessor we are dealing with negative number) • #value will be converted automatically to hex value in the Register means #8 will be 0x00000008 and so on • Int 32 : Signed: From −2,147,483,648 to 2,147,483,647 : Unsigned: From 0 to 4,294,967,295 the typical DWORD in GG : here we move to the advanced Part of this guide: as I said in the Note above the values are converted in the register automatically to hex so the max value in short in hex will be 0x0000FFFF so we have 4 zero's we can't change in the int 32, in this case we use one more instructon MOVT T stands for Top example : MOVW R0, #22136 -> R0 will be : 0X00005678 MOVT R0 , #4660 -> R0 will be : 0x12345678 So in case of INT32 we need 2 things • Convert the value we want to change to hex value • 3 instruction in total the Same concept here work for QWORD aswell (64 bit) 0x0000000000000001 Note : MVN R0, #2 will change to 0xFFFFFFF2 in hex MOV R0, #2 or MOV R0, #0x2 are the same Float and Double: • Float and Double are IEEE 754 Floating-Point: We need the FPU here and things will get a little bit complicated, • we need 2 or 3 registers in this case R0 , R1 and S0(for float) or D0(for double) Suppose the hex value of this float 12.6 is : 0x4149999A same as the int 32 : ~A MOVW R0, #0x999A (R0 = 0x0000999A) ~A MOVT R0, #0x4149 (R0 now = 0x4149999A) now R0 is set but if we return the value (~A BX LR) the result will be : 1095342490 and we don't want that value we want 12.6 as float (This Doesn't Work Because we didn't tell the proccessor that is a float number) the right way is to use FPU VMOV S15, R0 ( VMOV is the instruction MOV in the FPU : by that instruction we mean move the register value of R0 to the FPU register R15 ) VMOV.F32 S0, S15 (here we are telling the FPU we are dealing with Float number (F32) and move the value from S15 to S0 ) for double we use the same concept except we use F64 instead and register D16 and D0 Float : so the final code will be : ~A MOVW R0, #0x999A (R0 = 0x0000999A) ~A MOVT R0, #0x4149 (R0 = 0x4149999A) ~A VMOV S15, R0 ~A VMOV.F32 S0, S15 ~A BX LR ----------------- Double : For double the hex value of 12.6 is : 0x4029333333333333 (Same Concept for Big Float Number) • Here we use R0, R1 , D0 and D16 • divide the hex value 0x4029333333333333 into 2 part 0x40293333 and 0x33333333 one goes for R0 and the other one goes for R1 Be carful of the placement of the hex value we start from the last 4 to the 1st 4 means we start with 0x3333 -> 0x4029 Use same concept of MOVW and MOVT to get the result. Result: ~A MOVW R0, #0x3333 (R0 = 0x00003333) ~A MOVT R0, #0x3333 (R0 = 0x33333333) ~A MOVW R1, # 0x3333 (R1 = 0x00003333) ~A MOVT R1, #0x4029 (R1 = 0x40293333) ~A VMOV D16, R0, R1 (Move value Of R0 and R1 to register D16 Be Careful here R0 last 8 hex 1st then R1 the top 8 hex) ~A VMOV.F64 D0, D16 (here we use F64 and D0 , and D16 instead of F32 , S0 and S15 because the hex value is 64 bit) ~A BX LR ------ This is How you arm patch bool / int / float / double NOTE : When it comes to function args and returns the only register that give return or args are R0,R1,R2,R3 (and SP) this is why we use R0 and VMOV S15/D16 to S0/D0 ARMv8 : In ARMv8, LSL stands for "Logical Shift Left". It is an instruction used to shift the bits in a register to the left by a specified number of bits, and the bits that are shifted off the left-hand end are discarded. LSL can be used with immediate values or with a register value. The immediate value specifies the number of bits to shift, which can be between 0 and 63. When using a register value, the bottom byte of the register specifies the number of bits to shift Example : Level 1 ) LSL X1, X2, #3 --> Shift the contents of X2 left by 3 bits and store the result in X1 -> In this example, X2 is being multiplied by 8 (since 8 is 2 to the power of 3), and the result is stored in X1. Level 2) MOV and LSL example: MOV X1, #0x10 -->Move the value 0x10 into register X1 LSL X1, X1, #3 --> Shift the contents of X1 left by 3 bits (multiply by 8 ) Level 3) Float Value : 3.14159 / Hex : 0x40490FD0 --Load the value 0x0FD00000 into bits 16-31 of W0 • MOVK W0, #0x0FD0, LSL #16 --> W0 = 0x00000FD0 -- Load the value 0x40490000 into bits 32-47 of W0 • MOVK W0, #0x4049, LSL #32 -> W0 = 0x40490FD0 -- Move the value of W0 into single-precision floating-point register S0 • FMOV S0, W0 --> S0 = 0x40490FD0 (interpreted as a floating-point value) Note : 4 bytes hex (32) value we use register W and for float we use S Level 4 ) Double value : 3.14159 / Hex : 0x400921F9F01B866E MOVK X0, #0xF01B866E, LSL #16 -->X0 = 0x00000000F01B866E MOVK X0, #0x400921F9, LSL #48 -->X0 = 0x400921F9F01B866E FMOV D0, X0 Note: 8 bytes hex (64) value we use register X and for Double we use D NOTE: SAME CONCEPT IN AARCH32 WITH (INT, BOOL, FLOAT, AND DOUBLE) LSL and MOV(Z/K) is the diffrences. PART II (LDR / STR): [STRING] ( NON UNITY GAMES ) Little-endian / Big-endians : LDR and STR are instructions used in ARMv7 and ARMv8 architectures to load and store data from memory. LDR stands for "Load Register" and is used to load a value from memory into a register. The syntax for LDR in ARMv7 and ARMv8 is LDR <Register>, [<Address>] STR stands for "Store Register" and is used to store a value from a register into memory. The syntax for STR in ARMv7 and ARMv8 is STR <Register>, [<Address>] where <Register> is the name of the register to load the value into, and <Address> is the memory address from which to load the value. In both cases, the square brackets around <Address> indicate that the value inside the brackets is a memory address, rather than a register. To load the string 'GG TESTING' into a register, you can use the LDR instruction. Assume the pointer to 'G' is 0x00000004 we can use this address as the base address for the LDR instruction. The instruction for loading the first four characters of the string into a 32-bit register (e.g., R1/X1) would be: • LDR R1/X1, [0x00000004] -- R1/X1 = 'GG T' This instruction loads the 32-bit value at memory address 0x00000004 into R1/X1. Note: Use the Move instructions above (PART I) to assign the value (address) to a register BEFOR USING LDR --> LDR R1/X1, [R0] -- R0 = 0x123456789 ( use MOV to assign the correct address to R0 or X0) To load the entire string into a register, you can use the LDR instruction with a register offset. Assuming the string is stored in consecutive memory locations, we can use the following instruction to load the entire string into a register (e.g., R1/X1) LDR R1/X1, [0x00000004], #10 This instruction loads the 32-bit value at memory address 0x00000004 into R1 and increments the base address by 10 (the length of the string). As a result, the entire string 'GG TESTING' will be loaded into R1. ADVANCED : If 'GG TESTING' is a half-word (i.e., each character is 2 bytes or 16 bits) and the pointer to 'G' is located at memory address 0x0000004 + 0x8, then the instructions for loading the string into a register would be different Dummy memory: 0x0000004 (<-- pointer )= 123 0x0000008 = 21 0x000000C = 9999999 0x0000010 = 'GG' 0x0000014 = ' T' -- with space at the start. 0x0000018 = 'ES' etc.. --> between every byte value ( character ) there is 0 [ example in memory 0x00000010 = 71 (G) <-- byte 0x00000011 = 0 <-- byte 0x00000012 = 71 (G) <-- byte 0x00000013 = 0 <-- byte 0x00000014 = 32 (space) <- byte ] To load the half-word 'GG' into a 32-bit register (e.g., R0/X0), we can use the LDRH instruction as follows: LDRH R0, [0x00000004, 0x8] This instruction loads the 16-bit value at memory address 0x00000010 into the lower 16 bits of R0/X0. Since we want to load the first two characters of the string, we add an offset of 0x8 to the base address. Read more about LDR To load the entire string into a register, we can use the LDRH instruction with a register offset as follows: LDRH R0, [0x00000004, 0x8], #0xC This instruction loads the 16-bit value at memory address 0x00000010 into the lower 16 bits of R1, and increments the base address by 0xC (or 12 bytes) to load the remaining characters of the string. The 'GG TESTING' string has a length of 10 characters, which corresponds to 20 bytes (11 characters x 2 bytes per character), so we need to load 12 bytes in addition to the first 2 bytes to load the entire string. AARCH64 : LDRH --> LDURH (Load Unsigned Halfword with a 64-bit offset) or LDSRH (signed) LDURH W0, [X1, #16] ; Load a halfword from the memory address X1 + 16 into W0 This loads a 16-bit unsigned halfword from the memory address X1 + 16 into the 32-bit register W0. Note that the offset value is added to the base register X1 to form the memory address. Also, because LDURH is an unsigned load instruction, the loaded halfword is zero-extended to 32 bits. NOTE: the LDURH instruction is specific to AArch64 architecture and is not available in AArch32 architecture. STR: STR is used to store the contents of a register into a memory location that is addressed using a base register and an optional offset. The contents of the register are written to the memory location, overwriting any previous data that was stored at that location. -->STR Rd, [Rn {, #offset}] where Rd is the source register whose contents will be stored in memory, Rn is the base register that points to the memory location where the data will be stored, and offset is an optional 32-bit offset that is added to the base register to form the memory address. Example of using the STR instruction to store the contents of R0 register into a memory location: --> STR R0/X0, [R1/X1, #4] ; Store the contents of R0/X1 into the memory location R1/X1 + 4. NOTE : STR Wd, [Xn, #offset], imm | the STR instruction with the imm option is only available in AArch64. |--> Wd/Xd, [Xn, #offset] The imm option allows you to add an immediate value to the offset to form the memory address. The immediate value is sign-extended to 64 bits, shifted left by the scale factor (which is determined by the size of the data being transferred), and then added to the offset. -> STR W0, [X1, #0x100], #0x20 -- This stores the contents of register W0 into the memory location pointed to by register X1 plus 0x100 plus 0x20, overwriting any previous data stored at that location. In AArch32, there is no imm option for the STR instruction. However, you can achieve a similar effect by adding the immediate value to the offset before using it in the instruction. Here's an example: ADD R2, R1, #0x120 --> R2 = R1 + 0x120 STR R0, [R2] --> Store R0 at address R2 Here, the ADD instruction adds the immediate value 0x20 to the base register R1, storing the result in R2. The STR instruction then stores the contents of register R0 into the memory location pointed to by register R2. Note: that the immediate value is added to the offset before using it in the instruction, rather than being added as a separate operand like the imm option in AArch64. --->FOR Using LDR / STR on values just LDR/STR R0/X0, [DESTINATION ADDRESS] Note : Unity games use pointers for the string ----------------------------------------------> Converting Float and Double to Hex <--------------------------------- This is mainly IEEE Standard for Floating-Point Arithmetic. (you can skip this part by using online converter) > You need : • Advanced Lua scripting Knowladge. • Math Knowladge. • Binary 32 and 64 Knowladge. --------------Please read--------------1 point
-
Can you upgrade to 13.1.4? Execution failed. Error code: 1 Plz I need that golds...1 point
-
1 point
-
-- Define the menu options menu = gg.choice({ "1. Enter Value and Search", "2. Refine Search", "3. Edit Results", "4. Exit" }, nil, "Game Guardian Script") -- Function to search for the value in memory function searchValue() gg.clearResults() value = gg.prompt({"Enter the value to search:"}, {[1] = "0"}, {[1] = "number"}) if value == nil then return end dataType = gg.choice({ "1. Dword", "2. Float", "3. Double", "4. Word", "5. Byte" }, nil, "Select Data Type") if dataType == nil then return end local typeMap = { [1] = gg.TYPE_DWORD, [2] = gg.TYPE_FLOAT, [3] = gg.TYPE_DOUBLE, [4] = gg.TYPE_WORD, [5] = gg.TYPE_BYTE } gg.searchNumber(value[1], typeMap[dataType]) gg.toast("Search completed!") end -- Function to refine the search results function refineSearch() value = gg.prompt({"Enter the new value to refine search:"}, {[1] = "0"}, {[1] = "number"}) if value == nil then return end gg.refineNumber(value[1], gg.TYPE_DWORD) -- Default to DWORD for refinement gg.toast("Refinement completed!") end -- Function to edit the search results function editResults() value = gg.prompt({"Enter the new value to set:"}, {[1] = "0"}, {[1] = "number"}) if value == nil then return end local results = gg.getResults(100) -- Get up to 100 results for i, v in ipairs(results) do v.value = value[1] end gg.setValues(results) gg.toast("Values updated!") end -- Main loop while true do if menu == 1 then searchValue() elseif menu == 2 then refineSearch() elseif menu == 3 then editResults() elseif menu == 4 then gg.toast("Exiting script...") os.exit() end menu = gg.choice({ "1. Enter Value and Search", "2. Refine Search", "3. Edit Results", "4. Exit" }, nil, "Game Guardian Script") end1 point
-
Version 1.3
118 downloads
Play Store Link ++ HACKS++ + All Encrypted Value Can Changed .. Just type all the encrypted visible values you see on the screen into the money hack. The game may crash, don't let this stop you You can change the xorkey in the Options menu. When you enter the xorkey of a game you know in another game, the system will automatically decrypt the encryption and write it to the value you want in an encrypted form. The script is completely mine and is open source. VID_20250204_085050.mp41 point -
1 point
-
1 point
-
1 point
-
View File MONSTERS CLAWS 5 SCRIPT MENU ACTION GAME WHERE YOU FIGHT MONSTERS, COMPLETE OBJECTIVES AND SAVE YOUR LIFE. GAME LINK: PLAYSTORE SCRIPT MENU: - WALK SPEED - HITKILL - GOD MODE - NO RECOIL - NO RELOAD - NO FIRE RATE - INFINITE AMMO Submitter Collen Submitted 01/25/2025 Category LUA scripts1 point
-
There are any new creatures in the game files? and where can i be updated about those ?1 point
-
anyone knows how to hack season points? tried using UTF-8 method but i dont completely understand how to do it correctly. if anyone knows how to do it, kindly need your help, thank you very much!1 point
-
[ @Edi04 ] --- I'm not quite sure since I don't have the script myself, but there's part that pique my attention. So the breakdown: You're getting only one result on "t" variable -> clearing result -> saving "t" to lists -> saving the lists into "tb" variable -> clearing the lists -> and change the "t" value into 0 (The "t" here only contains 1 from getResults(1)) --- So the possible problem is: 1) You keep unnecessarily use addListItem() and getListItem() over and over, while you're already clearing the lists using clearList() (For example: line 59). Thus the "tb" lists only contain 1 from the result of "t" variable. 2) If you want to summon back all other codes, just use addListItem() again on where you're storing the lists as variable. 3) Is your wanted code exist on 't' variable? Because you're using the same name as variable. Naming them different will allow you to load the previous lists.1 point
-
1 point
-
1 point
-
Version 1
1,834 downloads
Hiya , This is my scripting guide for new people out there , you will be scripting like a G (hehe get it? GG) You might wanna read the comments next to the code to understand you can also use it too! idk if the comments affect its way to work >_> (CODED WITH REPL.IT TRANSFERRED INTO A ZIP THEN EXTRACTED INTO GUIDE,LUA) This is for people new so ya tell me what u think? you will learn functions , if then statements , ends, nils, declareing functions, if menu== 1s, inputs, alerts and toasts, data types, locals, and calling functions giving them tasks then ending good luck!1 point -
More Info: https://play.google.co…nbitstudios.twommobile Requirements: • ROOTED Device • Game Guardian Guide: The following guide is based on This War of Mine version 1.3.9. Item ID List and "calculator" http://www113.zippysha…m/v/q51byzIy/file.html Item id values seem to be in 2 groups. Where "parts" end and "Fuel" begins seems to be a break in item id values. Don't try to use item id from above parts to get item from fuel down and vice versa. The offset might not be correct. Try staying within those two groups, which I think would be fine. Do not edit item qty at any time above 2. Edit and freeze to 2, you risk game crashing, trust me. Item Hack Method 1 First method is when you search a pile of something. This works best if in the area you search has at least 3 or more of a single item. Start without taking anything from the stack and dword union search qty;qty:5 Then add one to inventory. Search new value. Keep doing this until you have only 1 result. If it becomes 1, edit and freeze/lock to 2 for this to work. 4bytes above the value is that item id for ONLY THIS INSTANCE. Every launch, item ID values change. What doesn't change is distance from item to item. Goto my excel file. Find the item you just froze in your game. Copy the id value (from my excel file) into the "known value" field. Now copy the id of the item you want. Paste into the "Wanted" item field. Now the offset is calculated. In game Guardian, goto edit the id number. And choose "add to existing value". Type in the offset excel gave you. Now start to add item to inventory. It will change to the hacked id and add that item. Item Hack Method 2 This method is my preferred and much easier method. End your day and goto prepare for scavenging. Add a bunch of 1 item to your backpack. Search how many you added. Add or remove some, search new qty. Keep doing this until left with one result. Freeze/lock value. 4bytes above is item id. Doing same this from method 1 with Excel file, can add unlimited of any item to you inventory. Build/Upgrade Cost Prices of upgrades/building are floating values. In order each item needed is 16 bytes away from the next. Think of it this way, with your search for every ; that you use, will be 16 bytes. Then add 1 to the total. So if upgrade cost is 1;15;7;5;5 I have 4 of ; 16*4=64 + 1 =65 So 1;15;7;5;5:65 Then you edit results to 0 (don't bother with negative, doesn't work). I'm assuming upgrade/build time is nearby, but I didn't attempt to find it. Video Tutorial: Item Hack Method 1 Item Hack Method 2 Build/Upgrade Cost Credits for Hacking Guide to NoFear (Me)1 point
-
An update to this one... I did take notice that every few minutes the game client (Bubble Witch) checks back in with either a local log file or the server log file...not sure which one, not interested enough in this one to poke around or reverse engineer the application to figure out which one it is...although an easy way to figure it out would probably be to put my phone in airplane mode and play few a little while and see what happens with it...but again, I'm really, REALLY not interested enough to go through all of that...but I digress (Shout out to Boogie2988 although I've used that line since I was yay high [insert hand height here])...the system seems to correct itself every few minutes. Fortunately for us gamers too frustrated with mobile app game mechanics being geared to a choice between either not finishing a game, muddling our way through the eventual slow gameplay of timed "life" regeneration or brick wall levels, or breaking down and giving in to the all so lacking and greedy moniker of the IAP system, we've been blessed with two astounding holes in the system and two awesome add-ins to the Cheat Client functionalities. What are they you ask? Well.... Bubble Witch Saga 2 creators made the verification interval so long that you can use the originally mentioned method to get 9,999 lives and keep them for a few rounds Bubble Witch Saga 2 creators made the verification check the number of lives you have then if it doesn't match up, instead of putting you back to 1, 2, or 3 lives, it instead moves you back to 5 lives! Yes! they just skip the entire timer headache. Now, typing this out makes me wonder if the system even runs a verification process or if it just sees 9,999 lives as impossible and resets it to 5 to keep from having a client crash....hmmmmmmm....well still not interested enough to really test that thought out. I'll let somebody else run tests on that if they want to invest a few minutes of their time to it. The Cheat Client (GG, DA, etc.) keeps the registry values ready and at your disposal....when the Game Client resets, just open the Cheat Client back up and change the value back to what you want again Some of the Cheat Clients come with a nifty "save variables" functionality which sets up a "save file" in relation to that particular Game Client. Just find the variables, change them to the value you want to use, hit the save button, and next time you open the game and need the lives....open the Cheat Client and hit "Load Values" and BAM you're off and running again. Creativity.....it's a great thing to have1 point