Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 04/20/2016 in all areas

  1. Topics that haven't had a reply in the last 10 months are now being moved to a designated forum section- https://gameguardian.net/forum/forum/91-archived-topics/. They can still be posted in. Hopefully, this will help users find the latest content faster/better. All topics are still searchable, so if you are looking for something specific, the relevant topics will still appear in search. Note: The system is setup in such a way, that the topics will be archived as they're viewed. This is to not overload our system with the moving of old topics.
    1 point
  2. May be gamekiller target to old sdk and work with compability mode. But we can not use this because some firmwares need this permissions even for old sdk targeted apk. Try test version and tell result. GameGuardian.git_signed.apk
    1 point
  3. Also download root cloak. Not from playstore, but from xposed framework. Then adding keywords and commands game Guardian can and does work with Dark Swords.
    1 point
  4. Detection can be not only on package name. In this case your actions do not help you. Wait for next release. In next release app have different package name. And do not clone your question to all possible places in forum.
    1 point
  5. I haven't installed game yet, but this is what I recommend. 1.keep searching for gold value and once found, browse nearby values for anything that looks like a multiplier or %. I would write down the values and offset from gold (how many bytes away). Finish level and see if any of those you find match. Or 2. Unknown dword search shortly before game finishes. Right when game finishes (auto pause) unknown dword increase. Then known value and search gold qty. Then browse nearby for % or multiplier and write down offsets/values. And see if anything matches. The reason for method 2, server sided games on completion of level might take the ingame gold and export to another memory location (which is location being sent to server) which could have % nearby.
    1 point
  6. Someone I think would have to look into the apk and find the values. Are they floating values where 1 is 100% or 100? That's what is going to be extremely difficult .Not knowing what the values are. I'd love to work with you on this. I think it can be done.
    1 point
  7. Reading the description for the coin boost sounds like you could potentially memory hack it. You need to find the coin boost percentage. Once you find that I believe you could achieve similar results.
    1 point
  8. Name of Game: respawnables Game Version: 3.2 Name of Cheat: run fast Search type: fast run Steps: Open both {game_name}, and GameGuardian.why fast run not support x86? please I want more this..Screenshot of cheat:
    1 point
  9. If you really wants find cause of this reboots - need lot of work. Firstly read theme: https://gameguardian.net/forum/topic/7799-tablet-freezing/ Secondly read post: https://gameguardian.net/forum/topic/7799-tablet-freezing/?do=findComment&comment=43720 If you ready for this actions I can build test version and upload here. You need be install it collect logs three times and so on as described in post.
    1 point
  10. Need logcat. Write it from adb and send to me. Need other info: https://gameguardian.net/forum/topic/7398-gathering-information-about-gg-errors/
    1 point
  11. In marshmallow need explict allow floating window or GG can not draw own window over other apps. I do not know where this option in your firmware. Can be it cutted by firmware makers. Try google for resolve this issue. Is not GG related but firmware related.
    1 point
  12. 1. I have already explained everything. This is complicated stuff. 2. This can not be done at the terminal or something else. This injection of shell code into the address space of other process. Without special knowledge, you will not be able to do so. 3. You often mention DLL and decrypt them that I have vague doubts that you have something to confuse. The android is no DLL. They are in Windows. The android has .so - shared object (library). This is not the DLL.
    1 point
  13. You can debug it, but for disable defend you need inject shell code to this pid and run ptrace_detach in it. After that need stop this pid (kill -s STOP). If you do not stop it it kill main process after any pause on it. After that you can hack main process in usual way.
    1 point
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.