Jump to content
We are investigating issues where accounts became locked on login attempt #1. Lock feature disabled for now. ×

Leaderboard

Popular Content

Showing content with the highest reputation on 07/22/2021 in all areas

  1. I found a way to hack TT2 in the latest version and you dont get a teapot if you dont rush. This hacks your coins and with coins you can almost buy anything. This works even after you prestige. Just search 1.875 as a float value. Select all the results and change them to 9. Attack 2 or 3 titans, you will get insane amount of coins. Open GG and change value back to 1.875 and play normally. Now you have unlimited coins.
    1 point
  2. like this..? local ros = gg.getListItems() for i, v in ipairs(ros) do if v.name ~= "name" then ros[i] = nil end end gg.loadResults(ros) gg.toast("Done")
    1 point
  3. There are two script-based options to consider: - to use gg.dumpMemory function on each memory range of interest to produce a separate file for each range; - to implement custom dumping logic for producing result in desired form (for example, dumping all memory ranges of interest to one file). Implementing the first option is pretty straightforward, here is an example of how it can be done: local outputPath = "/sdcard/Download" local ranges = gg.getRangesList() for i, v in ipairs(ranges) do if v.state == "A" then gg.dumpMemory(v["start"], v["end"], outputPath) end end Implementing the second option is less straightforward, one firstly needs to determine how custom dump result should look like. Also any implementation of the second option is likely to be noticeably slower than implementation of the first option where dumping is performed with GG's built-in function.
    1 point
  4. 1) For GG Lua, you can learn from their documentation and see their Template Script : https://gameguardian.net/help/classgg.html For further info, you can come to visit guides and tutorial forum : Guides Forum | Tutorial Forum 2) To find Game Offset such as Player Info or etc, you can use Unity ill2ccp dumper from github. It will help you to make Player Hacks or else : Ill2CppDumper
    1 point
  5. I have an updated Room Id file the old ones are the same 0 - 162 is the old stuff, 163 - 217 are Altars. OH BOI, THAT'S A LOT OF ALTARS!!! 218 - 220 are abyssal shard, crystal and portal Dungeon Maker Updated Room Ids.txt
    1 point
  6. for properly run gg with f1 vm 1 install f1 2 install gg under f1 ( install apk apk for nox do not clone ) 3 set good seting in f1 eanable xpsosed accord root permition
    1 point
  7. It seems that ~A8 MOV W0, #0 and ~A8 MOV W0, #0x0 are not recognized as valid opcode even though they are valid, just wanted to let you know.
    1 point
  8. Too many guys ask about GG and libil2cpp.so to working with gameguardian. So I decided to make some guides to working around with it using offset. Game: Call of duty - Mobile VN Funtion to hack: Show enemy on radar This game was protected from dumper, so I uses Il2CppInspector to inspect the lib. Open up the Il2CppInspector.exe and drag the apk to the app GUI then wait a bit: I exported the Json file to find the function and address, and I want to find where the function to show enemy on rada, I found this: 0x046C37F4 -- here is address holded the function get_ShowEnemyOnRadar() So what should we do? We can mod directly in libil2cpp.so, using the hock, create the app to call... But here, I willshow you how to modify this function using GameGuardian First, you need the function tohandle the lib, share on Internet and I just copy paste here: local memFrom, memTo, lib, num, lim, results, src, ok = 0, -1, nil, 0, 32, {}, nil, false function name(n) if lib ~= n then lib = n local ranges = gg.getRangesList(lib) if #ranges == 0 then print("⚠ERROR: " .. lib .. " are not found!⚠") gg.toast("⚠ERROR: " .. lib .. " are not found!⚠") os.exit() else memFrom = ranges[1].start memTo = ranges[#ranges]["end"] end end end function hex2tbl(hex) local ret = {} hex:gsub( "%S%S", function(ch) ret[#ret + 1] = ch return "" end ) return ret end function original(orig) local tbl = hex2tbl(orig) local len = #tbl if len == 0 then return end local used = len if len > lim then used = lim end local s = "" for i = 1, used do if i ~= 1 then s = s .. ";" end local v = tbl[i] if v == "??" or v == "**" then v = "0~~0" end s = s .. v .. "r" end s = s .. "::" .. used gg.searchNumber(s, gg.TYPE_BYTE, false, gg.SIGN_EQUAL, memFrom, memTo) if len > used then for i = used + 1, len do local v = tbl[i] if v == "??" or v == "**" then v = 256 else v = ("0x" .. v) + 0 if v > 127 then v = v - 256 end end tbl[i] = v end end local found = gg.getResultCount() results = {} local count = 0 local checked = 0 while true do if checked >= found then break end local all = gg.getResults(8) local total = #all local start = checked if checked + used > total then break end for i, v in ipairs(all) do v.address = v.address + myoffset end gg.loadResults(all) while start < total do local good = true local offset = all[1 + start].address - 1 if used < len then local get = {} for i = lim + 1, len do get[i - lim] = {address = offset + i, flags = gg.TYPE_BYTE, value = 0} end get = gg.getValues(get) for i = lim + 1, len do local ch = tbl[i] if ch ~= 256 and get[i - lim].value ~= ch then good = false break end end end if good then count = count + 1 results[count] = offset checked = checked + used else local del = {} for i = 1, used do del[i] = all[i + start] end gg.removeResults(del) end start = start + used end end end function replaced(repl) num = num + 1 local tbl = hex2tbl(repl) if src ~= nil then local source = hex2tbl(src) for i, v in ipairs(tbl) do if v ~= "??" and v ~= "**" and v == source[i] then tbl[i] = "**" end end src = nil end local cnt = #tbl local set = {} local s = 0 for _, addr in ipairs(results) do for i, v in ipairs(tbl) do if v ~= "??" and v ~= "**" then s = s + 1 set[s] = {["address"] = addr + i, ["value"] = v .. "r", ["flags"] = gg.TYPE_BYTE} end end end if s ~= 0 then gg.setValues(set) end ok = true end Now you need to call the function: gg.setRanges ( gg .REGION_CODE_APP | gg .REGION_C_DATA) -- usally you only need this region name('libil2cpp.so') -- name the lib myoffset = 0x046C37F4 -- offset you found original('7F 45 4C 46 01 01 01 00') -- begin hex, open the libil2cpp.so with HexView and find first 8 bytes of hex replaced('01 00 A0 E3 1E FF 2F E1') -- use arm to hex converter, convert "return true" to hex, see https://armconverter.com/?code=mov%20r0,%20%231%0Abx%20lr gg.toast("Done!") Put it in your lua and done, you're now can hack the radar using GG and libil2cpp. Demo: Demo file: CODHack_Demo.lua
    1 point
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.