Jump to content

AngelWolf

Contributor
  • Posts

    171
  • Joined

  • Last visited

  • Days Won

    24

AngelWolf last won the day on January 30

AngelWolf had the most liked content!

Additional Information

  • Android
    10.x
  • Device
    Redmi 5 Plus Custom ROM (Resurrection OS Google Pixel 5)

Recent Profile Visitors

10,820 profile views

AngelWolf's Achievements

Community Regular

Community Regular (8/14)

  • Conversation Starter Rare
  • Well Followed Rare
  • Very Popular Rare
  • Reacting Well Rare
  • Collaborator Rare

Recent Badges

127

Reputation

  1. for tagged pointer, idk much about it, since i dont understand much about pointer in GG I dont think the offset is 100, its 3 address up before the length of the words
  2. why everyone keeps asking about "is it fixed/patches", i already told this countless time, it wont get fixed anytime soon, and if you using my premium script, it will crash your game since emulator uses x86_64 while the script made on aarch64, or you just replace everything, this can cause instablity because there's might be just a types you accidentally replaced and caused NULL REFERENCE and the LuaVM confused and just crash
  3. what there's to be hacked? There's nothing new in emba 2.0 you want floppy disk hack? just do function swap between spendCurrency and addCurrency,
  4. you can just modify the constant value, to 1, instead of Jump Time, 10 minute is 600 second, so 600 double ask whoever made GameGuardian, me personally never used unrandomizer
  5. just look older post bruh
  6. there's no faster way than finding it's groups, and then see the memory tab to find the addreses, if i remember correcty, you can group them with :200 or :241, not sure exact, because its different each time, and also every crafting recipe always be in same memory region lets says Torch, it have 3 recipe, 1 output, the game will have 3 address, offset like 10 or so before/after will have a pointer to the Item ID, and after these 3 addresses, there's 4th which is the Output and near it, there'll be a pointer to that item too, and then maybe 20 ish after you'll find the next recipe addresses and it goes on for a bit until it reach some end of memory allocation for that, and then it;ll continue on other memory region, and to replace the output item, you just replace the pointer value of the output item to address of the item you targeted, example (output Qword value): 13472364658358334 (target item address(makesure take the ID's address): 487188DF just replace it to "487188DFh" with QWORD type, and click other recipe and go back to update the UI, and change the ouput as much as you want, usually 100k is decent, i mostly do 1k ========= also you can find required amount using mass edit, like Torch, wood 1, rags 1, gas 500 search 500, then editAll, open more, and increment by 1 and apply, and update the UI, then find the value, save it to SaveList, click Remove all but revert all, and then work all the other requirement from memory tab from that gasoline value
  7. i havent check the source for later version, but aint no way they'll patch a function name, nor change the state, like the input will be always positive, and the function already had checks to calculate if the input is positive, and beside the Caps hack is simply function swap, soo to patch it, they need to literally rename the addCaps and spendCaps, what you encountering here, probably just how different architecture handle pointers, my phone uses aarch64 basically ARM architecture, and i already tested one with x86_64 or x86 (MeMu Emulator) and the script i made completely broke, so in short, the pointer mapping is different, so the offest might be different, in my phone every pointer always offested by 10, idk on other archs
  8. for further context of NumToCipher does is, take this item, amount and calculate and save to profile and return an array consist of 4 total sub-element Input: ["belaz", 1, 0] -- 1 is amount, 0 is deprecation NumToCipher(Input) -- will return [["Belaz", 1, 0], 0.06] so if the NumToCipher gets value like 999,999,999,999 it will trip the calculation and if the last value (0.06) is above 0, special key on your profile will be set to true which is this (PROFILE.****ingHacker) and when you try to connect to a server this profile will be sent and a flags in your account in their server called banned will be set to true, and resulting Rejection to allow you to interact to anyone and default error code is "no server connection" also for the drop item thing, in the pointer you'll find the value 0.06 and near that value maybe like 10 ish offset of either before/after, you'll find a value like 2 and this is a reference for the total length after . in 0.06 which 2, so if someone do quick modify the 0.06 to like idk gazillion, the 2 and 0.0xxxxxx will trip the anticheat and thats quick easy ban lol
  9. the game had interval checks on your inventory that analyze the amounts of items using NumToCipher function which make it these numbers like 0.06 0.08 0.023587 and so on, and you better of just use crafting hacks to spawn items than this slow method, and if you know how to function swap, item swap, just apply it to crafting output and boom the game will ignore this checks (picking up tons of stuff) since this is given using main.crafting.addItem instead of main.inventory.addItem which always checks, and for the "No Connection to the Server", it just meant that you're banned :), sooo your method doesnt bypass the "integrity" checks the game calls, i already told everyone, even some other that do deep dive, DO NOT DUPE using DROP/PICKUP method, since its banable even offline(btw), for now the safest (like 50 50) is using crafting hacks.
  10. AngelWolf

    Coromon

    This game made using Solar2D, you can get the source code from resource.car lol, it'll list everything, including functions and such, this game is similiar to Day R, i'll check this game out hehe, and btw the value should uses Double Mainly
  11. MMORPG? so its online? if so then a possible explanation, the values you try to modify are server sided, soo can't do anything about it. except if the game doesn't have that much of lee way you can modify it, but i doubt so
  12. i haven't ever touched unity game before, but it seems like you need to dump its related .so files and reverse engineer it to find static addresses and work from there, you can however brute force scan using Game guardian, but it usually doesn't work since some unity game have their values using pointers and not static so anyone whose proficient in unity games, don't flamed me
  13. that's unrandomizer, basically remove all RNG, also for others, the percentages of those items are in DOUBLE 2% = 0.02 15% = 0.15 100% = 1 35% = 0.35 1% = 0.01 these applied to others percentages, except some that's affected by perks, if you want to modify them you need to find the base value
  14. you doing it wrong probably
  15. i will check this thread rarely now, since im more interested in client modding, so all resources you need is avaliable around page 30-60, there's where most things/exploit/hack were being found, or alternatively, i had subscription script for the game, if you want obviously, its avaliable on discord server (see my about me) or my youtube channel (similiar name as GG account)
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.