Jump to content

AngelWolf

Contributor
  • Posts

    171
  • Joined

  • Last visited

  • Days Won

    24

Everything posted by AngelWolf

  1. for tagged pointer, idk much about it, since i dont understand much about pointer in GG I dont think the offset is 100, its 3 address up before the length of the words
  2. why everyone keeps asking about "is it fixed/patches", i already told this countless time, it wont get fixed anytime soon, and if you using my premium script, it will crash your game since emulator uses x86_64 while the script made on aarch64, or you just replace everything, this can cause instablity because there's might be just a types you accidentally replaced and caused NULL REFERENCE and the LuaVM confused and just crash
  3. what there's to be hacked? There's nothing new in emba 2.0 you want floppy disk hack? just do function swap between spendCurrency and addCurrency,
  4. you can just modify the constant value, to 1, instead of Jump Time, 10 minute is 600 second, so 600 double ask whoever made GameGuardian, me personally never used unrandomizer
  5. just look older post bruh
  6. there's no faster way than finding it's groups, and then see the memory tab to find the addreses, if i remember correcty, you can group them with :200 or :241, not sure exact, because its different each time, and also every crafting recipe always be in same memory region lets says Torch, it have 3 recipe, 1 output, the game will have 3 address, offset like 10 or so before/after will have a pointer to the Item ID, and after these 3 addresses, there's 4th which is the Output and near it, there'll be a pointer to that item too, and then maybe 20 ish after you'll find the next recipe addresses and it goes on for a bit until it reach some end of memory allocation for that, and then it;ll continue on other memory region, and to replace the output item, you just replace the pointer value of the output item to address of the item you targeted, example (output Qword value): 13472364658358334 (target item address(makesure take the ID's address): 487188DF just replace it to "487188DFh" with QWORD type, and click other recipe and go back to update the UI, and change the ouput as much as you want, usually 100k is decent, i mostly do 1k ========= also you can find required amount using mass edit, like Torch, wood 1, rags 1, gas 500 search 500, then editAll, open more, and increment by 1 and apply, and update the UI, then find the value, save it to SaveList, click Remove all but revert all, and then work all the other requirement from memory tab from that gasoline value
  7. i havent check the source for later version, but aint no way they'll patch a function name, nor change the state, like the input will be always positive, and the function already had checks to calculate if the input is positive, and beside the Caps hack is simply function swap, soo to patch it, they need to literally rename the addCaps and spendCaps, what you encountering here, probably just how different architecture handle pointers, my phone uses aarch64 basically ARM architecture, and i already tested one with x86_64 or x86 (MeMu Emulator) and the script i made completely broke, so in short, the pointer mapping is different, so the offest might be different, in my phone every pointer always offested by 10, idk on other archs
  8. for further context of NumToCipher does is, take this item, amount and calculate and save to profile and return an array consist of 4 total sub-element Input: ["belaz", 1, 0] -- 1 is amount, 0 is deprecation NumToCipher(Input) -- will return [["Belaz", 1, 0], 0.06] so if the NumToCipher gets value like 999,999,999,999 it will trip the calculation and if the last value (0.06) is above 0, special key on your profile will be set to true which is this (PROFILE.****ingHacker) and when you try to connect to a server this profile will be sent and a flags in your account in their server called banned will be set to true, and resulting Rejection to allow you to interact to anyone and default error code is "no server connection" also for the drop item thing, in the pointer you'll find the value 0.06 and near that value maybe like 10 ish offset of either before/after, you'll find a value like 2 and this is a reference for the total length after . in 0.06 which 2, so if someone do quick modify the 0.06 to like idk gazillion, the 2 and 0.0xxxxxx will trip the anticheat and thats quick easy ban lol
  9. the game had interval checks on your inventory that analyze the amounts of items using NumToCipher function which make it these numbers like 0.06 0.08 0.023587 and so on, and you better of just use crafting hacks to spawn items than this slow method, and if you know how to function swap, item swap, just apply it to crafting output and boom the game will ignore this checks (picking up tons of stuff) since this is given using main.crafting.addItem instead of main.inventory.addItem which always checks, and for the "No Connection to the Server", it just meant that you're banned :), sooo your method doesnt bypass the "integrity" checks the game calls, i already told everyone, even some other that do deep dive, DO NOT DUPE using DROP/PICKUP method, since its banable even offline(btw), for now the safest (like 50 50) is using crafting hacks.
  10. AngelWolf

    Coromon

    This game made using Solar2D, you can get the source code from resource.car lol, it'll list everything, including functions and such, this game is similiar to Day R, i'll check this game out hehe, and btw the value should uses Double Mainly
  11. MMORPG? so its online? if so then a possible explanation, the values you try to modify are server sided, soo can't do anything about it. except if the game doesn't have that much of lee way you can modify it, but i doubt so
  12. i haven't ever touched unity game before, but it seems like you need to dump its related .so files and reverse engineer it to find static addresses and work from there, you can however brute force scan using Game guardian, but it usually doesn't work since some unity game have their values using pointers and not static so anyone whose proficient in unity games, don't flamed me
  13. that's unrandomizer, basically remove all RNG, also for others, the percentages of those items are in DOUBLE 2% = 0.02 15% = 0.15 100% = 1 35% = 0.35 1% = 0.01 these applied to others percentages, except some that's affected by perks, if you want to modify them you need to find the base value
  14. you doing it wrong probably
  15. i will check this thread rarely now, since im more interested in client modding, so all resources you need is avaliable around page 30-60, there's where most things/exploit/hack were being found, or alternatively, i had subscription script for the game, if you want obviously, its avaliable on discord server (see my about me) or my youtube channel (similiar name as GG account)
  16. what game there's to hack, i've been bored
  17. ok, i was bored once again, and this time i find a way to modify "Will break in: X uses" and modify it so it shown Inf uses and while doing so, i also managed to literally make every item that had durability, unbreakable and i also found a crude way to modify craft time or any action that requires time, will be instant so hehe, i hope i found more stuff to modify, and i probably will add these to my script, after i finished the code to find it effectively
  18. New Thing I found (Requires Function Call Comparison) Essential Function for comparing on step 4 spendPart Search: -617 658 965 (Dword) Offset to ID: -C save the id as in its address Hack I found when messing around No Fuel Usage for most part 1. Finding static value for Gasoline Search: 218 589 (Dword) Offset to ID: -C 2. Pointer Search ID 3. Shifting save all search then shift it with offset of 40 and type value of QWORD use the shifted values as search results 4. Filtering remove shifted value from saved list Back to search tab, filter all with spendPart address after that save the filtered result 5. Shifting shift the filtered values with offset of -30 and value type of DOUBLE use it as search results editAll to 0 6. Finding Static Value for Diesel repeat step 1, with Search of 1 647 280 393 (Dword), and offset to ID is -C repeat step 2, step 3, step 4, and step 5 and if done correctly, if not all, most of vehicle in game will have 0L/100km usage. note: i didnt check all vehicle, but my assumption is all of them changed, if im not mistaken the value goes from 30 - 600 (3L-60L)
  19. just search 30000, its the default character carry weight, and then editall with increment of 1000, and if you had mule perk it'll be a problem due it gives iirc 30% buff, so remove mule perk, and then when you find the correct address, just revert others and modify the 30k one
  20. you can find their ID based on the game's assets, go to the apk and then go into assets/image and you'll find every current item there and for your thing, it's hw_ship, or alternatively, we have a discord server where we have a dedicated bot to list every item we find in the game and it support search for such thing with either Item ID or Item Ingame Name or both, and type of search such as, starts with, includes, ends with
  21. DID YOU KNOW JIFFY IS AN A MEASUREMENT OF TIME? 














    IT IS THICC

  22. Save Data Injection solve the issue with levels and currencies and caps easily, but in term leveling it using GG, we need to do function swap and before even function swap, we need to see what function responsible for leveling the thing, and since it handle completely different from normal EXP, it must've been something like main.level.addExp(main.level, "halloweenLevel", 1, "+")) and while it looks readable, it's not in game memory, you gets like function call of buffer main level addExp buffer main level halloweenLevel value pointer for Plus buffer buffer and all with offest probably around 10 in x64 system and maybe idk 14 in x32
  23. nah, matter off fact, if they try to patch the function swap, it'll resulting the needs of 37 files to be modified and ****ed up game mechanics and beside, even if they do, i will deep dive the source code again and find it again lol, that's why i said function swap arent patchable for forseen future, i told them i will dissect the game if i need to and they brush it off lol i believe it was 3 address above the Length value, basically 0D; 0D; 0D; or 92479543123D; -3 (Item ID), if pointer searched with offset 0 will resulting 50+ matchs, and if it return 0 then its not the pointer or maybe it was architecture differences, NoFear did mention to add additional Offest to this to get the pointer, see my old post with the before the raw video tutorial, No Fear should say need additional pointer for it 5D: - 2 148D: - 1 13D; - length 0D; - divider 294753489754323D: - 4 byte of first 4 letters This is known issue btw, where the architeture of different android changes how the game behave internally
  24. the :20 was optional btw, it correspond on groupings, mine works with 20 some with 41 some with 241 some with 200 and etc etc, so you can remove that from the group search, and the first nD;0D; is required since we want to find specific groups that defines the function, if we only search the spendCurrency by itself, we'll find tons of matches since it also gonna find the function calls, redefining, calls in other function and so on.
  25. meh Very Kewl Hax, Not a ClickBait
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.