-
Posts
2,989 -
Joined
-
Last visited
-
Days Won
235
Content Type
Profiles
Forums
Downloads
Gallery
Everything posted by NoFear
-
Disable auto update in playstore.
-
For the points, could try to rely on utf8/pointer searching... Current season :SSPPet12MainecoonPoints.amount Previous season :SSPDecor11DinoPoints.amount Believe you need at least 1 point before doing utf and pointer search. So for future events, looking for the "SSP....Points amount"should help if don't want to deal with offsets. In the attached video, my device has tagged pointers, hence the reason for 'B40000' placed in front of value for pointer search. mobizen_20240915_094600.mp4
-
-
-
Not encrypted... Developer is pretty aggressive to ban though.
-
Armv8 Search C80E42B8r;081540FDr::4505 Edit 28008052r;E803679Er
-
As soon as possible launching game.... Might not be able to edit it fast enough. Try editing the lib instead.
-
Edit values as soon as possible on emulator. Once the arm opcode is translated by emulator, it's too late.
-
Don't necessarily need to write raw assembly code. It could be possible to change branch from screenTap/touch or action of such, and branch it to the button want clicked instead. So just tapping screen, will give the action of clicking button, without it even being visible.
-
I think I'm all set. Unless you think this info can help allow to mod the game. Would have friend mod the ios version.
-
Kinda figured. Curious if gems set back to 0 when done, if restart would still get banned...
-
Which game (playstore link)? Can give better directions.
-
Gdb, rwatch on value. If editing value with GG triggers a ban or local error, just rwatch value to see everything reading it. Sometimes you'll get many results, just have to go through and find the one that triggers ban. Ideally, it'd be a branch to one anti cheat function. Then you could xref that function, NOP all the branches to it, or RET the function.
-
Offset was for gems. But I think eventually ban will occur unless the anti ban (for each item) needs to remain modified.
-
Without checking dump or going into ida, just simple debug to find what's reading gems. Armv8 Offset: 11A6C34 Edit to B [PC,#0x80] This will skip the area that would trigger ban. Then this Offset: 113DD74 Mov w22 (large value). This is what writes value after it does a check. So you can force it to write something excessive after it checks value (I don't think you have limit since the check will never branch to ban, see attached image). You could apply this same concept to any value, just set read watch to see what is checking it, then bypass the ban. Could check dump or something to see what the offset is part of or maybe what it branches to.
-
The blue is an address location. Need to calculate the offset from start of lib to that address. That will be your offset that you would go-to in ida if using ida. But the lib hit on your screen shot is system and not game lib... Can't debug on emulator if that's what you're attempting...
-
I used GG... One could use ida or ghidra. But GG worked fine for finding it this time.
-
Armv8 C80E42B8r;081540FDr::3809 Edit 28008052r;E803679Er And if you want to set so you can claim all without playing (set number of keys collected). Offset (Version 6.9.5) 3FBCA54 Edit 00FA8052r
-
-
This doesn't mean it was done correctly. I know in Android Faker, can do all those toggles and randomize. But if correct apps/services aren't selected, it won't matter what you change.
-
Then I can't help you. I had recommendation on tools that would work. It's your choice. Good luck
-
When module activated, what did you select for apps to apply it to?