Jump to content

NoFear

Moderators
  • Posts

    2,979
  • Joined

  • Last visited

  • Days Won

    223

NoFear last won the day on April 17

NoFear had the most liked content!

Additional Information

  • Android
    10.x
  • Device
    Pixel 4 XL

Recent Profile Visitors

123,960 profile views

NoFear's Achievements

Grand Master

Grand Master (14/14)

  • Dedicated Rare
  • One Year In
  • One Month Later
  • Week One Done
  • Conversation Starter Rare

Recent Badges

2.2k

Reputation

8

Community Answers

  1. I think I'm all set. Unless you think this info can help allow to mod the game. Would have friend mod the ios version.
  2. Kinda figured. Curious if gems set back to 0 when done, if restart would still get banned...
  3. Which game (playstore link)? Can give better directions.
  4. Gdb, rwatch on value. If editing value with GG triggers a ban or local error, just rwatch value to see everything reading it. Sometimes you'll get many results, just have to go through and find the one that triggers ban. Ideally, it'd be a branch to one anti cheat function. Then you could xref that function, NOP all the branches to it, or RET the function.
  5. Offset was for gems. But I think eventually ban will occur unless the anti ban (for each item) needs to remain modified.
  6. Without checking dump or going into ida, just simple debug to find what's reading gems. Armv8 Offset: 11A6C34 Edit to B [PC,#0x80] This will skip the area that would trigger ban. Then this Offset: 113DD74 Mov w22 (large value). This is what writes value after it does a check. So you can force it to write something excessive after it checks value (I don't think you have limit since the check will never branch to ban, see attached image). You could apply this same concept to any value, just set read watch to see what is checking it, then bypass the ban. Could check dump or something to see what the offset is part of or maybe what it branches to.
  7. I don't have one for this
  8. The blue is an address location. Need to calculate the offset from start of lib to that address. That will be your offset that you would go-to in ida if using ida. But the lib hit on your screen shot is system and not game lib... Can't debug on emulator if that's what you're attempting...
  9. I used GG... One could use ida or ghidra. But GG worked fine for finding it this time.
  10. pkg install gdb
  11. Armv8 C80E42B8r;081540FDr::3809 Edit 28008052r;E803679Er And if you want to set so you can claim all without playing (set number of keys collected). Offset (Version 6.9.5) 3FBCA54 Edit 00FA8052r
  12. OpCodes changed slightly. But still works.
  13. NoFear

    Device ban

    This doesn't mean it was done correctly. I know in Android Faker, can do all those toggles and randomize. But if correct apps/services aren't selected, it won't matter what you change.
  14. NoFear

    Device ban

    Then I can't help you. I had recommendation on tools that would work. It's your choice. Good luck
  15. NoFear

    Device ban

    When module activated, what did you select for apps to apply it to?
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.