-
Posts
255 -
Joined
-
Last visited
-
Days Won
14
Content Type
Profiles
Forums
Downloads
Gallery
Everything posted by XEKEX
-
does GG forum support paid scripts or services ?
-
@DARK_DEMON_SCRIPTER The syntax of NOP can be used on in both MASM and ARMv7a ARM7.pdf Ref Page 511
-
you can use vpn I guess
- 12 replies
-
- Apkcombo
- Apkcombo cant reach
- (and 9 more)
-
if patching still make the weapon stop shooting try negative value ( example -100% this might work) and make sure that method is related to the player class only cause you dont want rapid fire fo all entity I guess
-
I guess badcase tool patch it as an int thats why you get error consider checking the edits or do it manually also respect every data type , edits with wrong code may cause game crush or system crush in some cases
-
edit it as float or double depending on the data type of the percentage if it has a method or if it's a const u simply edit the value without arm patching or if it's a void method pointer search that class and find the percentage value in that class ( calculate offset manually if it doesn't show on the dump file ) -> don't need arm patching either
-
no need because we end the function with bx lr : editing push instruction with movw r0, #999 followed by bx lr in the next instruction is like we create a new function code : int new() { return 999; } the remain instrunction are useless the proccessor won't read them
-
edit the address 9936C000 ( push instruction ) to MOVW R0, #999 edit the address below it (ADD R11 SP #16 ) to BX LR
-
PM me the modified apk or follow this tuto on youtube.
-
The Android system requires that all installed applications be digitally signed with a certificate whose private key is held by the application's developer. The Android system uses the certificate as a means of identifying the author of an application and establishing trust relationships between applications.
-
I guess you need to re-sign the apk
-
specify your case so i can make a tuto
-
Requests anti-tamper (ssl) : you can use frida to bypass ssl pinning and patch the apk this will make you see the requests contents and tamper them ( server side hacking ) . inner code anti-tamper ( anti-cheat ) : for il2cpp games you can search the dump file for the class which responsible for data compairing etc and disable it ( or arm patching it ) this will bypass the game anticheat, for non unity games : you can use ida to dissamble the lib from there you can do the same steps with il2cpp ( when it comes to arm patching using frida or similar debugger is recomanded ). another aproach is to use jadx & frida to hook the java (JM)
-
the ? region is a memory out of boundry means for each app to be executed the proccessor allocate a memory for the app , these addresses and values are for another application editing them won't affect the game but it does for the other application what cause this : it might be a GLIBC Heap bug or a heap overflow
-
you mean requests tamper or inner code tamper ?
-
what @CmP said is the answer
-
the il2cpp might be misconfigured by the dev and puted a linker for il2cpp in system region
-
this is why it's not a good practice because ipairs , pairs and every built-in functions in lua that deals with tables start the iteration by default at index 1 --> here is an example
-
void functions doenst have return , also it act like : for key , value in pairs() in lua
-
youre right forget that metatable doesn't work with numbers index
-
in lua the array always start at index 1 , however you can force it to start with 0 like : table[0] = somthing or table = {} for i = 0 , 10 do table[i] = somthing end or using metamethods note : forcing it to start with index 0 isn't a good practice.
-
after you destroy the script the user can redownload it and executed again ...
-
Note : the offset of the address 0xB179DE28 and 0x1AFFDACA4 should be a const offset if you want to implement it in a script otherwise if the offset between the lib and the address 0x1AFFDACA4 is a const offset use lib_base_address + offset to get the address then split it into 2 half MOVW r0, 0xACA4 MOVT r0, 0xAFFD LDR r0, [r0]
-
try #56872 -- idk why it give you error it should read it