Jump to content

XEKEX

Contributor
  • Posts

    255
  • Joined

  • Last visited

  • Days Won

    14

Everything posted by XEKEX

  1. XEKEX

    VIP

    does GG forum support paid scripts or services ?
  2. @DARK_DEMON_SCRIPTER The syntax of NOP can be used on in both MASM and ARMv7a ARM7.pdf Ref Page 511
  3. if patching still make the weapon stop shooting try negative value ( example -100% this might work) and make sure that method is related to the player class only cause you dont want rapid fire fo all entity I guess
  4. I guess badcase tool patch it as an int thats why you get error consider checking the edits or do it manually also respect every data type , edits with wrong code may cause game crush or system crush in some cases
  5. edit it as float or double depending on the data type of the percentage if it has a method or if it's a const u simply edit the value without arm patching or if it's a void method pointer search that class and find the percentage value in that class ( calculate offset manually if it doesn't show on the dump file ) -> don't need arm patching either
  6. no need because we end the function with bx lr : editing push instruction with movw r0, #999 followed by bx lr in the next instruction is like we create a new function code : int new() { return 999; } the remain instrunction are useless the proccessor won't read them
  7. edit the address 9936C000 ( push instruction ) to MOVW R0, #999 edit the address below it (ADD R11 SP #16 ) to BX LR
  8. XEKEX

    anti-tamper

    PM me the modified apk or follow this tuto on youtube.
  9. XEKEX

    anti-tamper

    The Android system requires that all installed applications be digitally signed with a certificate whose private key is held by the application's developer. The Android system uses the certificate as a means of identifying the author of an application and establishing trust relationships between applications.
  10. XEKEX

    anti-tamper

    I guess you need to re-sign the apk
  11. XEKEX

    anti-tamper

    did you sign the apk ?
  12. XEKEX

    anti-tamper

    specify your case so i can make a tuto
  13. XEKEX

    anti-tamper

    Requests anti-tamper (ssl) : you can use frida to bypass ssl pinning and patch the apk this will make you see the requests contents and tamper them ( server side hacking ) . inner code anti-tamper ( anti-cheat ) : for il2cpp games you can search the dump file for the class which responsible for data compairing etc and disable it ( or arm patching it ) this will bypass the game anticheat, for non unity games : you can use ida to dissamble the lib from there you can do the same steps with il2cpp ( when it comes to arm patching using frida or similar debugger is recomanded ). another aproach is to use jadx & frida to hook the java (JM)
  14. the ? region is a memory out of boundry means for each app to be executed the proccessor allocate a memory for the app , these addresses and values are for another application editing them won't affect the game but it does for the other application what cause this : it might be a GLIBC Heap bug or a heap overflow
  15. XEKEX

    anti-tamper

    you mean requests tamper or inner code tamper ?
  16. XEKEX

    libil2cpp.so in region Xs

    what @CmP said is the answer
  17. XEKEX

    libil2cpp.so in region Xs

    the il2cpp might be misconfigured by the dev and puted a linker for il2cpp in system region
  18. XEKEX

    Array start at 0

    this is why it's not a good practice because ipairs , pairs and every built-in functions in lua that deals with tables start the iteration by default at index 1 --> here is an example
  19. void functions doenst have return , also it act like : for key , value in pairs() in lua
  20. XEKEX

    Array start at 0

    youre right forget that metatable doesn't work with numbers index
  21. XEKEX

    Array start at 0

    in lua the array always start at index 1 , however you can force it to start with 0 like : table[0] = somthing or table = {} for i = 0 , 10 do table[i] = somthing end or using metamethods note : forcing it to start with index 0 isn't a good practice.
  22. after you destroy the script the user can redownload it and executed again ...
  23. XEKEX

    ARM LDR

    Note : the offset of the address 0xB179DE28 and 0x1AFFDACA4 should be a const offset if you want to implement it in a script otherwise if the offset between the lib and the address 0x1AFFDACA4 is a const offset use lib_base_address + offset to get the address then split it into 2 half MOVW r0, 0xACA4 MOVT r0, 0xAFFD LDR r0, [r0]
  24. XEKEX

    ARM LDR

    try #56872 -- idk why it give you error it should read it
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.