Jump to content

Wembbu

Ascended
  • Posts

    49
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Wembbu

  1. If it was 2017 I'd say virtualXposed but right now I would assume it would be F1VM or VMOS pro
  2. Wembbu

    Finding offsets libs

    Use gdb/lldb to watch what I'm assuming would read the value, find the instruction you need to edit and calculate offset to it
  3. Wembbu

    Finding offsets libs

    Debug it and find the needed offset
  4. No. If you want it to search in the reverse order you'd need to type in 0D;2D::5 because it searches in THE ORDER you type it in Also that 1 doesn't make sense as that group range is only used for byte searches
  5. I'm not sure what these are but if you REALLY need a few of them you can just copy that hex after the hashtag on the left and goto it as the address. Pretty inefficient but it would work fine for small scale
  6. What you'd need is: 2D;0D::5 2D;0D is the group search of two values : means grouped within certain distance from each other and the second ":" means it's ordered i.g. they go one after another in the specified order 5 is the group size i.g. how far away they are from one another
  7. Just downloaded the update, works fine. Android 14 is surprisingly also supported. My emulator runs it fine too. Your problem seems to be just specific to you.
  8. Worked well, didn't know this was a thing. Thanks!
  9. I recently made a script that would take some data from RAM and make it readable. It uses gg.copyText() function to copy that data in the following chunk: printRes = tostring(getTune1[1].value + 1) .. "/" .. tostring(getTune2[1].value + 1) .. "/" .. tostring(getTune3[1].value + 1) .. "/" .. tostring(getTune4[1].value + 1) .. "\n" .. strPart1 .. "-" .. tostring(getPartTune1[1].value) .. " " .. strPart2 .. "-" .. tostring(getPartTune2[1].value) .. " " .. strPart3 .. "-" .. tostring(getPartTune3[1].value) .. "\nBy :flag_" .. strFlag .. ":" .. strName .. "\nusing " .. strVehicle .. "\nIn " .. strMap .. "\non 20" .. strDate .. "\nWith a time of: " .. tostring(getTime[1].value) .. " seconds\n\n" collectTune = gg.alert(printRes, "Continue", "Copy the tune") if collectTune == 1 then return 0 else gg.copyText(printRes) end now I did assume that it was an issue with me assigning it to a variable and then copying the variable but that didn't seem to be the problem as it still didn't copy the spaces. Attached is what I got displayed in the gg.alert() function which seems to be completely fine and have all the spaces needed. Following text is what I received to my clipboard after pressing "Copy the tune" button in the alert function: 20/20/10/20 winter_tyres-15start_boost-10nitro-4 By:flag_fi:RS3113 usingsuperbike Indark_roads_cup_03_04 on2024_2_february Withatimeof:9.55695629119873seconds I couldn't find any explanation anywhere.
  10. Wembbu

    Search by previous values

    Pretty sure what you want to do is find an address where a specific value is going to appear. I'm pretty sure you can't do exactly that, but what you can can do is use a debugger (lldb or gdb) to break the instruction and see when and where exactly it writes a value of a specific register.
  11. View File HCR2 Set Start Position script Script setting your start position in any map in Hill Climb Racing 2. Supporting only ARM-v8a Version of the game (1.59.1 patch 604) Submitter Wembbu Submitted 12/31/2023 Category LUA scripts  
  12. 468 downloads

    Script setting your start position in any map in Hill Climb Racing 2. Supporting only ARM-v8a Version of the game (1.59.1 patch 604)
  13. Root your phone, hack there Best advice I can give you.
  14. First of all, I wanna know what game this is that you are trying to hack Second of all, I highly doubt they would keep shop prices stored locally while having each player's balance stored online, on servers And lastly, if you want to see what writes/causes a change in a value, you can use lldb or gdb in Termux and type in a command for lldb - wa s e -s [size in bytes of the value] -w write -- 0x[hex value of the address] for gdb - watch 0x[hex value of the address] But I highly doubt that would help you since that doesn't work for many games as they use all sorts of protection against debugging including ptrace protection which completely disables debugging AND even if you get a hit somewhere it wouldn't lead you anywhere since the value was edited locally only AFTER it was edited on servers.
  15. View File Pointer search script (Enyby script remake) Uhh I was uhh uhhhh bored so I decided to try to find a way to pointer search tagged pointers because it was d*** inefficient in default GG but the best I could find was Enyby's early idea of pointer search as a script which I decided to "modify" to work with tagged pointers & 64 bit systems Submitter Wembbu Submitted 12/18/2023 Category Tools  
  16. 478 downloads

    Uhh I was uhh uhhhh bored so I decided to try to find a way to pointer search tagged pointers because it was d*** inefficient in default GG but the best I could find was Enyby's early idea of pointer search as a script which I decided to "modify" to work with tagged pointers & 64 bit systems
  17. Wembbu

    Pointer scan

    Lol Is this how you became an official GG administrator?
  18. Perhaps, try downgrading to at least A11 A11 was the last one to be somewhat stable with almost all games and GG for me The most stable right now I would say A10 For A12-13 you can use VMOS Pro. No other VM worked for me on either androids. So in conclusion, you should downgrade your phone to either A11 or A10 in order to have any stability. A12-14 aren't very stable and not many games are fully optimised for it, especially GG which hasn't been updated for awhile.
  19. I don't guarantee it working on emulators. Best scenario for it to work would be on a phone using armv8a version of the game Try checking if you are attached to the process and/or using the supported version of the game (1.58.1 patch 599) Make sure you use the armv8a version of the game
  20. https://gameguardian.net/help/classgg.html#a9251c9728e8ce91588581222a885457e
  21. Judging by the "nox" tag you added to your post I can guess you are trying to use a virtual space on an emulator. As far as I know the most popular android emulators don't support virtualization which results in inability to use any virtual space or emulator within another android emulator. I do know that VMware workstation supports virtualization, but it's very demanding in terms of hardware. Your best option is to root your nox and hack there directly.
  22. Wembbu

    A13 virtual space

    You clearly didn't try to use the search bar. You can look in my profile, in recent activities you'll find my topic covering same very issue. You'll find your answer there.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.