Jump to content
We are investigating issues where accounts became locked on login attempt #1. Lock feature disabled for now. ×

TekMonts

Ascended
  • Posts

    47
  • Joined

  • Last visited

  • Days Won

    5

TekMonts last won the day on January 9

TekMonts had the most liked content!

5 Followers

Additional Information

  • Android
    9.x (Pie)
  • Device
    Mi8
  • Service provider
    Other

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

TekMonts's Achievements

Contributor

Contributor (5/14)

  • Week One Done
  • One Month Later
  • One Year In
  • Reacting Well Rare
  • First Post Rare

Recent Badges

37

Reputation

  1. Use https://github.com/djkaty/Il2CppInspector instead
  2. l = gg.getRangesList('libil2cpp.so') --get the range address from lib if (l[1] ~= nil) then libaddres = string.format( "0X%8.8X", t[1]['start'] ) end --check null and set memory where GG start working at function haxx(offsethax,valuehax,type) _address = libaddres + offsethax local _value = {} _value[1] = {} _value[1].address = _address _value[1].flags = type _value[1].value = valuehax gg.setValues(_value) end function main() gg.alert("begin hack value 1000 type DWORD at 0xABCDEF02") haxx(0xABCDEF02, 1000, gg.TYPE_DWORD) -- call function, where 0xABCDEF02 is offset need to change, value 1000, type dword end
  3. View File Cyber Hunter body color I made a simple cheats for cyber hunter, this cheat will change the color of enemy to red. I just only test on Snapdragon chipset (845), not sure it will work for Mediatek or Kirin.... This cheat not work for special characters. Here is step for blinking the enemy that I'm lazy to add to script. You can try for yourself: Set memory region to VIDEO Find group 1.074.798.617;1;537.214.977;0;512;537.001.985;1.178.077.185;1;538.214.402;0;512;537.001.986;1.187.514.370;2;537.985.268;0;1.280;203.489.287;1.081.081.885;0;0;1.903.648;1.669.922.845;0;0;1.903.650;1.669.955.613::105 with type DWORD Refine 2, type dword Edit all to 0 Normally this only affect on VIDEO region and will not trigger the security check. But anyway, uses at your all risk! Submitter TekMonts Submitted 05/06/2021 Category LUA scripts  
  4. Work around with libil2cpp and GG using offset (#9tqvlkmb) Take a look, use your offset
  5. Version 1.0.0

    254 downloads

    I made a simple cheats for cyber hunter, this cheat will change the color of enemy to red. I just only test on Snapdragon chipset (845), not sure it will work for Mediatek or Kirin.... This cheat not work for special characters. Here is step for blinking the enemy that I'm lazy to add to script. You can try for yourself: Set memory region to VIDEO Find group 1.074.798.617;1;537.214.977;0;512;537.001.985;1.178.077.185;1;538.214.402;0;512;537.001.986;1.187.514.370;2;537.985.268;0;1.280;203.489.287;1.081.081.885;0;0;1.903.648;1.669.922.845;0;0;1.903.650;1.669.955.613::105 with type DWORD Refine 2, type dword Edit all to 0 Normally this only affect on VIDEO region and will not trigger the security check. But anyway, uses at your all risk!
  6. find the address by group, edit all to 99999 hex value: https://pastebin.com/4DSkN8Fa
  7. Some return value, for other you can search on internet also. https://pastebin.com/4DSkN8Fa Some functions you can work with codm (old version) https://pastebin.com/5JCxmPH8
  8. Nope, you can find the lib share on internet, good luck
  9. original('7F 45 4C 46 01 01 01 00') -- begin hex of original file, open the libil2cpp.so with HexView and find first 8 bytes of hex replaced('01 00 A0 E3 1E FF 2F E1') -- use arm to hex converter, convert "return true" to hex, see https://armconverter.com/?code=mov%20r0,%20%231%0Abx%20lr uses the arm code to hack directly, 01 00 A0 E3 1E FF 2F E1 = mov r0, #1 bx lr = return true
  10. Try to bypass by remove the debugger, find the url checking data and block it, find the function in the lib and modify...
  11. Too many guys ask about GG and libil2cpp.so to working with gameguardian. So I decided to make some guides to working around with it using offset. Game: Call of duty - Mobile VN Funtion to hack: Show enemy on radar This game was protected from dumper, so I uses Il2CppInspector to inspect the lib. Open up the Il2CppInspector.exe and drag the apk to the app GUI then wait a bit: I exported the Json file to find the function and address, and I want to find where the function to show enemy on rada, I found this: 0x046C37F4 -- here is address holded the function get_ShowEnemyOnRadar() So what should we do? We can mod directly in libil2cpp.so, using the hock, create the app to call... But here, I willshow you how to modify this function using GameGuardian First, you need the function tohandle the lib, share on Internet and I just copy paste here: local memFrom, memTo, lib, num, lim, results, src, ok = 0, -1, nil, 0, 32, {}, nil, false function name(n) if lib ~= n then lib = n local ranges = gg.getRangesList(lib) if #ranges == 0 then print("⚠ERROR: " .. lib .. " are not found!⚠") gg.toast("⚠ERROR: " .. lib .. " are not found!⚠") os.exit() else memFrom = ranges[1].start memTo = ranges[#ranges]["end"] end end end function hex2tbl(hex) local ret = {} hex:gsub( "%S%S", function(ch) ret[#ret + 1] = ch return "" end ) return ret end function original(orig) local tbl = hex2tbl(orig) local len = #tbl if len == 0 then return end local used = len if len > lim then used = lim end local s = "" for i = 1, used do if i ~= 1 then s = s .. ";" end local v = tbl[i] if v == "??" or v == "**" then v = "0~~0" end s = s .. v .. "r" end s = s .. "::" .. used gg.searchNumber(s, gg.TYPE_BYTE, false, gg.SIGN_EQUAL, memFrom, memTo) if len > used then for i = used + 1, len do local v = tbl[i] if v == "??" or v == "**" then v = 256 else v = ("0x" .. v) + 0 if v > 127 then v = v - 256 end end tbl[i] = v end end local found = gg.getResultCount() results = {} local count = 0 local checked = 0 while true do if checked >= found then break end local all = gg.getResults(8) local total = #all local start = checked if checked + used > total then break end for i, v in ipairs(all) do v.address = v.address + myoffset end gg.loadResults(all) while start < total do local good = true local offset = all[1 + start].address - 1 if used < len then local get = {} for i = lim + 1, len do get[i - lim] = {address = offset + i, flags = gg.TYPE_BYTE, value = 0} end get = gg.getValues(get) for i = lim + 1, len do local ch = tbl[i] if ch ~= 256 and get[i - lim].value ~= ch then good = false break end end end if good then count = count + 1 results[count] = offset checked = checked + used else local del = {} for i = 1, used do del[i] = all[i + start] end gg.removeResults(del) end start = start + used end end end function replaced(repl) num = num + 1 local tbl = hex2tbl(repl) if src ~= nil then local source = hex2tbl(src) for i, v in ipairs(tbl) do if v ~= "??" and v ~= "**" and v == source[i] then tbl[i] = "**" end end src = nil end local cnt = #tbl local set = {} local s = 0 for _, addr in ipairs(results) do for i, v in ipairs(tbl) do if v ~= "??" and v ~= "**" then s = s + 1 set[s] = {["address"] = addr + i, ["value"] = v .. "r", ["flags"] = gg.TYPE_BYTE} end end end if s ~= 0 then gg.setValues(set) end ok = true end Now you need to call the function: gg.setRanges ( gg .REGION_CODE_APP | gg .REGION_C_DATA) -- usally you only need this region name('libil2cpp.so') -- name the lib myoffset = 0x046C37F4 -- offset you found original('7F 45 4C 46 01 01 01 00') -- begin hex, open the libil2cpp.so with HexView and find first 8 bytes of hex replaced('01 00 A0 E3 1E FF 2F E1') -- use arm to hex converter, convert "return true" to hex, see https://armconverter.com/?code=mov%20r0,%20%231%0Abx%20lr gg.toast("Done!") Put it in your lua and done, you're now can hack the radar using GG and libil2cpp. Demo: Demo file: CODHack_Demo.lua
  12. Damage table store in Anonymous Region (RAM). Each times game load screen, address change, unless you hard code the mod in apk, otherwise nothing can help you just run script one times and it's always work.
  13. First you need to understand what it does. Try https://en.wikipedia.org/wiki/X86_assembly_language
  14. TekMonts

    Apk bug

    You're trying install apk with different sig, it's not related to GG. Try remove/uninstall and install again
  15. Nope, you can find on google, I'm busy for new project right now.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.