Indlæg

Viser indlæg fra november, 2017

Video - Hacking Unity3D using Cheat engine and mod using Hex editor

Billede
This video shows you complicated way to mod Unity games and how to test modified hex using Cheat engine and mod it using hex editor after testing




GetSignature tools

Billede
Get Signature tools are useful to find signature checks of APK file

GetApkSignInfo.jar Download:https://github.com/Fulmics/GetApkSignInfo/releases Usage: java -jar GetApkSignInfo.jar <apk|jar> Screenshot:
GetAndroidSig.jar (old) Download: http://usersdownload.com/k1cvnc52sqhn.html Usage: java -jar GetAndroidSig.jar <apk/jar> Screenshot:

This is how iOS apps/games detect jailbreak and tampering

Billede
Any apps/games can have ability to detect something even in sandbox mode.

Well done Apple lol

Last Day On Earth - Replace/swap savegame using Fiddler2

After update 1.6.8, my savedata got corrupted caused the game got stuck in loading screen. I reinstalled the game, stull stuck. I have no choice but I had to erase my savegame using Fiddler2 because there is no way to erase my savegame that was logged in with my Google account and contacing support will take long time. I found out that you can swap savegame using restore. Check out the video.
Note: I only hack my own savegame with the generated savegames. I don't hack others and I don't have access to see ID list.
Anyone is interested?



[Fake bug] How to remove fake crash in .dll file (Unity games)

Billede
Application.Quit() is the common code to troll modders, which make them stop modding their game. There are still other ways to create fake crashes outside Unity code.
In dnSpy or Reflector, Search "Quit", and Analyze Quit of unityEngine.Application

Find the suspecious method that calls Application.Quit() method


Simply remove Application.Quit();

Credit: iAndroHacker

How to protect your binary/SO file using CPAntiDumper

Billede
Note: This will not prevent IDA Pro from disassembling

CPAntiDumper created by Caoyin is a tool that obfuscate binary files and .dylibs and prevent others from dumping offsets. It support ARMv7 and ARM64 iOS Binary and Android ARM binaries. ARM THUMB and x86 are currently not supported yet.
Download:https://iosgods.com/topic/52809-cpantidumper-v12-secure-iosandroid-binaries-defeat-offset-dumping/
How to use: For ease of use, DiDA have included a CPAD.bat file inside the download link below which simplifies the whole process by simply dragging your binary file to the .bat file and reading the on-screen instructions. Of course, you can modify the .bat to your liking. You will also need to edit it to add the location of cpad.exe on your computer. Example usage of CPAD.bat file.
NOTE CPAD is only a Windows tool but will likely work on other operating systems with Wine since it's a simple CLI. 
If you would like to run CPAD using cmd, you can do so using this command: cpad.exe BINARYFILENAME …

ARM basics cheatsheet

Billede

We don't need Il2CppDumper for Metadata version 24

Billede
On Il2Cpp Games with metadata version 24, the method names are no longer stripped, we don't need to use Il2CppDumper.

To check metadata version, check this tutorial:
http://www.iandrohacker.net/2017/10/how-to-check-il2cpp-metadata-version.html

Enjoy modding il2cpp games!

How to bypass signature check in smali (Client-sided bypassing)

Billede
Bypassing client-sided signature check is super easy and can be bypassed in many ways In
In this tutorial, I will show you how to bypass "Not a genuine copy" from TAP SPORTS BASEBALL 2016
You need Notepad++ and apktool. You can use APK Easy Tool
Decompile APK file
Open Notepad++, click Search -> Find in files… . Select the directory to search and search "not a genuine copy"

Here is the result. We only look for name="invalid_signature" that is used by smali code. Search invalid_signature

Find the const-string v that is using the invalid_signature string, like: const-string v3, "string/invalid_signature" as seen below

Replace const/4 v4, 0x0 with 0x1 so it returns true. The game will pass the signature check and let you play.

That's all, the game will launch
My next step is to bypass server-sided signature check that makes the game stuck in loading screen, yep another fake bug that I will look into it.
About bypassing server-sided signature check, it …

APK Easy Tool v1.40 for Windows (GUI apktool) (5 nov 2017)

Billede
Good news: I have fixed false positives and now only 1 buisness anti-virus detect this tool as a malware. Nobody here uses SentinelOne, only companies uses it. Virustotal:
Requirements:
Windows vista or newer (This tool will not work for Windows XP)
.NET Framework 4.5.2 or newer
Java SE/JDK is required for decompile, compile, and sign APK. If you don't have Java installed, you can only use Zipalign or Install APK. Download and install Java SE/JDK now
Features:
7z Compression-level 0-9 APK infomation with icon by aapt dump badging Background workers to get rid of lags Remember window position (SHIFT + Q to reset window position) Advanced log viewer, with .txt file selection Extract APK / Zip APK Switch between apksigner.jar by Google and signapk.jar by bootstraponline Quick help Full environment path support Adb process kill Apktool.jar version selections Decompile APK Compile APK Sign APK after compile Sign seletected APK (It will clone the selected APK, and sign it) Sign compiled APK (If you forgot …

How to fix Lucky Patcher root problem on Memu emulator

Billede
In Memu 3.x.x.x, it is running Kitkat ROM by default but there is a bug in libdvm.so (dalvik runtime) that caused Lucky Patcher not to work correctly. In logcat, I found an error of libdvm.so. There is no clear details about libdvm.so errors
10-30 20:51:40.800 I/System.out( 6175): CANNOT LINK EXECUTABLE: could not load library "libdvm.so" needed by "/data/data/com.android.vending.billing.InAppBillingService.CLON/files/dalvikvm"; caused by "libdvm.so" has unexpected e_machine: 3
I have contacted both developers of Lucky Patcher and Memu but I have not got any response from them.
So how do I do now? how do I fix the problem?
There is no fix yet, but luckily there is a workaround. Lucky Patcher works on Lollipop ROM so let's install it.
Open Multiple Instance Manager (Multi-MEmu shortcut on your desktop)
Create Android 5.1 ROM

Android 5.1 will be created. Start it

Visit https://lucky-patcher.netbew.com/ and download latest Lucky Patcher APK.
Click on APK icon and…

Video - Craziest game hacks ever seen!

Billede
Those epic videos i found on Youtube.

GTA 5 Online: "Epsilon UNDETECTED 1.41 ONLINE PC MOD MENU" + DOWNLOAD - PC Mod Menu (GTA 5 PC Mods)


TROLLING A FAKE GOLDEN MODZ IN GTA ONLINE! (GTA 5 Mods)
Asphalt 8 - Breaking the Speed of Light (1079252848.8 km/h+)


Super Mario 3D World Hacks - Weird Mushroom

MARIO KART 8 HACKS! - Hack Attack! - Aurum
Mario Kart Wii Hacking Online on 2017!

Video - How a youtuber fixed a 10 year old Guitar Hero bug on PC using IDA Pro

Billede
This video explains how he fixed a 10 year old Guitar Hero 3 bug using IDA Pro.

You will learn more about x86 assembly. Good luck :)

How to load dumped Il2Cpp function names in IDA Pro

Billede
Did you saw script.py after dumping and you don't know what it is? it's a generated python script to load function names in IDA
First of all, you must dump il2cpp games using Il2CppDumper. Follow the tutorial http://www.iandrohacker.net/2017/04/how-to-dump-and-mod-il2cpp-games.html
After dump, you will see script.py located in location where Il2CppDumper.exe is located
Open IDA Pro, disassemble a binary file and let it fully load
Click on File -> Script File…

Select the script.py file to run

Wait around 30 seconds
Done. Now you can see function names in IDA Pro

Credits: iAndroHacker (Tutorial) Perfare (Il2CppDumper)