Showing posts from July, 2018

How to capture a logcat (non-root and root)

Logcat helps you diagnose the errors of app, hardware, etc There are two ways to capture a logcat Non-rooted device: Download ADB portable: Open Launcher.bat On your device, enable USB-debugging and connect to your computer Launch CMD or Powershell and type the command to output logcat to file adb logcat > “E:/ log cat.txt” Always use quotes if the path contains spaces. Many peoples don’t know this trick Reproduce the problem on your device in order to grab the interesting errors in logcat Nothing will appear in the prompt while outputting to file. To stop it, press CTRL+C or close the prompt The file will be saved Rooted device: There are many different apps of logcat reader Don’t know which one? Just install MatLog. I recommended it: Or download my pre-build which works bette

Draggable flat mod menu template

So I finally had time to work with simple flat mod menu and it looks totally better than my previous crappy mod menu. Source code: You need basic knowledge of Unity and C# It’s free to use without needed to credit to me. You can credit to me if you support me J Screenshot:   I used material color picker: To load mod menu in-game, find active classes like UIRoot, UIdrawcall, Soundmanager and add: public void OnGUI() {                              MyClassNameOfModMenu.MyGUI(); } To hack a function, modify code like this public int getDamage {        if (MyClassNameOfModMenu.toggle1)        {               return 999999;        }        return this.get_dmg;   } For multiplier hack, modify code like this public int getDamage {        return this.get_dmg * MyClassNameOfModMenu.dmgMulti;

Unity tutorial - Making value adder hack for offline games

If you know C# basics, you will understand it. In offline games, I basically looking for reward function and found codes that adds value into player data And re-use the codes into mod menu with buttons to add values Other similar codes from other games (I don’t tell what game) that adds coins and gems: C#: int num = TPlayerPrefs . GetEncryptGold ( ( int ) DHGlobal . g_CurrentPlayerIndex ) ; num + = 20000 ; TPlayerPrefs . SetEncryptGold ( ( int ) DHGlobal . g_CurrentPlayerIndex , num ) ; C#: TPlayerPrefs . SetEncryptGem ( TPlayerPrefs . GetEncryptGem ( ) + 200 ) ; Here are the codes: Gitlab: Github:

[Archived] dnSpy 3.0.2, 4.5.2, 5.0.5, and beta

Here are old versions and links to official release and beta version. Any bugs only of beta version should be reported to Downloads: 5.x.x beta dnSpy 5.x.x beta AppVeyor LINK Official release 0xd4d/dnSpy 5.0.5 dnSpy LINK #1 dnSpy LINK #2 4.5.2 dnSpy LINK #1 dnSpy LINK #2 dnSpy LINK #3 3.0.2 dnSpy LINK #1 dnSpy LINK #2 Files are untouched and are clean Screenshot:

How to return float value in ARM

I made the simple IEEE 754 converter tool for ARM Type any float value you want and get the hexadecimal for Little-endian Then use to convert ARM instruction to hex bytes Example number 1 is 0000803F (Little-endian), return like this 32-bit MOV R0, 0x0000803F 64-bit MOV X0, 0x0000803F If you have problem converting ARM instruction with higher numbers, just use one of the byte sequences below 1 = 0000803F 2 = 00000040 4 = 00008040 8 = 00000041 16 = 00008041 32 = 00000042 64 = 00008042 128 = 00000043 256 = 00008043 512 = 00000044 1024 = 00008044 2048 = 00000045 4096 = 00008045 8192 = 00000046 16384 = 00008046 32768 = 00000047 65536 = 00008047 131072 = 00000048 262144 = 00008048 524288 = 00000049 1048576 = 00008049 2097152 = 0000004A 4194304 = 0000804A 8388608 = 0000004B 16777216 = 0000804B 33554432 = 0000004C 67108864

Il2CppDumper GUI Tool

Extract .NET metadata from il2cpp binaries. (types, methods, fields, etc.)   Requirements: - Net Framework 4.7.2 - Windows 7 and above   GUI Features: ·          Set output directory ·          Set registration offsets ·          Drag and drop support ·          Save settings ·          Log output in realtime ·          Support APK and IPA dump automation ·          Switch between Il2CppDumper and Il2CppInspector   Download: How to use: Android: Drop APK to start dump automation or extract file from lib folder and extract global-metadata.dat from \Data\Managed\Metadata\ and select them   iOS: Drop IPA to start dump automation or extract bina