Viser indlæg fra juli, 2018

How to capture a logcat (non-root and root)

Logcat helps you diagnose the errors of app, hardware, etc There are two ways to capture a logcat
Non-rooted device: Download ADB portable:

Open Launcher.bat
On your device, enable USB-debugging and connect to your computer
Launch CMD or Powershell and type the command to output logcat to file
adb logcat > “E:/ log cat.txt” Always use quotes if the path contains spaces. Many peoples don’t know this trick
Reproduce the problem on your device in order to grab the interesting errors in logcat
Nothing will appear in the prompt while outputting to file. To stop it, press CTRL+C or close the prompt
The file will be saved
Rooted device: There are many different apps of logcat reader Don’t know which one? Just install MatLog. I recommended it:
Or download my pre-build which works better than Playstore version

Draggable flat mod menu template

So I finally had time to work with simple flat mod menu and it looks totally better than my previous crappy mod menu.

Source code:
You need basic knowledge of Unity and C#
It’s free to use without needed to credit to me. You can credit to me if you support me J
I used material color picker:
To load mod menu in-game, find active classes like UIRoot, UIdrawcall, Soundmanager and add: public void OnGUI() { MyClassNameOfModMenu.MyGUI(); }
To hack a function, modify code like this public int getDamage { if (MyClassNameOfModMenu.toggle1) { return 999999; } return this.get_dmg; }
For multiplier hack, modify code like this public int getDamage { return this.get_dmg * MyClassNameOfModMenu.dmgMulti;

Unity tutorial - Making value adder hack for offline games

If you know C# basics, you will understand it.
In offline games, I basically looking for reward function and found codes that adds value into player data

And re-use the codes into mod menu with buttons to add values

Other similar codes from other games (I don’t tell what game) that adds coins and gems:
C#: int num = TPlayerPrefs.GetEncryptGold((int)DHGlobal.g_CurrentPlayerIndex); num +=20000; TPlayerPrefs.SetEncryptGold((int)DHGlobal.g_CurrentPlayerIndex, num); C#: TPlayerPrefs.SetEncryptGem(TPlayerPrefs.GetEncryptGem()+200);
Here are the codes: Gitlab:

[Archived] dnSpy 3.0.2, 4.5.2, 5.0.5, and beta

Here are old versions and links to official release and beta version. Any bugs only of beta version should be reported to
Downloads: 5.x.x beta dnSpy 5.x.x beta AppVeyor LINK
Official release 0xd4d/dnSpy
5.0.5 dnSpy LINK #1 dnSpy LINK #2
4.5.2 dnSpy LINK #1 dnSpy LINK #2 dnSpy LINK #3
3.0.2 dnSpy LINK #1 dnSpy LINK #2
Files are untouched and are clean

How to return float value in ARM

I made the simple IEEE 754 converter tool for ARM
Type any float value you want and get the hexadecimal for Little-endian
Then use to convert ARM instruction to hex bytes
Example number 1 is 0000803F (Little-endian), return like this
32-bit MOV R0, 0x0000803F
64-bit MOV X0, 0x0000803F
If you have problem converting ARM instruction with higher numbers, just use one of the byte sequences below
1 = 0000803F 2 = 00000040 4 = 00008040 8 = 00000041 16 = 00008041 32 = 00000042 64 = 00008042

Il2CppDumper GUI Tool

Extract .NET metadata from il2cpp binaries. (types, methods, fields, etc.)
Extraction code is based on Il2CppDumper
Requirements: - Net Framework 4 - Windows 7 and above
Features: Supports il2cpp binaries in ELF(arm, x86) and Mach-O(32bit, 64bit) formatSupports global-metadata version 16 and 19-24Extracts .NET metadata including types, fields, properties, methods and attributesSupports automated IDA script generationname and tag methodsstore dynamic string literals in commentsomakefunction to improve ida analysis Generates dummy DLLs that can be viewed in .NET decompilers
GUI Features: ·Select files ·Rename files ·Set output directory. ·Set mode. ·Set registration offsets ·Auto fill up offset registrations after dump ·Drag and drop support ·Remember everything except registrations ·Logs saves on exit. It saves on your documents if tool is located in C drive.