Showing posts from August, 2018

Baldi's Basics - Behind the 3rd question

You know that weird horror game right? I’m always curious how 3rd question works so i decided to take a look at the source code in dnSpy. First I thought I can debug the answer but it doesn’t give any results so I look deeper in the code Here, this code gives you random math question but it have checks. In story mode, If problem below or equal 2 and notebooks below or equal to 1 it gives you normal question and so on. When you have 1 notebook and you answer 2 questions, the codes goes to “else”. The impossibleMode has been returned to true and it generate numbers 3 times and messing up So what is the answer to the 3rd question? As I debugged the game, the answer to the 3rd question is either 1st or 2nd question but it has been disabled (impossibleMode returned true) so you will always get wrong answer. Don’t trust any youtubers who made the video about answering 3rd question correctly. They are fake and clickbait. It’s to get more views fr

How to fix Catlog or Matlog stuck in loading (LDPlayer)

Is Catlog or Matlog stuck in loading like this when you try to load file? I figured it out it was caused by crappy build-in Superuser that was bad written by chinese. Only way to fix is to switch to SuperSU 2.79 or use Memu emulator. Unfortunately, Nox Player already blocked SuperSU from replacing Superuser Download SuperSU 2.79: APK is signed to avoid update from Play Store. v2.82 does not have ability to replace Superuser Launch SuperSU and choose Expert. It will ask you if you want to update binary. Click Continue Then click Normal Allow superuser access if asked. Wait for few seconds. If it success, reboot Tada! No more stuck in loading and no more toast spamming

How to bypass root detection on cocos2d games

How to bypass root detection on cocos2d games from Andnix on Vimeo . Devs don’t know how to secure their game and just blocked rooted device, but the game can be easly hacked which will work on non-rooted devices so it’s pointless to block rooted device. Having a rooted device doesn’t mean you can just hack games, you can do a lot of customization on Android OS. That’s the reason why many peoples root their device and reason why we have XDA community. Devs just don’t understand that. So let’s get started. First of all you need: - IDA Pro (To disassemble .so file) - Any hex editor (To edit .so file) - Winrar or 7-zip (Extract files from APK file) Note: You need to have basic knowledge of IDA and ARM assembly Root detection usally come from smali but cocos2d have ability to communicate with smali to get root detection data from it. Disassemble file Here is what I found, a Root detection scene that appear a warning screen that root is det