Showing posts from May, 2019

How to get unity version from any asset file

Since the Il2CppDumper require to input unity version in the 1st quarter of this year for better accuracy, I will show you how to easly get unity version from APK and IPA file. This method will work on any platforms such as Windows, Nintendo Switch... Requirements - Winrar - 7-Zip - Notepad++ or any Hex editor Note: Programs must not run as administrator. Otherwise drag and drop will not work Open APK or IPA with Winrar or 7-Zip. Navigate to /assets/Data (Android) or /Data (iOS) folder You will see assets files such as 00a5d891672528a47a1084403ee04b96 or levels . Don't worry about the names. Open Notepad++ and drag and drop any assets file to Notepad++. Here you will see unity version straight away You can open it via hex editor as well In the Il2CppDumper, input the version you saw in the asset file. Just input the first two numbers like 2017.4

CPAntiDumper v1.2 - Secure iOS/Android Binaries & Defeat Offset Dumping!

This tutorial was been deleted from original source but it's now archived here! CPAntiDumper created by Caoyin is a tool that obfuscate binary files and .dylibs and prevent others from dumping offsets. It support ARMv7 and ARM64 iOS Binary and Android ARM binaries. ARM THUMB and x86 are currently not supported yet. Note: This will not prevent IDA Pro from disassembling Download: How to use: For ease of use, DiDA have included a  CPAD.bat  file inside the download link below which simplifies the whole process by simply dragging your binary file to the .bat file and reading the on-screen instructions. Of course, you can modify the .bat to your liking. You will also need to edit it to add the location of cpad.exe on your computer.  Example usage of CPAD.bat file. NOTE  CPAD is only a Windows tool but will likely work on other operating systems with Wine since it'