Viser indlæg fra oktober, 2020

How to bypass jailbreak detection

Those are latest working tweaks I know so far. Don't know if they work for iOS 14 You do not need to whitelist apps if any hacks have JB bypass build-in   Not all apps works, you would have to ask tweak developer to add support or search for tutorial, especially reddit page   Cydia or Sileo package installation 1. Open Cydia or Sileo 2. Add one or more repo listed below 3. Search for the tweak package you want to install 4. Install it 5. Respring Manual deb package installation There are other ways to install .deb. I personally use Filza   1. Download and install  Filza File Manager  from Cydia or Sileo 2. Download deb file on any browser if provided below 3. Save to Filza 4. Open Filza and open the downloaded deb file 5. Click Install 5. Respring   Tweaks About kernel bypass, there may be some risks involved. Use it at your own risk   Hestia Repo:   A-Bypass Repo:   Shadow Repo: https://ios.jjolano

How to bypass fake crash (Process exited due to signal (6))

This is about bypassing a fake crash from an old deleted game Fetty Wap Nitro Nation Stories , I did 5 years ago. I normally wouldn't teach how to bypass security, but this game is old, deleted and the security is too simple. So it's safe to teach at this point.   You need to have knowledge of ARM and x86 assembly and know how to use IDA pro, but you will learn a bit more here   If you installed with a re-signed apk file, the game crashes if you click RACE after the game loaded   Sometime the game would show an error message   Or this     It was smart… (not really) but it's pretty easy to bypass   How do I know what caused the crash? It's not always easy to know but try look in the logcat. You can use Android Studio app or ADB in cmd for non-rooted devices or use Matlog Libre for rooted devices/emulator. I will use Matlog on an emulator   So basically, I'm looking after Process [packagename] [pid] has died   And reading

[Old Tutorial] Bypassing PIE security check (Android 5.0 up) (Archived)

Old tutorial by s810car –  This has been archived here Hi all pretty new to alphagamers, been checking out the site as I am aspiring to increase my programming/hacking knowledge esp. when it comes to Android so thought I'd join. I had a request from a member to bring over a tutorial I wrote for fixing a new issue on Android 5.0 and up. A few modders ran into this issue using gdb and I recently solved this issue myself after some research, and as I will be trying to gain knowledge here as well, in spirit of the old Scene mantra "no leeching!" will also share knowledge whenever I can. Bypassing PIE (position independent executable) check This is a solution for this error specifically - running gdb (or other busybox script) gives this error: "error: only position independent executables (PIE) are supported." If thyats your error, read on. Background - I ran into this problem recently, trying to debug an app by getting a memory dump first, nev