Discussion LIAPP Protection

nowhere_222

Just Crazy
Original poster
Jul 29, 2022
472
4,153
193
Inner Peace 🕊️
LIAPP protection have recently increased and reaching the impossible modding level, basically they throw alert when you only sign your MOD APK, but you can't touch of the classes.dex, assets files are also protected, lib files are protected also against tampering, only 32 bit lib is possible to be modded

I tried to change few stuff from AndroidManifest.xml, such as changing the activity launch, application name, or just deleting few lines that are actually tampered permissions, but nothing did any good result, still the alert remains

It's probably possible to be modded with Zygisk Menu Module, but i would like to play these mods as well on my smartphone, many mods already i can make myself, but LIAPP being very hard for me now, i did bypass it a long while ago, but they found out how we tried to modify their stuff

My ask is, anyone tried to remove their alert or making the sign process not detected by it?

If anyone wants to give insight about that i would be open to discuss to it
 

kikfox

Platinian
Aug 4, 2024
9
9
3
24
I have been studying on LIAPP recently, yeah the recent versions are so though but always there is a way. Tell me which app you trying to unpack may be I will try to help you
 
  • Like
Reactions: nowhere_222

nowhere_222

Just Crazy
Original poster
Jul 29, 2022
472
4,153
193
Inner Peace 🕊️
I have been studying on LIAPP recently, yeah the recent versions are so though but always there is a way. Tell me which app you trying to unpack may be I will try to help you
The game is called Legend of Slime, did you find a way to touch the classes.dex without breaking the APK file? Or the assets ones?

Everytime i modify them it remains broken, and the app not starting

The only files we can add are outside the folders (where there is resources.asrc etc..)
 

kikfox

Platinian
Aug 4, 2024
9
9
3
24
This app global-metadata.dat is encrypted, I am still working on methods to decrypt game resources.

Here is all strings and classes restored, if you have idea to dump game resource on runtime please suggest me.

Ooops I can't add a link to my moded apk, platinmods saying I should have three posts first,

mega DOT nz SLASH files SLASH s8pAwAjZ#j_13JiMmp3asDg8-4e7Mu5yTf3FjyYJbRm_dfyHy85Y
 
  • Like
Reactions: nowhere_222

nowhere_222

Just Crazy
Original poster
Jul 29, 2022
472
4,153
193
Inner Peace 🕊️
This app global-metadata.dat is encrypted, I am still working on methods to decrypt game resources.

Here is all strings and classes restored, if you have idea to dump game resource on runtime please suggest me.

Ooops I can't add a link to my moded apk, platinmods saying I should have three posts first,

mega DOT nz SLASH files SLASH s8pAwAjZ#j_13JiMmp3asDg8-4e7Mu5yTf3FjyYJbRm_dfyHy85Y
You can use auto il2cpp dumper for dumping
 

CodeJutsu

Solid & Active Platinian
Oct 1, 2023
50
28
18
30
You need to understand that LiApp is one of the toughest anti-cheat systems out there. Just removing alerts isn't going to cut it. The real issue is way more complicated. You’d have to decompile the binaries and deal with hidden libraries that use XORed strings. Even if you decrypt those and manage to remove root , memory integrity checks, process scanning etc etc , you still have to handle an authentication token that needs to be verified when login ( ive seen it in a game) . A simple library swap or alert removal won’t do squat. It takes someone who’s seriously skilled in reverse engineering, knows C++, and can handle IDA Pro. The LiApp devs probably dumped thousands into this, and only a handful of people I know have even managed to bypass it not to mention the made it even harder now , so good luck
 
  • Like
Reactions: nowhere_222

nowhere_222

Just Crazy
Original poster
Jul 29, 2022
472
4,153
193
Inner Peace 🕊️
You need to understand that LiApp is one of the toughest anti-cheat systems out there. Just removing alerts isn't going to cut it. The real issue is way more complicated. You’d have to decompile the binaries and deal with hidden libraries that use XORed strings. Even if you decrypt those and manage to remove root , memory integrity checks, process scanning etc etc , you still have to handle an authentication token that needs to be verified when login ( ive seen it in a game) . A simple library swap or alert removal won’t do squat. It takes someone who’s seriously skilled in reverse engineering, knows C++, and can handle IDA Pro. The LiApp devs probably dumped thousands into this, and only a handful of people I know have even managed to bypass it not to mention the made it even harder now , so good luck
I have been able to bypass the older releases versions but this one is yes a really hard one, i don't think it's worth it at all to try to bypass it, plenty of games where protection is easier or no protection at all, some LIAPP games have versions where there isn't the anti cheat, so you can fake the update and still cheat for your personal behaviour, but yes, it's painful to see something this hard to be bypassed just to cheat on your favorite game
 

CodeJutsu

Solid & Active Platinian
Oct 1, 2023
50
28
18
30
I have been able to bypass the older releases versions but this one is yes a really hard one, i don't think it's worth it at all to try to bypass it, plenty of games where protection is easier or no protection at all, some LIAPP games have versions where there isn't the anti cheat, so you can fake the update and still cheat for your personal behaviour, but yes, it's painful to see something this hard to be bypassed just to cheat on your favorite game
Yes i've seen your way before that was a lucky shot to be honest just an exploit and they probably fixed it now
 
  • Like
Reactions: nowhere_222