Recent content by NotALegitGuy

  1. Help! Byte offset

    Just dereference it, gonna assume you want to set it to a number. Should work. *reinterpret_cast<int*>(getAbsoluteAddress(0x69BD50)) = 1000000;
  2. Solved Help to understand the logic of editing offsets

    iirc the b instruction is similar to jump, it branches to the given address, so the what that does is move to register 0 the value of register 1 then branch into the address 0x??????, So 13846E is the address to where it branches, and if you change it a bit it branches to another one which might...
  3. Help! Help in HOOK!

    The message duplicated but they're the same.
  4. Help! Help in HOOK!

    Make a function pointer to isEnemy, try looking around CCharacterBattle to see if you can find the CCharacter of it which is taken by isEnemy, if it is there then dereference it to obtain it from the _Attacker argument of CalcDamage, pass it to isEnemy and if isEnemy returns false then do...
  5. Help! Help in HOOK!

    Make a function pointer to isEnemy, try looking around CCharacterBattle to see if you can find the CCharacter of it which is taken by isEnemy, if it is there then dereference it to obtain it from the _Attacker argument of CalcDamage, pass it to isEnemy and if isEnemy returns false then do...
  6. Solved Android Roblox modding help

    Roblox is a Native game you need reverse engineering and c++ skills to actually be able to mod it and depending on what you wanna do you might need to know more. Also it's not obfuscated so no need to memdump it.
  7. Help! How to bypass a game that detects literally everything?

    libfwazyd, the strings you mostly seee are from the other libs and imports, search JNI_OnLoad then go to it's XREF which should be a LOAD, and go to the sub_ on that same line then just decompile it and you'll begin to see obfuscated strings, and right below them is the decryption. So far I've...
  8. Help! How to bypass a game that detects literally everything?

    All of the strings of the library are encrypted with a XOR which makes it hard to find things Inside the JNI OnLoad function you can find all of this. It might be better to use a debugger and find what function is called when you get the Lucky patcher alert and start reversing from there, sadly...
  9. Help! How to bypass a game that detects literally everything?

    Dumping the game from memory works and isn't detected.
  10. Help! How to bypass a game that detects literally everything?

    I protected an APK using it and i got the same files except for the .dex in assets/ It also seems to encrypt strings and names ( functions, variables and more ) in it's Liapp directory and in the game's directory, except for the game it doesn't encrypt any strings.
  11. Help! How to bypass a game that detects literally everything?

    I don't think I'll be able to bypass it but if possible i will at least try to get as much information as possible so if another person with more experience than me happens to encounter this thread they can also try
  12. Help! How to bypass a game that detects literally everything?

    After some testing i found how it protects the app, it makes a new classes.dex for handling Java stuff and a new Native Lib for handling JNI Stuff I'm pretty sure the native lib is what contains all the protections while the classes.dex has the dialogs, I'll check it out later tomorrow and see...
  13. Help! How to bypass a game that detects literally everything?

    That's super interesting, what is the name of the game?
  14. Help! Please give suggestions to make the best mod menu

    Seems interesting, guess I'll look into it.
  15. Help! Please give suggestions to make the best mod menu

    I have never heard of the module one, where may i find more info about it?