Open Request Legend of Slime : Idle RPG

InstaFood

Rookie
_LK_IOZs4obnkFVFQLN8SmT06oLDOjaWm5Gd1Z_BhxVWg=s280.png


Game Name: Legend of Slime : Idle RPG

Google Play Store Link:

APK Link:

Cheat Requested:
  • Mod Menu
  • Unlimited Gold
  • Unlimited Gems
  • Unlimited Forks
  • Unlimited Trait Points
  • Unlimited Mastery Points
  • Unlimited Pickaxe
  • Unlimited Dynamite
  • Unlimited Drill
  • Unlimited Ore
  • Unlimited Dungeon Keys
  • Unlimited Gold Rush
  • Unlimited Village Raid
  • Unlimited Dwarven King
  • Speed up multiplier
  • One Hit
  • God Mode
Is it possible to watch ads for free?

Have you tried any cheat engines?:
Yes -> I used cheat engine and was able to change the looks of the value instead of the actual value. So it looks like I have 1500 gems, however, I was unable to spend 1500 gems as I originally have 300 gems.
 
Last edited by a moderator:
Upvote 0
So I've been trying to crack this game for a few days now with no luck. Initially, I couldn't even dump the game since the metadata is encrypted (oddly, the libil2cpp.so is not encrypted). The game is very good at obfuscating the metadata on-demand, and it requires VERY precise timing to get the raw metadata from a dump. However, I did manage to do it and have been poking around in IDA/DnSPY, but this game uses a lot of getter/setter methods that result in quite complicated ARM64 functions. I've attached the Il2CppDump files here for FREE (not paid, smh) Legend of Slime – Google Drive (including the .DLLs, the dump.cs, and the script.json for IDA/Ghidra) if anyone wants to take a look at the decompiled functions. However, when I recompiled/resigned the APK with EasyAPKtool, even when I didn't modify anything, the app immediately crashes. I'm assuming a form of signature verification. If anyone knows how to bypass this, that would be very helpful, since I haven't even been able to test any ARM64 modifications on the libil2cpp.so because of this crashing either.

I actually am on iOS, but I don't have a jailbroken device to dump the game (on iOS, the libil2cpp.so is encrypted, but the metadata isn't... the opposite of Android). So, that's why I was using WSA on my laptop to emulate the game so I could use the dumped script.json from Android on the libil2cpp.so for iOS in IDA. It worked, but I still have no idea what I should be editing. I don't care which platform I'm using, since I can just port my save data from ANdroid -> iOS in the game itself, but I can't get past this barrier on Android. I haven't tried patching iOS yet (I can easily sideload it, but I anticipate another signature verification BS), but I might try that next.
 
So I've been trying to crack this game for a few days now with no luck. Initially, I couldn't even dump the game since the metadata is encrypted (oddly, the libil2cpp.so is not encrypted). The game is very good at obfuscating the metadata on-demand, and it requires VERY precise timing to get the raw metadata from a dump. However, I did manage to do it and have been poking around in IDA/DnSPY, but this game uses a lot of getter/setter methods that result in quite complicated ARM64 functions. I've attached the Il2CppDump files here for FREE (not paid, smh) Legend of Slime – Google Drive (including the .DLLs, the dump.cs, and the script.json for IDA/Ghidra) if anyone wants to take a look at the decompiled functions. However, when I recompiled/resigned the APK with EasyAPKtool, even when I didn't modify anything, the app immediately crashes. I'm assuming a form of signature verification. If anyone knows how to bypass this, that would be very helpful, since I haven't even been able to test any ARM64 modifications on the libil2cpp.so because of this crashing either.

I actually am on iOS, but I don't have a jailbroken device to dump the game (on iOS, the libil2cpp.so is encrypted, but the metadata isn't... the opposite of Android). So, that's why I was using WSA on my laptop to emulate the game so I could use the dumped script.json from Android on the libil2cpp.so for iOS in IDA. It worked, but I still have no idea what I should be editing. I don't care which platform I'm using, since I can just port my save data from ANdroid -> iOS in the game itself, but I can't get past this barrier on Android. I haven't tried patching iOS yet (I can easily sideload it, but I anticipate another signature verification BS), but I might try that next.

My first targets are looking at getters for stats like get_criticalDamage, get_AttackSpeed, etc. There are some in LoadComplete.Battle.PlayerCharacter and LoadComplete.Battle.UserBattleInfo I've been looking at. I've been staring at the ARM64 versions of these functions for a long time not getting anywhere though. The exisiting/previous hacks for this game mainly revolve around making upgrades free... this might be easier. Take a look at the C# functions in DnSpy... I think there's definitely something to target here. public static int LevelUpCost(this PlayerSkill playerData) I think refers to the actual skills in the game, not the player's levels of stats in the main window, but I'm guessing it has a similar name. public int GetSlimeStatLevel(UserInfo.SlimeLevelType type) I'm not sure if this refers to the Slime's actual level or the level of the stats (attack power, attack speed, etc.). If anyone wants something easy to test... GetAdsVipLevel() is in LoadComplete.Battle.UserData and is the purchaseable thing that makes ads go away in the game. It returns 0 normally, so maybe someone could try making it return 1. But, literally every function, including the getters, either returns null or 0, so I think this is some usage of generic classes in C# and that instantiation isn't occuring, making it even more confusing.
 
I tried dumping the il2cpp library but it looks like the metadata is obfuscated. Only way around this is dumping the game at runtime with zygisk il2cppdumper but it requires root and I don't have access to my pc for the next week so we'll probably have to wait
See my post above ^^^. I dumped it for you :)
 
Crazy because if you paid someone to do the modding for the app, you definitely don't have the playstore app for it.... you seem kinda sus buddy.

If your phone rooted then i will upload the steps how to do in game guardian. Leave that guy he's advertising xD
 
If your phone rooted then i will upload the steps how to do in game guardian. Leave that guy he's advertising xD
Hmm, I wonder if you were able to do that (but not other things) because some functions in the code I dumped appear to use protected/hidden values. I think the chicken's stats may not use those same protected structures. But, when I tried and edit them by searching for the values directly, I had no luck since I would always isolate one address for a stat as I searched/refined search, but then it would change itself to some negative number and not actually be the stat anymore(changing it did nothing, or was only visual). Did you just do something like that, or did you use the offsets from a dump to mod it?

Update:
I've tried hooking the getter/setter functions with Frida, but the process is protected and will either use the anti-cheat called "Liapp" to detect tampering and force close the application or prevent attaching if it's already launched. I also tried developing a mod menu using the functions to hook, but recompiling the .apk also triggers Liapp detection, so the app crashes on launch. If you were able to do it just with Game Guardian alone, I'm gonna feel pretty dumb for how much time and research I've spent on this. Then again, it was for fun, but it's still very frustrating to not know what I'm missing lol
 
So I've been trying to crack this game for a few days now with no luck. Initially, I couldn't even dump the game since the metadata is encrypted (oddly, the libil2cpp.so is not encrypted). The game is very good at obfuscating the metadata on-demand, and it requires VERY precise timing to get the raw metadata from a dump. However, I did manage to do it and have been poking around in IDA/DnSPY, but this game uses a lot of getter/setter methods that result in quite complicated ARM64 functions. I've attached the Il2CppDump files here for FREE (not paid, smh) Legend of Slime – Google Drive (including the .DLLs, the dump.cs, and the script.json for IDA/Ghidra) if anyone wants to take a look at the decompiled functions. However, when I recompiled/resigned the APK with EasyAPKtool, even when I didn't modify anything, the app immediately crashes. I'm assuming a form of signature verification. If anyone knows how to bypass this, that would be very helpful, since I haven't even been able to test any ARM64 modifications on the libil2cpp.so because of this crashing either.

I actually am on iOS, but I don't have a jailbroken device to dump the game (on iOS, the libil2cpp.so is encrypted, but the metadata isn't... the opposite of Android). So, that's why I was using WSA on my laptop to emulate the game so I could use the dumped script.json from Android on the libil2cpp.so for iOS in IDA. It worked, but I still have no idea what I should be editing. I don't care which platform I'm using, since I can just port my save data from ANdroid -> iOS in the game itself, but I can't get past this barrier on Android. I haven't tried patching iOS yet (I can easily sideload it, but I anticipate another signature verification BS), but I might try that next.
where is dump.cs ? i can't see it.
 

Similar threads

Back
Top Bottom