ADRP x8, #0x3b93000
ADRP x9, #0x3bcc000
LDR x8, [x8, #0x9f8]
LDR x9, [x9, #0xe20]
ORR w3, wzr, #0xf
MOV x2, x20
LDR x0, [x8]
LDR x1, [x9]
MOV x4, xzr
BL #0x24040cc
is there a way to not corrupt the binary, like jumping to an offset where my code is?Adding more bytes, would mean you insert bytes which will corrupt the binary.
Also you should not overwrite bytes more than the function size
Hooking is da wayis there a way to not corrupt the binary, like jumping to an offset where my code is?
Hooking is da way
I want to try that but I'm on android, do you recommand any tools/apps?
I want to try that but I'm on android, do you recommand any tools/apps?
I found out about it, its looks simple and fairly beginner friendly but unfortunately I keep getting connection and spawning(crashing) errors so I may not use itFrida. For hooking is a top1 tool, usually used for SSL unpinng, installed at PC, installed on android and with js do what you need. You can find a few SSL unpinning scripts get to have an idea of how this work and, based on this, write code for your needs.
Found DroidFrida a week ago. Handy tool.Try this, frida-il2cpp-bridge
You don't need to know much about frida, just follow the instructions from it's wiki
I didn't test on emulators, I use it on my rooted Poco M3 pro :) sometimes it send phone to reboot but in the end it works :)oh wow cool, does it work in emulators?
We use cookies to personalize content and ads, to provide social media features and to analyse our traffic. We also share necessary information with our advertising and analytics partners to optimize your experience on our site.
Learn more about cookies
We use cookies to personalize content and ads, to provide social media features and to analyse our traffic. We also share necessary information with our advertising and analytics partners to optimize your experience on our site.
Learn more about cookies