Jump to content

Batch

Developer
  • Posts

    1,679
  • Joined

  • Last visited

Everything posted by Batch

  1. I've created a mac app live wallpaper engine 😛 JcXy1K7.png

    1. Puddin

      Puddin

      We don’t want this, we want an IOS JAILBREAK ALL VERSION PLEASE BATCHH 

    2. Puddin

      Puddin

      NO COMPUTER NO INTERNET REQUIRED 

    3. Batch

      Batch

      SHHHH, everyone want this @Puddin!!!!!!!!!!!!!!!! (I was bored at work)

  2. Sorry i won't sell, it's not ethical for me :v
  3. On non jb as well Mine I made for fun
  4. o3 is OP Dog Dancing GIF

    1. Rook
    2. Batch

      Batch

      @Rook it's the best free one atm

    3. Rook

      Rook

      It’s free? 😮

      Damn DS is doing work!

  5. ios, but i'll keep it private
  6. Found randomly a way to make cheats for non jailbreak lol

    1. Show previous comments  2 more
    2. Batch
    3. BionixPwn
    4. Meepo

      Meepo

      Ok ok, as I said gj. I will wait for it

    5. Rook

      Rook

      Does it work like Jailed iGMenu?

    6. Batch

      Batch

      No no it does not rely on patching/hooking @Rook

  7. Hello i've created an advanced  obfuscation for your tweaks, application. Check it out at: https://iosgods.com/topic/191267-ios-obfuscation-protect-strings-numbers-offsets-from-reverse-engineering/ 

  8. VORTEX — Compile-Time Obfuscation Ever run strings on a binary and instantly spot API keys, error messages, or internal logic? VORTEX makes that impossible. It's a pure C11 header library that encrypts string and numeric constants at compile time — before your binary is ever written to disk. No runtime keys stored in memory. No external dependencies. Stack-only allocation. The cipher is two-tiered: a global seed derived from your build date shapes an S-box, while a per-call-site key (based on __FILE__, __LINE__, and __TIME__) produces unique encryption per string. The result: identical source strings produce completely different binary blobs at different call sites. Usage is a single macro: OBF_WITH(secret, "Bearer sk-...") { send_request(secret); // zeroed on scope exit } float pi = OBF_FLOAT(3.14159265f); double gravity = OBF_DOUBLE(9.80665); size_t off = OBF_OFFSET(0xfa); int port = OBF_INT(8443); OBF_STRING(secret, "xK9#mP2$qR7!wL4@"); // printf(secret) strings, IDA Pro, and Ghidra see only noise. Your source stays readable. No heap. No deps. Drop in obfuscate.h and go. → https://github.com/Batchhh/Vortex-obfuscation → https://github.com/Batchhh/Vortex-obfuscation/releases/tag/v1.0.0 - Contains obfuscate.h and libvortex.a
  9. i like it ahahah It's obfuscated
  10. Funny ESP, Aimbot, Speed https://i.imgur.com/mNOIOUC.mp4
  11. Wtf I really don't know tbh, this is so strange
  12. wtf Try to run directly "/var/jb/var/mobile/theos /bin/nic.pl" Also test if you can cd into it "cd /var/jb/var/mobile/theos/bin"
  13. It should work try to run nic.pl and lmk what comes up
  14. Can you run "echo $THEOS" ?
  15. mmmh it's kinda strange
  16. Hello, I’ve actually completed a dumper explorer in run time where you can edit methods/fields inside the game directly. I will post a complete version in about 1 week

    1. Show previous comments  9 more
    2. aQReh

      aQReh

      how's going?

       

    3. Batch

      Batch

      @aQReh Still under testing, but working smoothly. You can ask @VaaR

    4. DiveMaster

      DiveMaster

      @batchh if you need testers I am happy to help :D

       

    5. VaaR

      VaaR

      @aQReh it’s great! Very intuitive also 

    6. iosdevice

      iosdevice

      I wish I could test thisLUL
      I guess I gotta keep learning new things and posting them so I can get that novice cheater roleLUL

  17. I don’t know much about theos for mobile, but the location should be in “mobile” directory. Also you can’t run $THEOS I guess because you don’t have zsh installed I think. To run it just cd into the folder from your home directory “mobile” so “cd theos/bin” then run “chmod +x nic.pl” to give permission to the file then run “pwd” to get the directory and copy it. Then you can go to whatever directory you want and paste it (remember to add nic.pl)
  18. Look in my profile for unban device, I made a tutorial for crane
  19. Atm I’m trying to come up with a solution
  20. There is a guide on how to do in the README.md mv Batchh_SilentPwn*.nic.tar $THEOS/templates/ios
  21. @VaaR you can use my mod menu template, there a debug mode in which there’s a live offset patcher working for rootless and rootfull
  22. UPDATE 2.0.5 Added save/load settings Fixed some issue Added TODO list (if any one want to help, feel free to create a pull request)
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines