-
Posts
4,939 -
Joined
-
Last visited
Everything posted by Ted2
-
How do u hack it tho? cause idk what causes crash now
-
Help/Support Getting aslr using gdb gives me a error..
Ted2 replied to Ted2's topic in Help & Support
That's not what I meant. Thanks for teying to help though -
Help/Support Getting aslr using gdb gives me a error..
Ted2 replied to Ted2's topic in Help & Support
I wanted to hack arm64, not armv7 cause outdated -
Help/Support Getting aslr using gdb gives me a error..
Ted2 replied to Ted2's topic in Help & Support
gdb cantt run arm64 i see.. not neccesary then. solved -
Hi, I followed this tut for getting aslr using gdb, since I'm doing breakpoints on arm64.. But when I type the command info address _mh_execute_header It tells me this: (gdb) info address _mh_execute_header warning: Unrecognized osabi 0 in arm_set_osabi_from_host_info Error calling thread_get_state for GP registers for thread 0x3843lxerror on line 251 of "/Volumes/Builds2/BuildRoot/SourceCache/gdb/gdb-1708/src/gdb/macosx/arm-macosx-nat-exec.c" in function "void fetch_inferior_registers(int)": (os/kern) invalid argument (0x4) (gdb) What's wrong?
-
-
Tried that, didn't go well. wil try again
-
You only want 2000 gold nothing else? if yes, pm me
-
What?
-
Hi, I wanna find the aslr slide using gdb, but cant find anything on the web how. using lldb, it's just image list. But I can't use lldb & gdb at the same time.. but I have to do breakpoints.. I've read somewhere something about otool? Not sure what to do with that though. Anyone knows easy way?
-
took some time, wanted to try but was busy. anyways here u go lol:
-
Yes I used lldb
-
No sub_x
-
Ikr ????
-
Trigger Fist By Lake Effect Applications v1.11 com.LakeEffectApplications.TriggerFist Requires: iOS 4.3 or later. Price: Free Updated: 2012-12-18T06:18:06Z iTunes URL: https://itunes.apple.com/us/app/trigger-fist/id531184261?mt=8&uo=4&at=1010lce4 Hack Features - Inf ammo - Inf Grenades May come more soon Download Link [Hidden Content] Proof Video: Credits - @Ted2 - @xiaovfor helping me always
-
Help/Support DSMOS: SMC Read Error K0 "Don't Steal MacOS" - MacOS Sierra VMWare
Ted2 replied to Rook's topic in Help & Support
"Don't Steal Mac OS X.kext, sometimes referred to as DSMOS or DSMOSX, is a file present in Intel-capable versions of the Mac OS X operating system which enforces a form of Digital Rights Management, preventing Mac OS X being installed on stock PCs. The name of the kext is a reference to the Mac OS X license conditions, which allow installation on one piece of Apple hardware only. According to Apple, anything else is stealing Mac OS X. The kext is located at /System/Library/Extensions on the volume containing the operating system.[4] The extension contains a kernel function called page_transform() which performs AES decryption of "apple-protected" programs. A Mac OS X system which is missing this extension, or a system where the extension has determined it's not running on Apple hardware, will be missing this decryption capability, and as a result will not be able to run the Apple-restricted binaries Dock, Finder, loginwindow, SystemUIServer, mds, ATSServer, backupd, fontd, translate, or translated." I can't find anything for a fix, but sh!tt -
Help/Support DSMOS: SMC Read Error K0 "Don't Steal MacOS" - MacOS Sierra VMWare
Ted2 replied to Rook's topic in Help & Support
windows loading macos using vmware or macos loading windows using vmware? -
Help/Support DSMOS: SMC Read Error K0 "Don't Steal MacOS" - MacOS Sierra VMWare
Ted2 replied to Rook's topic in Help & Support
have you installed hackintosh? edit; ur windows? -
Your code seems alright to me, can you pm me your project? I wanna see if I can compile it
-
Sure! Making dinner right now, so after
-
Hey, sdks installed too?
-
Yes I got GDB! So the main function i need to hack is the one with Vectors? Wow thanks dude!
-
Hi, So I found the right function for hacking health, I also hacked it & it worked. Sadly it works for my enemy too This is the part I hacked loc_16955C LDR R0, [R5,#0x40] LDR R1, [R11,#var_s0] SUB R0, R0, R1 STR R0, [R5,#0x40] CMP R0, #0 BGE loc_16957C I changed SUB R0, R0, R1 to a ADD & it worked. So I was thinking that linked function had to do something with branches, I did NOP the BGE loc_169557C Whcih resulted in both, me & enemy has normal health. The loc_169557c function looks like this (if that helps lol): loc_16957C VLDR S0, [R5,#0x4C] VCVT.F64.F32 D2, S0 VNEG.F64 D2, D2 VCVT.F32.F64 S0, D2 VSTR S0, [R5,#0x48] LDR R0, =(unk_C8103C - 0x1695A4) B loc_16959C Anyone could help me out? Thankyou in advance
-
See tutorials in section how to properly install theos
-
Do you have headers installed? and do you have a sdk installed?