Jump to content

Ted2

Senior Member
  • Posts

    4,939
  • Joined

  • Last visited

Everything posted by Ted2

  1. Sometimes it's really trial & error. Debugging would help, but iOS 12.....
  2. you can check branches. Or try to find methods which might check whether you can use skill or not; CanUse etc
  3. ActiveSkillController$$ApplyCooldown RET should not apply it I suppose.
  4. Yo Dude! You have new Ziggo Go jailbreak bypass? :)
    The one in Flex fails. Otherwise, I'll try to bypass it myself. :p

    Read more  
    1. Show previous comments  4 more
    2. Walking Hell

      Walking Hell

      yes that crashing its part of their jb detection, You can use NoSub (PalBreak w/ options) on https://skylerk99.github.io/

      it stops the crashing, only the next issue will be that videos cant be played. 

    3. Walking Hell

      Walking Hell

      BMvVCeE.jpg

      you have to respring with resub, but videos do play when i am connected with passionfruit, but not without.

      also it has jailbreak detect, "env": "DYLD_INSERT_LIBRARIES"

    4. Ted2

      Ted2

      Hm. Interesting

    5. Walking Hell

      Walking Hell

      i think it works with passionfruit and nosub, as passionfruit has also some features to log and bypass jailbreak in it, so it counters whatever ziggo go is doing.

    6. Ted2

      Ted2

      Can't you see what it bypasses then?

  5. See Discord, send you a file.
  6. go into airplane mode, open the app & then disable airplane mode
  7. probably anti-cheat, some check.
  8. my inject is based on MSHookMemory, which supports iOS 12. btw, @Piro does it crash instantly? cause you also said in other tries it didn’t do damage.
  9. dude, the error tells you exactly what the problem is. Errors mostly aren’t that clear like it is now.
  10. Ollah, I currently have this code: //inside the initalizer offsets:(NSArray <NSString *> *)offsets hexPatches:(NSArray <NSString *> *)hexPatches // if switch is being toggled for(int i = 0; i < offsets_.count; i++) { inject([offsets_[i] longLongValue], [hexPatches_[i] longLongValue]); } //switch code: [menu addHackNamed:@"God Mode" description:@"You can't die" textColor: [UIColor whiteColor] offsets:@[@("0x100299DC0" "0x100299DC4")] hexPatches:@[@("0x20008052" "0xC0035FD6")]]; But whenever I toggle the menu, it freezes for a sec & then crashes. I don't see any logs... Is my code wrong? Is there a better approach? Thankyou in advance
  11. still need to use the ugly looking quotes then inject(0xIDAOffset, “”); 🤮🤮
  12. The thing is, I hate to have to write it like that ^, it’s almost the same as the original now possibly, but I think there must be a simpler solution
  13. last time I read something about it, it was stored into the keychain. But I think that’s changed long time ago, back then you could delete keychain - reboot & done. You could try on reddit/jailbreak...
  14. Yeah I tried that, but couldn’t get something like it to work. I’ve tried multiple things, this is the only one that worked. Will look into an alternative another time. C/C++ isn’t the most user friendly when it comes to arrays it seems
  15. It's a .h file, which is a tool to patch memory ? idk Both sections fine for me
  16. While MSHookMemory is great, I hate I have to do this: const uint8_t hack[] = { 0x00, 0x00, 0x80, 0x52, // mov w0, #0 0xc0, 0x03, 0x5f, 0xd6, // ret }; So I wrote some code which won't need you to do that: #include <substrate.h> #include <mach-o/dyld.h> #define ASLR_BIAS _dyld_get_image_vmaddr_slide(0) uint64_t getRealOffset(uint64_t offset){ return ASLR_BIAS + offset; } // main func void inject(uint64_t offset, uint64_t hackedHex) { hackedHex = CFSwapInt32(hackedHex); MSHookMemory((void *)getRealOffset(offset), (void *)&hackedHex, sizeof(hackedHex)); } How to import this code to your project? You have two options: 1. Copy & paste the code from above under your "imports" 2. Download this file & paste it in /var/theos/includes & write this on top of tweak.xm: #include <inject.h> Usage of the function: //parameters it takes inject(0xIDAOffset, 0xHackedHex); //actual usage on a offset inject(0x100299DC4, 0xC0035FD6); Bugs to be fixed: 1. If you wanna write a hex more than 4 bytes, it won't work the way you think, example: inject(0x100299DC0, 0x20008052C0035FD6); /* This will write C0035FD620008052 instead of what you entered due the CFSwapInt32 /* NOTE: I'm no pro at this kinda stuff (dealing with memory), so if there's anything just mention it ^^ Credits - Saurik - topics from https://stackoverflow.com/ which helped me understand several things - Me for this simplified version
  17. what ios?writedata is broken on ios 12. if thats your iOS, send me message on dc
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines