Jump to content

Juku

Senior Member
  • Posts

    1,190
  • Joined

  • Last visited

Everything posted by Juku

  1. my name is prat

  2. none of supercell games are hackable like coc, hay daay boom beach etc.. All server sided. For bullet force you need to learn debugging etc... And it does have some functions that show for some reason but nobody except dida, shmoo etc.. prob know em
  3. oh lol clutch is babe
  4. lol bullet force should be like your last hack though. Most subx games are not even hackable by functions. Actually none, besides a few. If you want to hack using functions window in ida I'd suggest mshook. Bullet force isnt a game many should try before being experienced
  5. Have you tried Clutch?
  6. It doesnt work like that, you dont wake up one morning and decide to start hacking bullet force. I'd learn most of the basics first before starting.
  7. yeah. It aint the jailbreak.
  8. doesn't crash for me lol
  9. Show me what you're writing in putty. Also do you have ifunbox?
  10. Juku

    Count to 4,000

    2659
  11. Welcome
  12. Damn nice, I couldn't find any good strings
  13. Hi lad
  14. What does $r1=0x1 mean? Like what does it do and what does it test. Also, when your watchpoint gets a hit. Is it the the offset or memory adress it gives you IDA. I thought it was offset, but in a video it was the memory adress the guy was following. So set *0xMemoryAdress=0xArm is what I'd do in Gdb? But in lldb what would I do? mem wr -s 4 0xMemoryAdress 0xthumbhex? Because I was able to hack ammo but I forgot if it was the offset or memory adress I searched for in ida lol
  15. Thanks shmoo! Hate when this happens, will try and look into this
  16. Welcome
  17. 414 mbps download speed holy shit! Movies must be instant for you
  18. oh lmao so you type it in backwards?
  19. Hello, so recently I have been using gdb to hack things and its been working wonderfully, only problem is, when it comes to testing, I have to do it the long way which is editing binary in HxD and then resigning blah blah and retransfering it over to my device. 1) I know there is a quicker and much more efficient way in gdb by doing: set *0xOffset=0xHexCode But I'm so confused. Which code is it talking about? arm hex, thumb hex, arm gdb/lldb, which one is it talking about? Am I doing something wrong. Because I edited the code the binary way and it worked fine. But it does nothing when I do the set command. 2) Sometimes I get this weird error in gdb saying: Cannot access memory address
  20. oh i know what you mean now, how some bars have no number indicating your health, same for fuel and stuff like that. Interesting.
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines