Jump to content

Moltivie

Member
  • Posts

    56
  • Joined

  • Last visited

2 Followers

Recent Profile Visitors

757 profile views

Moltivie's Achievements

Newbie

Newbie (1/14)

  • Popular

Recent Badges

146

Reputation

  1. Hello there, This is my first thread and I am glad to share it with you! Today I am releasing the dumped methods of Critical Ops v.1.13.0 + the IDA labeled database since it seems that no one else done it before. You may want to give it a try and create your own cheats Here are some pics: Dumped Functions IDA Labeled SUBs [Hidden Content]
  2. Thanks for sharing this mate hope everyone will appreciate it.
  3. Thank you for the fast reply. Based on what you've said, I can just modify F4 03 00 32 (MOV W20, #1 - HEXs that IDA gave me) with 14 00 80 52 (MOV W20, #0 - HEXs that armconverter gave me) Correct?
  4. Actually I'm reverse engineering the jailbreak detection of an app. The problem is that on the "IDA view-A" tab when I select the instruction (ex. MOV W20, #1) and I switch over "Hex View-1" tab it gives me these HEXs: F4 03 00 32 (based on that instruction); Now based on what I know if I want to modify the instruction to be something like (MOV W20, #0) I should go over an ARM to HEX converter but even before doing that (by the way I use http://armconverter.com/) if I try to paste MOV W20, #1 over the site it should give me the same HEXs: F4 03 00 32 that IDA prompt out but instead it gives me these HEXs: 34 00 80 52. Anyone knows the issue?
  5. dans ele tie-quar
  6. Thank you so much, I was waiting for a savegame of it
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines