- Ruby Red
- Matte Black
Hello there, This is my first thread and I am glad to share it with you! Today I am releasing the dumped methods of Critical Ops v.1.13.0 + the IDA labeled database since it seems that no one else done it before. You may want to give it a try and create your own cheats Here are some pics: Dumped Functions IDA Labeled SUBs [Hidden Content]
It crashes on IOS 11.1.2 - iPhone 10,4
Is it updated to the latest version 1.3.0?
Thanks for sharing this mate hope everyone will appreciate it.
Need a fix!!
It freezes when the menu's open
Couldn't you use the default menu? Anyway thanks
Name of the game you want hacked: Score! Match Version of the game: 1.20 iTunes Link for the app: https://itunes.apple.com/my/app/score-match/id1145420529?mt=8 Jailbroken or Non-Jailbroken: Jailbroken Requested Features: Unlimited Bux, Unlimited Gems
Actually I'm reverse engineering the jailbreak detection of an app. The problem is that on the "IDA view-A" tab when I select the instruction (ex. MOV W20, #1) and I switch over "Hex View-1" tab it gives me these HEXs: F4 03 00 32 (based on that instruction); Now based on what I know if I want to modify the instruction to be something like (MOV W20, #0) I should go over an ARM to HEX converter but even before doing that (by the way I use http://armconverter.com/) if I try to paste MOV W20, #1 over the site it should give me the same HEXs: F4 03 00 32 that IDA prompt out but instead it gives me these HEXs: 34 00 80 52. Anyone knows the issue?
Recently Browsing 0 members
No registered users viewing this page.
- Administrator |
- Special Rank |
- ViP Pro |
- ViP Jailed |
- ViP |
- Cheater |
- Modder |
- Novice Cheater |
- Rookie Modder |
- Contributor |
- Senior Member |
- Member |