Jump to content

Elreys

Senior Member
  • Posts

    291
  • Joined

  • Last visited

Everything posted by Elreys

  1. thks
  2. Hi Hi Asian Plus, If i look your code, i think you reach a memory check, its a trap to stop hacking ; but fortunally shmoo help us with a wonderfull tutorial. https://iosgods.com/topic/6995-ida-tutorialhow-to-disable-memory-checks/ i think you did the same mistake with ASLR removing that i did for Months please try this.. Solution: Step 1. Remove Thin and remove ASLR with Online Tool Step 2 .Important!! Move your Hungry Shark Evolution executable -> to var\mobile\ Step 3 ldid -s Hungry Shark Evolution executable Step 4 copy file back to the Hungry Shark Evolution executableroot folder Step 6 .Important!! set premission 777 Im sure this works perfect:)
  3. Hi Guys DiDA shmoo, I read all Tuts about IDA hack, sub_x and more i create successfully more tweak, and i have a lot of experience as developer objectiv c# swift, i rod ARM assembly book to understand deeper arm register function and language. To my question: If i found a sub_ on IDA i xref and i see that this sub goes anyway, what is the best analytics step to find the Function Call for of this sub_x method? This is was i tried: Set break on address 0xxxxx , read of the LR (Link Register normally the will return the function Address) e.x 0x4567788, On IDA jump to address : 0x4567788, but unfortunately i dint find the right register with the values. I forgott to tell you that this address work, in the game but he change only the Value on the visual, the original value are not changed, its this anyway the right way to find the original address;) Thanks Guys PS: Sorry for my but english but im Italian Guys:)
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines