-
Posts
24 -
Joined
-
Last visited
Everything posted by DuIslingr
-
Inotia 4 PLUS v1.3.2 +4 Cheats for Jailed iDevices!
DuIslingr replied to Zahir 's topic in Free Non-Jailbroken IPA Cheats
update this please to 1.3.5. might as well and current version is broken when trying to install on ios 17 -
Does this even work on Xina? Is kitty just being part of the code the issue with the code signature issue? Cuz I tried it both using kittys hook and without, manually defining offset with slide and it just crashes with a code signature error
-
Help/Support How do you crack apps on iOS 15?
DuIslingr replied to MrBedSheet's topic in Help & Support
iGDecrypt and CrackerXI do not work on XinaA15. Applist may be the culprit. If using Xina use the rocketbootstrap from the repo apt.xina.vip Dunno how to use the clutch built for trollstore. cant seem to find any instructions to set it up. -
General gangstar new orleans ipa download Link
DuIslingr replied to GGGGGGGGGG's topic in App Store Apps Discussion
thx -
cracked binaries will be different from each other always. this is do to the generation of the encryption on apple apps each time it is installed.
-
Used rasticrac 3.2.5 on my iphone 6.
-
https://dl.dropboxusercontent.com/u/64150695/ice If it works then You can find my update tutorial on the other site. For whatever stupid reason im getting errors about using disallowed urls when trying to update it
-
1st game does not exist on my appstore
-
well you can try signing it with ldid and see if that solves the issue after doing it this way.
-
its not a hex editor. this is beyond compare. i use it to compare files
-
the hex compare utility will tell you what the change is. like this as long as you use the same exact binary to compare. if you have a binary from a different crack comparing against the other you will see more differences than you need to see. so make sure its the same binary. one with aslr and one without it. http://prntscr.com/7uwpyv
-
Make sure its a clean cracked binary. What you can do is try using a rmaslr utility. while keeping a clean copy renamed with aslr at the end or something and then do a hex compare. If the value is different change it accordingly in the clean one and try it. If it is still crashing make sure you have the latest appsync 5.6 from angelxwinds repo installed.
-
Help/Support CSCI patcher help: working with Writedata.h header
DuIslingr replied to de2ndlaw's topic in Help & Support
send me ur project -
Help/Support CSCI patcher help: working with Writedata.h header
DuIslingr replied to de2ndlaw's topic in Help & Support
This is because writedata is not setup to convert strings to hex. -
You are actually why I posted it here. I saw you had the same problem as me. Wasn't sure if you were on the other sites.
-
Every single ASLR removal tool sets it to 01. Never caused any issues. I fail to see the point of your post. I also do not understand why you bothered to use hide content.
-
If you read the first cpl of sentences I state that if attempting to sign still causes problems like it was for me then this tut was for you. So no that tut did not work.
-
After spending literally days trying to solve the stupid ASLR/Signing problem I finally figured out my own solution. This tutorial is for those of you that have issues removing ASLR on iOS 8.3 and 8.4. If for some reason your apps still crash after using the tools and signing, then following the steps below is the answer. Things you need: Hex Editor Cycript from Cydia(This is not really necessary, but its an easy way to verify if ASLR is actually disabled) A Brain Disabling ASLR: Crack the app (At the time of this post, rasticrac is the only cracker that works properly on 8.3/8.4) Put the binary on your desktop and open it with a hex editor. (There are multiple ways to view and edit the hex of a binary. So do it however you like. This is just for reference) You need to go to the following offset depending on if your binary is FAT or non-FAT.(FAT means your binary has more than one arch. non-FAT is a thinned binary or a binary only containing one arch.) FAT armv7 = 0x4018 non-FAT armv7 or arm64 = 0x18 http://i.imgur.com/PFSxpBe.png You are going to edit the 21 highlighted in the image above to 01. (The entire hex highlighted is the same for both armv7 and arm64. If this is not what you see then you are at the wrong offset.) Save and that is it. Put the modded binary back in your game folder and run it. Just make sure permissions are set. You do not need to sign when you follow this method. Verifying ASLR is Disabled: If you would like to make sure that ASLR is disabled before you start debugging and finding out it is not, then do the following in terminal. cycript -p PROCESS x = dlsym(RTLD_DEFAULT,"_dyld_get_image_vmaddr_slide") get_aslr_slide = @[member='encoder88'](uint(int))(x) get_aslr_slide(0) Process = Binaryname If the result of this is 0 then ASLR is disabled. Otherwise it is enabled. Do not copy and paste all of it at once in the commandline. Run the first line. Then copy and paste the rest. NOTES: Q: What about FAT arm64 offset? A:You may have noticed that I do not specify the offset for fat arm64. This is because I am unsure if this is dynamic. As in I don't know if it changes based on binary size. I would assume so but need to test. For now if you want to debug arm64, then lipo the binary and go to the non fat offset. Then stick it into your game. If I figure it out, I will update this tutorial. Credits: Alcatraz HackJack: Provided cycript code to verify ASLR status.
-
No I own part of this template along with HackJack and Razzile.
-
*sigh* http://www.magicios.org/topic/4869-like-for-instagram-get-more-likes-v23-1/
-
New Remove ASLR tool online: http://iosgods.com/topic/20832-remove-aslr-from-binaries-online-pcmaciosandroid/ Requirements: Jailbroken Device AppList from Cydia (latest) Download: http://www.mediafire.com/download/vap66j1cranx9wf/ iOS 8.3, 8.4+ users need to follow this otherwise apps will crash: http://iosgods.com/topic/10447-tutorial-how-to-make-removeaslr-work-on-ios-83-84/ Installation: Download the file above (If on mobile downloading skip to step 7/8) Download a file transfer utility such as iTools ( http://itools.hk/en_index.htm ) Open iTools Go to the File System tab Select the One that says "File System(Jailbreaked)" directory structure Place the deb you downloaded into any directory you like it does not matter. Personally I recommend var/mobile for quick access On your iDevice go into iFile In iFile go to wherever you placed the file(Or Downloaded it to if you downloaded on your iDevice) Select the file and tap install It will respring the device so that the app icon will appear. How to UseNow that the device has resprung, Open the App. Scroll through the list and find the app you want to disable ASLR on. Select it and hit Remove. Done. ASLR has been removed. Additional Notes Q: What is ASLR? A: ASLR Stands for Address Space Layout Randomization. It is a security feature to make things harder to hack. It basically loads the code into random non-sequential segments of memory and then remembers where it loaded things to allow sequential execution. When a developer builds a Program using XCode or something, he can set the MH_PIE flag. I am not sure, but I guess MH stands for mach header and PIE stands for Position Independent Executable. Q: What does this APP do? A: It basically searches for the MH_PIE Flag, disables it and writes the changes to the Application. Credits: HackJack: For original version. Also made iOS 7 icon @Alcatraz Updated to support iOS 7 with iPad support.
-
Alternate and up to date converter: http://iosgods.com/topic/19308-the-new-arm-to-hex-converter-online-x32-x64-support-windowsmaciosandroid/ Requirements: .Net Framework 4 WinRar 5 (to open archive) Supports: Everything the old GUI(by slam80) did New Supports .W Instructions Supports RET instruction Supports ADDS,SUBS, etc..(Anything with an S at the end basically) You can now get hex for instructions with VAR in them. Ex. STR R3, [sP,#0x350+var_2B8] Now gives you hex reveresed along with normal for debugging purposes Convert more than one instruction at a time. Be warned the longer your list is the longer it takes to convert it. It may even possibly crash if the list is too big. Supports Float Instructions Supports arm64 instructions Update Log: New in v2.1.0* Supports Float Instructions. New in v3.0.0* Supports 64 Bit instructions. Update v3.0.1* Fixed Float Support. Now works correctly. Update v3.0.2* Code Optimization. Added missing telerik files. Should no longer crash. Update v3.1.0*Fixed bug where if you converted a 32 bit instruction that output thumb hex, and if you then converted a 64 bit instruction, the thumb hex for the 32 bit command would still be there. Updated executables in the 32 and 64 folders. Removed some dependencies as they were not required. Update v3.1.1*Fixed Conversion bug. App should run now wihtout any issues. Update v4.0.0* The converter has been almost completely recoded from scratch. Redesigned to allow multi-line converting. Now shows hex in reverse as well, for debugging purposes. Update v4.0.1* Upgraded to use updated Infragistics files. Updated executables in the files folder. Switched 32 files to different toolchain. Performance in multi-line converting seems to have improved because of it. Meaning the program should not freeze as long(or at all) as before while it waited for those files to perform their task. Video: Note* Watch fullscreen in 720p so you can actually see the text. Download: [Hidden Content] Credits: slam80 for original GUI(Don't want him to be forgotten )
- 142 replies
-
- 113
-
-
-
-
-
-