Jump to content

0xSolana

Contributor
  • Posts

    768
  • Joined

  • Last visited

Everything posted by 0xSolana

  1. show the full arm function, here you are changing the Store instruction, but there might be other ways not buggy
  2. well, ima make a tutorial then when i have time
  3. @Mina Kim Ton application a été revoke, ça veux dire qu'elle n'est plus signée et qu'elle ne peut donc pas s'ouvrir. re sign la avec Sideloadly
  4. c'est normal, il faut resigner tout les 7 jours
  5. you can hook Objc function on non-JB, with %hook. but well in 2022 asaik no games use Objc lol, its more likly for VPN app or stuff like this that only need Objc. you could find like isPremium objc function and use %hook to reture true or stuff like this. but if u wanna go in offset patching and hooking on jailed u gonna need to use H5GG atm
  6. you can "hack" Objc by hook Objc code on jailed, but can't hook a dynamic adress. if you want to hook like JB (an instance variable for example you gonna need to use H5GG that can patch offset (dynamic) , hook any c++ func/meth in the app, and can make script like GG for android. H5GG use JS tho tho it's kinda limitless cuz u need to compile an ipa each time you hook an Offset, so try your offset on JB, and make a hack after with H5GG for non-JB support
  7. @weselito Esign has this feature, tho it's kinda buggy if the iPA > 1 Go but well u can inject a dylib there
  8. mhhh then they encrypted the strings... well i have no idear about what you try atm... maybe in this case just navigate to all namespaces and classes trough the .dll using DnSpy, but this takes a lot of time
  9. have you tried to search for the strings that the pop up shows inside iDA string view ?
  10. Mhh it seems to be acting like this : bool _fb_is_jailbroken(ID param_1,SEL param_2) { if (the check has determine that your device is JB) { alert("your device is JB"); return true; } return false; } (my analysis only) I would return false. As i said, i think the class CheatDetection is useless, i think it uses other thing to determine if jailbreak or not. Have you checked method names containing Jaibreak/root keywords ?
  11. these raining days are boring... do you have nice Netlix movies or series to watch ? :popcorn:

    1. Show previous comments  8 more
    2. Rook
    3. Laxus
    4. TimidNova

      TimidNova

      @Laxus The show "You". It's really good

    5. quatorze

      quatorze

      Money Heist, Platform, Wednesday 

    6. Zamen7

      Zamen7

      Do what I do enter the search bar close your eyes and spam letters then pick what ye see

  12. Mhhh i am not sure that this class is usefull for JB détection... It seems dealing with "real cheat" but, if it's whatever dealing with JB, i would NOP / RET all of theses meth/functions. All of them have obfuscated parameters, it's hard to know with what it's dealing. and also, ive search for this class online and it seems to be private, there is no documentation from Unity3D about it...
  13. Have you first tried FlyJb X ? If you open the game, and enable FlyJb after its useless since the game will store that you are Jailbreak. Steps : 1) Delete the game. 2) Re install it BUT DON'T OPEN IT 3) Open FlyJb and from there, enable ur app. you can use A-bypass if you want, i use FlyJB but use any good alternatives. 4) Open your game If that didn't work, you probably need to work with DnSpy... Afaik you can't NOP a class, try to look functions / methods, maybe bool functions store if you are jailbreak or no. You can also search for function names containing "jailbreak", "root". I think the first method should work tbh, but if not good luck for the second one, it's gonna be a lot of work to test them
  14. use Laxus link to test if you have the right offset, than you can use theos to compile them and make a nicely mod menu, you can use Ted2 template, it's great documented and not complicated to use. There is also theos installation tutorial. in the tutorial section
  15. disable your orientation lock before open the game
  16. https://iosgods.com/topic/130167-windowsmacosm1wi-fi-introducing-sideloadly-working-cydia-impactor-alternative/
  17. tu as telecharger avec l'appli iosgods ou sideloadly ? dans tout les cas je pense que le certificat est perimé, tu peux resigner avec sideloadly, il y a des tutos a propos de ça sur iosgods
  18. Well, now it's part 3 of the tutorial series . Part 2 here if you haven't seen it yet. In this tutorial, we gonna see hooking, it's usefull when you need to return a specific value, without having to check de hex value of it. Since critical Strike has again been updated, v11.452 is outdated. I'm gonna use v11.604 I let you load your DLLs in DnSpy and we meet right after. Lets Start ! Requirements: - Jailbroken iPhone/iPad/iPod Touch. - Filza - DnSpy - Theos - Ted2 Theos template - Critical Strike v11.604 - ARM notions. [Hidden Content]
  19. Suggestion : - Ability to connect an Apple ID account to decrypt apps from there (for example paid apps) There are a lot of public Apple ID account shared in Telegram (working only for App Store), where you can connect and install apps (for example one of them has all GTA purchased) - And why not, if the first option is possible, sharing the iPA in the Decrypted AppStore website, so that anyone typing "GTA" get the iPA ? I don't know if this can compromise the privacy data that iosgods puts in place
  20. removing ASLR is not possible since a few years, but you can use getRealOffset, and it should work topic about ASLR in recent iOS version
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines