Jump to content
  • Sky
  • Mint
  • Azure
  • Indigo
  • Blueberry
  • Blackcurrant
  • Watermelon
  • Strawberry
  • Pomegranate
  • Ruby Red
  • Orange
  • Banana
  • Apple
  • Emerald
  • Teal
  • Chocolate
  • Slate
  • Midnight
  • Maastricht
  • Charcoal
  • Matte Black

D red

Senior Member
  • Content Count

  • Joined

  • Last visited

Community Reputation

601 Advanced Member


About D red

  • Rank

Profile Information

  • iDevice
    iPhone 6
  • iOS Version
  • Jailbroken
  • Android Device
  • Android Version
  • Rooted
  • Gender

Recent Profile Visitors

774 profile views
  1. Hello, When i extract the .deb of my hack, and opened the hack.dylib in a text editor, i saw that it was possible to change a lot informations such as the the author's name, the used HEX, the description and the switch option, the Mod Menu icon (button also). Luckily I couldn't find the offsets I heard of CPLoader but it's been deleted, also for CPAntiDumper but worked only for AppStore binaries. the program didnt recognize my file as an arm64 bin. So that's why i ask for a way to secure all that stuff ? Thanks
  2. have u tried to delete all dylibs that touch safari or chrome ? If not, install "NoSub" and activate on safari / chrome
  3. i used lldb on MacOS and Windows but it still buggy (by buggy i mean that lldb kick me from the program) i download the 2 file from Nini but didn’t update them otherwise it just crash my NewTerm window (or via SSH it dose not respond) can you tell me wich version of lldb do you use, your ios version with the jailbreak ? thanks EDIT : do you think that the problem could be the RAM (i am iphone 6 and he is old + low RAM) ?
  4. Hey, i tried to debug games with lldb, worked for the first game but for any other game, it is too much laggy, my connection is closed by the remote host for any reason by SSH via WI-FI or USB it is the same. Using Unc0ver or Checkra1n is also the same. So that's why i want to try with GDB. (Shmoo Topic For GDB) but shmoo deleted his repo and can't find an up to date version. i Tried the 1708 version with radare repo but had an error with bad executable. i looked the open source and only see "armv7" but i am arm64. So i would like to know if any guy here has an up to date GDB for ARM64 ? maybe Laxus or Rook ? Thanks
  5. well, finally when i tried debug a new game from the appstore, the same problem came back. ios 12.4, Checkra1n Should i maybe hack the .ipa and install the ipa then debug the cracked ipa by CrackerXI ? or it should be from the appstore ? EDIT: It stop the conexion instantly or after 5-10 seconds... maybe an anti-debug or it can't ?
  6. Nice man ! Checkra1n works great with lldb
  7. have u tried to install it on a guest apple id account (from another country or whatever but not yours) ?
  8. When i looked into Blitz Brigade binary file with iDA, i found 2-3 strings with "Syscall" inside, should i RET them or NOP ? and try debugging the game after ? Anyway, Thanks for all those explains, i will take a look on google if i can find informations about that and if not i will create a support topic and if you have time, i will tag you
  9. So to do that i do like if i had to find an offset (by subtracting the aslr to the offset that I got from iGameGod ?) but then i don't know what to do ? ps : i had to use lldb (gdb not working on my device so i can use the fonction to "bypass" the aslr) i found that https://iosgods.com/topic/687-tool-remove-aslr-v200/ am i right ?
  10. It crashed when i open the Gameloft game... (I also had the info that Blitz Brigade have an anti-debug. So i installed "LetMeDebug" but the game crash when opening)
  11. @Nini could you please check this topic
  12. As ted2 said its what u get from armconverter. example : You want to RET a fonction (that the fonction dose not happen), in arm converter you would type : RET --> C0035FD6 // This is the RET fonction in HEX/BYTES that arm converter will send u So, now that we know the bytes of our "RET" we will patch the offset that u got from IDA / lldb or anywhere [switches addOffsetSwitch:@"One Hit Kill" description:@"Enemy will die instantly!" offsets:{0x1001BB2C0} // adress of IDA or anuwhere you got bytes:{0xC0035FD6}]; // the bytes u got from armconverter.com // So, the fonction at 0x1001BB2C0 will be "delete" by our 0xC0035FD6 (RET) see arm knloegde here : https://iosgods.com/topic/45417-tutorial-basic-arm-instruction-explanation-with-image/
  13. i'll try that and tell u back thanks
  • Recently Browsing   0 members

    No registered users viewing this page.

    • Administrator |
    • Special Rank |
    • ViP Pro |
    • ViP Jailed |
    • ViP |
    • Cheater  |
    • Modder  |
    • Novice Cheater |
    • Rookie Modder |
    • Contributor |
    • Senior Member |
    • Member |
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy - Guidelines