Jump to content

tien0246

ViP Pro
  • Posts

    1,144
  • Joined

  • Last visited

Posts posted by tien0246

  1. 31 minutes ago, carpoa said:

    ic mk. Could you just explain using pointers and getting them please? Thanks for your help :thankyou:

     

    On 6/2/2024 at 3:55 PM, tien0246 said:

    1. Yes
    2. I gusse it is offset in stack, skip it
    3. No, you must use pointer class + 0x10

    void (*old_PersistentPlayerUpdate)(void* _this) = nil;
    void PersistentPlayerUpdate(void* _this) {
       old_PersistentPlayerUpdate(_this);
       if ([menu isSwitchWithIdentifierActive:@"currency"]) {
         void *playerData = *(void **)((uint64_t)_this + 0x18);
         void *Container = *(void **)((uint64_t)playerData + 0x30);
         void *Player = *(void **)((uint64_t)Container + 0x10);
         void *player = *(void **)((uint64_t)Player + 0x10);
        *(int *)((uint64_t)player + 0x134) = 999999999;
        *(int *)((uint64_t)player + 0x138) = 999999999;
        *(int *)((uint64_t)player + 0x13C) = 999999999;
        *(int *)((uint64_t)player + 0x140) = 999999999;
      }
    }

    MSHookFunction((void *)getRealOffset(APEncryptHex(0x013BE034)), (void *)PersistentPlayerUpdate, (void **)&old_PersistentPlayerUpdate);

    Using hook like it

    • Like 1
  2. 38 minutes ago, carpoa said:

    Just to be 100% sure:

    The offset of the class would be the pointer class in this case correct?
    image.png

    So 0x32B87DC 0x14 (example)

    Nope, pointer not offset.

    If you wanna hack field in ida, try find somewhere like

    str w9, [x19, #0x10]
    register w9 hold your coin, find at the top somewhere write the value in w9

  3. 2 minutes ago, Siiera117 said:

    Also for anyone having the same problem as me (cheat won’t work), follow these steps

    1. Install sideloadly and set it up on your pc

    2. Download the top troops .ipa from armconverter.com/decryptedappstore

    3. Download the tweak

    4. Import the top troops .ipa to sideloadly, click advanced options and import the .deb file you downloaded 

    5. Click export ipa

    6. Send the modified ipa to your phone through WeTransfer

    7. Download the modified ipa from your WeTransfer and install with TrollStore 

    @tien0246maybe add this to the mod description or pin this idk 

    Thank you

    • Like 1
  4. 1. Yes
    2. I gusse it is offset in stack, skip it
    3. No, you must use pointer class + 0x10

    void (*old_PersistentPlayerUpdate)(void* _this) = nil;
    void PersistentPlayerUpdate(void* _this) {
       old_PersistentPlayerUpdate(_this);
       if ([menu isSwitchWithIdentifierActive:@"currency"]) {
         void *playerData = *(void **)((uint64_t)_this + 0x18);
         void *Container = *(void **)((uint64_t)playerData + 0x30);
         void *Player = *(void **)((uint64_t)Container + 0x10);
         void *player = *(void **)((uint64_t)Player + 0x10);
        *(int *)((uint64_t)player + 0x134) = 999999999;
        *(int *)((uint64_t)player + 0x138) = 999999999;
        *(int *)((uint64_t)player + 0x13C) = 999999999;
        *(int *)((uint64_t)player + 0x140) = 999999999;
      }
    }

    MSHookFunction((void *)getRealOffset(APEncryptHex(0x013BE034)), (void *)PersistentPlayerUpdate, (void **)&old_PersistentPlayerUpdate);

    • Like 2
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines