Jump to content

8,948 posts in this topic

Recommended Posts

Posted (edited)
2 hours ago, mrlaugh01 said:

From Korgo:

to bypass JB detection for v2.0.0 patch 0xC0035FD6 at offset  0x102AD2A48

For those who have never done it like myself. Is there any guide or tutorial on how we can do this? Thanks for the info though! 

Updated by calal01
Spelling mistake
Posted
4 minutes ago, calal01 said:

For those who have never done it like myself. Is there any guide or tutorial on how we can do this? Thanks for the info though! 

I’m also interested 

Posted
5 minutes ago, calal01 said:

For those who have never done it like myself. Is there any guide or tutorial on how we can do this? Thanks for the info though! 

I too would like to know.  I just saw it posted in the request post and figured I repost it here. 

Posted
30 minutes ago, mrlaugh01 said:

I too would like to know.  I just saw it posted in the request post and figured I repost it here. 

Same, I think you use the iOSGods live offset patcher but I don’t know how to inject it, what’s the binary name for this app?

Posted
14 minutes ago, yungnig said:

Same, I think you use the iOSGods live offset patcher but I don’t know how to inject it, what’s the binary name for this app?

 com.nintendo.zaka

Guest
This topic is now closed to further replies.
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines