Jump to content

17 posts in this topic

Recommended Posts

Posted (edited)

Hi all. I was wondering what the best way to find and address the AppGuard/LiAPP detection on a certain app. I was using a decompiler on the UnityFramework file and I also tried using DNSpy for the Assembly file. My issue is:

 

1. I can find a Class for “CheatDetector”  in DNSpy using the assembly file that has a method for LIAPP but im not sure how to address it in the Live Offset program. I tried to NOP the offsets of the functions but nada.

2. I can also find instances in the UnityFramework file where it tries to find paths of common jailbroken thing such as Cydia. 

 

I'm not understanding which I should be addressing given that both show points of interest for detecting JB. Any help would be appreciated. 

Updated by marc726
Format and Misspell fixes. 
  • Like 1
Posted (edited)
On 12/17/2022 at 11:50 PM, marc726 said:

Hi all. I was wondering what the best way to find and address the AppGuard/LiAPP detection on a certain app. I was using a decompiler on the UnityFramework file and I also tried using DNSpy for the Assembly file. My issue is:

 

1. I can find a Class for “CheatDetector”  in DNSpy using the assembly file that has a method for LIAPP but im not sure how to address it in the Live Offset program. I tried to NOP the offsets of the functions but nada.

2. I can also find instances in the UnityFramework file where it tries to find paths of common jailbroken thing such as Cydia. 

 

I'm not understanding which I should be addressing given that both show points of interest for detecting JB. Any help would be appreciated. 

Have you first tried FlyJb X ? 

If you open the game, and enable FlyJb after its useless since the game will store that you are Jailbreak. 

Steps :

1) Delete the game. 

2) Re install it BUT DON'T OPEN IT

3) Open FlyJb and from there, enable ur app. you can use A-bypass if you want, i use FlyJB but use any good alternatives.

4) Open your game 

 

If that didn't work, you probably need to work with DnSpy...

Afaik you can't NOP a class, try to look functions / methods, maybe bool functions store if you are jailbreak or no. 

You can also search for function names containing "jailbreak", "root". 

 

I think the first method should work tbh, but if not good luck for the second one, it's gonna be a lot of work to test them 

Updated by ꞋꞌꞋꞌꞋꞌꞋꞌ
  • Like 1
Posted (edited)
10 hours ago, ꞋꞌꞋꞌꞋꞌꞋꞌ said:

Have you first tried FlyJb X ? 

If you open the game, and enable FlyJb after its useless since the game will store that you are Jailbreak. 

Steps :

1) Delete the game. 

2) Re install it BUT DON'T OPEN IT

3) Open FlyJb and from there, enable LIAPP. you can use A-bypass if you want, i use FlyJB but use any good alternatives.

4) Open your game 

 

If that didn't work, you probably need to work with DnSpy...

Afaik you can't NOP a class, try to look functions / methods, maybe bool functions store if you are jailbreak or no. 

You can also search for function names containing "jailbreak", "root". 

 

I think the first method should work tbh, but if not good luck for the second one, it's gonna be a lot of work to test them 

Unfortunately no known public bypass tweaks works at the moment. The only known bypass is on this site but I wanted to try my hand at it. I think I was able to narrow down the function to something called "_fb_is_jailbroken" thanks to Frida. My problem now is looking at the assembly and figuring out what's what, if there are other calls, etc. 

As for DNSpy, I have the feeling that it's not what I'm looking for. DNSpy does show a class "CheatingDetector"  and it does have a function labeled "onDetectedThreatWithLIAPP()" but it doesn't help me outside of that. 

It's quite the headache for someone who doesn't have experience in assembly or reverse engineering 😪

Here's the list from DNSpy in case you were interested:
 

using System;
using Il2CppDummyDll;

// Token: 0x02000A35 RID: 2613
[Token(Token = "0x2000A35")]
public class CheatingDetector : ManagerSingleton<CheatingDetector>
{
	// Token: 0x06004895 RID: 18581 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004895")]
	[Address(RVA = "0x1D67DFC", Offset = "0x1D67DFC", VA = "0x1D67DFC", Slot = "10")]
	protected override void Awake()
	{
	}

	// Token: 0x06004896 RID: 18582 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004896")]
	[Address(RVA = "0x1D67E50", Offset = "0x1D67E50", VA = "0x1D67E50")]
	public void onDetectedThreatWithLIAPP()
	{
	}

	// Token: 0x06004897 RID: 18583 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004897")]
	[Address(RVA = "0x1D67E58", Offset = "0x1D67E58", VA = "0x1D67E58")]
	public void OnCheaterDetected(int DBBABCBBDCBDBCDDBDDBCCB)
	{
	}

	// Token: 0x06004898 RID: 18584 RVA: 0x00010A10 File Offset: 0x0000EC10
	[Token(Token = "0x6004898")]
	[Address(RVA = "0x1D6808C", Offset = "0x1D6808C", VA = "0x1D6808C")]
	public ValueTuple<bool, string> CheckCheat()
	{
		return default(ValueTuple<bool, string>);
	}

	// Token: 0x06004899 RID: 18585 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004899")]
	[Address(RVA = "0x1D68804", Offset = "0x1D68804", VA = "0x1D68804")]
	public void SaveChatBlockTime(string ACDABDBDABCCACBABDCDCDC, int BBDBBBDCBBDCCABCAACAABC)
	{
	}

	// Token: 0x0600489A RID: 18586 RVA: 0x00010A28 File Offset: 0x0000EC28
	[Token(Token = "0x600489A")]
	[Address(RVA = "0x1D6839C", Offset = "0x1D6839C", VA = "0x1D6839C")]
	public ValueTuple<bool, bool> CheckReport(string ACDABDBDABCCACBABDCDCDC)
	{
		return default(ValueTuple<bool, bool>);
	}

	// Token: 0x0600489B RID: 18587 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x600489B")]
	[Address(RVA = "0x1D68970", Offset = "0x1D68970", VA = "0x1D68970")]
	public CheatingDetector()
	{
	}
}

 

Updated by marc726
  • Informative 1
Posted
3 hours ago, marc726 said:

Unfortunately no known public bypass tweaks works at the moment. The only known bypass is on this site but I wanted to try my hand at it. I think I was able to narrow down the function to something called "_fb_is_jailbroken" thanks to Frida. My problem now is looking at the assembly and figuring out what's what, if there are other calls, etc. 

As for DNSpy, I have the feeling that it's not what I'm looking for. DNSpy does show a class "CheatingDetector"  and it does have a function labeled "onDetectedThreatWithLIAPP()" but it doesn't help me outside of that. 

It's quite the headache for someone who doesn't have experience in assembly or reverse engineering 😪

Here's the list from DNSpy in case you were interested:
 

using System;
using Il2CppDummyDll;

// Token: 0x02000A35 RID: 2613
[Token(Token = "0x2000A35")]
public class CheatingDetector : ManagerSingleton<CheatingDetector>
{
	// Token: 0x06004895 RID: 18581 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004895")]
	[Address(RVA = "0x1D67DFC", Offset = "0x1D67DFC", VA = "0x1D67DFC", Slot = "10")]
	protected override void Awake()
	{
	}

	// Token: 0x06004896 RID: 18582 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004896")]
	[Address(RVA = "0x1D67E50", Offset = "0x1D67E50", VA = "0x1D67E50")]
	public void onDetectedThreatWithLIAPP()
	{
	}

	// Token: 0x06004897 RID: 18583 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004897")]
	[Address(RVA = "0x1D67E58", Offset = "0x1D67E58", VA = "0x1D67E58")]
	public void OnCheaterDetected(int DBBABCBBDCBDBCDDBDDBCCB)
	{
	}

	// Token: 0x06004898 RID: 18584 RVA: 0x00010A10 File Offset: 0x0000EC10
	[Token(Token = "0x6004898")]
	[Address(RVA = "0x1D6808C", Offset = "0x1D6808C", VA = "0x1D6808C")]
	public ValueTuple<bool, string> CheckCheat()
	{
		return default(ValueTuple<bool, string>);
	}

	// Token: 0x06004899 RID: 18585 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x6004899")]
	[Address(RVA = "0x1D68804", Offset = "0x1D68804", VA = "0x1D68804")]
	public void SaveChatBlockTime(string ACDABDBDABCCACBABDCDCDC, int BBDBBBDCBBDCCABCAACAABC)
	{
	}

	// Token: 0x0600489A RID: 18586 RVA: 0x00010A28 File Offset: 0x0000EC28
	[Token(Token = "0x600489A")]
	[Address(RVA = "0x1D6839C", Offset = "0x1D6839C", VA = "0x1D6839C")]
	public ValueTuple<bool, bool> CheckReport(string ACDABDBDABCCACBABDCDCDC)
	{
		return default(ValueTuple<bool, bool>);
	}

	// Token: 0x0600489B RID: 18587 RVA: 0x00002050 File Offset: 0x00000250
	[Token(Token = "0x600489B")]
	[Address(RVA = "0x1D68970", Offset = "0x1D68970", VA = "0x1D68970")]
	public CheatingDetector()
	{
	}
}

 

Mhhh i am not sure that this class is usefull for JB détection...

It seems dealing with "real cheat" but, if it's whatever dealing with JB, i would NOP / RET all of theses meth/functions.

All of them have obfuscated parameters, it's hard to know with what it's dealing. and also, ive search for this class online and it seems to be private, there is no documentation from Unity3D about it...

  • Informative 1
Posted
1 hour ago, ꞋꞌꞋꞌꞋꞌꞋꞌ said:

Mhhh i am not sure that this class is usefull for JB détection...

It seems dealing with "real cheat" but, if it's whatever dealing with JB, i would NOP / RET all of theses meth/functions.

All of them have obfuscated parameters, it's hard to know with what it's dealing. and also, ive search for this class online and it seems to be private, there is no documentation from Unity3D about it...

Yea, NOP RET all functions in that class still gets LIAPP called on me. I'm honestly stumped. I'm guessing the check lies in the UnityFramework file somewhere. Frida points to fb_is_jailbroken

 

C:\Users\%%%%\AppData\Local\Programs\Python\Python311\Scripts>frida-trace -U -i "*jail*" -n "Random Dice"
Instrumenting...
fb_is_jailbroken: Loaded handler at "C:\\Users\\%%%%\\AppData\\Local\\Programs\\Python\\Python311\\Scripts\\__handlers__\\UnityFramework\\fb_is_jailbroken.js"
_Z24replaced_jailbreakStatusP11objc_objectP13objc_selectori: Loaded handler at "C:\\Users\\%%%%%\\AppData\\Local\\Programs\\Python\\Python311\\Scripts\\__handlers__\\zzzzzLiberty.dylib\\_Z24replaced_jailbreakStatusP11o_658fd25a.js"
Started tracing 2 functions. Press Ctrl+C to stop.
Process terminated

 

and Ghidra shows 

 

                             **************************************************************
                             *                          FUNCTION                          *
                             **************************************************************
                             bool __cdecl _fb_is_jailbroken(ID param_1, SEL param_2)
             bool              w0:4           <RETURN>
             ID                x0:8           param_1
             SEL               x1:8           param_2
             undefined8        Stack[-0x10]:8 local_10                                XREF[2]:     006adce8(W), 
                                                                                                   006add08(*)  
                             _fb_is_jailbroken                               XREF[2]:     Entry Point(*), 
                                                                                          isJailBrokenDevice:005966fc(T), 
                                                                                          isJailBrokenDevice:005966fc(j)  
        006adce8 fd 7b bf a9     stp        x29,x30,[sp, #local_10]!
        006adcec fd 03 00 91     mov        x29,sp
        006adcf0 68 4d 02 d0     adrp       x8,0x505b000
        006adcf4 08 31 45 f9     ldr        x8,[x8, #0xa60]=>DAT_0505ba60                    = ??
        006adcf8 1f 05 00 b1     cmn        x8,#0x1
        006adcfc a1 00 00 54     b.ne       LAB_006add10
                             LAB_006add00                                    XREF[1]:     006add24(j)  
        006add00 68 4d 02 d0     adrp       x8,0x505b000
        006add04 00 61 69 39     ldrb       param_1,[x8, #0xa58]=>DAT_0505ba58               = ??
        006add08 fd 7b c1 a8     ldp        x29=>local_10,x30,[sp], #0x10
        006add0c c0 03 5f d6     ret
                             LAB_006add10                                    XREF[1]:     006adcfc(j)  
        006add10 60 4d 02 d0     adrp       param_1,0x505b000
        006add14 00 80 29 91     add        param_1=>DAT_0505ba60,param_1,#0xa60             = ??
        006add18 41 20 02 f0     adrp       param_2,0x4ab8000
        006add1c 21 40 02 91     add        param_2=>PTR_LOOP_04ab8090,param_2,#0x90         = 048a0778
        006add20 74 32 e3 94     bl         __stubs::_dispatch_once                          undefined _dispatch_once()
        006add24 f7 ff ff 17     b          LAB_006add00


Decomplier shows 

 

bool _fb_is_jailbroken(ID param_1,SEL param_2)

{
  if (DAT_0505ba60 != -1) {
    __stubs::_dispatch_once(&DAT_0505ba60,&PTR_LOOP_04ab8090);
  }
  return (bool)DAT_0505ba58;
}

 

which represents the entire function. 

  • Informative 1
Posted (edited)

Mhh it seems to be acting like this :

bool _fb_is_jailbroken(ID param_1,SEL param_2) {
  if (the check has determine that your device is JB) {
    alert("your device is JB");
    return true;
  }
  return false;
}

(my analysis only)

I would return false. As i said, i think the class CheatDetection is useless, i think it uses other thing to determine if jailbreak or not. Have you checked method names containing Jaibreak/root keywords ?

Updated by ꞋꞌꞋꞌꞋꞌꞋꞌ
  • Agree 1
Posted (edited)
On 12/22/2022 at 6:43 AM, ꞋꞌꞋꞌꞋꞌꞋꞌ said:

Mhh it seems to be acting like this :

bool _fb_is_jailbroken(ID param_1,SEL param_2) {
  if (the check has determine that your device is JB) {
    alert("your device is JB");
    return true;
  }
  return false;
}

(my analysis only)

I would return false. As i said, i think the class CheatDetection is useless, i think it uses other thing to determine if jailbreak or not. Have you checked method names containing Jaibreak/root keywords ?

I'm so sorry I didn't see your reply! 

I tried to change address 006add08 to:

mov x30,#0x0
ret
 

since the complier showed no arguments for the ret function at 006add0c, I assume it returns the register at x30. As told here https://developer.arm.com/documentation/dui0802/a/A64-General-Instructions/RET
I am still met with the LIAPP screen after about 15 seconds. 

I agree with the CheatDetection class and I'm going to eliminate any chance DNSpy can show me the answer. Also the game is Random Dice Defense. 

Updated by marc726
  • Like 1
Posted
25 minutes ago, marc726 said:

I'm so sorry I didn't see your reply! 

I tried to change address 006add08 to:

mov x30,#0x0
ret
 

since the complier showed no arguments for the ret function at 006add0c, I assume it returns the register at x30. As told here https://developer.arm.com/documentation/dui0802/a/A64-General-Instructions/RET
I am still met with the LIAPP screen after about 15 seconds. 

I agree with the CheatDetection class and I'm going to eliminate any chance DNSpy can show me the answer. Also the game is Random Dice Defense. 

have you tried to search for the strings that the pop up shows inside iDA string view ?

 

  • Like 1
Posted
2 hours ago, ꞋꞌꞋꞌꞋꞌꞋꞌ said:

have you tried to search for the strings that the pop up shows inside iDA string view ?

 

M1qiVoz.jpg

This is the message I get. I search for instances of "JP1" "Appguard" "shut down" "security policy" but no results except irrelevant results for the last two.

  • Like 1
Posted (edited)
10 hours ago, marc726 said:

/cdn-cgi/mirage/41ff1f68243607f4e9ea12c2548c6d54d43598dd57117816f22e2d670dcc8f0b/1280/https://i.imgur.com/M1qiVoz.jpg

This is the message I get. I search for instances of "JP1" "Appguard" "shut down" "security policy" but no results except irrelevant results for the last two.

mhhh then they encrypted the strings... well i have no idear about what you try atm... :sad:

maybe in this case just navigate to all namespaces and classes trough the .dll using DnSpy, but this takes a lot of time 

Updated by ꞋꞌꞋꞌꞋꞌꞋꞌ
  • Like 1

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • [ JP / Global/ KR] Puzzle & Dragons Cheats v22.5.1 +3
      Modded/Hacked App: Puzzle & Dragons (English) by GungHo Online Entertainment, INC.
      Bundle ID: jp.gungho.padEN
      iTunes Store Link: https://apps.apple.com/us/app/puzzle-dragons-english/id563474464?uo=4&at=1010lce4


      Hack Features:
      - God Mode
      - OHK
      - Frozen Enemies


      iOS Hack Download Link: https://iosgods.com/topic/133984-puzzle-dragons-jp-english-cheats-all-versions-3/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 471 replies
    • Subway Surfers Cheats v3.49.11 +5
      Modded/Hacked App: Subway Surfers By Sybo Games ApS
      Bundle ID: com.kiloo.subwaysurfers
      iTunes Store Link: https://apps.apple.com/us/app/subway-surfers/id512939461?uo=4

       

      📌 Mod Requirements

      - Jailbroken iPhone or iPad.
      - iGameGod / Filza / iMazing.
      - Cydia Substrate, ElleKit, Substitute or libhooker depending on your jailbreak (from Sileo, Cydia or Zebra).

       

      🤩 Hack Features

      - Free Store (not Free iAP)
      - Free iAP (ViP Only)
      - Unlock Characters Outfit
      - Custom Jump Height
      - No Clip (To end level swipe to left til you get dizzy, swipe again and you will lose)

       

      Non-Jailbroken Hack: https://iosgods.com/topic/119795-subway-surfers-v3425-jailed-cheats-5/

       

      ⬇️ iOS Hack Download Link: https://iosgods.com/topic/119793-subway-surfers-cheats-v3430-5/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 2,338 replies
    • MWT: Tank Battles v1.10.0 Jailed Cheats +5
      Modded/Hacked App: MWT: Tank Battles By ARTSTORM FZE
      Bundle ID: com.Shooter.ModernWarfront
      iTunes Store Link: https://apps.apple.com/us/app/mwt-tank-battles/id6469805187?uo=4


      Hack Features:
      - Multiply Attack
      - Multiply Defense
      - God Mode
      - Freeze Boosters
      - Free Subscription?
      + 10% EXP
      + 50% Cash / Gold


      iOS Hack Download IPA Link: https://iosgods.com/topic/188441-mwt-tank-battles-v121-jailed-cheats-5/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 146 replies
    • BASEBALL 9 v3.7.7 +1 Cheats for Jailed iDevices!
      Modded/Hacked App: BASEBALL 9 By playus soft
      Bundle ID: us.kr.baseballnine
      App Store Link: https://apps.apple.com/us/app/baseball-9/id1340866223?uo=4

       

      📌 Mod Requirements

      - Non-Jailbroken/Jailed or Jailbroken iPhone or iPad.
      - Sideloadly or alternatives.
      - Computer running Windows/macOS/Linux with iTunes installed.

       

      🤩 Hack Features

      - Infinite Currencies

       

      Jailbroken Hack: https://iosgods.com/topic/136094-baseball-9-cheats-v371-1/

       

      ⬇️ iOS Hack Download IPA Link: https://iosgods.com/topic/82460-baseball-9-v371-1-cheats-for-jailed-idevices/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 1,546 replies
    • [Hack] DRAGON BALL Z DOKKAN BATTLE v5.28.6 +3 Cheats! [iOS 18/26]
      Modded/Hacked App: DRAGON BALL Z DOKKAN BATTLE by BANDAI NAMCO Entertainment Inc.
      Bundle ID: jp.co.bandainamcogames.BNGI0221
      iTunes Store Link: https://itunes.apple.com/us/app/dragon-ball-z-dokkan-battle/id951627425


      Hack Features:
      - High Damage
      - High Defense
      - High HP

       

      Jailbroken hack: https://iosgods.com/topic/26098-updated-dragon-ball-z-dokkan-battle-v312-3-cheats/
      DRAGON BALL Z DOKKAN BATTLE Discussions Club: https://iosgods.com/clubs/23-dragon-ball-z-dokkan-battle-club/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 1,687 replies
    • DRAGON BALL Z DOKKAN BATTLE v5.28.6 +3 Cheats!
      [Updated] DRAGON BALL Z DOKKAN BATTLE Cheats!
      Modded/Hacked App: DRAGON BALL Z DOKKAN BATTLE By BANDAI NAMCO Entertainment Inc.
      Bundle ID: jp.co.bandainamcogames.BNGI0221
      iTunes Link: https://itunes.apple.com/us/app/dragon-ball-z-dokkan-battle/id951627425


      Hack Features:
      - Unlimited HP - (Put .0 at the back of your value: 1111.0)
      - Unlimited Damage - (Put .0 at the back of your value: 1111.0)
      - Unlimited Defense - (Put .0 at the back of your value: 1111.0)
      - Dice Hack
      - Auto Win Battles
      PUT .0 at the back of all values!

      Dice hack doesn't work for tournaments, not recommended to use during one
      Auto Win HIGH RISK OF BAN when used in tournaments

      ViP Version: https://iosgods.com/topic/48201-dragon-ball-z-dokkan-battle-v311-5-cheats-ips4-celebration/
      Non-Jailbroken Version: https://iosgods.com/forum/78-vip-non-jailbroken-hacks-cheats/
      DRAGON BALL Z DOKKAN BATTLE Discussions Club: https://iosgods.com/clubs/23-dragon-ball-z-dokkan-battle-club/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 13,270 replies
    • DRAGON BALL Z DOKKAN BATTLE v5.28.6 +7 Cheats [ iOS 17/18/26 Support ]
      Modded/Hacked App: DRAGON BALL Z DOKKAN BATTLE By BANDAI NAMCO Entertainment Inc.
      Bundle ID: jp.co.bandainamcogames.BNGI0221
      iTunes Link: https://itunes.apple.com/us/app/dragon-ball-z-dokkan-battle/id951627425


      Hack Requirements:
      - Jailbroken iPhone/iPad/iPod Touch.
      - iFile / Filza / iFunBox / iTools or any other file managers for iOS.
      - Cydia Substrate (from Cydia).
      - PreferenceLoader (from Cydia).


      Hack Features:
      - Unlimited HP  -  (Put .0 at the back of your value: 1000.0)<br style="color:#555555">- Unlimited Damage  -  (Put .0 at the back of your value: 1000.0)<br style="color:#555555">- Unlimited Defense  -  (Put .0 at the back of your value: 1000.0)<br style="color:#555555">- Dice Hack -  [ONLY RANGE BETWEEN 1 - 6 or it will crash]  -  (Put .0 at the back of your value: 4.0)
      - Dice Hack 1, 2, 3
      - Dice Hack 4, 5, 6
      - Auto Win Battles

      Non-Jailbroken version of this hack: https://iosgods.com/topic/37875-hack-dragon-ball-z-dokkan-battle-v2120-3-cheats-ios-10/
      Free version of this hack: https://iosgods.com/topic/26098-updated-dragon-ball-z-dokkan-battle-v330-3-cheats/
      DRAGON BALL Z DOKKAN BATTLE Discussions Club: https://iosgods.com/clubs/23-dragon-ball-z-dokkan-battle-club/


      Hack Download Link:
      https://iosgods.com/topic/48201-dragon-ball-z-dokkan-battle-v331-7-cheats-ips4-celebration/

      Credits:
      - @ZahirSher
      - @DiDA
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 2,423 replies
    • DRAGON BALL Z DOKKAN BATTLE Japan v5.28.6 +3 Cheats for Non-Jailbroken!
      Modded/Hacked App: ドラゴンボールZ ドッカンバトル by BANDAI NAMCO Entertainment Inc.
      Bundle ID: jp.co.bandainamcogames.BNGI0211
      iTunes Store Link: https://itunes.apple.com/jp/app/%E3%83%89%E3%83%A9%E3%82%B4%E3%83%B3%E3%83%9C%E3%83%BC%E3%83%ABz-%E3%83%89%E3%83%83%E3%82%AB%E3%83%B3%E3%83%90%E3%83%88%E3%83%AB/id951627670?mt=8&uo=4&at=1010lce4

      Hack Features
      - Unlimited HP
      - Unlimited Defense
      - Unlimited Attack


      Jailbroken version of this hack: https://iosgods.com/topic/26099-draon-ball-z-dokkan-battle-japan-ドラゴンボールz-ドッカンバトル-v351-7-cheats/
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 546 replies
    • DRAGON BALL Z DOKKAN BATTLE Japan (ドラゴンボールZ ドッカンバトル) v5.28.6 +7 Cheats!
      Modded/Hacked App: ドラゴンボールZ ドッカンバトル By BANDAI NAMCO Entertainment Inc.
      Bundle ID: jp.co.bandainamcogames.BNGI0211
      iTunes Link: https://itunes.apple.com/jp/app/ドラゴンボールz-ドッカンバトル/id951627670


      Hack Features
      - Unlimited HP  -  (Put .0 at the back of your value: 1000.0)
      - Unlimited Damage  -  (Put .0 at the back of your value: 1000.0)
      - Unlimited Defense  -  (Put .0 at the back of your value: 1000.0)
      - Dice Hack -  [ONLY RANGE BETWEEN 1 - 6 or it will crash]  -  (Put .0 at the back of your value: 4.0)
      - Dice Hack 1, 2, 3
      - Dice Hack 4, 5, 6
      - Auto Win Battles -> Disable if you get errors.
      PUT .0 at the back of all values!
        • Informative
        • Agree
        • Haha
        • Thanks
        • Winner
        • Like
      • 7,994 replies
    • Dawn of Ages: Medieval Games v2.1.2 +5 Jailed Cheats [ Damage & Defence ]
      Modded/Hacked App: Dawn of Ages: total war battle By BoomBit, Inc.
      Bundle ID: com.stratospheregames.dawnofages
      App Store Link: https://apps.apple.com/us/app/dawn-of-ages-total-war-battle/id6477473268?uo=4

       


      🤩 Hack Features

      - Damage Multiplier
      - Defence Multiplier
      - God Mode
      - Dumb Enemy
      - Premium Enabled
        • Agree
        • Winner
        • Like
      • 27 replies
    • Dawn of Ages: Medieval Games v2.1.2 +5 Cheats [ Damage & Defence ]
      Modded/Hacked App: Dawn of Ages: total war battle By BoomBit, Inc.
      Bundle ID: com.stratospheregames.dawnofages
      App Store Link: https://apps.apple.com/us/app/dawn-of-ages-total-war-battle/id6477473268?uo=4

       

      📌 Mod Requirements

      - Jailbroken iPhone or iPad.
      - iGameGod / Filza / iMazing.
      - Cydia Substrate, ElleKit, Substitute or libhooker depending on your jailbreak (from Sileo, Cydia or Zebra).

       

      🤩 Hack Features

      - Damage Multiplier
      - Defence Multiplier
      - God Mode
      - Dumb Enemy
      - Premium Enabled

       

      ⬇️ iOS Hack Download Link


      Hidden Content

      Download Hack







       

      📖 iOS Installation Instructions

      STEP 1: Download the .deb hack file from the link above. Use Safari, Google Chrome or other iOS browsers to download.
      STEP 2: Once the file has downloaded, tap on it and then you will be prompted on whether you want to open the deb with iGameGod or copy it to Filza.
      STEP 3: If needed, tap on the downloaded file again, then select ‘Normal Install’ from the options on your screen.
      STEP 4: Let iGameGod/Filza finish the cheat installation. If it doesn’t install successfully, see the note below.
      STEP 5: Open the game, log in to your iOSGods account when asked, then toggle on the features you want and enjoy!

       

      NOTE: If you have any questions or problems, read our Jailbreak iOS Hack Troubleshooting & Frequently Asked Questions & Answers topic. If you still haven't found a solution, post your issue below and we'll do our best to help! If the hack does work for you, please post your feedback below and help out other fellow members that are encountering issues.

       

      🙌 Credits

      - @Puddin
      - @Laxus

       

      📷 Cheat Video/Screenshots

      N/A

       

      More iOS App Hacks
      If you’re looking for Non-Jailbroken & No Jailbreak required iOS IPA hacks, visit the iOS Game Cheats & Hacks or the iOSGods App for a variety of modded games and apps for non-jailbroken iOS devices.

      Modded Android APKs
      Need modded apps or games for Android? Check out the latest custom APK mods, cheats & more in our Android Section.
        • Agree
        • Thanks
        • Winner
        • Like
      • 37 replies
    • Punch TV v2507.28 +5 Jailed Cheats [ Damage & Defence ]
      Modded/Hacked App: Punch TV By Four Fats Limited
      Bundle ID: com.fourfats.punchTV
      App Store Link: https://apps.apple.com/us/app/punch-tv/id6477147072?uo=4

       
       

      🤩 Hack Features

      - Freeze Coins

      VIP
      - Damage Multiplier
      - Defence Multiplier
      - God Mode
      - Unlimited Coins -> Earn some.
        • Winner
        • Like
      • 10 replies
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines