Jump to content

Help with disabling _syscall


Go to solution Solved by Aswag1,

36 posts in this topic

Recommended Posts

Posted

I know that already, this is one of the first forums I've signed up with. I know how to use GDB to find offsets in IDA and I know how to patch a binary. My first hack was a savegame for COD: BOZ for v1.3.3, I already learned MS, MSHook, and I'm doing IDA and code inject (writeData) right now and I'm working on Dead Trigger 2 but decided to take a break and do this because I get angry very easily lol

 

so im not really a beginner ;)

 

@ 

@

sorry u were new thats why i thought that! ok then keep it up bro

haha worked for me in bia3 too :p

hack it or i will :p

Posted

I'm using a 5S by the way

 

I've never worked with disabling _syscall and _dlsym before so this is pretty hard, and I can't figure this out. I know that NOP'ing a BLX or any branch would result in a crash, so I stayed away from that. I xref'ed to operand for _dlsym and it gave me this:

 

__text:00648B04 loc_648B04                              ; CODE XREF: sub_648A04+D8j

__text:00648B04                 LDR             R0, [sP,#0x70+var_1C]
__text:00648B06                 BL              sub_649168
__text:00648B0A                 MOVS            R2, #1
__text:00648B10                 MOV             R1, #(_objc_msgSend_ptr - 0x648B1C)
__text:00648B18                 ADD             R1, PC ; _objc_msgSend_ptr
__text:00648B1A                 LDR             R1, [R1] ; __imp__objc_msgSend
__text:00648B1C                 MOV             R3, #(selRef_cStringUsingEncoding_ - 0x648B28)
__text:00648B24                 ADD             R3, PC ; selRef_cStringUsingEncoding_
__text:00648B26                 STR             R0, [sP,#0x70+var_2C]
__text:00648B28                 LDR             R0, [sP,#0x70+var_2C]
__text:00648B2A                 LDR.W           R9, [sP,#0x70+var_20]
__text:00648B2E                 LDR             R3, [R3] ; "cStringUsingEncoding:"
__text:00648B30                 STR             R0, [sP,#0x70+handle]
__text:00648B32                 MOV             R0, R9
__text:00648B34                 STR             R1, [sP,#0x70+var_50]
__text:00648B36                 MOV             R1, R3
__text:00648B38                 LDR             R3, [sP,#0x70+var_50]
__text:00648B3A                 BLX             R3
__text:00648B3C                 LDR             R1, [sP,#0x70+handle]
__text:00648B3E                 STR             R0, [sP,#0x70+symbol]
__text:00648B40                 MOV             R0, R1  ; handle 
__text:00648B42                 LDR             R1, [sP,#0x70+symbol] ; symbol
__text:00648B44                 BLX             _dlsym
__text:00648B48                 MOV             R1, #(_objc_msgSend_ptr - 0x648B54)
__text:00648B50                 ADD             R1, PC ; _objc_msgSend_ptr
__text:00648B52                 LDR             R1, [R1] ; __imp__objc_msgSend
__text:00648B54                 MOV             R2, R1
__text:00648B56                 MOV             R3, #(selRef_setObject_forKey_ - 0x648B62)
__text:00648B5E                 ADD             R3, PC ; selRef_setObject_forKey_
__text:00648B60                 MOV             R9, #(selRef_valueWithPointer_ - 0x648B6C)
__text:00648B68                 ADD             R9, PC ; selRef_valueWithPointer_
__text:00648B6A                 MOV             R12, #(classRef_NSValue - 0x648B76)
__text:00648B72                 ADD             R12, PC ; classRef_NSValue
__text:00648B74                 MOV             LR, #(dword_B062A4 - 0x648B80)
__text:00648B7C                 ADD             LR, PC ; dword_B062A4
__text:00648B7E                 STR             R0, [sP,#0x70+var_30]
__text:00648B80                 LDR.W           R0, [LR]
__text:00648B84                 LDR.W           R12, [R12] ; _OBJC_CLASS_$_NSValue
__text:00648B88                 LDR.W           LR, [sP,#0x70+var_30]
__text:00648B8C                 LDR.W           R9, [R9] ; "valueWithPointer:"
__text:00648B90                 STR             R0, [sP,#0x70+var_58]
__text:00648B92                 MOV             R0, R12
__text:00648B94                 STR             R1, [sP,#0x70+var_5C]
__text:00648B96                 MOV             R1, R9
__text:00648B98                 STR             R2, [sP,#0x70+var_60]
__text:00648B9A                 MOV             R2, LR
__text:00648B9C                 LDR.W           R9, [sP,#0x70+var_5C]
__text:00648BA0                 STR             R3, [sP,#0x70+var_64]
__text:00648BA2                 BLX             R9
__text:00648BA4                 LDR             R1, [sP,#0x70+var_24]
__text:00648BA6                 LDR             R2, [sP,#0x70+var_64]
__text:00648BA8                 LDR             R3, [R2]
__text:00648BAA                 LDR.W           R9, [sP,#0x70+var_58]
__text:00648BAE                 STR             R0, [sP,#0x70+var_68]
__text:00648BB0                 MOV             R0, R9
__text:00648BB2                 STR             R1, [sP,#0x70+var_6C]
__text:00648BB4                 MOV             R1, R3
__text:00648BB6                 LDR             R2, [sP,#0x70+var_68]
__text:00648BB8                 LDR             R3, [sP,#0x70+var_6C]
__text:00648BBA                 LDR.W           R9, [sP,#0x70+var_60]
__text:00648BBE                 BLX             R9
__text:00648BC0                 LDR             R0, [sP,#0x70+var_30]
__text:00648BC2                 STR             R0, [sP,#0x70+var_18]
 
And I was not really sure about what to do with any of this. I feel like changing these four lines would do the trick, but I really have no idea what to change them to.
 
__text:00648B3C                 LDR             R1, [sP,#0x70+handle]
__text:00648B3E                 STR             R0, [sP,#0x70+symbol]
__text:00648B40                 MOV             R0, R1  ; handle 
__text:00648B42                 LDR             R1, [sP,#0x70+symbol] ; symbol
__text:00648B44                 BLX             _dlsym ----> I wouldn't change this, I just put it there for clarity.
 
So, not knowing really what to do there I xref'ed to operand loc_648B04 and got this:
 
__text:00648A50 loc_648A50                              ; CODE XREF: sub_648A04+1Ej
__text:00648A50                                         ; sub_648A04:loc_648A4Ej
__text:00648A50                 MOVS            R0, #0
__text:00648A56                 MOV             R1, #(_objc_msgSend_ptr - 0x648A62)
__text:00648A5E                 ADD             R1, PC ; _objc_msgSend_ptr
__text:00648A60                 LDR             R1, [R1] ; __imp__objc_msgSend
__text:00648A62                 MOV             R2, R1
__text:00648A64                 MOV             R3, #(selRef_objectForKey_ - 0x648A70)
__text:00648A6C                 ADD             R3, PC ; selRef_objectForKey_
__text:00648A6E                 MOV             R9, #(dword_B062A4 - 0x648A7A)
__text:00648A76                 ADD             R9, PC ; dword_B062A4
__text:00648A78                 MOV             R12, #(stru_AE58E0 - 0x648A84) ; "%@:%@"
__text:00648A80                 ADD             R12, PC ; "%@:%@"
__text:00648A82                 MOV             LR, #(selRef_stringWithFormat_ - 0x648A8E)
__text:00648A8A                 ADD             LR, PC ; selRef_stringWithFormat_
__text:00648A8C                 MOV             R4, #(classRef_NSString - 0x648A98)
__text:00648A94                 ADD             R4, PC ; classRef_NSString
__text:00648A96                 LDR             R4, [R4] ; _OBJC_CLASS_$_NSString
__text:00648A98                 LDR             R5, [sP,#0x70+var_1C]
__text:00648A9A                 LDR             R6, [sP,#0x70+var_20]
__text:00648A9C                 LDR.W           LR, [LR] ; "stringWithFormat:"
__text:00648AA0                 STR             R0, [sP,#0x70+var_34]
__text:00648AA2                 MOV             R0, R4
__text:00648AA4                 STR             R1, [sP,#0x70+var_38]
__text:00648AA6                 MOV             R1, LR
__text:00648AA8                 STR             R2, [sP,#0x70+var_3C]
__text:00648AAA                 MOV             R2, R12
__text:00648AAC                 STR             R3, [sP,#0x70+var_40]
__text:00648AAE                 MOV             R3, R5
__text:00648AB0                 STR             R6, [sP,#0x70+var_70]
__text:00648AB2                 LDR.W           R12, [sP,#0x70+var_38]
__text:00648AB6                 STR.W           R9, [sP,#0x70+var_44]
__text:00648ABA                 BLX             R12
__text:00648ABC                 STR             R0, [sP,#0x70+var_24]
__text:00648ABE                 LDR             R0, [sP,#0x70+var_44]
__text:00648AC0                 LDR             R1, [R0]
__text:00648AC2                 LDR             R2, [sP,#0x70+var_24]
__text:00648AC4                 LDR             R3, [sP,#0x70+var_40]
__text:00648AC6                 LDR.W           R9, [R3]
__text:00648ACA                 MOV             R0, R1
__text:00648ACC                 MOV             R1, R9
__text:00648ACE                 LDR.W           R9, [sP,#0x70+var_3C]
__text:00648AD2                 BLX             R9
__text:00648AD4                 STR             R0, [sP,#0x70+var_28]
__text:00648AD6                 LDR             R0, [sP,#0x70+var_28]
__text:00648AD8                 LDR             R1, [sP,#0x70+var_34]
__text:00648ADA                 CMP             R0, R1
__text:00648ADC                 BEQ             loc_648B04
__text:00648ADE                 MOV             R0, #(_objc_msgSend_ptr - 0x648AEA)
__text:00648AE6                 ADD             R0, PC ; _objc_msgSend_ptr
__text:00648AE8                 LDR             R0, [R0] ; __imp__objc_msgSend
__text:00648AEA                 MOV             R1, #(selRef_pointerValue - 0x648AF6)
__text:00648AF2                 ADD             R1, PC ; selRef_pointerValue
__text:00648AF4                 LDR             R2, [sP,#0x70+var_28]
__text:00648AF6                 LDR             R1, [R1] ; "pointerValue"
__text:00648AF8                 STR             R0, [sP,#0x70+var_48]
__text:00648AFA                 MOV             R0, R2
__text:00648AFC                 LDR             R2, [sP,#0x70+var_48]
__text:00648AFE                 BLX             R2
__text:00648B00                 STR             R0, [sP,#0x70+var_18]
__text:00648B02                 B               loc_648BC4
 

I'm pretty sure that these lines mean to

 

__text:00648AD4                 STR             R0, [sP,#0x70+var_28] ----> store the value of R0 into SP+70+var_28

__text:00648AD6                 LDR             R0, [sP,#0x70+var_28] ----> load SP+70+var_28 into R0
__text:00648AD8                 LDR             R1, [sP,#0x70+var_34] ----> load SP+70+var_34 into R1
__text:00648ADA                 CMP             R0, R1 ----> compare R1 with R0
__text:00648ADC                 BEQ             loc_648B04 ----> branch if equal to loc_648B04
 
I changed CMP R0, R1 to CMP R0, #0 to at least try to make it false and CMP R0, R7 because I know it would never be equal to 800 million. I'm used to having to set MOVS R1, #0x1F to MOVS R1, #0x00 to make this work, not all of this stuff.
 
@@Laxus you said that you got it to work, would you be able to send me a binary with all of this stuff disabled? And I have a 5S, would that affect anything?
 
Thanks everyone for trying to help, I really appreciate it :)
Posted

 

I'm using a 5S by the way

 

I've never worked with disabling _syscall and _dlsym before so this is pretty hard, and I can't figure this out. I know that NOP'ing a BLX or any branch would result in a crash, so I stayed away from that. I xref'ed to operand for _dlsym and it gave me this:

 

__text:00648B04 loc_648B04 ; CODE XREF: sub_648A04+D8j

__text:00648B04 LDR R0, [sP,#0x70+var_1C]

__text:00648B06 BL sub_649168

__text:00648B0A MOVS R2, #1

__text:00648B10 MOV R1, #(_objc_msgSend_ptr - 0x648B1C)

__text:00648B18 ADD R1, PC ; _objc_msgSend_ptr

__text:00648B1A LDR R1, [R1] ; __imp__objc_msgSend

__text:00648B1C MOV R3, #(selRef_cStringUsingEncoding_ - 0x648B28)

__text:00648B24 ADD R3, PC ; selRef_cStringUsingEncoding_

__text:00648B26 STR R0, [sP,#0x70+var_2C]

__text:00648B28 LDR R0, [sP,#0x70+var_2C]

__text:00648B2A LDR.W R9, [sP,#0x70+var_20]

__text:00648B2E LDR R3, [R3] ; "cStringUsingEncoding:"

__text:00648B30 STR R0, [sP,#0x70+handle]

__text:00648B32 MOV R0, R9

__text:00648B34 STR R1, [sP,#0x70+var_50]

__text:00648B36 MOV R1, R3

__text:00648B38 LDR R3, [sP,#0x70+var_50]

__text:00648B3A BLX R3

__text:00648B3C LDR R1, [sP,#0x70+handle]

__text:00648B3E STR R0, [sP,#0x70+symbol]

__text:00648B40 MOV R0, R1 ; handle

__text:00648B42 LDR R1, [sP,#0x70+symbol] ; symbol

__text:00648B44 BLX _dlsym

__text:00648B48 MOV R1, #(_objc_msgSend_ptr - 0x648B54)

__text:00648B50 ADD R1, PC ; _objc_msgSend_ptr

__text:00648B52 LDR R1, [R1] ; __imp__objc_msgSend

__text:00648B54 MOV R2, R1

__text:00648B56 MOV R3, #(selRef_setObject_forKey_ - 0x648B62)

__text:00648B5E ADD R3, PC ; selRef_setObject_forKey_

__text:00648B60 MOV R9, #(selRef_valueWithPointer_ - 0x648B6C)

__text:00648B68 ADD R9, PC ; selRef_valueWithPointer_

__text:00648B6A MOV R12, #(classRef_NSValue - 0x648B76)

__text:00648B72 ADD R12, PC ; classRef_NSValue

__text:00648B74 MOV LR, #(dword_B062A4 - 0x648B80)

__text:00648B7C ADD LR, PC ; dword_B062A4

__text:00648B7E STR R0, [sP,#0x70+var_30]

__text:00648B80 LDR.W R0, [LR]

__text:00648B84 LDR.W R12, [R12] ; _OBJC_CLASS_$_NSValue

__text:00648B88 LDR.W LR, [sP,#0x70+var_30]

__text:00648B8C LDR.W R9, [R9] ; "valueWithPointer:"

__text:00648B90 STR R0, [sP,#0x70+var_58]

__text:00648B92 MOV R0, R12

__text:00648B94 STR R1, [sP,#0x70+var_5C]

__text:00648B96 MOV R1, R9

__text:00648B98 STR R2, [sP,#0x70+var_60]

__text:00648B9A MOV R2, LR

__text:00648B9C LDR.W R9, [sP,#0x70+var_5C]

__text:00648BA0 STR R3, [sP,#0x70+var_64]

__text:00648BA2 BLX R9

__text:00648BA4 LDR R1, [sP,#0x70+var_24]

__text:00648BA6 LDR R2, [sP,#0x70+var_64]

__text:00648BA8 LDR R3, [R2]

__text:00648BAA LDR.W R9, [sP,#0x70+var_58]

__text:00648BAE STR R0, [sP,#0x70+var_68]

__text:00648BB0 MOV R0, R9

__text:00648BB2 STR R1, [sP,#0x70+var_6C]

__text:00648BB4 MOV R1, R3

__text:00648BB6 LDR R2, [sP,#0x70+var_68]

__text:00648BB8 LDR R3, [sP,#0x70+var_6C]

__text:00648BBA LDR.W R9, [sP,#0x70+var_60]

__text:00648BBE BLX R9

__text:00648BC0 LDR R0, [sP,#0x70+var_30]

__text:00648BC2 STR R0, [sP,#0x70+var_18]

 

And I was not really sure about what to do with any of this. I feel like changing these four lines would do the trick, but I really have no idea what to change them to.

 

__text:00648B3C LDR R1, [sP,#0x70+handle]

__text:00648B3E STR R0, [sP,#0x70+symbol]

__text:00648B40 MOV R0, R1 ; handle

__text:00648B42 LDR R1, [sP,#0x70+symbol] ; symbol

__text:00648B44 BLX _dlsym ----> I wouldn't change this, I just put it there for clarity.

 

So, not knowing really what to do there I xref'ed to operand loc_648B04 and got this:

 

__text:00648A50 loc_648A50 ; CODE XREF: sub_648A04+1Ej

__text:00648A50 ; sub_648A04:loc_648A4Ej

__text:00648A50 MOVS R0, #0

__text:00648A56 MOV R1, #(_objc_msgSend_ptr - 0x648A62)

__text:00648A5E ADD R1, PC ; _objc_msgSend_ptr

__text:00648A60 LDR R1, [R1] ; __imp__objc_msgSend

__text:00648A62 MOV R2, R1

__text:00648A64 MOV R3, #(selRef_objectForKey_ - 0x648A70)

__text:00648A6C ADD R3, PC ; selRef_objectForKey_

__text:00648A6E MOV R9, #(dword_B062A4 - 0x648A7A)

__text:00648A76 ADD R9, PC ; dword_B062A4

__text:00648A78 MOV R12, #(stru_AE58E0 - 0x648A84) ; "%@:%@"

__text:00648A80 ADD R12, PC ; "%@:%@"

__text:00648A82 MOV LR, #(selRef_stringWithFormat_ - 0x648A8E)

__text:00648A8A ADD LR, PC ; selRef_stringWithFormat_

__text:00648A8C MOV R4, #(classRef_NSString - 0x648A98)

__text:00648A94 ADD R4, PC ; classRef_NSString

__text:00648A96 LDR R4, [R4] ; _OBJC_CLASS_$_NSString

__text:00648A98 LDR R5, [sP,#0x70+var_1C]

__text:00648A9A LDR R6, [sP,#0x70+var_20]

__text:00648A9C LDR.W LR, [LR] ; "stringWithFormat:"

__text:00648AA0 STR R0, [sP,#0x70+var_34]

__text:00648AA2 MOV R0, R4

__text:00648AA4 STR R1, [sP,#0x70+var_38]

__text:00648AA6 MOV R1, LR

__text:00648AA8 STR R2, [sP,#0x70+var_3C]

__text:00648AAA MOV R2, R12

__text:00648AAC STR R3, [sP,#0x70+var_40]

__text:00648AAE MOV R3, R5

__text:00648AB0 STR R6, [sP,#0x70+var_70]

__text:00648AB2 LDR.W R12, [sP,#0x70+var_38]

__text:00648AB6 STR.W R9, [sP,#0x70+var_44]

__text:00648ABA BLX R12

__text:00648ABC STR R0, [sP,#0x70+var_24]

__text:00648ABE LDR R0, [sP,#0x70+var_44]

__text:00648AC0 LDR R1, [R0]

__text:00648AC2 LDR R2, [sP,#0x70+var_24]

__text:00648AC4 LDR R3, [sP,#0x70+var_40]

__text:00648AC6 LDR.W R9, [R3]

__text:00648ACA MOV R0, R1

__text:00648ACC MOV R1, R9

__text:00648ACE LDR.W R9, [sP,#0x70+var_3C]

__text:00648AD2 BLX R9

__text:00648AD4 STR R0, [sP,#0x70+var_28]

__text:00648AD6 LDR R0, [sP,#0x70+var_28]

__text:00648AD8 LDR R1, [sP,#0x70+var_34]

__text:00648ADA CMP R0, R1

__text:00648ADC BEQ loc_648B04

__text:00648ADE MOV R0, #(_objc_msgSend_ptr - 0x648AEA)

__text:00648AE6 ADD R0, PC ; _objc_msgSend_ptr

__text:00648AE8 LDR R0, [R0] ; __imp__objc_msgSend

__text:00648AEA MOV R1, #(selRef_pointerValue - 0x648AF6)

__text:00648AF2 ADD R1, PC ; selRef_pointerValue

__text:00648AF4 LDR R2, [sP,#0x70+var_28]

__text:00648AF6 LDR R1, [R1] ; "pointerValue"

__text:00648AF8 STR R0, [sP,#0x70+var_48]

__text:00648AFA MOV R0, R2

__text:00648AFC LDR R2, [sP,#0x70+var_48]

__text:00648AFE BLX R2

__text:00648B00 STR R0, [sP,#0x70+var_18]

__text:00648B02 B loc_648BC4

 

I'm pretty sure that these lines mean to

 

__text:00648AD4 STR R0, [sP,#0x70+var_28] ----> store the value of R0 into SP+70+var_28

__text:00648AD6 LDR R0, [sP,#0x70+var_28] ----> load SP+70+var_28 into R0

__text:00648AD8 LDR R1, [sP,#0x70+var_34] ----> load SP+70+var_34 into R1

__text:00648ADA CMP R0, R1 ----> compare R1 with R0

__text:00648ADC BEQ loc_648B04 ----> branch if equal to loc_648B04

 

I changed CMP R0, R1 to CMP R0, #0 to at least try to make it false and CMP R0, R7 because I know it would never be equal to 800 million. I'm used to having to set MOVS R1, #0x1F to MOVS R1, #0x00 to make this work, not all of this stuff.

 

@@Laxus you said that you got it to work, would you be able to send me a binary with all of this stuff disabled? And I have a 5S, would that affect anything?

 

Thanks everyone for trying to help, I really appreciate it :)

Nop try this C046C046 done :)

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • Matching Story v1.57.02 [ +6 Cheats ] Auto Win
      Modded/Hacked App: Matching Story By VERTEX GAMES PTE. LTD.
      Bundle ID: matching.story
      iTunes Store Link: https://apps.apple.com/ph/app/matching-story/id1558803930?uo=4


      🤩 Hack Features

      - Auto Win

      - Coins

      - Diamonds [ Win Match Linked With Moves ]

      - Lives

      - Booster

      - Moves
      • 89 replies
    • Matching Story v1.57.02 [ +6 Jailed ] Auto Win
      Modded/Hacked App: Matching Story By VERTEX GAMES PTE. LTD.
      Bundle ID: matching.story
      iTunes Store Link: https://apps.apple.com/ph/app/matching-story/id1558803930?uo=4

       
      🤩 Hack Features

      - Auto Win

      - Coins

      - Diamonds [ Win Match Linked With Moves ]

      - Lives

      - Booster

      - Moves
      • 88 replies
    • Dawn of Ages: Medieval Games v2.7.1 +5 Jailed Cheats [ Damage & Defence ]
      Modded/Hacked App: Dawn of Ages: total war battle By BoomBit, Inc.
      Bundle ID: com.stratospheregames.dawnofages
      App Store Link: https://apps.apple.com/us/app/dawn-of-ages-total-war-battle/id6477473268?uo=4

       


      🤩 Hack Features

      - Damage Multiplier
      - Defence Multiplier
      - God Mode
      - Dumb Enemy
      - Premium Enabled
        • Winner
      • 122 replies
    • Soul Hero: Rise of Summoner v0.7.7 +4 Cheats
      Mod APK Game Name: Soul Hero Rise of Summoner By MGIF 
      Rooted Device: Not Required.
      Google Play Store Link: https://play.google.com/store/apps/details?id=com.soul.hunter.strike.legend.slayer.afk.idle

       

      🤩 Hack Features

      - Damage Multiplier
      - Never Die
      - Currencies Multiplier
      - No ADS

       

      ⬇️ Android Mod APK Download Link


      Hidden Content

      Download Modded APK







       

      📖 Android Installation Instructions

      STEP 1: Download the modded APK file from the link above using your preferred Android browser or download manager.
      STEP 2: Once the download is complete, open your file manager and locate the downloaded .apk file (usually in the Downloads folder).
      STEP 3: Tap the APK file, then select Install. If prompted, enable Install from Unknown Sources in your device settings.
      STEP 3A: If the mod includes an OBB file, extract it if it’s inside an archive. Then move the folder to: /Android/obb/
      STEP 3B: If the mod includes a DATA file, extract it if it’s archived. Then move the folder to: /Android/data/
      STEP 4: Once installed, open the game and toggle your desired cheats & features through the APK mod menu. Enjoy!

       

      NOTE: If you have any questions or issues, read our Frequently Asked Questions topic. If you still need help, post your issue below and we’ll assist you as soon as possible. If the mod works for you, please share your feedback to help other members!

       

      🙌 Credits

      - AlyssaX64

       

      📷 Cheat Video/Screenshots

      N/A

       

       iOS & iPadOS App Hacks
      If you’re looking for Non-Jailbroken & No Jailbreak required iOS IPA hacks, visit the iOS Game Cheats & Hacks or the iOSGods App for a variety of modded games and apps for non-jailbroken iOS devices.
      • 1 reply
    • Tasty Travels: Merge Game v47.0 +4 Jailed Cheats [ Unlimited Currencies ]
      Modded/Hacked App: Tasty Travels: Merge Game By Century Games Pte. Ltd.
      Bundle ID: com.fatmerge.global
      iTunes Store Link: https://apps.apple.com/us/app/tasty-travels-merge-game/id6471045672?uo=4

       


      🤩 Hack Features

      - Unlimited Currencies -> Earn some.
      - Unlimited Energy -> Earn some.
      - Unlock Full Board -> In-game, tap the Shop button.*
      - Level Up Once -> In-game, tap the Shop button.*

      * - Only 1 feature can be enabled at once.
      • 57 replies
    • Disney Solitaire v1.12.1 +2++ Jailed Cheats [ Unlimited Everything ]
      Modded/Hacked App: Disney Solitaire By SuperPlay LTD
      Bundle ID: com.superplaystudios.disneysolitairedreams
      iTunes Store Link: https://apps.apple.com/us/app/disney-solitaire/id6475757306?uo=4

       
       

      🤩 Hack Features

      - Unlimited Everything -> Will increase instead of decrease.
      - Free In-App Purchases
      • 51 replies
    • Royal Kingdom v25641 +4 Jailed Cheats [ Coins + More ]
      Modded/Hacked App: Royal Kingdom By Dream Games
      Bundle ID: com.dreamgames.royalkingdom
      iTunes Store Link: https://apps.apple.com/ph/app/royal-kingdom/id1606549505
       

      Hack Features:
      - Freeze Coins
      - Freeze Lives
      - Freeze Boosters
      - Freeze Moves


      Jailbreak required hack(s): [Mod Menu Hack] Royal Kingdom v3987 +4 Cheats [ Unlimited Coins ] - Free Jailbroken Cydia Cheats - iOSGods
      Modded Android APK(s): https://iosgods.com/forum/68-android-section/
      For more fun, check out the Club(s): https://iosgods.com/clubs/
      • 188 replies
    • DRAGON BALL Z DOKKAN BATTLE v5.33.0 +6 Cheats
      Mod APK Game Name: DRAGON BALL Z DOKKAN BATTLE By Bandai Namco Entertainment Inc.
      Rooted Device: Not Required.
      Google Play Store Link: 

       

      🤩 Hack Features

      - Damage Multiplier
      - Freeze HP
      - Weak Enemies
      - Dice 1 , 2 , 3
      - Dokkan Mode
      - Skills Active

       

      ⬇️ Android Mod APK Download Link


      Hidden Content

      Download Modded APK







       

      📖 Android Installation Instructions

      STEP 1: Download the modded APK file from the link above using your preferred Android browser or download manager.
      STEP 2: Once the download is complete, open your file manager and locate the downloaded .apk file (usually in the Downloads folder).
      STEP 3: Tap the APK file, then select Install. If prompted, enable Install from Unknown Sources in your device settings.
      STEP 3A: If the mod includes an OBB file, extract it if it’s inside an archive. Then move the folder to: /Android/obb/
      STEP 3B: If the mod includes a DATA file, extract it if it’s archived. Then move the folder to: /Android/data/
      STEP 4: Once installed, open the game and toggle your desired cheats & features through the APK mod menu. Enjoy!

       

      NOTE: If you have any questions or issues, read our Frequently Asked Questions topic. If you still need help, post your issue below and we’ll assist you as soon as possible. If the mod works for you, please share your feedback to help other members!

       

      🙌 Credits

      - AlyssaX64

       

      📷 Cheat Video/Screenshots

      N/A

       

       iOS & iPadOS App Hacks
      If you’re looking for Non-Jailbroken & No Jailbreak required iOS IPA hacks, visit the iOS Game Cheats & Hacks or the iOSGods App for a variety of modded games and apps for non-jailbroken iOS devices.
      • 14 replies
    • HungryAliens v1508 +5 Cheats
      Mod APK Game Name: HungryAliens By BY4M STUDIO CO.,LTD.
      Rooted Device: Not Required.
      Google Play Store Link: https://play.google.com/store/apps/details?id=com.DetailGames.HungryAliens

       

      🤩 Hack Features

      - Damage Multiplier
      - Never Die
      - Drop Multiplier
      - Game Speed Multiplier
      - No ADS

       

      ⬇️ Android Mod APK Download Link


      Hidden Content

      Download Modded APK







       

      📖 Android Installation Instructions

      STEP 1: Download the modded APK file from the link above using your preferred Android browser or download manager.
      STEP 2: Once the download is complete, open your file manager and locate the downloaded .apk file (usually in the Downloads folder).
      STEP 3: Tap the APK file, then select Install. If prompted, enable Install from Unknown Sources in your device settings.
      STEP 3A: If the mod includes an OBB file, extract it if it’s inside an archive. Then move the folder to: /Android/obb/
      STEP 3B: If the mod includes a DATA file, extract it if it’s archived. Then move the folder to: /Android/data/
      STEP 4: Once installed, open the game and toggle your desired cheats & features through the APK mod menu. Enjoy!

       

      NOTE: If you have any questions or issues, read our Frequently Asked Questions topic. If you still need help, post your issue below and we’ll assist you as soon as possible. If the mod works for you, please share your feedback to help other members!

       

      🙌 Credits

      - AlyssaX64

       

      📷 Cheat Video/Screenshots

      N/A

       

       iOS & iPadOS App Hacks
      If you’re looking for Non-Jailbroken & No Jailbreak required iOS IPA hacks, visit the iOS Game Cheats & Hacks or the iOSGods App for a variety of modded games and apps for non-jailbroken iOS devices.
      • 1 reply
    • Summoners Greed: Idle TD Tower +2 Jailed Cheats
      Modded/Hacked App: Summoners Greed: Tower Defense By PIXIO LIMITED
      Bundle ID: com.pixio.apple.mtd
      iTunes Store Link: https://apps.apple.com/us/app/summoners-greed-tower-defense/id1258027083?uo=4


      Mod Requirements:
      - Non-Jailbroken/Jailed or Jailbroken iPhone/iPad/iPod Touch.
      - Sideloadly / Cydia Impactor or alternatives.
      - A Computer Running Windows/macOS/Linux with iTunes installed.


      Hack Features:
      - Unlimited Currencies → Spend/Gain
      - Dumb Enemies


      Jailbreak required hack(s): 


      iOS Hack Download IPA Link:

      Hidden Content

      Download via the iOSGods App








      PC Installation Instructions:
      STEP 1: If necessary, uninstall the app if you have it installed on your iDevice. Some hacked IPAs will install as a duplicate app. Make sure to back it up so you don't lose your progress.
      STEP 2: Download the pre-hacked .IPA file from the link above to your computer. To download from the iOSGods App, see this tutorial topic.
      STEP 3: Download Sideloadly and install it on your PC.
      STEP 4: Open/Run Sideloadly on your computer, connect your iOS Device, and wait until your device name shows up.
      STEP 5: Once your iDevice appears, drag the modded .IPA file you downloaded and drop it inside the Sideloadly application.
      STEP 6: You will now have to enter your iTunes/Apple ID email login, press "Start" & then you will be asked to enter your password. Go ahead and enter the required information.
      STEP 7: Wait for Sideloadly to finish sideloading/installing the hacked IPA. If there are issues during installation, please read the note below.
      STEP 8: Once the installation is complete and you see the app on your Home Screen, you will need to go to Settings -> General -> Profiles/VPN & Device Management. Once there, tap on the email you entered from step 6, and then tap on 'Trust [email protected]'.
      STEP 9: Now go to your Home Screen and open the newly installed app and everything should work fine. You may need to follow further per app instructions inside the hack's popup in-game.

      NOTE: iOS/iPadOS 16 and later, you must enable Developer Mode. For free Apple Developer accounts, you will need to repeat this process every 7 days. Jailbroken iDevices can also use Sideloadly/Filza/IPA Installer to normally install the IPA with AppSync. If you have any questions or problems, read our Sideloadly FAQ section of the topic and if you don't find a solution, please post your issue down below and we'll do our best to help! If the hack does work for you, post your feedback below and help out other fellow members that are encountering issues.


      Credits:
      - AlyssaX64


      Cheat Video/Screenshots:

      N/A
      • 162 replies
    • Toon Blast +3 Jailed Cheats
      Modded/Hacked App: Toon Blast By Peak Games
      Bundle ID: net.peakgames.toonblast
      iTunes Store Link: https://itunes.apple.com/us/app/toon-blast/id1176027022?mt=8&uo=4&at=1010lce4


      Mod Requirements:
      - Jailbroken or Non-Jailbroken iPhone/iPad/iPod Touch.
      - Cydia Impactor.
      - A Computer Running Windows/Mac/Linux.

      This hack only works on x64 or ARM64 iDevices: iPhone 5s, 6, 6 Plus, 6s, 6s Plus, 7, 7 Plus, 8, 8 Plus, X, SE, iPod Touch 6G, iPad Air, Air 2, Pro & iPad Mini 2, 3, 4 and later.
      Hack Features:
      - Int Coins (get)

      - Boosts (get)


      Jailbreak required hack(s): https://iosgods.com/forum/5-game-cheats-hack-requests/
      Modded Android APK(s): https://iosgods.com/forum/68-android-section/
      For more fun, check out the Club(s): https://iosgods.com/clubs/


      Hack Download Link:

      Hidden Content
      https://app.iosgods.com/store/appdetails/656-toon-blast-hack







      Installation Instructions:
      STEP 1: If necessary, uninstall the app if you have it installed on your iDevice. Some hacked IPAs will install as a duplicate app. Make sure to back it up so you don't lose your progress.
      STEP 2: Download the pre-hacked .IPA file from the link above to your computer.
      STEP 3: Download Cydia Impactor and extract the archive.
      STEP 4: Open/Run Cydia Impactor on your computer then connect your iOS Device and wait until your device name shows up on Cydia Impactor.
      STEP 5: Once your iDevice appears, drag the modded .IPA file you downloaded and drop it inside the Cydia Impactor application.
      STEP 6: You will now be asked to enter your iTunes/Apple ID email login & then your password. Go ahead and enter the required information..
      STEP 7: Wait for Cydia Impactor to finish sideloading/installing the hacked IPA.
      STEP 8: Once the installation is complete and you see the app on your Home Screen, you will now need to go to your Settings -> General -> Profiles & Device Management. Once there, tap on the email you entered from step 6, and then tap on 'Trust [email protected]'.
      STEP 9: Now go to your Home Screen and open the newly installed app and everything should work fine. You may need to follow further instructions inside the hack's popup in-game.
      NOTE: For free Apple Developer accounts you will need to repeat this process every 7 days. Using a disposable Apple ID for this process is suggested but not required. Jailbroken iDevices can skip using Cydia Impactor and just install the IPA mod with AppSync & IPA Installer (or alternatives) from Cydia. If you have any questions or problems, read our Cydia Impactor topic and if you don't find a solution, post your issue down below and we'll do our best to help! If the hack does work for you, post your feedback below and help out other fellow members that are encountering issues.


      Credits:
      - @K_K

      - @Laxus
      Cheat Video/Screenshots:

      N/A

       
        • Agree
      • 1,091 replies
    • Sonic Dash Endless Runner Cheats +4
      Modded/Hacked App: Sonic Dash Endless Runner Game By Sega America
      Bundle ID: com.sega.sonicdash
      iTunes Store Link: https://apps.apple.com/us/app/sonic-dash-endless-runner-game/id582654048?uo=4

       

      Mod Requirements:
      - Non-Jailbroken/Jailed or Jailbroken iPhone/iPad/iPod Touch.
      - Sideloadly / Cydia Impactor or alternatives.
      - A Computer Running Windows/macOS/Linux with iTunes installed.


      Hack Features:
      - Unlimited powerup
      - Unlimted currency
      - Max level
      - Unlock character
      • 65 replies
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines