Jump to content

Help with disabling _syscall


Go to solution Solved by Aswag1,

36 posts in this topic

Recommended Posts

Posted

I know that already, this is one of the first forums I've signed up with. I know how to use GDB to find offsets in IDA and I know how to patch a binary. My first hack was a savegame for COD: BOZ for v1.3.3, I already learned MS, MSHook, and I'm doing IDA and code inject (writeData) right now and I'm working on Dead Trigger 2 but decided to take a break and do this because I get angry very easily lol

 

so im not really a beginner ;)

 

@ 

@

sorry u were new thats why i thought that! ok then keep it up bro

haha worked for me in bia3 too :p

hack it or i will :p

Posted

I'm using a 5S by the way

 

I've never worked with disabling _syscall and _dlsym before so this is pretty hard, and I can't figure this out. I know that NOP'ing a BLX or any branch would result in a crash, so I stayed away from that. I xref'ed to operand for _dlsym and it gave me this:

 

__text:00648B04 loc_648B04                              ; CODE XREF: sub_648A04+D8j

__text:00648B04                 LDR             R0, [sP,#0x70+var_1C]
__text:00648B06                 BL              sub_649168
__text:00648B0A                 MOVS            R2, #1
__text:00648B10                 MOV             R1, #(_objc_msgSend_ptr - 0x648B1C)
__text:00648B18                 ADD             R1, PC ; _objc_msgSend_ptr
__text:00648B1A                 LDR             R1, [R1] ; __imp__objc_msgSend
__text:00648B1C                 MOV             R3, #(selRef_cStringUsingEncoding_ - 0x648B28)
__text:00648B24                 ADD             R3, PC ; selRef_cStringUsingEncoding_
__text:00648B26                 STR             R0, [sP,#0x70+var_2C]
__text:00648B28                 LDR             R0, [sP,#0x70+var_2C]
__text:00648B2A                 LDR.W           R9, [sP,#0x70+var_20]
__text:00648B2E                 LDR             R3, [R3] ; "cStringUsingEncoding:"
__text:00648B30                 STR             R0, [sP,#0x70+handle]
__text:00648B32                 MOV             R0, R9
__text:00648B34                 STR             R1, [sP,#0x70+var_50]
__text:00648B36                 MOV             R1, R3
__text:00648B38                 LDR             R3, [sP,#0x70+var_50]
__text:00648B3A                 BLX             R3
__text:00648B3C                 LDR             R1, [sP,#0x70+handle]
__text:00648B3E                 STR             R0, [sP,#0x70+symbol]
__text:00648B40                 MOV             R0, R1  ; handle 
__text:00648B42                 LDR             R1, [sP,#0x70+symbol] ; symbol
__text:00648B44                 BLX             _dlsym
__text:00648B48                 MOV             R1, #(_objc_msgSend_ptr - 0x648B54)
__text:00648B50                 ADD             R1, PC ; _objc_msgSend_ptr
__text:00648B52                 LDR             R1, [R1] ; __imp__objc_msgSend
__text:00648B54                 MOV             R2, R1
__text:00648B56                 MOV             R3, #(selRef_setObject_forKey_ - 0x648B62)
__text:00648B5E                 ADD             R3, PC ; selRef_setObject_forKey_
__text:00648B60                 MOV             R9, #(selRef_valueWithPointer_ - 0x648B6C)
__text:00648B68                 ADD             R9, PC ; selRef_valueWithPointer_
__text:00648B6A                 MOV             R12, #(classRef_NSValue - 0x648B76)
__text:00648B72                 ADD             R12, PC ; classRef_NSValue
__text:00648B74                 MOV             LR, #(dword_B062A4 - 0x648B80)
__text:00648B7C                 ADD             LR, PC ; dword_B062A4
__text:00648B7E                 STR             R0, [sP,#0x70+var_30]
__text:00648B80                 LDR.W           R0, [LR]
__text:00648B84                 LDR.W           R12, [R12] ; _OBJC_CLASS_$_NSValue
__text:00648B88                 LDR.W           LR, [sP,#0x70+var_30]
__text:00648B8C                 LDR.W           R9, [R9] ; "valueWithPointer:"
__text:00648B90                 STR             R0, [sP,#0x70+var_58]
__text:00648B92                 MOV             R0, R12
__text:00648B94                 STR             R1, [sP,#0x70+var_5C]
__text:00648B96                 MOV             R1, R9
__text:00648B98                 STR             R2, [sP,#0x70+var_60]
__text:00648B9A                 MOV             R2, LR
__text:00648B9C                 LDR.W           R9, [sP,#0x70+var_5C]
__text:00648BA0                 STR             R3, [sP,#0x70+var_64]
__text:00648BA2                 BLX             R9
__text:00648BA4                 LDR             R1, [sP,#0x70+var_24]
__text:00648BA6                 LDR             R2, [sP,#0x70+var_64]
__text:00648BA8                 LDR             R3, [R2]
__text:00648BAA                 LDR.W           R9, [sP,#0x70+var_58]
__text:00648BAE                 STR             R0, [sP,#0x70+var_68]
__text:00648BB0                 MOV             R0, R9
__text:00648BB2                 STR             R1, [sP,#0x70+var_6C]
__text:00648BB4                 MOV             R1, R3
__text:00648BB6                 LDR             R2, [sP,#0x70+var_68]
__text:00648BB8                 LDR             R3, [sP,#0x70+var_6C]
__text:00648BBA                 LDR.W           R9, [sP,#0x70+var_60]
__text:00648BBE                 BLX             R9
__text:00648BC0                 LDR             R0, [sP,#0x70+var_30]
__text:00648BC2                 STR             R0, [sP,#0x70+var_18]
 
And I was not really sure about what to do with any of this. I feel like changing these four lines would do the trick, but I really have no idea what to change them to.
 
__text:00648B3C                 LDR             R1, [sP,#0x70+handle]
__text:00648B3E                 STR             R0, [sP,#0x70+symbol]
__text:00648B40                 MOV             R0, R1  ; handle 
__text:00648B42                 LDR             R1, [sP,#0x70+symbol] ; symbol
__text:00648B44                 BLX             _dlsym ----> I wouldn't change this, I just put it there for clarity.
 
So, not knowing really what to do there I xref'ed to operand loc_648B04 and got this:
 
__text:00648A50 loc_648A50                              ; CODE XREF: sub_648A04+1Ej
__text:00648A50                                         ; sub_648A04:loc_648A4Ej
__text:00648A50                 MOVS            R0, #0
__text:00648A56                 MOV             R1, #(_objc_msgSend_ptr - 0x648A62)
__text:00648A5E                 ADD             R1, PC ; _objc_msgSend_ptr
__text:00648A60                 LDR             R1, [R1] ; __imp__objc_msgSend
__text:00648A62                 MOV             R2, R1
__text:00648A64                 MOV             R3, #(selRef_objectForKey_ - 0x648A70)
__text:00648A6C                 ADD             R3, PC ; selRef_objectForKey_
__text:00648A6E                 MOV             R9, #(dword_B062A4 - 0x648A7A)
__text:00648A76                 ADD             R9, PC ; dword_B062A4
__text:00648A78                 MOV             R12, #(stru_AE58E0 - 0x648A84) ; "%@:%@"
__text:00648A80                 ADD             R12, PC ; "%@:%@"
__text:00648A82                 MOV             LR, #(selRef_stringWithFormat_ - 0x648A8E)
__text:00648A8A                 ADD             LR, PC ; selRef_stringWithFormat_
__text:00648A8C                 MOV             R4, #(classRef_NSString - 0x648A98)
__text:00648A94                 ADD             R4, PC ; classRef_NSString
__text:00648A96                 LDR             R4, [R4] ; _OBJC_CLASS_$_NSString
__text:00648A98                 LDR             R5, [sP,#0x70+var_1C]
__text:00648A9A                 LDR             R6, [sP,#0x70+var_20]
__text:00648A9C                 LDR.W           LR, [LR] ; "stringWithFormat:"
__text:00648AA0                 STR             R0, [sP,#0x70+var_34]
__text:00648AA2                 MOV             R0, R4
__text:00648AA4                 STR             R1, [sP,#0x70+var_38]
__text:00648AA6                 MOV             R1, LR
__text:00648AA8                 STR             R2, [sP,#0x70+var_3C]
__text:00648AAA                 MOV             R2, R12
__text:00648AAC                 STR             R3, [sP,#0x70+var_40]
__text:00648AAE                 MOV             R3, R5
__text:00648AB0                 STR             R6, [sP,#0x70+var_70]
__text:00648AB2                 LDR.W           R12, [sP,#0x70+var_38]
__text:00648AB6                 STR.W           R9, [sP,#0x70+var_44]
__text:00648ABA                 BLX             R12
__text:00648ABC                 STR             R0, [sP,#0x70+var_24]
__text:00648ABE                 LDR             R0, [sP,#0x70+var_44]
__text:00648AC0                 LDR             R1, [R0]
__text:00648AC2                 LDR             R2, [sP,#0x70+var_24]
__text:00648AC4                 LDR             R3, [sP,#0x70+var_40]
__text:00648AC6                 LDR.W           R9, [R3]
__text:00648ACA                 MOV             R0, R1
__text:00648ACC                 MOV             R1, R9
__text:00648ACE                 LDR.W           R9, [sP,#0x70+var_3C]
__text:00648AD2                 BLX             R9
__text:00648AD4                 STR             R0, [sP,#0x70+var_28]
__text:00648AD6                 LDR             R0, [sP,#0x70+var_28]
__text:00648AD8                 LDR             R1, [sP,#0x70+var_34]
__text:00648ADA                 CMP             R0, R1
__text:00648ADC                 BEQ             loc_648B04
__text:00648ADE                 MOV             R0, #(_objc_msgSend_ptr - 0x648AEA)
__text:00648AE6                 ADD             R0, PC ; _objc_msgSend_ptr
__text:00648AE8                 LDR             R0, [R0] ; __imp__objc_msgSend
__text:00648AEA                 MOV             R1, #(selRef_pointerValue - 0x648AF6)
__text:00648AF2                 ADD             R1, PC ; selRef_pointerValue
__text:00648AF4                 LDR             R2, [sP,#0x70+var_28]
__text:00648AF6                 LDR             R1, [R1] ; "pointerValue"
__text:00648AF8                 STR             R0, [sP,#0x70+var_48]
__text:00648AFA                 MOV             R0, R2
__text:00648AFC                 LDR             R2, [sP,#0x70+var_48]
__text:00648AFE                 BLX             R2
__text:00648B00                 STR             R0, [sP,#0x70+var_18]
__text:00648B02                 B               loc_648BC4
 

I'm pretty sure that these lines mean to

 

__text:00648AD4                 STR             R0, [sP,#0x70+var_28] ----> store the value of R0 into SP+70+var_28

__text:00648AD6                 LDR             R0, [sP,#0x70+var_28] ----> load SP+70+var_28 into R0
__text:00648AD8                 LDR             R1, [sP,#0x70+var_34] ----> load SP+70+var_34 into R1
__text:00648ADA                 CMP             R0, R1 ----> compare R1 with R0
__text:00648ADC                 BEQ             loc_648B04 ----> branch if equal to loc_648B04
 
I changed CMP R0, R1 to CMP R0, #0 to at least try to make it false and CMP R0, R7 because I know it would never be equal to 800 million. I'm used to having to set MOVS R1, #0x1F to MOVS R1, #0x00 to make this work, not all of this stuff.
 
@@Laxus you said that you got it to work, would you be able to send me a binary with all of this stuff disabled? And I have a 5S, would that affect anything?
 
Thanks everyone for trying to help, I really appreciate it :)
Posted

 

I'm using a 5S by the way

 

I've never worked with disabling _syscall and _dlsym before so this is pretty hard, and I can't figure this out. I know that NOP'ing a BLX or any branch would result in a crash, so I stayed away from that. I xref'ed to operand for _dlsym and it gave me this:

 

__text:00648B04 loc_648B04 ; CODE XREF: sub_648A04+D8j

__text:00648B04 LDR R0, [sP,#0x70+var_1C]

__text:00648B06 BL sub_649168

__text:00648B0A MOVS R2, #1

__text:00648B10 MOV R1, #(_objc_msgSend_ptr - 0x648B1C)

__text:00648B18 ADD R1, PC ; _objc_msgSend_ptr

__text:00648B1A LDR R1, [R1] ; __imp__objc_msgSend

__text:00648B1C MOV R3, #(selRef_cStringUsingEncoding_ - 0x648B28)

__text:00648B24 ADD R3, PC ; selRef_cStringUsingEncoding_

__text:00648B26 STR R0, [sP,#0x70+var_2C]

__text:00648B28 LDR R0, [sP,#0x70+var_2C]

__text:00648B2A LDR.W R9, [sP,#0x70+var_20]

__text:00648B2E LDR R3, [R3] ; "cStringUsingEncoding:"

__text:00648B30 STR R0, [sP,#0x70+handle]

__text:00648B32 MOV R0, R9

__text:00648B34 STR R1, [sP,#0x70+var_50]

__text:00648B36 MOV R1, R3

__text:00648B38 LDR R3, [sP,#0x70+var_50]

__text:00648B3A BLX R3

__text:00648B3C LDR R1, [sP,#0x70+handle]

__text:00648B3E STR R0, [sP,#0x70+symbol]

__text:00648B40 MOV R0, R1 ; handle

__text:00648B42 LDR R1, [sP,#0x70+symbol] ; symbol

__text:00648B44 BLX _dlsym

__text:00648B48 MOV R1, #(_objc_msgSend_ptr - 0x648B54)

__text:00648B50 ADD R1, PC ; _objc_msgSend_ptr

__text:00648B52 LDR R1, [R1] ; __imp__objc_msgSend

__text:00648B54 MOV R2, R1

__text:00648B56 MOV R3, #(selRef_setObject_forKey_ - 0x648B62)

__text:00648B5E ADD R3, PC ; selRef_setObject_forKey_

__text:00648B60 MOV R9, #(selRef_valueWithPointer_ - 0x648B6C)

__text:00648B68 ADD R9, PC ; selRef_valueWithPointer_

__text:00648B6A MOV R12, #(classRef_NSValue - 0x648B76)

__text:00648B72 ADD R12, PC ; classRef_NSValue

__text:00648B74 MOV LR, #(dword_B062A4 - 0x648B80)

__text:00648B7C ADD LR, PC ; dword_B062A4

__text:00648B7E STR R0, [sP,#0x70+var_30]

__text:00648B80 LDR.W R0, [LR]

__text:00648B84 LDR.W R12, [R12] ; _OBJC_CLASS_$_NSValue

__text:00648B88 LDR.W LR, [sP,#0x70+var_30]

__text:00648B8C LDR.W R9, [R9] ; "valueWithPointer:"

__text:00648B90 STR R0, [sP,#0x70+var_58]

__text:00648B92 MOV R0, R12

__text:00648B94 STR R1, [sP,#0x70+var_5C]

__text:00648B96 MOV R1, R9

__text:00648B98 STR R2, [sP,#0x70+var_60]

__text:00648B9A MOV R2, LR

__text:00648B9C LDR.W R9, [sP,#0x70+var_5C]

__text:00648BA0 STR R3, [sP,#0x70+var_64]

__text:00648BA2 BLX R9

__text:00648BA4 LDR R1, [sP,#0x70+var_24]

__text:00648BA6 LDR R2, [sP,#0x70+var_64]

__text:00648BA8 LDR R3, [R2]

__text:00648BAA LDR.W R9, [sP,#0x70+var_58]

__text:00648BAE STR R0, [sP,#0x70+var_68]

__text:00648BB0 MOV R0, R9

__text:00648BB2 STR R1, [sP,#0x70+var_6C]

__text:00648BB4 MOV R1, R3

__text:00648BB6 LDR R2, [sP,#0x70+var_68]

__text:00648BB8 LDR R3, [sP,#0x70+var_6C]

__text:00648BBA LDR.W R9, [sP,#0x70+var_60]

__text:00648BBE BLX R9

__text:00648BC0 LDR R0, [sP,#0x70+var_30]

__text:00648BC2 STR R0, [sP,#0x70+var_18]

 

And I was not really sure about what to do with any of this. I feel like changing these four lines would do the trick, but I really have no idea what to change them to.

 

__text:00648B3C LDR R1, [sP,#0x70+handle]

__text:00648B3E STR R0, [sP,#0x70+symbol]

__text:00648B40 MOV R0, R1 ; handle

__text:00648B42 LDR R1, [sP,#0x70+symbol] ; symbol

__text:00648B44 BLX _dlsym ----> I wouldn't change this, I just put it there for clarity.

 

So, not knowing really what to do there I xref'ed to operand loc_648B04 and got this:

 

__text:00648A50 loc_648A50 ; CODE XREF: sub_648A04+1Ej

__text:00648A50 ; sub_648A04:loc_648A4Ej

__text:00648A50 MOVS R0, #0

__text:00648A56 MOV R1, #(_objc_msgSend_ptr - 0x648A62)

__text:00648A5E ADD R1, PC ; _objc_msgSend_ptr

__text:00648A60 LDR R1, [R1] ; __imp__objc_msgSend

__text:00648A62 MOV R2, R1

__text:00648A64 MOV R3, #(selRef_objectForKey_ - 0x648A70)

__text:00648A6C ADD R3, PC ; selRef_objectForKey_

__text:00648A6E MOV R9, #(dword_B062A4 - 0x648A7A)

__text:00648A76 ADD R9, PC ; dword_B062A4

__text:00648A78 MOV R12, #(stru_AE58E0 - 0x648A84) ; "%@:%@"

__text:00648A80 ADD R12, PC ; "%@:%@"

__text:00648A82 MOV LR, #(selRef_stringWithFormat_ - 0x648A8E)

__text:00648A8A ADD LR, PC ; selRef_stringWithFormat_

__text:00648A8C MOV R4, #(classRef_NSString - 0x648A98)

__text:00648A94 ADD R4, PC ; classRef_NSString

__text:00648A96 LDR R4, [R4] ; _OBJC_CLASS_$_NSString

__text:00648A98 LDR R5, [sP,#0x70+var_1C]

__text:00648A9A LDR R6, [sP,#0x70+var_20]

__text:00648A9C LDR.W LR, [LR] ; "stringWithFormat:"

__text:00648AA0 STR R0, [sP,#0x70+var_34]

__text:00648AA2 MOV R0, R4

__text:00648AA4 STR R1, [sP,#0x70+var_38]

__text:00648AA6 MOV R1, LR

__text:00648AA8 STR R2, [sP,#0x70+var_3C]

__text:00648AAA MOV R2, R12

__text:00648AAC STR R3, [sP,#0x70+var_40]

__text:00648AAE MOV R3, R5

__text:00648AB0 STR R6, [sP,#0x70+var_70]

__text:00648AB2 LDR.W R12, [sP,#0x70+var_38]

__text:00648AB6 STR.W R9, [sP,#0x70+var_44]

__text:00648ABA BLX R12

__text:00648ABC STR R0, [sP,#0x70+var_24]

__text:00648ABE LDR R0, [sP,#0x70+var_44]

__text:00648AC0 LDR R1, [R0]

__text:00648AC2 LDR R2, [sP,#0x70+var_24]

__text:00648AC4 LDR R3, [sP,#0x70+var_40]

__text:00648AC6 LDR.W R9, [R3]

__text:00648ACA MOV R0, R1

__text:00648ACC MOV R1, R9

__text:00648ACE LDR.W R9, [sP,#0x70+var_3C]

__text:00648AD2 BLX R9

__text:00648AD4 STR R0, [sP,#0x70+var_28]

__text:00648AD6 LDR R0, [sP,#0x70+var_28]

__text:00648AD8 LDR R1, [sP,#0x70+var_34]

__text:00648ADA CMP R0, R1

__text:00648ADC BEQ loc_648B04

__text:00648ADE MOV R0, #(_objc_msgSend_ptr - 0x648AEA)

__text:00648AE6 ADD R0, PC ; _objc_msgSend_ptr

__text:00648AE8 LDR R0, [R0] ; __imp__objc_msgSend

__text:00648AEA MOV R1, #(selRef_pointerValue - 0x648AF6)

__text:00648AF2 ADD R1, PC ; selRef_pointerValue

__text:00648AF4 LDR R2, [sP,#0x70+var_28]

__text:00648AF6 LDR R1, [R1] ; "pointerValue"

__text:00648AF8 STR R0, [sP,#0x70+var_48]

__text:00648AFA MOV R0, R2

__text:00648AFC LDR R2, [sP,#0x70+var_48]

__text:00648AFE BLX R2

__text:00648B00 STR R0, [sP,#0x70+var_18]

__text:00648B02 B loc_648BC4

 

I'm pretty sure that these lines mean to

 

__text:00648AD4 STR R0, [sP,#0x70+var_28] ----> store the value of R0 into SP+70+var_28

__text:00648AD6 LDR R0, [sP,#0x70+var_28] ----> load SP+70+var_28 into R0

__text:00648AD8 LDR R1, [sP,#0x70+var_34] ----> load SP+70+var_34 into R1

__text:00648ADA CMP R0, R1 ----> compare R1 with R0

__text:00648ADC BEQ loc_648B04 ----> branch if equal to loc_648B04

 

I changed CMP R0, R1 to CMP R0, #0 to at least try to make it false and CMP R0, R7 because I know it would never be equal to 800 million. I'm used to having to set MOVS R1, #0x1F to MOVS R1, #0x00 to make this work, not all of this stuff.

 

@@Laxus you said that you got it to work, would you be able to send me a binary with all of this stuff disabled? And I have a 5S, would that affect anything?

 

Thanks everyone for trying to help, I really appreciate it :)

Nop try this C046C046 done :)

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Our picks

    • Stone Age Survival-Tribal Game v2.1.0 [+3 Cheats]
      Modded/Hacked App: Stone Age Survival-Tribal Game By HYPERCELL SIA
      Bundle ID: com.stone.age.game
      iTunes Store Link: https://apps.apple.com/us/app/stone-age-survival-tribal-game/id6742344241?uo=4
       

      🤩 Hack Features

      - Unlimited Currency (Enable and Spend or Earn)
      - Never Die
      - Get IAP (Enable and you get NoAds, Starter pack)
      • 3 replies
    • Stone Age Survival-Tribal Game v2.1.0 [+3 Jailed Cheats]
      Modded/Hacked App: Stone Age Survival-Tribal Game By HYPERCELL SIA
      Bundle ID: com.stone.age.game
      iTunes Store Link: https://apps.apple.com/us/app/stone-age-survival-tribal-game/id6742344241?uo=4



      🤩 Hack Features

      - Unlimited Currency (Enable and Spend or Earn)
      - Never Die
      - Get IAP (Enable and you get NoAds, Starter pack)
        • Like
      • 5 replies
    • Margonem Adventures v1.15.1 [+3 Jailed Cheats]
      Modded/Hacked App: Margonem Adventures By GARMORY sp. z o.o. sp. k.
      Bundle ID: pl.Garmory.MargonemAdventures
      iTunes Store Link: https://apps.apple.com/us/app/margonem-adventures/id6444410609?uo=4

       

      🤩 Hack Features

      - Enemy Can't Move
      - Enemy Can't Attack
      - Unlimited Mana
      • 11 replies
    • Margonem Adventures v1.15.1 [+3 Cheats]
      Modded/Hacked App: Margonem Adventures By GARMORY sp. z o.o. sp. k.
      Bundle ID: pl.Garmory.MargonemAdventures
      iTunes Store Link: https://apps.apple.com/us/app/margonem-adventures/id6444410609?uo=4



      🤩 Hack Features

      - Enemy Can't Move
      - Enemy Can't Attack
      - Unlimited Mana
      • 6 replies
    • Go Go Werewolf! v1.2 [+3 Jailed Cheats]
      Modded/Hacked App: Go Go Werewolf! By Dejaime Antonio de Oliveira Neto
      Bundle ID: productions.artcode.ggw
      iTunes Store Link: https://apps.apple.com/us/app/go-go-werewolf/id6739493341?uo=4



      🤩 Hack Features

      - Never Die
      - Free Item Upgrade
      - Unlimited Coins (Enable and Finish Stage)
      • 3 replies
    • Go Go Werewolf! v1.2 [+3 Cheats]
      Modded/Hacked App: Go Go Werewolf! By Dejaime Antonio de Oliveira Neto
      Bundle ID: productions.artcode.ggw
      iTunes Store Link: https://apps.apple.com/us/app/go-go-werewolf/id6739493341?uo=4


      🤩 Hack Features

      - Never Die
      - Free Item Upgrade
      - Unlimited Coins (Enable and Finish Stage)
      • 1 reply
    • Pal Go: Tower Defense TD v0.3.59 [+7 Cheats]
      Modded/Hacked App: Pal Go: Tower Defense TD By Playwind Ltd
      Bundle ID: com.playwindgames.freedefender
      iTunes Store Link: https://apps.apple.com/us/app/pal-go-tower-defense-td/id6479316663?uo=4


       

      🚀 Hack Features

      - [VIP] Freeze Currency (Currency will not decrease when used)

      - [VIP] Currency Always Enough (Buy even when you don't have enough currency)

      - [Free] Higher Recruit Energy (Gives 500 Recruit Energy Every Wave)

      - [Free] Always Can Drag Hero

      - [Free] Skip Ads

      - [Free] No Attack Cooldown

      - [Free] Global Speed Multiplier (Enable Inside Battle)

       

      Warning


      Do not use on main account. There is a chance of ban. Not responsible for any bans.

       


      🍏 For Non-Jailbroken & No Jailbreak required hacks: https://iosgods.com/forum/79-no-jailbreak-section/
      🤖 Modded Android APK(s): https://iosgods.com/forum/68-android-section/
      • 34 replies
    • Pal Go: Tower Defense TD v0.3.59 [+7 Jailed Cheats]
      Modded/Hacked App: Pal Go: Tower Defense TD By Playwind Ltd
      Bundle ID: com.playwindgames.freedefender
      iTunes Store Link: https://apps.apple.com/us/app/pal-go-tower-defense-td/id6479316663?uo=4


       

      Hack Features

      - [VIP] Freeze Currency (Currency will not decrease when used)

      - [VIP] Currency Always Enough (Buy even when you don't have enough currency)

      - [Free] Higher Recruit Energy (Gives 500 Recruit Energy Every Wave)

      - [Free] Always Can Drag Hero

      - [Free] Skip Ads

      - [Free] No Attack Cooldown

      - [Free] Global Speed Multiplier (Enable Inside Battle)

       

      Warning


      Do not use on main account. There is a chance of ban. Not responsible for any bans.

       

      Jailbreak required iOS hacks: https://iosgods.com/forum/5-game-cheats-hack-requests/
      Modded Android APKs: https://iosgods.com/forum/68-android-section/
      • 58 replies
    • Run! Goddess v1.0.9 [+3 Jailed Cheats]
      Modded/Hacked App: Run! Goddess By TOP GAMES INC.
      Bundle ID: com.topgamesinc.rg
      iTunes Store Link: https://apps.apple.com/us/app/run-goddess/id6667111749?uo=4



      🤩 Hack Features

      - No Skill Cooldown
      - Slow Enemy
      - Enemy Can't Attack (Enemy Can't Do Damage)
      • 26 replies
    • Run! Goddess v1.0.9 [+3 Cheats]
      Modded/Hacked App: Run! Goddess By TOP GAMES INC.
      Bundle ID: com.topgamesinc.rg
      iTunes Store Link: https://apps.apple.com/us/app/run-goddess/id6667111749?uo=4

       

      🤩 Hack Features

      - No Skill Cooldown
      - Slow Enemy
      - Enemy Can't Attack (Enemy Can't Do Damage)
       
      • 20 replies
    • AXIS BLADE v1.1.0 +3 cheats [ Dmg x Def ]
      Modded/Hacked App: AXIS BLADE By AWESOMEPIECE<br style="background-color:#1e1f25;color:rgba(255,255,255,0.81);font-size:14px;">
      Bundle ID: com.awesomepiece.axisblade<br style="background-color:#1e1f25;color:rgba(255,255,255,0.81);font-size:14px;">
      iTunes Store Link: https://apps.apple.com/us/app/axis-blade/id6736382225

       

       

       

      📌 Mod Requirements

      - Jailbroken iPhone or iPad.
      - iGameGod / Filza / iMazing.
      - Cydia Substrate, ElleKit, Substitute or libhooker depending on your jailbreak (from Sileo, Cydia or Zebra).

       

      🤩 Hack Features

      - Damage Multiplier
      - Defense Multiplier
      - No Wall Damage

       

      ⬇️ iOS Hack Download Link


      Hidden Content

      Download Hack







       

      📖 iOS Installation Instructions

      STEP 1: Download the .deb hack file from the link above. Use Safari, Google Chrome or other iOS browsers to download.
      STEP 2: Once the file has downloaded, tap on it and then you will be prompted on whether you want to open the deb with iGameGod or copy it to Filza.
      STEP 3: If needed, tap on the downloaded file again, then select ‘Normal Install’ from the options on your screen.
      STEP 4: Let iGameGod/Filza finish the cheat installation. If it doesn’t install successfully, see the note below.
      STEP 5: Open the game, log in to your iOSGods account when asked, then toggle on the features you want and enjoy!

       

      NOTE: If you have any questions or problems, read our Jailbreak iOS Hack Troubleshooting & Frequently Asked Questions & Answers topic. If you still haven't found a solution, post your issue below and we'll do our best to help! If the hack does work for you, please post your feedback below and help out other fellow members that are encountering issues.

       

      🙌 Credits

      - @KyosukeNanbu

       

      More iOS App Hacks
      If you’re looking for Non-Jailbroken & No Jailbreak required iOS IPA hacks, visit the iOS Game Cheats & Hacks or the iOSGods App for a variety of modded games and apps for non-jailbroken iOS devices.

      Modded Android APKs
      Need modded apps or games for Android? Check out the latest custom APK mods, cheats & more in our Android Section.
        • Like
      • 24 replies
    • AXIS BLADE v1.1.0 +3 cheats [ Dmg x Def ]
      Modded/Hacked App: AXIS BLADE By AWESOMEPIECE<br style="background-color:#1e1f25;color:rgba(255,255,255,0.81);font-size:14px;">
      Bundle ID: com.awesomepiece.axisblade<br style="background-color:#1e1f25;color:rgba(255,255,255,0.81);font-size:14px;">
      iTunes Store Link: https://apps.apple.com/us/app/axis-blade/id6736382225

       

      📌 Mod Requirements

      - Non-Jailbroken/Jailed or Jailbroken iPhone or iPad.
      - Sideloadly or alternatives.
      - Computer running Windows/macOS/Linux with iTunes installed.

       

      🤩 Hack Features

      - Damage Multiplier
      - Defense Multiplier
      - No Wall Damage
       

       

      ⬇️ iOS Hack Download IPA Link


      Hidden Content

      Download IPA Hack







       

      📖 PC Installation Instructions

      STEP 1: Download the pre-hacked .IPA file from the link above to your computer. To download from the iOSGods App, see our iOSGods App IPA Download Tutorial which includes a video example.
      STEP 2: Download Sideloadly and install it on your Windows or Mac.
      STEP 3: Open Sideloadly on your computer, connect your iOS device, and wait until your device name appears in Sideloadly.
      STEP 4: Once your iDevice is recognized, drag the modded .IPA file you downloaded and drop it into the Sideloadly application.
      STEP 5: Enter your Apple Account email, then press “Start.” You’ll then be asked to enter your password. Go ahead and provide the required information.
      STEP 6: Wait for Sideloadly to finish sideloading/installing the hacked IPA. If there are issues during installation, please read the note below.
      STEP 7: Once the installation is complete and you see the app on your Home Screen, you will need to go to Settings -> General -> Profiles / VPN & Device Management. Once there, tap on the email you entered from step 6, and then tap on 'Trust [email protected]'.
      STEP 8: Now go to your Home Screen and open the newly installed app and everything should work fine. You may need to follow further per app instructions inside the hack's popup in-game.

      NOTE: iOS/iPadOS 16 and later, you must enable Developer Mode. For free Apple Developer accounts, you will need to repeat this process every 7 days. If you have any questions or problems, read our Sideloadly FAQ section of the topic and if you don't find a solution, please post your issue below and we'll do our best to help! If the hack does work for you, post your feedback below and help out other fellow members that are encountering issues.

       

      🙌 Credits

      - @KyosukeNanbu

       
        • Like
      • 14 replies
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines