Dialog Killer Feature ♨️
🩸 🩸 🩸 🩸 🩸 🩸
👻 Universal Dialog Kill
👻 Universal Dialog Content Edit
Change any modded app dialog data Title, Denoscription, Button OnClick
👻 Online Dialog API Link Block
Block dialog API links and IP also
👻 Redirect Dialog to Any Activity
👻 Replace Online Dialog with Your Own API Link
Dex2C protected apps also working😂
Change any modded app dialog data Title, Denoscription, Button OnClick
Block dialog API links and IP also
Dex2C protected apps also working
Please open Telegram to view this post
VIEW IN TELEGRAM
❤30🤯6👌1
MemTool 1.2.zip
7.5 MB
MemTool 1.2 RevDex
- Inspector: Fixed imgui Negative ImGUI
- Misc: Misc Function Upgraded
- AddrTracer: Interface Access or Write Detector Realtime
- Universal Printer
- Keyboard Fix System IMM Hooked
- Menu Backend Negative Native Ui
You can catch any memory address to lib static offset
- Inspector: Fixed imgui Negative ImGUI
- Misc: Misc Function Upgraded
- AddrTracer: Interface Access or Write Detector Realtime
- Universal Printer
- Keyboard Fix System IMM Hooked
- Menu Backend Negative Native Ui
You can catch any memory address to lib static offset
❤🔥10👌5🤯1
free purchase hook code
// LGL Hook //
// type cast 1
// type cast 2
free shopping 😁
//WARNING: Possible PIC construction at 0x00400710: Changing call to branch
void fcn.00400670(ulong noname_0,int64_t arg2)
{
int *piVar1;
int iVar2;
int iVar3;
int64_t iVar4;
uint64_t uVar5;
ulong uVar6;
int iVar7;
int64_t unaff_x19;
int64_t unaff_x20;
uchar unaff_w21;
int64_t unaff_x22;
int64_t iVar8;
uchar auVar9 [12];
uint8_t in_stack_00000000;
ulong in_stack_00000010;
int64_t in_stack_00000018;
*(arg2 + 0xfc) = unaff_w21;
func_0x001d1fb4();
iVar4 = func_0x001d1a60();
*(iVar4 + 0xfc) = unaff_w21;
iVar2 = func_0x001d20bc();
piVar1 = *0x7e45b8;
iVar7 = *(unaff_x19 + 0x628);
**0x7e45b8 = iVar7;
if (0 < iVar7 + iVar2) {
iVar4 = 0;
iVar8 = 100;
do {
if (*(*(unaff_x19 + 0x5b8) + iVar8) == *(unaff_x20 + 4)) {
func_0x00417dd0();
func_0x003fc664();
uVar5 = func_0x00417dd0();
if ((uVar5 & 1) != 0) {
iVar7 = iVar4;
goto code_r0x004007d0;
}
break;
}
iVar4 = iVar4 + 1;
iVar2 = func_0x001d20bc();
iVar7 = *(unaff_x19 + 0x628);
iVar8 = iVar8 + 0x90;
*piVar1 = iVar7;
} while (iVar4 < iVar7 + iVar2);
}
func_0x002f3aac(1);
func_0x003c7ae8(0);
func_0x00302ae0(1);
func_0x001c5608();
iVar4 = func_0x00346e00();
if (iVar4 != 0) {
func_0x0018a3fc();
uVar5 = func_0x003475a8();
if ((in_stack_00000000 & 1) != 0) {
func_0x00168710(in_stack_00000010);
}
if ((uVar5 & 1) != 0) {
func_0x001c5608();
func_0x00346de0();
}
}
*(unaff_x19 + 0x598) = 1;
if (*(unaff_x22 + 0x28) == in_stack_00000018) {
return;
}
uVar6 = func_0x00168d70();
if ((in_stack_00000000 & 1) != 0) {
func_0x00168710(in_stack_00000010);
}
auVar9 = func_0x0061c7ec(uVar6);
iVar7 = auVar9._8_4_;
unaff_x19 = auVar9._0_8_;
code_r0x004007d0:
iVar2 = func_0x001d20bc();
if (1 < iVar2) {
iVar2 = 1;
do {
iVar4 = func_0x001d1a60(iVar2);
if ((*(iVar4 + 0xfc) != '\0') && (uVar5 = func_0x00417e78(), (uVar5 & 1) == 0)) {
func_0x003fc664(unaff_x19,iVar7 + iVar2,0,0);
}
iVar2 = iVar2 + 1;
iVar3 = func_0x001d20bc();
} while (iVar2 < iVar3);
}
return;
}
// LGL Hook //
// type cast 1
void (*old_Update)(void *instance);
void Update(void *instance) {
if (instance != NULL && featureHookToggle) {
*(bool *)((uint64_t)instance + 0x2C) = true;
}
old_Update(instance);
}
HOOK_LIB("libgame.so", 0x400670, Update, old_Update);
// type cast 2
void (*old_Purchase)(void *a1, void *a2);
void PurchaseHook(void *a1, void *a2) {
return;
}
HOOK_LIB("libgame.so", 0x400670, PurchaseHook, old_Purchase);
free shopping 😁
❤🔥7🤯5❤2
Media is too big
VIEW IN TELEGRAM
360jiagu Repack New Method Working i already tested this method 👍 this method Only fot flutter app ok
Credit - liwnell
If you want better service then contact him. He has 360jiagu killer pine hook & xpose nodule and also has multiple methods
哔哩哔哩 - Id 520518143
Credit - liwnell
If you want better service then contact him. He has 360jiagu killer pine hook & xpose nodule and also has multiple methods
哔哩哔哩 - Id 520518143
Please open Telegram to view this post
VIEW IN TELEGRAM
❤17❤🔥5👌3
MemTool 1.3.zip
7.5 MB
MemTool 1.3 RevDex
- Enhance Keyboard api
- DexDump ( New ) Internal api 🥳
//=== New Update Details ===//
- Memory static trace ( coming soon)
- Pointer Scanning ( coming soon)
You can catch any memory address to lib static offset
- Enhance Keyboard api
- DexDump ( New ) Internal api 🥳
//=== New Update Details ===//
- Memory static trace ( coming soon)
- Pointer Scanning ( coming soon)
You can catch any memory address to lib static offset
❤20👌10
Please open Telegram to view this post
VIEW IN TELEGRAM
❤16😁5😍2
Forwarded from Antik ᡕᠵデ气亠
dexdump Internals Api (2).zip
22.9 KB
dexdump Internals Api + External api
😱7❤🔥2❤2
Media is too big
VIEW IN TELEGRAM
AES/CBC/PKCS5Padding
This is an advanced topic. In this video, I will show you how to identify an application’s IV or encryption key. I will use system-level hooking to capture the target app’s IV or key, and then create a small Python noscript to decrypt the data.
This is a very interesting and practical topic.
If you find it helpful and want to learn more, stay connected with Revdex.
Api response & request encryption puck
Tools -
MT Manager non root
Java Debugger++ 2.0.9 ( Most Important) root
Some Vpn & SLL Bypass Module root
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤21❤🔥3👌1
pflutter.zip
295.6 KB
PFLUTTER
lib flutter engine sizer control flow
Apply 5 to 10 time but your owne risk 😋 fake size diff destroy
lib flutter engine sizer control flow
chmod 777 pflutter
./pflutter <lib folder>
Apply 5 to 10 time but your owne risk 😋 fake size diff destroy
❤13