Jump to content


  • Content Count

  • Donations

  • Joined

  • Last visited

  • Days Won


Lenn1 last won the day on September 16 2018

Lenn1 had the most liked content!

Community Reputation

80 Contributor


About Lenn1

  • Rank

Additional Information

  • Android
    6.x (Marshmallow)
  • Device
    Remix OS x86 4GB

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. go to data/data/com.dts.freefireth and try deleting the files in the "files" folder and change their permissions by denying read, write and execute. it is in the files folder that the debuggers are, if you just delete the files and do not change the permissions they are back. try this
  2. your script is out of date (out-of-memory searches, offsets and wrong pointers) or the bug was corrected by the developer
  3. there are specific regions in the memory that when being scanned forces the closing, it must be because of, try to scan the memory excluding all data from this LIB, xa, anon and CA remembering that it is after you disable the internal debugger in the game subprocess and hide gg
  4. yes, they improve the defense against memory editors, but nothing impossible. and I also believe that the added Firebase contributes a lot to the defense, it has to contour at the system level, denying the privileges and permissions. still there is still a loophole in the free fire, I don’t know if it’s useful to you, but the anti-cheat they use has a delay to wake up and act, this is because it’s only activated when you log in to the game, on the screen home where you choose to log in to Faceboo, VK guest etc ... try there, because it works for me, but I use the x86 version, which is totally different from armeabiv7.
  5. change the permissions at system level to prevent the game from starting its debugger subprocesses, disable the firebase that came with the new update, and start the script and load the changes before entering the lobby, on the initial login screen. this ensures that the game did not crash, but does not prevent detection for a possible BAN! before and after
  6. Lenn1

    who can help

    if you are the one who wrote the script, just change the offset or do the manual searches, and go about correcting the script's functions one by one. now if you are not the one who wrote the script, and it is "encrypted", you will have to decrypt it and then update the functions one by one, discovering new offset or doing the manual searches. if you don't know how to decrypt, ask someone here on the forum, there is always someone to do it.
  7. This region of memory is only read
  8. through the logcat you can already see what the scripts do, so if you don't want to have your "codes" leaked over the web, you shouldn't share them, because the safest way to keep your "safe" codes is to use for yourself ... but it is not your case, I once tried to make money with cheats and game scripts, even sharing locally with people I knew, and even using basic cryptography, my code was broken and soon, the game corrected the cheat. nowadays, I use the gg app just to test the security of the apps and discover loopholes of famous games, but I do not share and I see that nothing is fixed in the game. an example is the game Free fire, which has a region in memory that disproportionately increases the targets' HITBOX ... this vulnerability gives a lot of advantage, because you don't even need to aim at the target, just shoot and see the damage and kill. and you can increase the hitbox of the head to just give headshot. this cheat has been in the game since the beta, as it is a fault of the Unity engine itself, and it has been 3 years since the game has not corrected, because I never divulged nor intend.
  9. does the game have sub-processes? there are usually subprocesses debugging the game to prevent it from connecting another debugger the sub processes are the "protection" of the game memory and any connections from other debuggers forced to detection and even forced shutdown and crash
  10. you can activate and deactivate functions in the speedhack, sometimes we only need one, while others are detectable, in my experience it was sometimes like this. another thing you can do is just find the character's default speed value and change it to make your steps faster.
  11. Lenn1

    How to Find new offsets?

    function KX1() gg.setRanges(16384) --it is the same as gg.setRanges(gg.REGION_CODE_APP) gg.searchNumber("\000300", 16, false, 536870912, 0, -5) --is a search for 300(300.0 or 300,0) float value gg.getResults(4) gg.editAll("100", 16) --modifying this value, the perspective sensitivity of the crosshair increases gg.clearResults() -- --here will be a AoB search in HEX gg.setRanges(gg.REGION_CODE_APP) name("") myoffset = 12395128 -- offset old(for me is 0x00000001) why? dont know! original("7F 45 4C 46 01 01 01 00") -- HEX to STRINGS= ELF replaced("10 00 A0 E3 1E FF 2F E1")--HEX to STRINGS= ??/á gg.clearResults() example to do an Array of byte search: gg.searchNumber("h7F454C4601010100", gg.TYPE_BYTE, false, gg.SIGN_EQUAL, 0xd3077000, 0xd6bbdfff, 0) local t = gg.getResults(1000) gg.addListItems(t) t = nil gg.saveList("/storage/emulated/0/Notes/com.dts.freefireth.AoB", 0) --where find offset revert = gg.getResults(1000, nil, nil, nil, nil, nil, nil, nil, nil) gg.editAll("h1000A0E31EFF2FE1", gg.TYPE_BYTE)gg.clearResults() -- gg.setRanges(gg.REGION_C_DATA) gg.searchNumber("0.01;0.01;0.01;0.01;1.41191865e34::17", gg.TYPE_FLOAT) gg.getResults(4) gg.editAll("0", gg.TYPE_FLOAT) gg.clearResults() -- gg.setRanges(32) -- is gg.setRanges(gg.REGION_ANONYMOUS) gg.searchNumber("5.5;1.0;0.75::9", 16) -- in class game var default,these values are to multiply damage to the head, chest, and limbs (legs and arms) respectively --ONLY VISUAL! gg.refineNumber("1", 16) gg.getResults(1) gg.editAll("-999", 16) --modifying this the damages in "chest" are not shown gg.clearResults() gg.setRanges(32) gg.searchNumber("5.5;0.75::9", 16) gg.refineNumber("0.75", 16) gg.getResults(1) gg.editAll("-999", 16) --modifying this the damages in "limbs" are not shown gg.clearResults() gg.setRanges(gg.REGION_ANONYMOUS) gg.searchNumber("1016018816", gg.TYPE_DWORD, false, gg.SIGN_EQUAL, 0, -5) --is pure no recoil/spread,you have to have the weapon equipped first, then search and edit the values gg.getResults(500) gg.editAll("0016018816", gg.TYPE_DWORD) --modifying this all shots do not spread gg.clearResults() gg.toast('Head****') -- XD os.remove(gg.EXT_STORAGE .. "/Android/data/com.dts.freefireth/files/reportnew.db", gg.LOAD_APPEND) --this is bull****, it would never have an effect "no ban" (anti-ban) XD os.remove(gg.EXT_STORAGE .. "/Android/data/com.dts.freefireth/files/ymrtc_log.txt", gg.LOAD_APPEND) --this is bull****, it would never have an effect "no ban" (anti-ban) XD os.remove(gg.EXT_STORAGE .. "/Android/data/com.dts.freefireth/files/ymrtc_log_bak.txt", gg.LOAD_APPEND) --this is bull****, it would never have an effect "no ban" (anti-ban) XD end
  12. if the value returns to the value before the change, it indicates that there is synchronization with the server, but you still have to search in various ways, encrypted, XOR, defuse etc ... I advise you to try to exploit flaws in some offline mode of the games (tutorials) or during battles or at the end of the battle. sometimes what seems obvious isn't always!
  13. Lenn1

    How to Find new offsets?

    sorry, but i can't help, because i work only with x86, even if i found the offset from my x86 version (android x86) it would be useless for you, as it is another architecture. and I use the google translator, my english is terrible which makes it difficult to understand what i speak. but when searching for offset searches which is nothing more and nothing less than HEX editor, just try to do AoB (array of Byte) finding what you wanted, you find your offset. of course it may seem rude not to detail further, but you should go after more knowledge, and you can find videos here on the forum, all ready and chewed for you XD
  14. Lenn1

    How to Find new offsets?

    this script is easy to solve, just remove the searches with offsets and turn them into AoB, it will be a little slow, but it will work ... after you find the addresses, you find the offset and update the script
  15. the subprocesses of your (debugged) game are its "protection" against other debuggers, and anyone else who tries to connect and scan the memory will cause the game to crash. the solution is to prevent these debuggers from the game itself. how to stop them? often they are not executed in a virtual environment, it is not a rule.
  • Create New...
bt365体育官bt365体育官网 <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <文本链> <文本链> <文本链> <文本链> <文本链> <文本链>