TransWikia.com

How to read dnSpy code from assembly_csharp.dll

Reverse Engineering Asked by zombunny on April 17, 2021

So I have managed to retrieve the assembly_csharp.dll using the il2cpp tool from an android apk, however my issue is that when I go to read the dll using dnSpy I have all the correct looking function names, but the body of all the functions reads like:

return null; 
return default(bool); 
return 0;

etc etc

My question is is there any way to retrieve these functions, or otherwise how can I modify this code to change the app’s behaviour

One Answer

Try using IDA Pro to view the ARM code in libil2cpp.so

I watched this video -> https://youtu.be/Vm1Eq0ICCJg?t=567

Download the software -> https://androidrepublic.org/threads/how-to-mod-il2cpp-games.73533/

Answered by Saika on April 17, 2021

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP