Reverse Engineering Asked by zombunny on April 17, 2021
So I have managed to retrieve the assembly_csharp.dll using the il2cpp tool from an android apk, however my issue is that when I go to read the dll using dnSpy I have all the correct looking function names, but the body of all the functions reads like:
return null;
return default(bool);
return 0;
etc etc
My question is is there any way to retrieve these functions, or otherwise how can I modify this code to change the app’s behaviour
Try using IDA Pro to view the ARM code in libil2cpp.so
I watched this video -> https://youtu.be/Vm1Eq0ICCJg?t=567
Download the software -> https://androidrepublic.org/threads/how-to-mod-il2cpp-games.73533/
Answered by Saika on April 17, 2021
Get help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP