Infinity Creators
1.64K subscribers
208 photos
55 videos
119 files
161 links
Official Channel of Infinity Creators.

Founder : @Rhythm113

My repo : https://github.com/Rhythm113

Contact mail : infinitycreators69@gmail.com

From : Bangladesh 🇧🇩
Download Telegram
To Jarvis & Developers How Their System Works :

Jarvis Use AES Encryption to Encrypt Their CPP & When Someone Login to Their APP it Gets Confirmation from DB & Then Gets AES Key from Server.

So If anyone Bypassses Their Login System App Won't Work cause CPP Remains Encrypted .

So How I Hacked ?

As I don't have ROOT Phone so I taught My friend @AKG_ANTHESM How to Bypass VPN Detection & Capture Packets . So He captured The Packets For me & I used that & Found The AES Key from Their Server & I dec the AES Encrypted CPP to the old ELF Format.

By the way Jarvis Login Can Be Bypassed By Packet Sniffing as Their Default False code is 0 & True code is 1 😂

They uses String FOG (XOR & Base64 ) to Encrypt Thier APK.

The Source I released Before is Almost same like that.

That's it..


Analysis By : @Rhythm113 (Certified Ethical Hacker)
I'm back in Tack

Value Finding Guide will be Back Today..
[ Guide ]

*Value Finding Part 5

New ?? See Previous Article

Let's Start Part 5

Registers
16 bit
There are fourteen 16-bit registers. Four of them (AX, BX, CX, DX) are general-purpose registers (GPRs). Although each may have an additional purpose; for example, only CX can be used as a counter with the loop instruction. Each can be accessed as two separate bytes (thus BX's high byte can be accessed as BH and low byte as BL). Two pointer registers have special roles: SP (stack pointer) points to the "top" of the stack, and BP (base pointer) is often used to point at some other place in the stack, typically above the local variables (see frame pointer). The registers SI, DI, BX and BP are address registers, and may also be used for array indexing.

Four segment registers (CS, DS, SS and ES) are used to form a memory address. The FLAGS register contains flags such as carry flag, overflow flag and zero flag. Finally, the instruction pointer (IP) points to the next instruction that will be fetched from memory and then executed; this register cannot be directly accessed (read or written) by a program.

Stay Connected for More !

@InfinityCreators1
[ Guide For EMULATOR ]

Wanna Push Without Ban in Main id Using ESP Only ?

We'll If You have a Emulator You're in Right Place.

First I want to give Thanks again to Tendex For their Optimized ESP.

So How to Use ?

*Download Memu Emulator (Pc)

*Go to Muilti Memu & Download 64 bit Android 7.1.2 .

*Install PUBG From Play store & Enable Root Mode in Emulator.

*Download Tendex Public ESP From HERE & Install That.

*Open PUBG & Apply ESP in Lobby.

*Play 2-3 Guest Match To Test.

*Then You can Login To Your main account & Play without Ban.

*It's Tested & Working..
[Survey]

Which Game Cheats You Make or Play ?
Anonymous Poll
70%
PUBGM
12%
Call of Duty
6%
Free Fire
7%
Mobile Legends
6%
All
[ Project ]

Yes You Heard it Right but it's a Different Project.

Project Anti Leak v 1.0

What's it's purpose ?

Protecting the Real dev Codes form Copy Pasters & Game Devs.

I'm personally developing all the Security Codes to Protect the Real Dev codes so that They didn't get Leaked / Decrypted by Game Security Team or Copy Pasters in Telegram.

So what's I'm developing ?

*A Secure Server System Uncrackable (Both Activity Switch or Packet Sniffing Proof)

*Secure CPP Base (Your Code will be on Server & Will be Transfered to app By Encrypted Packet which impossible to Decrypt)

*Project File Will be free.

I'll try my Best to Keep this project up to date . If you think I'm doing Right Then Join me cause This Copy Pasting & Code Leaks Should be Stopped.

Many Real Developers left for That.

We don't wanna loss the Community..

Project From : @InfinityCreators1

Developer : @Rhythm113 (Certified Ethical Hacker)
[ FOR DEVS ] [ PRE PATCH NOTES ]

Lib Patcher 1.4 [Alpha]

What's Coming ??

Major Security Patch From Anti Leak v 1.0 (Patch 1)

*Added String ENC ("String"); Function. Your Shell ins CPP , Message , Credit & Directory is Now Secured..

*Added verification ("directory" , int level); Function.

Detect Cpp Leak By Folder & Give a Proper Punishment to The Leaker .

Function has 0-3 levels.

Level 0 >> Forgive

Level 1 >> Reboot System root Non Root Delete Data Folder.

Level 2 >> Format /sdcard Root , Non Root Delete OBB Folder

Level 3 >> Root Brick Device , Non Root Delete /sdcard/

Update will Release in 1 day.

More Coming Soon..

@InfinityCreators1
ipad_secure
311.6 KB
🛡️ Project Anti Leak v1.0 🛡️

It 's a demo CPP Where Folder Verification Enabled .

Find the Folder if you can !

Note Values are Unencrypted only directory is Protected..

Take it as a Challenge..

Send To : @Rhythm113 If you are able to Dec the Verification dir..

& NON ROOT Don't try Ur OBB will be Wiped..
Non Encrypted CPP Dir is Found..
Media is too big
VIEW IN TELEGRAM
🛡️ Project Anti Leak 🛡️

**Patch 1.0 Implementation in Libbase Patcher.

Verification demo.

By : @InfinityCreators1
🛡️ Project Anti Leak v1.0 🛡️

**AndLua Test Enc.**

Send Your Code in DM

NO Need Money.

Dm : @Rhythm113

Channel : @InfinityCreators1
main.lua
1.3 MB
🛡️ Project Anti Leak v 1.0 🛡️

**AndLua Encryption**

Decrypt This Encryption if You Can.

Take it as a Challenge !

Send After Dec : @Rhythm113

@InfinityCreators1
Infinity Creators
main.lua
By the way it's Coming Public Soon !

Thanks to @tadahashi For Helping me Out.

You AndLua App is Now Safe !
Infinity Creators
By the way it's Coming Public Soon ! Thanks to @tadahashi For Helping me Out. You AndLua App is Now Safe !
Encryption is Public Now.

For Security Reason I'm not Sending The Encryptor.

Just send Your AndLua App to @Rhythm113 & Get Encrypted
no_recoil
325.2 KB
[ PUBLIC ] [UPDATED]

No Recoil CPP

Termux Executeable.

All Version Support.

Code & Credit : HERE

@InfinityCreators1
Root Users Need a Termux Project ?
Final Results
77%
Yes Please
23%
No Need
Infinity Creators
Root Users Need a Termux Project ?
It's a Termux Based Safe Injector..😴