Media is too big
VIEW IN TELEGRAM
Flutter 32bit App Mod
App Name - My Sleep Affirmations
🌿 App Link - My Sleep Affirmations
arm64-v8a ❌
armeabi-v7a ✅
Reflutter 2024 video 📸
App Name - My Sleep Affirmations
🌿 App Link - My Sleep Affirmations
arm64-v8a ❌
armeabi-v7a ✅
Reflutter 2024 video 📸
👌6❤5
https://raspberrypibd.com/products/raspberry-pi-5-ice-tower-cooler/
https://store.roboticsbd.com/raspberry-pi/2439-raspberry-pi-5-8gb-robotics-bangladesh.html?srsltid=AfmBOoquJWorYT2QM62xHE74SIY50f3pNOJijes9IwskbMpU6O-8ea85
I am building a server on Mini R1, and I want to buy this. Can you give me your comments on it? I mainly want to run the Integrity Model R1 on it 🍺
https://store.roboticsbd.com/raspberry-pi/2439-raspberry-pi-5-8gb-robotics-bangladesh.html?srsltid=AfmBOoquJWorYT2QM62xHE74SIY50f3pNOJijes9IwskbMpU6O-8ea85
I am building a server on Mini R1, and I want to buy this. Can you give me your comments on it? I mainly want to run the Integrity Model R1 on it 🍺
Raspberry Pi BD
Raspberry Pi 5 ICE-Tower Cooler Price in Bangladesh - Raspberry Pi BD
Keep your Raspberry Pi 5 ICE-Tower Cooler running smoothly with this high-performance cooling solution. Prevents overheating, reduces throttling, and extends lifespan. Easy installation!
😁8❤5🙈2
Media is too big
VIEW IN TELEGRAM
play integrity token simulation android binding 🤣
Google integrity gone
Non Root Also working
Google integrity gone
Non Root Also working
❤17😱12😍3
#include <stdio.h>
#include <string.h>
int main() {
int is_admin = 0;
char buffer[8];
printf("Enter your username: ");
scanf("%s", buffer);
if (is_admin == 0) {
printf("hi nigga🙊");
} else {
printf("hi smarty ");
}
return 0;
}
i need output hi smarty .
no modification of code or debugger ? 🙊
🙈10❤3👌3
Patch the Kernel
CONFIG_MODULE_SIG_FORCE=y ✖️
CONFIG_MODULE_SIG_FORCE=n✔️
#1 Extract Get the boot.img from your phone. Use AIK Android Image Kitchen to unpack it You will get a file named boot.img-kernel
#2 Patch Use KernelPatch to remove the signature restriction from that kernel file
#3 Repack Use AIK to repack the folders back into a new image image-new.img
#4 Flash this new image to your phone
Done successfully bypass all restriction you can use Kernel Driver module without any custom kernel
CONFIG_MODULE_SIG_FORCE=y ✖️
CONFIG_MODULE_SIG_FORCE=n
#1 Extract Get the boot.img from your phone. Use AIK Android Image Kitchen to unpack it You will get a file named boot.img-kernel
#2 Patch Use KernelPatch to remove the signature restriction from that kernel file
kptools -p -i boot.img-kernel -o boot.img-kernel -k kpimg-aarch64
#3 Repack Use AIK to repack the folders back into a new image image-new.img
#4 Flash this new image to your phone
fastboot flash boot image-new.img
Done successfully bypass all restriction you can use Kernel Driver module without any custom kernel
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - osm0sis/Android-Image-Kitchen: Automated scripts to unpack/repack Android kernel/recovery images + ramdisks
Automated scripts to unpack/repack Android kernel/recovery images + ramdisks - osm0sis/Android-Image-Kitchen
❤11👌2
Oreyo External Chams.zip
216.8 KB
🧑🔬 Undetectable Chams
Executable no need internal hooking fully external
Creator - @RevDex
This is A test version Only have shader dumping next version I going to add Chams , this GL Hook is Undetectable you can use in FF & PÛBG
Preview - https://t.me/RevDexChat/7401
GitHub - https://github.com/ispointer
Executable no need internal hooking fully external
Creator - @RevDex
Oreyo::DumpShaders("com.kiloo.subwaysurf", "libunity.so", "/data/local/tmp/shader.h");This is A test version Only have shader dumping next version I going to add Chams , this GL Hook is Undetectable you can use in FF & PÛBG
Preview - https://t.me/RevDexChat/7401
GitHub - https://github.com/ispointer
❤4❤🔥1🥰1
can you load me.kpm
2.8 KB
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2
KsuWebUI-1.0-48-release.apk
1.9 MB
KsuWebUI-1.0-48-release.apk
❤1
NativeModMenu 2.5
Native Preferences & cast_register all classes dynamically. Theme in Java without XML 🍺 full menu theme added. Some games do not have custom themes; in this case, the mod menu is destroyed. Mod menu switch toggle button etc.. style change. This problem is solved by adding a C++ internal theme
https://github.com/ispointer/NativeModMenu
Native Preferences & cast_register all classes dynamically. Theme in Java without XML 🍺 full menu theme added. Some games do not have custom themes; in this case, the mod menu is destroyed. Mod menu switch toggle button etc.. style change. This problem is solved by adding a C++ internal theme
https://github.com/ispointer/NativeModMenu
GitHub
GitHub - ispointer/NativeModMenu
Contribute to ispointer/NativeModMenu development by creating an account on GitHub.
❤🔥9🤯2❤1
https://github.com/Shad0w-KuNgen/Game-Cheating-Tutorial
https://github.com/kovidomi/game-reversing
Beginner Learning Materials on Reverse Engineering Video Games
https://github.com/kovidomi/game-reversing
Beginner Learning Materials on Reverse Engineering Video Games
GitHub
GitHub - Shad0w-KuNgen/Game-Cheating-Tutorial: 热门网络游戏辅助开发教程
热门网络游戏辅助开发教程. Contribute to Shad0w-KuNgen/Game-Cheating-Tutorial development by creating an account on GitHub.
❤8
https://github.com/ispointer/Dpt-ShellDump-Api
Termux
Open source Project
curl.exe -X POST "https://dexdumper.com/dpt-shell/api.php" `
-F "dex=@classes.dex" `
-F "code=@OoooooOooo"
Termux
curl -X POST https://dexdumper.com/dpt-shell/api.php \
-F "dex=@classes.dex" \
-F "code=@OoooooOooo"
Open source Project
GitHub
GitHub - ispointer/Dpt-ShellDump-Api
Contribute to ispointer/Dpt-ShellDump-Api development by creating an account on GitHub.
Do you want MemTool Zygisk? If people are excited, then I will release it publicly 👋
Anonymous Poll
84%
Yees
16%
Noo
❤🔥12❤2🤯1
MemTool v1.4 ♌️
We are proud to introduce two major new features in MemTool 1.4 that significantly improve runtime memory analysis and tracing capabilities.
Structure Field Tracker
MemTool can now detect exactly which field inside a structure is being accessed or modified. Instead of showing only a raw memory address, the tool now identifies the real structure field name such as Player.hp, Player.ammo, or Player.speed.
This makes reverse engineering much clearer and more efficient. You can immediately understand which internal value is being changed without manually calculating offsets. It simplifies struct layout analysis, offset mapping, and live stat monitoring during runtime.
Control Flow Tracer
MemTool now traces which function or execution path caused a memory access. This means you not only see that a value changed, but also identify the function responsible for that change. By revealing the call chain behind memory reads or writes, this feature helps in debugging unexpected behavior, analyzing logic flow, identifying antich@at routines, and understanding how the program operates internally.
Combined Capability🔓
Structure Field Tracker tells you what changed
Control Flow Tracer tells you who changed it
Together, these features provide deep runtime visibility and advanced dynamic analysis power.
MemTool 1.4 is designed for serious reverse engineering, security research, and low-level runtime inspection.
Main interesting thing Zygisk support & KsuWebUI Good control panel is available
Thanks for staying with Revdex🌷
Old Version Release
1.4 - ui soon - https://t.me/RevDex/347
1.3 - > https://t.me/RevDex/268
1.2 -> https://t.me/RevDex/259
We are proud to introduce two major new features in MemTool 1.4 that significantly improve runtime memory analysis and tracing capabilities.
Structure Field Tracker
MemTool can now detect exactly which field inside a structure is being accessed or modified. Instead of showing only a raw memory address, the tool now identifies the real structure field name such as Player.hp, Player.ammo, or Player.speed.
This makes reverse engineering much clearer and more efficient. You can immediately understand which internal value is being changed without manually calculating offsets. It simplifies struct layout analysis, offset mapping, and live stat monitoring during runtime.
Control Flow Tracer
MemTool now traces which function or execution path caused a memory access. This means you not only see that a value changed, but also identify the function responsible for that change. By revealing the call chain behind memory reads or writes, this feature helps in debugging unexpected behavior, analyzing logic flow, identifying antich@at routines, and understanding how the program operates internally.
Combined Capability
Structure Field Tracker tells you what changed
Control Flow Tracer tells you who changed it
Together, these features provide deep runtime visibility and advanced dynamic analysis power.
MemTool 1.4 is designed for serious reverse engineering, security research, and low-level runtime inspection.
Main interesting thing Zygisk support & KsuWebUI Good control panel is available
Thanks for staying with Revdex
Old Version Release
1.4 - ui soon - https://t.me/RevDex/347
1.3 - > https://t.me/RevDex/268
1.2 -> https://t.me/RevDex/259
Please open Telegram to view this post
VIEW IN TELEGRAM
❤17❤🔥4