KsuWebUI-1.0-48-release.apk
1.9 MB
KsuWebUI-1.0-48-release.apk
❤1
NativeModMenu 2.5
Native Preferences & cast_register all classes dynamically. Theme in Java without XML 🍺 full menu theme added. Some games do not have custom themes; in this case, the mod menu is destroyed. Mod menu switch toggle button etc.. style change. This problem is solved by adding a C++ internal theme
https://github.com/ispointer/NativeModMenu
Native Preferences & cast_register all classes dynamically. Theme in Java without XML 🍺 full menu theme added. Some games do not have custom themes; in this case, the mod menu is destroyed. Mod menu switch toggle button etc.. style change. This problem is solved by adding a C++ internal theme
https://github.com/ispointer/NativeModMenu
GitHub
GitHub - ispointer/NativeModMenu
Contribute to ispointer/NativeModMenu development by creating an account on GitHub.
❤🔥9🤯2❤1
https://github.com/Shad0w-KuNgen/Game-Cheating-Tutorial
https://github.com/kovidomi/game-reversing
Beginner Learning Materials on Reverse Engineering Video Games
https://github.com/kovidomi/game-reversing
Beginner Learning Materials on Reverse Engineering Video Games
GitHub
GitHub - Shad0w-KuNgen/Game-Cheating-Tutorial: 热门网络游戏辅助开发教程
热门网络游戏辅助开发教程. Contribute to Shad0w-KuNgen/Game-Cheating-Tutorial development by creating an account on GitHub.
❤8
https://github.com/ispointer/Dpt-ShellDump-Api
Termux
Open source Project
curl.exe -X POST "https://dexdumper.com/dpt-shell/api.php" `
-F "dex=@classes.dex" `
-F "code=@OoooooOooo"
Termux
curl -X POST https://dexdumper.com/dpt-shell/api.php \
-F "dex=@classes.dex" \
-F "code=@OoooooOooo"
Open source Project
GitHub
GitHub - ispointer/Dpt-ShellDump-Api
Contribute to ispointer/Dpt-ShellDump-Api development by creating an account on GitHub.
Do you want MemTool Zygisk? If people are excited, then I will release it publicly 👋
Anonymous Poll
84%
Yees
16%
Noo
❤🔥12❤2🤯1
MemTool v1.4 ♌️
We are proud to introduce two major new features in MemTool 1.4 that significantly improve runtime memory analysis and tracing capabilities.
Structure Field Tracker
MemTool can now detect exactly which field inside a structure is being accessed or modified. Instead of showing only a raw memory address, the tool now identifies the real structure field name such as Player.hp, Player.ammo, or Player.speed.
This makes reverse engineering much clearer and more efficient. You can immediately understand which internal value is being changed without manually calculating offsets. It simplifies struct layout analysis, offset mapping, and live stat monitoring during runtime.
Control Flow Tracer
MemTool now traces which function or execution path caused a memory access. This means you not only see that a value changed, but also identify the function responsible for that change. By revealing the call chain behind memory reads or writes, this feature helps in debugging unexpected behavior, analyzing logic flow, identifying antich@at routines, and understanding how the program operates internally.
Combined Capability🔓
Structure Field Tracker tells you what changed
Control Flow Tracer tells you who changed it
Together, these features provide deep runtime visibility and advanced dynamic analysis power.
MemTool 1.4 is designed for serious reverse engineering, security research, and low-level runtime inspection.
Main interesting thing Zygisk support & KsuWebUI Good control panel is available
Thanks for staying with Revdex🌷
Old Version Release
1.4 - ui soon - https://t.me/RevDex/347
1.3 - > https://t.me/RevDex/268
1.2 -> https://t.me/RevDex/259
We are proud to introduce two major new features in MemTool 1.4 that significantly improve runtime memory analysis and tracing capabilities.
Structure Field Tracker
MemTool can now detect exactly which field inside a structure is being accessed or modified. Instead of showing only a raw memory address, the tool now identifies the real structure field name such as Player.hp, Player.ammo, or Player.speed.
This makes reverse engineering much clearer and more efficient. You can immediately understand which internal value is being changed without manually calculating offsets. It simplifies struct layout analysis, offset mapping, and live stat monitoring during runtime.
Control Flow Tracer
MemTool now traces which function or execution path caused a memory access. This means you not only see that a value changed, but also identify the function responsible for that change. By revealing the call chain behind memory reads or writes, this feature helps in debugging unexpected behavior, analyzing logic flow, identifying antich@at routines, and understanding how the program operates internally.
Combined Capability
Structure Field Tracker tells you what changed
Control Flow Tracer tells you who changed it
Together, these features provide deep runtime visibility and advanced dynamic analysis power.
MemTool 1.4 is designed for serious reverse engineering, security research, and low-level runtime inspection.
Main interesting thing Zygisk support & KsuWebUI Good control panel is available
Thanks for staying with Revdex
Old Version Release
1.4 - ui soon - https://t.me/RevDex/347
1.3 - > https://t.me/RevDex/268
1.2 -> https://t.me/RevDex/259
Please open Telegram to view this post
VIEW IN TELEGRAM
❤17❤🔥4
MemTool_release_v1.4.0-104.zip.zip
7.9 MB
Version Code: 104
Changelog:
- crash log added
- Inspector more improved
- Kitty memory upgraded & Dobby
- memory trap 🪤 more enhanced
- DexDump is still in beta. The issues will be fixed in the next version soon. ✅
Changelog:
- crash log added
- Inspector more improved
- Kitty memory upgraded & Dobby
- memory trap 🪤 more enhanced
- DexDump is still in beta. The issues will be fixed in the next version soon. ✅
❤🔥14❤9🤯4
LGL_Zygisk_RevDexLibLoader_v1.5.0.zip
1.4 MB
This is a test module for the upcoming MemTool 1.5. Anyone can try it and give me feedback on whether it works on all games or not
Send Feedback in Comment 😑
Send Feedback in Comment 😑
1❤16👀3
Thanks God! I finally found the best solution to communicate between different processes in my module.
I mean communication between the Xposed module and my app using XConnect.thanks to the Xposed community, and special thanks to Luge congi for helping me. ✍️ basically, I now understand how it works. currently I have one of the best methods to communicate between app processes without root.
Now I can finally complete my tool.
Also thanks to my friend who helped me with this research
I mean communication between the Xposed module and my app using XConnect.thanks to the Xposed community, and special thanks to Luge congi for helping me. ✍️ basically, I now understand how it works. currently I have one of the best methods to communicate between app processes without root.
Now I can finally complete my tool.
Also thanks to my friend who helped me with this research
🤓9❤3😁1
Android App Binder Reader & Writer Tool
This tool allows you to capture and analyze Bundle, BinderFlow, and Parcel data inside Android applications. It also provides the ability to modify Parcel data using custom hooks, enabling advanced runtime manipulation and debugging everyone is already know what is that's 🧁📦 🥇
Android's most powerful IPC capture technique Binder Sniffing & Redirect
This tool allows you to capture and analyze Bundle, BinderFlow, and Parcel data inside Android applications. It also provides the ability to modify Parcel data using custom hooks, enabling advanced runtime manipulation and debugging everyone is already know what is that's 🧁📦 🥇
Android's most powerful IPC capture technique Binder Sniffing & Redirect
1❤21😍3❤🔥2
ApkRE-1.0.jar
4.7 MB
ApkRE.1.0.jar
This is an Intent.ACTION_VIEW fire hook system. This hook basically intercepts all Intent actions, etc. At this point you can use this to replace any Intent action, like redirecting from one Activity to another Activity, etc. tutorial
Uses :
Required :
This hook works on all applications, no bug, full fire system hijacking Intent using Java with sun.misc surface.
This is an Intent.ACTION_VIEW fire hook system. This hook basically intercepts all Intent actions, etc. At this point you can use this to replace any Intent action, like redirecting from one Activity to another Activity, etc. tutorial
Uses :
java -jar ApkRe.jar -i app.apk -r "https://t.me/nullptr_dev<->https://t.me/RevDexChat"
Required :
pkg install openjdk-21
This hook works on all applications, no bug, full fire system hijacking Intent using Java with sun.misc surface.
❤🔥14❤6🤓5
UNITY Game Chain Update Facade Hijacking @RevDex Analyze.png
1.7 MB
Unity Game Chain Update / Facade Hijacking <=> @RevDex Analysis
👍 Static Offset --> Pointer Chain --> Class Fields a single static offset does not contain everything It acts as a root, and pointer chains traverse through objects to access different class fields If you hook any class Update() method, the game can detect it easily however if you use a pointer chain, you can access class methods or fields step by step without directly hooking them. using pointer chains allows you to read and write fields easily, and it is much safer because most fields use 1-byte binary values, making them harder for anti-cheat systems to detect 😂
👍 Static Offset --> Pointer Chain --> Class Fields a single static offset does not contain everything It acts as a root, and pointer chains traverse through objects to access different class fields If you hook any class Update() method, the game can detect it easily however if you use a pointer chain, you can access class methods or fields step by step without directly hooking them. using pointer chains allows you to read and write fields easily, and it is much safer because most fields use 1-byte binary values, making them harder for anti-cheat systems to detect 😂
❤6👌4❤🔥1