-
Greetings! This is a continuation of a mini-series about gaining an advantage in reverse engineering certain problems by learning some math, hopefully in a hacker-friendly way! In part 1 of… more ›
-
In the first part of this mini-series, we hammered through a quick primer on equations and modular arithmetic in prime fields. In this part, we’ll examine a case study and… more ›
-
[Update 21.06.2021: Since I penned this article, Nacon have released a statement announcing that the Apex Predator Pack day 1 DLC will be included in the base game for all… more ›
-
Game publishers are loving it lately. Over the last few months I’m starting to see all kinds of weird and wacky obfuscation schemes designed to prevent Il2CppInspector from loading IL2CPP… more ›
-
Today, I thought we’d have a bit of fun and show you a novel and unorthodox alternative way to find any function with known discrete inputs and an assumption about… more ›
-
Recently, while reverse engineering Honkai Impact 3rd I came across some string decryption code that was obfuscated by VMProtect‘s implementation of control flow flattening. It takes an encrypted table of… more ›
-
This is a continuation of the Reverse Engineering Adventures: Honkai Impact 3rd mini-series – read part 1 and part 2 first! Recap So far, we have decrypted global-metadata.dat, and identified and resolved… more ›
-
This is a continuation of the Reverse Engineering Adventures: Honkai Impact 3rd mini-series – read part 1 first! In this article, we’ll look at comparative data deobfuscation and how to… more ›
-
Of all the IL2CPP workloads that have landed on my office desk over the years, those published by miHoYo (web site in Chinese) are what I consider to be the… more ›
-
The most common issue I receive on the tracker for Il2CppInspector is “this file won’t load”. Oftentimes this is due to a bug in the tool, but sometimes it leads… more ›