0% found this document useful (0 votes)
315 views4 pages

AB (SafefilekU - Com) .Lua

This Lua script contains functions for: 1. Bypassing the logo screen in a mobile game by setting values in memory addresses. 2. Creating a menu to call the bypass or exit functions. 3. Continuously checking if the game is visible and calling the menu when it is.

Uploaded by

Alpha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
315 views4 pages

AB (SafefilekU - Com) .Lua

This Lua script contains functions for: 1. Bypassing the logo screen in a mobile game by setting values in memory addresses. 2. Creating a menu to call the bypass or exit functions. 3. Continuously checking if the game is visible and calling the menu when it is.

Uploaded by

Alpha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

function setvalue(address,flags,value) local tt={} tt[1]={} tt[1].

address=address
tt[1].flags=flags tt[1].value=value gg.setValues(tt) end
function WriteSignatures(original,MAX_OFFICIAL) gg.setRanges(134914)
gg.searchNumber("h"..original) gg.getResults(9999) gg.editAll("h"..MAX_OFFICIAL,1)
gg.clearResults() end
function split(szFullString, szSeparator) local nFindStartIndex = 1 local
nSplitIndex = 1 local nSplitArray = {} while true do local nFindLastIndex =
string.find (szFullString, szSeparator, nFindStartIndex) if not nFindLastIndex
then nSplitArray[nSplitIndex] = string.sub(szFullString, nFindStartIndex,
string.len (szFullString)) break end nSplitArray[nSplitIndex] = string.sub
(szFullString, nFindStartIndex, nFindLastIndex - 1) nFindStartIndex =
nFindLastIndex + string.len (szSeparator) nSplitIndex = nSplitIndex + 1 end return
nSplitArray end function xgxc(szpy, qmxg) for x = 1, #(qmxg) do xgpy = szpy +
qmxg[x]["offset"] xglx = qmxg[x]["type"] xgsz = qmxg[x]["value"] xgdj = qmxg[x]
["freeze"] if xgdj == nil or xgdj == "" then gg.setValues({[1] = {address =
xgpy, flags = xglx, value = xgsz}}) else gg.addListItems({[1] = {address = xgpy,
flags = xglx, freeze = xgdj, value = xgsz}}) end xgsl = xgsl + 1 xgjg = true end
end function xqmnb(qmnb) gg.clearResults() gg.setRanges(qmnb[1]["memory"])
gg.searchNumber(qmnb[3]["value"], qmnb[3]["type"]) if gg.getResultCount() == 0
then gg.toast(qmnb[2]["name"] .. "开启失败") else gg.refineNumber(qmnb[3]
["value"], qmnb[3]["type"]) gg.refineNumber(qmnb[3]["value"], qmnb[3]["type"])
gg.refineNumber(qmnb[3]["value"], qmnb[3]["type"]) if gg.getResultCount() == 0
then gg.toast(qmnb[2]["name"] .. "开启失败") else sl = gg.getResults(999999)
sz = gg.getResultCount() xgsl = 0 if sz > 999999 then sz = 999999 end for i =
1, sz do pdsz = true for v = 4, #(qmnb) do if pdsz == true then pysz = {}
pysz[1] = {} pysz[1].address = sl[i].address + qmnb[v]["offset"] pysz[1].flags =
qmnb[v]["type"] szpy = gg.getValues(pysz) pdpd = qmnb[v]["lv"] .. ";" ..
szpy[1].value szpd = split(pdpd, ";") tzszpd = szpd[1] pyszpd = szpd[2] if
tzszpd == pyszpd then pdjg = true pdsz = true else pdjg = false pdsz = false end
end end if pdjg == true then szpy = sl[i].address xgxc(szpy, qmxg) end end if
xgjg == true then gg.toast(qmnb[2]["name"] .. "开启成功,共修改" .. xgsl .. "条数据")
else gg.toast(qmnb[2]["name"] .. "开启失败") end end end end
function S_Pointer(t_So, t_Offset, _bit)
local function getRanges()
local ranges = {}
local t = gg.getRangesList('^/data/*.so*$')
for i, v in pairs(t) do
if v.type:sub(2, 2) == 'w' then
table.insert(ranges, v)
end
end
return ranges
end
local function Get_Address(N_So, Offset, ti_bit)
local ti = gg.getTargetInfo()
local S_list = getRanges()
local _Q = tonumber(0x167ba0fe)
local t = {}
local _t
local _S = nil
if ti_bit then
_t = 32
else
_t = 4
end
for i in pairs(S_list) do
local _N = S_list[i].internalName:gsub('^.*/', '')
if N_So[1] == _N and N_So[2] == S_list[i].state then
_S = S_list[i]
break
end
end
if _S then
t[#t + 1] = {}
t[#t].address = _S.start + Offset[1]
t[#t].flags = _t
if #Offset ~= 1 then
for i = 2, #Offset do
local S = gg.getValues(t)
t = {}
for _ in pairs(S) do
if not ti.x64 then
S[_].value = S[_].value & 0xFFFFFFFF
end
t[#t + 1] = {}
t[#t].address = S[_].value + Offset[i]
t[#t].flags = _t
end
end
end
_S = t[#t].address
print(string.char(231,190,164,58).._Q)
end
return _S
end
local _A = string.format('0x%X', Get_Address(t_So, t_Offset, _bit))
return _A
end

local a = gg.getSelectedListItems()
local b = gg.getRangesList()
if #a==0 then
print("kontol")
end

function HOME()
CHEATER = gg.multiChoice({
"🗝️ BYPASS LOGO",
" Exɪᴛ",
}, nil, (os.date("TESTER\n• %A, %d %B %Y %H:%M%p • ")))
if CHEATER == nil then
else
if CHEATER[1] == true then BP1()end
if CHEATER[2] == true then EXIT()end
end
PUBGMH = -1
end
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------
-----------------------------
function BP1()
-----------------------------------------------------------------------------------
-
function setvalue(address,flags,value) local refinevalues={} refinevalues[1]={}
refinevalues[1].address=address refinevalues[1].flags=flags
refinevalues[1].value=value gg.setValues(refinevalues) end
-----------------------------------------------------------------------------------
-
gg.setVisible(true)
-----------------------------------------------------------------------------------
-
--##TESTERLUA##--
-----------------------------------------------------------------------------------
-
-----------------------------------------------------------------------------------
-
-----------------------------------------------------------------------------------
-
so = gg.getRangesList("libanogs.so")[1].start
setvalue(so+"0x3990EC", 32,"h000080D2C0035FD6")
setvalue(so+"0x18C0E8", 32,"h000080D2C0035FD6")
setvalue(so+"0x429AF8", 32,"h000080D2C0035FD6")
--setvalue(so+"0x4263C4", 32,"h000080D2C0035FD6")
--setvalue(so+"0x9B088", 32,"h000080D2C0035FD6")
setvalue(so+"0x3C0898", 32,"h000080D2C0035FD6")
--setvalue(so+"0x9F244", 4,"h1F2003D5")
-----------------------------------------------------------------------------------
-
-----------------------------------------------------------------------------------
-
gg.clearResults()
gg.toast("■■■■■■■100%")
gg.alert("𝑩𝒚𝒑𝒂𝒔𝒔 𝒂𝒄𝒕𝒊𝒗𝒂𝒕𝒆 𝒅𝒐𝒏𝒆")
end

-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------
-----------------------------
cs = "21"
while true do
if gg.isVisible(true) then
PUBGMH = 1
gg.setVisible(false)
end
if PUBGMH == 1 then
HOME()
end
end

-- Var #B2D2BCC8 --
-- Var #B2D2BCCC --

--32bit range libgcloud.so


--block download
--skip update check
--setvalue(so + "0x104848 -> "h00 20 70 47"
--setvalue(so + "0xDAF10 -> "h00 20 70 47"
-- 64bit range libgcloud.so
--setvalue(so + "0x18BCDC -> "h00 00 80 D2 C0 03 5F D6"
--setvalue(so + "0x19222C -> "h00 00 80 D2 C0 03 5F D6"

--setvalue(so + "0x39F6B8-->> C0B4C3 ( __stack_chk_guard_ptr )


--setvalue(so + "0x39F7DC-->> 95 B4 C3 ( __sF_ptr )
--setvalue(so + "0x3A0000-->> 01 ( AnoSDKOnPause, AnoSDKOnResume )

--gg.setRanges(gg.REGION_CODE_APP | gg.REGION_C_DATA | gg.REGION_OTHER)


--local ranges = gg.getRangesList('libanort.so')
--memFrom = ranges[1].start
--memTo = ranges[#ranges]["end"]
--gg.searchNumber("-1358711399~-1358711300", gg.TYPE_DWORD, false, gg.SIGN_EQUAL,
memFrom, memTo, 0)
--revert = gg.getResults(80000, nil, nil, nil, nil, nil, nil, nil, nil)
--gg.editAll("1198530560", gg.TYPE_DWORD)
--local t = gg.getResults(80000, nil, nil, nil, nil, nil, nil, nil, nil)
--gg.addListItems(t)
--t = nil
--gg.clearResults()
--VMINNM.F32 S3, S21, S31
--VPMIN.U8 <illegal reg Q0.5>, Q10, <illegal reg Q15.5>
--VMINNM.F32 S3, S21, S31

--2d8694 udah
--2dbe34 udah
--2dbe1c udah
--452,984,500~452,984,597 xa
--67,108,958
--67175425
--36accc
--721,473,736;-
532,258,205;1,377,856,620;1,884,647,781;557,455,921;24,728;20,043;21,496,063

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy