Il2CppInspector
PriconneRe-TL
Il2CppInspector | PriconneRe-TL | |
---|---|---|
4 | 6 | |
2,426 | 96 | |
- | - | |
0.0 | 9.1 | |
almost 2 years ago | 3 days ago | |
C | ||
GNU Affero General Public License v3.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Il2CppInspector
- Need help understanding reversed libil2cpp code
-
Using IL2CPPInspector to create and inject a new Unity Projector as a mod?
That's it! It'd be 2 seconds in C#, but this tool is beyond me. Anybody have experience creating a mod like this or using IL2CPPInspector? Here is a link to the tutorial if any C++ aficionados are unfamiliar with the tool but want to take a gander: https://katyscode.wordpress.com/2021/01/14/il2cppinspector-tutorial-working-with-code-in-il2cpp-dll-injection-projects/
-
Help decompiling an IL2CPP dll?
il2cpp.py> Running... Generated script file by Il2CppInspector - http://www.djkaty.com - https://github.com/djkaty Processing method definitions Processing constructed generic methods Processing custom attributes generators Processing Method.Invoke thunks Processing string literals Processing Il2CppClass (TypeInfo) pointers Processing Il2CppType (TypeRef) pointers Processing MethodInfo pointers Processing function boundaries Processing IL2CPP type metadata Traceback (most recent call last): File "H:\extracting shit\sf1 rema\ghidra\inspector\il2cpp.py", line 220, in ProcessJSON(jsonData) File "H:\extracting shit\sf1 rema\ghidra\inspector\il2cpp.py", line 197, in ProcessJSON DefineField(d['virtualAddress'], d['name'], d['type']) File "H:\extracting shit\sf1 rema\ghidra\inspector\il2cpp.py", line 119, in DefineField SetType(addr, AsUTF8(type)) File "H:\extracting shit\sf1 rema\ghidra\inspector\il2cpp.py", line 60, in SetType createData(addr, t) at ghidra.program.database.code.CodeManager.checkValidAddressRange(CodeManager.java:1945) at ghidra.program.database.code.CodeManager.createCodeUnit(CodeManager.java:2030) at ghidra.program.database.ListingDB.createData(ListingDB.java:422) at ghidra.program.flatapi.FlatProgramAPI.createData(FlatProgramAPI.java:1646) at jdk.internal.reflect.GeneratedMethodAccessor59.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:564) ghidra.program.model.util.CodeUnitInsertionException: ghidra.program.model.util.CodeUnitInsertionException: Conflicting data exists at address 182069d98 to 182069d9f il2cpp.py> Finished!
-
Impossible to reverse engineer Il2cpp to readable full code / well close to?
https://github.com/djkaty/Il2CppInspector#adding-metadata-to-your-ghidra-workflow
PriconneRe-TL
-
Ever since global died i've neglected to read any story. and its too hot to ai upscale global recordings, so my next idea is to record the rest of the story with priconne tl auto translation for all of you who don't have the means to do it. it wont be perfect but its better than nothing
this image is using DeepL with the PriconneTLTranslation mod
- The entire cast of girls in Priconne in shambles after witnessing this.
- I wish I was still playing.....
- An English patch for Princess Connect! ReDive JP server is now available again!
- PriconneRe-TL is back
What are some alternatives?
Il2CppDumper - Unity il2cpp reverse engineer
MelonLoader - The World's First Universal Mod Loader for Unity Games compatible with both Il2Cpp and Mono
frida-il2cpp-bridge - A Frida module to dump, trace or hijack any Il2Cpp application at runtime, without needing the global-metadata.dat file.
PriconeTL - An English patch for Princess Connect! ReDive JP server
BepInEx - Unity / XNA game patcher and plugin framework
radare2 - UNIX-like reverse engineering framework and command-line toolset
ZoiaPatchViewerBuild - For already-build distribution of ZoiaPatchViewer
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
liemoth - Development Kit For Ambarella Devices
appstream - Tools and libraries to work with AppStream metadata
Il2CppInspectorPlugins - The official repository of plugins for Il2CppInspector