In applications, changing variables or forcing execution methods during runtime can be really useful to bypass some security or even to write hacks. On Android, we can change binary libraries…Continue readingUse Frida to controll Unity app (IL2CPP)
Sometimes the app’s communication is written in a way that cannot be intercepted by Burp Suite, OWASP ZAP, etc. but it’s still HTTPS communication. For example, I wrote an app…Continue readingFooling app with MockServer (HTTPS)
Apps use variables and they are stored in RAM. It would be wonderful to have access to this memory, and fortunately for us it is really simple. We only need…Continue readingSimple editing App’s RAM
Modifying C# is a really easy task if code was compiled only to IL. In this form, files (DLLs) can be executed, so it’s possible to find apps with this…Continue readingHack Mono DLL
Unity android app can be build in 2 ways: Mono – DLL can be simply reversed to C# L2CPP – where C# code is compiled directly to binary files for…Continue readingEdit code in Unity APK (IL2CPP)
PlayerPrefs is a common way to save some variables in Unity applications. If we can view or even modify it, we can understand better how the app works, or maybe…Continue readingEdit PlayerPrefs in Unity App