Skip to content

Commit

Permalink
Update README.md and assembly versions
Browse files Browse the repository at this point in the history
  • Loading branch information
djkaty committed Jan 31, 2021
1 parent 712e21e commit b6f4197
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 6 deletions.
2 changes: 1 addition & 1 deletion Il2CppInspector.CLI/Il2CppInspector.CLI.csproj
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
<PublishTrimmed>false</PublishTrimmed>
<RuntimeIdentifier>win-x64</RuntimeIdentifier>
<PackageRequireLicenseAcceptance>false</PackageRequireLicenseAcceptance>
<Version>2020.2.1</Version>
<Version>2021.1</Version>
<Company>Noisy Cow Studios</Company>
<Product>Il2CppInspector Command-Line Edition</Product>
<Copyright>(c) 2017-2021 Katy Coe - www.djkaty.com - www.github.com/djkaty</Copyright>
Expand Down
2 changes: 1 addition & 1 deletion Il2CppInspector.Common/Il2CppInspector.csproj
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<TargetFramework>netcoreapp3.1</TargetFramework>
<AssemblyName>Il2CppInspector.Common</AssemblyName>
<Authors>Katy Coe</Authors>
<Version>2020.2.1</Version>
<Version>2021.1</Version>
<Company>Noisy Cow Studios</Company>
<Product>Il2CppInspector Shared Library</Product>
<TargetsForTfmSpecificBuildOutput>$(TargetsForTfmSpecificBuildOutput);CopyProjectReferencesToPackage</TargetsForTfmSpecificBuildOutput>
Expand Down
15 changes: 11 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
# Il2CppInspector 2021.1 Release Candidate 1
#### _**[Project maintainer is on hiatus until May 2021. Critical bug fixes and compatibility updates only during this time window]**_

# Il2CppInspector 2021.1

Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the most complete analysis currently available.

Expand Down Expand Up @@ -28,13 +30,14 @@ Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the

* Defeats certain types of obfuscation
- Most types of packed PE files (Windows DLLs)
- ROT encryption of API export names
- Beebyte symbol obfuscation via automated differential analysis (requires [Beebyte Deobfuscator plugin](https://github.com/OsOmE1/Beebyte-Deobfuscator) and an earlier unobfuscated IL2CPP or Mono version of the title)
- XOR encryption style used in games such as [Arknights](https://play.google.com/store/apps/details?id=com.YoStarEN.Arknights&hl=en_US&gl=US) and [Call of Duty: Mobile](https://play.google.com/store/apps/details?id=com.activision.callofduty.shooter&hl=en_US&gl=US)
- Striped XOR encryption style used in games such as [Garena Free Fire](https://play.google.com/store/apps/details?id=com.dts.freefireth&hl=en_US&gl=US), [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US) and [Legends of Runeterra](https://play.google.com/store/apps/details?id=com.riotgames.legendsofruneterra&hl=en_US&gl=US)
- String encryption style used in games such as [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US)
- Reordering of registration metadata used in titles by Riot Games
- Encryption/obfuscation used in titles by miHoYo ([Honkai Impact 3rd](https://honkaiimpact3.mihoyo.com/) and [Genshin Impact](https://genshin.mihoyo.com/) (requires [miHoYo plugin](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders/miHoYo))
- Obfuscation of symbols by Beebyte, via automated comparative analysis of an unobfuscated Mono or IL2CPP binary (requires [Beebyte Deobfuscator plugin](https://github.com/OsOmE1/Beebyte-Deobfusctator))
- ROT encryption of API export names
- Encryption/obfuscation used in titles by miHoYo ([Honkai Impact 3rd](https://honkaiimpact3.mihoyo.com/) and [Genshin Impact](https://genshin.mihoyo.com/)) (requires [miHoYo plugin](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders/miHoYo))
- For other supported obfuscated titles, see the list of [loader plugins](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders)
- Deobfuscated metadata and binary files can be saved back to disk

* Supports **all major file formats and processor architectures**
Expand Down Expand Up @@ -167,13 +170,17 @@ Run `Il2CppInspector.exe` at the command prompt.

File format and architecture are automatically detected.

All outputs are generated by default. To generate only specific outputs, use the `--select-outputs` switch in combination with the output selection switches.

```
-i, --bin (Default: libil2cpp.so) IL2CPP binary, APK, AAB, XAPK, IPA, Zip or Linux process map text input file(s) (single file or comma-separated list for split APKs)
-m, --metadata (Default: global-metadata.dat) IL2CPP metadata file input (ignored for APK/AAB/XAPK/IPA/Zip)
--image-base For ELF memory dumps, the image base address in hex (ignored for standard ELF files and other file formats)
--select-outputs Only generate outputs specified on the command line (use --cs-out, --py-out, --cpp-out, --json-out, --dll-out to select outputs). If not specified, all outputs are generated
-c, --cs-out (Default: types.cs) C# output file (when using single-file layout) or path (when using per namespace, assembly or class layout)
-p, --py-out (Default: il2cpp.py) Python script output file
Expand Down

0 comments on commit b6f4197

Please sign in to comment.