From b6f4197aedcdc865b87a8508b665781f9b6312da Mon Sep 17 00:00:00 2001 From: Katy Coe Date: Sun, 31 Jan 2021 14:18:50 +0100 Subject: [PATCH] Update README.md and assembly versions --- Il2CppInspector.CLI/Il2CppInspector.CLI.csproj | 2 +- Il2CppInspector.Common/Il2CppInspector.csproj | 2 +- README.md | 15 +++++++++++---- 3 files changed, 13 insertions(+), 6 deletions(-) diff --git a/Il2CppInspector.CLI/Il2CppInspector.CLI.csproj b/Il2CppInspector.CLI/Il2CppInspector.CLI.csproj index c60a7102..2640e22c 100644 --- a/Il2CppInspector.CLI/Il2CppInspector.CLI.csproj +++ b/Il2CppInspector.CLI/Il2CppInspector.CLI.csproj @@ -9,7 +9,7 @@ false win-x64 false - 2020.2.1 + 2021.1 Noisy Cow Studios Il2CppInspector Command-Line Edition (c) 2017-2021 Katy Coe - www.djkaty.com - www.github.com/djkaty diff --git a/Il2CppInspector.Common/Il2CppInspector.csproj b/Il2CppInspector.Common/Il2CppInspector.csproj index 488f9351..a4d303d8 100644 --- a/Il2CppInspector.Common/Il2CppInspector.csproj +++ b/Il2CppInspector.Common/Il2CppInspector.csproj @@ -4,7 +4,7 @@ netcoreapp3.1 Il2CppInspector.Common Katy Coe - 2020.2.1 + 2021.1 Noisy Cow Studios Il2CppInspector Shared Library $(TargetsForTfmSpecificBuildOutput);CopyProjectReferencesToPackage diff --git a/README.md b/README.md index 18d1678d..b2f4aefd 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,6 @@ -# Il2CppInspector 2021.1 Release Candidate 1 +#### _**[Project maintainer is on hiatus until May 2021. Critical bug fixes and compatibility updates only during this time window]**_ + +# Il2CppInspector 2021.1 Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the most complete analysis currently available. @@ -28,13 +30,14 @@ Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the * Defeats certain types of obfuscation - Most types of packed PE files (Windows DLLs) + - ROT encryption of API export names + - Beebyte symbol obfuscation via automated differential analysis (requires [Beebyte Deobfuscator plugin](https://github.com/OsOmE1/Beebyte-Deobfuscator) and an earlier unobfuscated IL2CPP or Mono version of the title) - XOR encryption style used in games such as [Arknights](https://play.google.com/store/apps/details?id=com.YoStarEN.Arknights&hl=en_US&gl=US) and [Call of Duty: Mobile](https://play.google.com/store/apps/details?id=com.activision.callofduty.shooter&hl=en_US&gl=US) - Striped XOR encryption style used in games such as [Garena Free Fire](https://play.google.com/store/apps/details?id=com.dts.freefireth&hl=en_US&gl=US), [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US) and [Legends of Runeterra](https://play.google.com/store/apps/details?id=com.riotgames.legendsofruneterra&hl=en_US&gl=US) - String encryption style used in games such as [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US) - Reordering of registration metadata used in titles by Riot Games - - Encryption/obfuscation used in titles by miHoYo ([Honkai Impact 3rd](https://honkaiimpact3.mihoyo.com/) and [Genshin Impact](https://genshin.mihoyo.com/) (requires [miHoYo plugin](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders/miHoYo)) - - Obfuscation of symbols by Beebyte, via automated comparative analysis of an unobfuscated Mono or IL2CPP binary (requires [Beebyte Deobfuscator plugin](https://github.com/OsOmE1/Beebyte-Deobfusctator)) - - ROT encryption of API export names + - Encryption/obfuscation used in titles by miHoYo ([Honkai Impact 3rd](https://honkaiimpact3.mihoyo.com/) and [Genshin Impact](https://genshin.mihoyo.com/)) (requires [miHoYo plugin](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders/miHoYo)) + - For other supported obfuscated titles, see the list of [loader plugins](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders) - Deobfuscated metadata and binary files can be saved back to disk * Supports **all major file formats and processor architectures** @@ -167,6 +170,8 @@ Run `Il2CppInspector.exe` at the command prompt. File format and architecture are automatically detected. +All outputs are generated by default. To generate only specific outputs, use the `--select-outputs` switch in combination with the output selection switches. + ``` -i, --bin (Default: libil2cpp.so) IL2CPP binary, APK, AAB, XAPK, IPA, Zip or Linux process map text input file(s) (single file or comma-separated list for split APKs) @@ -174,6 +179,8 @@ File format and architecture are automatically detected. --image-base For ELF memory dumps, the image base address in hex (ignored for standard ELF files and other file formats) + --select-outputs Only generate outputs specified on the command line (use --cs-out, --py-out, --cpp-out, --json-out, --dll-out to select outputs). If not specified, all outputs are generated + -c, --cs-out (Default: types.cs) C# output file (when using single-file layout) or path (when using per namespace, assembly or class layout) -p, --py-out (Default: il2cpp.py) Python script output file