You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
67 lines
2.7 KiB
67 lines
2.7 KiB
# build scripts
|
|
|
|
First things first, to get this compiling/working for you, you are going to need to fix these build scripts:
|
|
|
|
```
|
|
adb logcat -c
|
|
adb push C:\Users\%USERNAME%\source\repos\ligma\ARM\Release\libligma.so /data/app/com.activision.callofduty.shooter-1/lib/arm/libligma.so
|
|
start cmd /k "title 'ligma filter' & adb logcat | findstr ligma"
|
|
start cmd /k "title 'codm logs' & adb logcat | findstr com.activision.callofduty.shooter"
|
|
start cmd /k "title 'all logs' & adb logcat"
|
|
adb shell am start -n com.activision.callofduty.shooter/com.tencent.tmgp.cod.PermissionGrantActivity
|
|
```
|
|
|
|
just change `C:\Users\%USERNAME%\source\repos\ligma\ARM\Release\libligma.so` to the path of your repo. Also change `adb` to whatever `adb` your emulator is using.
|
|
|
|
# setup
|
|
|
|
Since we arent done making this cheat, we have no need to repackage the entire apk and reinstall everytime we wanna test our code. Since the application
|
|
is not inside of this repo, you will need to first download the apk from here: [cod mobile](https://apkpure.com/call-of-duty-legends-of-war/com.activision.callofduty.shooter).
|
|
|
|
### decompile
|
|
|
|
First unzip the xapk and take the .apk that is inside of it out. use apktool.jar to decompile the apk. we are going to patch a smali file to load our .so before any other .so.
|
|
|
|
```
|
|
apktool.jar d codm.apk
|
|
```
|
|
|
|
now go to this smali file: `smali\com\tencent\tpshell\TPShellApplication.smali`. Add this smali code to load our .so:
|
|
|
|
<img src="https://imgur.com/5OcgEsB.png"/>
|
|
|
|
### recompile
|
|
|
|
simply run this to recompile the apk, this apk is not signed and will need to be signed.
|
|
|
|
```
|
|
apktool.jar b codm -o codm_patched.apk
|
|
```
|
|
|
|
### signing
|
|
|
|
use apksigner.jar to sign the newly compiled apk.
|
|
|
|
```
|
|
apksigner.jar -a codm_patched.apk
|
|
```
|
|
|
|
now you have a patched & signed apk. Its time to install the apk.
|
|
|
|
### install
|
|
|
|
now that we have a signed and patched apk, install the apk (not the xapk) just the patched apk into your emulator. After you have installed it you will
|
|
need to copy the .obb files which are located INSIDE of the xapk. open the xapk back up in zip, open `Android` folder and you will see an `obb` folder. Copy this folder
|
|
to `Android/obb (or copy the content from inside of the obb file to here)` on your emulator.
|
|
|
|
<img src="https://imgur.com/f35AYAA.png"/>
|
|
|
|
|
|
Finally you will now need to copy the original `apk` to `/data/app/` please refer to [this](https://githacks.org/android-reverse-engineering/cod-mobile/-/blob/master/ligma%20(cheat)/ligma/bypass/bypass.cpp#L35) line of code to understand why.
|
|
Ensure that the `apk` is named `base_orig.apk`. If everything is done correctly you will now be able to build your .so and the game will auto run.
|
|
|
|
# Result
|
|
|
|
now if you click build inside of visual studios your screen should look like this:
|
|
|
|
<img src="https://imgur.com/87wxbPL.png"/> |