From 0cc865ee5653138207ccc54d50c7054cdf38d6b4 Mon Sep 17 00:00:00 2001 From: VollRahm <655-VollRahm@users.noreply.git.hacks.ltd> Date: Sat, 7 Nov 2020 02:46:07 +0000 Subject: [PATCH] Update README.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 66a8770..7ba2f79 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,7 @@ # godtier-patcher ## Preamble -Recently I got sent a R6 Cheat, with the wish of getting it "cracked". When I saw that it was an unpacked console app, I decided to accept the challenge and now I'm posting this write-up to help upcoming reverse engineers and to help software developers protect their code. I only ran this cheat inside of my Virtual Machine, its not malicious, but if you run it its under your own risk. [missing], else I would really appreciate if you read along. +Recently I got sent a R6 Cheat, with the wish of getting it "cracked". When I saw that it was an unpacked console app, I decided to accept the challenge and now I'm posting this write-up to help upcoming reverse engineers and to help software developers protect their code. I only ran this cheat inside of my Virtual Machine, its not malicious, but if you run it its under your own risk. +__You can download this release [HERE](https://githacks.org/VollRahm/godtier-r6-patcher/-/tags/1.0.0)__. I would really appreciate it if you read along though. ## Step 0: Identification As I already said, it is a native x64 console application that has not been packed. I started it, and it asks you for a client id and password. Upon entering wrong information, the app prints our an error message and closes after a short amount of time. The first thing I obviously did was to throw it into IDA and have a look at the strings.