

If you have a rooted Android phone, you can try my other project Zygisk-Il2CppDumper, it can bypass almost all protections.The IL2CPP (Intermediate Language To C++) scripting backend A framework that powers scripting in Unity. Il2CppDumper detected that the executable file has been protected, use GameGuardian to dump libil2cpp.so from the game memory, then use Il2CppDumper to load and follow the prompts, can bypass most protections. You can open a new issue and upload the file, I will try to solve. Please note that the executable file for the PC platform is GameAssembly.dll or *Assembly.dll ERROR: Can't use auto mode to process file, try manual mode. If your file is libil2cpp.so and you have a rooted Android phone, you can try my other project Zygisk-Il2CppDumper, it can bypass this protection.

Deobfuscating of such files is beyond the scope of this program, so please DO NOT file an issue regarding to deobfuscating.

Sometimes games may obfuscate this file for content protection purposes and so on.

the program may need to use v16 parser on il2cpp v20 (Android) binaries in order to work properly) This may be useful on some older il2cpp version (e.g. If ForceIl2CppVersion is true, the program will use the version number specified in ForceVersion to choose parser for il2cpp binaries (does not affect the choice of metadata parser).Whether to press any key to exit at the end.Whether to output these information to dump.cs.Structure information header file ghidra.pyįor Ghidra, work with ghidra-wasm-plugin script.jsonįor ida.py, ghidra.py and Il2CppBinaryNinja stringliteral.jsonĬontains all stringLiteral information ConfigurationĪll the configuration options are located in config.jsonĭumpMethod, DumpField, DumpProperty, DumpAttribute, DumpFieldOffset, DumpMethodOffset, DumpTypeDefIndex Net decompiler tools to viewĬan be used to extract Unity MonoBehaviour and MonoScript, for UtinyRipper, UABE ida.pyįor IDA, read il2cpp.h file and apply structure information in IDA il2cpp.h Folder, containing all restored dll files
