Update README.md and assembly versions

This commit is contained in:
Katy Coe
2021-01-31 14:18:50 +01:00
parent 712e21e735
commit b6f4197aed
3 changed files with 13 additions and 6 deletions

View File

@@ -9,7 +9,7 @@
<PublishTrimmed>false</PublishTrimmed> <PublishTrimmed>false</PublishTrimmed>
<RuntimeIdentifier>win-x64</RuntimeIdentifier> <RuntimeIdentifier>win-x64</RuntimeIdentifier>
<PackageRequireLicenseAcceptance>false</PackageRequireLicenseAcceptance> <PackageRequireLicenseAcceptance>false</PackageRequireLicenseAcceptance>
<Version>2020.2.1</Version> <Version>2021.1</Version>
<Company>Noisy Cow Studios</Company> <Company>Noisy Cow Studios</Company>
<Product>Il2CppInspector Command-Line Edition</Product> <Product>Il2CppInspector Command-Line Edition</Product>
<Copyright>(c) 2017-2021 Katy Coe - www.djkaty.com - www.github.com/djkaty</Copyright> <Copyright>(c) 2017-2021 Katy Coe - www.djkaty.com - www.github.com/djkaty</Copyright>

View File

@@ -4,7 +4,7 @@
<TargetFramework>netcoreapp3.1</TargetFramework> <TargetFramework>netcoreapp3.1</TargetFramework>
<AssemblyName>Il2CppInspector.Common</AssemblyName> <AssemblyName>Il2CppInspector.Common</AssemblyName>
<Authors>Katy Coe</Authors> <Authors>Katy Coe</Authors>
<Version>2020.2.1</Version> <Version>2021.1</Version>
<Company>Noisy Cow Studios</Company> <Company>Noisy Cow Studios</Company>
<Product>Il2CppInspector Shared Library</Product> <Product>Il2CppInspector Shared Library</Product>
<TargetsForTfmSpecificBuildOutput>$(TargetsForTfmSpecificBuildOutput);CopyProjectReferencesToPackage</TargetsForTfmSpecificBuildOutput> <TargetsForTfmSpecificBuildOutput>$(TargetsForTfmSpecificBuildOutput);CopyProjectReferencesToPackage</TargetsForTfmSpecificBuildOutput>

View File

@@ -1,4 +1,6 @@
# Il2CppInspector 2021.1 Release Candidate 1 #### _**[Project maintainer is on hiatus until May 2021. Critical bug fixes and compatibility updates only during this time window]**_
# Il2CppInspector 2021.1
Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the most complete analysis currently available. Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the most complete analysis currently available.
@@ -28,13 +30,14 @@ Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the
* Defeats certain types of obfuscation * Defeats certain types of obfuscation
- Most types of packed PE files (Windows DLLs) - Most types of packed PE files (Windows DLLs)
- ROT encryption of API export names
- Beebyte symbol obfuscation via automated differential analysis (requires [Beebyte Deobfuscator plugin](https://github.com/OsOmE1/Beebyte-Deobfuscator) and an earlier unobfuscated IL2CPP or Mono version of the title)
- XOR encryption style used in games such as [Arknights](https://play.google.com/store/apps/details?id=com.YoStarEN.Arknights&hl=en_US&gl=US) and [Call of Duty: Mobile](https://play.google.com/store/apps/details?id=com.activision.callofduty.shooter&hl=en_US&gl=US) - XOR encryption style used in games such as [Arknights](https://play.google.com/store/apps/details?id=com.YoStarEN.Arknights&hl=en_US&gl=US) and [Call of Duty: Mobile](https://play.google.com/store/apps/details?id=com.activision.callofduty.shooter&hl=en_US&gl=US)
- Striped XOR encryption style used in games such as [Garena Free Fire](https://play.google.com/store/apps/details?id=com.dts.freefireth&hl=en_US&gl=US), [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US) and [Legends of Runeterra](https://play.google.com/store/apps/details?id=com.riotgames.legendsofruneterra&hl=en_US&gl=US) - Striped XOR encryption style used in games such as [Garena Free Fire](https://play.google.com/store/apps/details?id=com.dts.freefireth&hl=en_US&gl=US), [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US) and [Legends of Runeterra](https://play.google.com/store/apps/details?id=com.riotgames.legendsofruneterra&hl=en_US&gl=US)
- String encryption style used in games such as [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US) - String encryption style used in games such as [League of Legends: Wild Rift](https://play.google.com/store/apps/details?id=com.riotgames.league.wildrift&hl=en_US&gl=US)
- Reordering of registration metadata used in titles by Riot Games - Reordering of registration metadata used in titles by Riot Games
- Encryption/obfuscation used in titles by miHoYo ([Honkai Impact 3rd](https://honkaiimpact3.mihoyo.com/) and [Genshin Impact](https://genshin.mihoyo.com/) (requires [miHoYo plugin](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders/miHoYo)) - Encryption/obfuscation used in titles by miHoYo ([Honkai Impact 3rd](https://honkaiimpact3.mihoyo.com/) and [Genshin Impact](https://genshin.mihoyo.com/)) (requires [miHoYo plugin](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders/miHoYo))
- Obfuscation of symbols by Beebyte, via automated comparative analysis of an unobfuscated Mono or IL2CPP binary (requires [Beebyte Deobfuscator plugin](https://github.com/OsOmE1/Beebyte-Deobfusctator)) - For other supported obfuscated titles, see the list of [loader plugins](https://github.com/djkaty/Il2CppInspectorPlugins/tree/master/Loaders)
- ROT encryption of API export names
- Deobfuscated metadata and binary files can be saved back to disk - Deobfuscated metadata and binary files can be saved back to disk
* Supports **all major file formats and processor architectures** * Supports **all major file formats and processor architectures**
@@ -167,6 +170,8 @@ Run `Il2CppInspector.exe` at the command prompt.
File format and architecture are automatically detected. File format and architecture are automatically detected.
All outputs are generated by default. To generate only specific outputs, use the `--select-outputs` switch in combination with the output selection switches.
``` ```
-i, --bin (Default: libil2cpp.so) IL2CPP binary, APK, AAB, XAPK, IPA, Zip or Linux process map text input file(s) (single file or comma-separated list for split APKs) -i, --bin (Default: libil2cpp.so) IL2CPP binary, APK, AAB, XAPK, IPA, Zip or Linux process map text input file(s) (single file or comma-separated list for split APKs)
@@ -174,6 +179,8 @@ File format and architecture are automatically detected.
--image-base For ELF memory dumps, the image base address in hex (ignored for standard ELF files and other file formats) --image-base For ELF memory dumps, the image base address in hex (ignored for standard ELF files and other file formats)
--select-outputs Only generate outputs specified on the command line (use --cs-out, --py-out, --cpp-out, --json-out, --dll-out to select outputs). If not specified, all outputs are generated
-c, --cs-out (Default: types.cs) C# output file (when using single-file layout) or path (when using per namespace, assembly or class layout) -c, --cs-out (Default: types.cs) C# output file (when using single-file layout) or path (when using per namespace, assembly or class layout)
-p, --py-out (Default: il2cpp.py) Python script output file -p, --py-out (Default: il2cpp.py) Python script output file