Dump Il2Cpp unprotected executable ELF and metadata from process memory
- Pure shell implementation
- Supports detection of ELF file headers
- Supports detection of Il2Cpp metadata file headers
- Supports guessing which is the correct ELF based on memory location
- Supports automatic memory region merging
- Supports dumping Il2Cpp metadata from memory
- Supports dumping decrypted Il2Cpp metadata from memory
- Supports ELF file headers analysis
- Supports Il2Cpp metadata file headers analysis
- Android Shell (root):
Il2CppMemoryDumper.sh <package> [output=/sdcard/dump]
- Output will be:
[output]/[startOffset]_[package]_[memoryName].[so/bin/dat]
[output]/[package]_maps.txt
- Nothing to do
- Check the version of Il2Cpp metadata. Since
IL2CPP_ASSERT
is not valid for Release versions, some games may scramble the metadata version, which can cause a failure to dump. (libil2cpp) - Fix dumped ELF using SoFixer (or other repair methods).
- Dump Method and StringLiteral using Il2CppDumper. It contains the latest source code compilation (supporting IL2CPP 29), you also can download standalone execueable for Linux (x64, arm, arm64), MacOS (x64, arm64), WoA (arm, arm64) in it.
No license, you are only allowed to use this project. All rights are reserved by NekoYuzu (MlgmXyysd).