– APK Easy Tool
– Reverse Engineering Knowledge
This method only works on some games
1. Decompile the apk using APK Easy Tool without “Don’t decode classes.dex” option checked
2. Head into Decompiled APK Directory, I’m using Point Blank Strike for this test so for example I will go to:
C:Users<username>DocumentsAPK Easy Tool-Decompiled APKsPoint Blank Strike
3. Open smali folder, and locate “XigncodeClient.smali”, usually the file is here:
4. Open the file with any text editor, and find
5. Now, Add this code after .prologue line, so the code should looks like this:
const/4 v0, 0x1
What do we exactly modify here?
A function that starts Xigncode protection function that imported from libxigncode.so and set this function to always return 1 / return true without calling the protection function
Last thing you need to do is recompile the app and you are ready to go.