back to home

Perfare / Il2CppDumper

Unity il2cpp reverse engineer

8,738 stars
1,743 forks
140 issues
C#Python

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing Perfare/Il2CppDumper in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/Perfare/Il2CppDumper)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

Il2CppDumper 中文说明请戳这里 Unity il2cpp reverse engineer Features • Complete DLL restore (except code), can be used to extract and • Supports ELF, ELF64, Mach-O, PE, NSO and WASM format • Supports Unity 5.3 - 2022.2 • Supports generate IDA, Ghidra and Binary Ninja scripts to help them better analyze il2cpp files • Supports generate structures header file • Supports Android memory dumped file to bypass protection • Support bypassing simple PE protection Usage Run and choose the il2cpp executable file and file, then enter the information as prompted The program will then generate all the output files in current working directory Command-line Outputs DummyDll Folder, containing all restored dll files Use dnSpy, ILSpy or other .Net decompiler tools to view Can be used to extract Unity and , for UtinyRipper, UABE ida.py For IDA ida_with_struct.py For IDA, read il2cpp.h file and apply structure information in IDA il2cpp.h structure information header file ghidra.py For Ghidra Il2CppBinaryNinja For BinaryNinja ghidra_wasm.py For Ghidra, work with ghidra-wasm-plugin script.json For ida.py, ghidra.py and Il2CppBinaryNinja stringliteral.json Contains all stringLiteral information Configuration All the configuration options are located in Available options: • , , , , , , • Whether to output these information to dump.cs • , • Whether to generate these things • * Whether to add token in DummyDll • * Whether to press any key to exit at the end • , • If is , the program will use the version number specified in to choose parser for il2cpp binaries (does not affect the choice of metadata parser). This may be useful on some older il2cpp version (e.g. the program may need to use v16 parser on il2cpp v20 (Android) binaries in order to work properly) • * Force files to be treated as dumped • * Treat pointers in dumped files as unredirected, This option needs to be for files dumped from some devices Common errors Make sure you choose the correct file. Sometimes games may obfuscate this file for content protection purposes and so on. Deobfuscating of such files is beyond the scope of this program, so please **DO NOT** file an issue regarding to deobfuscating. If your file is and you have a rooted Android phone, you can try my other project Zygisk-Il2CppDumper, it can bypass this protection. Please note that the executable file for the PC platform is or You can open a new issue and upload the file, I will try to solve. Il2CppDumper detected that the executable file has been protected, use to dump from the game memory, then use Il2CppDumper to load and follow the prompts, can bypass most protections. If you have a rooted Android phone, you can try my other project Zygisk-Il2CppDumper, it can bypass almost all protections. Credits • Jumboperson - Il2CppDumper