Automated tool for reverse engineering Unity IL2CPP binaries
Top 17.3% on sourcepulse
Il2CppInspector is a powerful, feature-rich tool designed for reverse engineering Unity IL2CPP binaries. It assists reverse engineers, security researchers, and game developers by analyzing IL2CPP executables and generating various outputs like C# stubs, C++ scaffolding, IDA/Ghidra scripts, and metadata JSON files. This enables deeper understanding of game logic, structure, and API usage, even for obfuscated applications.
How It Works
Il2CppInspector parses IL2CPP binaries (PE, ELF, Mach-O, etc.) and associated metadata to reconstruct the application's structure. It identifies types, methods, fields, and API functions, mapping them to their memory addresses. The tool employs differential analysis for deobfuscation and supports various encryption schemes, making it effective against common protection methods. Its modular design allows for plugin-based extensions to handle custom obfuscation techniques.
Quick Start & Requirements
git clone --recursive https://github.com/djkaty/Il2CppInspector
and build using .NET Core
.dotnet publish
.Highlighted Details
Maintenance & Community
Development is currently suspended due to the author's health and personal circumstances. Users are encouraged to fork the project. The author recommends Cpp2IL as an alternative for IL2CPP to IL conversion.
Licensing & Compatibility
Licensed under AGPLv3. This license may impose copyleft restrictions on derivative works, potentially requiring modifications to be open-sourced if distributed.
Limitations & Caveats
Development is halted, meaning no further official updates or bug fixes are expected. The author will not respond to issues or pull requests. While the tool supports many obfuscation methods, it may not handle all or future techniques.
3 years ago
1 day