> cat /dev/github | grep security-tools
discovered 30 Mar 2026

Zygisk-Il2CppDumper

C ★ 3086 via github-topic
→ View on GitHub

AI Summary: Zygisk-Il2CppDumper is a tool designed for dumping IL2CPP data at runtime while leveraging Zygisk to effectively bypass various protections, encryptions, and obfuscations. Its primary use case is for developers and security researchers needing to extract and analyze IL2CPP binaries from Android applications. Notable features include its compatibility with Magisk, flexible installation methods, and the ability to automate the dumping process through GitHub Actions or Android Studio.


README

Zygisk-Il2CppDumper

Il2CppDumper with Zygisk, dump il2cpp data at runtime, can bypass protection, encryption and obfuscation.

中文说明请戳这里

How to use

  1. Install Magisk v24 or later and enable Zygisk
  2. Build module
    • GitHub Actions
      1. Fork this repo
      2. Go to the Actions tab in your forked repo
      3. In the left sidebar, click the Build workflow.
      4. Above the list of workflow runs, select Run workflow
      5. Input the game package name and click Run workflow
      6. Wait for the action to complete and download the artifact
    • Android Studio
      1. Download the source code
      2. Edit game.h, modify GamePackageName to the game package name
      3. Use Android Studio to run the gradle task :module:assembleRelease to compile, the zip package will be generated in the out folder
  3. Install module in Magisk
  4. Start the game, dump.cs will be generated in the /data/data/GamePackageName/files/ directory