Giriş yap
En iyi yollayıcılar
Hello EMO | ||||
EMO | ||||
eMoStyLe | ||||
BesimBICER | ||||
GameKinG | ||||
Crysis | ||||
~>!.DεvιLρяιεsт.!<~ | ||||
MeTaL | ||||
TrueCrime | ||||
djhayal3t |
Istatistikler
Toplam 203 kayıtlı kullanıcımız varSon kaydolan kullanıcımız: crayzboy76
Kullanıcılarımız toplam 1186 mesaj attılar bunda 862 konu
Arama
Sosyal yer imi
Sosyal bookmarking sitesinde Emo, Emo nedir, Emo resimleri, Emo Kıyafetleri, Emo Sözleri, Emo Oyunları, EmoTurkey, Emo Nickler, Emo Avatarları, Punk, Punk Resimleri, Punk Avatarları, Rock, Rock Resimleri, Rock Avatarları, Msn Nickleri, Msn Avatarları, Müzik adresi saklayın ve paylaşın
Sosyal bookmarking sitesinde EMO Style ForumPro - Hos Geldiniz adresi saklayın ve paylaşın
Kimler hatta?
Toplam 16 kullanıcı online :: 0 Kayıtlı, 0 Gizli ve 16 Misafir :: 1 Arama motorlarıYok
Sitede bugüne kadar en çok 217 kişi C.tesi Tem. 29, 2017 1:46 am tarihinde online oldu.
En son konular
Reklam
Hack Shield ByPass
1 sayfadaki 1 sayfası
Hack Shield ByPass
Finished Hack Shield Bypass code
Credits to Some damn Noob
What it does is basically create a thread to inject instead of making your bypass auto active.
Place this anywhere in your code:
Code:
void HsBypass( void* pxAddress, BYTE *code, int size )//define virtual protect
{
unsigned long Protection;
VirtualProtect((void*)pxAddress, size, PAGE_READWRITE, &Protection);
memcpy((void*)pxAddress, (const void*)code, size);
VirtualProtect((void*)pxAddress, size, Protection, 0);
}
void CopyModules()//name can be anything just make sure its the same as it is in dll main
{
BYTE Artic66pwns[2] = {0xEB, 0xFE};
HsBypass((void*)0x4A9EF1,Artic66pwns,2);
HsBypass((void*)0x605493,Artic66pwns,2);
}
The bytes EB, FE jmp the jmp to both messages to themselves.
Actually works .
And underneath:
Code:
DLL_PROCESS_ATTACH
}
goes:
Code:
HANDLE hThread;
DWORD dwID;
hThread = CreateThread(0,0,(LPTHREAD_START_ROUTINE)CopyModules,0,0,&dwID);
CloseHandle(hThread);
I reccomend adding more addresses to it of course.
Do not leach this.
If you use this please Credit:
Everyone
Credits to Some damn Noob
What it does is basically create a thread to inject instead of making your bypass auto active.
Place this anywhere in your code:
Code:
void HsBypass( void* pxAddress, BYTE *code, int size )//define virtual protect
{
unsigned long Protection;
VirtualProtect((void*)pxAddress, size, PAGE_READWRITE, &Protection);
memcpy((void*)pxAddress, (const void*)code, size);
VirtualProtect((void*)pxAddress, size, Protection, 0);
}
void CopyModules()//name can be anything just make sure its the same as it is in dll main
{
BYTE Artic66pwns[2] = {0xEB, 0xFE};
HsBypass((void*)0x4A9EF1,Artic66pwns,2);
HsBypass((void*)0x605493,Artic66pwns,2);
}
The bytes EB, FE jmp the jmp to both messages to themselves.
Actually works .
And underneath:
Code:
DLL_PROCESS_ATTACH
}
goes:
Code:
HANDLE hThread;
DWORD dwID;
hThread = CreateThread(0,0,(LPTHREAD_START_ROUTINE)CopyModules,0,0,&dwID);
CloseHandle(hThread);
I reccomend adding more addresses to it of course.
Do not leach this.
If you use this please Credit:
Everyone
EMO- EMO Team
- Cinsiyet :
Burçlar :
Mesaj Sayısı : 184
Puan : 247443
Rep Puanı : 5
Doğum tarihi : 28/11/89
Kayıt tarihi : 18/05/11
Yaş : 34
Nerden : EMO world
İş/Hobiler : RCE Student / Game Hacking / Learn Beginner C#,C++,Delphi
Lakap : EMO
Similar topics
» HackShield Method ByPass
» Learn to bypass Gameguard
» [TIPS] Bypass HackSheild Via Regedit
» HackShieldCRC Bypass Method (OpenProcess) By Kazdan
» Hackshield Bypass Source Code 24-04-2011
» Learn to bypass Gameguard
» [TIPS] Bypass HackSheild Via Regedit
» HackShieldCRC Bypass Method (OpenProcess) By Kazdan
» Hackshield Bypass Source Code 24-04-2011
1 sayfadaki 1 sayfası
Bu forumun müsaadesi var:
Bu forumdaki mesajlara cevap veremezsiniz
Cuma Ağus. 29, 2014 8:33 am tarafından Hello EMO
» goldenchase.net maden yaparak para kazanma
Cuma Ağus. 29, 2014 8:18 am tarafından Hello EMO
» etichal hacker görsel egitim seti
Çarş. Ağus. 06, 2014 4:57 am tarafından Hello EMO
» KO TBL Source C#
Ptsi Ara. 09, 2013 6:36 am tarafından Hello EMO
» x86 Registers
C.tesi Ağus. 24, 2013 5:02 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de WYD
Çarş. Tem. 10, 2013 7:25 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de CS Metodo²
Çarş. Tem. 10, 2013 7:23 am tarafından Hello EMO
» [Tutorial] Aprendendo basico deASM OLLYDBG
Çarş. Tem. 10, 2013 7:22 am tarafından Hello EMO
» Basic C# DLL injector
Ptsi Tem. 08, 2013 7:48 am tarafından Hello EMO