HackShield Bypass Source

Nih kalo agan dah buat wallhack atau sejenisnya
pasang code ini di Project kalian biar gk kedetek HackShield

Code:

DWORD OldProtection;
void MEMwrite(void *adr, void *ptr, int size)
{
 VirtualProtect(adr,size,PAGE_EXECUTE_READWRITE, &OldProtection);
 memcpy(adr,ptr,size);
 VirtualProtect(adr,size,OldProtection, &OldProtection);
}

void NewDetourhs(long Address,int Size,int Size2)
{
long EhSvc = (long)GetModuleHandleA(\"EhSvc.dll\");
DWORD OldProtect;
VirtualProtect((void*)(EhSvc+Address),Size,PAGE_EXECUTE_READWRITE,&OldProtect);
*(DWORD*)(EhSvc+Address) = Size2;
//*(int*)(EhSvc+Address) = Size;
}


void CopyModules(void)
{

 long EhSvc = (long)GetModuleHandleA(\"EhSvc.dll\");

 //self crc checks
 MEMwrite((void *)(EhSvc+0x0FF28),(void*)(PBYTE)\"\xB8\x01\x00\x00\x00\",5);

     //anti asm scan game client
 MEMwrite((void *)(EhSvc+0x1BC28),(void*)(PBYTE)\"\x90\x90\",2);//

 ////unhook dip & sss 8
 MEMwrite((void *)(EhSvc+0x650A5),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x650CF),(void*)(PBYTE)\"\xEB\",1);//
 
 //dll jump code check
 MEMwrite((void *)(EhSvc+0x66931),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x66B79),(void*)(PBYTE)\"\xEB\",1);//

 //anti restore page
 MEMwrite((void *)(EhSvc+0x5F80E),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x5F784),(void*)(PBYTE)\"\xEB\",1);//

 //processscan, main eagle process detect callback, for cheat engine
 MEMwrite((void *)(EhSvc+0x54A14),(void*)(PBYTE)\"\xE9\x7E\x0A\x00\x00\",5);//

 // nano detect objects
 MEMwrite((void *)(EhSvc+0x2411B),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x24265),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x2435F),(void*)(PBYTE)\"\x31\",1);//
 MEMwrite((void *)(EhSvc+0x22556),(void*)(PBYTE)\"\x31\",1);//
 MEMwrite((void *)(EhSvc+0x26171),(void*)(PBYTE)\"\x31\",1);//
 MEMwrite((void *)(EhSvc+0x25618),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x2572C),(void*)(PBYTE)\"\xEB\",1);//
 MEMwrite((void *)(EhSvc+0x25ADB),(void*)(PBYTE)\"\xEB\",1);//

 int EhPtr = 0x0D0F40;
 NewDetourhs((EhPtr-0x44),0x8,4);//
 NewDetourhs((EhPtr-0x40),0x8,4);//
 NewDetourhs((EhPtr-0x20),0x8,4);//

 NewDetourhs(0x0D13F8,0x8,4);//
 NewDetourhs(0x0CD5F8,0x8,4);//
 NewDetourhs(0x0C7570,0x8,4);//
 NewDetourhs(0x0C7754,0x8,4);//
 NewDetourhs(0x0CED40,0x8,4);//
 NewDetourhs(0x0C7739,0x8,4);//
 NewDetourhs(0x0D2E08,0x8,4);//
 NewDetourhs(0x0C7758,0x8,4);//
 NewDetourhs(0x0C62F8,0x8,4);//
 NewDetourhs(0x0C7715,0x8,4);//
 NewDetourhs(0x0D0F40,0x8,4);//
 NewDetourhs(0x0C7719,0x8,4);//
 NewDetourhs(0x0D2E40,0x8,4);//
 NewDetourhs(0x0C62F8,0x8,4);//
 NewDetourhs(0x0CD8FC,0x8,4);//
 NewDetourhs(0x0CD5F8,0x8,4);//
 NewDetourhs(0x0D3DF1,0x8,4);//


}
void Loop(void)
{
for(;;)
{
long EhSvc = (long)GetModuleHandleA(\"EhSvc.dll\");
if(EhSvc!=0)
{
CopyModules();
}
Sleep(20);
}
}
Lalu buat fungsi untuk memanggil Anti HS
pasang di : DLL_Attach_Process

Code:
CreateThread(NULL, NULL, (LPTHREAD_START_ROUTINE)Loop, NULL, NULL, NULL);

0 Response to "HackShield Bypass Source"

Posting Komentar

powered by Blogger | WordPress by Newwpthemes | Converted by BloggerTheme