You last visited: Today at 20:55
Advertisement
[Release]~Jimmy Neutron XtrapBypass 86bits and 64Bits (CEWorks)(17-5-2013)
Discussion on [Release]~Jimmy Neutron XtrapBypass 86bits and 64Bits (CEWorks)(17-5-2013) within the S4 League Hacks, Bots, Cheats & Exploits forum part of the S4 League category.
05/17/2013, 19:12
#1
elite*gold: 0
Join Date: May 2013
Posts: 111
Received Thanks: 449
[Release]~Jimmy Neutron XtrapBypass 86bits and 64Bits (CEWorks)(17-5-2013)
~JimmyNeutron Xtrapbypass 32 and 64 Bits
Hello EPvP Today I Present My XtrapBypass
FUnction
It Make S4Client.exe Undeceted
HowTO:
ThankMe
Open My Bypass
Open Any Hack (If Dont Want dont Do)
Open s4league
Open CE
HaveFun
VirusTotal:
Have Fun
DOnt Say Its Leeched
ByeBye
Screens will be Added Soon!!
Attached Files
XtrapBypass(86Bits&64Bits).rar
(732.4 KB, 371 views)
05/17/2013, 19:19
#2
elite*gold: 0
Join Date: Sep 2008
Posts: 36
Received Thanks: 4
Don't work Vista 32 bit
05/17/2013, 19:20
#3
elite*gold: 0
Join Date: Jun 2012
Posts: 136
Received Thanks: 44
i will test it 2nd
EDIT :
doesn't work with CE win xp win 32
05/17/2013, 19:23
#4
elite*gold: 0
Join Date: Mar 2013
Posts: 119
Received Thanks: 21
05/17/2013, 19:26
#5
elite*gold: 0
Join Date: Apr 2013
Posts: 528
Received Thanks: 522
I opened it without a hack or ce and it is detected...
05/17/2013, 19:28
#6
elite*gold: 0
Join Date: Mar 2013
Posts: 16
Received Thanks: 0
Don't work Win 7 x64 Ulimate
05/17/2013, 19:29
#7
elite*gold: 0
Join Date: Aug 2012
Posts: 7
Received Thanks: 0
Don't work win 7 32 bit
05/17/2013, 19:33
#8
elite*gold: 0
Join Date: May 2013
Posts: 111
Received Thanks: 449
64Bits Not Tested Ihave S4 Working With CE Look:
05/17/2013, 19:36
#9
elite*gold: 0
Join Date: Dec 2012
Posts: 59
Received Thanks: 23
Detect after few minuts 32bits.
05/17/2013, 19:43
#10
elite*gold: 0
Join Date: Feb 2013
Posts: 568
Received Thanks: 252
fake dont work..
05/17/2013, 19:43
#11
elite*gold: 0
Join Date: Mar 2013
Posts: 137
Received Thanks: 109
nice works
05/17/2013, 19:43
#12
elite*gold: 0
Join Date: Apr 2012
Posts: 387
Received Thanks: 603
Wow C&P
K1ramox:
Code:
#include <NomadMemory.au3>
#include <WinAPI.au3>
#include <String.au3>
Global $Memoryhandle, $EnumProcesses
$ByteLen = 19
$Nop = "0x" & _StringRepeat("90", $ByteLen)
$ProcessID = ProcessWait("S4Client.exe")
$Memoryhandle = _MemoryOpen($ProcessID)
Do
Sleep(10)
Until _Check() = 1
_MemoryWrite($EnumProcesses, $Memoryhandle, $Nop, "byte[" & $ByteLen & "]")
_MemoryClose($Memoryhandle)
Func _Check()
$EnumProcesses = _GetProcessAddress(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _memoryread($EnumProcesses, $Memoryhandle, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GetProcessAddress($hModule, $Function)
$call = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $hmodule, "str", $Function)
Return $call[0]
EndFunc
"jimmy-neutron-xtrapbypass"
Code:
unc BYPASS()
$STATUST = "Found"
ConsoleWrite(@CRLF & "HaveFun" & @CRLF)
Global $MEMORYHANDLE, $ENUMPROCESSES
$BYTELEN = 19
$NOP = "0x" & _StringRepeat("90", $BYTELEN)
$PROCESSID = ProcessWait("S4Client.exe")
$MEMORYHANDLE = _MEMORYOPEN($PROCESSID)
Do
Sleep(10)
Until _CHECK() = 1
_MEMORYWRITE($ENUMPROCESSES, $MEMORYHANDLE, $NOP, "byte[" & $BYTELEN & "]")
_MEMORYCLOSE($MEMORYHANDLE)
$STATUST = "OK"
ConsoleWrite("You Can Open Hacks Or CHeatEngine" & @CRLF)
Sleep(5000)
Exit
EndFunc
Func _CHECK()
$ENUMPROCESSES = _GETPROCESSADDRESS(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _MEMORYREAD($ENUMPROCESSES, $MEMORYHANDLE, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GETPROCESSADDRESS($HMODULE, $FUNCTION)
$CALL = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $HMODULE, "str", $FUNCTION)
Return $CALL[0]
EndFunc
rly ?
05/17/2013, 19:45
#13
elite*gold: 0
Join Date: Jan 2011
Posts: 196
Received Thanks: 96
Don't work!
05/17/2013, 19:47
#14
elite*gold: 0
Join Date: Feb 2011
Posts: 280
Received Thanks: 491
Quote:
Originally Posted by
JohnDark
Wow C&P
K1ramox:
Code:
#include <NomadMemory.au3>
#include <WinAPI.au3>
#include <String.au3>
Global $Memoryhandle, $EnumProcesses
$ByteLen = 19
$Nop = "0x" & _StringRepeat("90", $ByteLen)
$ProcessID = ProcessWait("S4Client.exe")
$Memoryhandle = _MemoryOpen($ProcessID)
Do
Sleep(10)
Until _Check() = 1
_MemoryWrite($EnumProcesses, $Memoryhandle, $Nop, "byte[" & $ByteLen & "]")
_MemoryClose($Memoryhandle)
Func _Check()
$EnumProcesses = _GetProcessAddress(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _memoryread($EnumProcesses, $Memoryhandle, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GetProcessAddress($hModule, $Function)
$call = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $hmodule, "str", $Function)
Return $call[0]
EndFunc
"jimmy-neutron-xtrapbypass"
Code:
unc BYPASS()
$STATUST = "Found"
ConsoleWrite(@CRLF & "HaveFun" & @CRLF)
Global $MEMORYHANDLE, $ENUMPROCESSES
$BYTELEN = 19
$NOP = "0x" & _StringRepeat("90", $BYTELEN)
$PROCESSID = ProcessWait("S4Client.exe")
$MEMORYHANDLE = _MEMORYOPEN($PROCESSID)
Do
Sleep(10)
Until _CHECK() = 1
_MEMORYWRITE($ENUMPROCESSES, $MEMORYHANDLE, $NOP, "byte[" & $BYTELEN & "]")
_MEMORYCLOSE($MEMORYHANDLE)
$STATUST = "OK"
ConsoleWrite("You Can Open Hacks Or CHeatEngine" & @CRLF)
Sleep(5000)
Exit
EndFunc
Func _CHECK()
$ENUMPROCESSES = _GETPROCESSADDRESS(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _MEMORYREAD($ENUMPROCESSES, $MEMORYHANDLE, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GETPROCESSADDRESS($HMODULE, $FUNCTION)
$CALL = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $HMODULE, "str", $FUNCTION)
Return $CALL[0]
EndFunc
rly ?
Jimmy full leech and it's not working
05/17/2013, 19:56
#15
elite*gold: 0
Join Date: Sep 2011
Posts: 19
Received Thanks: 2
lol dont work fake!!
All times are GMT +1. The time now is 20:55 .