my spoofer still works lol
and you use amidewin and afuwin!Quote:
FPT was known for a while, your shit is public lol. You work only on Intel cause that's what FPT only works on :)
50$ and 120$? Bruh you went super greedy for public tools.
Quite bold of you to assume we use public tools. Funny thing you don't even have a spoofer, you run it manually cause all tools are public anyways. FPT is detected, and people will be banned in the next ban wave.Quote:
and you use amidewin and afuwin!
40$ / $100
my prices are $10 more than your shit, and it works :handsdown:
Well, actually no,Quote:
Not that I know of, AMI was patched. Which almost all spoofers use.
isnt tpm, i have tested ami spoof on a user without a tpm chip installed.Quote:
Well, actually no,
for AMD users it would require to disable fTPM, swapping the CPU (because of fTPM, module in Embedded in the CPU) and then flashing bios / Edit serials via AMI (EFI) then spoofing the rest of the system (NIC etc...)
For Intel it depends on if your TPM module is soldered to the Mobo, a swapable chip (check for an SPI interface) or fTPM (Cpu bound) , swaping the TPM Module (resolder an identical one or swap the SPI TPM module), then the rest is like before.
but either ways, you'll still need to clean everything from windows, licence, drives...
As far as i remember, the last mobo i had with a SPI interface chip was an Asus Z170 (intel 6th or 7th gen idk) which had a 14 pin TPM 1.2 module (which can be swapped with a 2.0 module)
The reasoning behind this is, when you enable TPM, it have an identifier (Which is readable), some space to store keys and infos and a "global?" key, the key is not known to you, the Identifier isn't editable from the module without breaking the fuse (afaik, correct me if i am wrong) so, unless you can edit the identifier from your TPM module and wipe, you have to swap it, this MIGHT be why AMI doesn't work anymore.
Last solution would clear the TPM module ? because you can, and it might reset your "OwnerAuth" ID ? but some people with laptop might have enforced policies on TPM with factory keys (OwnerClearDisabled True) which would require hammering the codes AND locking the module due to the locked state, but you can check it with Get-Tpm in powershell.
[Only registered and activated users can see links. Click Here To Register...]
And also it have a serial number (Get-TpmEndorsementKeyInfo)
[Only registered and activated users can see links. Click Here To Register...]
here's some useful informations and documentation on TPM and their specifications :
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
For people willing to "find out", riot might store data inside it, i neither have the time or the required skill to physicaly reverse this, have fun with that.
Well, i am neither banned from valorant or ever got banned from it (after beta) so far as i don't cheat anymore on valo.Quote:
isnt tpm, i have tested ami spoof on a user without a tpm chip installed.
got banned after 30min of afking in lobby.
drop your discord, and ill follow u up there.Quote:
Well, i am neither banned from valorant or ever got banned from it (after beta) so far as i don't cheat anymore on valo.
i would check :
- if vanguard audit the network (checking for devices and logging them)
- if it is hooking upnp devices ? (For uniqueID of each devices)
(i know they aren't IP banning because of the risk of dynamic IP allocations, but the could log it along the SN of every devices to create a sort of "Risk Score" )
After that it is completely black magic to me, as i am not experienced or ever reversed vanguard myself (but i'd might give an eye in the future)
Sent you a DM, but i am sure i won't be that helpful for ya.Quote:
drop your discord, and ill follow u up there.
// no they dont hook upnp devices.
/ i have changed network adapters and tried ami spoof, still doesnt work.
Quote:
Well, actually no,
for AMD users it would require to disable fTPM, swapping the CPU (because of fTPM, module in Embedded in the CPU) and then flashing bios / Edit serials via AMI (EFI) then spoofing the rest of the system (NIC etc...)
For Intel it depends on if your TPM module is soldered to the Mobo, a swapable chip (check for an SPI interface) or fTPM (Cpu bound) , swaping the TPM Module (resolder an identical one or swap the SPI TPM module), then the rest is like before.
but either ways, you'll still need to clean everything from windows, licence, drives...
As far as i remember, the last mobo i had with a SPI interface chip was an Asus Z170 (intel 6th or 7th gen idk) which had a 14 pin TPM 1.2 module (which can be swapped with a 2.0 module)
The reasoning behind this is, when you enable TPM, it have an identifier (Which is readable), some space to store keys and infos and a "global?" key, the key is not known to you, the Identifier isn't editable from the module without breaking the fuse (afaik, correct me if i am wrong) so, unless you can edit the identifier from your TPM module and wipe, you have to swap it, this MIGHT be why AMI doesn't work anymore.
Last solution would clear the TPM module ? because you can, and it might reset your "OwnerAuth" ID ? but some people with laptop might have enforced policies on TPM with factory keys (OwnerClearDisabled True) which would require hammering the codes AND locking the module due to the locked state, but you can check it with Get-Tpm in powershell.
[Only registered and activated users can see links. Click Here To Register...]
And also it have a serial number (Get-TpmEndorsementKeyInfo)
[Only registered and activated users can see links. Click Here To Register...]
here's some useful informations and documentation on TPM and their specifications :
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
For people willing to "find out", riot might store data inside it, i neither have the time or the required skill to physicaly reverse this, have fun with that.