Undetected Function

02/06/2012 19:25 Hybrid~#1
Hello...I'm here cuz i need help
How i make my S4 trainer to be undetected(in autoIt ofc)? If someone could help me...
Thanks
Regards~
12/03/2013 21:03 Siktor#2
#Push.

I need it 2 ;)
12/03/2013 21:11 alpines#3
The answer is posted several times in this section.
You need a bypass for Xtrap which you can disable with OllyDbg.

Another way to disable it would be a application which NOPs the hshield functions.
Those bypasses are also in this forum.

After you bypassed everything then you can do whatever you want to do.
12/03/2013 22:52 SoulCr4ck#4
Quote:
Originally Posted by alpines View Post
The answer is posted several times in this section.
You need a bypass for Xtrap which you can disable with OllyDbg.

Another way to disable it would be a application which NOPs the hshield functions.
Those bypasses are also in this forum.

After you bypassed everything then you can do whatever you want to do.
i don't know if it is possible, but maybe you can try to set the Memory rescan evertime on No or NOP this function ;o
12/04/2013 19:17 Terrat#5
It gives undetected adresses .
And undeted Adresses.
12/04/2013 19:20 YatoDev#6
Quote:
Originally Posted by Dreamsläps View Post
It gives undetected adresses .
And undeted Adresses.
Yes for sure :facepalm:

"There are detected and undetected adresses"

And that means that the game guard dont scan at these adress but game guards not only check this ;)
12/09/2013 11:13 onahoe#7
Quote:
How i make my S4 trainer to be undetected(in autoIt ofc)? If someone could help me...
Just terminate "K32EnumProcesses" in S4Client.exe.. ^.^
12/09/2013 16:22 Logtetsch#8
Another possibility is to hook the hackshield functions and change them return value.
This should be impossible with AutoIt.
12/09/2013 16:32 FacePalmMan#9
Quote:
Originally Posted by Logtetsch View Post
Another possibility is to hook the hackshield functions and change them return value.
This should be impossible with AutoIt.
actually that one is possible in autoit too. i once had an udf that can read variables from other processes and such stuff.
12/09/2013 18:17 Logtetsch#10
Quote:
Originally Posted by FacePalmMan View Post
actually that one is possible in autoit too. i once had an udf that can read variables from other processes and such stuff.
Das macht aber so keinen Sinn. Klar, du könntest es mit AutoIt versuchen, aber das Hackshield wird es erkennen, wegen AutoIt, Prinzip und so - versteht sich, hoffentlich ;)
12/09/2013 18:48 snow#11
Quote:
Originally Posted by Dreamsläps View Post
It gives undetected adresses .
And undeted Adresses.
Those "undetected" addresses mostly are unencrypted strings. XTrap doesn't check anything heap related for changes as far as I remember.

Quote:
Another way to disable it would be a application which NOPs the hshield functions.
NOPing anything won't succeed anymore at least if you're interested in a hack which runs for any longer than 10 minutes.

Quote:
Just terminate "K32EnumProcesses" in S4Client.exe.. ^.^
You can't terminate functions by itself. :p
XTrap checks some functions first bytes so that might cause some issues. Also this won't work for every OS. :/

Quote:
Another possibility is to hook the hackshield functions and change them return value.
Won't help to get a fully undetected cheat.

Quote:
actually that one is possible in autoit too. i once had an udf that can read variables from other processes and such stuff.
Same as above, won't work with XTrap / almost impossible. You'd spend more time for creating workarounds than learning another programming language.