What hacks are currently working? without Baning.
Thanks for your answers.:confused:
Thanks for your answers.:confused:
Its updated only gmz hack v15 is missing i will pm berkay to add itQuote:
It is not updated, you shoudn't download via there.. this thread has the absolute wrong title, because only a few filtered hacks will be accepted there and there were very cool releases in the last times.
You should use the GMZ-Hack v15, which got posted today.. the devs of it know what they are doing, it is very simple and safe to use + it has the "TH-Hack" you were looking for, because it was included in this hack at first ;)
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
It has to hosted in this forum to be added on that list, you ignorant fool. Read the rules first, then come and talk.Quote:
It is not updated, you shoudn't download via there.. this thread has the absolute wrong title, because only a few filtered hacks will be accepted there and there were very cool releases in the last times.
You should use the GMZ-Hack v15, which got posted today.. the devs of it know what they are doing, it is very simple and safe to use + it has the "TH-Hack" you were looking for, because it was included in this hack at first ;)
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
Every *thing* that edits the memory of another process is always detected and will stay that way until one gets Linux and compiles their very own kernel within it. Let alone, that's why Linux is a rather safe OS besides Windows & MacOS.Quote:
Undetected or Working hacks?
Guys you can not be sure of that...This is not like pb messages where we see what is detected or not detected.
In 1 fps game we created one tool and streamed one silent log to detect the use of norecoil macros (collecting mouse delay clicks and uploading the violations to our auth server). Nobody saw that we scanned them without any warnings...Latter with the information in our hands we banned the people using "undetected" hacks like macros grabbed directly in the mouse drivers (x7, razer, etc).
For sure they will caught very accounts using supposedly undetected or working hacks
If the server can not read it means that the client never could play there (incompatible)Quote:
and will stay that way until one gets Linux and compiles their very own kernel within it.