edit
Bullshit.Quote:
Whats this doing ? force to load eac.exe and instead of closeup all handle it dosen't.! P.S eac driver is still running but handled closeup get dafuqed!
hope for fasting patcher! already reported to EAC :| enjoy it untill its patched ...
how to use it ? open cheats engines Runs warrock launcher. attach cheats engine there and then look the patch above.. Enjoy! dafuq.!!!!!!!!!!!!!!!!
00415115 A1 E8D15200 mov eax, dword ptr [52D1E8]
0041511A 83F8 05 cmp eax, 5
0041511D 74 4A je short 00415169
Everything is Inside WRUpdater.exe LOL
i learned alot from EAC ... they are professional retarder in KerneLand u.u
Heartbeat still working ... by doing this job. so you don't need any sheet more.Code:[COLOR="Red"][B]here how to use this trash codenz![/B][/COLOR] //00415115 A1 E8D15200 mov eax, dword ptr [52D1E8] *(DWORD*) 0x52D1E8 = 5; //0041511D 74 4A je short 00415169 memcpy((void*)0x41511D,(void*)"\x90\x90",2);
thx to me :P :D :mofo:
i'm still looking for better way i don't want to apply any patch to code i still prefer 1338 method to become stealther!
i already know nobody will credit for it, but you must remember always NO GHTheBoss No Party,
Codenzzzzzzzzzzzzzzzz!
Thx to MZ'4D5A for sarscam and patience. love u man!
PsLookupProcessByProcessId... For the Handle ObOpenObjectByPointerQuote:
There are other easy usermode exploit to get handle of the process for inject DLL
nearly every known user mode exploit is patched for EAC/BE. when a methode goes public it dosent take much time until its patched. for Rust i had 5 injecting methodes now i only got two. they are patching one after the other.Quote:
This function are used in Kernel mode, i said there are other user mode exploit XD
The problem is these companies are learning from Public Sourcecodes. It will be much harder, when the people stop to share everything public. Also, the workers of these companies are basically skilled from university.Quote:
nearly every known user mode exploit is patched for EAC/BE. when a methode goes public it dosent take much time until its patched. for Rust i had 5 injecting methodes now i only got two. they are patching one after the other.
and yes the "bypass" from King7 is bullshit. Heartbeat will only work once because a false Heartbeat will be ignored one time but the second Heartbeat will make you disconnect. it dosen't completly disable EAC but EAC will still know that it wasn't started properly.
Not all, for example a stupid example is force a process to load a dll like system dll and hide this from PEB.Quote:
nearly every known user mode exploit is patched for EAC/BE. when a methode goes public it dosent take much time until its patched. for Rust i had 5 injecting methodes now i only got two. they are patching one after the other.
and yes the "bypass" from King7 is bullshit. Heartbeat will only work once because a false Heartbeat will be ignored one time but the second Heartbeat will make you disconnect. it dosen't completly disable EAC but EAC will still know that it wasn't started properly.
yep exactly, they are very active @[Only registered and activated users can see links. Click Here To Register...] like *************, looking for the newest methodes and simply patching them, even methode where you think that they might be unpatchable, they find ways arround to detect those.Quote:
The problem is these companies are learning from Public Sourcecodes. It will be much harder, when the people stop to share everything public. Also, the workers of these companies are basically skilled from university.
To beat a System is always to think different.
Also the most of the "Cheat Loaders" needs more Innovations and new Ideas to increase their protection against reverse engineering.
I would you like inform that App_init can be blocked by some Anti-Virus Companys, because some malware was using that way.Quote:
Well i were in vocation just back today.
Bypass was working about 15 day's ago for sure.
usermode way which i tryed and working perfectly..
setglobalhook...
APPINT...