there is a cheat that uses terra group labs as a logo can someone tell me the cheat gain
ABS isn't great - especially after these last few detectionsQuote:
Abs has been hit multiple times... not really worth.. however i do get cheap keys if you are interested
[Only registered and activated users can see links. Click Here To Register...]
Didn't nextcheat get detected like 2-3 times this year O_oQuote:
ABS isn't great - especially after these last few detections
Personally I'd recommend Nextcheat lite for a similiar experience, I use Nextcheat pro and it's honestly great - nothing beats it in HvH/PvP - not many resellers have it so the userbase is quite low right now.
Pro had 1 detection I believe in feb, It was in a "use at own risk" status just to allow people to play (if they chose too, notifying it would likely result in a ban)Quote:
Didn't nextcheat get detected like 2-3 times this year O_o
Using pro and lite as a excuse is not good enough. Everyone makes mistakes, but it is very likely this is just a down-featured version of the other cheat. The foundation it is built on (aka bypass) is probably the underlying issue.Quote:
Pro had 1 detection I believe in feb, It was in a "use at own risk" status just to allow people to play (if they chose too, notifying it would likely result in a ban)
They rewrote the whole bypass making it much more secure and since then it's been undetected.
GamerTools made a big fuss about it and claimed it has had way more detections because they booted his goofy ass from the reseller program, I've been with NC since the start and it's been hella cool, always implementing fun meme shit and they're always open to suggestions etc
(Devs are transparent af, you can go ask em')
Nextcheat Lite has been Undetected since release Including an emulated BE/Launcher spoofer and has been hella fun to use.
Any bugs etc quickly resolved, Suprised more resellers don't get with them tbh, this shits goated
I thank them everyday that they booted goofy GamerTools from their reseller list - W devs
In most case, you will be right about "rewriting bypass". However, in our case we didn't just rewrite the bypass because we want some new signature to bypass old ones. We rewrote it because we earned new capability that mean once we rewrite there will be less performance cost, less things we need to avoid doing, less chance something go wrong, and do less for more. In our case, we spent time reversing all of the communication between BEDaisy/BEServer/BEClient and was able to fully reverse every thing that was sent, down to the heartbeat, the handshake, and the acknowledgement. With this, we rewrote part of the bypass to remove all the unnecessary attack vectors and simplify it down to the just the communication vector which everything goes through. The communication between BEServer and BEClient is the truth and we refocus our attack vector there.Quote:
Using pro and lite as a excuse is not good enough. Everyone makes mistakes, but it is very likely this is just a down-featured version of the other cheat. The foundation it is built on (aka bypass) is probably the underlying issue.
Using quotes as "rewrote the whole bypass" is a huge red flag, since you dont want to rewrite anything when making cheats. You want to analyze the anti-cheat and see how you are being picked up and then adapt to it. The only exception is if you have made such a noobie mistake on some of the fundamentals, that what you have fucked is so bad it can't be fixed with your current knowledge.
The only thing rewriting your whole bypass will give you is a new fingerprint and a new grace period before you will get detected again
Smaller the userbase, the less data battleye gets to analyze. The less of a chance of a detection. For the consumers, I would not recommend going for any products that have not proven they are capable of handling over 200 users at a time. The reason why I say this is from personal experience with my own cheats and other people on this forum. You only really know you are truely undetected, when you can handle that many users over a prolonged period of time
nothing bad hearted to you brother, I have seen you do your thing on EAC. Which is why i didnt mention your name.Quote:
In most case, you will be right about "rewriting bypass". However, in our case we didn't just rewrite the bypass because we want some new signature to bypass old ones. We rewrote it because we earned new capability that mean once we rewrite there will be less performance cost, less things we need to avoid doing, less chance something go wrong, and do less for more. In our case, we spent time reversing all of the communication between BEDaisy/BEServer/BEClient and was able to fully reverse every thing that was sent, down to the heartbeat, the handshake, and the acknowledgement. With this, we rewrote part of the bypass to remove all the unnecessary attack vectors and simplify it down to the just the communication vector which everything goes through. The communication between BEServer and BEClient is the truth and we refocus our attack vector there.
We are not your run of the mill p2c. We have talents, dedication, experience, and a long running history of working with much more difficult ACs. The initial detection was purely due to us making wrong assumption about BE but once we were detected, we went back to the beginning, devirtualized and reversed everything we need to know about BE, leaving no stone unturned.