hey infinity, may this help you out?
//variable that will have address of PostMessageA + 5 (the bytes I provide myself)
DWORD _PMA = NULL;
//getting the addie
_PMA = (DWORD)GetProcAddress(LoadLibrary(_T("user32.dll") ), "PostMessageA") + 5;
//and the function
__declspec(naked) BOOL WINAPI _PostMessageA(HWND hWnd, UINT uMsg, WPARAM wParam, LPARAM lParam)
{
__asm
{
mov edi, edi //2 bytes
push ebp //1 byte
mov ebp, esp //2 bytes; 2+1+2=5 bytes which I already added to _PMA
jmp dword ptr ds:[_PMA] //jmp back to the address in _PMA and continue the function
}
}
//OMG! I HAZ A BOT
_PostMessageA(hwndXD, WM_KEYDOWN, 0x59, (MapVirtualKey(0x59, 0) << 16));
and this is the website:
they talked very detaily about how to bypass gg