Register for your free account! | Forgot your password?

Go Back   elitepvpers > Shooter > CrossFire > CrossFire Hacks, Bots, Cheats & Exploits
You last visited: Today at 03:48

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[i2-Dev] Crossfire Xtrap Bypass + [SOURCE CODE]

Discussion on [i2-Dev] Crossfire Xtrap Bypass + [SOURCE CODE] within the CrossFire Hacks, Bots, Cheats & Exploits forum part of the CrossFire category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Nov 2013
Posts: 67
Received Thanks: 23
Cool [i2-Dev] Crossfire Xtrap Bypass + [SOURCE CODE]



It's a full Xtrap bypass ..
you can use Cheat Engine / WPE / Any Injector [ Manual Map Or Normal ]
BUT u can still get BANNED by using some patched dll(s) ..
but CE works fine .. Programmed For [NA] Version Only !
ENJOY ..

Download from attachments.

Virus Scan :

It's not PACKED / ENCRYPTED !
if u don't believe me ,, don't use it
Have Fun ..


Source Code :
Code:
#include <Windows.h>
#include <tlhelp32.h>
#include "detours.h"
#include <process.h> 
#include <wchar.h>
#include <stdlib.h>
#include "tchar.h"
#include "stdio.h"
#include "psapi.h"
#include <string>
#include <iostream>
#include <fstream>
using namespace std;
LPCTSTR lpFile_XTRAP;
// Values
typedef HMODULE (WINAPI *tLoadLibraryA)(LPCTSTR);
typedef HMODULE (WINAPI *tLoadLibraryExA)(LPCTSTR, HANDLE, DWORD);
typedef BOOL (WINAPI *tTerminateProcess)(HANDLE, UINT);
typedef VOID (WINAPI *tExitProcess)(UINT);
// Original Functions
tLoadLibraryA m_LoadLibraryAOrig = nullptr;
tLoadLibraryExA m_LoadLibraryExAOrig = nullptr;
tTerminateProcess m_TerminateProcessOrig = nullptr;
tExitProcess m_ExitProcessOrig = nullptr;
// Hooked LoadLibraryA
static HMODULE WINAPI HookedLoadLibraryA(LPCTSTR lpFileName)
{
	//cout << "LoadLibraryA : [" << lpFileName << "]" << endl;
	if(string(lpFileName).find("XTrapVa.dll") != string::npos)
	{
	lpFile_XTRAP = lpFileName;
	cout << "Blocked LoadLibraryA [" << lpFileName << "]" << endl;
	return (HMODULE)0xA0B1C2D3;
	}
	return m_LoadLibraryAOrig(lpFileName);
}
// Hooked LoadLibraryExA
static HMODULE WINAPI HookedLoadLibraryExA(LPCTSTR lpFileName, HANDLE hHandle, DWORD uk1)
{
	cout << "LoadLibraryExA : [" << lpFileName << "]" << endl;
	if(string(lpFileName).find("XTrapVa.dll") != string::npos)
	{
	cout << "Blocked LoadLibraryExA [" << lpFileName << "]" << endl;
	return (HMODULE)0xA0B1C2D3;
	}
	return m_LoadLibraryExAOrig(lpFileName, hHandle, uk1);
}
// Hooked ExitProcess
static BOOL WINAPI HookedTerminateProcess(HANDLE hProcess, UINT uExitCode)
{
	cout << "TerminateProcess Was Blocked" << endl;
	return false;
}
// Hooked ExitProcess
static VOID WINAPI HookedExitProcess(UINT uExitCode)
{
	cout << "ExitProcess Was Blocked : ExitCode = " << uExitCode << endl;
	return ;
}
// GetLastError String
// Main Function
void I2()
{
	AllocConsole();
	freopen("CONIN$", "r", stdin);
	freopen("CONOUT$", "w", stdout);

	DWORD TerminateProcessAddy = (DWORD)GetProcAddress(GetModuleHandle("Kernel32.dll"), "TerminateProcess");
	DWORD ExitProcessAddy = (DWORD)GetProcAddress(GetModuleHandle("Kernel32.dll"), "ExitProcess");	
	DWORD PostQuitMessageAddy = (DWORD)GetProcAddress(GetModuleHandle("User32.dll"), "PostQuitMessage");	
	DWORD LoadLibraryAAddy = (DWORD)GetProcAddress(GetModuleHandle("Kernel32.dll"), "LoadLibraryA");
	DWORD LoadLibraryExAAddy = (DWORD)GetProcAddress(GetModuleHandle("Kernel32.dll"), "LoadLibraryExA");

	cout << "TerminateProcess Addy : " << hex << uppercase << TerminateProcessAddy << endl;
	cout << "ExitProcess Addy : " << hex << uppercase << ExitProcessAddy << endl;

	m_ExitProcessOrig = (tExitProcess)DetourFunction((BYTE*)ExitProcessAddy, (BYTE*)HookedExitProcess);
	cout << " >> Detoured TerminateProcess : [" << hex << uppercase << ExitProcessAddy << "]" << endl;
	m_TerminateProcessOrig = (tTerminateProcess)DetourFunction((BYTE*)TerminateProcessAddy, (BYTE*)HookedTerminateProcess);
	cout << " >> Detoured ExitProcess : [" << hex << uppercase << TerminateProcessAddy << "]" << endl;
	m_LoadLibraryAOrig = (tLoadLibraryA)DetourFunction((BYTE*)LoadLibraryAAddy, (BYTE*)HookedLoadLibraryA);
	cout << " >> Detoured LoadLibraryA : [" << hex << uppercase << LoadLibraryAAddy << "]" << endl;
	/*m_LoadLibraryExAOrig = (tLoadLibraryExA)DetourFunction((BYTE*)LoadLibraryExAAddy, (BYTE*)HookedLoadLibraryExA);
	cout << " >> Detoured LoadLibraryExA : [" << hex << uppercase << LoadLibraryExAAddy << "]" << endl;*/
	//
	return;
	HMODULE XtrapVaDll = m_LoadLibraryAOrig("XTrapVa.dll");
	if(XtrapVaDll != NULL)
	{
		FreeLibraryAndExitThread(XtrapVaDll, 0);
		cout << "Just Free Library XTrapVa.dll" << endl;
	}
	else { cout << "XTrapVa.dll Wasn't Found ..." << endl; }
	return;
}
// Dll Main
extern "C" __declspec(dllexport)BOOL WINAPI DllMain (HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
{
	switch (fdwReason)
	{
	case DLL_PROCESS_ATTACH:
		DisableThreadLibraryCalls(hinstDLL);
		CreateThread(0, 0, (LPTHREAD_START_ROUTINE)I2, 0, 0, 0);
		break;
	}
	return true;
}
Bye
Attached Files
File Type: rar [i2-Dev] Crossfire Bypass.rar (19.6 KB, 1735 views)
I2espect is offline  
Thanks
3 Users
Old 07/14/2016, 15:48   #2
 
elite*gold: 0
Join Date: Sep 2012
Posts: 44
Received Thanks: 0
testing .. antivirus found nothing malwarebytes and avast

edit: does not work on EU.
edit: it works on darkcf private server
noname001 is offline  
Old 07/14/2016, 15:51   #3
 
elite*gold: 0
Join Date: Nov 2013
Posts: 67
Received Thanks: 23
Quote:
Originally Posted by noname001 View Post
testing .. antivirus found nothing malwarebytes and avast
as i said , i didn't pack it

#Added Source Code !
I2espect is offline  
Old 07/14/2016, 18:21   #4
 
elite*gold: 0
Join Date: Jan 2015
Posts: 48
Received Thanks: 3
NA work ?
berkaysensizz is offline  
Old 07/17/2016, 21:58   #5
 
elite*gold: 0
Join Date: Mar 2016
Posts: 6
Received Thanks: 2
How do I use it ?
SuperMan1231234 is offline  
Thanks
1 User
Old 08/21/2016, 08:34   #6
 
elite*gold: 0
Join Date: Nov 2013
Posts: 67
Received Thanks: 23
WTF ,,, full xtrap bypass in the second page with only 4 replies !
I2espect is offline  
Thanks
1 User
Old 08/21/2016, 09:30   #7
 
elite*gold: 0
Join Date: Dec 2014
Posts: 112
Received Thanks: 15
is this patched now?
polendown is offline  
Old 08/22/2016, 13:28   #8
 
elite*gold: 0
Join Date: Jun 2015
Posts: 3
Received Thanks: 0
how to use it ?
hacknack is offline  
Old 08/24/2016, 06:19   #9
 
elite*gold: 0
Join Date: Nov 2013
Posts: 67
Received Thanks: 23
Quote:
Originally Posted by hacknack View Post
how to use it ?
download, run as admin, open crossfire !
I2espect is offline  
Old 08/27/2016, 21:54   #10
 
elite*gold: 0
Join Date: Aug 2016
Posts: 5
Received Thanks: 0
How to work? Im have windows 7 64bit ? I have that error dll: api-ms-win-crt-stdio-l1-1-0.dll
Help me please
kroliczek15 is offline  
Old 09/01/2016, 12:14   #11
 
elite*gold: 0
Join Date: Sep 2016
Posts: 1
Received Thanks: 0
i think its keylogger no one test this bypass to admin and mod please aprove or test this bypass before use the other member
Ricks13 is offline  
Old 09/05/2016, 19:09   #12
 
elite*gold: 0
Join Date: Jul 2013
Posts: 1
Received Thanks: 0
when i download 503 service unavailable ?
amrkezma1 is offline  
Old 10/10/2016, 13:10   #13
 
Mr.Havoc's Avatar
 
elite*gold: 0
Join Date: Sep 2016
Posts: 68
Received Thanks: 10
it's not working bro on crossfire EU
Mr.Havoc is offline  
Old 10/11/2016, 19:24   #14
 
elite*gold: 0
Join Date: Sep 2016
Posts: 1
Received Thanks: 1
hi hope someone can teach me how to use this by pass TIA
inmyeyesurdead is offline  
Thanks
1 User
Old 10/12/2016, 07:13   #15
 
elite*gold: 0
Join Date: Oct 2016
Posts: 2
Received Thanks: 0
شكرا على المجهود
sasawater is offline  

Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.