Simply load APM find your Gunz.exe proccess right click it and load .dll
select GunzFuckV3 or if you have GunzFuckV2 that works perfect.
Voila happy hacking. NOTE i have included WPE PRO in this post.
Also does anyone know what packets are good and bad? and wether or not you can still powerlevel yourself? and ifso the method of going about doing it?
P.S. Could someone please take the time out to upload the WHOLE gameguard folder found in the gunz directory, i know i should back-up befre i start messing
EDIT:
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
0010F4A0 3C 74 72 75 73 74 49 6E 66 6F 20 78 <trustInfo x
0010F4B0 6D 6C 6E 73 3D 22 75 72 6E 3A 73 63 68 65 6D 61 mlns="urn:schema
0010F4C0 73 2D 6D 69 63 72 6F 73 6F 66 74 2D 63 6F 6D 3A s-microsoft-com:
0010F4D0 61 73 6D 2E 76 33 22 3E 0D 0A 20 20 20 20 3C 73 asm.v3">.. <s
0010F4E0 65 63 75 72 69 74 79 3E 0D 0A 20 20 20 20 20 20 ecurity>..
0010F4F0 20 20 3C 72 65 71 75 65 73 74 65 64 50 72 69 76 <requestedPriv
0010F500 69 6C 65 67 65 73 3E 0D 0A 20 20 20 20 20 20 20 ileges>..
0010F510 20 20 20 20 20 3C 72 65 71 75 65 73 74 65 64 45 <requestedE
0010F520 78 65 63 75 74 69 6F 6E 4C 65 76 65 6C 0D 0A 20 xecutionLevel..
0010F530 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6C l
0010F540 65 76 65 6C 3D 22 72 65 71 75 69 72 65 41 64 6D evel="requireAdm
0010F550 69 6E 69 73 74 72 61 74 6F 72 22 0D 0A 20 20 20 inistrator"..
0010F560 20 20 20 20 20 20 20 20 20 20 20 20 20 75 69 41 uiA
0010F570 63 63 65 73 73 3D 22 66 61 6C 73 65 22 0D 0A 20 ccess="false"..
0010F580 20 20 20 20 20 20 20 20 20 20 20 2F 3E 0D 0A 20 />..
0010F590 20 20 20 20 20 20 20 3C 2F 72 65 71 75 65 73 74 </request
0010F5A0 65 64 50 72 69 76 69 6C 65 67 65 73 3E 0D 0A 20 edPrivileges>..
0010F5B0 20 20 20 3C 2F 73 65 63 75 72 69 74 79 3E 0D 0A </security>..
0010F5C0 3C 2F 74 72 75 73 74 49 6E 66 6F 3E </trustInfo>
None of you tight bastards
The line that i changed.. are you able to see Gunz.exe as a proccess now?
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
0010F540 72 65 71 75 69 72 65 41 64 6D requireAdm
0010F550 69 6E 69 73 74 72 61 74 6F 72 inistrator
Changed to!
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
0010F540 70 71 70 61 6F 73 69 77 71 6F pqpaosiwqo
0010F550 71 70 61 70 73 6F 77 69 77 77 qpapsowiww
If someone would try this out for me i would appreciate it, n please give me feedback.
Can you see Gunz.exe as a proccess using task manager now?






