elitepvpers

elitepvpers (https://www.elitepvpers.com/forum/)
-   S4 League Hacks, Bots, Cheats & Exploits (https://www.elitepvpers.com/forum/s4-league-hacks-bots-cheats-exploits/)
-   -   [Release] HGWC Bypass (+function source) (https://www.elitepvpers.com/forum/s4-league-hacks-bots-cheats-exploits/2930769-release-hgwc-bypass-function-source.html)

onahoe 10/29/2013 14:17

[Release] HGWC Bypass (+function source)
 
1 Attachment(s)

Yo, today i want to release my hgwc bypass.
remember: this is not a x-trap bypass!
a >>[Only registered and activated users can see links. Click Here To Register...]<< can be found here

[Screen]
Spoiler:
[Only registered and activated users can see links. Click Here To Register...]
[How to?]

-Download and unpack the zip-archive
-Start "onomato - HGWC Bypass.exe" as administrator
-Start S4League

[Main-Functions]

-file detection (you can edit resources or play with older patches..)
-ban (you can't get banned by using hacks..)

[Download & VT]

You can download it by clicking the attachment.
VT - HGWC.dll: [Only registered and activated users can see links. Click Here To Register...]
VT - Injector: [Only registered and activated users can see links. Click Here To Register...]

Have fun ;)
And remember: It will not work if the hgwc console isnt writing:
[Only registered and activated users can see links. Click Here To Register...]

0815 Function-src:
Spoiler:
PHP Code:

#define TRUE FALSE //lol

class HGWC
{

public:

    
int HGWC::FileDetection(int);
    
int HGWC::KeepAlive(int);
    
int HGWC::Bann(int);
    
int HGWC::Thread(int);
}
rect;

int HGWC::FileDetection(int LParam)
{
    
memcpy((LPVOID)0x0040CAE1,(LPVOID)"\xEB",1);
    return 
0;
}

int HGWC::KeepAlive(int LParam)
{
    
memcpy((LPVOID)0x0040D5B7,(LPVOID)"\xEB",1);
    return 
0;
}

int HGWC::Bann(int LParam)
{
    
memcpy((LPVOID)0x0040F9FD,(LPVOID)"\xEB",1);
    
memcpy((LPVOID)0x0040FA31,(LPVOID)"\xEB",1);
    
memcpy((LPVOID)0x0040FB71,(LPVOID)"\xC2\x0C\x00\x90\x90",5);
    
memcpy((LPVOID)0x00410270,(LPVOID)"\xC2\x0C\x00\x90\x90",5);
    return 
0;
}

int HGWC::Thread(int LParam)
{
    
memcpy((LPVOID)0x0040D4E3,(LPVOID)"\x6A\x7D",2);
    
memcpy((LPVOID)0x00418F91,(LPVOID)"\xEB\x0A",2);
    
memcpy((LPVOID)0x00464147,(LPVOID)"\x68\xFF\x08\x00\x00",5);
    
memcpy((LPVOID)0x00410270,(LPVOID)"\xC2\x0C\x00\x90\x90",5);
    return 
0;



Omdi 10/29/2013 14:23

approved

Dark Ghost 10/29/2013 14:25

Thanks you

A4Hack 10/29/2013 14:32

Xtrap bypass?

onahoe 10/29/2013 14:34

Quote:

Originally Posted by A4Hack (Post 25648460)
Xtrap bypass?

->
Quote:

a >>[Only registered and activated users can see links. Click Here To Register...]<< can be found here

REDAPRO 10/29/2013 15:21

it make to me this so work ????? [IMG]https://www.facebook.com/photo.php?fbid=323939061081202&set=gm.463681110412 981&type=1&relevant_count=1******nf[/IMG]

it make to me this so work ????? [Only registered and activated users can see links. Click Here To Register...]

it make to me this so work ????? [Only registered and activated users can see links. Click Here To Register...]

onahoe 10/29/2013 16:10

Quote:

Originally Posted by REDAPRO (Post 25649299)
it make to me this so work ????? [IMG]https://www.facebook.com/photo.php?fbid=323939061081202&set=gm.463681110412 981&type=1&relevant_count=1******nf[/IMG]

it make to me this so work ????? [Only registered and activated users can see links. Click Here To Register...]

it make to me this so work ????? [Only registered and activated users can see links. Click Here To Register...]

"Successfully injected" means that the bypass is working on hgwc..
if there is a message "Bypassed HGWC ;)" the bypass is working.

ahmedxxx 10/29/2013 21:01

Don't Work

99xX77z99xXx 10/29/2013 21:12

THANKS

▒ Ant. 10/29/2013 21:30

Followed your instructions, just like any other hack. Opened the injector, and as soon as HGWC.exe pops up it goes to this then disappears. :
[Only registered and activated users can see links. Click Here To Register...]

onahoe 10/29/2013 21:52

Quote:

Originally Posted by Alucard1113 (Post 25655960)
Followed your instructions, just like any other hack. Opened the injector, and as soon as HGWC.exe pops up it goes to this then disappears. :
[Only registered and activated users can see links. Click Here To Register...]

Read my last sentence in the thread and try again.

jhonatasaz 10/29/2013 23:22

You say to read the last line in the post. HGWC not strategic writing this I did not understand what it is to explain it. For I am with an error Chamdo "Found! Try to inject" Windows 7 64-bit.

snow 10/29/2013 23:33

You have some serious resource leak issues in your code. Try using a local private variable for your HANDLE and call OpenProcess in your constructor. Use CloseHandle in your destructor, otherwise the system has no chance to know you're done with those process handles. At the moment you're using 10 handles, that's not healthy.

Oh, and if you're using that code within the targets address space you should use memset or pointers as there's no kernel call then. :)

onahoe 10/30/2013 06:46

Quote:

Originally Posted by jhonatasaz (Post 25658039)
You say to read the last line in the post. HGWC not strategic writing this I did not understand what it is to explain it. For I am with an error Chamdo "Found! Try to inject" Windows 7 64-bit.

Just try again.. If it dont work after the 10th try, pm me. ;)

Quote:

Originally Posted by snow911 (Post 25658188)
You have some serious resource leak issues in your code. Try using a local private variable for your HANDLE and call OpenProcess in your constructor. Use CloseHandle in your destructor, otherwise the system has no chance to know you're done with those process handles. At the moment you're using 10 handles, that's not healthy.

Oh, and if you're using that code within the targets address space you should use memset or pointers as there's no kernel call then. :)

Ich werd's später sowieso updaten :) Danke ^^

iwhitex3 10/30/2013 07:44

when hgwc showed up it dissapeared the bypass disasapeared straight away


All times are GMT +2. The time now is 14:45.

Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.