|
You last visited: Today at 02:22
Advertisement
[Release]Exivion Xtrap Bypass
Discussion on [Release]Exivion Xtrap Bypass within the S4 League Hacks, Bots, Cheats & Exploits forum part of the S4 League category.
04/21/2013, 20:17
|
#31
|
elite*gold: 0
Join Date: Jan 2013
Posts: 201
Received Thanks: 64
|
plz make instant conquest hack
|
|
|
04/21/2013, 20:24
|
#32
|
elite*gold: 0
Join Date: Jun 2012
Posts: 11
Received Thanks: 2
|
what is brain.exe
|
|
|
04/21/2013, 20:27
|
#33
|
elite*gold: 0
Join Date: Apr 2013
Posts: 2
Received Thanks: 2
|
Quote:
Originally Posted by arsanyaas
what is brain.exe
|
Your ability to think.
|
|
|
04/21/2013, 20:28
|
#34
|
elite*gold: 0
Join Date: Feb 2012
Posts: 30
Received Thanks: 10
|
pls help s4 doent open when i start it with the bypass ( i open the bypass as admin) win8 64bit help pls
|
|
|
04/21/2013, 20:29
|
#35
|
elite*gold: 0
Join Date: Feb 2013
Posts: 488
Received Thanks: 501
|
Quote:
Originally Posted by arsanyaas
what is brain.exe
|
Here u go this is it [
|
|
|
04/21/2013, 20:39
|
#36
|
elite*gold: 0
Join Date: Apr 2013
Posts: 16
Received Thanks: 95
|
Quote:
Originally Posted by naughtys6
plz make instant conquest hack
|
we are currently working on a instant conquest hack.. we will release it as soon as we are done with it
|
|
|
04/21/2013, 20:47
|
#37
|
elite*gold: 0
Join Date: Apr 2013
Posts: 83
Received Thanks: 49
|
Not Work
|
|
|
04/21/2013, 21:00
|
#38
|
elite*gold: 0
Join Date: Jun 2012
Posts: 48
Received Thanks: 32
|
hard to believe how many people copy and paste this 
and say it's their own bypass
|
|
|
04/21/2013, 21:03
|
#39
|
elite*gold: 0
Join Date: Mar 2013
Posts: 91
Received Thanks: 124
|
Nice job! :3 Thank you ~ Keep it up c:
|
|
|
04/21/2013, 21:16
|
#40
|
elite*gold: 0
Join Date: Jan 2012
Posts: 58
Received Thanks: 7
|
Work Win 32x
|
|
|
04/21/2013, 21:24
|
#41
|
elite*gold: 11
Join Date: Jun 2012
Posts: 894
Received Thanks: 1,463
|
Exivion Bypass Xtrap
Code:
Opt("TrayMenuMode", 1)
TraySetIcon("I.ico")
$STATUS = TrayCreateItem("Status")
TrayCreateItem("")
$EXIT = TrayCreateItem("Exit")
ToolTip("Start S4League Client.", 5, 5)
Global $STATUST = "Waiting for S4Client.exe"
While 1
If ProcessExists("S4Client.exe") Then
BYPASS()
EndIf
$MSG = TrayGetMsg()
Switch $MSG
Case $EXIT
Exit
Case $STATUS
ToolTip("Created By Exivion", $STATUST, 5)
EndSwitch
WEnd
Func BYPASS()
$STATUST = "Found"
ToolTip("Created By Exivion", 5, 5)
Global $MEMORYHANDLE, $ENUMPROCESSES
$BYTELEN = 19
$NOP = "0x" & _StringRepeat("90", $BYTELEN)
$PROCESSID = ProcessWait("S4Client.exe")
$MEMORYHANDLE = _MEMORYOPEN($PROCESSID)
Do
Sleep(10)
Until _CHECK() = 1
_MEMORYWRITE($ENUMPROCESSES, $MEMORYHANDLE, $NOP, "byte[" & $BYTELEN & "]")
_MEMORYCLOSE($MEMORYHANDLE)
$STATUST = "OK"
ToolTip("Thanks For Using Exivion Bypass.", 5, 5)
Sleep(5000)
Exit
EndFunc
Func _CHECK()
$ENUMPROCESSES = _GETPROCESSADDRESS(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _MEMORYREAD($ENUMPROCESSES, $MEMORYHANDLE, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GETPROCESSADDRESS($HMODULE, $FUNCTION)
$CALL = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $HMODULE, "str", $FUNCTION)
Return $CALL[0]
EndFunc
H-Coding
Code:
Opt("TrayMenuMode", 1)
TraySetIcon("I.ico")
$STATUS = TrayCreateItem("Status")
TrayCreateItem("")
$EXIT = TrayCreateItem("Exit")
ToolTip("Start S4League.", 5, 5)
Global $STATUST = "Waiting for S4Client.exe"
While 1
If ProcessExists("S4Client.exe") Then
BYPASS()
EndIf
$MSG = TrayGetMsg()
Switch $MSG
Case $EXIT
Exit
Case $STATUS
ToolTip("Created by H-Coding", $STATUST, 5)
EndSwitch
WEnd
Func BYPASS()
$STATUST = "Found"
ToolTip("Created by H-Coding", 5, 5)
Global $MEMORYHANDLE, $ENUMPROCESSES
$BYTELEN = 19
$NOP = "0x" & _StringRepeat("90", $BYTELEN)
$PROCESSID = ProcessWait("S4Client.exe")
$MEMORYHANDLE = _MEMORYOPEN($PROCESSID)
Do
Sleep(10)
Until _CHECK() = 1
_MEMORYWRITE($ENUMPROCESSES, $MEMORYHANDLE, $NOP, "byte[" & $BYTELEN & "]")
_MEMORYCLOSE($MEMORYHANDLE)
$STATUST = "OK"
ToolTip("Now you can use our hacks.", 5, 5)
Sleep(5000)
Exit
EndFunc
Func _CHECK()
$ENUMPROCESSES = _GETPROCESSADDRESS(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _MEMORYREAD($ENUMPROCESSES, $MEMORYHANDLE, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GETPROCESSADDRESS($HMODULE, $FUNCTION)
$CALL = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $HMODULE, "str", $FUNCTION)
Return $CALL[0]
EndFunc
K1ramoX
Code:
#include <NomadMemory.au3>
#include <WinAPI.au3>
#include <String.au3>
Global $Memoryhandle, $EnumProcesses
$ByteLen = 19
$Nop = "0x" & _StringRepeat("90", $ByteLen)
$ProcessID = ProcessWait("S4Client.exe")
$Memoryhandle = _MemoryOpen($ProcessID)
Do
Sleep(10)
Until _Check() = 1
_MemoryWrite($EnumProcesses, $Memoryhandle, $Nop, "byte[" & $ByteLen & "]")
_MemoryClose($Memoryhandle)
Func _Check()
$EnumProcesses = _GetProcessAddress(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _memoryread($EnumProcesses, $Memoryhandle, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GetProcessAddress($hModule, $Function)
$call = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $hmodule, "str", $Function)
Return $call[0]
EndFunc
wen man vergleicht siet man das er das nicht gemacht hat
Thanks an K1ramoX
|
|
|
04/21/2013, 22:12
|
#42
|
elite*gold: 20
Join Date: Oct 2012
Posts: 346
Received Thanks: 361
|
S4 Hidding In Windows 7 32Bit!
_____________________________________
Click Thanks If I Helped You!
|
|
|
04/21/2013, 22:30
|
#43
|
elite*gold: 0
Join Date: Jul 2011
Posts: 347
Received Thanks: 121
|
Please help me after HGWC bar loads it shows enjoy your hacks or smth like that then it closes
|
|
|
04/21/2013, 22:46
|
#44
|
elite*gold: 0
Join Date: Apr 2012
Posts: 6
Received Thanks: 0
|
Good work! To me it works perfectly!
win7 32 bit
|
|
|
04/21/2013, 22:48
|
#45
|
elite*gold: 11
Join Date: Jun 2012
Posts: 894
Received Thanks: 1,463
|
Quote:
Originally Posted by abdulkadir7474
Exivion Bypass Xtrap
Code:
Opt("TrayMenuMode", 1)
TraySetIcon("I.ico")
$STATUS = TrayCreateItem("Status")
TrayCreateItem("")
$EXIT = TrayCreateItem("Exit")
ToolTip("Start S4League Client.", 5, 5)
Global $STATUST = "Waiting for S4Client.exe"
While 1
If ProcessExists("S4Client.exe") Then
BYPASS()
EndIf
$MSG = TrayGetMsg()
Switch $MSG
Case $EXIT
Exit
Case $STATUS
ToolTip("Created By Exivion", $STATUST, 5)
EndSwitch
WEnd
Func BYPASS()
$STATUST = "Found"
ToolTip("Created By Exivion", 5, 5)
Global $MEMORYHANDLE, $ENUMPROCESSES
$BYTELEN = 19
$NOP = "0x" & _StringRepeat("90", $BYTELEN)
$PROCESSID = ProcessWait("S4Client.exe")
$MEMORYHANDLE = _MEMORYOPEN($PROCESSID)
Do
Sleep(10)
Until _CHECK() = 1
_MEMORYWRITE($ENUMPROCESSES, $MEMORYHANDLE, $NOP, "byte[" & $BYTELEN & "]")
_MEMORYCLOSE($MEMORYHANDLE)
$STATUST = "OK"
ToolTip("Thanks For Using Exivion Bypass.", 5, 5)
Sleep(5000)
Exit
EndFunc
Func _CHECK()
$ENUMPROCESSES = _GETPROCESSADDRESS(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _MEMORYREAD($ENUMPROCESSES, $MEMORYHANDLE, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GETPROCESSADDRESS($HMODULE, $FUNCTION)
$CALL = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $HMODULE, "str", $FUNCTION)
Return $CALL[0]
EndFunc
H-Coding
Code:
Opt("TrayMenuMode", 1)
TraySetIcon("I.ico")
$STATUS = TrayCreateItem("Status")
TrayCreateItem("")
$EXIT = TrayCreateItem("Exit")
ToolTip("Start S4League.", 5, 5)
Global $STATUST = "Waiting for S4Client.exe"
While 1
If ProcessExists("S4Client.exe") Then
BYPASS()
EndIf
$MSG = TrayGetMsg()
Switch $MSG
Case $EXIT
Exit
Case $STATUS
ToolTip("Created by H-Coding", $STATUST, 5)
EndSwitch
WEnd
Func BYPASS()
$STATUST = "Found"
ToolTip("Created by H-Coding", 5, 5)
Global $MEMORYHANDLE, $ENUMPROCESSES
$BYTELEN = 19
$NOP = "0x" & _StringRepeat("90", $BYTELEN)
$PROCESSID = ProcessWait("S4Client.exe")
$MEMORYHANDLE = _MEMORYOPEN($PROCESSID)
Do
Sleep(10)
Until _CHECK() = 1
_MEMORYWRITE($ENUMPROCESSES, $MEMORYHANDLE, $NOP, "byte[" & $BYTELEN & "]")
_MEMORYCLOSE($MEMORYHANDLE)
$STATUST = "OK"
ToolTip("Now you can use our hacks.", 5, 5)
Sleep(5000)
Exit
EndFunc
Func _CHECK()
$ENUMPROCESSES = _GETPROCESSADDRESS(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _MEMORYREAD($ENUMPROCESSES, $MEMORYHANDLE, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GETPROCESSADDRESS($HMODULE, $FUNCTION)
$CALL = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $HMODULE, "str", $FUNCTION)
Return $CALL[0]
EndFunc
K1ramoX
Code:
#include <NomadMemory.au3>
#include <WinAPI.au3>
#include <String.au3>
Global $Memoryhandle, $EnumProcesses
$ByteLen = 19
$Nop = "0x" & _StringRepeat("90", $ByteLen)
$ProcessID = ProcessWait("S4Client.exe")
$Memoryhandle = _MemoryOpen($ProcessID)
Do
Sleep(10)
Until _Check() = 1
_MemoryWrite($EnumProcesses, $Memoryhandle, $Nop, "byte[" & $ByteLen & "]")
_MemoryClose($Memoryhandle)
Func _Check()
$EnumProcesses = _GetProcessAddress(_WinAPI_GetModuleHandle("psapi.dll"), "EnumProcesses")
If _memoryread($EnumProcesses, $Memoryhandle, "byte[2]") = "0x8BFF" Then
Return 1
Else
Return 0
EndIf
EndFunc
Func _GetProcessAddress($hModule, $Function)
$call = DllCall("Kernel32.dll", "ptr", "GetProcAddress", "ptr", $hmodule, "str", $Function)
Return $call[0]
EndFunc
wen man vergleicht siet man das er das nicht gemacht hat
Thanks an K1ramoX
|
Thanks to K1ramoX xDD
|
|
|
Similar Threads
|
[Release]XTrap Bypass
05/28/2014 - S4 League Hacks, Bots, Cheats & Exploits - 21 Replies
inject my dll into S4Client.exe
(40/46)Protected-Code
https://www.virustotal.com/en/file/7f20fd186712d9 d6eb9883a43ae1d9113e5b980b6eb1ea91107a0d6e01cfdc63 /analysis/1365465589/
|
[Release] Xtrap Bypass
02/17/2013 - S4 League Hacks, Bots, Cheats & Exploits - 95 Replies
Hallo elitepvpers
Ihr wolltet einen neuen bypass heir hab ihr einen neuen :D
Wenn er geht bitte Thanks hintelassen!
Download: Download .
wird eh bald gefixxt oder geleecht :(
VirusToTal: VirusToTal
|
All times are GMT +1. The time now is 02:25.
|
|