Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 33
  1. #16
    kotentopf's Avatar
    Join Date
    Nov 2009
    Gender
    male
    Posts
    602
    Reputation
    26
    Thanks
    251
    Quote Originally Posted by freedompeace View Post
    People can still grab your hack even if you stealth inject it by monitoring what happens before it is injected.
    Next releases of me(NOT on this forum)
    Loader which download hack, random name, random datatype (.dll, .mp3 or whatever)
    and delete after game

    u must crack my FTP-Server to hexedit my hack^^
    The Internet SHOULD Be Illegal

    When you say
    "Java is a great programming language because it works on all platforms"
    it is just like
    "anal sex is great because it works on all genders"

    Are YOU a Troll?

  2. #17
    markoj's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Location
    s
    Posts
    1,067
    Reputation
    60
    Thanks
    407
    My Mood
    Bored
    Quote Originally Posted by kotentopf View Post
    Next releases of me(NOT on this forum)
    Loader which download hack, random name, random datatype (.dll, .mp3 or whatever)
    and delete after game

    u must crack my FTP-Server to hexedit my hack^^
    Or find the hack while it's in use
    Dont ban me

  3. #18
    kotentopf's Avatar
    Join Date
    Nov 2009
    Gender
    male
    Posts
    602
    Reputation
    26
    Thanks
    251
    Quote Originally Posted by markoj View Post
    Or find the hack while it's in use
    stealth injection make it unvisible, thats the next what i try to make^^
    The Internet SHOULD Be Illegal

    When you say
    "Java is a great programming language because it works on all platforms"
    it is just like
    "anal sex is great because it works on all genders"

    Are YOU a Troll?

  4. #19
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    Quote Originally Posted by kotentopf View Post
    Next releases of me(NOT on this forum)
    Loader which download hack, random name, random datatype (.dll, .mp3 or whatever)
    and delete after game

    u must crack my FTP-Server to hexedit my hack^^
    Unfortunately, there's pretty much no way to stop crackers, only slow them and deter some.

    Want to bet I can get your raw DLL on your next release?

  5. #20
    Gordon`'s Avatar
    Join Date
    Dec 2007
    Gender
    male
    Posts
    283
    Reputation
    24
    Thanks
    325
    Quote Originally Posted by kotentopf View Post
    stealth injection make it unvisible, thats the next what i try to make^^
    anyway, the hack is still in game memory. just crab it, fix relocs, imports whatever and thats it.
    or
    for example hooking the winsock function recv would also be fine.


  6. #21
    Jason's Avatar
    Join Date
    Apr 2010
    Gender
    male
    Location
    /dev/null
    Posts
    5,706
    Reputation
    907
    Thanks
    7,297
    My Mood
    Mellow
    Quote Originally Posted by freedompeace View Post
    And.. a char* is a character array...
    Please tell me you're being sarcastic

    Quote Originally Posted by Jeremy S. Anderson
    There are only two things to come out of Berkley, Unix and LSD,
    and I don’t think this is a coincidence
    You can win the rat race,
    But you're still nothing but a fucking RAT.


    ++Latest Projects++
    [Open Source] Injection Library
    Simple PE Cipher
    FilthyHooker - Simple Hooking Class
    CLR Injector - Inject .NET dlls with ease
    Simple Injection - An in-depth look
    MPGH's .NET SDK
    eJect - Simple Injector
    Basic PE Explorer (BETA)

  7. The Following User Says Thank You to Jason For This Useful Post:

    whit (01-13-2011)

  8. #22
    .::SCHiM::.'s Avatar
    Join Date
    Sep 2010
    Gender
    male
    Posts
    733
    Reputation
    180
    Thanks
    833
    My Mood
    Twisted
    Or you could use your own made crypter <- me

    I'm SCHiM

    Morals derive from the instinct to survive. Moral behavior is survival behavior above the individual level.

    Polymorphic engine
    Interprocess callback class
    SIN
    Infinite-precision arithmetic
    Hooking dynamic linkage
    (sloppy)Kernel mode Disassembler!!!

    Semi debugger




  9. #23
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    4,922
    My Mood
    Cool
    Quote Originally Posted by freedompeace View Post
    In raw features, Themida would win I'd say..




    People can still grab your hack even if you stealth inject it by monitoring what happens before it is injected.



    Doesn't stop people from disassembling code code o:

    And.. a char* is a character array...


    Well it will be made after it runs
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  10. #24
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    Quote Originally Posted by Jason View Post


    Please tell me you're being sarcastic
    No, in essence, a char* is a (pointer to a) character array in memory.

  11. #25
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,305
    Reputation
    170
    Thanks
    2,194
    My Mood
    Flirty
    Deleted my own post.

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  12. #26
    whit's Avatar
    Join Date
    Jan 2010
    Gender
    male
    Posts
    7,170
    Reputation
    490
    Thanks
    2,252
    Quote Originally Posted by why06 View Post
    Deleted my own post.
    What you talkin bout willis...

  13. #27
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,305
    Reputation
    170
    Thanks
    2,194
    My Mood
    Flirty
    Quote Originally Posted by whit View Post


    What you talkin bout willis...
    I was going to say all char[] are char*, but not all char* are char[] arrays, atleast by definition, though since they are byte pointers they can point to whatever byte you want. And that a char* can point to a single char or a char[], but I decided to delete my post when I realized:

    a char[] of size 1 char is but the same thing as a &char which then would essentially destroy the only nitpicking difference I could find to erk freedom with. Therefore I realized I was over analyzing the whole thing and on top of that the net result of that analysis was zero, so I deleted my post.

    Happy?

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  14. #28
    whit's Avatar
    Join Date
    Jan 2010
    Gender
    male
    Posts
    7,170
    Reputation
    490
    Thanks
    2,252
    Quote Originally Posted by why06 View Post


    I was going to say all char[] are char*, but not all char* are char[] arrays, atleast by definition, though since they are byte pointers they can point to whatever byte you want. And that a char* can point to a single char or a char[], but I decided to delete my post when I realized:

    a char[] of size 1 char is but the same thing as a &char which then would essentially destroy the only nitpicking difference I could find to erk freedom with. Therefore I realized I was over analyzing the whole thing and on top of that the net result of that analysis was zero, so I deleted my post.

    Happy?
    Yup pretty happy..
    Better hide those arrays and pionters tho
    Gonna give some Leecher a Knowledge Boner

  15. #29
    topblast's Avatar
    Join Date
    Mar 2010
    Gender
    male
    Location
    Far from around you Programmer: C++ | VB | C# | JAVA
    Posts
    3,607
    Reputation
    149
    Thanks
    4,922
    My Mood
    Cool
    Quote Originally Posted by whit View Post


    Yup pretty happy..
    Better hide those arrays and pionters tho
    Gonna give some Leecher a Knowledge Boner
    Yea like you
    jk
    I just like programming, that is all.

    Current Stuff:

    • GPU Programmer (Cuda)
    • Client/Server (Cloud Server)
    • Mobile App Development

  16. #30
    whit's Avatar
    Join Date
    Jan 2010
    Gender
    male
    Posts
    7,170
    Reputation
    490
    Thanks
    2,252
    Quote Originally Posted by topblast View Post


    Yea like you
    jk
    I am A Leecher...

    I Ctrl + V my Cawk in ya Moms Vagina

Page 2 of 3 FirstFirst 123 LastLast