That code will set your nat type to open but as mentioned earlier, I doubt that it has any actual effect. As far as I am concerned, not finding lobbies doesn't have anything to do with being VAC banned. That's the stats issue. The only limitation of the VAC bypass is that you can't "create" a new, valid lobby (id?), unless taking one over from the host via host migration.
In Progress, will be done this weekend.
Same, will be done this weekend.
Hey DevinFSP,
my VAC bypass is only slightly different and it boils down to the same thing as what the other guy did. But I can make a dll for you (and others) that can be injected alongside the VAC bypass and it should take care of that stat issue I was talking about earlier. Before adding this to my hack I couldn't find a single lobby, after that I could always find something between 10 and 15.
A C-Background is perfect for getting into making hacks. Often people ask me for help with a Java background and they often have these weird ideas about how the stack works, how strings are stored and how structs/classes look like in memory. When I started learning C++ I was always interested in how the language itself works, I couldn't just accept how these "magical things" like for example polymorphism work. I disassembled my own programs and read a lot about how the language works internally. This helped me a lot when I started reversing call of duty games. Another thing that makes reversing call of duty are the leaked pdb's of other call of duties that you can find online. All call of duties are very similar so you can sort of cross reference the pdb of an older call of duty with MW2. What I always recommend to people who have some C/C++ background and who want to get started on making hacks for cod is to find dvar addresses and reverse engineer the dvar structure. That's pretty straight forward and can be done in a hex editor. All you need is a good understanding of structs and an idea of what a dvar is. You can look at the quake 3 sdk to get an idea of what a dvar looks like (or in the case of quake cvar_t).
-- Xen0
PS: Didn't test the dll, but it should work and it is undetected. If anyone using it gets banned it's most likely because of the injector. Let me know if it helps you at all. Also all my dll's will be made in VS 2017, so make sure to have the corresponding C++redistributable.