dude wtf look at the time of my first post and look at the time he posted!!!!!!! he posted it was detected only one minute after I added the download link. How the fuck did he play for 5minutes with this bypass and then say its detected when i had just added the link????
Well he was fucking spamming my thread he never even tested it.
Also this bypass will work, I am not using a memory address I am using a detour of the main check for punkbuster.
Also this bypass isnt detected!!!! Its just that its not working right to protect the detected hack you are trying to use! I will update and fix the detour.
here is some of it but not all.
Code:
push ecx
.text:10012566 push dword_100A1B7A
.text:1001256C push 32h
.text:1001256E push 2
.text:10012570 push offset aPunkbusterCl_0 ; "PunkBuster Client (v%d.%03d | A%d) %s"
.text:10012575 push 0
.text:10012577 push ebx
.text:10012578 call eax
.text:1001257A push edi ; char *
.text:1001257B push esi ; char *
.text:1001257C call _strcpy
.text:10012581 add esp, 24h
.text:10012584 pop edi
.text:10012585 pop esi
.text:10012586 pop ebx
.text:10012587 retn
.text:10012587 sub_1001250D endp
I just need to get the detour right for the function called in pbcl.dll