Originally Posted by
see111
#include <windows.h>
#include <stdio.h>
BYTE ByteAsli[6] = {0x00, 0x00, 0x00, 0x00, 0xFF, 0x95};
BYTE RubahByte[6] = {0x00, 0x00, 0x00, 0x00, 0xFF, 0x95};
DWORD see111_Hack = 0;
LPTSTR see111 = "Blackshot.exe";
void Patch(void *adr, void *ptr, int size)
{
DWORD NewProtection;
VirtualProtect(adr,size,PAGE_EXECUTE_WRITECOPY, &NewProtection);
memcpy(adr,ptr,size);
VirtualProtect(adr,size,NewProtection, &NewProtection);
}
DWORD WINAPI LoopFunction(LPVOID param)
{
while (1) {
if (GetAsyncKeyState(VK_END)&1)
{
DWORD MPGH = (DWORD)GetModuleHandleA(see111);
{
if (MPGH > 0) {
see111_Hack = MPGH + 0x950000; //npsc.des | 0x950000 | 228KB | nProtect SpeedCheck ModulePatch
((void *)(see111_Hack),(void*)(PBYTE)RubahByte, 6);
Sleep(100);
Patch((void *)(see111_Hack),(void*)(PBYTE)ByteAsli, 6);
}
Sleep(10);
}
}
}
return (0);
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
DisableThreadLibraryCalls(hDll);
if (dwReason == DLL_PROCESS_ATTACH) {
CreateThread(0, 0, LoopFunction, 0, 0, 0);
}
return TRUE;
}
Help me check for the bypass!