Code:
//=====================================================================================================================================//
// MAT CIB Bypass Illegal
// Madde By Harith101 !
//=====================================================================================================================================//
#include <windows.h>
#include <stdio.h>
BYTE Bypass1[7] = {0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; / ON Bypass . Example code
BYTE Bypass11[7] = {0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; //Byte OFF Bypass . Example code
LPTSTR COD = "MAT.exe"; // Target game
void Patch(void *adr, void *ptr, int size)
{
DWORD NewProtection;
VirtualProtect(adr,size,PAGE_EXECUTE_WRITECOPY, &NewProtection);
memcpy(adr,ptr,size);
VirtualProtect(adr,size,NewProtection, &NewProtection);
}
DWORD WINAPI LoopFunction(LPVOID param)
{
DWORD Addr = (DWORD)GetModuleHandleA(COD);
{
if (Addr > 0) {
Addr = Addr + 0x000000; // example : MAT.exe+???? . only Take ???? .
Patch((void *)(Addr ),(void*)(PBYTE)Bypass11, 7); //Byte ON Bypass
Sleep(100);
Patch((void *)(Addr ),(void*)(PBYTE)Bypass1, 7); // Byte OFF Bypass
}
Sleep(10);
return (0);
}
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
DisableThreadLibraryCalls(hDll);
MessageBox(0, "Made By\n Harith101\n Combodia Hacker","Ulalala",MB_OK + MB_ICONINFORMATION);
if (dwReason == DLL_PROCESS_ATTACH) {
CreateThread(0, 0, LoopFunction, 0, 0, 0);
}
return TRUE;
char strDLLName [_MAX_PATH];
GetModuleFileName(hDll, strDLLName , _MAX_PATH);
if (strstr(strDLLName,"DLLNAME.dll") <= 0) {
MessageBox(0, "Windows scanner Anti Rename DLL \nDLL name : DLLNAME.dll\nSistem has ERROR Debug 404","DLL Error", MB_OK + MB_ICONSTOP );
MessageBox(0,"DLL Detected ! ","DLL Error",MB_ICONERROR);
ExitProcess(1);
}
return TRUE;
}
Copy and Paste Code into C++ . Then Edit Yourself