please help me.. my code wrong or all injector i use detected ?
team esp work after 3-5 minits game hack detected
i used ssa inector,gemeos injector,grand injector almost all ,my code is this please reply me new in this
#include <Windows.h>
int pPlayer = 0x00a3182c, AddressTeamEsp = 0x00a3a4ec; // Here it will be the Pointer of the Player or Pointer of TeamEsp as many say
bool Crazy;
void Copy()
{
while (true)
{
if (GetAsyncKeyState(VK_INSERT) & 1)
Crazy= !Crazy;
if (Crazy)
{
*(BYTE*)(*(DWORD*)(pPlayer)+0x61) = 1;
*(DWORD*)(AddressTeamEsp) = 0x01;
if (GetKeyState(VK_LBUTTON) < 0)
{
*(BYTE*)(*(DWORD*)(pPlayer)+0x61) = 0;
*(DWORD*)(AddressTeamEsp) = 0x00;
Sleep(3);
}
}
else
{
*(BYTE*)(*(DWORD*)(pPlayer)+0x61) = 0;
*(DWORD*)(AddressTeamEsp) = 0x00;
if (GetKeyState(VK_LBUTTON) < 0)
{
*(BYTE*)(*(DWORD*)(pPlayer)+0x61) = 1;
*(DWORD*)(AddressTeamEsp) = 0x01;
Sleep(3);
}
}
Sleep(4);
}
}
BOOL WINAPI DllMain(HMODULE hModule, DWORD dwReason, LPVOID lpvReserved)
{
if (dwReason == DLL_PROCESS_ATTACH)
{
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)Copy, 0, 0, 0);
MessageBoxA(0, "Hacking is good to go!\v3rmillion - Team Nigh Furry", "Info", MB_ICONINFORMATION);
}
return 1;
}
}
Credits: Magal
Last edited by Hugo Boss; 12-02-2016 at 05:19 PM. Reason: added credits
fazilaynoor (11-26-2016)
any injector undetected ? or any code i can make injector i tried Armagedonz tutorial but its not injecting dll
- - - Updated - - -
code i used for injector but its not injecting help fix this or new code or any private injector
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Windows.Forms;
using System.Diagnostics;
using System;
using System.Windows.Forms;
using System.Runtime.InteropServices;
namespace Injector
{
public partial class Form1 : Form
{
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int ReadProcessMemory(int hProcess, int lpBaseAddress, string lpBuffer, int nSize, ref int lpNumberOfBytesWritten);
[DllImport("kernel32", EntryPoint = "LoadLibraryA", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int LoadLibrary(string lpLibFileName);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int WriteProcessMemory(System.IntPtr hProcess, int lpBaseAddress, string lpBuffer, int nSize, int lpNumberOfBytesWritten);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int VirtualAllocEx(System.IntPtr hProcess, int lpAddress, int dwSize, int flAllocationType, int flProtect);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int GetProcAddress(int hModule, string lpProcName);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int CreateRemoteThread(System.IntPtr hProcess, int lpThreadAttributes, int dwStackSize, int lpStartAddress, int lpParameter, int dwCreationFlags, int lpThreadId);
[DllImport("Kernel32", EntryPoint = "GetModuleHandleA", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
private static extern int GetModuleHandle(string lpModuleName);
[DllImport("kernel32.dll")]
public static extern IntPtr OpenProcess(int dwDesiredAccess, bool bInheritHandle, int dwProcessId);
[DllImport("kernel32", EntryPoint = "CloseHandle")]
private static extern int CloseHandle(System.IntPtr hObject);
[DllImport("user32", EntryPoint = "FindWindowA", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
private static extern int FindWindow(string lpClassName, string lpWindowName);
void Inject()
{
System.IntPtr TargetProcessHandle;
int TargetBufferSize;
String pszLibFileRemote;
int pfnStartAddr;
Process[] TargetProcess = Process.GetProcessesByName("BlackShot");
TargetProcessHandle = OpenProcess(0x1F0FFF, false, TargetProcess[0].Id);
pszLibFileRemote = Application.StartupPath + ("\\Fasi.dll");
pfnStartAddr = GetProcAddress(GetModuleHandle("Kernel32.dll"), "LoadLibraryA");
TargetBufferSize = 1 + pszLibFileRemote.Length;
int Rtn;
int LoadLibParamAdr;
LoadLibParamAdr = VirtualAllocEx(TargetProcessHandle, 0, TargetBufferSize, 4096, 4);
Rtn = WriteProcessMemory(TargetProcessHandle, LoadLibParamAdr, pszLibFileRemote, TargetBufferSize, 0);
CreateRemoteThread(TargetProcessHandle, 0, 0, pfnStartAddr, LoadLibParamAdr, 0, 0);
CloseHandle(TargetProcessHandle);
}
private void timer1_Tick(object sender, EventArgs e)
{
Process[] TargetProcess = Process.GetProcessesByName("BlackShot");
if (TargetProcess.Length == 0)
{ }
else
{
Inject();
timer1.Stop();
this.Close();
}
}
public Form1()
{
InitializeComponent();
}
private void Form1_Load(object sender, EventArgs e)
{
}
}
}
- - - Updated - - -
any pro coders help little I am newbie
fazilaynoor (11-26-2016)
tried like this still same not injecting me put it in wrong area ?
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Windows.Forms;
using System.Diagnostics;
using System.Windows.Forms;
using System.Runtime.InteropServices;
namespace Injector
{
public partial class Form1 : Form
{
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int ReadProcessMemory(int hProcess, int lpBaseAddress, string lpBuffer, int nSize, ref int lpNumberOfBytesWritten);
[DllImport("kernel32", EntryPoint = "LoadLibraryA", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int LoadLibrary(string lpLibFileName);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int WriteProcessMemory(System.IntPtr hProcess, int lpBaseAddress, string lpBuffer, int nSize, int lpNumberOfBytesWritten);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int VirtualAllocEx(System.IntPtr hProcess, int lpAddress, int dwSize, int flAllocationType, int flProtect);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int GetProcAddress(int hModule, string lpProcName);
[DllImport("kernel32", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
public static extern int CreateRemoteThread(System.IntPtr hProcess, int lpThreadAttributes, int dwStackSize, int lpStartAddress, int lpParameter, int dwCreationFlags, int lpThreadId);
[DllImport("Kernel32", EntryPoint = "GetModuleHandleA", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
private static extern int GetModuleHandle(string lpModuleName);
[DllImport("kernel32.dll")]
public static extern IntPtr OpenProcess(int dwDesiredAccess, bool bInheritHandle, int dwProcessId);
[DllImport("kernel32", EntryPoint = "CloseHandle")]
private static extern int CloseHandle(System.IntPtr hObject);
[DllImport("user32", EntryPoint = "FindWindowA", ExactSpelling = true, CharSet = CharSet.Ansi, SetLastError = true)]
private static extern int FindWindow(string lpClassName, string lpWindowName);
void Inject()
{
System.IntPtr TargetProcessHandle;
int TargetBufferSize;
String pszLibFileRemote;
int pfnStartAddr;
Process[] TargetProcess = Process.GetProcessesByName("BlackShot");
TargetProcessHandle = OpenProcess(0x1F0FFF, false, TargetProcess[0].Id);
pszLibFileRemote = Application.StartupPath + ("\\Fasi.dll");
pfnStartAddr = GetProcAddress(GetModuleHandle("Kernel32.dll"), "LoadLibraryA");
TargetBufferSize = 1 + pszLibFileRemote.Length;
int Rtn;
int LoadLibParamAdr;
LoadLibParamAdr = VirtualAllocEx(TargetProcessHandle, 0, TargetBufferSize, 4096, 4);
Rtn = WriteProcessMemory(TargetProcessHandle, LoadLibParamAdr, pszLibFileRemote, TargetBufferSize, 0);
CreateRemoteThread(TargetProcessHandle, 0, 0, pfnStartAddr, LoadLibParamAdr, 0, 0);
CloseHandle(TargetProcessHandle);
}
private void timer1_Tick(object sender, EventArgs e)
{
Process[] TargetProcess = Process.GetProcessesByName("BlackShot");
if (TargetProcess.Length == 0)
{ }
else
{
Inject();
timer1.Stop();
this.Close();
}
}
public Form1()
{
InitializeComponent();
}
private void Form1_Load(object sender, EventArgs e)
{
timer1.Start();
}
}
}
this teamesp source code for sea or eu?
Last edited by rushil69; 11-26-2016 at 10:04 AM.
RUSHIL69 == rE-BoOt
If the problem is detected after a certain time, look for another injector or make one.
Good Job - 26/11/2016
[MPGH]Minerva ji before making it closed or unresolved can u help ; got .dll but no undetected injector
Learn the main ideia of how to make beta bypass here: https://www.mpgh.net/forum/showthread.php?t=838001 //Credits GuilhermeBS-VIP
Learn how to make a dll here: https://www.mpgh.net/forum/showthread...1#post10109655 //Credits Coderin
And already have video tutorial for making an injector here: https://www.mpgh.net/forum/showthread.php?t=1151586 //Credits EnSilk.
fazilaynoor (11-27-2016),nikazizi97 (11-29-2016)
thanks, i tried copy paste injector code and done all steps in video but intector not detecting BlackShot, now i will type each code from that without copy paste and tell result next day ,
a small doubt maybe bcz me newbie that injector code will work in both blackshot sea and global right? or only for blackshot global? i play in blackshot sea ,if this injector only for blackshot global then my injector wont detect blackshot right ? (small doubt if me wrong sry for that