So with the CShell memory scanner implemented, does this mean we need to use a bypasser to use hacks?