Page 1 of 2 12 LastLast
Results 1 to 15 of 23
  1. #1
    flameswor10's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Posts
    12,528
    Reputation
    981
    Thanks
    10,409
    My Mood
    In Love

    Flameswor10's Simple/Step Encryption Methods

    Simple Encryption/Decryption:
    Code:
    char* FlameCrypt(char string[], int key)
    {
    	int length = strlen(string);
    	char* tempstring = new char[length + 1];
    	for (int i = 0; i < length; i ++)
    		tempstring[i] = string[i] + key;
    	tempstring[length] = 0;
    	return tempstring;
    }
    char* FlameDecrypt(char string[], int key)
     {
    	int length = strlen(string);
    	char* tempstring = new char[length + 1];
    	for (int i = 0; i < length; i ++)
    		tempstring[i] = string[i] - key;
    	tempstring[length] = 0;
    	return tempstring;
    }
    Step Encryption/Decryption
    Code:
    char* FlameCrypt(char string[], int key)
    {
    	int length = strlen(string);
    	char* tempstring = new char[length + 1];
    	for (int i = 0; i < length; i ++)
    	{
    		int KeyStep = key + i;
    		tempstring[i] = string[i] + KeyStep;
    	}
    	tempstring[length] = 0;
    	return tempstring;
    }
    char* FlameDecrypt(char string[], int key)
     {
    	int length = strlen(string);
    	char* tempstring = new char[length + 1];
    	for (int i = 0; i < length; i ++)
    	{
    		int KeyStep = key + i;
    		tempstring[i] = string[i] - KeyStep;
    	}
    	tempstring[length] = 0;
    	return tempstring;
    }
    I made both of them myself, Now to explain the encryption method.
    Code:
    //The definition of the function.
    char* FlameCrypt(char string[], int key)
    {
    //length = the ammount of characters in the string you are trying to encrypt/decrypt.
    	int length = strlen(string);
    //tempstring = It stores temporary information while you are encrypting/decypting.
    	char* tempstring = new char[length + 1];
    //a for loop to loop through all the characters, and add the ammount integers that you defined as the 'key'
    	for (int i = 0; i < length; i ++)
    		tempstring[i] = string[i] + key;
    //Convert the tempstring so you can return it as as a complete word or mumbo jumbo.
    	tempstring[length] = 0;
    //return the completed shit.
    	return tempstring;
    }
    Usage.
    Code:
    int main()
    {
    	char* String;
    	cout << "Encrypting: Steven is awesome jaja:" << endl;
    	String = FlameCrypt("Steven is awesome jaja:", 5);
    	cout << "Encrypted String: " << String << endl;
    	cout << "" << endl;
    	cout << "Decrypting: " << String << endl;
    	String = FlameDecrypt(String, 5);
    	cout << "Decrypted String: " << String << endl;
    	cout << "" << endl;
    
    	cout << "Encryption Example: Flameswor10 (key = 1 - 9)" << endl;
    	cout << "" << endl;
    	for (int i = 1; i < 10; i ++)
    		cout << FlameCrypt("flameswor10", i) << endl;
    	system("pause");
        return 0;
    }
    Now, you can learn how to implement it into your hack.
    Hackshield looks for some text such as Aimbot and other stuff, so if you use my encryption. Not only will it get rid of Hex Edit Leechers, it will also make your hack a bit more undetected.

    Step Encryption:


    Simple Encryption:


    Enjoy, I hope you learn something.
    Ofcourse, you can edit it and make it even more complicated, there are endless ammounts of editing you can do, you can even add hex values to the text.
    Last edited by flameswor10; 07-11-2011 at 01:21 AM.
    No I do not make game hacks anymore, please stop asking.

  2. The Following 5 Users Say Thank You to flameswor10 For This Useful Post:

    baraozin (07-11-2011),DareoTheOreo (07-11-2011),edwardjiang (07-12-2011),Fodius_Matrix (06-02-2012),OBrozz (07-20-2011)

  3. #2
    SrNooB's Avatar
    Join Date
    Sep 2009
    Gender
    male
    Location
    df
    Posts
    61
    Reputation
    17
    Thanks
    3
    yuno post in right section

  4. #3
    flameswor10's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Posts
    12,528
    Reputation
    981
    Thanks
    10,409
    My Mood
    In Love
    Quote Originally Posted by SrNooB View Post
    yuno post in right section
    It is right section
    It helps the CA users,
    No I do not make game hacks anymore, please stop asking.

  5. The Following 2 Users Say Thank You to flameswor10 For This Useful Post:

    Doomkind (11-17-2011),J (11-16-2011)

  6. #4
    .::SCHiM::.'s Avatar
    Join Date
    Sep 2010
    Gender
    male
    Posts
    733
    Reputation
    180
    Thanks
    880
    My Mood
    Twisted
    This won't help in the long run. Advanced signature scanners won't look at the specific bytes, but rather at the underlying logic and relation between the bytes. Consider:

    Code:
    // NEXON:         ascii values: 78 69 88 79 78
    encstr = FlameCrypt("NEXON", 5);
    //encstr = "SJ]TS"   ascii values: 83 74 93 84 83
    Now the string is unreadable for human eyes but with a bit of math that can be reversed even without knowing the key. Consider:


    Code:
    // NEXON:         ascii values: 78 69 88 79 78
    
    // Relation between first and second character:
    
    69-78 = -9 (meaning that the 2nd character is 9 characters lower in the ASCII table then the first)
    
    // Relation between second and third:
    
    88-69 = 19(meaning that the 3rd character is 19 characters higher in the ASCII table then the second)
    
    // Relation between 3rd and first:
    
    88-78 = -10(meaning the first is 10 characters lower then the 3rd)
    
    etc, etc
    This relation MUST be scrambled before you can even speak of a basic encryption. Because this relation is still present in the encrypted string, the code can be easily broken.

    Code:
    //encstr = "SJ]TS"   ascii values: 83 74 93 84 83
    
    If nexon has the relation mask of the string "NEXON" the only thing they have too check for is this relation, it will match the real string, as well as any encrypted variables:
    
    mask: -9, 19, -10
    
    J-S = -9                         // 1st match
    ]-J = 19                         // 2nd match
    ]-S = -10                       // 3rd match
    With more values(eg. all relations in the string) in the relation mask this method is 100% accurate and unable of producing false positives.

    Try a harder form of encryption (scrambles the input before encrypting it):
    note: This is still not a very strong encryption, and relations can still be found, however not as many as to ensure 100% perfect matches
    Code:
    #include <iostream>
    #include <windows.h>
    
    char Nexon[] = "Aimbot";
    
    void Encrypt(char* str, int key){
    
    char *tempstr = new char[ strlen(str)+1 ];
    
    
    	for(int i = 0, int y = strlen(str)-1; i != strlen(str); i++, y--){
    	    	tempstr[i] = str[y];
    	}
    	
    	tempstr[strlen(str)] = '\0';
    
    
    
    	for(int si = 0, int yk = key; si != strlen(tempstr); si++, yk--){
    		tempstr[si] = tempstr[si]+yk;
    	}
    
    
    	for(int s = 0; s != strlen(str); s++){
    		str[s] = tempstr[s];
    	}
    
    
    	delete [] tempstr;
    
    return;
    }
    
    void Decrypt(char* str, int key){
    
    char *tempstr = new char[ strlen(str)+1 ];
    
        	for(int si = 0, int yk = key; si != strlen(str); si++, yk--){
    		str[si] = str[si]-yk;
    		}
    	
    		for(int i = 0, int y = strlen(str)-1; i != strlen(str); i++, y--){
    	    tempstr[i] = str[y];
    		}
    	
    		tempstr[strlen(str)] = '\0';
    
    		
    		for(int s = 0; s != strlen(str); s++){
    		str[s] = tempstr[s];
    		}
    
    	delete [] tempstr;
    return;
    
    }
    
    
    
    int main(){
    
    
    	for(int i =0; i != sizeof(Nexon); i++){
    		printf("%c = %d\n", Nexon[i], (int)Nexon[i]);
    	}
    
    	Encrypt((char*)&Nexon[0], 63);
    
    	for(int c =0; c != sizeof(Nexon); c++){
    		printf("%c = %d\n", Nexon[c], (int)Nexon[c]);
    	}
    
    
    	Decrypt((char*)&Nexon[0], 63);
    
    	for(int d =0; d != sizeof(Nexon); d++){
    		printf("%c = %d\n", Nexon[d], (int)Nexon[d]);
    	}
    
    
    	system("pause");
    	return 0;
    
    }
    Last edited by .::SCHiM::.; 07-11-2011 at 04:44 AM.

    I'm SCHiM

    Morals derive from the instinct to survive. Moral behavior is survival behavior above the individual level.

    Polymorphic engine
    Interprocess callback class
    SIN
    Infinite-precision arithmetic
    Hooking dynamic linkage
    (sloppy)Kernel mode Disassembler!!!

    Semi debugger




  7. The Following User Says Thank You to .::SCHiM::. For This Useful Post:

    Defcon 1 (11-16-2011)

  8. #5
    flameswor10's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Posts
    12,528
    Reputation
    981
    Thanks
    10,409
    My Mood
    In Love
    Nice schim.
    But I did say, simple encryption.
    Step encryption does a better job though.

  9. The Following User Says Thank You to flameswor10 For This Useful Post:

    saskuHOT (11-21-2011)

  10. #6
    Cediquer's Avatar
    Join Date
    May 2010
    Gender
    male
    Posts
    395
    Reputation
    7
    Thanks
    18
    My Mood
    Twisted
    well this is nice
    Leecher: 0
    Choob 25
    Newbie:50
    Member: 100
    Advanced Member: 150
    Dual-Keyboard Member: 250
    Expert Member: 500
    Bobo's Trainer: 750
    MPGH Expert: 1000
    Synthetic Hacker: 1250
    Blackhat Hacker: 1500
    Whitehat Hacker: 2000
    Bobo's Guardian: 2500
    Upcoming MPGHiean: 3000
    MPGH Addict: 3500
    MPGHiean: 4000
    MPGH Knight: 4500
    MPGH Lord: 5000
    MPGH Champion: 5500
    MPGH King: 6000
    MPGH Legend: 6500
    MPGH God: 7000
    MPGH God II: 7500
    MPGH God III: 8000
    MPGH God IV: 8500
    MPGH God V: 9000
    Arun's Slave: 9500
    Dave's Slave: 10000


  11. #7
    DeadLinez's Avatar
    Join Date
    Dec 2009
    Gender
    male
    Location
    https://mpgh.net Sexy Points: 989,576,420
    Posts
    465
    Reputation
    11
    Thanks
    500
    My Mood
    Psychedelic
    This the same Algorithm that some keygen mes use, very easy to spot on OllyDbg, Just search: "Search (Name) Current in current Module" then find some common StrLen, Right click set a breakpoint on all refrences, Hit a break point, trace up or down a little, And then Bam! You would be able to make your very own simple version of a "keygen" or a decryper from that, Same goes for the steps, i suggest a combination of RC4, or XOR, or even AES. But its simple for beginners. Good job

  12. #8
    flameswor10's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Posts
    12,528
    Reputation
    981
    Thanks
    10,409
    My Mood
    In Love
    Quote Originally Posted by DeadLinez View Post
    This the same Algorithm that some keygen mes use, very easy to spot on OllyDbg, Just search: "Search (Name) Current in current Module" then find some common StrLen, Right click set a breakpoint on all refrences, Hit a break point, trace up or down a little, And then Bam! You would be able to make your very own simple version of a "keygen" or a decryper from that, Same goes for the steps, i suggest a combination of RC4, or XOR, or even AES. But its simple for beginners. Good job
    Ahahaha, I was thinking of combining mine with those other enctyprions as well ><
    But I'll release that later

  13. #9
    Ryuesi's Avatar
    Join Date
    Jun 2011
    Gender
    male
    Location
    Right here.
    Posts
    7,339
    Reputation
    413
    Thanks
    2,397
    My Mood
    Relaxed
    Nice Flam





    Contributor Since 24-11-2011 ~ 26-12-2011
    VM / PM




  14. #10
    mygunisgood's Avatar
    Join Date
    Sep 2008
    Gender
    male
    Posts
    196
    Reputation
    9
    Thanks
    18
    My Mood
    Amused
    Quote Originally Posted by flameswor10 View Post
    It is right section
    It helps the CA users,
    thats true, it helped me
    User1 says:
    back door trojen LOL
    iHolyElement says:
    WHATS THAT DO.
    User1 says:
    it opens a door
    at the back of your house
    and it shouts
    TROJEN CONDOMS!


  15. #11
    kotentopf's Avatar
    Join Date
    Nov 2009
    Gender
    male
    Posts
    602
    Reputation
    26
    Thanks
    251
    The Internet SHOULD Be Illegal

    When you say
    "Java is a great programming language because it works on all platforms"
    it is just like
    "anal sex is great because it works on all genders"

    Are YOU a Troll?

  16. The Following User Says Thank You to kotentopf For This Useful Post:

    flameswor10 (07-19-2011)

  17. #12
    TheVampike's Avatar
    Join Date
    Mar 2011
    Gender
    male
    Posts
    1,224
    Reputation
    5
    Thanks
    302
    My Mood
    Drunk
    Looks like Xor Encryption


    It's funny how this table turns!




  18. #13
    mygunisgood's Avatar
    Join Date
    Sep 2008
    Gender
    male
    Posts
    196
    Reputation
    9
    Thanks
    18
    My Mood
    Amused
    cool thanks
    User1 says:
    back door trojen LOL
    iHolyElement says:
    WHATS THAT DO.
    User1 says:
    it opens a door
    at the back of your house
    and it shouts
    TROJEN CONDOMS!


  19. #14
    whileloop's Avatar
    Join Date
    Jul 2011
    Gender
    male
    Posts
    25
    Reputation
    10
    Thanks
    0
    THank you soo much for the code! May the code be with you

  20. #15
    User1's Avatar
    Join Date
    Jul 2009
    Gender
    female
    Location
    Above the influence
    Posts
    4,065
    Reputation
    61
    Thanks
    4,294,967,295
    My Mood
    Crappy
    XOr is pretty simple and cheap, why not just use that instead.
    Any donations would help


    Quote Originally Posted by Bombsaway707

    HOLY SHIT ITS USER1
    Quote Originally Posted by Blood

    HOLY SHIT ITS USER1
    Quote Originally Posted by Alby-kun


    HOLY SHIT ITS USER1
    Quote Originally Posted by Ali

    HOLY SHIT ITS USER1
    Quote Originally Posted by CodeDemon
    HOLY SHIT ITS USER1
    Quote Originally Posted by Jussofresh View Post
    HOLY SHIT ITS USER1!
    [21:13] CoderNever: HOLY SHIT ITS USER1!

Page 1 of 2 12 LastLast

Similar Threads

  1. Simple Steps To Getting Hacks Working
    By The Dark Knight in forum Combat Arms Help
    Replies: 52
    Last Post: 05-23-2012, 11:25 PM
  2. Fix any error in 3 simple steps
    By orbsa in forum XBOX General Discussion
    Replies: 11
    Last Post: 03-27-2011, 04:28 PM
  3. Simple Way to made undetected ptc method...
    By Reimy in forum Combat Arms Coding Help & Discussion
    Replies: 9
    Last Post: 03-07-2011, 05:00 AM
  4. [Try to] Cracking my encryption method
    By cosconub in forum Spammers Corner
    Replies: 2
    Last Post: 01-28-2011, 05:02 AM
  5. [Release] PixInject simple 2 step injector
    By nx49nx in forum Combat Arms Hacks & Cheats
    Replies: 18
    Last Post: 06-04-2010, 07:26 AM