Jump to content
Notícia
  • Junte-se ao clube de Membros VIP e desfrute benefícios

Gord0n

Silver Member
  • Content Count

    469
  • Joined

  • Last visited

  • Days Won

    10
  • WCoins

    0 [ Donate ]

Gord0n last won the day on January 24 2018

Gord0n had the most liked content!

Community Reputation

370

About Gord0n

  • Rank
    Ex-Cheater da WebCheats !

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Liberdade vai cantar
  2. mano Precisso de Um aimbot ou chams funcional no C.A.B.R Brasil Funcional Em 32bits Me Ajuda Por Favor :(
  3. [LGH] CA BR [ ESP | AIM | +++] 15/03 TUTORIAL : SCREEN SHOT : SCAN : https://www.virustotal.com/pt/file/57606717e303fb3f3b2d58d5977903a094b21069fb903572b82ae4100c277c46/analysis/1521227379/
  4. Canal não oficial , Video copiado , não recomendo baixar
  5. Gord0n

    INJETOR EM CONSOLE

    Creditos : NubzGetKills Você já tem uma base , modifique #include <windows.h> #include <tlhelp32.h> #include <shlwapi.h> #include <conio.h> #include <stdio.h> #define WIN32_LEAN_AND_MEAN #define CREATE_THREAD_ACCESS (PROCESS_CREATE_THREAD | PROCESS_QUERY_INFORMATION | PROCESS_VM_OPERATION | PROCESS_VM_WRITE | PROCESS_VM_READ) BOOL Inject(DWORD pID, const char * DLL_NAME); DWORD GetTargetThreadIDFromProcName(const char * ProcName); int main(int argc, char * argv[]) { // Retrieve process ID DWORD pID = GetTargetThreadIDFromProcName("Engine.exe"); // Get the dll's full path name char buf[MAX_PATH] = {0}; GetFullPathName("HACKS.dll", MAX_PATH, buf, NULL); printf(buf); printf("\n"); // Inject our main dll if(!Inject(pID, buf)) { printf("DLL Not Loaded!"); }else{ printf("DLL Loaded!"); } _getch(); return 0; } BOOL Inject(DWORD pID, const char * DLL_NAME) { HANDLE Proc; HMODULE hLib; char buf[50] = {0}; LPVOID RemoteString, LoadLibAddy; if(!pID) return false; Proc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pID); if(!Proc) { sprintf(buf, "OpenProcess() failed: %d", GetLastError()); //MessageBox(NULL, buf, "Loader", MB_OK); printf(buf); return false; } LoadLibAddy = (LPVOID)GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA"); // Allocate space in the process for our DLL RemoteString = (LPVOID)VirtualAllocEx(Proc, NULL, strlen(DLL_NAME), MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE); // Write the string name of our DLL in the memory allocated WriteProcessMemory(Proc, (LPVOID)RemoteString, DLL_NAME, strlen(DLL_NAME), NULL); // Load our DLL CreateRemoteThread(Proc, NULL, NULL, (LPTHREAD_START_ROUTINE)LoadLibAddy, (LPVOID)RemoteString, NULL, NULL); CloseHandle(Proc); return true; } DWORD GetTargetThreadIDFromProcName(const char * ProcName) { PROCESSENTRY32 pe; HANDLE thSnapShot; BOOL retval, ProcFound = false; thSnapShot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); if(thSnapShot == INVALID_HANDLE_VALUE) { //MessageBox(NULL, "Error: Unable to create toolhelp snapshot!", "2MLoader", MB_OK); printf("Error: Unable to create toolhelp snapshot!"); return false; } pe.dwSize = sizeof(PROCESSENTRY32); retval = Process32First(thSnapShot, &pe); while(retval) { if(StrStrI(pe.szExeFile, ProcName)) { return pe.th32ProcessID; } retval = Process32Next(thSnapShot, &pe); } return 0; }
  6. Mais ou menos assim , eu acho ! if(ComboBox1.Text = "Crossfire") Then Form2.Show() End if if(ComboBox2.Text = "Combat Arms") Then Form3.Show() End if
  7. Uau falha que voc~e encontra , plmdds né cara kkkkkkkkk , se for .NEt qualquer doido faz unpack
  8. A moda é virar mulher para ganhar cargo https://thumbs.gfycat.com/EmbellishedRawCow-max-1mb.gif
  9. Crackeado ? , ou Deofuscado ? , Este e o Tal do Smoke da Bahia ! <3
×
×
  • Create New...