Bem-vindo ao Fórum!

Registre-se agora mesmo e fique por dentro da maior comunidade de Cheats do Brasil!

Gord0n

Bronze Member
  • Content Count

    469
  • Joined

  • Last visited

  • Days Won

    10
  • WCoins

    0 [ Donate ]

Gord0n last won the day on January 24 2018

Gord0n had the most liked content!

Community Reputation

358 Excellent

About Gord0n

  • Rank
    Ex-Cheater da WebCheats !
  1. Liberdade vai cantar
  2. mano Precisso de Um aimbot ou chams funcional no C.A.B.R Brasil Funcional Em 32bits Me Ajuda Por Favor :(
  3. [LGH] CA BR [ ESP | AIM | +++] 15/03 TUTORIAL : SCREEN SHOT : SCAN : https://www.virustotal.com/pt/file/57606717e303fb3f3b2d58d5977903a094b21069fb903572b82ae4100c277c46/analysis/1521227379/
  4. Canal não oficial , Video copiado , não recomendo baixar
  5. Gord0n

    INJETOR EM CONSOLE

    Creditos : NubzGetKills Você já tem uma base , modifique #include <windows.h> #include <tlhelp32.h> #include <shlwapi.h> #include <conio.h> #include <stdio.h> #define WIN32_LEAN_AND_MEAN #define CREATE_THREAD_ACCESS (PROCESS_CREATE_THREAD | PROCESS_QUERY_INFORMATION | PROCESS_VM_OPERATION | PROCESS_VM_WRITE | PROCESS_VM_READ) BOOL Inject(DWORD pID, const char * DLL_NAME); DWORD GetTargetThreadIDFromProcName(const char * ProcName); int main(int argc, char * argv[]) { // Retrieve process ID DWORD pID = GetTargetThreadIDFromProcName("Engine.exe"); // Get the dll's full path name char buf[MAX_PATH] = {0}; GetFullPathName("HACKS.dll", MAX_PATH, buf, NULL); printf(buf); printf("\n"); // Inject our main dll if(!Inject(pID, buf)) { printf("DLL Not Loaded!"); }else{ printf("DLL Loaded!"); } _getch(); return 0; } BOOL Inject(DWORD pID, const char * DLL_NAME) { HANDLE Proc; HMODULE hLib; char buf[50] = {0}; LPVOID RemoteString, LoadLibAddy; if(!pID) return false; Proc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pID); if(!Proc) { sprintf(buf, "OpenProcess() failed: %d", GetLastError()); //MessageBox(NULL, buf, "Loader", MB_OK); printf(buf); return false; } LoadLibAddy = (LPVOID)GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA"); // Allocate space in the process for our DLL RemoteString = (LPVOID)VirtualAllocEx(Proc, NULL, strlen(DLL_NAME), MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE); // Write the string name of our DLL in the memory allocated WriteProcessMemory(Proc, (LPVOID)RemoteString, DLL_NAME, strlen(DLL_NAME), NULL); // Load our DLL CreateRemoteThread(Proc, NULL, NULL, (LPTHREAD_START_ROUTINE)LoadLibAddy, (LPVOID)RemoteString, NULL, NULL); CloseHandle(Proc); return true; } DWORD GetTargetThreadIDFromProcName(const char * ProcName) { PROCESSENTRY32 pe; HANDLE thSnapShot; BOOL retval, ProcFound = false; thSnapShot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); if(thSnapShot == INVALID_HANDLE_VALUE) { //MessageBox(NULL, "Error: Unable to create toolhelp snapshot!", "2MLoader", MB_OK); printf("Error: Unable to create toolhelp snapshot!"); return false; } pe.dwSize = sizeof(PROCESSENTRY32); retval = Process32First(thSnapShot, &pe); while(retval) { if(StrStrI(pe.szExeFile, ProcName)) { return pe.th32ProcessID; } retval = Process32Next(thSnapShot, &pe); } return 0; }
  6. Mais ou menos assim , eu acho ! if(ComboBox1.Text = "Crossfire") Then Form2.Show() End if if(ComboBox2.Text = "Combat Arms") Then Form3.Show() End if
  7. Uau falha que voc~e encontra , plmdds né cara kkkkkkkkk , se for .NEt qualquer doido faz unpack
  8. A moda é virar mulher para ganhar cargo https://thumbs.gfycat.com/EmbellishedRawCow-max-1mb.gif
  9. Crackeado ? , ou Deofuscado ? , Este e o Tal do Smoke da Bahia ! <3