Teach me for Anti-Cheat for GunZ 2007

Results 1 to 5 of 5
  1. #1
    Member Trishia is offline
    MemberRank
    Jul 2011 Join Date
    84Posts

    Teach me for Anti-Cheat for GunZ 2007

    Hi friends.
    Can you teach me or Show the link for TUT about on Anti-Cheat (Anti-Injecting) for GunZ 2007
    Please. If you have something, teach me. Link.

    And also I need a link for Unmasking Chat for Duel Match (for GunZ 2007)..
    Show me link pls. or teach me here.

    Thanks for reading.


  2. #2
    Infraction Banned GreatFaiths is offline
    MemberRank
    Jul 2011 Join Date
    25Posts

    Re: Teach me for Anti-Cheat for GunZ 2007

    This doesent help what you want but it would be easyer for you to find a dev "developer' for gunz and he will help you with soo much more

  3. #3
    Asylum Gamers WickedsInferno is offline
    MemberRank
    Jun 2011 Join Date
    Deep In AsylumLocation
    394Posts

    Re: Teach me for Anti-Cheat for GunZ 2007

    Quote Originally Posted by Trishia View Post
    Hi friends.
    Can you teach me or Show the link for TUT about on Anti-Cheat (Anti-Injecting) for GunZ 2007
    Please. If you have something, teach me. Link.

    And also I need a link for Unmasking Chat for Duel Match (for GunZ 2007)..
    Show me link pls. or teach me here.

    Thanks for reading.
    its called a search button

  4. #4
    Proficient Member tuiuiu is offline
    MemberRank
    Jan 2010 Join Date
    186Posts

    Re: Teach me for Anti-Cheat for GunZ 2007

    Anti DLL Injection Source:
    Code:
    #include <windows.h>
    
    DWORD g_dwLoadLibraryAJMP;
    
    /* HOOK FUNCTION */
    
    DWORD WINAPI jumphook( DWORD AddressToPerformJump, DWORD AddressOfMyFunction, DWORD LenghOfTheAreaToPerformTheJump	)
    {
    	if( LenghOfTheAreaToPerformTheJump < 5 )
    		return 0;
    
    	DWORD RelativeJump, 
    		  NextInstructionAddress,
    		  Flag;
    
    	if ( ! VirtualProtect((LPVOID)AddressToPerformJump, LenghOfTheAreaToPerformTheJump, PAGE_EXECUTE_READWRITE, &Flag) )
    		return 0;
    
    	NextInstructionAddress = AddressToPerformJump + LenghOfTheAreaToPerformTheJump;
    
    	*(BYTE*)AddressToPerformJump = 0xE9;
    
    	for( DWORD i = 5; i < LenghOfTheAreaToPerformTheJump; i++)
    		*(BYTE*)(AddressToPerformJump+i) = 0x90;
    
    	RelativeJump = AddressOfMyFunction - AddressToPerformJump - 0x5;
    
    	*(DWORD*)(AddressToPerformJump + 0x1) = RelativeJump;
    
    	VirtualProtect((LPVOID)AddressToPerformJump, LenghOfTheAreaToPerformTheJump, Flag, &Flag);
    
    	return NextInstructionAddress; 
    }
    
    /* END HOOK FUNCTION */
    
    HMODULE WINAPI hLoadLibraryA( LPCSTR lpLibFileName )
    {	
    	__asm
    	{
    		mov eax, dword ptr ss:[esp + 0x18]
    		cmp dword ptr ds:[eax-0x12], 0x8B55FF8B
    		je erro
    	}
    	
    
    	if( lpLibFileName )
    	{
    		if( !strcmp( lpLibFileName, "twain_32.dll" ) )
    			__asm jmp g_dwLoadLibraryAJMP
    	}			
    
    	return LoadLibraryExA( lpLibFileName, 0, 0 );
    
    erro:
    
    	/* dll injetada */
    
    
    	ExitProcess( 0 );
    
    	return 0;
    }
    
    void ZPerformHooks()
    {
    	g_dwLoadLibraryAJMP = (DWORD)GetModuleHandle( "kernel32" ) + 0x6E2A1;
    
    	jumphook( (DWORD)LoadLibraryA, (DWORD)&hLoadLibraryA, 57 );
    }
    All Credits to Pls.
    Last edited by Phoenix; 30-07-11 at 07:36 PM. Reason: Pls's programs contain backdoors. Not allowed.

  5. #5
    Member Trishia is offline
    MemberRank
    Jul 2011 Join Date
    84Posts

    Re: Teach me for Anti-Cheat for GunZ 2007

    Quote Originally Posted by tuiuiu View Post
    Spoiler:
    MEGAUPLOAD - The leading online storage and file delivery service Pls Hokker And DLL Anti (Euro.dll
    - Darkx.dll - Freebase.dll - Directx Injectors - ) (obs: can only be used with IrisGuard Name)

    Anti DLL Injection Source:
    Code:
    #include <windows.h>
    
    DWORD g_dwLoadLibraryAJMP;
    
    /* HOOK FUNCTION */
    
    DWORD WINAPI jumphook( DWORD AddressToPerformJump, DWORD AddressOfMyFunction, DWORD LenghOfTheAreaToPerformTheJump	)
    {
    	if( LenghOfTheAreaToPerformTheJump < 5 )
    		return 0;
    
    	DWORD RelativeJump, 
    		  NextInstructionAddress,
    		  Flag;
    
    	if ( ! VirtualProtect((LPVOID)AddressToPerformJump, LenghOfTheAreaToPerformTheJump, PAGE_EXECUTE_READWRITE, &Flag) )
    		return 0;
    
    	NextInstructionAddress = AddressToPerformJump + LenghOfTheAreaToPerformTheJump;
    
    	*(BYTE*)AddressToPerformJump = 0xE9;
    
    	for( DWORD i = 5; i < LenghOfTheAreaToPerformTheJump; i++)
    		*(BYTE*)(AddressToPerformJump+i) = 0x90;
    
    	RelativeJump = AddressOfMyFunction - AddressToPerformJump - 0x5;
    
    	*(DWORD*)(AddressToPerformJump + 0x1) = RelativeJump;
    
    	VirtualProtect((LPVOID)AddressToPerformJump, LenghOfTheAreaToPerformTheJump, Flag, &Flag);
    
    	return NextInstructionAddress; 
    }
    
    /* END HOOK FUNCTION */
    
    HMODULE WINAPI hLoadLibraryA( LPCSTR lpLibFileName )
    {	
    	__asm
    	{
    		mov eax, dword ptr ss:[esp + 0x18]
    		cmp dword ptr ds:[eax-0x12], 0x8B55FF8B
    		je erro
    	}
    	
    
    	if( lpLibFileName )
    	{
    		if( !strcmp( lpLibFileName, "twain_32.dll" ) )
    			__asm jmp g_dwLoadLibraryAJMP
    	}			
    
    	return LoadLibraryExA( lpLibFileName, 0, 0 );
    
    erro:
    
    	/* dll injetada */
    
    
    	ExitProcess( 0 );
    
    	return 0;
    }
    
    void ZPerformHooks()
    {
    	g_dwLoadLibraryAJMP = (DWORD)GetModuleHandle( "kernel32" ) + 0x6E2A1;
    
    	jumphook( (DWORD)LoadLibraryA, (DWORD)&hLoadLibraryA, 57 );
    }
    All Credits to Pls.
    Thanks men.. 10/10. this help to other.



Advertisement