Connexion
S'inscrire
Actualités
Quoi de neuf
Activités générales
Auteurs
Forums
Nouveaux messages
Rechercher un forum
Wiki
Pages
Dernière activité
Quoi de neuf
Nouveaux messages
Nouveaux articles
Nouveaux messages de profil
Activités générales
Membres
Membres inscrits
Visiteurs actuels
Nouveaux messages de profil
Rechercher dans les messages des profils
Teams
Créé ton équipe
Magasin
Quoi de neuf ?
Nouveaux messages
Rechercher un forum
Menu
Connexion
S'inscrire
Install the app
Install
Forums
Plateformes
Xbox
Ban Bypass Advanced Warfare TU5 + Source
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Vous utilisez un navigateur non à jour ou ancien. Il ne peut pas afficher ce site ou d'autres sites correctement.
Vous devez le mettre à jour ou utiliser un
navigateur alternatif
.
Répondre à la discussion
Message
<blockquote data-quote="XeTechzZ" data-source="post: 4526351" data-attributes="member: 313355"><p>Salut, je vous release mon ban bypass Advanced Warfare avec la source.</p><p></p><p></p><p>[CODE]//--------------------------------------------------------------------------------//</p><p>// This is OnlyFrag95's C++ Challenge Spoofer Public Source For CoD : AW TU5 //</p><p>//--------------------------------------------------------------------------------//</p><p></p><p></p><p>#include "stdafx.h"</p><p>#include "kernel.h"</p><p>#include <stdio.h></p><p></p><p>#define XNOTIFY</p><p>#define XNOTIFY_TYPE 0xE</p><p></p><p>HANDLE thread;</p><p>DWORD threadID;</p><p>bool bInitialized = false;</p><p>BYTE Flag[] = { 0x03 };</p><p></p><p>typedef unsigned __int64 QWORD;</p><p></p><p>UINT32 resolveFunct(char* modname, UINT32 ord)</p><p>{</p><p> UINT32 ptr32 = 0, ret = 0, ptr2 = 0;</p><p> ret = XexGetModuleHandle(modname, (PHANDLE)&ptr32);</p><p> if(ret == 0){</p><p> ret = XexGetProcedureAddress((HANDLE)ptr32, ord, &ptr2);</p><p> if(ptr2 != 0)</p><p> return(ptr2);</p><p> }</p><p> return(0);</p><p>}</p><p>#pragma region XNotify</p><p>// Define Some XNotify Stuff.</p><p>VOID (__cdecl * XNotifyQueueUI)(DWORD dwType, DWORD dwUserIndex, DWORD dwPriority, LPCWSTR pwszStringParam, ULONGLONG qwParam) = (VOID (__cdecl * )(DWORD, DWORD, DWORD, LPCWSTR, ULONGLONG))resolveFunct("xam.xex", 0x290);</p><p>// XNotify For telling user Success.</p><p>VOID XNQUI(LPCWSTR pwszStringParam) { XNotifyQueueUI(XNOTIFY_TYPE, 0, 2, pwszStringParam, NULL); }</p><p>VOID XNotify(LPCWSTR pwszStringParam)</p><p>{</p><p> // Check if KeGetCurrentProcessType() != 1 and if so then we make the XNotify in a new thread, else we just call it normally.</p><p> if(KeGetCurrentProcessType() != 1) { CreateThread(NULL, NULL, (LPTHREAD_START_ROUTINE)XNQUI, (LPVOID)pwszStringParam, NULL, NULL); }</p><p> else { XNQUI(pwszStringParam); }</p><p>}</p><p>#pragma endregion</p><p></p><p>VOID __declspec(****d) GLPR(VOID)</p><p>{</p><p> __asm</p><p> {</p><p> std r14, -0x98(sp)</p><p> std r15, -0x90(sp)</p><p> std r16, -0x88(sp)</p><p> std r17, -0x80(sp)</p><p> std r18, -0x78(sp)</p><p> std r19, -0x70(sp)</p><p> std r20, -0x68(sp)</p><p> std r21, -0x60(sp)</p><p> std r22, -0x58(sp)</p><p> std r23, -0x50(sp)</p><p> std r24, -0x48(sp)</p><p> std r25, -0x40(sp)</p><p> std r26, -0x38(sp)</p><p> std r27, -0x30(sp)</p><p> std r28, -0x28(sp)</p><p> std r29, -0x20(sp)</p><p> std r30, -0x18(sp)</p><p> std r31, -0x10(sp)</p><p> stw r12, -0x8(sp)</p><p> blr</p><p> }</p><p>}</p><p>DWORD RelinkGPLR(DWORD SFSOffset, PDWORD SaveStubAddress, PDWORD OriginalAddress)</p><p>{</p><p> DWORD Instruction = 0, Replacing;</p><p> PDWORD Saver = (PDWORD)GLPR;</p><p> if(SFSOffset & 0x2000000)</p><p> {</p><p> SFSOffset = SFSOffset | 0xFC000000;</p><p> }</p><p> Replacing = OriginalAddress[SFSOffset / 4];</p><p> for(int i = 0; i < 20; i++)</p><p> {</p><p> if(Replacing == Saver[i])</p><p> {</p><p> DWORD NewOffset = (DWORD)&Saver[i]-(DWORD)SaveStubAddress;</p><p> Instruction = 0x48000001 | (NewOffset & 0x3FFFFFC);</p><p> }</p><p> }</p><p> return Instruction;</p><p>}</p><p></p><p>__declspec(****d) INT answerChallenges(DWORD ChallengeResponse, __int64 r4)</p><p>{</p><p> __asm</p><p> {</p><p> nop</p><p> nop</p><p> nop</p><p> nop</p><p> nop</p><p> nop</p><p> nop</p><p> blr</p><p> }</p><p>}</p><p></p><p></p><p>VOID PatchInJump(DWORD* Address, DWORD Destination, BOOL Linked) {</p><p> </p><p> if(Destination & 0x8000)</p><p> {</p><p> Address[0] = 0x3D600000 + (((Destination >> 16) & 0xFFFF) + 1);</p><p> }</p><p> else</p><p> {</p><p> Address[0] = 0x3D600000 + ((Destination >> 16) & 0xFFFF);</p><p> }</p><p> Address[1] = 0x396B0000 + (Destination & 0xFFFF);</p><p> Address[2] = 0x7D6903A6;</p><p></p><p> if(Linked)</p><p> {</p><p> Address[3] = 0x4E800421;</p><p> }</p><p> else</p><p> {</p><p> Address[3] = 0x4E800420;</p><p> }</p><p>}</p><p>VOID HookFunctionStart(PDWORD Address, PDWORD SaveStub, DWORD Destination)</p><p>{</p><p> if((SaveStub != NULL) && (Address != NULL)) // Make sure they are not nothing.</p><p> {</p><p> DWORD AddressRelocation = (DWORD)(&Address[4]); // Replacing 4 instructions with a jump, this is the stub return address</p><p> if(AddressRelocation & 0x8000)</p><p> {</p><p> SaveStub[0] = 0x3D600000 + (((AddressRelocation >> 16) & 0xFFFF) + 1); // lis r11, 0 | Load Immediate Shifted</p><p> }</p><p> else</p><p> {</p><p> SaveStub[0] = 0x3D600000 + ((AddressRelocation >> 16) & 0xFFFF); // lis r11, 0 | Load Immediate Shifted</p><p> }</p><p> SaveStub[1] = 0x396B0000 + (AddressRelocation & 0xFFFF); // addi r11, r11, (value of AddressRelocation & 0xFFFF) | Add Immediate</p><p> SaveStub[2] = 0x7D6903A6; // mtspr CTR, r11 | Move to Special-Purpose Register CTR</p><p> // Instructions [3] through [6] are replaced with the original instructions from the function hook</p><p> // Copy original instructions over, relink stack frame saves to local ones</p><p> for(int i = 0; i < 4; i++)</p><p> {</p><p> if((Address[i] & 0x48000003) == 0x48000001)</p><p> {</p><p> SaveStub[i + 3] = RelinkGPLR((Address[i] & ~0x48000003), &SaveStub[i + 3], &Address[i]);</p><p> }</p><p> else</p><p> {</p><p> SaveStub[i + 3] = Address[i];</p><p> }</p><p> }</p><p> SaveStub[7] = 0x4E800420; // Branch unconditionally</p><p> __dcbst(0, SaveStub); // Data Cache Block Store | Allows a program to copy the contents of a modified block to main memory.</p><p> __sync(); // Synchronize | Ensure the dcbst instruction has completed.</p><p> __isync(); // Instruction Synchronize | Refetches any instructions that might have been fetched prior to this instruction.</p><p> PatchInJump(Address, Destination, FALSE); // Redirect Function to ours</p><p></p><p> }</p><p>}</p><p></p><p>void answerChallengesHook(DWORD ChallengeResponse, __int64 r4)</p><p>{</p><p>// Set our Data</p><p> memcpy((PVOID)(ChallengeResponse + 0x22 + 0x1E), &Flag, sizeof(Flag));</p><p></p><p>// return r3, r4 to SaveStub</p><p> answerChallenges(ChallengeResponse, r4);</p><p>}</p><p></p><p>DWORD Launch()</p><p>{</p><p> UINT32 (*XamGetCurrentTitleId)(void) = XamGetCurrentTitleId = (UINT32 (__cdecl *)(void))(resolveFunct("xam.xex", 0x1CF));</p><p></p><p> for(;;)</p><p> {</p><p> if(XamGetCurrentTitleId() == 0x41560914 )</p><p> {</p><p></p><p> if ( bInitialized == false) // Init once Hook, it avoids freeze</p><p> {</p><p> HookFunctionStart((PDWORD)0x821E3B38 , (PDWORD)answerChallenges, (DWORD)answerChallengesHook);</p><p> // XNotify</p><p> Sleep(5000);</p><p> #ifdef XNOTIFY</p><p> XNotify(L"Advanced Warfare - XeCheats Success !");</p><p> #endif</p><p> bInitialized = true;</p><p> }</p><p> }</p><p> }</p><p>}</p><p></p><p>BOOL APIENTRY DllMain( HANDLE hModule, DWORD dwReason, LPVOID lpReserved )</p><p>{</p><p> if ( dwReason == DLL_PROCESS_ATTACH )</p><p> {</p><p> HANDLE hThread;</p><p> DWORD dwThreadId;</p><p> ExCreateThread( &hThread, 0, &dwThreadId, ( PVOID )XapiThreadStartup , ( LPTHREAD_START_ROUTINE )Launch, 0, 0x2 );</p><p> ResumeThread( hThread );</p><p> CloseHandle( hThread );</p><p> }</p><p> return TRUE;</p><p>}[/CODE]</p><p></p><p>Plugin : <a href="https://mega.co.nz/#!wBN1xKqb!LZRqae4Icld_HyiubR4VjehER88L0QnORcXGawTRaI0" target="_blank">https://mega.co.nz/#!wBN1xKqb!LZRqae4Icld_HyiubR4VjehER88L0QnORcXGawTRaI0</a></p><p>VirusScan : <a href="https://www.virustotal.com/fr/file/1f6ce7db6b8b729849b2ae80f79b38e1eee97d8cba0f3015776fbca7ef53e424/analysis/1419025305/" target="_blank">https://www.virustotal.com/fr/file/1f6ce7db6b8b729849b2ae80f79b38e1eee97d8cba0f3015776fbca7ef53e424/analysis/1419025305/</a></p></blockquote><p></p>
[QUOTE="XeTechzZ, post: 4526351, member: 313355"] Salut, je vous release mon ban bypass Advanced Warfare avec la source. [CODE]//--------------------------------------------------------------------------------// // This is OnlyFrag95's C++ Challenge Spoofer Public Source For CoD : AW TU5 // //--------------------------------------------------------------------------------// #include "stdafx.h" #include "kernel.h" #include <stdio.h> #define XNOTIFY #define XNOTIFY_TYPE 0xE HANDLE thread; DWORD threadID; bool bInitialized = false; BYTE Flag[] = { 0x03 }; typedef unsigned __int64 QWORD; UINT32 resolveFunct(char* modname, UINT32 ord) { UINT32 ptr32 = 0, ret = 0, ptr2 = 0; ret = XexGetModuleHandle(modname, (PHANDLE)&ptr32); if(ret == 0){ ret = XexGetProcedureAddress((HANDLE)ptr32, ord, &ptr2); if(ptr2 != 0) return(ptr2); } return(0); } #pragma region XNotify // Define Some XNotify Stuff. VOID (__cdecl * XNotifyQueueUI)(DWORD dwType, DWORD dwUserIndex, DWORD dwPriority, LPCWSTR pwszStringParam, ULONGLONG qwParam) = (VOID (__cdecl * )(DWORD, DWORD, DWORD, LPCWSTR, ULONGLONG))resolveFunct("xam.xex", 0x290); // XNotify For telling user Success. VOID XNQUI(LPCWSTR pwszStringParam) { XNotifyQueueUI(XNOTIFY_TYPE, 0, 2, pwszStringParam, NULL); } VOID XNotify(LPCWSTR pwszStringParam) { // Check if KeGetCurrentProcessType() != 1 and if so then we make the XNotify in a new thread, else we just call it normally. if(KeGetCurrentProcessType() != 1) { CreateThread(NULL, NULL, (LPTHREAD_START_ROUTINE)XNQUI, (LPVOID)pwszStringParam, NULL, NULL); } else { XNQUI(pwszStringParam); } } #pragma endregion VOID __declspec(****d) GLPR(VOID) { __asm { std r14, -0x98(sp) std r15, -0x90(sp) std r16, -0x88(sp) std r17, -0x80(sp) std r18, -0x78(sp) std r19, -0x70(sp) std r20, -0x68(sp) std r21, -0x60(sp) std r22, -0x58(sp) std r23, -0x50(sp) std r24, -0x48(sp) std r25, -0x40(sp) std r26, -0x38(sp) std r27, -0x30(sp) std r28, -0x28(sp) std r29, -0x20(sp) std r30, -0x18(sp) std r31, -0x10(sp) stw r12, -0x8(sp) blr } } DWORD RelinkGPLR(DWORD SFSOffset, PDWORD SaveStubAddress, PDWORD OriginalAddress) { DWORD Instruction = 0, Replacing; PDWORD Saver = (PDWORD)GLPR; if(SFSOffset & 0x2000000) { SFSOffset = SFSOffset | 0xFC000000; } Replacing = OriginalAddress[SFSOffset / 4]; for(int i = 0; i < 20; i++) { if(Replacing == Saver[i]) { DWORD NewOffset = (DWORD)&Saver[i]-(DWORD)SaveStubAddress; Instruction = 0x48000001 | (NewOffset & 0x3FFFFFC); } } return Instruction; } __declspec(****d) INT answerChallenges(DWORD ChallengeResponse, __int64 r4) { __asm { nop nop nop nop nop nop nop blr } } VOID PatchInJump(DWORD* Address, DWORD Destination, BOOL Linked) { if(Destination & 0x8000) { Address[0] = 0x3D600000 + (((Destination >> 16) & 0xFFFF) + 1); } else { Address[0] = 0x3D600000 + ((Destination >> 16) & 0xFFFF); } Address[1] = 0x396B0000 + (Destination & 0xFFFF); Address[2] = 0x7D6903A6; if(Linked) { Address[3] = 0x4E800421; } else { Address[3] = 0x4E800420; } } VOID HookFunctionStart(PDWORD Address, PDWORD SaveStub, DWORD Destination) { if((SaveStub != NULL) && (Address != NULL)) // Make sure they are not nothing. { DWORD AddressRelocation = (DWORD)(&Address[4]); // Replacing 4 instructions with a jump, this is the stub return address if(AddressRelocation & 0x8000) { SaveStub[0] = 0x3D600000 + (((AddressRelocation >> 16) & 0xFFFF) + 1); // lis r11, 0 | Load Immediate Shifted } else { SaveStub[0] = 0x3D600000 + ((AddressRelocation >> 16) & 0xFFFF); // lis r11, 0 | Load Immediate Shifted } SaveStub[1] = 0x396B0000 + (AddressRelocation & 0xFFFF); // addi r11, r11, (value of AddressRelocation & 0xFFFF) | Add Immediate SaveStub[2] = 0x7D6903A6; // mtspr CTR, r11 | Move to Special-Purpose Register CTR // Instructions [3] through [6] are replaced with the original instructions from the function hook // Copy original instructions over, relink stack frame saves to local ones for(int i = 0; i < 4; i++) { if((Address[i] & 0x48000003) == 0x48000001) { SaveStub[i + 3] = RelinkGPLR((Address[i] & ~0x48000003), &SaveStub[i + 3], &Address[i]); } else { SaveStub[i + 3] = Address[i]; } } SaveStub[7] = 0x4E800420; // Branch unconditionally __dcbst(0, SaveStub); // Data Cache Block Store | Allows a program to copy the contents of a modified block to main memory. __sync(); // Synchronize | Ensure the dcbst instruction has completed. __isync(); // Instruction Synchronize | Refetches any instructions that might have been fetched prior to this instruction. PatchInJump(Address, Destination, FALSE); // Redirect Function to ours } } void answerChallengesHook(DWORD ChallengeResponse, __int64 r4) { // Set our Data memcpy((PVOID)(ChallengeResponse + 0x22 + 0x1E), &Flag, sizeof(Flag)); // return r3, r4 to SaveStub answerChallenges(ChallengeResponse, r4); } DWORD Launch() { UINT32 (*XamGetCurrentTitleId)(void) = XamGetCurrentTitleId = (UINT32 (__cdecl *)(void))(resolveFunct("xam.xex", 0x1CF)); for(;;) { if(XamGetCurrentTitleId() == 0x41560914 ) { if ( bInitialized == false) // Init once Hook, it avoids freeze { HookFunctionStart((PDWORD)0x821E3B38 , (PDWORD)answerChallenges, (DWORD)answerChallengesHook); // XNotify Sleep(5000); #ifdef XNOTIFY XNotify(L"Advanced Warfare - XeCheats Success !"); #endif bInitialized = true; } } } } BOOL APIENTRY DllMain( HANDLE hModule, DWORD dwReason, LPVOID lpReserved ) { if ( dwReason == DLL_PROCESS_ATTACH ) { HANDLE hThread; DWORD dwThreadId; ExCreateThread( &hThread, 0, &dwThreadId, ( PVOID )XapiThreadStartup , ( LPTHREAD_START_ROUTINE )Launch, 0, 0x2 ); ResumeThread( hThread ); CloseHandle( hThread ); } return TRUE; }[/CODE] Plugin : [URL]https://mega.co.nz/#!wBN1xKqb!LZRqae4Icld_HyiubR4VjehER88L0QnORcXGawTRaI0[/URL] VirusScan : [URL]https://www.virustotal.com/fr/file/1f6ce7db6b8b729849b2ae80f79b38e1eee97d8cba0f3015776fbca7ef53e424/analysis/1419025305/[/URL] [/QUOTE]
Insérer les citations…
Vérification
Publier la réponse
Forums
Plateformes
Xbox
Ban Bypass Advanced Warfare TU5 + Source
Ce site utilise des cookies. En continuant à utiliser ce site, vous acceptez l'utilisation des cookies.
Acceptez
En savoir plus.…
Haut