Did you forget that I have fucked your autoblocker & proved it with video and actually cracked your aimbot?
DWORD NewProtect =PAGE_EXECUTE_READWRITE;
DWORD OldProtect = 0;
BYTE Replae[8] ={0xE9,0xA8,0x20,0x10,0x00,0x90,0x90,0x90};
DWORD MagicAddr = 0x07E42435;
DWORD MagicAddr2 =0x07E32435;
BYTE JUMP[7]= {0xE9,0x90,0x90,0x90,0x90,0x90,0x90};
DWORD JmpBack = 0x7E466411;
BYTE HOOKED[7];
void undetourx32(unsigned char *c, DWORD FUNC,SIZE_T size){
VirtualProtect((LPVOID)FUNC,size,NewProtect,&OldProtect);
WriteProcessMemory(GetCurrentProcess(),(LPVOID)FUNC,c,size,NULL);
VirtualProtect((LPVOID)FUNC,size,OldProtect,&NewProtect);
}
void Detour(DWORD Addy, DWORD NewFunction , BYTE * rJMP , SIZE_T size ){
*(DWORD*)&rJMP[1] = (DWORD)(NewFunction-Addy-5);
VirtualProtect((LPVOID)Addy,size,NewProtect,&OldProtect);
ReadProcessMemory(GetCurrentProcess(),(LPVOID)Addy,&HOOKED,7,NULL);
memcpy((LPVOID)Addy,rJMP,size);
VirtualProtect((LPVOID)Addy,size,OldProtect,&NewProtect);
}
__declspec(naked) void hookedrap(){
undetourx32(HOOKED,(DWORD)GetProcAddress(GetModuleHandleA("User32.dll"),"MessageBoxTimeoutA") + 0xb,7);
VirtualProtect((void*)MagicAddr,8,NewProtect,&OldProtect);
WriteProcessMemory(GetCurrentProcess(),(void*)MagicAddr,Replae,8,0);
WriteProcessMemory(GetCurrentProcess(),(void*)MagicAddr2,Replae,8,0);
VirtualProtect((void*)MagicAddr,8,OldProtect,&NewProtect);
__asm{
jmp JmpBack
}
}
void initatePath(){
Detour((DWORD)GetProcAddress(GetModuleHandleA("User32.dll"),"MessageBoxTimeoutA") + 0xb,(DWORD)hookedrap,JUMP,7);
}
Let's have a fun test.
I have changed the code so it will have a few unefficient lines:
Find me them.