Ad
  • Home
  • Forums
  • COMPUTER
  • 💻 Coding & Programming

C & C++ PointBlank PH/ID Zepetto New Anti-Cheat Bypass(For Game häçkers)

  • Thread starter Thread starter zNova
  • Start date Start date Dec 3, 2019
Z

zNova

Grasshopper
  • Dec 3, 2019
  • #1
Ito yung sabi ng pbph zepetto regarding sa cheat blocker module nila.

oFkF17g.webp


Isang malaking kalokohan dahil napakalimited nung functions nila sa loob nung cb.cbm which is yung main module nung anti-cheat nila.

Example :
dDJKCTq.webp

So kapag inedit mo tong function lalabas diyan yung "Memory häçking detected" since may self check function.
Kahit anong way pag modify mo basta .txt section modification olats yan.

Ang ginagawa lang naman pala nitong function nato nag seset ng trap jmp sa mga common functions na ginagamit sa cheat like GetViewport,SetRenderState, at ibang game function.

Tsaka pala nag seset lang ito ng trap after mag load nung game like nasa server selection na(sa pb indo login screen).
Example.
EVrazMI.webp
Itong function na nasa taas ay "i3SceneObject::FindCacheMatrix", nirereturn nito yung calculated matrix para sa bone nung characters.

EZ way to para sa ESP Skeleton/Aimbot kaya naglagay sila trap dito

So after ko mag load (nasa server selection na)
ito yung result :
QF6en8w.webp

May jmp na diba , everytime na icacall mo yung function dadaan siya dito sa jmp nato then pag finollow mo yung jmp na yon makikita mo ito.
5j0N71H.webp
Kitang-kita yung push 06, so naisip ko isa tong array at tama nga ako. starting from 0 - 0x19 at 0x1A may jmp trap.

Pag cinall mo yung function na meron nito madedetect ka(malamang).

Btw kaya importanteng ibypass to kung gagawa ka d3d9 menu madedetect yung text mo dahil sa SetRenderState.
Nireverse ko yung DrawText virtual method sa LPD3DXFONT(index nitong DrawTextA 15, sa DrawTextW 16).

So paano kaya ito mababypass ?
Simpleng simple lang
hook mo yung address na tatalunan nung jmp sa function.

Example :
DWORD AddrToJmp = (DWORD)HideAPI::GetModuleHandleHidden("cb.cbm") + 0x2AFD0;//Ito yung address na gagamitin natin para iredirect yung jmp sa function (ito yung address na tested ko pero pwede kayo mag emulate nang sarili niyong function. void __declspec(*****) HookMem() { __asm jmp AddrToJmp//new jmp address } class MemoryFinderAPI { public: char* fpattern; DWORD dpattern; char* mask; MemoryFinderAPI(){} MemoryFinderAPI(DWORD pattern,char* pmask) { dpattern = pattern; mask = pmask; } MemoryFinderAPI(char* pattern,char* pmask) { fpattern = pattern; mask = pmask; } //code cut }; class MemAPI { public: void Bypass(MemoryFinderAPI memory) { DWORD CurItem = (DWORD)FindPatternByDump(memory.fpattern, memory.mask);//Findpattern function DWORD ItemToBypass = CurItem + 0x5; // Func::LogFunction("Item %X %X", CurItem, ItemToBypass); //testing Func::DetourCreate1(ItemToBypass, (DWORD)HookMem, 0x5);//Detour function para makagawa ng jmp sa target address [function param(DWORD Address,DWORD NewFunction,DWORD HookType)]. Sleep(10);//Interval lang natin } Full List nung ibabypass niyo : memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x04\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));//CGameCharaBase::getCurHP memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x05\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x06\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));//i3SceneObject::FindCacheMatrix memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x07\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x08\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x09\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x0A\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x0B\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x0C\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x0D\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x0E\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x0F\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x11\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x12\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x13\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x14\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x15\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x16\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x17\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x18\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));// memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x19\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));//GetViewPort memoryscanner.Bypass(MemoryFinderAPI((PCHAR)"\x68\x1A\x00\x00\x00\xE9", (PCHAR)"xxxxxx"));//SetRenderState

Bali icall niyo muna yung bypass bago kayo mag call nung mga detected functions dahil nailolog nung cb.cbm yung modular calls.

Sana hindi kayo naguluhan, kung may tanong kayo reply lang kayo.
 
Reactions: PONR-HUB-PH, JohnWicks, 1110xxz and 3 others
D

dranusa

Leecher
  • Dec 4, 2019
  • #2
Boss pato matutunan yan? Gusto rin sana matuto magbasa at magprogram ng häçks
 
TS
TS
Z

zNova

Grasshopper
  • Dec 4, 2019
  • #3
Assembly language una then c++ language yung pang program ko nung mga häçks.
 
J

jincent33

Leecher
  • Jan 16, 2020
  • #4
boss paturo ng häçking skills mo
 
W

wahyuwira0

Leecher
  • Sep 1, 2022
  • #5
hey bro can you help me ? I can pay you for bypassing cheat blocker ,Please drop on comment your telegram/#forbidden#
 
B

buratzi099

Leecher
  • Apr 2, 2023
  • #6
bosss paano pag CB.cbm lang po i bypasss wala ng mga wall .. i ba block lang yung CB.cbm .. paara sa cheat engine po para pag na bypass na ang Cb.cbm malayang makagamit ng cheat engine
 
You must log in or register to reply here.

Popular Tags

android api app arduino bot c c++ capstone capstone project code coding coding and programming course css database developer development free help how how to html in java javascript language laravel mag mysql need need help patulong php program programmer programming programming language project python question react sql system thesis tutorial udemy using visual basic web with
Share:
Facebook X Bluesky LinkedIn Reddit Pinterest Tumblr WhatsApp Email Share Link

Users search this thread by keywords

  1. pb cheat
  2. pointblank zepetto
  3. d3d9 menu
  4. Zepetto New Anti-Cheat Bypass
  5. Pointblank Skeleton
  6. pointblank cheat
  7. cheat engine
  8. Zepetto
  9. PointBlank PH/ID Zepetto New Anti-Cheat Bypass
  10. i3SceneObject
  • Home
  • Forums
  • COMPUTER
  • 💻 Coding & Programming
  • View Non-AMP Version
  • Contact us
  • Terms and rules
  • Privacy policy
  • Help
  • Home
Menu
Log in

Register

  • Home
    • Shoutbox
    • Miscellaneous
    • Mobile Network
    • Internet
    • Mobile Phone
    • Media
    • Computer
    • Game
    • Lounge
  • Forums
    • New topics New questions Popular today Popular this month New posts
  • What's new
    • Featured content
    • New posts
    • New media
    • New media comments
    • Latest activity
  • Media
    • New media
    • New comments
    • Search media
  • Search
    • Advanced search
X

Privacy & Transparency

We use cookies and similar technologies for the following purposes:

  • Personalized ads and content
  • Content measurement and audience insights

Do you accept cookies and these technologies?

X

Privacy & Transparency

We use cookies and similar technologies for the following purposes:

  • Personalized ads and content
  • Content measurement and audience insights

Do you accept cookies and these technologies?