CabConModding
Facebook
Twitter
youtube
Discord
Contact us
RSS
Menu
CabConModding
Home
New
Top
Premium
Rules
FAQ - Frequently Asked Questions
Games
Fornite
Call of Duty: Black Ops 3
Clash of Clans
Grand Theft Auto 5
Apex Legends
Assassin’s Creed Origins
Forums
Premium
Latest posts
What's new
Latest posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Log in
Register
What's new
Premium
Latest posts
Menu
Log in
Register
Navigation
Install the app
Install
More options
Dark Theme
Contact us
Close Menu
Forums
Gaming
Call of Duty Classics
Call of Duty: Modern Warfare 2
Call of Duty: Modern Warfare 2 Mods and Scripts
Call of Duty: Modern Warfare 2 Scripts
Call of Duty: Modern Warfare 2 IW4x AntiCheat Bypass Script
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Kontrol" data-source="post: 47036" data-attributes="member: 2330"><p>[CODE=cpp]// The vars that our sigscans are going to be assigned to</p><p>DWORD AntiCheat, ProtectProcess[3];</p><p>DWORD Aim_TargetGetTagPosStub, DObjGetWorldTagPosStub;</p><p></p><p>void IW4x_Anticheat_Scanning()</p><p>{</p><p> // Get the address from memory and not the binary due to the iw4x dll being loaded so the loading loc will be different each launch</p><p> AntiCheat = FindPattern("iw4x.dll", "E8 BC 2D 00 00 ??");</p><p> ProtectProcess[0] = FindPattern("iw4x.dll", "E8 ?? ?? FF FF 83 EC 28 8B CC C7 01 24");</p><p> ProtectProcess[1] = FindPattern("iw4x.dll", "E8 ?? 3C F5");</p><p> ProtectProcess[2] = FindPattern("iw4x.dll", "E9 CB DD FF FF");</p><p> Aim_TargetGetTagPosStub = FindPattern("iw4x.dll", "E8 32 1B 00 00 6A 00 51");</p><p> DObjGetWorldTagPosStub = FindPattern("iw4x.dll", "E8 7F 1B 00 00 6A 00 51");</p><p></p><p> if (AntiCheat == 0 || ProtectProcess == 0 || Aim_TargetGetTagPosStub == 0 || DObjGetWorldTagPosStub == 0) return; // Check if the sigscanning worked like it was supposed to</p><p>}</p><p></p><p>void Patch_IW4x()</p><p>{</p><p> // Call to get the addresses</p><p> IW4x_Anticheat_Scanning();</p><p></p><p> // Write to the found patterns</p><p> Write<int>(AntiCheat, 5, 0x90);</p><p></p><p> for (int i = 0; i < 3; i++)</p><p> Write<int>(ProtectProcess[i], 5, 0x90);</p><p></p><p> Write<int>(Aim_TargetGetTagPosStub, 5, 0x90);</p><p> Write<int>(DObjGetWorldTagPosStub, 5, 0x90);</p><p></p><p> /*</p><p> _NOTES_</p><p> 1.) Due to IW4x hooking VirutalProtect, you need a VirtualProtect that changes the first 5 bytes of it. The first 5 bytes of VirtualProtect are a jump if its hooked.</p><p> 2.) You will still need a Kernel APC injector because this only allows us to be able to use functions we otherwise wouldnt be able to</p><p></p><p> _EXTRAS_</p><p> In a constant loop that you run somewhere (i run mine in a CreateThread), patch these bytes aswell</p><p> Write<BYTE>(0x41BA2C, 1, 0x83);</p><p> Write<BYTE>(0x42A667, 1, 0x56);</p><p> Write<BYTE>(0x40797C, 1, 0x56);</p><p> These bytes are apart of the crash method found in the IW4x source, they set the byte to 0x90 which kills the ESI when you look at the assembly (these dont need to be sigscanned as theyre apart of MW2 itself)</p><p> */</p><p>}[/CODE]</p><p></p><p>This is my first post back on CCM in a while. <img src="/styles/default/xenforo/smilies.emoji/people/slight_smile.emoji.svg" class="smilie" loading="lazy" alt=":smile:" title="Smile :smile:" data-shortname=":smile:" /></p><p>So this is something that i've done in my IW4x cheat, the very first thing to be exact.</p><p></p><p>1.) This will allow you to use AimTarget_GetTagPos normally and DObjGetWorldTagPos.</p><p>2.) The VirutalProtect function I use can be found here >> <a href="https://www.unknowncheats.me/forum/anti-cheat-bypass/265771-sxe-anticheat-safe-virtualprotect.html" target="_blank">VirtualProtect Rebuilt</a> <<</p></blockquote><p></p>
[QUOTE="Kontrol, post: 47036, member: 2330"] [CODE=cpp]// The vars that our sigscans are going to be assigned to DWORD AntiCheat, ProtectProcess[3]; DWORD Aim_TargetGetTagPosStub, DObjGetWorldTagPosStub; void IW4x_Anticheat_Scanning() { // Get the address from memory and not the binary due to the iw4x dll being loaded so the loading loc will be different each launch AntiCheat = FindPattern("iw4x.dll", "E8 BC 2D 00 00 ??"); ProtectProcess[0] = FindPattern("iw4x.dll", "E8 ?? ?? FF FF 83 EC 28 8B CC C7 01 24"); ProtectProcess[1] = FindPattern("iw4x.dll", "E8 ?? 3C F5"); ProtectProcess[2] = FindPattern("iw4x.dll", "E9 CB DD FF FF"); Aim_TargetGetTagPosStub = FindPattern("iw4x.dll", "E8 32 1B 00 00 6A 00 51"); DObjGetWorldTagPosStub = FindPattern("iw4x.dll", "E8 7F 1B 00 00 6A 00 51"); if (AntiCheat == 0 || ProtectProcess == 0 || Aim_TargetGetTagPosStub == 0 || DObjGetWorldTagPosStub == 0) return; // Check if the sigscanning worked like it was supposed to } void Patch_IW4x() { // Call to get the addresses IW4x_Anticheat_Scanning(); // Write to the found patterns Write<int>(AntiCheat, 5, 0x90); for (int i = 0; i < 3; i++) Write<int>(ProtectProcess[i], 5, 0x90); Write<int>(Aim_TargetGetTagPosStub, 5, 0x90); Write<int>(DObjGetWorldTagPosStub, 5, 0x90); /* _NOTES_ 1.) Due to IW4x hooking VirutalProtect, you need a VirtualProtect that changes the first 5 bytes of it. The first 5 bytes of VirtualProtect are a jump if its hooked. 2.) You will still need a Kernel APC injector because this only allows us to be able to use functions we otherwise wouldnt be able to _EXTRAS_ In a constant loop that you run somewhere (i run mine in a CreateThread), patch these bytes aswell Write<BYTE>(0x41BA2C, 1, 0x83); Write<BYTE>(0x42A667, 1, 0x56); Write<BYTE>(0x40797C, 1, 0x56); These bytes are apart of the crash method found in the IW4x source, they set the byte to 0x90 which kills the ESI when you look at the assembly (these dont need to be sigscanned as theyre apart of MW2 itself) */ }[/CODE] This is my first post back on CCM in a while. :smile: So this is something that i've done in my IW4x cheat, the very first thing to be exact. 1.) This will allow you to use AimTarget_GetTagPos normally and DObjGetWorldTagPos. 2.) The VirutalProtect function I use can be found here >> [URL='https://www.unknowncheats.me/forum/anti-cheat-bypass/265771-sxe-anticheat-safe-virtualprotect.html']VirtualProtect Rebuilt[/URL] << [/QUOTE]
Verification
Post reply
Forums
Gaming
Call of Duty Classics
Call of Duty: Modern Warfare 2
Call of Duty: Modern Warfare 2 Mods and Scripts
Call of Duty: Modern Warfare 2 Scripts
Call of Duty: Modern Warfare 2 IW4x AntiCheat Bypass Script
CabConModding is now on facebook! Check the latest Updates, the Site Status and much more now!
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top