- Status
- Offline
- Joined
- Mar 3, 2026
- Messages
- 60
- Reaction score
- 7
Just dropping the source here, too lazy to test it myself.
Looks like a pretty solid usermode bypass framework that was apparently being sold for big bucks back in the day. It uses SetWindowsHookEx to pull off arbitrary User-Mode R/W/X. Since it does not map anything in kernel, it stays pretty low profile, though you should keep in mind it still leaves a few traces in usermode.
Quick breakdown of the state:
Definitely worth a look if you are into studying how these hooks bypass modern anti-cheats. Since this is an old paid project hitting the public, be smart and run this in a sandbox or a VM before you go throwing it onto your main rig.
Looks like a pretty solid usermode bypass framework that was apparently being sold for big bucks back in the day. It uses SetWindowsHookEx to pull off arbitrary User-Mode R/W/X. Since it does not map anything in kernel, it stays pretty low profile, though you should keep in mind it still leaves a few traces in usermode.
Quick breakdown of the state:
- AC Status: Currently no flags on VG/BE/ACE.
- EAC Note: Data collects the call frame, but it has been safe for over 2 years.
- Javelin Warning: Might trigger a Detection_TLSCallbackExploit flag on injection about 50 percent of the time.
- Feature: Includes a clean way to do internal rendering from external memory.
Definitely worth a look if you are into studying how these hooks bypass modern anti-cheats. Since this is an old paid project hitting the public, be smart and run this in a sandbox or a VM before you go throwing it onto your main rig.
View hidden content is available for registered users!