(02-06-2019 - 07:02 PM)ronin Wrote: To get past this super awesome top security, all it takes is for someone to find the import in the xex that gets module exports and search for usages until you find one using 0xC from xam. I'm almost certain that no one is trying to "flex" that they're using such a thing, I've seen multiple leaked stealth servers using this method, including ones from 17511. But if i'm completely wrong and most people reading this post haven't seen anything like this before then ggwp.
The point of this is to hide the import from the function list and call directly to the function in the xam module.
(02-07-2019 - 04:01 AM)razr Wrote:(02-06-2019 - 07:02 PM)ronin Wrote: To get past this super awesome top security, all it takes is for someone to find the import in the xex that gets module exports and search for usages until you find one using 0xC from xam. I'm almost certain that no one is trying to "flex" that they're using such a thing, I've seen multiple leaked stealth servers using this method, including ones from 17511. But if i'm completely wrong and most people reading this post haven't seen anything like this before then ggwp.
These kids think they're untouchable just because they're resolving it at runtime instead of linking it.. What has the scene become.
I leaked this because people are trying to flex on it. I personally dont use this.
(02-06-2019 - 10:47 PM)ronin Wrote:(02-06-2019 - 10:41 PM)XBLUnbound Wrote: oof, you just know what ur talking about and sounded like him
i'm a developer for NiNJA, i would hope i know what i'm talking about
same, i do the visuals. weird flex but ok.