I believe they can, just change mechanism of their /buto <hex> command or just rework their threads code and they can still get rid of me until I patch my bypass again.
Its more like racing who will have latest thing, but thats what I wanna avoid, iam really lazy person so if they keep updating...
I’m aware that FenixZone can easily update and block this code, but it doesn’t really matter, right? We can update it just as quickly.
What’s actually funny is that such a well-known server is auto-exploiting people via RCE without giving them the option to say “NO, I don’t want that.” That’s...
Hello UGBASE,
Iam releasing my analysis knowledges about FenixZone Anticheat and solution to prevent being detected.
Basically everything is here
https://github.com/WaterinoS/FenixZoneACBypass
I would start how they managed to load the anticheat into process memory:
Its Basic RCE (Remote Code...
nice but i would do atleast 2 or more improves on this code to make it more clean, but nice code anyways. Also i guess this guy would need also src of method get_samp_version_id, but maybe its part of the plugin sdk, not sure.
For those wannabe coders who still don't know how I did it and want to overwrite author:
https://github.com/WaterinoS/FakeR5
https://github.com/WaterinoS/FakeDL
Enjoy Source Codes
~ TE 4Ever
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.