What's new

Welcome to HvH Forum!

SignUp Now! Download Free HvH CS:GO Cheats, CFG, LUA/JS Scripts, And More!


SignUp Now!
Member
User ID
21
Messages
109
Reactions
24
Level
21
Timestamp : 6/19/2022

/-/-/-/-/-/-/-/-/-/-/
/-/Introduction/-/-/
/-/-/-/-/-/-/-/-/-/

Hellooooooooooooo, so you're most likely viewing this thread because you want to learn how to reverse engineer (or crack if you wanna put it in simple terms). So reverse engineering is not easy. Im 14 atm but I started game hacking when I was 8 (2016 I started HvH on CSGO and scripting on Roblox). This is being written because I feel bad for those who would love to start but don't have a foot to put towards the progress. In retrospect reverse engineering requires you to be "tech savvy" but tbh you don't need to know C/C#/C++ or any other fork of C to know how to do basic reverse engineering (although when you start getting into bigger projects you will need to learn how to modify PseudoCode and you will have to learn how to modify actual Engine code presented to you as youre not coding in normal environments like sources where normal C or any other language is given to you).

/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Base Knowledge/-/-/
/-/-/-/-/-/-/-/-/-/-/-/

To start off, I will be using Cracking instead of Reverse engineering to save time, secondly, if I feel like it I will leave a dictionary of "hacking" acronyms below. When presented with an assembly to crack or decompile/unpack you will usually be given a C# (C sharp) or C++ (C plus plus) based assembly. Now this guide will be mainly on those assembly's, will I write a guide on other languages, maybe, do I want to, no, fuck no. What you have to understand is, C# and C++ are very different languages, and although they are both derivatives of C they are nothing alike, well they are but not to the point where you cant CLEARLY tell that they are different. C# is practically a clear text based language, as in I can read that shit and know what its doing without knowing the language. Generally C# is not secure in terms of Obfuscation and Packing but that depends on what obfuscator you use, its preferred you use your own or fork your own because they would be astronomically better, but if you cant I would use cracked VMP(VMProtect). C# is more visually appealing and its easier to crack but to each their own? Now on the other hand C++ is way more secure (if you're protecting it from a skid) but its a lot harder to read, code in, and design. Although its not limited to designing you can always use Platforms like IMGui or ZGui to design your loader, would I recommend using C++ instead of C#? Yes, is it more secure? Yes. The reason why C++ is more secure than C# is three HUGE reasons, 1. C# isnt able to hide HTTP/S GET/POST requests and they cant be easily Grabbed, 2, You cant protect it from a skid, they generally can get their stinky hands on anything they want with C#, 3, C++ is not clear text based, when I say this I mean that most of it is Engine Code when its compiled (engine code is basically windows version of saying "fuck you retard you cant touch me") but some of the loader isnt engine code and I might get on to that later. Now ill move on to the actual cracking ROFL MY BAD FOR MAKING THIS SO LONG.

/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Actual Cracking /-/-/
/-/-/-/-/-/-/-/-/-/-/-/

Uh so what do I start with, Ill prob do C# in here and C++ in a later guide. Alright so lets start with some common tools that be used to identify a assembly, first comes DiE(no not die you fucking moron, but Detect it Easy). This tool will tell you what type of assembly it is, and what bit type (64 bit 32 bit etc etc). It can be found here . So jus plop in ur file and if its C# ur good. Now usually devs arent retarted, so they will plop in anti debugging measures, but to be completely ablick wit u they fucking suck, 1, its either a list of debugging tools that they close on opening, or 2, they erase their pe headers 😭 its halarious when i see that they erase their pe headers becase they forget when I get kernel access Im able to dump whatever the fuck I want. Anyways, when u scan the file in DiE it should tell u what obfuscator its using, but if it dosent then go to strings, and then look for the first 7-8 strings and they will show what obf its using, example :
gWmAD1m.png

Now in this case its themida, so u will just want to find a themida unpacking tool such as and u download the designated release file for whatever bit type ur loader is, drag the loader into the exe file and fucking unpack that shit and put it into dnspy, btw you can download dnspy here to view a c# file once u deobfuscated/unpaacked it. . But lets say the monkey devs are ape shit and they used an actual good obfuscator like VMP (this is a skids worst nightmare 😱). 99% of the time people who are smart enough to use VMP use anti dumping / anti debugging bs by blocking out the EXE names, and to be fair there is really nothing you could do with that, so to combat that you wanna try and go to and rename all the assembly info and change anything that contains KSDUMPER as it is prob blacklisted by the loader ( also for cracking loaders use Windows 1909 on a virtual machine as u dont wanna get fucked jus in case the ape dev put a rat into it or a token logger). So lets say ur done dumping you wanna make sure the code looks like ape shit or its fully deobfuscated, if its fully deobfuscated thank the devs for their amazing work and move on to dnspy to steal whatever the fuck you want! But if its not plop that joint into NoVMP (shit works for any version because it just converts the strings to normal code and lets u view it without having an aneurysm) and ur good to go. Now lets say u dont wanna go thru allat and you jus wanna grab whatever dll that bitch has and go on ur merry way, well sad to say you fucking can't unless u wanna make ur own tool that listens to http requests. Anyways, as far as C# I went over the most important things, but there is a lot more to cover that I dont want to write about or stuff I'm not willing to share due to the fact that I do not want to spoonfeed. Everyone has to learn and do their own research, I just wrote a lil informational on how to start.


/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Important pls read/-/-/
/-/-/-/-/-/-/-/-/-/-/-/-/

Debug in a closed envrioment, dont be a retard, if u need help hit my line, i wont be cracking anything for anyone, i can give pointers and tips, but if u want me to work on something Im willing to, as long as its not a fucking loader with an authentication system like keyauth/auth.gg/pastedauth.cc.fag.xyz. These auths stream everything in bytes and its impossible to grab anything that they stream because they are good at what they do. I do paid work, and you can pay me to crack shit for you thank you. I love u my lil skidlings and have fun using this guide! Happy pride months - zinc#1028 😘😘😘😘
 
Member
User ID
21
Messages
109
Reactions
24
Level
21
Woah. this thread looks really well made, +rep. I will definitely finish reading this when i have some more time and give a better "review".
Bro I wrote this half asleep, don’t lie to me ROFL
 
Member
User ID
7550
Messages
24
Reactions
15
Level
13
Timestamp : 6/19/2022

/-/-/-/-/-/-/-/-/-/-/
/-/Introduction/-/-/
/-/-/-/-/-/-/-/-/-/

Hellooooooooooooo, so you're most likely viewing this thread because you want to learn how to reverse engineer (or crack if you wanna put it in simple terms). So reverse engineering is not easy. Im 14 atm but I started game hacking when I was 8 (2016 I started HvH on CSGO and scripting on Roblox). This is being written because I feel bad for those who would love to start but don't have a foot to put towards the progress. In retrospect reverse engineering requires you to be "tech savvy" but tbh you don't need to know C/C#/C++ or any other fork of C to know how to do basic reverse engineering (although when you start getting into bigger projects you will need to learn how to modify PseudoCode and you will have to learn how to modify actual Engine code presented to you as youre not coding in normal environments like sources where normal C or any other language is given to you).

/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Base Knowledge/-/-/
/-/-/-/-/-/-/-/-/-/-/-/

To start off, I will be using Cracking instead of Reverse engineering to save time, secondly, if I feel like it I will leave a dictionary of "hacking" acronyms below. When presented with an assembly to crack or decompile/unpack you will usually be given a C# (C sharp) or C++ (C plus plus) based assembly. Now this guide will be mainly on those assembly's, will I write a guide on other languages, maybe, do I want to, no, fuck no. What you have to understand is, C# and C++ are very different languages, and although they are both derivatives of C they are nothing alike, well they are but not to the point where you cant CLEARLY tell that they are different. C# is practically a clear text based language, as in I can read that shit and know what its doing without knowing the language. Generally C# is not secure in terms of Obfuscation and Packing but that depends on what obfuscator you use, its preferred you use your own or fork your own because they would be astronomically better, but if you cant I would use cracked VMP(VMProtect). C# is more visually appealing and its easier to crack but to each their own? Now on the other hand C++ is way more secure (if you're protecting it from a skid) but its a lot harder to read, code in, and design. Although its not limited to designing you can always use Platforms like IMGui or ZGui to design your loader, would I recommend using C++ instead of C#? Yes, is it more secure? Yes. The reason why C++ is more secure than C# is three HUGE reasons, 1. C# isnt able to hide HTTP/S GET/POST requests and they cant be easily Grabbed, 2, You cant protect it from a skid, they generally can get their stinky hands on anything they want with C#, 3, C++ is not clear text based, when I say this I mean that most of it is Engine Code when its compiled (engine code is basically windows version of saying "fuck you retard you cant touch me") but some of the loader isnt engine code and I might get on to that later. Now ill move on to the actual cracking ROFL MY BAD FOR MAKING THIS SO LONG.

/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Actual Cracking /-/-/
/-/-/-/-/-/-/-/-/-/-/-/

Uh so what do I start with, Ill prob do C# in here and C++ in a later guide. Alright so lets start with some common tools that be used to identify a assembly, first comes DiE(no not die you fucking moron, but Detect it Easy). This tool will tell you what type of assembly it is, and what bit type (64 bit 32 bit etc etc). It can be found here . So jus plop in ur file and if its C# ur good. Now usually devs arent retarted, so they will plop in anti debugging measures, but to be completely ablick wit u they fucking suck, 1, its either a list of debugging tools that they close on opening, or 2, they erase their pe headers 😭 its halarious when i see that they erase their pe headers becase they forget when I get kernel access Im able to dump whatever the fuck I want. Anyways, when u scan the file in DiE it should tell u what obfuscator its using, but if it dosent then go to strings, and then look for the first 7-8 strings and they will show what obf its using, example :
gWmAD1m.png

Now in this case its themida, so u will just want to find a themida unpacking tool such as and u download the designated release file for whatever bit type ur loader is, drag the loader into the exe file and fucking unpack that shit and put it into dnspy, btw you can download dnspy here to view a c# file once u deobfuscated/unpaacked it. . But lets say the monkey devs are ape shit and they used an actual good obfuscator like VMP (this is a skids worst nightmare 😱). 99% of the time people who are smart enough to use VMP use anti dumping / anti debugging bs by blocking out the EXE names, and to be fair there is really nothing you could do with that, so to combat that you wanna try and go to and rename all the assembly info and change anything that contains KSDUMPER as it is prob blacklisted by the loader ( also for cracking loaders use Windows 1909 on a virtual machine as u dont wanna get fucked jus in case the ape dev put a rat into it or a token logger). So lets say ur done dumping you wanna make sure the code looks like ape shit or its fully deobfuscated, if its fully deobfuscated thank the devs for their amazing work and move on to dnspy to steal whatever the fuck you want! But if its not plop that joint into NoVMP (shit works for any version because it just converts the strings to normal code and lets u view it without having an aneurysm) and ur good to go. Now lets say u dont wanna go thru allat and you jus wanna grab whatever dll that bitch has and go on ur merry way, well sad to say you fucking can't unless u wanna make ur own tool that listens to http requests. Anyways, as far as C# I went over the most important things, but there is a lot more to cover that I dont want to write about or stuff I'm not willing to share due to the fact that I do not want to spoonfeed. Everyone has to learn and do their own research, I just wrote a lil informational on how to start.


/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Important pls read/-/-/
/-/-/-/-/-/-/-/-/-/-/-/-/

Debug in a closed envrioment, dont be a retard, if u need help hit my line, i wont be cracking anything for anyone, i can give pointers and tips, but if u want me to work on something Im willing to, as long as its not a fucking loader with an authentication system like keyauth/auth.gg/pastedauth.cc.fag.xyz. Theshey stream because they are good at what they do. I do paid work, and you can pay me to crack shit for you thank you. I love u my lil skidlings and hae auths stream everything in bytes and its impossible to grab anything that tve fun using this guide! Happy pride months - zinc#1028 😘😘😘😘
good post dude, but keyauth is known to having huge faults within their code. You can easily grab stuff that they stream, for example I've gotten plenty of kernel drivers and dll's this way. Oh and I would like to add, nothing's impossible, everything is basically do able. You need to remember, these auth's were coded by humans, and there is exploits you can abuse to bypass, and grab the streamed stuff.
 
Member
User ID
21
Messages
109
Reactions
24
Level
21
good post dude, but keyauth is known to having huge faults within their code. You can easily grab stuff that they stream, for example I've gotten plenty of kernel drivers and dll's this way. Oh and I would like to add, nothing's impossible, everything is basically do able. You need to remember, these auth's were coded by humans, and there is exploits you can abuse to bypass, and grab the streamed stuff.
No you are completely correct, when I meant impossible I meant in the terms of the an inexperienced reader, most people think you can grab a loader, unpack it and it’s that easy. But they forget that with things like keyauth it’s very hard to get any assembly from their site as it gets streamed through bytes and it isn’t stored on their server but rather a database. As I said for a standard engineer it’s impossible, for some experienced like you it’s well over possivle and even done before.
 
Member
User ID
7550
Messages
24
Reactions
15
Level
13
No you are completely correct, when I meant impossible I meant in the terms of the an inexperienced reader, most people think you can grab a loader, unpack it and it’s that easy. But they forget that with things like keyauth it’s very hard to get any assembly from their site as it gets streamed through bytes and it isn’t stored on their server but rather a database. As I said for a standard engineer it’s impossible, for some experienced like you it’s well over possivle and even done before.
didn't understand you meant it for the inexperienced readers, sorry my bad. I believe there was a video on how to do it a while back in youtube, but I think it has been since removed / banned. But like I said, good post really enjoyed reading through it! :)
 
Member
User ID
21
Messages
109
Reactions
24
Level
21
didn't understand you meant it for the inexperienced readers, sorry my bad. I believe there was a video on how to do it a while back in youtube, but I think it has been since removed / banned. But like I said, good post really enjoyed reading through it! :)
Thankyou!! Are you able to check dms on discord*? I have a few questions, thanks
 
Member
User ID
7550
Messages
24
Reactions
15
Level
13
Thankyou!! Are you able to check dms on discord*? I have a few questions, thanks
my discord is termed, and I haven't made a new one. Sorry, I will update it once I make a new one.
 
Member
User ID
18342
Messages
13
Reactions
14
Level
7
Timestamp : 6/19/2022

/-/-/-/-/-/-/-/-/-/-/
/-/Introduction/-/-/
/-/-/-/-/-/-/-/-/-/

Hellooooooooooooo, so you're most likely viewing this thread because you want to learn how to reverse engineer (or crack if you wanna put it in simple terms). So reverse engineering is not easy. Im 14 atm but I started game hacking when I was 8 (2016 I started HvH on CSGO and scripting on Roblox). This is being written because I feel bad for those who would love to start but don't have a foot to put towards the progress. In retrospect reverse engineering requires you to be "tech savvy" but tbh you don't need to know C/C#/C++ or any other fork of C to know how to do basic reverse engineering (although when you start getting into bigger projects you will need to learn how to modify PseudoCode and you will have to learn how to modify actual Engine code presented to you as youre not coding in normal environments like sources where normal C or any other language is given to you).

/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Base Knowledge/-/-/
/-/-/-/-/-/-/-/-/-/-/-/

To start off, I will be using Cracking instead of Reverse engineering to save time, secondly, if I feel like it I will leave a dictionary of "hacking" acronyms below. When presented with an assembly to crack or decompile/unpack you will usually be given a C# (C sharp) or C++ (C plus plus) based assembly. Now this guide will be mainly on those assembly's, will I write a guide on other languages, maybe, do I want to, no, fuck no. What you have to understand is, C# and C++ are very different languages, and although they are both derivatives of C they are nothing alike, well they are but not to the point where you cant CLEARLY tell that they are different. C# is practically a clear text based language, as in I can read that shit and know what its doing without knowing the language. Generally C# is not secure in terms of Obfuscation and Packing but that depends on what obfuscator you use, its preferred you use your own or fork your own because they would be astronomically better, but if you cant I would use cracked VMP(VMProtect). C# is more visually appealing and its easier to crack but to each their own? Now on the other hand C++ is way more secure (if you're protecting it from a skid) but its a lot harder to read, code in, and design. Although its not limited to designing you can always use Platforms like IMGui or ZGui to design your loader, would I recommend using C++ instead of C#? Yes, is it more secure? Yes. The reason why C++ is more secure than C# is three HUGE reasons, 1. C# isnt able to hide HTTP/S GET/POST requests and they cant be easily Grabbed, 2, You cant protect it from a skid, they generally can get their stinky hands on anything they want with C#, 3, C++ is not clear text based, when I say this I mean that most of it is Engine Code when its compiled (engine code is basically windows version of saying "fuck you retard you cant touch me") but some of the loader isnt engine code and I might get on to that later. Now ill move on to the actual cracking ROFL MY BAD FOR MAKING THIS SO LONG.

/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Actual Cracking /-/-/
/-/-/-/-/-/-/-/-/-/-/-/

Uh so what do I start with, Ill prob do C# in here and C++ in a later guide. Alright so lets start with some common tools that be used to identify a assembly, first comes DiE(no not die you fucking moron, but Detect it Easy). This tool will tell you what type of assembly it is, and what bit type (64 bit 32 bit etc etc). It can be found here . So jus plop in ur file and if its C# ur good. Now usually devs arent retarted, so they will plop in anti debugging measures, but to be completely ablick wit u they fucking suck, 1, its either a list of debugging tools that they close on opening, or 2, they erase their pe headers 😭 its halarious when i see that they erase their pe headers becase they forget when I get kernel access Im able to dump whatever the fuck I want. Anyways, when u scan the file in DiE it should tell u what obfuscator its using, but if it dosent then go to strings, and then look for the first 7-8 strings and they will show what obf its using, example :
gWmAD1m.png

Now in this case its themida, so u will just want to find a themida unpacking tool such as and u download the designated release file for whatever bit type ur loader is, drag the loader into the exe file and fucking unpack that shit and put it into dnspy, btw you can download dnspy here to view a c# file once u deobfuscated/unpaacked it. . But lets say the monkey devs are ape shit and they used an actual good obfuscator like VMP (this is a skids worst nightmare 😱). 99% of the time people who are smart enough to use VMP use anti dumping / anti debugging bs by blocking out the EXE names, and to be fair there is really nothing you could do with that, so to combat that you wanna try and go to and rename all the assembly info and change anything that contains KSDUMPER as it is prob blacklisted by the loader ( also for cracking loaders use Windows 1909 on a virtual machine as u dont wanna get fucked jus in case the ape dev put a rat into it or a token logger). So lets say ur done dumping you wanna make sure the code looks like ape shit or its fully deobfuscated, if its fully deobfuscated thank the devs for their amazing work and move on to dnspy to steal whatever the fuck you want! But if its not plop that joint into NoVMP (shit works for any version because it just converts the strings to normal code and lets u view it without having an aneurysm) and ur good to go. Now lets say u dont wanna go thru allat and you jus wanna grab whatever dll that bitch has and go on ur merry way, well sad to say you fucking can't unless u wanna make ur own tool that listens to http requests. Anyways, as far as C# I went over the most important things, but there is a lot more to cover that I dont want to write about or stuff I'm not willing to share due to the fact that I do not want to spoonfeed. Everyone has to learn and do their own research, I just wrote a lil informational on how to start.


/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/Important pls read/-/-/
/-/-/-/-/-/-/-/-/-/-/-/-/

Debug in a closed envrioment, dont be a retard, if u need help hit my line, i wont be cracking anything for anyone, i can give pointers and tips, but if u want me to work on something Im willing to, as long as its not a fucking loader with an authentication system like keyauth/auth.gg/pastedauth.cc.fag.xyz. These auths stream everything in bytes and its impossible to grab anything that they stream because they are good at what they do. I do paid work, and you can pay me to crack shit for you thank you. I love u my lil skidlings and have fun using this guide! Happy pride months - zinc#1028 😘😘😘😘
Awful and filled with misinformation, why even do a writeup if you have no clue what in the fuck you're talking about...?
 
Member
User ID
21
Messages
109
Reactions
24
Level
21
Awful and filled with misinformation, why even do a writeup if you have no clue what in the fuck you're talking about...?
I have gotten personal messages on discord saying this helped people heavily and even tho it’s not detailed they learned a bit. Shove your nasty attitude up your ass and go be “smart” somewhere else.
 
Member
User ID
21
Messages
109
Reactions
24
Level
21
Awful and filled with misinformation, why even do a writeup if you have no clue what in the fuck you're talking about...?
Yes and no.
I have little experience with anything related to c#, but yet I can still somewhat easily crack loaders written in it due to the fact that reverse engineering is more about having solid techniques to use and just having a generally okay understanding of how computer memory works.
So are you fr tryna school me on whats wrong and right when you are talking about c# and computer memory? Brodie c# dosent even touch your memory along with the fact you said you don’t even know what you’re talking about.
 
Member
User ID
18342
Messages
13
Reactions
14
Level
7
So are you fr tryna school me on whats wrong and right when you are talking about c# and computer memory? Brodie c# dosent even touch your memory along with the fact you said you don’t even know what you’re talking about.
You're joking... please tell me you're joking....
So it doesnt "even touch your memory" I hear? Literally what does this even mean? How could it run on your computer without touching memory? Also congrats on reading through that entire post i wrote, maybe you could use some of the resources I listed to actually learn instead of larping on a forum.

Edit 1: when did I say I don't know what I'm talking about, what? I said I "wasn't experienced". Ironically it seems I still know more than you.

Anyways lets dissect ur little retarded writeup
C# (C sharp) or C++ (C plus plus) based assembly
Extremely wrong
C# is more visually appealing and its easier to crack but to each their own? Now on the other hand C++ is way more secure (if you're protecting it from a skid) but its a lot harder to read, code in, and design.
How is c# more visually appealing? what did you mean by this? How is c++ more secure, what exactly about the language makes it that way compared to the other?
Anyways, when u scan the file in DiE it should tell u what obfuscator its using, but if it dosent then go to strings, and then look for the first 7-8 strings and they will show what obf its using
Erm... why go to strings to check segs? Also you forgot to even explain what segments are and forgot to mention that you can very easily fake what the segments are called on a lot of modern packers (such as the one u literally suggested that they use!)
but tbh you don't need to know C/C#/C++ or any other fork of C to know how to do basic reverse engineering
uh... c# is a c++ fork.... also... YES U DO????? U LITERALLY NEED TO BE ABLE TO READ PSEUDOCODE NO MATTER WHAT U ARE DOING LMAO
maybe you dont need to specifically use a c based language but you 100% need to know about programming logic
also most people dont even have a (good) c++ decompiler so if u don't use hexrays or another one you'd actually need to know how to read assembly.
Uh so what do I start with, Ill prob do C# in here and C++ in a later guide.
Sounds like you are one of those "skids" you were talking about earlier in the article....
You cant protect it from a skid, they generally can get their stinky hands on anything they want with C#, 3, C++ is not clear text based, when I say this I mean that most of it is Engine Code when its compiled
"mostly engine code when its compiled" literally what do you mean by this? wouldnt literally ANY EXECUTABLE PROGRAM WRITTEN IN C/C#/C++ WILL HAVE "ENGINE CODE" U MONKEY LOL (its called object code btw, dont know where u got 'engine' from)

(engine code is basically windows version of saying "fuck you retard you cant touch me")
No lol?????? its literally just the compiled source so the computer can run it......
These auths stream everything in bytes and its impossible to grab anything that they stream because they are good at what they do.
You are actually retarded.
But lets say the monkey devs are ape shit and they used an actual good obfuscator like VMP (this is a skids worst nightmare 😱). 99% of the time people who are smart enough to use VMP use anti dumping / anti debugging bs by blocking out the EXE names, and to be fair there is really nothing you could do with that, so to combat that you wanna try and go to https://github.com/EquiFox/KsDumper and rename all the assembly info and change anything that contains KSDUMPER as it is prob blacklisted by the loader
Oh my, you really do not know what you are saying. Heres some random article I found after a single google search for the windows function "SetWindowTextA"


if its fully deobfuscated thank the devs for their amazing work and move on to dnspy to steal whatever the fuck you want!
Ah yes, lets steal code from the loader we just cracked.
its preferred you use your own or fork your own because they would be astronomically better
Yeah man lets tell the RE noobies to fork their own packer and make it undetected of course that's gonna go well
This is being written because I feel bad for those who would love to start but don't have a foot to put towards the progress.
You are spreading large amounts of misinformation to people trying to start, nice job!
C# isnt able to hide HTTP/S GET/POST requests
....
( also for cracking loaders use Windows 1909 on a virtual machine as u dont wanna get fucked jus in case the ape dev put a rat into it or a token logger)
Why. in. the. fuck. would you finally say this halfway into the explanation. Literally should've been the first thing you said.
Now lets say u dont wanna go thru allat and you jus wanna grab whatever dll that bitch has and go on ur merry way, well sad to say you fucking can't unless u wanna make ur own tool that listens to http requests.
"u wanna make ur own tool that listens to http requests." I thought u didnt have to know how to code?
Also there is multiple ways to crack most loaders in c# and that method will only work if the dll isnt being streamed (which is used in almost every single open source loader nowadays btw)
its halarious when i see that they erase their pe headers becase they forget when I get kernel access Im able to dump whatever the fuck I want.
aahaahahahhh omfg bro I am actually about to die this shit is so funny

I'm not willing to share due to the fact that I do not want to spoonfeed.
"I do not want to spoonfeed" dont worry, cause you arent spoonfeeding at all right now actually! Spoonfeeding is supposed to make something extremely easy for someone, yet you are actually going to confuse the shit out of anyone who reads this and tries to apply the "advice" past just using a unpacker (that someone else made) and then calling urself a reverse engineer from there.
I do paid work, and you can pay me to crack shit for you thank you.
No way you are selling your "cracking services" to people Jesus Christ please tell me you atleast refund them when you inevitably fail LMAO
i can give pointers and tips, but if u want me to work on something Im willing to, as long as its not a fucking loader with an authentication system like keyauth/auth.gg/pastedauth.cc.fag.xyz. These auths stream everything in bytes and its impossible to grab anything that they stream because they are good at what they do.
No you are completely correct, when I meant impossible I meant in the terms of the an inexperienced reader
Ah, so someone calls you out for being wrong so you blatantly lie after you literally said you wouldnt try cracking them for people because "they are good at what they do"



For the love of fucking god dont post a "tutorial" on reverse engineering when you barely know what you are talking about.

(half assed as shit, if u need me to explain anything else in detail I will gladly respond)
 
Last edited:
New member
User ID
37891
Messages
2
Reactions
0
Level
1
You're joking... please tell me you're joking....
So it doesnt "even touch your memory" I hear? Literally what does this even mean? How could it run on your computer without touching memory? Also congrats on reading through that entire post i wrote, maybe you could use some of the resources I listed to actually learn instead of larping on a forum.

Edit 1: when did I say I don't know what I'm talking about, what? I said I "wasn't experienced". Ironically it seems I still know more than you.

Anyways lets dissect ur little retarded writeup

Extremely wrong

How is c# more visually appealing? what did you mean by this? How is c++ more secure, what exactly about the language makes it that way compared to the other?

Erm... why go to strings to check segs? Also you forgot to even explain what segments are and forgot to mention that you can very easily fake what the segments are called on a lot of modern packers (such as the one u literally suggested that they use!)

uh... c# is a c++ fork.... also... YES U DO????? U LITERALLY NEED TO BE ABLE TO READ PSEUDOCODE NO MATTER WHAT U ARE DOING LMAO
maybe you dont need to specifically use a c based language but you 100% need to know about programming logic
also most people dont even have a (good) c++ decompiler so if u don't use hexrays or another one you'd actually need to know how to read assembly.

Sounds like you are one of those "skids" you were talking about earlier in the article....

"mostly engine code when its compiled" literally what do you mean by this? wouldnt literally ANY EXECUTABLE PROGRAM WRITTEN IN C/C#/C++ WILL HAVE "ENGINE CODE" U MONKEY LOL (its called object code btw, dont know where u got 'engine' from)


No lol?????? its literally just the compiled source so the computer can run it......

You are actually retarded.

Oh my, you really do not know what you are saying. Heres some random article I found after a single google search for the windows function "SetWindowTextA"



Ah yes, lets steal code from the loader we just cracked.

Yeah man lets tell the RE noobies to fork their own packer and make it undetected of course that's gonna go well

You are spreading large amounts of misinformation to people trying to start, nice job!

....

Why. in. the. fuck. would you finally say this halfway into the explanation. Literally should've been the first thing you said.

"u wanna make ur own tool that listens to http requests." I thought u didnt have to know how to code?
Also there is multiple ways to crack most loaders in c# and that method will only work if the dll isnt being streamed (which is used in almost every single open source loader nowadays btw)

aahaahahahhh omfg bro I am actually about to die this shit is so funny


"I do not want to spoonfeed" dont worry, cause you arent spoonfeeding at all right now actually! Spoonfeeding is supposed to make something extremely easy for someone, yet you are actually going to confuse the shit out of anyone who reads this and tries to apply the "advice" past just using a unpacker (that someone else made) and then calling urself a reverse engineer from there.

No way you are selling your "cracking services" to people Jesus Christ please tell me you atleast refund them when you inevitably fail LMAO


Ah, so someone calls you out for being wrong so you blatantly lie after you literally said you wouldnt try cracking them for people because "they are good at what they do"



For the love of fucking god dont post a "tutorial" on reverse engineering when you barely know what you are talking about.

(half assed as shit, if u need me to explain anything else in detail I will gladly respond)
maybe u should make ur own reverse engineering tutorial
 
I'm not Plisskien
Administrator
User ID
1
Messages
1,095
Reactions
3,745
Level
99
You're joking... please tell me you're joking....
So it doesnt "even touch your memory" I hear? Literally what does this even mean? How could it run on your computer without touching memory? Also congrats on reading through that entire post i wrote, maybe you could use some of the resources I listed to actually learn instead of larping on a forum.

Edit 1: when did I say I don't know what I'm talking about, what? I said I "wasn't experienced". Ironically it seems I still know more than you.

Anyways lets dissect ur little retarded writeup

Extremely wrong

How is c# more visually appealing? what did you mean by this? How is c++ more secure, what exactly about the language makes it that way compared to the other?

Erm... why go to strings to check segs? Also you forgot to even explain what segments are and forgot to mention that you can very easily fake what the segments are called on a lot of modern packers (such as the one u literally suggested that they use!)

uh... c# is a c++ fork.... also... YES U DO????? U LITERALLY NEED TO BE ABLE TO READ PSEUDOCODE NO MATTER WHAT U ARE DOING LMAO
maybe you dont need to specifically use a c based language but you 100% need to know about programming logic
also most people dont even have a (good) c++ decompiler so if u don't use hexrays or another one you'd actually need to know how to read assembly.

Sounds like you are one of those "skids" you were talking about earlier in the article....

"mostly engine code when its compiled" literally what do you mean by this? wouldnt literally ANY EXECUTABLE PROGRAM WRITTEN IN C/C#/C++ WILL HAVE "ENGINE CODE" U MONKEY LOL (its called object code btw, dont know where u got 'engine' from)


No lol?????? its literally just the compiled source so the computer can run it......

You are actually retarded.

Oh my, you really do not know what you are saying. Heres some random article I found after a single google search for the windows function "SetWindowTextA"



Ah yes, lets steal code from the loader we just cracked.

Yeah man lets tell the RE noobies to fork their own packer and make it undetected of course that's gonna go well

You are spreading large amounts of misinformation to people trying to start, nice job!

....

Why. in. the. fuck. would you finally say this halfway into the explanation. Literally should've been the first thing you said.

"u wanna make ur own tool that listens to http requests." I thought u didnt have to know how to code?
Also there is multiple ways to crack most loaders in c# and that method will only work if the dll isnt being streamed (which is used in almost every single open source loader nowadays btw)

aahaahahahhh omfg bro I am actually about to die this shit is so funny


"I do not want to spoonfeed" dont worry, cause you arent spoonfeeding at all right now actually! Spoonfeeding is supposed to make something extremely easy for someone, yet you are actually going to confuse the shit out of anyone who reads this and tries to apply the "advice" past just using a unpacker (that someone else made) and then calling urself a reverse engineer from there.

No way you are selling your "cracking services" to people Jesus Christ please tell me you atleast refund them when you inevitably fail LMAO


Ah, so someone calls you out for being wrong so you blatantly lie after you literally said you wouldnt try cracking them for people because "they are good at what they do"



For the love of fucking god dont post a "tutorial" on reverse engineering when you barely know what you are talking about.

(half assed as shit, if u need me to explain anything else in detail I will gladly respond)
maybe u should make ur own reverse engineering tutorial
Yeah, I would like to see it :)
 
Average Enjoyer
Moderator
User ID
34690
Messages
48
Reactions
1,081
Level
27
at some point I will do a better thread about it
 
New member
User ID
48578
Messages
1
Reactions
0
Level
0
Yeah, I would like to see it :)
not to advertise your competitor, but literally there is no reason anyone would want to learn off this forum, its for shit pastes to get uploaded, unknowncheats has everything for learning stuff like this and the users on this forum are way too clueless.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Top