PATCH_LIB("libUE4.so", "0x76888EC", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x738604C", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x7385F54", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x7385E5C", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x737612C", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x5A92D14", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x7688a30", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x738c350", "00 00 80 D2 C0 03 5F D6");
PATCH_LIB("libUE4.so", "0x735bf88", "00 00 80 D2 C0 03 5F D6");
BYPASS MONSTER-ENGINE [LUX]
64x Global 3.9
𝐉𝐎𝐈𝐍 𝐅𝐎𝐑 𝐌𝐎𝐑𝐄
@IMGUIMODMENU
❤5🖕2
Xelahot-NewEmpire.zip
42.3 MB
Xelahot-NewEmpire
Password:
32Bit - Need to update
@IMGUIMODMENU
Password:
@XelahotOfficial New Empire
32Bit - Need to update
𝐉𝐎𝐈𝐍 𝐅𝐎𝐑 𝐌𝐎𝐑𝐄
@IMGUIMODMENU
❤3🥰1
ONLINE PANEL AVAILABLE
🔄FEATURES: -
😙 Completaly Anti Ddos
😙ROLES : OWNER , ADMIN & RESELLER
😙 Delete Single Keys, Expired & Unused Keys
😙 Mod name online
😙 Mod status online
😙 Maintenance mode online
😙 Key expiry time
😙 Esp,item,aimbot, Bullet tracking, memory features ON/OFF online
😙One Referral One User Can Register
😙 User Expire Time
😙 Mod name key 🗝️
😙 Update your password 🔑
[ No Errors + Online Codes ]
✅ 200/- RS ( MONTHLY )
DM :- @Rip_Lege9d
🔄FEATURES: -
😙 Completaly Anti Ddos
😙ROLES : OWNER , ADMIN & RESELLER
😙 Delete Single Keys, Expired & Unused Keys
😙 Mod name online
😙 Mod status online
😙 Maintenance mode online
😙 Key expiry time
😙 Esp,item,aimbot, Bullet tracking, memory features ON/OFF online
😙One Referral One User Can Register
😙 User Expire Time
😙 Mod name key 🗝️
😙 Update your password 🔑
[ No Errors + Online Codes ]
✅ 200/- RS ( MONTHLY )
DM :- @Rip_Lege9d
__int64 (*osub_1DD8B4)(__int64 vTableAddress, unsigned char* CharPtr, size_t SizeOfCharPtr);
__int64 hsub_1DD8B4(__int64 vTableAddress, unsigned char* CharPtr, size_t SizeOfCharPtr)
{
uintptr_t ret = reinterpret_cast<uintptr_t>(__builtin_return_address(0));
switch (SizeOfCharPtr) {
case 0x16:
case 0x3E:
case 0x43:
return osub_1DD8B4(vTableAddress, CharPtr, SizeOfCharPtr);
default:
return 0LL;
}
}
__int64_t (*osub_1EB7BC)(__int64_t a1, const char *a2, __int64_t a3);
__int64_t hsub_1EB7BC(__int64_t a1, const char *a2, __int64_t a3)
{
auto ret = static_cast<uint64_t>(reinterpret_cast<uintptr_t>(__builtin_return_address(0)));
std::string str_a2(a2); // Convert C-style string to std::string
if
(
strstr(a2, ("crash"))
|| strstr(a2, ("opcode"))
|| strstr(a2, ("app"))
|| strstr(a2, ("Mrpcs"))
|| strstr(a2, ("scanner"))
|| strstr(a2, ("anti_module"))
|| strstr(a2, ("module"))
|| strstr(a2, ("hook"))
|| strstr(a2, ("zygisk"))
|| strstr(a2, ("tcj"))
|| strstr(a2, ("Scan_trap"))
|| strstr(a2, ("trap"))
|| strstr(a2, ("blur_exit"))
) {
return 0LL;
}
else
{
auto ret = osub_1EB7BC(a1, a2, a3);
return ret;
}
}
_QWORD* (*osub_4BF5BC)(int* result, unsigned int a2);
_QWORD* hsub_4BF5BC(int* result, unsigned int a2)
{
auto ret = reinterpret_cast<uintptr_t>(__builtin_return_address(0));
if (a2 == 4) {
return osub_4BF5BC(result, 5u);
}
return osub_4BF5BC(result, a2);
}
__int64 (*osub_265C1C) (__int64 a1, int a2);
__int64 hsub_265C1C (__int64 a1, int a2)
{
return 0LL;
}
__int64 (*osub_4DC750)(_BYTE *a1, char a2, const char *a3, ...);
__int64 hsub_4DC750(_BYTE *a1, char a2, const char *a3, ...)
{
return -1;
}
__int64 __fastcall (*osub_26E178)(__int64 a1, const char *a2);
__int64 __fastcall hsub_26E178(__int64 a1, const char *a2) {
if (strstr((const char*)a2,oxorany("eglSwapBuffers")) ||
strstr((const char*)a2,oxorany("__system_property_get"))||
strstr((const char*)a2,oxorany("ASensor"))||
strstr((const char*)a2,oxorany("ALooper_prepare"))||
strstr((const char*)a2,oxorany("gettimeofday"))||
strstr((const char*)a2,oxorany("AMotion"))||
strstr((const char*)a2,oxorany("AInput"))||
strstr((const char*)a2,oxorany("inotify"))||
strstr((const char*)a2,oxorany("gl"))) {
return 0;
}
return osub_26E178(a1, a2);
}
__int64_t __fastcall (*oDoneDumpByCryzer)(__int64_t *a1);
__int64_t __fastcall hDoneDumpByCryzer(__int64_t *a1)
{
return 0LL;
}
__int64 (*osub_1ADC6C) (__int64 a1, unsigned char* a2, const void* a3, size_t a4, __int64 a5, __int64 a6);
__int64 hsub_1ADC6C (__int64 a1, unsigned char* a2, const void* a3, size_t a4, __int64 a5, __int64 a6)
{
if (strstr((char*)a2, oxorany("mrpcs"))) {
return osub_1ADC6C(a1, a2, a3, a4, a5, a6);
}
if (a2 && a3) return (unsigned char)*a2;
else return a1;
}
❤1
ImguiModMenu ~ For Devlopers
__int64 (*osub_1DD8B4)(__int64 vTableAddress, unsigned char* CharPtr, size_t SizeOfCharPtr); __int64 hsub_1DD8B4(__int64 vTableAddress, unsigned char* CharPtr, size_t SizeOfCharPtr) { uintptr_t ret = reinterpret_cast<uintptr_t>(__builtin_return_address(0));…
HOOK_LIB("libanogs.so", "0x265C1C", hsub_265C1C, osub_265C1C);
HOOK_LIB("libanogs.so", "0x1DD8B4", hsub_1DD8B4, osub_1DD8B4);
HOOK_LIB("libanogs.so", "0x1EB7BC", hsub_1EB7BC, osub_1EB7BC);
HOOK_LIB("libanogs.so", "0x262BA4", hDoneDumpByCryzer, oDoneDumpByCryzer);
HOOK_LIB("libanogs.so", "0x28DA0C", hDoneDumpByCryzer, oDoneDumpByCryzer);
HOOK_LIB("libanogs.so", "0x1ADC6C", hsub_1ADC6C, osub_1ADC6C);
HOOK_LIB("libanogs.so", "0x4BF5BC", hsub_4BF5BC, osub_4BF5BC);
HOOK_LIB("libanogs.so", "0x26E178", hsub_26E178, osub_26E178);
HOOK_LIB("libanogs.so", "0x4DC750", hsub_4DC750, osub_4DC750);
Global x64 Bypass
𝐉𝐎𝐈𝐍 𝐅𝐎𝐑 𝐌𝐎𝐑𝐄
@IMGUIMODMENU
❤3
NovaMod Src Leaked By @KingCamper_2.7z
79.3 MB
Pass :-
Join @Nova_Mod
by @KingCamper_2
🌐 Join : @ImGuiModMenu ⭐
🌐 Join : @ImGuiModMenu ⭐
------------------------------------------
Share With Credits ⭐
❤5🔥1🥰1😈1