b1scoito / cozinha_loader

An injector focused on undetectability that automatically injects a DLL into the target process with VAC3 bypass.
https://github.com/b1scoito/cozinha_loader
GNU General Public License v3.0
128 stars 14 forks source link

About Bypassing injection block by csgo #16

Closed jackKiZhu closed 2 years ago

jackKiZhu commented 2 years ago

About Bypassing injection block by csgo (-allow_third_party_software) If I quit the game, do I need to call this function the next time I open the game?

b1scoito commented 2 years ago

What?

jackKiZhu commented 2 years ago

What?

std::uint8_t restore[5]; std::memcpy( restore, ntopenfile_ptr, sizeof( restore ) );

        const auto result = bb_proc.memory().Write( (std::uintptr_t) ntopenfile_ptr, restore );

This Bypassing injection block, after the game exits, will it take effect the next time you enter the game?

b1scoito commented 2 years ago

Your question doesn't make sense. This whole routine is executed once the game launches. If you open it again it'll not get executed unless you use the injector again.