Closed ducky0 closed 3 weeks ago
BTW i just executed the jul 1 release build binary on my PC, which is running windows 11 os and the patching works fine. I guess it's ur environment issue.
what do u use for the "constexpr BYTE vac3_data[135680]" byte stuff? i wanna see if i need to update it or try a diff vac3_inhibitor
it's the bytecode for an old vac bypass method. u can replace the bytecodes with ur own vac bypass method since the old one may have outdated.
is it just the dll converted to bytes?
yes.
Im currently working on class projects and haven't been maintaining this injector for months so the patching method might be out of date, feel free to make a PR if u manage to solve this problem.