[Release] Hax Hider 1.0 (For ArmA 2)
Current version: 1.0
BE version: 1.190
Status: Undetected [Currently (v>= 1.191) Unknown - the method is probably detected on 32 bit systems]
Hax Hider hides your external processes from BattlEye by preventing it to scan them and detect known hostile patterns in them, therefore sort of undetects them.
It was created so you can run otherwise detected external hacks/tools undetectedly (eg. DayZ navigator (firefox, chrome,..), Cheatengine, MHS, etc)
You can use this on every version of ArmA 2 (A2, A2Free, OA, Beta, Dayz, PMC, BAF)
1) Customize properties in "hax hider.ini"
2) Run ArmA 2
3) When in main menu, inject hax hider
4) Run hacks/hack tools specified
(more in depth noob friendly instructions included with download)
Notes: Version 1.0 is sort of an experimental version.. once this is detected or BE updates too much, I'll undetect this, add protection and a lot more functionality for your pleasure (I have it coded, all ready) This version does not have any significant protection!
NB: This will NOT undetect any activity taken with your hideable hack/tool (For example spawning vehicles can still come up on server logs, depending on the hack. Or if you decide to use WPE PRO, then you should know that WPE will inject a dll into ArmA process which will be detected...)
Download added as an attachment
Last edited by c5; 02-20-2013 at 11:47 AM.
Post Thanks / Like - 6 Thanks
A side tip for those trying to bypass BattlEye's new detection service: Join game's lobby. Alt tab out, type "services" to your windows run/search box. Open that services viewer thingy, scroll your way to BattlEye service, right click on it and press "Stop". Gratz, you just bypassed BattlEye's thread stopping detection mechanism, alt tab back into game..
So nice work and keep it c5 i like all your release in this forum real good job and share
How did u come about concluding that the AC scans processes?
Seems the only logical way of detecting external hacks, doesn't it. Some reversing, and when you see calls to like VirtualQuery and ReadProcessMemory, well then hooking them and seeing what/how they scan was enough to conclude that.
Originally Posted by saebur
Last edited by c5; 01-17-2013 at 12:46 AM.
Thanks for the upload, how long would you estimate this will be undetected for?
"All you need is ignorance and confidence and the success is sure."
-- Mark Twain
"For a long time it puzzled me how something so expensive, so leading edge, could be so useless, and then it occurred to me that a computer
is a stupid machine with the ability to do incredibly smart things, while computer programmers are smart people with the ability to do incredibly
stupid things. They are, in short, a perfect match."
-- Bill Bryson
Until BE developer gets his hands on it But no worries, when he does, I have counter measures for most of the possible actions he could take. And as I said, I'll add more functionality (hiding of injected dlls, screwing over the service, etc) sooner or later
Originally Posted by maymonaise
hmmmm, I know you , lol... do you know me C5? you do but do you? hows it going for you?
Yes I do
Originally Posted by eden
I'm all right, thanks. And you?