Hello UGBASE.EU,
I am releasing a user-mode anti-cheat bypass. What does it do? It basically hooks all possible WinAPI functions and spoofs their return values.
Filesystem hooks spoof values for mods (.asi, .sf, etc.), and memory scans also hide regions belonging to these mod/cheat files.
Simply move the .asi file into your GTA SA folder.
The silent ASI loader loads files alphabetically; you can rename it, but it’s better if it is loaded as the first ASI file.
It also supports LoadLibraryA for *.ws extension files placed in the GTA SA directory when the RequestClass RPC is sent, due to certain detection vectors.
The GitHub repository also includes a VoWAC emulator and an outdated vowac_launcher + vowac.exe bypass (vowac_hooks.dll) — I will probably update that soon.
If you want to become a member of our community, please join our Discord server via watersmoke.net.
Sources are available on GitHub.
Binaries are available in output folder.
I am releasing a user-mode anti-cheat bypass. What does it do? It basically hooks all possible WinAPI functions and spoofs their return values.
Filesystem hooks spoof values for mods (.asi, .sf, etc.), and memory scans also hide regions belonging to these mod/cheat files.
Simply move the .asi file into your GTA SA folder.
The silent ASI loader loads files alphabetically; you can rename it, but it’s better if it is loaded as the first ASI file.
It also supports LoadLibraryA for *.ws extension files placed in the GTA SA directory when the RequestClass RPC is sent, due to certain detection vectors.
The GitHub repository also includes a VoWAC emulator and an outdated vowac_launcher + vowac.exe bypass (vowac_hooks.dll) — I will probably update that soon.
If you want to become a member of our community, please join our Discord server via watersmoke.net.
Sources are available on GitHub.
Binaries are available in output folder.