XignCode3 bypass. A host-based emulator bypass for Wellbia's XignCode3. Emulates the integrity-check for XignCode3 through a host-application. A host application launches and initializes XignCode3, causing XignCode3 to run its anti-hack analysis routines in the scope of that particular parent process. XIGNCODE3 does nothing at all, not even out yet and already bypassed. It won't have any affect on cheaters, exploits, bots, gold sellers etc because they will bypass. It just drives honest players away from the game because (shockingly) they don't want spyware on their computer. Oftentimes, the Technical Support team will need to look at your xigncode.log file, which contains useful, non-personal information about detections occurred by Xigncode. If you are able to replica.
0xBAADF00D: Bypassing XIGNCODE3 - Dragomon Hunter http://0xbaadf00dsec.blogspot.com/2016/02/bypassing-xigncode3-dragomon-hunter.html
dragomon_hunter_xigncode_bypass.c
#include<Windows.h> |
DWORD dwXignInitFnc = 0x006F1DE0; |
BOOL WriteBytes(DWORD dwAddress, LPBYTE lpBuffer, DWORD nBytes) { |
if (nBytes 0) { |
OutputDebugString('WriteBytes:: Tried to write 0 bytes to memory.'); |
returnFALSE; |
} |
DWORD dwOldProtect; |
if (!VirtualProtect((LPVOID)dwAddress, nBytes, PAGE_EXECUTE_READWRITE, &dwOldProtect)) { |
OutputDebugString('WriteBytes:: Failed to change access protection on memory address.'); |
returnFALSE; |
} |
memcpy((LPVOID)dwAddress, lpBuffer, nBytes); |
if (!VirtualProtect((LPVOID)dwAddress, nBytes, dwOldProtect, &dwOldProtect)) { |
OutputDebugString('WriteBytes:: Failed to change access protection on memory address.'); |
returnFALSE; |
} |
returnTRUE; |
} |
BOOL StopXignInit() { |
/* |
Modify code to: |
mov eax, 1 |
ret |
nop |
nop |
nop |
*/ |
returnWriteBytes(dwXignInitFnc, (PBYTE)'xB8x01x00x00x00xC3x90x90x90', 9); |
} |
BOOL APIENTRY DllMain(__in HINSTANCE hInstance, __in DWORD fdwReason, __in __reserved LPVOID lpReserved) { |
UNREFERENCED_PARAMETER(lpReserved); |
if (fdwReason DLL_PROCESS_ATTACH) { |
if (StopXignInit()) { |
OutputDebugString('Successfully stopped XIGNCODE3 from initializing!'); |
} |
else { |
OutputDebugString('Failed to stop XIGNCODE3 from initializing!'); |
} |
} |
returnTRUE; |
} |
Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment
This batch code copies all the Bypasser files automatically to their correct locations, both for 32 and 64 bits (128 bits too, if it ever exists in the future).Instructions and requirements:
- Make sure the game is installed in a path existing in the registry key HKEY_LOCAL_MACHINESOFTWAREWow6432NodeNCWestBnS (value BaseDir)
- Make sure it is NOT in a network shared folder! IT WON'T WORK!
- Extract the XignCode Bypasser into a folder (get the Bypasser in the #download channel on the BnS Buddy server on Discord)
- Place the install.bat file inside the extracted folder
- Make sure you execute the file as Administrator
- Enjoy the game!
Xigncode3 Windows 10
Where is the file?The file and any updates are available on https://github.com/ismael-miguel/xcb-installer, alongside a better explanation for the instructions provided.
Xigncode Bypass Download
Please, do not complain about the length of the code! DO NOT ASK ME WHERE TO DOWNLOAD THE BYPASSER! READ THE INSTRUCTIONS! IF YOU HAVE AN ISSUE WITH THE BYPASSER ITSELF, DO NOT ASK ME! IF YOU HAVE AN ISSUE WITH THE INSTALLER, THEN SHOW ME THE ERROR!
If you find any mistake or suggest improvements, please, contact me (cupid.rips.hearts#3337) on the BnS Buddy server, using the #support channel.