You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To be honest i wrote this somewhen in 2018-2019 and lose any interest in cheating many years ago (and not using Windows anymore). But i google Shtreeba from time to time and i see that people still recommend it on UC/reddit even in 2023. So i think it still work like before. Injector using techniques which just can’t be detected during injecting time by user-level anticheat, which is what VAC is. During development my goal was to get 0 VirusTotal detections for both UI and Library (that’s why they separated), in other words, so that it does not seem suspicious even to the trashiest Chinese antivirus, which swears even at an empty Visual Studio project (not true in 2023 - now it detected as “malicious”, but still only by a few noname antiviruses).
But keep in mind, right after injecting VAC will detect that there is new locations at csgo.exe process memory. All traces of Shtreeba will be cleaned at this moment, but VAC will start to analyze what new appeared in memory and if your cheat detected - you are caught. I doubt this can be avoid since obsoletion of VAC Bypass.
And although I doubt that such deliberately minimalistic code can be signatured at all, I highly recommend to not using precompiled Github release from 2021, but clone this repository and compile it by yourself on your own PC using latest available Visual Studio and Windows SDK to get your individual binary release, which I hope will give you a 99.8% chance of going undetected.
hi, can someone answer me regarding about the question? thank you! :D
The text was updated successfully, but these errors were encountered: