That my friend is called skiddinglooking through sources has kind of helped me understand but not really help much
There isnt a specific way you find bypasses. You just do goofy shit until smth worksCan anyone help me understand the basics of making bypasses, like what common things should I be doing etc, any help would be appreciated
isnt skidding actually using the code tho, i didnt use the code i was using it as learning tool to see if there was any common things i should be doing instead of just copy and pastingThat my friend is called skidding
This is not skidding, it would be if he would implement the code or the idea itself into his client.hat my friend is called skidding
As dumb as it sounds try this:There isnt a specific way you find bypasses. You just do goofy shit until smth works
dont mind this retard, its totally fine to look at source any try to learn from it.isnt skidding actually using the code tho, i didnt use the code i was using it as learning tool to see if there was any common things i should be doing instead of just copy and pasting
How do you make a fly as legit as possible.This is not skidding, it would be if he would implement the code or the idea itself into his client.
As dumb as it sounds try this:
Make it as legit as possible -> Make it less and less legit until it flags -> Reverse until it doesn't flag and isn't legit -> if it is better than a normal legit keep it and call it a bypass
(This will help you understand basics at least of creating bypasses. Try to bypass shit ACs at first)
this one ^Make it as legit as possible -> Make it less and less legit until it flags -> Reverse until it doesn't flag and isn't legit -> if it is better than a normal legit keep it and call it a bypass
don’t really think a fly is what he meant. The explanation was quite alrightHow do you make a fly as legit as possible.
That doesn't really apply to everything
doesnt sound that dumb tbh, i will try thisThis is not skidding, it would be if he would implement the code or the idea itself into his client.
As dumb as it sounds try this:
Make it as legit as possible -> Make it less and less legit until it flags -> Reverse until it doesn't flag and isn't legit -> if it is better than a normal legit keep it and call it a bypass
(This will help you understand basics at least of creating bypasses. Try to bypass shit ACs at first)