FAQ
Last updated
Last updated
After purchase, please go to our Store and login under https://persa.sellsn.io/profile , then you will see all your purchased products. Here click on the product you wanna see the infos and then everything shows up such as Downloadlink, Licence Key and Order ID.
Cheat tools are often detected as viruses because of how they behave and how they are packaged, not simply because they are .exe
files. Here's why:
Cheat tools interact with processes, modify memory, or inject code into other applications—actions that are similar to those of malware like keyloggers or trojans.
Anti-virus software flags such behavior as suspicious, even if the tool isn't harmful.
To avoid detection by anti-cheat systems, cheat developers use obfuscation or packing methods (e.g., UPX, Themida).
These techniques are also commonly used by malware, leading to false positives.
Anti-virus programs use heuristics to analyze unknown files. Cheats often perform actions like reading/writing memory, which are flagged as potentially harmful.
Cheat tools aren't signed with trusted certificates, so anti-virus systems consider them untrustworthy.
Rare or newly distributed .exe
files are automatically flagged as suspicious.
Cheat tools trigger anti-virus detection because their behavior mimics malware, and they often lack proper signing or use techniques that resemble those of malicious software.
The difference between internal and external cheats lies in how they interact with the game process:
Internal Cheats:
These are injected directly into the game’s process, usually using a DLL (Dynamic Link Library).
They have direct access to the game’s memory and can manipulate the game in real time.
Internal cheats are faster and more efficient because they operate within the game’s code.
Examples: Aimbots, ESP (wallhacks/Outlines), or modifying game logic.
External Cheats:
These run as a separate program outside the game’s process.
They read and sometimes write to the game’s memory from outside, often using APIs like ReadProcessMemory
or WriteProcessMemory
.
External cheats are generally safer to use because they don’t require injecting code into the game, but they may be slower.
Examples: Radar hacks or simple auto-clickers.
The difference between Temp Spoofers, Perm Spoofers, and Anti-Cheat (AC) Blockers lies in their functionality and how they interact with anti-cheat systems. Here's an explanation:
Purpose: Temporarily changes your hardware identifiers (HWIDs) like serial numbers, MAC addresses, etc.
Usage: Effective only while active. Once you restart your system or stop the spoofer, the original HWIDs return.
Advantages:
Useful for bypassing bans without permanently altering hardware.
Safer and less intrusive for short-term use.
Disadvantages:
Must be reapplied every time you play.
Can be detected if poorly designed.
Purpose: Permanently modifies hardware identifiers at the firmware or system level.
Usage: The spoofed HWIDs remain even after system reboots.
Advantages:
Long-term solution for bypassing bans.
No need to reapply before every session.
Disadvantages:
Risky—permanent changes can damage hardware if done incorrectly.
Harder to reverse (requires flashing firmware or system resets).
Purpose: Prevents the anti-cheat software from detecting cheats or spoofers.
Usage: Blocks or disrupts the anti-cheat system’s processes, making it blind to suspicious activities.
Advantages:
Essential for running cheats or spoofers undetected.
Can significantly reduce ban risks if well-developed.
Disadvantages:
High detection risk if poorly coded.
Some anti-cheats have countermeasures to detect and block these tools.
Inbuilt Unlock-All Tools in internal cheats are generally considered riskier compared to standalone Unlock-All tools because of the way they function and interact with the game. Here's why:
Inbuilt Unlock-All Tools in internal cheats are riskier because they are always active within the game’s memory, making them more visible to anti-cheats. If the cheat is detected, all features, including Unlock-All, are flagged.
Standalone Unlock-All Tools are safer as they work independently, often only running briefly to unlock items. This one-time interaction makes them harder to detect and less tied to cheat bans.
Before you join a match, set up at least 2 Classes with all default weapons. No any attachment/camos/ blueprints.
alternatively, setup your Blueprints in Warzone instead! This has worked for multiple people, even with store blueprints and custom attachments.
Start a match.
Press Esc, Click Classes, Click the Second Class that with default weapons, Press R, Select the blueprints that you saved, Go back to game menu, Click Classes again, Get your blueprints!
Due to game bug you need to repeat all steps every game. (Level 15 is still needed.)
Remember Change Classes to Default Weapons every time match is over. This is what we can do so far.
Note:
You cannot change any attachments from store blueprints, you can only use store blueprints as original.
Perm Bans/Shadow Bans/HWID Bans/Flag
Cheat Detection:
Before we get into this we need to understand what a cheat being detected means when a cheat gets detected all users will be permanently banned. It will not be just you so please don't throw this work around in cheat servers as this word holds alot of value and reputation for a cheat provider. Remember aswell you are cheating in a game with an anti-cheat expect to be banned/shadowbanned.
Permanent Ban:
This means that account is gone kiss it goodbye there could be any amount of reasons that you could have been permanently banned i.e. You not spoofing correctly while hwid banned and going to play the game, a cheat gets detected, you get manually banned or you were just cheating to much and they gave you the harshest punishment.
Shadow Ban/LIMITED MATCHMAKING:
This means that you will not be able to play the game for 1-2 weeks usually gets lifted between 7-14 days THERE IS NO WAY TO UNSHADOWBAN AN ACC you just need to wait till they finish reviewing your account or we unlink your shadowbanned account.
Reasons for limited matchmaking:
Extreme or Repeated Violations
Spoofing
Circumventing Security
Cheating/Modding/Hacking
Pirated Content
Unsupported Peripheral Devices and Applications
Boosting
Glitching
Offensive Behaviour
Griefing
Improperly Obtained DLC
Decompiling or Reverse Engineering of Game Data
Malicious Reporting