Getting Started
Learn how to request files, variables, user data or send webhooks within your programs loaded by users.
It is mandatory for any startup app to check whether the client has a valid SessionID. This ensures integrity and protects your apps from bad actors.
The DTC.ZONE Bootstrapper will load your Startup App and start it with the following parameters:
struct sessionData
{
char sessionID[20] = {};
char appID[20] = {};
char SSLKey[60] = {};
};
int EntryPoint(int argc, char* argv[]) {
// the first arguent holds a pointer to a memory region with data
sessionData* data = reinterpret_cast<sessionData*>(std::stoull(argv[1]));
printf("sesionID: %s\n", data->sessionID);
printf("appID: %s\n", data->appID);
printf("SSLKey: %s\n", data->SSLKey);
...
// after saving the data somewhere else, CLEAR THE MEMORY
memset(data, 0, sizeof(sessionData));
}
The API Key will not be passed over, please keep it secure in your application.
You can download the source code from one of our team members.
Source Code contains precompiled libraries. Check out Compiling static curl and Compiling static crypto++ if you want to compile them yourself (but it's not needed).
Including the Project into your Solution
You can either write your program within the solution or copy over the libraries and files to your project. The main.cpp file can be excluded, it is there for examples.
Keep in mind, you have to define CURL_STATICLIB as a Preprocessor Definition at Properties->C/C++->Preprocessor->Preprocessor Definitions if you decide to copy over all files to your project.
Your existing Project should NOT rely on any third party DLLs or files if you want to use it as a Start App! The Bootstrapper will not be able to locate the DLLs and your program will crash! Third party libraries have to be linked Statically or bundled with XBundler (Themida), so everything in one executable!
Obfuscation / Protection support
While obfuscators such as Themida or VMProtect are supported, you have to disable the following:
- Themida:
- Anti-File patching has to be turned OFF
- Anti-Sandbox has to be turned OFF
- VMProtect:
- Memory Protection has to be turned OFF
- Debugger detection has to be turned OFF
- Strip Relocation has to be turned OFF
Other custom protectors are not supported or tested. If you still want to use them, disable similar settings. All other default settings should run fine.
Due to our binary loading and making sure your program is protected against dumpers, please disable any types of protection that integrity check the binary or have anti tamper checks.
Applications that rely on specific manifests (e.g a specific Windows DLL specified in the manifest) may not be compatible.
Support for TLS callbacks and exception handling exists.
Due to the operational behavior of Anti-Cheat, Anti-Tamper, and Antivirus software, it is strongly discouraged to run the Start App while such programs are active. Doing so may trigger false positives or interfere with user experience.
We highly recommend including only minimal startup logic within the Start App and launching your main executable from a separate location.
Please note that the Bootstrapper is not intended as a bypass mechanism. Its purpose is to prevent critical application code from being stored on disk, thereby mitigating risks of modification or tampering by end users.