EMO Style ForumPro - Hos Geldiniz
Code Source PB [PointBlank] Uyeols10

Join the forum, it's quick and easy

EMO Style ForumPro - Hos Geldiniz
Code Source PB [PointBlank] Uyeols10
EMO Style ForumPro - Hos Geldiniz
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Giriş yap

Şifremi unuttum

Istatistikler
Toplam 203 kayıtlı kullanıcımız var
Son kaydolan kullanıcımız: crayzboy76

Kullanıcılarımız toplam 1186 mesaj attılar bunda 862 konu
Tarıyıcı
 Kapı
 Indeks
 Üye Listesi
 Profil
 SSS
 Arama
Arama
 
 

Sonuç :
 


Rechercher çıkıntı araştırma

RSS akısı


Yahoo! 
MSN 
AOL 
Netvibes 
Bloglines 


Anahtar-kelime

kutu  pointer  loot  

Kimler hatta?
Toplam 2 kullanıcı online :: 0 Kayıtlı, 0 Gizli ve 2 Misafir :: 1 Arama motorları

Yok

[ Bütün listeye bak ]


Sitede bugüne kadar en çok 217 kişi C.tesi Tem. 29, 2017 1:46 am tarihinde online oldu.
En son konular
» İnternetten Para Kazandıran Oyun ! Ödeme Alt Limiti Yok ! DEV KONU
Code Source PB [PointBlank] I_icon_minitimeCuma Ağus. 29, 2014 8:33 am tarafından Hello EMO

» goldenchase.net maden yaparak para kazanma
Code Source PB [PointBlank] I_icon_minitimeCuma Ağus. 29, 2014 8:18 am tarafından Hello EMO

» etichal hacker görsel egitim seti
Code Source PB [PointBlank] I_icon_minitimeÇarş. Ağus. 06, 2014 4:57 am tarafından Hello EMO

» KO TBL Source C#
Code Source PB [PointBlank] I_icon_minitimePtsi Ara. 09, 2013 6:36 am tarafından Hello EMO

» x86 Registers
Code Source PB [PointBlank] I_icon_minitimeC.tesi Ağus. 24, 2013 5:02 am tarafından Hello EMO

» [Tutorial] Pegando Address, Pointers de WYD
Code Source PB [PointBlank] I_icon_minitimeÇarş. Tem. 10, 2013 7:25 am tarafından Hello EMO

» [Tutorial] Pegando Address, Pointers de CS Metodo²
Code Source PB [PointBlank] I_icon_minitimeÇarş. Tem. 10, 2013 7:23 am tarafından Hello EMO

» [Tutorial] Aprendendo basico deASM OLLYDBG
Code Source PB [PointBlank] I_icon_minitimeÇarş. Tem. 10, 2013 7:22 am tarafından Hello EMO

» Basic C# DLL injector
Code Source PB [PointBlank] I_icon_minitimePtsi Tem. 08, 2013 7:48 am tarafından Hello EMO

Reklam

Code Source PB [PointBlank]

Aşağa gitmek

Code Source PB [PointBlank] Empty Code Source PB [PointBlank]

Mesaj tarafından EMO Çarş. Haz. 01, 2011 8:56 am

[QUOTE=CaPeVaLdOfOrMiNiOn;3447097][SIZE="3"]Google translation... Sorry I Brazilian

1. Make a DLL in C Project in devcpp
2. Save all files all
3. Create a file named addys.h
4. Change name:
dllmain.c -> cbase2.c
dll.h -> cbase2.h
5. Fill with the following code:

cbase2.c
Kod:
#include "cbase2.h"

#include "addys.h"

LPTSTR i3engine = "PointBlank.i3Exec"; // handle PointBlank.i3Exec

DWORD adrWSOn, adrWSOff, OldProtection; // deklarasi variabel

BYTE RET[] = {0xC3}; //deklarasi byte untuk RET

BYTE PUSH_EBP[]= {0x55}; //deklarasi byte untuk PUSH_EBP

/*

Karena memwrite sudah terdeteksi HACKSHIELD, maka saya berupaya membuatkan

fungsi alternative selain memwrite dan undetected bernama MEMpatch

*/

//Check Apakah address tersebut di protect ?

void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){

VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &OldProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect

RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch

VirtualProtect((void *)Offset, Length, OldProtection, &OldProtection); // protect lagi address tsb biar gk kena satpam

}

// Lakukan patch terhadap memory

void MEMpatch( BYTE *Offset, BYTE *ByteArray, DWORD Length){

UnProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);

}

DWORD WINAPI InitAllHacks(LPVOID param) // thread telah dipatch. undetected 6 desember 2010

{

      while (1) { // jika thread telah aktif

        if (GetAsyncKeyState(VK_INSERT)&1) { // jika hotkey ditekan.

            DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec

            if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe

                adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT;

                MEMpatch((BYTE*)adrWSOn, RET, sizeof(RET)); // lakukan hack terhadap memory

                MessageBeep(1); // Beritahukan jika cheat telah sukses di eksekusi

                    }

            }

        if (GetAsyncKeyState(VK_DELETE)&1) { // jika hotkey ditekan.

                DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec

                if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe

                adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT;

                MEMpatch((BYTE*)adrWSOff, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory

                MessageBeep(1); // Beritahukan jika Hack telah sukses di eksekusi

                    }

            }

        Sleep(10); // jeda untuk menghindari overheat / kelebihan beban

    }

    return (0); // kembalikan nilai ke 0 agar thread menjadi loop selama-nya

}

BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )

{

    DisableThreadLibraryCalls(hDll); // mencegah boros memori. SAVE Resource <img src="http://s0.wp.com/wp-includes/images/smilies/icon_biggrin.gif?m=1218663747g" alt=":D" class="wp-smiley">

    if (dwReason == DLL_PROCESS_ATTACH) { // jika dll ter-attach
        MessageBox, MB_OK | MB_ICONINFORMATION); // berikan salam pembuka jika dll telah ter-attach ke PROCESS
          CreateThread(0, 0, (LPTHREAD_START_ROUTINE)InitAllHacks, 0, 0, 0); // jalanin thread-nya
    }

    return TRUE; // mencoba berulang kali sampai thread ter-attach
 }
cbase2.h
Kod:
# Ifndef __RCD_BASE2_H

# Define __RCD_BASE2_H

# Define WIN32_LEAN_AND_MEAN / / Exclude rarely-Used stuff from Windows headers

# Include

DWORD WINAPI InitAllHacks ( LPVOID param);

# Endif
6. Run RCDLogger 3.0 and c & p addys that have been found to file "addys.h"
7. Click Execute | Rebuild All
8. Make sure there are no errors, try to inject etc which ye made to the PB
9. Making DLL Hack Done!

NB: If you are not working etc. please run the RCD Logger 3 and c & p again offsets that have been found, if you've detected, etc. Try changing the code that is in part:
- Loop (InitAllHacks)
- Memory editing (MEMpatch)
- Hook (Loop, GetAsyncKeyState, CreateThread, et al)
Hook that has been detected Hackshield usually occurs in the Loop, is:
- GetAsyncKeyState to call the function ex:
i f (GetAsyncKeyState (VK_F12) & 1)
{
MajorMissionHack ();
Sleep (500);
}
And also
if (:: GetAsyncKeyState (VK_F12) & 1) DoMisiMayorHack ();

CREDIT:

RCD and CaPeVaLdOfOrMiNiOn
[/SIZE]
[/QUOTE]
EMO
EMO
EMO Team
EMO Team

Cinsiyet : Erkek
Burçlar : Yay
Yılan
Mesaj Sayısı : 184
Puan : 247393
Rep Puanı : 5
Doğum tarihi : 28/11/89
Kayıt tarihi : 18/05/11
Yaş : 34
Nerden : EMO world
İş/Hobiler : RCE Student / Game Hacking / Learn Beginner C#,C++,Delphi
Lakap : EMO

Sayfa başına dön Aşağa gitmek

Sayfa başına dön

- Similar topics

 
Bu forumun müsaadesi var:
Bu forumdaki mesajlara cevap veremezsiniz