Giriş yap
En iyi yollayıcılar
Hello EMO | ||||
EMO | ||||
eMoStyLe | ||||
BesimBICER | ||||
GameKinG | ||||
Crysis | ||||
~>!.DεvιLρяιεsт.!<~ | ||||
MeTaL | ||||
TrueCrime | ||||
djhayal3t |
Istatistikler
Toplam 203 kayıtlı kullanıcımız varSon kaydolan kullanıcımız: crayzboy76
Kullanıcılarımız toplam 1186 mesaj attılar bunda 862 konu
Arama
Sosyal yer imi
Sosyal bookmarking sitesinde Emo, Emo nedir, Emo resimleri, Emo Kıyafetleri, Emo Sözleri, Emo Oyunları, EmoTurkey, Emo Nickler, Emo Avatarları, Punk, Punk Resimleri, Punk Avatarları, Rock, Rock Resimleri, Rock Avatarları, Msn Nickleri, Msn Avatarları, Müzik adresi saklayın ve paylaşın
Sosyal bookmarking sitesinde EMO Style ForumPro - Hos Geldiniz adresi saklayın ve paylaşın
Kimler hatta?
Toplam 2 kullanıcı online :: 0 Kayıtlı, 0 Gizli ve 2 Misafir :: 1 Arama motorlarıYok
Sitede bugüne kadar en çok 217 kişi C.tesi Tem. 29, 2017 1:46 am tarihinde online oldu.
En son konular
Reklam
Code Source PB [PointBlank]
1 sayfadaki 1 sayfası
Code Source PB [PointBlank]
[QUOTE=CaPeVaLdOfOrMiNiOn;3447097][SIZE="3"]Google translation... Sorry I Brazilian
1. Make a DLL in C Project in devcpp
2. Save all files all
3. Create a file named addys.h
4. Change name:
dllmain.c -> cbase2.c
dll.h -> cbase2.h
5. Fill with the following code:
cbase2.c
7. Click Execute | Rebuild All
8. Make sure there are no errors, try to inject etc which ye made to the PB
9. Making DLL Hack Done!
NB: If you are not working etc. please run the RCD Logger 3 and c & p again offsets that have been found, if you've detected, etc. Try changing the code that is in part:
- Loop (InitAllHacks)
- Memory editing (MEMpatch)
- Hook (Loop, GetAsyncKeyState, CreateThread, et al)
Hook that has been detected Hackshield usually occurs in the Loop, is:
- GetAsyncKeyState to call the function ex:
i f (GetAsyncKeyState (VK_F12) & 1)
{
MajorMissionHack ();
Sleep (500);
}
And also
if (:: GetAsyncKeyState (VK_F12) & 1) DoMisiMayorHack ();
1. Make a DLL in C Project in devcpp
2. Save all files all
3. Create a file named addys.h
4. Change name:
dllmain.c -> cbase2.c
dll.h -> cbase2.h
5. Fill with the following code:
cbase2.c
- Kod:
#include "cbase2.h"
#include "addys.h"
LPTSTR i3engine = "PointBlank.i3Exec"; // handle PointBlank.i3Exec
DWORD adrWSOn, adrWSOff, OldProtection; // deklarasi variabel
BYTE RET[] = {0xC3}; //deklarasi byte untuk RET
BYTE PUSH_EBP[]= {0x55}; //deklarasi byte untuk PUSH_EBP
/*
Karena memwrite sudah terdeteksi HACKSHIELD, maka saya berupaya membuatkan
fungsi alternative selain memwrite dan undetected bernama MEMpatch
*/
//Check Apakah address tersebut di protect ?
void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &OldProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
VirtualProtect((void *)Offset, Length, OldProtection, &OldProtection); // protect lagi address tsb biar gk kena satpam
}
// Lakukan patch terhadap memory
void MEMpatch( BYTE *Offset, BYTE *ByteArray, DWORD Length){
UnProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);
}
DWORD WINAPI InitAllHacks(LPVOID param) // thread telah dipatch. undetected 6 desember 2010
{
while (1) { // jika thread telah aktif
if (GetAsyncKeyState(VK_INSERT)&1) { // jika hotkey ditekan.
DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT;
MEMpatch((BYTE*)adrWSOn, RET, sizeof(RET)); // lakukan hack terhadap memory
MessageBeep(1); // Beritahukan jika cheat telah sukses di eksekusi
}
}
if (GetAsyncKeyState(VK_DELETE)&1) { // jika hotkey ditekan.
DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT;
MEMpatch((BYTE*)adrWSOff, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
MessageBeep(1); // Beritahukan jika Hack telah sukses di eksekusi
}
}
Sleep(10); // jeda untuk menghindari overheat / kelebihan beban
}
return (0); // kembalikan nilai ke 0 agar thread menjadi loop selama-nya
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
DisableThreadLibraryCalls(hDll); // mencegah boros memori. SAVE Resource <img src="http://s0.wp.com/wp-includes/images/smilies/icon_biggrin.gif?m=1218663747g" alt=":D" class="wp-smiley">
if (dwReason == DLL_PROCESS_ATTACH) { // jika dll ter-attach
MessageBox, MB_OK | MB_ICONINFORMATION); // berikan salam pembuka jika dll telah ter-attach ke PROCESS
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)InitAllHacks, 0, 0, 0); // jalanin thread-nya
}
return TRUE; // mencoba berulang kali sampai thread ter-attach
}
- Kod:
# Ifndef __RCD_BASE2_H
# Define __RCD_BASE2_H
# Define WIN32_LEAN_AND_MEAN / / Exclude rarely-Used stuff from Windows headers
# Include
DWORD WINAPI InitAllHacks ( LPVOID param);
# Endif
7. Click Execute | Rebuild All
8. Make sure there are no errors, try to inject etc which ye made to the PB
9. Making DLL Hack Done!
NB: If you are not working etc. please run the RCD Logger 3 and c & p again offsets that have been found, if you've detected, etc. Try changing the code that is in part:
- Loop (InitAllHacks)
- Memory editing (MEMpatch)
- Hook (Loop, GetAsyncKeyState, CreateThread, et al)
Hook that has been detected Hackshield usually occurs in the Loop, is:
- GetAsyncKeyState to call the function ex:
i f (GetAsyncKeyState (VK_F12) & 1)
{
MajorMissionHack ();
Sleep (500);
}
And also
if (:: GetAsyncKeyState (VK_F12) & 1) DoMisiMayorHack ();
CREDIT:
RCD and CaPeVaLdOfOrMiNiOn
[/SIZE][/QUOTE]RCD and CaPeVaLdOfOrMiNiOn
EMO- EMO Team
- Cinsiyet :
Burçlar :
Mesaj Sayısı : 184
Puan : 247393
Rep Puanı : 5
Doğum tarihi : 28/11/89
Kayıt tarihi : 18/05/11
Yaş : 34
Nerden : EMO world
İş/Hobiler : RCE Student / Game Hacking / Learn Beginner C#,C++,Delphi
Lakap : EMO
Similar topics
» Code Source PB [PointBlank]
» [Source C++ 1.15] Uhack Source code
» [Source Code] C# WriteProcessMemory/ReadProcessMemory
» Old MapleStory Bot source code
» [C#]Sharecash Reflector[C#][Source Code]
» [Source C++ 1.15] Uhack Source code
» [Source Code] C# WriteProcessMemory/ReadProcessMemory
» Old MapleStory Bot source code
» [C#]Sharecash Reflector[C#][Source Code]
1 sayfadaki 1 sayfası
Bu forumun müsaadesi var:
Bu forumdaki mesajlara cevap veremezsiniz
Cuma Ağus. 29, 2014 8:33 am tarafından Hello EMO
» goldenchase.net maden yaparak para kazanma
Cuma Ağus. 29, 2014 8:18 am tarafından Hello EMO
» etichal hacker görsel egitim seti
Çarş. Ağus. 06, 2014 4:57 am tarafından Hello EMO
» KO TBL Source C#
Ptsi Ara. 09, 2013 6:36 am tarafından Hello EMO
» x86 Registers
C.tesi Ağus. 24, 2013 5:02 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de WYD
Çarş. Tem. 10, 2013 7:25 am tarafından Hello EMO
» [Tutorial] Pegando Address, Pointers de CS Metodo²
Çarş. Tem. 10, 2013 7:23 am tarafından Hello EMO
» [Tutorial] Aprendendo basico deASM OLLYDBG
Çarş. Tem. 10, 2013 7:22 am tarafından Hello EMO
» Basic C# DLL injector
Ptsi Tem. 08, 2013 7:48 am tarafından Hello EMO