i suggest proxy+analyzer. it s so easy.
Not everyone :xQuote:
Yeah, that's how everyone probably does it for C->S opcodes. For those who don't know how to get them anyway, here are binary strings for some most used C->S opcodes (I guess they haven't changed) :
Visual Studio 2008 express edition does not support the GUI editing features that Visual Studio 2008 has. You have to either not use GUIs, create your own GUI through the Win32 API instead, or "upgrade" to Visual Studio 2008.Quote:
im tired of that creepy errors. there s no Resource in my Add list.
nice oneQuote:
And since this has mostly been done manually by everyone before and since a few weeks have passed after the last update, no real harm can be done by posting this I guess:
[Only registered and activated users can see links. Click Here To Register...]
// The location of the hook // Binary Search pattern for Olly: 8B 11 8B 42 2C 57 // MOV EDX,[ECX] // MOV EAX,[EDX+2C] <- Patch // PUSH EDI #define SEND_HOOK 0x7418A2
Quote:
// The location of the hook
// Binary Search pattern for Olly: 8B 11 8B 42 2C 57
CPU Disasm Address Hex dump Command Comments 0082D081 |. 8B11 MOV EDX,DWORD PTR DS:[ECX] 0082D083 |. 8B42 2C MOV EAX,DWORD PTR DS:[EDX+2C] 0082D086 |. 57 PUSH EDI