Originally Posted by iCraziE
Updated Dec 18, 2019 : Game Ver : 8.6.5
Zoom:
Code:
{ Game : dekaron.exe
Version:
Date : 2019-10-30
Author : nvadr
This script does blah blah blah
}
define(bytes,F3 0F 10 48 04)
[ENABLE]
aobscan(zoomz,F3 0F 10 48 04 F3 0F 5D 0A F3 0F 10 00 F3 0F 5F C1)
registersymbol(zoomz)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
mov [eax+04],447a0000//42960000
code:
movss xmm1,[eax+04]
jmp return
zoomz:
jmp newmem
return:
[DISABLE]
zoomz:
db bytes
// movss xmm1,[eax+04]
dealloc(newmem)
unregistersymbol(zoomz)
{
// ORIGINAL CODE - INJECTION POINT: 00B71B24
"dekaron.exe"+771B0E: CC - int 3
"dekaron.exe"+771B0F: CC - int 3
"dekaron.exe"+771B10: 55 - push ebp
"dekaron.exe"+771B11: 8B EC - mov ebp,esp
"dekaron.exe"+771B13: 56 - push esi
"dekaron.exe"+771B14: 8B F1 - mov esi,ecx
"dekaron.exe"+771B16: 8B 0D 04 3C 53 01 - mov ecx,[dekaron.exe+1133C04]
"dekaron.exe"+771B1C: 8B 01 - mov eax,[ecx]
"dekaron.exe"+771B1E: FF 50 08 - call dword ptr [eax+08]
"dekaron.exe"+771B21: 8B 55 08 - mov edx,[ebp+08]
// ---------- INJECTING HERE ----------
"dekaron.exe"+771B24: F3 0F 10 48 04 - movss xmm1,[eax+04]
// ---------- DONE INJECTING ----------
"dekaron.exe"+771B29: F3 0F 5D 0A - minss xmm1,[edx]
"dekaron.exe"+771B2D: F3 0F 10 00 - movss xmm0,[eax]
"dekaron.exe"+771B31: F3 0F 5F C1 - maxss xmm0,xmm1
"dekaron.exe"+771B35: F3 0F 11 46 08 - movss [esi+08],xmm0
"dekaron.exe"+771B3A: F3 0F 10 48 0C - movss xmm1,[eax+0C]
"dekaron.exe"+771B3F: F3 0F 5D 4A 04 - minss xmm1,[edx+04]
"dekaron.exe"+771B44: F3 0F 10 40 08 - movss xmm0,[eax+08]
"dekaron.exe"+771B49: F3 0F 5F C1 - maxss xmm0,xmm1
"dekaron.exe"+771B4D: F3 0F 11 46 0C - movss [esi+0C],xmm0
"dekaron.exe"+771B52: F3 0F 10 42 08 - movss xmm0,[edx+08]
}
FarEye:
Code:
{ Game : dekaron.exe
Version:
Date : 2019-10-30
Author : nvadr
This script does blah blah blah
}
define(bytes,F3 0F 10 40 08)
[ENABLE]
aobscan(eyez,F3 0F 10 40 08 F3 0F 11 44 24 0C F3 0F 10 40 04)
registersymbol(eyez)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
mov [eax+08],44fa0000//447a0000
code:
movss xmm0,[eax+08]
jmp return
eyez:
jmp newmem
return:
[DISABLE]
eyez:
db bytes
// movss xmm0,[eax+08]
dealloc(newmem)
unregistersymbol(eyez)
{
// ORIGINAL CODE - INJECTION POINT: 00B72150
"dekaron.exe"+772126: 8B 0D 54 3D 53 01 - mov ecx,[dekaron.exe+1133D54]
"dekaron.exe"+77212C: 66 0F 6E 48 54 - movd xmm1,[eax+54]
"dekaron.exe"+772131: 66 0F 6E 40 58 - movd xmm0,[eax+58]
"dekaron.exe"+772136: 0F 5B C9 - cvtdq2ps xmm1,xmm1
"dekaron.exe"+772139: 8B 01 - mov eax,[ecx]
"dekaron.exe"+77213B: 0F 5B C0 - cvtdq2ps xmm0,xmm0
"dekaron.exe"+77213E: F3 0F 5E C8 - divss xmm1,xmm0
"dekaron.exe"+772142: F3 0F 11 8D 74 FF FF FF - movss [ebp-0000008C],xmm1
"dekaron.exe"+77214A: FF 50 08 - call dword ptr [eax+08]
"dekaron.exe"+77214D: 83 EC 10 - sub esp,10
// ---------- INJECTING HERE ----------
"dekaron.exe"+772150: F3 0F 10 40 08 - movss xmm0,[eax+08]
// ---------- DONE INJECTING ----------
"dekaron.exe"+772155: F3 0F 11 44 24 0C - movss [esp+0C],xmm0
"dekaron.exe"+77215B: F3 0F 10 40 04 - movss xmm0,[eax+04]
"dekaron.exe"+772160: F3 0F 11 44 24 08 - movss [esp+08],xmm0
"dekaron.exe"+772166: F3 0F 10 85 74 FF FF FF - movss xmm0,[ebp-0000008C]
"dekaron.exe"+77216E: F3 0F 11 44 24 04 - movss [esp+04],xmm0
"dekaron.exe"+772174: F3 0F 10 00 - movss xmm0,[eax]
"dekaron.exe"+772178: 8D 45 B8 - lea eax,[ebp-48]
"dekaron.exe"+77217B: F3 0F 11 04 24 - movss [esp],xmm0
"dekaron.exe"+772180: 50 - push eax
"dekaron.exe"+772181: 90 - nop
}
Auto Pots:
Code:
[ENABLE]
aobscan(potz,83 78 08 13 75 5F)
alloc(newmem,$1000)
registersymbol(potz)
label(return)
newmem:
cmp dword ptr [eax+08],01 // checking for HP pot?
db 75 0E
mov dword ptr[eax+08],11 // change to auto pot
mov dword ptr[eax+10],11
check_mana:
cmp dword ptr [eax+08],02 // checking for MP pot?
db 75 0E
mov dword ptr[eax+08],12 // change to auto pot
mov dword ptr[eax+10],12
finished_check:
cmp dword ptr [eax+08],13
jne 00D52BD4 //<--- needs to be udpated...
jmp return
potz:
jmp newmem
nop
return:
[DISABLE]
potz:
//db 83 78 08 13 75 5F
cmp dword ptr [eax+08],13
db 75 5F //jne 00D2F544
unregistersymbol(potz)
dealloc(newmem)
Teleportz:
Code:
[Enable]
aobscan(telez,8B 80 90 00 00 00 C3 CC CC CC CC CC CC)
label(tlblz)
registersymbol(tlblz)
telez:
tlblz:
mov eax,3
nop
ret
[Disable]
tlblz:
mov eax,[eax+00000090]
Wall Hack + No Fog of War:
Code:
{ Game : dekaron.exe]
Version:
Date : 2019-07-26
Author : nvadr
This script does blah blah blah
}
define(address,00F1C0E4) //<--- need to be updated...
define(bytes,0F BA 25 38 98 52 01 01 73 09)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(return)
label(code)
newmem:
bt [01529838],01
jae 00F1C0F7 //<--- need to be updated...
code:
cmp edx,11DC //<--- need to be updated...
jne return
cmp dword ptr [esi+402],5F626577
je return
mov dword ptr [esi+402],5F626577
mov dword ptr [esi+406],67616D69
mov dword ptr [esi+40A],616D2E65
mov dword ptr [esi+40E],00000063
mov dword ptr [esi+965],00000000
jmp return
address:
jmp newmem
nop
nop
nop
nop
nop
return:
[DISABLE]
address:
db bytes
// bt [014F3CF8],01
// jae 00EF78A7
dealloc(newmem)
{3b f8 0f 82 * * * * 83 f9 20 0f 82 * * * *
// ORIGINAL CODE - INJECTION POINT: 00EF7894
"dekaron.exe"+AF7866: 76 08 - jna dekaron.exe+AF7870
"dekaron.exe"+AF7868: 3B F8 - cmp edi,eax
"dekaron.exe"+AF786A: 0F 82 94 02 00 00 - jb dekaron.exe+AF7B04
"dekaron.exe"+AF7870: 83 F9 20 - cmp ecx,20
"dekaron.exe"+AF7873: 0F 82 D2 04 00 00 - jb dekaron.exe+AF7D4B
"dekaron.exe"+AF7879: 81 F9 80 00 00 00 - cmp ecx,00000080
"dekaron.exe"+AF787F: 73 13 - jae dekaron.exe+AF7894
"dekaron.exe"+AF7881: 0F BA 25 14 50 42 01 01 - bt [dekaron.exe+1025014],01
"dekaron.exe"+AF7889: 0F 82 8E 04 00 00 - jb dekaron.exe+AF7D1D
"dekaron.exe"+AF788F: E9 E3 01 00 00 - jmp dekaron.exe+AF7A77
// ---------- INJECTING HERE ----------
"dekaron.exe"+AF7894: 0F BA 25 F8 3C 4F 01 01 - bt [dekaron.exe+10F3CF8],01
// ---------- DONE INJECTING ----------
"dekaron.exe"+AF789C: 73 09 - jae dekaron.exe+AF78A7
"dekaron.exe"+AF789E: F3 A4 - repe movsb
"dekaron.exe"+AF78A0: 8B 44 24 0C - mov eax,[esp+0C]
"dekaron.exe"+AF78A4: 5E - pop esi
"dekaron.exe"+AF78A5: 5F - pop edi
"dekaron.exe"+AF78A6: C3 - ret
"dekaron.exe"+AF78A7: 8B C7 - mov eax,edi
"dekaron.exe"+AF78A9: 33 C6 - xor eax,esi
"dekaron.exe"+AF78AB: A9 0F 00 00 00 - test eax,0000000F
"dekaron.exe"+AF78B0: 75 0E - jne dekaron.exe+AF78C0
}
NonAggro:
Code:
[ENABLE]
aobscan(norange,0F B7 86 61 01 00 00 50 8B 11)
registersymbol(norange)
aobscan(noaggro,0F B6 86 7F 01 00 00 83 C4 04 89 85 24 FF FF FF)
registersymbol(noaggro)
aobscan(aggroret,8B 01 FF 50 0C 8D 8D 24 FF FF FF 51 8B C8 8B 10 FF 52 1C)
registersymbol(aggroret)
alloc(newaggro,2048)
alloc(newrange,1024)
label(return)
noaggro:
jmp newaggro
nop
nop
newaggro:
mov [ebp-000000DC],00
mov [ebp-000000D8],00
mov [ebp-000000D4],00
mov [ebp-000000D0],00
mov [ebp-000000CC],00
mov [ebp-000000C8],00
mov [ebp-000000C4],00
mov [ebp-000000C0],00
mov [ebp-000000BC],00
mov [ebp-000000B8],00
mov [ebp-000000B4],00
mov [ebp-000000B0],00
mov [ebp-000000AC],00
mov [ebp-000000A8],00
mov [ebp-000000A4],00
mov [ebp-000000A0],00
mov [ebp-0000009C],00
mov [ebp-00000098],00
mov [ebp-00000094],00
mov [ebp-00000090],00
mov [ebp-0000008C],00
mov [ebp-00000088],00
mov [ebp-00000084],00
mov [ebp-80],00
mov [ebp-7C],00
mov [ebp-78],00
mov byte ptr [esi+000001F1],00
mov byte ptr [esi+0000017F],00
mov byte ptr [esi+000001B8],00
mov byte ptr [esi+00000263],00
mov byte ptr [esi+000002D5],00
mov byte ptr [esi+0000029C],00
mov byte ptr [esi+000003B9],00
mov byte ptr [esi+000003F2],00
mov byte ptr [esi+0000042B],00
mov byte ptr [esi+00000464],00
mov byte ptr [esi+0000029C],00
mov byte ptr [esi+00000380],00
mov dword ptr [esi+000001F2],00000000
mov dword ptr [esi+00000180],00000000
mov dword ptr [esi+000001B9],00000000
mov dword ptr [esi+00000264],00000000
mov dword ptr [esi+000002D6],00000000
mov dword ptr [esi+0000029D],00000000
mov dword ptr [esi+000003BA],00000000
mov dword ptr [esi+000003F3],00000000
mov dword ptr [esi+0000042C],00000000
mov dword ptr [esi+00000465],00000000
mov dword ptr [esi+0000029D],00000000
mov dword ptr [esi+00000381],00000000
add esp,04
mov ecx,[edi+0C]
jmp aggroret
norange:
jmp newrange
nop
nop
return:
newrange:
mov word ptr [esi+00000161],06
movzx eax,word ptr [esi+00000161]
jmp return
[DISABLE]
noaggro:
movzx eax,byte ptr [esi+0000017F]
norange:
movzx eax,word ptr [esi+00000161]
dealloc(newaggro)
dealloc(newrange)
unregistersymbol(norange)
unregistersymbol(noaggro)
unregistersymbol(aggroret)
BetterVac:
Code:
[ENABLE]
aobscan(vacz,55 8B EC 8B 55 08 8B 42 04 89 41 08 8B 42 08 89 41 0C)
alloc(newvac,$1000)
registersymbol(vacz)
vacz:
jmp newvac
nop
newvac:
push ebp
mov ebp,esp
mov edx,[ebp+08]
mov eax,3E7
mov [ecx+04],eax //explore
mov [ecx+08],eax //persuit
mov [ecx+0C],eax //sight
mov eax,0
mov [ecx+10],eax
mov eax,1
mov [ecx+14],eax //stand
mov eax,7D0
mov [ecx+18],eax //move
mov eax,7D0
mov [ecx+1C],eax //explore_stand
mov eax,1
mov [ecx+20],eax //explore_move
mov [ecx+40],3E7 //followTarget
mov eax,3E7 //spawn monster count
mov [ecx+000000AC],eax
mov eax,1 //spawn monster tick
mov [ecx+000000B0],eax
mov eax,0 //spawn monster range
mov [ecx+000000B4],eax
mov eax,1
mov [ecx+000000B8],eax
pop ebp
ret 4
[DISABLE]
vacz:
db 55 8B EC 8B 55 08
dealloc(newvac)
unregistersymbol(vacz)
MobSpeed:
Code:
[ENABLE]
aobscan(_aMobSpeed,80 7D 08 00 74 07 D9 40 79)
label(_aMobSpeedLabel)
registersymbol(_aMobSpeedLabel)
alloc(DrakoMobSpeedBace,2048)
label(MobIsWalking)
label(MobRunSpeedValue)
label(MobWalkSpeedValue)
label(ReturnMobSpeed)
registersymbol(MobRunSpeedValue)
registersymbol(MobWalkSpeedValue)
DrakoMobSpeedBace:
cmp byte ptr [ebp+08],00
je MobIsWalking
fld dword ptr [MobRunSpeedValue]
pop ebp
ret 0004
MobIsWalking:
fld dword ptr [MobWalkSpeedValue]
pop ebp
ret 0004
MobRunSpeedValue:
db 00 00 60 41
MobWalkSpeedValue:
db 00 00 40 40
_aMobSpeed:
_aMobSpeedLabel:
jmp DrakoMobSpeedBace
nop
ReturnMobSpeed:
[DISABLE]
dealloc(DrakoMobSpeedBace)
unregistersymbol(MobRunSpeedValue)
unregistersymbol(MobWalkSpeedValue)
_aMobSpeedLabel:
cmp byte ptr [ebp+08],00
db 74 07
unregistersymbol(_aMobSpeedLabel)
CharSpeed:
Code:
[ENABLE]
aobscan(_aSpeed,5F 5E D9 40 08)
label(_aSpeedLabel)
registersymbol(_aSpeedLabel)
alloc(newmem,16)
label(ReturnSpeed)
label(SpeedValue)
registersymbol(SpeedValue)
_aSpeed:
_aSpeedLabel:
jmp newmem
ReturnSpeed:
newmem:
pop edi
pop esi
fld dword ptr [SpeedValue]
jmp ReturnSpeed
push esi
push edi
call dword ptr [SpeedValue]
SpeedValue:
db 00 00 D0 40
[DISABLE]
dealloc(newmem)
unregistersymbol(SpeedValue)
_aSpeedLabel:
pop edi
pop esi
fld dword ptr [eax+08]
unregistersymbol(_aSpeedLabel)
Boss Spawn:
Code:
define(address1,005602AE)
[ENABLE]
alloc(newmem1,$1000)
label(code1)
label(return1)
newmem1:
code1:
MOV DWORD PTR DS:[EDI+111],3E4CCCCD //3E99999A old
mulss xmm0,[edi+00000111]
jmp return1
address1:
jmp newmem1
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
return1:
[DISABLE]
address1:
db F3 0F 59 87 11 01 00 00 F3 0F 59 05 98 9F 1F 01
// mulss xmm0,[edi+00000111]
// mulss xmm0,[011F9F98]
dealloc(newmem1)
Pet Attack:
Code:
[enable]
aobscan(petatk1,C7 45 EC 04 00 00 00 FF 50 0C 8B C8 8B 10)
label(pa1)
registersymbol(pa1)
aobscan(petatk2,C7 45 EC 06 00 00 00 FF 50 0C 8B C8 8B 10)
label(pa2)
registersymbol(pa2)
aobscan(petatk3,C7 45 EC 05 00 00 00 FF 50 0C 8B C8 8B 10)
label(pa3)
registersymbol(pa3)
aobscan(petdel1,8B 58 20 8B 06 C7 45 F4 19 00 00 00 C7 45 F8 00 00 00 00)
label(pd1)
registersymbol(pd1)
aobscan(petdel2,8B 58 28 8B 06 C7 45 F4 19 00 00 00 C7 45 F8 00 00 00 00)
label(pd2)
registersymbol(pd2)
aobscan(petdel3,8B 40 30 89 45 0C 8B 06 C7 45 F4 19 00 00 00 C7 45 F8 00 00 00 00)
label(pd3)
registersymbol(pd3)
// 0004 = Tarantula,Tentator - Basic Attack
// 0005 = Aggorance, Basic Range Attack (Best for Arrogance)
// 0006 = Power Range Attack (Also good with Arrogance)
// 0007 = Bregon,Agares,Erigol (Ultimate Range Attack) (Not possible w/ Arrogance)
petdel1:
pd1:
mov ebx,[eax+14]
petatk1:
pa1:
mov [ebp-14],00000007 //change to 4,5,6, or 7 for type of attack.
petdel2:
pd2:
mov ebx,[eax+14]
petatk2:
pa2:
mov [ebp-14],00000007 //change to 4,5,6, or 7 for type of attack.
petdel3:
pd3:
mov eax,[eax+14]
petatk3:
pa3:
mov [ebp-14],00000007 //change to 4,5,6, or 7 for type of attack.
[disable]
pa1:
mov [ebp-14],00000004
pa2:
mov [ebp-14],00000006
pa3:
mov [ebp-14],00000005
pd1:
mov ebx,[eax+20]
mov eax,[esi]
pd2:
mov ebx,[eax+28]
mov eax,[esi]
pd3:
mov eax,[eax+30]
mov [ebp+0C],eax
unregistersymbol(pa1)
unregistersymbol(pa2)
unregistersymbol(pa3)
unregistersymbol(pd1)
unregistersymbol(pd2)
unregistersymbol(pd3)
dealloc(pdel1)
dealloc(pdel2)
dealloc(pdel3)
Auto Pet Attack:
Code:
[ENABLE]
alloc(newmem,420)
label(return)
label(autopet)
registersymbol(autopet)
aobscan(ap,0F B7 86 FE 00 00 00 50 8B 11 FF 52 08 8B 17 8B CF 8B F0)
ap:
autopet:
jmp newmem
nop
nop
return:
newmem:
mov eax,05
mov word ptr [esi+000000FE],ax
movzx eax, word ptr [esi+000000FE]
jmp return
[DISABLE]
autopet:
movzx eax, word ptr [esi+000000FE]
dealloc(newmem)
unregistersymbol(autopet)
Gigantes Pet Attack:
Code:
[enable]
aobscan(petatk1,C7 45 EC 01 00 00 00 FF 50 0C 8B C8 8B 10)
label(pa1)
registersymbol(pa1)
aobscan(petatk2,C7 45 EC 02 00 00 00 FF 50 0C 8B C8 8B 10)
label(pa2)
registersymbol(pa2)
aobscan(petatk3,C7 45 EC 00 00 00 00 FF 50 0C 8B C8 8B 10)
label(pa3)
registersymbol(pa3)
aobscan(petdel1,8B 40 14 89 45 0C 8B 06 FF 50 30 8A 5D 10 83 38 12)
label(pd1)
registersymbol(pd1)
aobscan(petdel2,8B 58 0C 8B 06 FF 50 30 83 38 12 74 25 8B 06 8B CE FF 50 30 83 38 11)
label(pd2)
registersymbol(pd2)
aobscan(petdel3,8B 58 04 8B 06 FF 50 30 83 38 12 74 25 8B 06 8B CE FF 50 30 83 38 11)
label(pd3)
registersymbol(pd3)
// 0004 = Tarantula,Tentator - Basic Attack
// 0005 = Aggorance, Basic Range Attack (Best for Arrogance)
// 0006 = Power Range Attack (Also good with Arrogance)
// 0007 = Bregon,Agares,Erigol (Ultimate Range Attack) (Not possible w/ Arrogance)
petdel1:
pd1:
mov eax,[eax+28]
petatk1:
pa1:
mov [ebp-14],00000003 //change to 4,5,6, or 7 for type of attack.
petdel2:
pd2:
mov ebx,[eax+28]
petatk2:
pa2:
mov [ebp-14],00000003 //change to 4,5,6, or 7 for type of attack.
petdel3:
pd3:
mov ebx,[eax+28]
petatk3:
pa3:
mov [ebp-14],00000003 //change to 4,5,6, or 7 for type of attack.
[disable]
pa1:
mov [ebp-14],00000001
pa2:
mov [ebp-14],00000002
pa3:
mov [ebp-14],00000000
pd1:
mov eax,[eax+14]
pd2:
mov ebx,[eax+0C]
pd3:
mov ebx,[eax+04]
unregistersymbol(pa1)
unregistersymbol(pa2)
unregistersymbol(pa3)
unregistersymbol(pd1)
unregistersymbol(pd2)
unregistersymbol(pd3)
dealloc(pdel1)
dealloc(pdel2)
dealloc(pdel3)
|