function like this
void STW ()
{
like that
void STW ()
{
like that
Ich bin mit den Valuen unso nicht einverstanden aber hier :Quote:
Wtw is double and value 0.
Stw is float and value 900(or sth. like that)
if(CH_ZOPK1 == 1){
for(int i = 4; i < 32; i++) // Blind
{
CPlayer* pPlayerA = g_pBase->player[i];
pPlayerA->x=3794.131836;//Zombie
pPlayerA->y=4275.052246;//Zombie
pPlayerA->z=104.565598;//Zombie
}
}
if(CH_ZOPK2 == 1){
for(int i = 4; i < 32; i++) // Blind
{
CPlayer* pPlayerA = g_pBase->player[i];
pPlayerA->x=3312.98;//Zombie
pPlayerA->y=3309.46;//Zombie
pPlayerA->z=485.178;//Zombie
}
}
warum schreibste das doppelt:Quote:
kein kommentar
Code:if(CH_ZOPK1 == 1){ for(int i = 4; i < 32; i++) // Blind { CPlayer* pPlayerA = g_pBase->player[i]; pPlayerA->x=3794.131836;//Zombie pPlayerA->y=4275.052246;//Zombie pPlayerA->z=104.565598;//Zombie } } if(CH_ZOPK2 == 1){ for(int i = 4; i < 32; i++) // Blind { CPlayer* pPlayerA = g_pBase->player[i]; pPlayerA->x=3312.98;//Zombie pPlayerA->y=3309.46;//Zombie pPlayerA->z=485.178;//Zombie } }
i already do that before you can post...Quote:
Ich bin mit den Valuen unso nicht einverstanden aber hier :
void STW ()
{
*(float*)mem_stw=900;
}
void WTW ()
{
*(double*)mem_wtw=0;
}
So sollte es dann deiner Beschreibung nach aussehen xD
HackShield Latest Version Released By AHNLab Destroyed.
__declspec(naked) void __cdecl PatchHS1(int v1, long v2, char* v3)
{
//restoring original code
__asm
{
push ebp;
mov ebp, esp;
sub esp, 140;
push edi;
mov edi, v1;
push ebx;
mov ebx, v2;
push esi;
mov v3, esi;
pushad;
mov eax, dword ptr ds:[esp*4];
cmp eax, 0x1000055 //10705
je detect1;
cmp eax, 0x1000181 //10501
je detect2;
pop edi;
pop ebx;
pop esi;
popad;
jmp [oLocation1];
}
detect1:
pop edi;
pop ebx;
pop esi;
popad;
jmp [oLocation1];
detect2:
pop edi;
pop ebx;
pop esi;
popad;
jmp [oLocation1];
}
}
char* String1 = "AHNHS_CRC32MD5_EXECUTABLE_";
char* String2 = "AHNHS_CRC32MD5_EHSVCMODULE_";
char* String3 = "AHNHS_VMT_BACKUP_TABLE_";
__declspec(naked) void __cdecl PatchHS2(int v1, long v2, int v4, char* v5/*Request*/, int v6)
{
//restoring original code
__asm
{
push ebp;
mov ebp, esp;
sub esp, 360;
pushad;
push esi;
mov v1, esi;
push eax;
mov v2, eax;
push edi;
mov v4, edi;
push ebx;
mov v5, ebx;
mov[v6], 0; //always 0 or detection;
cmp v5, String1;
je Jumpback;
cmp v5, String2;
je Jumpack;
cmp v5, String3;
je Jumpback;
popad
pop eax;
pop edi;
pop ebp;
jmp [oLocation2];
}
Jumpback:
__asm
{
popad
pop eax;
pop edi;
pop ebp;
jmp [oLocation2];
}
}
bool bPatchNotWrited = true;
void HSBypass_RunPatch()
{
for(;;)
{
DWORD hEhSvc = (long)GetModuleHandleA("EHSvc.dll");
if(hEhSvc !=0)
{
if(bPatchNotWrited)
{
DetourFunction((PBYTE)(hEhSvc + 0x1A520), (PBYTE)PatchHS1);
DetourFunction((PBYTE)(hEhSvc + 0x1A980), (PBYTE)PatchHS2);
bPatchNotWrited = false;
}
}
Sleep(1000);
}
}
...
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)HSBypass_RunPatch, 0, 0, 0);
Quote:
Der folgende Code wurde von DR.PHP geleeched!
Er ist nicht von mir!
Angeblich ist es der HS-Bypass von King7 (akutelle Version)
Ich würde gerne die Meinung von ein paar Coder dazu hören!
PHP Code:HackShield Latest Version Released By AHNLab Destroyed.
__declspec(naked) void __cdecl PatchHS1(int v1, long v2, char* v3)
{
//restoring original code
__asm
{
push ebp;
mov ebp, esp;
sub esp, 140;
push edi;
mov edi, v1;
push ebx;
mov ebx, v2;
push esi;
mov v3, esi;
pushad;
mov eax, dword ptr ds:[esp*4];
cmp eax, 0x1000055 //10705
je detect1;
cmp eax, 0x1000181 //10501
je detect2;
pop edi;
pop ebx;
pop esi;
popad;
jmp [oLocation1];
}
detect1:
pop edi;
pop ebx;
pop esi;
popad;
jmp [oLocation1];
detect2:
pop edi;
pop ebx;
pop esi;
popad;
jmp [oLocation1];
}
}
char* String1 = "AHNHS_CRC32MD5_EXECUTABLE_";
char* String2 = "AHNHS_CRC32MD5_EHSVCMODULE_";
char* String3 = "AHNHS_VMT_BACKUP_TABLE_";
__declspec(naked) void __cdecl PatchHS2(int v1, long v2, int v4, char* v5/*Request*/, int v6)
{
//restoring original code
__asm
{
push ebp;
mov ebp, esp;
sub esp, 360;
pushad;
push esi;
mov v1, esi;
push eax;
mov v2, eax;
push edi;
mov v4, edi;
push ebx;
mov v5, ebx;
mov[v6], 0; //always 0 or detection;
cmp v5, String1;
je Jumpback;
cmp v5, String2;
je Jumpack;
cmp v5, String3;
je Jumpback;
popad
pop eax;
pop edi;
pop ebp;
jmp [oLocation2];
}
Jumpback:
__asm
{
popad
pop eax;
pop edi;
pop ebp;
jmp [oLocation2];
}
}
bool bPatchNotWrited = true;
void HSBypass_RunPatch()
{
for(;;)
{
DWORD hEhSvc = (long)GetModuleHandleA("EHSvc.dll");
if(hEhSvc !=0)
{
if(bPatchNotWrited)
{
DetourFunction((PBYTE)(hEhSvc + 0x1A520), (PBYTE)PatchHS1);
DetourFunction((PBYTE)(hEhSvc + 0x1A980), (PBYTE)PatchHS2);
bPatchNotWrited = false;
}
}
Sleep(1000);
}
}
...
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)HSBypass_RunPatch, 0, 0, 0);
Quote:
welche Meinungen z.b. das man auf dem ersten blick sieht das der Code Unvollständigkeit ist^^ oder was meinst du :D
Ich habe noch nie so richtig mit HS-Bypass gearbeitet :DQuote:
Der Code enthält viele Fehler.