Quote:
Request Public Chams Source and Super NoSpread & Recoil :)
#define ADR_SUPERNOSPREAD 0x8A69D0Quote:
if (CH1_SuperNoSpread == 1 )
{
WriteMem<double>((void*)ADR_SUPERNOSPREAD, 0);
}
#define OFS_NORECOIL1 0xC444Quote:
if (CH1_NoRecoil==1)
{
*(float*)(xPlayer+OFS_NORECOIL1) = 0;
*(float*)(xPlayer+OFS_NORECOIL2) = 0;
*(float*)(xPlayer+OFS_NORECOIL3) = 0;
}
#define adrHSStub 0x00515926 // write \xEB #define adrHSHandler 0x005E5E53 // write \xC3 #define ofsHsDetection 0x0000A1A0 // write \xC2\x04\x00 #define ofsHsSelfCrc 0x0008523E // write \xC2\x04\x00 #define ofsHsNano 0x000A5EBA // write \xD2
#define adrCqcProne 0x0091BD84 #define adrWeapon1 0x000101EC #define adrWeapon2 0x000101EE #define adrWeapon3 0x000101F0 #define adrD3DUsername 0x00AB0294 #define adrD3DHealth 0x00AB1464 #define adrSpawnTime 0x00B9D220 #define adrFallDamage 0x000102E8 #define adrUnlimitedAmmo 0x00A533F4 #define ofsPremium1 0x0000058C #define ofsPremium2 0x00000590 #define ofsFireDelay 0x00010410 #define ofsInvisible 0x000DF35C #define fWRHSCallback 0x0051549D #define fEngineText 0x00401023 #define fMessageBox 0x0051AE5A
void __stdcall HackShieldByPass ( )
{
DWORD HSModule;
do
{
HSModule = ( int ) GetModuleHandleA ( "EhSvc.dll" );
Sleep( 100 );
}
while ( !HSModule );
DWORD dwOLDProtect;
DWORD dwOLDProtect2;
if ( VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , PAGE_EXECUTE_READWRITE , &dwOLDProtect2 ) )
{
* ( BYTE * ) ( 0x515926 ) = 0xEB;
* ( BYTE * ) ( 0x5E5E53 ) = 0xC3;
VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , dwOLDProtect2 , 0 );
}
else
{
MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect War Rock Memory!" , "HackShield ByPass" , MB_OK ) ;
ExitProcess ( false );
}
if ( VirtualProtect ( ( void * ) HSModule , 0x116000 , 0x04 , &dwOLDProtect ) )
{
* ( BYTE * ) ( HSModule + 0x85CDD ) = 0xC3;
* ( BYTE * ) ( HSModule + 0x0A238 ) = 0xC3;
DWORD srvPtr = * ( DWORD * )ADR_ServerPointer;
if ( srvPtr != 0 )
{
* ( BYTE * ) ( HSModule + 0x402CE ) = 0x31;
* ( BYTE * ) ( HSModule + 0x3D67F ) = 0x31;
}
* ( BYTE * ) ( HSModule + 0xA359E ) = 0xD2;
* ( BYTE * ) ( HSModule + 0x0A238 ) = 0x74;
VirtualProtect ( ( void * ) HSModule , 0x116000 , dwOLDProtect , 0 );
}
else
{
MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect HackShield Memory!" , "HackShield ByPass" , MB_OK ) ;
ExitProcess ( false );
}
}
srsly?Quote:
void __stdcall HackShieldByPass ( )
{
DWORD HSModule;
do
{
HSModule = ( int ) GetModuleHandleA ( "EhSvc.dll" );
Sleep( 100 );
}
while ( !HSModule );
DWORD dwOLDProtect;
DWORD dwOLDProtect2;
if ( VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , PAGE_EXECUTE_READWRITE , &dwOLDProtect2 ) )
{
* ( BYTE * ) ( 0x515926 ) = 0xEB;
* ( BYTE * ) ( 0x5E5E53 ) = 0xC3;
VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , dwOLDProtect2 , 0 );
}
else
{
MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect War Rock Memory!" , "HackShield ByPass" , MB_OK ) ;
ExitProcess ( false );
}
if ( VirtualProtect ( ( void * ) HSModule , 0x116000 , 0x04 , &dwOLDProtect ) )
{
* ( BYTE * ) ( HSModule + 0x85CDD ) = 0xC3;
* ( BYTE * ) ( HSModule + 0x0A238 ) = 0xC3;
DWORD srvPtr = * ( DWORD * )ADR_ServerPointer;
if ( srvPtr != 0 )
{
* ( BYTE * ) ( HSModule + 0x402CE ) = 0x31;
* ( BYTE * ) ( HSModule + 0x3D67F ) = 0x31;
}
* ( BYTE * ) ( HSModule + 0xA359E ) = 0xD2;
* ( BYTE * ) ( HSModule + 0x0A238 ) = 0x74;
VirtualProtect ( ( void * ) HSModule , 0x116000 , dwOLDProtect , 0 );
}
else
{
MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect HackShield Memory!" , "HackShield ByPass" , MB_OK ) ;
ExitProcess ( false );
}
}
Enjoy leeching!
Quote:
Req
ADR_PlayerPointer
#define ADR_PLAYERPOINTER 0x00A5348C
Mach wenigstens Credits darunter wenn es eh schon nicht deiner ist ^^Quote:
Enjoy leeching!Code:void __stdcall HackShieldByPass ( ) { DWORD HSModule; do { HSModule = ( int ) GetModuleHandleA ( "EhSvc.dll" ); Sleep( 100 ); } while ( !HSModule ); DWORD dwOLDProtect; DWORD dwOLDProtect2; if ( VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , PAGE_EXECUTE_READWRITE , &dwOLDProtect2 ) ) { * ( BYTE * ) ( 0x515926 ) = 0xEB; * ( BYTE * ) ( 0x5E5E53 ) = 0xC3; VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , dwOLDProtect2 , 0 ); } else { MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect War Rock Memory!" , "HackShield ByPass" , MB_OK ) ; ExitProcess ( false ); } if ( VirtualProtect ( ( void * ) HSModule , 0x116000 , 0x04 , &dwOLDProtect ) ) { * ( BYTE * ) ( HSModule + 0x85CDD ) = 0xC3; * ( BYTE * ) ( HSModule + 0x0A238 ) = 0xC3; DWORD srvPtr = * ( DWORD * )ADR_ServerPointer; if ( srvPtr != 0 ) { * ( BYTE * ) ( HSModule + 0x402CE ) = 0x31; * ( BYTE * ) ( HSModule + 0x3D67F ) = 0x31; } * ( BYTE * ) ( HSModule + 0xA359E ) = 0xD2; * ( BYTE * ) ( HSModule + 0x0A238 ) = 0x74; VirtualProtect ( ( void * ) HSModule , 0x116000 , dwOLDProtect , 0 ); } else { MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect HackShield Memory!" , "HackShield ByPass" , MB_OK ) ; ExitProcess ( false ); } }