WarRock - Pointer und Offsets

04/27/2013 11:21 HighScore7x#646
Quote:
Originally Posted by 5ubZer0 View Post
supernospread is double and 0 on value
no recoil is I think float and also 0 :D
btw. this is not a threaed for sources, there is an extra thread for sources :D
Jo Danke :D wie siehts mit Chams aus nichts Public ?
04/27/2013 12:10 .BlackHat#647
Quote:
Originally Posted by HighScore7x View Post
Request Public Chams Source and Super NoSpread & Recoil :)
lad dir einfach ne alte d3d base runter und guck wies gemacht wird^^
04/27/2013 12:23 hansewurst#648
Quote:
Originally Posted by winkabean View Post
#Request

Player Pointer & No Recoil
Code:
#define ADR_PLAYERPOINTER     0x00A5348C
#define OFS_NORECOIL1         0xC444
#define OFS_NORECOIL2         0xC448
#define OFS_NORECOIL3         0xC48C
04/27/2013 13:00 winkabean#649
#Request

Super jump and no fall damage
04/27/2013 14:46 Inline™#650
Quote:
Originally Posted by HighScore7x View Post
Request Public Chams Source and Super NoSpread & Recoil :)
Quote:
if (CH1_SuperNoSpread == 1 )
{
WriteMem<double>((void*)ADR_SUPERNOSPREAD, 0);
}
#define ADR_SUPERNOSPREAD 0x8A69D0



Quote:
if (CH1_NoRecoil==1)
{
*(float*)(xPlayer+OFS_NORECOIL1) = 0;
*(float*)(xPlayer+OFS_NORECOIL2) = 0;
*(float*)(xPlayer+OFS_NORECOIL3) = 0;
}
#define OFS_NORECOIL1 0xC444
#define OFS_NORECOIL2 0xC448
#define OFS_NORECOIL3 0xC44C
04/27/2013 21:22 .BlackHat#651
For hackshield bypass:

Code:
#define adrHSStub 0x00515926 // write \xEB
#define adrHSHandler 0x005E5E53 // write \xC3
#define ofsHsDetection 0x0000A1A0 // write \xC2\x04\x00
#define ofsHsSelfCrc 0x0008523E // write \xC2\x04\x00
#define ofsHsNano 0x000A5EBA // write \xD2
Other stuff

Code:
#define adrCqcProne 0x0091BD84
#define adrWeapon1 0x000101EC
#define adrWeapon2 0x000101EE
#define adrWeapon3 0x000101F0
#define adrD3DUsername 0x00AB0294
#define adrD3DHealth 0x00AB1464
#define adrSpawnTime 0x00B9D220
#define adrFallDamage 0x000102E8
#define adrUnlimitedAmmo 0x00A533F4
#define ofsPremium1 0x0000058C
#define ofsPremium2 0x00000590
#define ofsFireDelay 0x00010410
#define ofsInvisible 0x000DF35C
#define fWRHSCallback 0x0051549D
#define fEngineText 0x00401023
#define fMessageBox 0x0051AE5A
i have all pattern :)
04/27/2013 22:18 Xave :)#652
Code:
void __stdcall HackShieldByPass ( )
{
	DWORD HSModule;
	do
	{
		HSModule = ( int ) GetModuleHandleA ( "EhSvc.dll" );
		Sleep( 100 );
	}
	while ( !HSModule );

	DWORD dwOLDProtect;
	DWORD dwOLDProtect2;

	 if ( VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , PAGE_EXECUTE_READWRITE , &dwOLDProtect2 ) )
	 {
	  * ( BYTE * ) ( 0x515926 ) = 0xEB;
	  * ( BYTE * ) ( 0x5E5E53 ) = 0xC3;

	  VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , dwOLDProtect2 , 0 );
	 }
	 else
	 {
		 MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect War Rock Memory!" , "HackShield ByPass" , MB_OK ) ;
	  ExitProcess ( false );
	 }

	if ( VirtualProtect ( ( void * ) HSModule , 0x116000 , 0x04 , &dwOLDProtect ) )
	{
		* ( BYTE * ) ( HSModule + 0x85CDD ) = 0xC3;
		* ( BYTE * ) ( HSModule + 0x0A238 ) = 0xC3;

		DWORD srvPtr = * ( DWORD * )ADR_ServerPointer;
		if ( srvPtr != 0 )
		{
			* ( BYTE * ) ( HSModule + 0x402CE ) = 0x31;
			* ( BYTE * ) ( HSModule + 0x3D67F ) = 0x31;
		}

		* ( BYTE * ) ( HSModule + 0xA359E ) = 0xD2;
		* ( BYTE * ) ( HSModule + 0x0A238 ) = 0x74;

		VirtualProtect ( ( void * ) HSModule , 0x116000 , dwOLDProtect , 0 );
	}
	else
	{
		MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect HackShield Memory!" , "HackShield ByPass" , MB_OK ) ;
		ExitProcess ( false );
	}
}
Enjoy leeching!
04/28/2013 08:03 Lazl07#653
Req
ADR_EventNews
04/28/2013 11:11 DimaxC#654
Req

ADR_Serverpointer
04/28/2013 11:49 Phantom.#655
Quote:
Originally Posted by .χανє View Post

void __stdcall HackShieldByPass ( )
{
DWORD HSModule;
do
{
HSModule = ( int ) GetModuleHandleA ( "EhSvc.dll" );
Sleep( 100 );
}
while ( !HSModule );

DWORD dwOLDProtect;
DWORD dwOLDProtect2;

if ( VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , PAGE_EXECUTE_READWRITE , &dwOLDProtect2 ) )
{
* ( BYTE * ) ( 0x515926 ) = 0xEB;
* ( BYTE * ) ( 0x5E5E53 ) = 0xC3;

VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , dwOLDProtect2 , 0 );
}
else
{
MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect War Rock Memory!" , "HackShield ByPass" , MB_OK ) ;
ExitProcess ( false );
}

if ( VirtualProtect ( ( void * ) HSModule , 0x116000 , 0x04 , &dwOLDProtect ) )
{
* ( BYTE * ) ( HSModule + 0x85CDD ) = 0xC3;
* ( BYTE * ) ( HSModule + 0x0A238 ) = 0xC3;

DWORD srvPtr = * ( DWORD * )ADR_ServerPointer;
if ( srvPtr != 0 )
{
* ( BYTE * ) ( HSModule + 0x402CE ) = 0x31;
* ( BYTE * ) ( HSModule + 0x3D67F ) = 0x31;
}

* ( BYTE * ) ( HSModule + 0xA359E ) = 0xD2;
* ( BYTE * ) ( HSModule + 0x0A238 ) = 0x74;

VirtualProtect ( ( void * ) HSModule , 0x116000 , dwOLDProtect , 0 );
}
else
{
MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect HackShield Memory!" , "HackShield ByPass" , MB_OK ) ;
ExitProcess ( false );
}
}


Enjoy leeching!
srsly?
ist der fail bypass den du von mir hast, crasht nach ner stunde gg
04/28/2013 14:13 hansewurst#656
Quote:
Originally Posted by DimaxC View Post
Req

ADR_Serverpointer
Code:
ADR_Serverpointer 0x00A5341C
Quote:
Originally Posted by winkabean View Post
#Request

Super jump and no fall damage
Code:
#define OFS_NFD               0x102E8
#define OFS_Superjump      0x0010308
04/28/2013 14:37 DimaxC#657
Req

ADR_PlayerPointer
04/28/2013 14:39 Kazbah__#658
... rly look some older pages and dont request everything cuz ur to lazy too look by urself
04/28/2013 17:47 hansewurst#659
Quote:
Originally Posted by DimaxC View Post
Req

ADR_PlayerPointer
Code:
#define ADR_PLAYERPOINTER     0x00A5348C
Quote:
Originally Posted by .χανє View Post
Code:
void __stdcall HackShieldByPass ( )
{
	DWORD HSModule;
	do
	{
		HSModule = ( int ) GetModuleHandleA ( "EhSvc.dll" );
		Sleep( 100 );
	}
	while ( !HSModule );

	DWORD dwOLDProtect;
	DWORD dwOLDProtect2;

	 if ( VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , PAGE_EXECUTE_READWRITE , &dwOLDProtect2 ) )
	 {
	  * ( BYTE * ) ( 0x515926 ) = 0xEB;
	  * ( BYTE * ) ( 0x5E5E53 ) = 0xC3;

	  VirtualProtect ( ( void * ) 0x401000 , 0x77D000 , dwOLDProtect2 , 0 );
	 }
	 else
	 {
		 MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect War Rock Memory!" , "HackShield ByPass" , MB_OK ) ;
	  ExitProcess ( false );
	 }

	if ( VirtualProtect ( ( void * ) HSModule , 0x116000 , 0x04 , &dwOLDProtect ) )
	{
		* ( BYTE * ) ( HSModule + 0x85CDD ) = 0xC3;
		* ( BYTE * ) ( HSModule + 0x0A238 ) = 0xC3;

		DWORD srvPtr = * ( DWORD * )ADR_ServerPointer;
		if ( srvPtr != 0 )
		{
			* ( BYTE * ) ( HSModule + 0x402CE ) = 0x31;
			* ( BYTE * ) ( HSModule + 0x3D67F ) = 0x31;
		}

		* ( BYTE * ) ( HSModule + 0xA359E ) = 0xD2;
		* ( BYTE * ) ( HSModule + 0x0A238 ) = 0x74;

		VirtualProtect ( ( void * ) HSModule , 0x116000 , dwOLDProtect , 0 );
	}
	else
	{
		MessageBoxA ( GetActiveWindow ( ) , "Can't unprotect HackShield Memory!" , "HackShield ByPass" , MB_OK ) ;
		ExitProcess ( false );
	}
}
Enjoy leeching!
Mach wenigstens Credits darunter wenn es eh schon nicht deiner ist ^^
04/29/2013 15:51 .BlackHat#660
kann jemand mal undercover user bannen? der spammt nur und labbert nen haufen shit. ftw