WarRock EU - Code Snippets

06/20/2012 20:40 cheatslaw#7276
Quote:
Originally Posted by CyberVeezy :) View Post
I know, the function is disabling the messagebox :D
just wondering what the point is then?
it just disables the msg like you said, not stopping from detected or chaning anything else
06/20/2012 21:35 CyberVeezy :)#7277
Quote:
Originally Posted by cheatslaw View Post
just wondering what the point is then?
it just disables the msg like you said, not stopping from detected or chaning anything else
yes it's just a message box bypass :p
06/21/2012 15:03 head12344#7278
Suche working Quick Spawn Source und Auto 9 Wins (kein setcurspos)
06/21/2012 18:15 MilchMannx3#7279
tMemPatch <float> UnlAmmoPatch( 0xA30970 /* address */, 0 /* value */ );
if(UnlAmmo && GetAsyncKeyState(VK_LBUTTON))
{
UnlAmmoPatch.Patch();
}else{
UnlAmmoPatch.Restore();
}

warum funktioniert nicht?
ja ich habe die patch class von yazzn drinne.
06/21/2012 21:50 Angel-Piece#7280
Zero Dealy Memory By UnknownPK 100% Credits to him
Code:
DWORD theptr = 0;
DWORD dwDCall = 0x4F5DC2;
__declspec(naked) void NoDelayMemory()
{
	__asm
	{
		mov     ecx, [esp+4]
		mov     eax, [ecx+102B4h]
		test    eax, eax
		jnz     Jnz1
		mov     eax, [ecx+102B8h]

Jnz1:
		movzx   edx, word ptr [eax+92h]
		mov     eax, [ecx+103F8h]
		shr     eax, 0Ah
		pushad;
	}
	if(!CH_W_0Delay)
	{
		__asm
		{
			popad;
			test    al, 1
			jz Jz1
			pushad;
		}
	}
	__asm
	{
		popad;
		mov     eax, dword ptr ds:[ADR_SERVER_POINTER]//place your server pointer address here
		test    eax, eax
		jz      Jz1
		cmp     dword ptr [eax+0C17E0h], 2
		jnz     Jz1
		movsx   eax, dx
		push    0
		push    eax
		movsx   eax, word ptr [ecx+1036Eh]
		push    eax
		mov     eax, [esp+0Ch+8]
		mov		eax, [eax];
		push    eax
		call    dwDCall
		add     esp, 10h
Jz1:
		retn	8
	}
}
How to Use :
Code:
if(Ch_ZeroDelay==1)
{
if(*(DWORD*)0x862700)
			*(DWORD*)0x862700 = (DWORD)NoDelayMemory;
}
06/22/2012 07:51 head12344#7281
#Request WORKING Quick Spawn (CQC)
06/22/2012 11:32 xBioK1ngz#7282
No Reload Memory By UnknownPK 100% Credits to him
Code:
 DWORD dwJumpBack = 0;//global
__declspec(naked) void NoReloadMemory()
{
__asm
{
push ebp //original code
mov ebp, esp
push ebx
mov ebx, [ebp+8]
pushad; //save the stack
}
if(!CH_W_NoReload) //check if no reload is off in the menu
{
__asm
{
popad; //restore the stack
test byte ptr [ebx+103F8h], 10h //again original code
mov dwJumpBack,0x4FE7D3; //move the jump offset into the global and jump to it
jmp dwJumpBack; 
}
}
__asm
{
popad; //restore the stack
push esi 
push edi
mov dwJumpBack,0x4FE7DB; //move the jump offset into the global and jump to it
jmp dwJumpBack;
}
}
How to Use :
Code:
if(*(DWORD*)0x85D784)
*(DWORD*)0x85D784 = (DWORD)NoReloadMemory;
06/22/2012 20:09 __BuRn3R#7283
Code:
if (ASM_Bandage == 0)
{
	memcpy((void *)(0x5B181F), (void *)"x75", 1);
}
if (ASM_Bandage == 1)
{
	memcpy((void *)(0x5B181F), (void *)"x90\x90", 2);
}
Credits to me.
06/22/2012 21:22 NikM#7284
Es könnten bei deiner Source Probleme auftreten.
Du stellst nicht den ganzen OpCode wieder her.
06/23/2012 00:09 xBioK1ngz#7285
Code:
#define ASM_BANDAGEPX 0x5B181F
if ( CH_BandageItem == TRUE )
{ 
    WriteMemory((LPVOID)(ASM_BANDAGEPX),(LPBYTE)("\xEB\x4E"),2);
}
else if ( CH_BandageItem == FALSE )
{ 
    WriteMemory((LPVOID)(ASM_BANDAGEPX),(LPBYTE)("\x75\x4E"),2);
}
06/23/2012 16:46 NikM#7286
Enable Mousemove Ingame:

Code:
#define EnableIngameMouse_Mem	0x00A30570

*(int*)(EnableIngameMouse_Mem) = 0;
[Only registered and activated users can see links. Click Here To Register...]
06/24/2012 18:02 Hanfi™#7287
immer wen ich DefuseAnyWhere an mache crasht es weis wer wieso??

if (CH_DEFUSEANYWHERE)
{
*(BYTE*)(ADR_DEFUSEANYWHERE) = 0x1;
}

ADR_DEFUSEANYWHERE 0x8F2860
06/24/2012 19:37 Speedlvlers#7288
Hier, über MEM:

*(WORD*)MEM_DEFUSEANYWHERE = 0x1;
06/24/2012 22:10 Chown¡¡qhtz#7289
Quote:
Originally Posted by Hanfi™ View Post
immer wen ich DefuseAnyWhere an mache crasht es weis wer wieso??

if (CH_DEFUSEANYWHERE)
{
*(BYTE*)(ADR_DEFUSEANYWHERE) = 0x1;
}

ADR_DEFUSEANYWHERE 0x8F2860
Das ist die Plantanywhere source mit der DEFanywhere addy.
DEFUSEANYWHERE ist vom Datentyp WORD.

Quote:
Originally Posted by Speedlvlers View Post
Hier, über MEM:

*(WORD*)MEM_DEFUSEANYWHERE = 0x1;
So sieht dann die richtige Source für die Adresse aus.
Quote:
Hier, über MEM:
Das andere ist auch "MEM"

BTW:
BYTE : 1 Byte
WORD : 2 Bytes
06/25/2012 14:08 Hanfi™#7290
hat wer für mich eine auto start source??