Brauchst ja nicht gleich Ausflippen nur, weil ich hier neu bin! :facepalm:Quote:
Brauchst ja nicht gleich Ausflippen nur, weil ich hier neu bin! :facepalm:Quote:
Er hat dadurch auch deinen Thread hochgepushed und über kommentare würde ich mich persöhnlich mehr freuen als durch den "thanks button" :DQuote:
1. "flippt" er nicht aus
2. nicht weil du "neu" bist, sondern weil du unnötige Posts machst, die du durch einen einfachen Klick auf den Button verhindern kannst.
2 answers: Yes I am using my own Hackshield-Bypass, but my Cheat Engine doesn't get detected because I changed some strings in the GUI (as you can see in the Videos), which Hackshield seems to detect.Quote:
hi, im watching you tutorials on Metin2 Reversing/Hacking, but mi cheat engine keeps getting detected, are you using some hackshield bypass?
Thnx in advance.
Shotmaster
This is unnecessary. Just get yourselft a Hex-Editor and change the strings in the executable :)Quote:
oh so you have changed the detected stings on ce to make an UCE.
Im searching for some tutorials on how to do that, but i keep going to lots and lots of them, with diferent ways to do it.
Do you think this is a good one?: [Only registered and activated users can see links. Click Here To Register...]
Yes it is possible.. Search for "OnFishingWrongPlace" and don't let it jump there, no need for a tutorial..Quote:
Hex-editor hmm i have use this in some mw3 hacks xD
one more thing, is it possible with ce to fish in the dirt? (away from watter)
it could be a good next tutorial ;)
thnx for the help ;)
and keep up the good work :D
Was?Quote:
Warum videos weg :(?
These tutorials are for people who know that each module name has an according address in the memory..Quote:
On your 4th video, I encountered a problem. During the Assembly scan I was bit confused and dissapointed. Let me explain it:
The client that I am trying this on did something weird, instead of 004B3D43 cheat engine shows metin2client.bin+B3D43
This confused me, I couldn't figure out which to search.
Anyways, since every call was followed by [metin2client.bin + ... ] in the assembly search box, I typed
Call metin2client.bin+B3D43
however despite a search for 5-6 min. (Processor: intel i7 3630QM, the process was consuming ~%20 CPU according to Windows Task Manager. ) it did not find the call.
Do you have any idea why?
Thanks
1) Look, I figured that out. I was just asking would it be the same, since I am new to all this.Quote:
These tutorials are for people who know that each module name has an according address in the memory..
It's not meant to be a "How to copy my hacks without giving credits to me" Tutorial
Uncheck "Show module addresses" in the memory viewer.Quote:
1) Look, I figured that out. I was just asking would it be the same, since I am new to all this.
I get messaged so much about that the player pointer in tutorial 1 (8:53) isn't there anymore. That shows that they didn't learn anything from the tutorials.. They don't teach what I intended them to teach. Instead hacks are released with functions from my tutorials without giving me any credits for it, nor did the majority learn anything from it when they are too dumb to jump into a call and look there for the playerpointer.. That's why I requested a close for this topic.Quote:
2) I never, and I mean NEVER FUCKING EVER share something without giving credits, and I warn all who do so that gets my attention. It is something very disrespectful to do, hell, I don't even change the links given by the uploader. I am just trying to understand something, not steal your work and knowledge.