Why nobody has Bullets Hacks ?

04/11/2013 08:38 -Marekiarox-#1
I Love this function.... no hacks have this function.. since they changed code...
Just King7 have this function , why nobody else can make it ? wtf ?
Hope so King7 get back in warrock scene your all hacks are crazy 1 hour and get kicking from the server. King7 was make bester warrock hacks ! :handsdown:
04/11/2013 11:19 R3d_L!n3#2
He already back coding days ago but u already know that ..

btw wrong section
04/11/2013 13:38 dviryon#3
in trademark there is
04/11/2013 13:46 Kazbah__#4
there u have king7's bullets :)

Code:
DWORD BulletsForce;
DWORD dwBulletJmp;
__declspec (naked) void new_Bullets ()
{
  if ( pItems->Weapon.CH_Bullets > 0 )
  {
  __asm
  {
    mov  eax,BulletsForce
    inc    dword ptr [ebp-0x110]
    cmp  dword ptr [ebp-0x110], eax
    jmp  dwBulletJmp
    }
}
}

if ( pItems->Weapon.CH_Bullets !=0 )
{
 switch ( pItems->Weapon.CH_Bullets )
 {
  case 1 : ( BulletsForce = 0x3   ); break; //2
  case 2 : ( BulletsForce = 0x4   ); break; //3
  case 3 : ( BulletsForce = 0x5   ); break; //4
  case 4 : ( BulletsForce = 0x6   ); break; //5
  case 5 : ( BulletsForce = 0x7   ); break; //6
  case 6 : ( BulletsForce = 0x8   ); break; //7
  case 7 : ( BulletsForce = 0x9   ); break; //8
  case 8 : ( BulletsForce = 0x10  ); break; //9
  case 9 : ( BulletsForce = 0x11  ); break; //10
  case 10 : ( BulletsForce = 0x110  ); break; //100
 }

      dwBulletJmp  = (ADR_BulletsJMP);
      DetourCreate((PBYTE)ADR_Bullets,(LPBYTE)new_Bullets,6);

}else{

     MemEditing((void*)ADR_Bullets,(LPBYTE)"\x0F\xB7\x85\xC8\xFE\xFF\xFF",7);

}
04/11/2013 13:46 Cyno™#5
lulz, i know at least 5 people who has this function,
Stop talking shit.
Nobody needs king7 back he is a fat scammer and spreader
04/11/2013 14:15 -Marekiarox-#6
omg ?


cyno can you buy like always hs bypass ? somebody sended me an correctly proof that show you a perfectly code buyer


66D66920 . B8 F02FA500 MOV EAX,0A52FF0
66D66925 . 8B00 MOV EAX,DWORD PTR DS:[EAX]
66D66927 . 85C0 TEST EAX,EAX
66D66929 . 75 03 JNZ SHORT Kazbah_P.66D6692E
66D6692B > 33C0 XOR EAX,EAX
66D6692D . C3 RET
66D6692E > 8B80 30B90200 MOV EAX,DWORD PTR DS:[EAX+2B930]
66D66934 . 85C0 TEST EAX,EAX
66D66936 .^74 F3 JE SHORT Kazbah_P.66D6692B
66D66938 . 8B00 MOV EAX,DWORD PTR DS:[EAX]
66D6693A . 85C0 TEST EAX,EAX
66D6693C .^74 ED JE SHORT Kazbah_P.66D6692B
66D6693E . 8D0488 LEA EAX,DWORD PTR DS:[EAX+ECX*4]



66D66DB8 |. FFD6 CALL ESI
66D66DBA |. 6A 00 PUSH 0
66D66DBC |. 6A 00 PUSH 0
66D66DBE |. 6A 00 PUSH 0
66D66DC0 |. 68 106BD666 PUSH Kazbah_P.66D66B10
66D66DC5 |. 6A 00 PUSH 0
66D66DC7 |. 6A 00 PUSH 0
66D66DC9 |. FFD6 CALL ESI
66D66DCB |. 6A 00 PUSH 0
66D66DCD |. 6A 00 PUSH 0
66D66DCF |. 6A 00 PUSH 0
66D66DD1 |. 68 2058D666 PUSH Kazbah_P.66D65820
66D66DD6 |. 6A 00 PUSH 0
66D66DD8 |. 6A 00 PUSH 0
66D66DDA |. FFD6 CALL ESI
66D66DDC |. 6A 00 PUSH 0
66D66DDE |. 6A 00 PUSH 0
66D66DE0 |. 6A 00 PUSH 0
66D66DE2 |. 68 D06BD666 PUSH Kazbah_P.66D66BD0
66D66DE7 |. 6A 00 PUSH 0
66D66DE9 |. 6A 00 PUSH 0
66D66DEB |. FFD6 CALL ESI
66D66DED |. 6A 00 PUSH 0
66D66DEF |. 6A 00 PUSH 0
66D66DF1 |. 6A 00 PUSH 0
66D66DF3 |. 68 F06BD666 PUSH Kazbah_P.66D66BF0
66D66DF8 |. 6A 00 PUSH 0
66D66DFA |. 6A 00 PUSH 0
66D66DFC |. FFD6 CALL ESI
66D66DFE |. 6A 00 PUSH 0
66D66E00 |. 6A 00 PUSH 0
66D66E02 |. 6A 00 PUSH 0
66D66E04 |. 68 705CD966 PUSH Kazbah_P.66D95C70 ; ASCII "http://mp-**********"
66D66E09 |. 6A 00 PUSH 0
66D66E0B |. 6A 00 PUSH 0
66D66E0D |. 55 PUSH EBP
66D66E0E |. E8 6DA90600 CALL Kazbah_P.66DD1780
66D66E13 |. 5F POP EDI
66D66E14 |. 5E POP ESI
66D66E15 |. B8 01000000 MOV EAX,1
66D66E1A |. 5B POP EBX
66D66E1B |> 8BE5 MOV ESP,EBP
66D66E1D |. 5D POP EBP
66D66E1E \. C2 0C00 RET 0C



66D66C40 |. E8 E5CA0100 CALL Kazbah_P.66D8372A
66D66C45 |. 68 285CD966 PUSH Kazbah_P.66D95C28 ; ASCII "021A45740BA6"
66D66C4A |. 57 PUSH EDI
66D66C4B |. 8D4D 98 LEA ECX,DWORD PTR SS:[EBP-68]
66D66C4E |. 68 385CD966 PUSH Kazbah_P.66D95C38 ; ASCII "HWID Changed from %s to %s"
66D66C53 |. 51 PUSH ECX
66D66C54 |. E8 7AD50600 CALL Kazbah_P.66DD41D3
66D66C59 |. 4C DEC ESP
66D66C5A |. 83C4 1C ADD ESP,1C
66D66C5D |. 6A 00 PUSH 0
66D66C5F |. 8D55 98 LEA EDX,DWORD PTR SS:[EBP-68]
66D66C62 |. 52 PUSH EDX
66D66C63 |. 8BC2 MOV EAX,EDX
66D66C65 |. 50 PUSH EAX
66D66C66 |. E8 9BAB0600 CALL Kazbah_P.66DD1806
66D66C6B |. 52 PUSH EDX
66D66C6C |. 50 PUSH EAX
66D66C6D |. 55 PUSH EBP
66D66C6E |. E8 E7BF0600 CALL Kazbah_P.66DD2C5A
66D66C73 |. 68 285CD966 PUSH Kazbah_P.66D95C28 ; ASCII "021A45740BA6"
66D66C78 |> 56 PUSH ESI
66D66C79 |. FF15 B874DA66 CALL DWORD PTR DS:[66DA74B8]
04/11/2013 14:52 Kazbah__#7
poor thing open up a thread for talk about yourself

-Marekiarox- = King7
04/11/2013 15:02 -Marekiarox-#8
Quote:
Originally Posted by Zyzz__ View Post
poor thing open up a thread for talk about yourself

-Marekiarox- = King7

no he just told me via skype to what write !
04/11/2013 15:15 Phantom.#9
My Public Hack have the Bullets function!
04/11/2013 15:50 R3d_L!n3#10
Quote:
Originally Posted by Phantom. View Post
My Public Hack have the Bullets function!
Ur just like telling King to crack ur dll u know that ?
04/11/2013 17:09 _Marekiarox_#11
Facepalm? lol
04/13/2013 17:13 xxfabbelxx#12
moved
closed