[Address]Next-In Game Hamada

01/31/2017 08:30 whakezu#1
#Deleted#
01/31/2017 09:14 Zemunasu#2
Like 90% don't know how to use it.

The 9% who do know how to use it know more and probably already have there own shit.

And not to forgot, 1% are just going to c+p it
01/31/2017 09:17 whakezu#3
You use it with cheat engine, add the address with s4 opened... Then change de original value with the modified value, and have fun!
01/31/2017 10:21 atom0s#4
Quote:
Originally Posted by whakezu View Post
Hamada I still remember when I told you that I wanted to learn how to hack and you made fun of me, it's my turn.
If your object is to get his addresses, it's not really rocket science. His program is coded with AutoIt, it can just be decompiled:


Code:
Global $address1 = _winapi_getprocaddress(_winapi_loadlibrary("ADVAPI32.dll"), "OpenServiceW")
_memorywrite($address1, _memoryopen(ProcessExists("S4Client.exe")), "0xB801000000C20C00", "byte[8]")
Dim $conquest1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $200hp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $godmode1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7210F30F1085........F30F1185........8D8D........518B15......")
Dim $infsp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0F2F85........761E51F30F1085........F30F1104248B4D808B118B4D808B82........FFD08B4D808B118B4D808B82........")
Dim $infhp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00699F73D........8B1495")
Dim $instant1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "043B48087209C745B0........EB07C745B0........0FB655B085D20F85........8B45CC8B108B4DCC")
Dim $killyourself1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00499F73D........8B1495")
Dim $infammo1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7605E9........8B............0B8B")
Dim $wallshoot1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945EC51D91C248B4D08")
Dim $hitrange1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945C48B4DF464890D")
Dim $onehit1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCC558BEC51894DFC")
Dim $fastfire1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "8B4A043B48087209C745..........EB07C745BC000000000FB655BC85D20F84........8B45F005A003000089")
Dim $mission1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "75................8D4D08E8........E9........C7")
Dim $sentry1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC83EC08894DF8F3....05........F3....45FC8D45FC508B0D........8B0183C00299F73D........8B1495........528B4DF883C12CE8........D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC")
Dim $infblocktime11 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "1C516A038B4DF083C120E8........8D5520526A058B4DF083C120E8........8D4518506A018B4D")
Dim $infblocktime21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "FF8D........038B........20E8..............526A058B4DF083C120E8........8B45EC3B45")
Dim $camera1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0000AF430000C8430000FA43000000")
Dim $screenchanger1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0005........00000004000000000000001400")
Dim $screenchanger21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0600000007000000080000000100000002000000030000000400000005000000060000000700000008000000010000000200")
Dim $xray1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "04000000000000001400000015")
Dim $walk1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D853CFEFFFF50E8")
Dim $run1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "006A038D95C8")
Dim $dodgespeed1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D85B0FEFFFF50E8")
Dim $invisible1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "74108B55FC8B8A........E8........EB0E8B45FC8B88........E8........EB26")
Dim $baseaddress = _memorymodulegetbaseaddress2(ProcessExists("S4Client.exe"), "S4Client.exe")
01/31/2017 10:27 whakezu#5
Quote:
Originally Posted by atom0s View Post
If your object is to get his addresses, it's not really rocket science. His program is coded with AutoIt, it can just be decompiled:


Code:
Global $address1 = _winapi_getprocaddress(_winapi_loadlibrary("ADVAPI32.dll"), "OpenServiceW")
_memorywrite($address1, _memoryopen(ProcessExists("S4Client.exe")), "0xB801000000C20C00", "byte[8]")
Dim $conquest1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $200hp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $godmode1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7210F30F1085........F30F1185........8D8D........518B15......")
Dim $infsp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0F2F85........761E51F30F1085........F30F1104248B4D808B118B4D808B82........FFD08B4D808B118B4D808B82........")
Dim $infhp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00699F73D........8B1495")
Dim $instant1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "043B48087209C745B0........EB07C745B0........0FB655B085D20F85........8B45CC8B108B4DCC")
Dim $killyourself1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00499F73D........8B1495")
Dim $infammo1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7605E9........8B............0B8B")
Dim $wallshoot1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945EC51D91C248B4D08")
Dim $hitrange1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945C48B4DF464890D")
Dim $onehit1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCC558BEC51894DFC")
Dim $fastfire1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "8B4A043B48087209C745..........EB07C745BC000000000FB655BC85D20F84........8B45F005A003000089")
Dim $mission1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "75................8D4D08E8........E9........C7")
Dim $sentry1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC83EC08894DF8F3....05........F3....45FC8D45FC508B0D........8B0183C00299F73D........8B1495........528B4DF883C12CE8........D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC")
Dim $infblocktime11 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "1C516A038B4DF083C120E8........8D5520526A058B4DF083C120E8........8D4518506A018B4D")
Dim $infblocktime21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "FF8D........038B........20E8..............526A058B4DF083C120E8........8B45EC3B45")
Dim $camera1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0000AF430000C8430000FA43000000")
Dim $screenchanger1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0005........00000004000000000000001400")
Dim $screenchanger21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0600000007000000080000000100000002000000030000000400000005000000060000000700000008000000010000000200")
Dim $xray1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "04000000000000001400000015")
Dim $walk1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D853CFEFFFF50E8")
Dim $run1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "006A038D95C8")
Dim $dodgespeed1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D85B0FEFFFF50E8")
Dim $invisible1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "74108B55FC8B8A........E8........EB0E8B45FC8B88........E8........EB26")
Dim $baseaddress = _memorymodulegetbaseaddress2(ProcessExists("S4Client.exe"), "S4Client.exe")
Now get the address of the alexmen10 itc bypass ;) I donīt use the decompile methode,
Is ineffective in many cases.
01/31/2017 11:40 ByEnglish#6
Plz İtc Edit item 40 enchant plzz :( :rtfm: :mad: :pimp: :cool:
01/31/2017 11:51 [Beatrice]#7
What's the point of leeching leeched addresses? This is hilarious XD
01/31/2017 18:15 K1ramoX#8
closed