Make Simple hack for wolfteam "(

04/25/2019 11:31 lionwar12#1
Hello

I Want to know how can i get base address ( Csh or bin or obj ) in c++
I'm new with this language so if anyone can help me plz
to be able to make wolfteam hack ?

sorry for my bad language .:confused:
04/25/2019 15:35 warfley#2
[Only registered and activated users can see links. Click Here To Register...]

Quote:
I'm new with this language so if anyone can help me plz
This is part of your systems (Windows) API, not part of the programming language.

Also I saw you posting a question about vb.net. Why don't you stick to one language when you don't have that much experience right now? Using multiple languages as a beginner isn't beneficial at all.
04/26/2019 03:17 lionwar12#3
I Know bro, i can make very good hacks for any game with vb.net
but i need to know how to make hack with base address csh, obj , bin
i made chams and fullbright and wireframe and more for wolfteam but
csh , and things like this noo :(
04/26/2019 21:51 warfley#4
What exactly do you mean, from what you are writing I just don't understand what you mean. Usually with base address the random offset assigned to the address space of a program when using ASLR.

I think that is not what you mean. Could you clarify, maybe than one could help you
04/27/2019 02:55 lionwar12#5
I need to make hack like this but with c++

Try
Dim p As Process = Process.GetProcessesByName("WolfTeam.bin")(0)
For Each moz As System.Diagnostics.ProcessModule In p.Modules
If moz.FileName.IndexOf("csh") <> -1 Then
label1.Text = moz.BaseAddress.ToString
End If
Next
Catch ex As Exception
End Try

Writelong("Wolfteam.bin", csh.text + &H12345 , "Value")
04/27/2019 17:53 warfley#6
Ok than we are talking about the same thing and I've already postet the answer: [Only registered and activated users can see links. Click Here To Register...]

Your VB Code does exactly what the answer tells the TE on stackoverflow
Code:
Dim p As Process = Process.GetProcessesByName("WolfTeam.bin")(0) // 1. Open the process using OpenProcess -- if successful, the value returned is a handle to the process, which is just an opaque token used by the kernel to identify a kernel object. Its exact integer value (0x5c in your case) has no meaning to userspace programs, other than to distinguish it from other handles and invalid handles.
  For Each moz As System.Diagnostics.ProcessModule In p.Modules // 3. Use EnumProcessModules to enumerate the list of all modules in the target process.
    If moz.FileName.IndexOf("csh") <> -1 Then // 4. For each module, call GetModuleFileNameEx to get the filename, and compare it with the executable's filename.
      label1.Text = moz.BaseAddress.ToString // 5. When you've found the executable's module, call GetModuleInformation to get the raw entry point of the executable.
    End If
  Next
It's all described in the StackOverflow thread.

Also, I still see no problem why the heck you need to use C++. I mean really you are basically doing the same as in vb, just that it will take much more code, and much longer (i.e. waiting for an answer in this thread has already taken you 2 days).

There are only very few things C++ can that vb can't (i.e. writing DLL's to be injected). Everything else can also be done in VB, and in most cases the VB solution is easier.