[Tutorials] Update / Create CE Scripts

01/03/2020 11:35 iCraziE#1
Creating Wall Hack :


Creating Zoom / Far Eye :


Update No Aggro / Vac :


Update Boss Spawn :


Update Pet Hack :


Update Auto Pots :


Update Char / Mob Speed :

01/03/2020 14:57 Naniooooo#2
NUMBER 1 : nebular
NUMBER 2 : iCraziE
:D


WHERE IS KILL HACK /auto loot :D :D :D



what mean 11DC for wall hack ?
01/03/2020 21:08 iCraziE#3
Quote:
Originally Posted by Naniooooo View Post
NUMBER 1 : nebular
NUMBER 2 : iCraziE
:D
im no where near the level of nebular, but thanks lol :P

Quote:
Originally Posted by Naniooooo View Post
auto loot
private ... atm..

Quote:
Originally Posted by Naniooooo View Post
what mean 11DC for wall hack ?
not sure what the significance of 11DC is for dekaron, but we are just checking to see if edx is equal to 11DC, since when we checked what access the address, the function showed that edx was equal to 11DC at the time that the ESI register was equal to the value we needed.

Basically, through testing over and over i found that the EDX register didnt change no matter what map i used. so if i did a little test to check if edx = 11DC and that worked out for me. without it, the ESI register would be constantly changing to a different address, instead of just staying on the address that points to our map attribute. (parca.mac , etc)
01/04/2020 08:04 cyber-ammo#4
Sweet.

Thanks man you're beast.
01/04/2020 08:54 Naniooooo#5
i like zoom hack :D

but im more curious about no aggro maybe i guess mobs which attack you when see you and mobs who not attack when you are near them


dekaron + 0x0
combase.dll!CoGetErrorInfo+0x1620
crypt32.dll!I_CryptWalkAllLruCacheEntries+0x8c0,
dekaron.exe+0x0
mswsock.dll!sethostname+0xf10



xigncode threads



this process hacker survive a few mins before xigncode detect it
01/04/2020 21:39 cyber-ammo#6
Give us more BOOMS man!
01/08/2020 18:53 iamlegend93#7
Daym, to late for the party...
Did YouTube remove Them? Can anybody reupload? And Thx iCraziE for sharing
01/08/2020 22:04 iCraziE#8
Quote:
Originally Posted by iamlegend93 View Post
Daym, to late for the party...
Did YouTube remove Them? Can anybody reupload? And Thx iCraziE for sharing
lol wth, the DEVs claimed a copyright on my videos, lmfao YouTube is lame af.

Gonna re-upload somewhere else.

EDIT : re-uploaded.
01/13/2020 04:44 cadylele#9
I found the address according to the operation of the tutorial, but when I change the map web image Mac and re-enter the map, I can go through the wall, but after I wear it, I go back to the original place as if I haven't worn it
01/13/2020 11:27 cyber-ammo#10
Well this "wearing" thing is confusing. Youre getting rubberband effect on wallhack? Never saw that.

Maybe iCrazie knows with what ure dealing with so wait for him.
01/13/2020 11:55 cadylele#11
I KNOW I'm just waiting for him to find out why

Quote:
Originally Posted by Ackerm4n View Post
Well this "wearing" thing is confusing. Youre getting rubberband effect on wallhack? Never saw that.

Maybe iCrazie knows with what ure dealing with so wait for him.
yes I KNOW I'm just waiting for him to find out why
01/13/2020 12:04 cyber-ammo#12
Quote:
Originally Posted by cadylele View Post
I KNOW I'm just waiting for him to find out why
He can maybe know what u did wrong. Im sure he wont find out. Youre doing something wrong for sure.

You should probably explain more if you want help.
01/14/2020 04:27 iCraziE#13
Quote:
Originally Posted by cadylele View Post
I found the address according to the operation of the tutorial, but when I change the map web image Mac and re-enter the map, I can go through the wall, but after I wear it, I go back to the original place as if I haven't worn it
Update your script to the current version of the game, then post your script. Let me look at it.
01/14/2020 05:59 cadylele#14
Quote:
Originally Posted by iCraziE View Post
Update your script to the current version of the game, then post your script. Let me look at it.
OK thanks l will send it later thank you

Game Ver : 277.4.9
script:
{ Game : dekaron.exe
Version:
Date : 2020-01-14
Author : Administrator

This script does blah blah blah
}

define(address,00FAD184)
define(bytes,0F BA 25 18 C1 61 01 01 73 09)

[ENABLE]

assert(address,bytes)
alloc(newmem,$1000)

label(code)
label(return)

newmem:
cmp edx,11D8
jne code


cmp [esi+402],'web_'
je code

mov [esi+402],'web_'
mov [esi+406],'imag'
mov [esi+40A],'e.ma'
mov [esi+40E],'c

code:
bt [0161C118],01
jae 00FAD197
jmp return

address:
jmp newmem
nop 3


nop 2
return:

[DISABLE]

address:
db bytes
// bt [0161C118],01
// jae 00FAD197
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: 00FAD184

"dekaron.exe"+BAD156: 76 08 - jna dekaron.exe+BAD160
"dekaron.exe"+BAD158: 3B F8 - cmp edi,eax
"dekaron.exe"+BAD15A: 0F 82 94 02 00 00 - jb dekaron.exe+BAD3F4
"dekaron.exe"+BAD160: 83 F9 20 - cmp ecx,20
"dekaron.exe"+BAD163: 0F 82 D2 04 00 00 - jb dekaron.exe+BAD63B
"dekaron.exe"+BAD169: 81 F9 80 00 00 00 - cmp ecx,00000080
"dekaron.exe"+BAD16F: 73 13 - jae dekaron.exe+BAD184
"dekaron.exe"+BAD171: 0F BA 25 14 80 54 01 01 - bt [dekaron.exe+1148014],01
"dekaron.exe"+BAD179: 0F 82 8E 04 00 00 - jb dekaron.exe+BAD60D
"dekaron.exe"+BAD17F: E9 E3 01 00 00 - jmp dekaron.exe+BAD367
// ---------- INJECTING HERE ----------
"dekaron.exe"+BAD184: 0F BA 25 18 C1 61 01 01 - bt [dekaron.exe+121C118],01
// ---------- DONE INJECTING ----------
"dekaron.exe"+BAD18C: 73 09 - jae dekaron.exe+BAD197
"dekaron.exe"+BAD18E: F3 A4 - repe movsb
"dekaron.exe"+BAD190: 8B 44 24 0C - mov eax,[esp+0C]
"dekaron.exe"+BAD194: 5E - pop esi
"dekaron.exe"+BAD195: 5F - pop edi
"dekaron.exe"+BAD196: C3 - ret
"dekaron.exe"+BAD197: 8B C7 - mov eax,edi
"dekaron.exe"+BAD199: 33 C6 - xor eax,esi
"dekaron.exe"+BAD19B: A9 0F 00 00 00 - test eax,0000000F
"dekaron.exe"+BAD1A0: 75 0E - jne dekaron.exe+BAD1B0
}
01/14/2020 22:12 iCraziE#15
Quote:
Originally Posted by cadylele View Post
OK thanks l will send it later thank you

Game Ver : 277.4.9 ???? what is this???

define(address,00FAD184) <---- this address leads to the middle of nowhere, you definitely didnt update the script like i asked.

[ENABLE]

assert(address,bytes)
alloc(newmem,$1000)

label(code)
label(return)

newmem:
cmp edx,11D8 <--- where did you get this number?
jne code


cmp [esi+402],'web_'
je code

mov [esi+402],'web_'
mov [esi+406],'imag'
mov [esi+40A],'e.ma'
mov [esi+40E],'c <---- are you trollling? this script will not inject with an error like this.


code:
bt [0161C118],01
jae 00FAD197
jmp return

address:
jmp newmem
nop 3 <---- NANI?!!??


nop 2 <---- what?!
If you are not going to put effort in this I am not gonna help you, because I am definitely not doing it for you. (Even though I kind of already did that.)