Dekaron No aggro and Vac Hack 2024 ( dekaronKR )

07/15/2024 06:03 Naniooooo#1
no aggro


Quote:
{ Game : dekaron.exe
Version:
Date : 2024-07-09
Author : Administrator

This script does blah blah blah
}

[ENABLE]

aobscanmodule(INJECT,dekaron.exe,0F B7 87 7B 01 00 00) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:
mov [edi+0000017B],6
code:
movzx eax,word ptr [edi+0000017B]
jmp return

INJECT:
jmp newmem
nop 2
return:
registersymbol(INJECT)

[DISABLE]

INJECT:
db 0F B7 87 7B 01 00 00

unregistersymbol(INJECT)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: dekaron.exe+17C375

dekaron.exe+17C356: 8B 87 5B 04 00 00 - mov eax,[edi+0000045B]
dekaron.exe+17C35C: 89 45 A4 - mov [ebp-5C],eax
dekaron.exe+17C35F: 8B 01 - mov eax,[ecx]
dekaron.exe+17C361: FF 50 0C - call dword ptr [eax+0C]
dekaron.exe+17C364: 8D 4D 8C - lea ecx,[ebp-74]
dekaron.exe+17C367: 51 - push ecx
dekaron.exe+17C368: 8B C8 - mov ecx,eax
dekaron.exe+17C36A: 8B 10 - mov edx,[eax]
dekaron.exe+17C36C: FF 52 1C - call dword ptr [edx+1C]
dekaron.exe+17C36F: 8B 0D 04 F4 12 61 - mov ecx,[dekaron.exe+112F404]
// ---------- INJECTING HERE ----------
dekaron.exe+17C375: 0F B7 87 7B 01 00 00 - movzx eax,word ptr [edi+0000017B]
// ---------- DONE INJECTING ----------
dekaron.exe+17C37C: 50 - push eax
dekaron.exe+17C37D: 8B 11 - mov edx,[ecx]
dekaron.exe+17C37F: FF 52 08 - call dword ptr [edx+08]
dekaron.exe+17C382: 8B 4B 0C - mov ecx,[ebx+0C]
dekaron.exe+17C385: 8B F0 - mov esi,eax
dekaron.exe+17C387: 8B 11 - mov edx,[ecx]
dekaron.exe+17C389: FF 52 28 - call dword ptr [edx+28]
dekaron.exe+17C38C: 85 C0 - test eax,eax
dekaron.exe+17C38E: 74 08 - je dekaron.exe+17C398
dekaron.exe+17C390: 8B 10 - mov edx,[eax]
}








no aggro 2





Quote:
{ Game : dekaron.exe
Version:
Date : 2024-07-11
Author : Administrator

This script does blah blah blah
}

[ENABLE]

aobscanmodule(INJECT,dekaron.exe,04 00 00 89 45 A4 8B 01 FF 50 0C) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:
mov [ebp-74],0
mov [edi+0000019A],0
mov [ebp-70],0
mov [edi+000002B3],0
mov [ebp-6C],0
mov [edi+000002B4],0
mov [ebp-68],0
mov [edi+00000226],0
mov [ebp-64],0
mov [edi+00000227],0
mov [ebp-60],0
mov [edi+000003CD],0
mov [ebp-58],0
mov [edi+000003CE],0
mov [ebp-54],0
mov [edi+000004E7],0
mov [ebp-50],0
mov [edi+000004E8],0
mov [ebp-4C],0
mov [edi+0000045A],0
mov [ebp-48],0
mov [edi+0000045B],0
mov [ebp-44],0
mov [edi+0000071B],0
mov [ebp-3C],0
mov [edi+0000071C],0
mov [ebp-38],0
mov [edi+000007A8],0
mov [ebp-34],0
mov [ebp-30],0
mov [edi+00000835],0
mov [ebp-2C],0
mov [edi+00000836],0
mov [ebp-28],0
mov [edi+000008C2],0
mov [ebp-24],0
mov [edi+000008C3],0
mov [ebp-20],0
mov [edi+0000045A],0
mov [ebp-1C],0
mov [edi+0000045B],0
mov [ebp-18],0
mov [edi+0000068E],0
mov [ebp-14],0
mov [edi+0000068F],0
mov [ebp-10],0
mov [edi+0000045B],0
mov [ebp-40],0
mov [edi+0000045B],0
code:
mov eax,[ecx]
call dword ptr [eax+0C]
jmp return

INJECT+06:
jmp newmem
return:
registersymbol(INJECT)

[DISABLE]

INJECT+06:
db 8B 01 FF 50 0C

unregistersymbol(INJECT)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: dekaron.exe+17C37F

dekaron.exe+17C351: 8B 87 5B 04 00 00 - mov eax,[edi+0000045B]
dekaron.exe+17C357: 89 45 E8 - mov [ebp-18],eax
dekaron.exe+17C35A: 0F B6 87 8E 06 00 00 - movzx eax,byte ptr [edi+0000068E]
dekaron.exe+17C361: 89 45 EC - mov [ebp-14],eax
dekaron.exe+17C364: 8B 87 8F 06 00 00 - mov eax,[edi+0000068F]
dekaron.exe+17C36A: 89 45 F0 - mov [ebp-10],eax
dekaron.exe+17C36D: 8B 87 5B 04 00 00 - mov eax,[edi+0000045B]
dekaron.exe+17C373: 89 45 C0 - mov [ebp-40],eax
dekaron.exe+17C376: 8B 87 5B 04 00 00 - mov eax,[edi+0000045B]
dekaron.exe+17C37C: 89 45 A4 - mov [ebp-5C],eax
// ---------- INJECTING HERE ----------
dekaron.exe+17C37F: 8B 01 - mov eax,[ecx]
// ---------- DONE INJECTING ----------
dekaron.exe+17C381: FF 50 0C - call dword ptr [eax+0C]
dekaron.exe+17C384: 8D 4D 8C - lea ecx,[ebp-74]
dekaron.exe+17C387: 51 - push ecx
dekaron.exe+17C388: 8B C8 - mov ecx,eax
dekaron.exe+17C38A: 8B 10 - mov edx,[eax]
dekaron.exe+17C38C: FF 52 1C - call dword ptr [edx+1C]
dekaron.exe+17C38F: 8B 0D 14 F4 12 61 - mov ecx,[dekaron.exe+112F414]
dekaron.exe+17C395: 0F B7 87 7B 01 00 00 - movzx eax,word ptr [edi+0000017B]
dekaron.exe+17C39C: 50 - push eax
dekaron.exe+17C39D: 8B 11 - mov edx,[ecx]
}








vacuum hack













Quote:
{ Game : dekaron.exe
Version:
Date : 2024-07-09
Author : Administrator

This script does blah blah blah
}

[ENABLE]

aobscanmodule(INJECT,dekaron.exe,89 87 C4 00 00 00 5F) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:
mov eax,3E7
mov [edi+04],eax //explore
mov [edi+08],eax //persuit
mov [edi+0C],eax //sight

mov eax,0
mov [edi+10],eax

mov eax,1
mov [edi+14],eax //stand
mov eax,7D0
mov [edi+18],eax //move
mov eax,7D0
mov [edi+1C],eax //explore_stand
mov eax,1
mov [edi+20],eax //explore_move

mov [edi+40],3E7 //followTarget

mov eax,3E7 //spawn monster count
mov [edi+000000AC],eax
mov eax,1 //spawn monster tick
mov [edi+000000B0],eax
mov eax,0 //spawn monster range
mov [edi+000000B4],eax
mov eax,1
mov [edi+000000B8],eax
code:
mov [edi+000000C4],eax
jmp return

INJECT:
jmp newmem
nop
return:
registersymbol(INJECT)

[DISABLE]

INJECT:
db 89 87 C4 00 00 00

unregistersymbol(INJECT)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: dekaron.exe+82C5EA

dekaron.exe+82C5B2: 8B 86 C8 00 00 00 - mov eax,[esi+000000C8]
dekaron.exe+82C5B8: 89 87 CC 00 00 00 - mov [edi+000000CC],eax
dekaron.exe+82C5BE: 8D 86 CC 00 00 00 - lea eax,[esi+000000CC]
dekaron.exe+82C5C4: 50 - push eax
dekaron.exe+82C5C5: E8 76 14 95 FF - call dekaron.exe+17DA40
dekaron.exe+82C5CA: 0F B6 86 BC 00 00 00 - movzx eax,byte ptr [esi+000000BC]
dekaron.exe+82C5D1: 88 87 C0 00 00 00 - mov [edi+000000C0],al
dekaron.exe+82C5D7: 0F B6 86 BD 00 00 00 - movzx eax,byte ptr [esi+000000BD]
dekaron.exe+82C5DE: 88 87 C1 00 00 00 - mov [edi+000000C1],al
dekaron.exe+82C5E4: 8B 86 C0 00 00 00 - mov eax,[esi+000000C0]
// ---------- INJECTING HERE ----------
dekaron.exe+82C5EA: 89 87 C4 00 00 00 - mov [edi+000000C4],eax
// ---------- DONE INJECTING ----------
dekaron.exe+82C5F0: 5F - pop edi
dekaron.exe+82C5F1: 5E - pop esi
dekaron.exe+82C5F2: C2 04 00 - ret 0004
dekaron.exe+82C5F5: CC - int 3
dekaron.exe+82C5F6: CC - int 3
dekaron.exe+82C5F7: CC - int 3
dekaron.exe+82C5F8: CC - int 3
dekaron.exe+82C5F9: CC - int 3
dekaron.exe+82C5FA: CC - int 3
dekaron.exe+82C5FB: CC - int 3
}


08/03/2024 01:55 kgostosa#2
I need for Global .