A new update just came out today that axed my External Hack v1.6
I get this thread in the cmd Window:
==========================
External Hack version 1.6 by sph4ck
for COD7 BlackOps
- works on Vista/Win7 with Aero theme activated
Waiting for BlackOps game...
COD7 game found.
Found process ID: 2012
Resolution: 1152 x 648, pos: 144x37x1302x713
cgs_t found: 0x5ff870
cg_t found: 0x67cdf0
weapons found: 0x4d44d0
entities found: 0x5e98b0
sensitivity_str not found
helis found: 0x5211f0
----------------------------------------
Found CG_T ptr 0xd2c798 and 0x0, should be 0x2ab98100
Calculated REFDEF 0x42ec0, should be 0x2abdafc0
Found CGS_T ptr 0xd2c768 and 0x0, should be 0x2ac09700
Found ENTITIES ptr 0xd2f98c and 0x0, should be 0x2ac840dc
Calculated CLIENTINFO 0x-8cff4, should be 0x2abf70e8
Game not completely loaded, waiting for 2 seconds
----------------------------------------
Found CG_T ptr 0xd2c798 and 0x0, should be 0x2ab98100
Calculated REFDEF 0x42ec0, should be 0x2abdafc0
Found CGS_T ptr 0xd2c768 and 0x0, should be 0x2ac09700
Found ENTITIES ptr 0xd2f98c and 0x0, should be 0x2ac840dc
Calculated CLIENTINFO 0x-8cff4, should be 0x2abf70e8
Game not completely loaded, waiting for 2 seconds
----------------------------------------
Found CG_T ptr 0xd2c798 and 0x2b398100, should be 0x2ab98100
Calculated REFDEF 0x2b3dafc0, should be 0x2abdafc0
Found CGS_T ptr 0xd2c768 and 0x2b409700, should be 0x2ac09700
Found ENTITIES ptr 0xd2f98c and 0x2b4840dc, should be 0x2ac840dc
Calculated CLIENTINFO 0x2b3f70e8, should be 0x2abf70e8
Application ending, cleaning up D3D
Traceback (most recent call last):
File "C:\Users\Jay\Desktop\New folder\ExternalHack v1.6 for BlackOps by Sph4ck
\Sph4ck\main_real.py", line 134, in launch
m.init()
File "C:\Users\Jay\Desktop\New folder\ExternalHack v1.6 for BlackOps by Sph4ck
\Sph4ck\main_real.py", line 55, in init
self.offsets.find_patterns(self.read_game.cod7_pro cess)
File "C:\Users\Jay\Desktop\New folder\ExternalHack v1.6 for BlackOps by Sph4ck
\Sph4ck\PatternFinder.py", line 124, in find_patterns
print "Finding Sensitivity location, string is at location 0x%x" % self.addr
['sensitivity_str']
KeyError: 'sensitivity_str'
Press [ENTER] to exit application[/SIZE][/SIZE]
========================================
KeyError: 'sensitivity_str' ----seems to be the problem
Any fix on this, or another hack that works jsut as well or better?






