I've been revisiting my old codes and projects, and here's what I've managed to put together for a mini no-menu hack for testing purposes.
Version 1.0.0.0
Info V1.0:
Hack's or your Mod's must be rename in the Injektor Application Name or Backup.dll. Sample :
"Fortnite dll Injektor_x32.exe" will work with "Fortnite dll Injektor_x32.dll" or "Backup.dll"
"
Hack's or your Mod's must be rename in the Injektor Application Name or Backup.dll. Sample :
"Fortnite dll Injektor_x32.exe" will work with "Fortnite dll Injektor_x32.dll" or "Backup.dll"
"
Download Area

Download Area

================================================== ======
Version 1.2.0.0
Info V1.2:
Hack's or your Mod's must be in the Same Folder like the Tool or Add your .dll files with the Button to the list
Download Area

Hack's or your Mod's must be in the Same Folder like the Tool or Add your .dll files with the Button to the list
Download Area

================================================== ======
[B]Visual Studio Injektor - Dont Trust than Debug yourself , Need only 2 Labels
Option Strict On
Option Explicit On
Imports System.Runtime.InteropServices
Public Class Form1
Const MEM_COMMIT As Integer = &H1000
Const PAGE_READWRITE As Integer = &H4
Const PROCESS_CREATE_THREAD As Integer = &H2
Const PROCESS_VM_OPERATION As Integer = &H8
Const PROCESS_VM_READ As Integer = &H10
Const PROCESS_VM_WRITE As Integer = &H20
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function OpenProcess(ByVal dwDesiredAccess As UInteger, <MarshalAs(UnmanagedType.Bool)> _
ByVal bInheritHandle As Boolean, ByVal dwProcessId As Integer) As System.IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function WriteProcessMemory(ByVal hProcess As System.IntPtr, ByVal lpBaseAddress As System.IntPtr, _
ByVal lpBuffer As String, ByVal nSize As Int32, <Out()> ByRef lpNumberOfBytesWritten As Int32) As _
<MarshalAs(UnmanagedType.Bool)> Boolean
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function VirtualAllocEx(ByVal hProcess As IntPtr, ByVal lpAddress As IntPtr, _
ByVal dwSize As Integer, ByVal flAllocationType As UInteger, _
ByVal flProtect As UInteger) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function GetModuleHandle(ByVal lpModuleName As String) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function GetProcAddress(ByVal hModule As IntPtr, ByVal lpProcName As String) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function CreateRemoteThread(ByVal hProcess As IntPtr, ByVal lpThreadAttributes As Integer, _
ByVal dwStackSize As UInteger, ByVal lpStartAddress As IntPtr, ByVal lpParameter As IntPtr, _
ByVal dwCreationFlags As UInteger, ByRef lpThreadId As IntPtr) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CharSet:=CharSet.Unicode, EntryPoint:="LoadLibraryA")> _
Public Shared Function LoadLibrary(ByVal lpFileName As String) As IntPtr
End Function
Friend WithEvents OZ As New Timer
Const TargetName As String = "WarRock"
Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.Ex ecutablePath)
Private Sub InnjectionMethods_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
Me.TopMost = True
OZ.Interval = 25
If IO.File.Exists(Application.StartupPath & "\" + ExeName + ".dll") Then
Me.Label1.Text = "...Warten auf WarRock.exe"
OZ.Start()
Else
Me.Label1.Text = ">" + ExeName
Me.Label2.Text = ".dll Nicht Gefunden !"
End If
End Sub
Private Sub OZs(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles OZ.Tick
Dim Target As Process() = Process.GetProcessesByName(TargetName)
If Target.Length <> 0 Then
Me.Label2.Text = ">WarRock Is Running"
OZ.Stop()
InjectToProcess()
End If
End Sub
Sub InjectToProcess()
Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.Ex ecutablePath)
Dim Target As Process() = Process.GetProcessesByName(TargetName)
Dim pHandle As IntPtr = OpenProcess(PROCESS_CREATE_THREAD Or PROCESS_VM_OPERATION Or PROCESS_VM_WRITE, False, Target(0).Id)
If (pHandle = IntPtr.Zero) Then
Label2.Text = "<Failed To Open Processs!"
Else
Dim pszLibFileRemote As String = Application.StartupPath & "\" + ExeName + ".dll"
Dim pfnStartAddr As IntPtr = GetProcAddress(GetModuleHandle("Kernel32"), "LoadLibraryA")
Dim TargetBufferSize As Integer = Int(1 + Len(pszLibFileRemote))
Dim LoadLibParamAdr As IntPtr = VirtualAllocEx(pHandle, IntPtr.Zero, TargetBufferSize, MEM_COMMIT, PAGE_READWRITE)
If (LoadLibParamAdr = IntPtr.Zero) Then
Label2.Text = "<Failed To Allocate Memory!"
Else
Dim Rtn As Boolean = WriteProcessMemory(pHandle, LoadLibParamAdr, pszLibFileRemote, TargetBufferSize, 0)
If Rtn = False Then
Label2.Text = "<Failed To Write Memory!"
Else
Dim lpThreadId As IntPtr
CreateRemoteThread(pHandle, 0, 0, pfnStartAddr, LoadLibParamAdr, 0, lpThreadId)
If (lpThreadId = IntPtr.Zero) Then
Label2.Text = "<Failed To Create Thread!"
Else
Label2.Text = "<Dll Injected Succefully!"
End If
Me.Close()
End If
End If
End If
End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
Me.BackColor = Color.Red
Me.TransparencyKey = Me.BackColor
Me.Hide()
End Sub
End Class
Option Explicit On
Imports System.Runtime.InteropServices
Public Class Form1
Const MEM_COMMIT As Integer = &H1000
Const PAGE_READWRITE As Integer = &H4
Const PROCESS_CREATE_THREAD As Integer = &H2
Const PROCESS_VM_OPERATION As Integer = &H8
Const PROCESS_VM_READ As Integer = &H10
Const PROCESS_VM_WRITE As Integer = &H20
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function OpenProcess(ByVal dwDesiredAccess As UInteger, <MarshalAs(UnmanagedType.Bool)> _
ByVal bInheritHandle As Boolean, ByVal dwProcessId As Integer) As System.IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function WriteProcessMemory(ByVal hProcess As System.IntPtr, ByVal lpBaseAddress As System.IntPtr, _
ByVal lpBuffer As String, ByVal nSize As Int32, <Out()> ByRef lpNumberOfBytesWritten As Int32) As _
<MarshalAs(UnmanagedType.Bool)> Boolean
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function VirtualAllocEx(ByVal hProcess As IntPtr, ByVal lpAddress As IntPtr, _
ByVal dwSize As Integer, ByVal flAllocationType As UInteger, _
ByVal flProtect As UInteger) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function GetModuleHandle(ByVal lpModuleName As String) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function GetProcAddress(ByVal hModule As IntPtr, ByVal lpProcName As String) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CallingConvention:=CallingConvention.Winapi)> _
Public Shared Function CreateRemoteThread(ByVal hProcess As IntPtr, ByVal lpThreadAttributes As Integer, _
ByVal dwStackSize As UInteger, ByVal lpStartAddress As IntPtr, ByVal lpParameter As IntPtr, _
ByVal dwCreationFlags As UInteger, ByRef lpThreadId As IntPtr) As IntPtr
End Function
<DllImport("kernel32.dll", SetLastError:=True, CharSet:=CharSet.Unicode, EntryPoint:="LoadLibraryA")> _
Public Shared Function LoadLibrary(ByVal lpFileName As String) As IntPtr
End Function
Friend WithEvents OZ As New Timer
Const TargetName As String = "WarRock"
Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.Ex ecutablePath)
Private Sub InnjectionMethods_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
Me.TopMost = True
OZ.Interval = 25
If IO.File.Exists(Application.StartupPath & "\" + ExeName + ".dll") Then
Me.Label1.Text = "...Warten auf WarRock.exe"
OZ.Start()
Else
Me.Label1.Text = ">" + ExeName
Me.Label2.Text = ".dll Nicht Gefunden !"
End If
End Sub
Private Sub OZs(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles OZ.Tick
Dim Target As Process() = Process.GetProcessesByName(TargetName)
If Target.Length <> 0 Then
Me.Label2.Text = ">WarRock Is Running"
OZ.Stop()
InjectToProcess()
End If
End Sub
Sub InjectToProcess()
Dim ExeName As String = IO.Path.GetFileNameWithoutExtension(Application.Ex ecutablePath)
Dim Target As Process() = Process.GetProcessesByName(TargetName)
Dim pHandle As IntPtr = OpenProcess(PROCESS_CREATE_THREAD Or PROCESS_VM_OPERATION Or PROCESS_VM_WRITE, False, Target(0).Id)
If (pHandle = IntPtr.Zero) Then
Label2.Text = "<Failed To Open Processs!"
Else
Dim pszLibFileRemote As String = Application.StartupPath & "\" + ExeName + ".dll"
Dim pfnStartAddr As IntPtr = GetProcAddress(GetModuleHandle("Kernel32"), "LoadLibraryA")
Dim TargetBufferSize As Integer = Int(1 + Len(pszLibFileRemote))
Dim LoadLibParamAdr As IntPtr = VirtualAllocEx(pHandle, IntPtr.Zero, TargetBufferSize, MEM_COMMIT, PAGE_READWRITE)
If (LoadLibParamAdr = IntPtr.Zero) Then
Label2.Text = "<Failed To Allocate Memory!"
Else
Dim Rtn As Boolean = WriteProcessMemory(pHandle, LoadLibParamAdr, pszLibFileRemote, TargetBufferSize, 0)
If Rtn = False Then
Label2.Text = "<Failed To Write Memory!"
Else
Dim lpThreadId As IntPtr
CreateRemoteThread(pHandle, 0, 0, pfnStartAddr, LoadLibParamAdr, 0, lpThreadId)
If (lpThreadId = IntPtr.Zero) Then
Label2.Text = "<Failed To Create Thread!"
Else
Label2.Text = "<Dll Injected Succefully!"
End If
Me.Close()
End If
End If
End If
End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
Me.BackColor = Color.Red
Me.TransparencyKey = Me.BackColor
Me.Hide()
End Sub
End Class
Old Nomenu Base , Newby friendly for Learning , Addys/Patters/Offsets here must be uptodate
pragma warning(disable: 4244)
include <windows.h>
include <stdio.h>
include <stdlib.h>
define ADR_UWORLD=0x10AEC0B8;
define ADR_GWORLD=0xF16DE38;
define ADR_GAME_INSTANCE = 0x1B8;
define ADR_LOCAL_PLAYERS = 0x38;
define ADR_PLAYER_CONTROLLER = 0x30;
define ADR_LOCAL_PAWN = 0x338;
define ADR_PAWN_PRIVATE = 0x308;
define ADR_ROOT_COMPONENT = 0x198;
define ADR_RELATIVE_LOCATION = 0x128;
define ADR_PLAYER_STATE = 0x2B0;
define ADR_TEAM_INDEX = 0x10E0;
define ADR_GAME_STATE = 0x158;
define ADR_PLAYER_ARRAY = 0x2A8;
define ADR_MESH = 0x318;
define ADR_CurrentActor = 0x8;
define ADR_COMPONENT_TO_WORLD = 0x240;
define ADR_BONE_ARRAY = 0x610;
define ADR_BONE_ARRAY_CACHE = 0x620;
define ADR_BONE = 0x610;
define ADR_LAST_SUMBIT_TIME 0x368;
define ADR_LAST_SUMBIT_TIME_ON_SCREEN 0x370;
DWORD dwPlayer = *(DWORD*)ADR_PLAYERPOINTER;
DWORD dwServer = *(DWORD*)ADR_SERVERPOINTER;
DWORD dwPlayerPtr = *(DWORD*)ADR_PLAYERPOINTER;
DWORD dwServerPtr = *(DWORD*)ADR_SERVERPOINTER;
float posiX;
float posiY;
float posiZ;
void get_player_name (uintptr_t player_state, bool inlobby ) -> std::string
{
if(GetAsyncKeyState(VK_NUMPAD0) &1<< 0xF) // Hotkey
{
int pNameLength;
_WORD* pNameBufferPointer;
int i;
char v25;
int v26;
int v29;
char16_t* pNameBuffer;
uintptr_t pNameStructure = read < uintptr_t > ( player_state + 0xAE8 ); //pNameStructure
if (is_valid(pNameStructure)) {
pNameLength = read <int> ( pNameStructure + 0x10 );
if ( pNameLength <= 0 )
return "AI";
pNameBuffer = new char16_t[pNameLength];
uintptr_t pNameEncryptedBuffer = read <uintptr_t>( pNameStructure + 0x8 );
if (is_valid(pNameEncryptedBuffer)) {
read_array(pNameEncryptedBuffer, pNameBuffer, pNameLength);
v25 = pNameLength - 1;
v26 = 0;
pNameBufferPointer = (_WORD*)pNameBuffer;
for (i = (v25) & 3;; *pNameBufferPointer++ += i & 7) {
v29 = pNameLength - 1;
if (!(_DWORD)pNameLength)
v29 = 0;
if (v26 >= v29)
break;
i += 3;
++v26;
}
std::u16string temp_wstring(pNameBuffer);
delete[] pNameBuffer;
return std::string(temp_wstring.begin(), temp_wstring.end());
}
}
void GetBoneIndex(uint64_t ADR_MESH, int index)
{
if(GetAsyncKeyState(VK_NUMPAD3) &1<< 0xF)
{
uint64_t bonearray = read<uint64_t>(ADR_MESH + 0x4a8);
if (!bonearray) bonearray = read<uint64_t>(ADR_MESH+ 0x4a8 + 0x10);
return read<FTransform>(bonearray + (index * 0x30));
}
}
void exit()
{
if(GetAsyncKeyState(VK_DELETE) &1<< 0xF)
{
ExitProcess(0);
}
}
void jump()
{
if(GetAsyncKeyState(VK_CONTROL) &1)
{
DWORD dwPlayerPtr = *(DWORD*)ADR_PLAYERPOINTER;
if(dwPlayerPtr != 0)
{
*(float*)(dwPlayerPtr+OFS_Z) = 2500;
}
}
}
void Teleport()
{
DWORD dwPlayerPtr = *(DWORD*)ADR_PLAYERPOINTER;
if(dwPlayerPtr != 0)
{
if (GetAsyncKeyState(VK_F2))
{
posiX = *(float*)(dwPlayerPtr + OFS_X);
posiY = *(float*)(dwPlayerPtr + OFS_Y);
posiZ = *(float*)(dwPlayerPtr + OFS_Z);
}
if (GetAsyncKeyState(VK_F3))
{
*(float*)(dwPlayerPtr + OFS_X) = posiX;
*(float*)(dwPlayerPtr + OFS_Y) = posiY;
*(float*)(dwPlayerPtr + OFS_Z) = posiZ;
}
}
}
void HackThread()
{
for(;
{
get_player_name();
GetBoneIndex();
jump();
exit();
Teleport();
Sleep(200);
}
}
BOOL WINAPI DllMain(HINSTANCE mod, DWORD DWORD_GRUND, LPVOID res)
{
switch(DWORD_GRUND)
{
case 1:
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)HackThread , 0, 0, 0);
break;
case 2:
break;
}
return TRUE;
}
include <windows.h>
include <stdio.h>
include <stdlib.h>
define ADR_UWORLD=0x10AEC0B8;
define ADR_GWORLD=0xF16DE38;
define ADR_GAME_INSTANCE = 0x1B8;
define ADR_LOCAL_PLAYERS = 0x38;
define ADR_PLAYER_CONTROLLER = 0x30;
define ADR_LOCAL_PAWN = 0x338;
define ADR_PAWN_PRIVATE = 0x308;
define ADR_ROOT_COMPONENT = 0x198;
define ADR_RELATIVE_LOCATION = 0x128;
define ADR_PLAYER_STATE = 0x2B0;
define ADR_TEAM_INDEX = 0x10E0;
define ADR_GAME_STATE = 0x158;
define ADR_PLAYER_ARRAY = 0x2A8;
define ADR_MESH = 0x318;
define ADR_CurrentActor = 0x8;
define ADR_COMPONENT_TO_WORLD = 0x240;
define ADR_BONE_ARRAY = 0x610;
define ADR_BONE_ARRAY_CACHE = 0x620;
define ADR_BONE = 0x610;
define ADR_LAST_SUMBIT_TIME 0x368;
define ADR_LAST_SUMBIT_TIME_ON_SCREEN 0x370;
DWORD dwPlayer = *(DWORD*)ADR_PLAYERPOINTER;
DWORD dwServer = *(DWORD*)ADR_SERVERPOINTER;
DWORD dwPlayerPtr = *(DWORD*)ADR_PLAYERPOINTER;
DWORD dwServerPtr = *(DWORD*)ADR_SERVERPOINTER;
float posiX;
float posiY;
float posiZ;
void get_player_name (uintptr_t player_state, bool inlobby ) -> std::string
{
if(GetAsyncKeyState(VK_NUMPAD0) &1<< 0xF) // Hotkey
{
int pNameLength;
_WORD* pNameBufferPointer;
int i;
char v25;
int v26;
int v29;
char16_t* pNameBuffer;
uintptr_t pNameStructure = read < uintptr_t > ( player_state + 0xAE8 ); //pNameStructure
if (is_valid(pNameStructure)) {
pNameLength = read <int> ( pNameStructure + 0x10 );
if ( pNameLength <= 0 )
return "AI";
pNameBuffer = new char16_t[pNameLength];
uintptr_t pNameEncryptedBuffer = read <uintptr_t>( pNameStructure + 0x8 );
if (is_valid(pNameEncryptedBuffer)) {
read_array(pNameEncryptedBuffer, pNameBuffer, pNameLength);
v25 = pNameLength - 1;
v26 = 0;
pNameBufferPointer = (_WORD*)pNameBuffer;
for (i = (v25) & 3;; *pNameBufferPointer++ += i & 7) {
v29 = pNameLength - 1;
if (!(_DWORD)pNameLength)
v29 = 0;
if (v26 >= v29)
break;
i += 3;
++v26;
}
std::u16string temp_wstring(pNameBuffer);
delete[] pNameBuffer;
return std::string(temp_wstring.begin(), temp_wstring.end());
}
}
void GetBoneIndex(uint64_t ADR_MESH, int index)
{
if(GetAsyncKeyState(VK_NUMPAD3) &1<< 0xF)
{
uint64_t bonearray = read<uint64_t>(ADR_MESH + 0x4a8);
if (!bonearray) bonearray = read<uint64_t>(ADR_MESH+ 0x4a8 + 0x10);
return read<FTransform>(bonearray + (index * 0x30));
}
}
void exit()
{
if(GetAsyncKeyState(VK_DELETE) &1<< 0xF)
{
ExitProcess(0);
}
}
void jump()
{
if(GetAsyncKeyState(VK_CONTROL) &1)
{
DWORD dwPlayerPtr = *(DWORD*)ADR_PLAYERPOINTER;
if(dwPlayerPtr != 0)
{
*(float*)(dwPlayerPtr+OFS_Z) = 2500;
}
}
}
void Teleport()
{
DWORD dwPlayerPtr = *(DWORD*)ADR_PLAYERPOINTER;
if(dwPlayerPtr != 0)
{
if (GetAsyncKeyState(VK_F2))
{
posiX = *(float*)(dwPlayerPtr + OFS_X);
posiY = *(float*)(dwPlayerPtr + OFS_Y);
posiZ = *(float*)(dwPlayerPtr + OFS_Z);
}
if (GetAsyncKeyState(VK_F3))
{
*(float*)(dwPlayerPtr + OFS_X) = posiX;
*(float*)(dwPlayerPtr + OFS_Y) = posiY;
*(float*)(dwPlayerPtr + OFS_Z) = posiZ;
}
}
}
void HackThread()
{
for(;
{
get_player_name();
GetBoneIndex();
jump();
exit();
Teleport();
Sleep(200);
}
}
BOOL WINAPI DllMain(HINSTANCE mod, DWORD DWORD_GRUND, LPVOID res)
{
switch(DWORD_GRUND)
{
case 1:
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)HackThread , 0, 0, 0);
break;
case 2:
break;
}
return TRUE;
}
================================================== ======
Download Other Source Codes






