|
You last visited: Today at 06:56
Advertisement
[Address]Next-In Game Hamada
Discussion on [Address]Next-In Game Hamada within the S4 League Hacks, Bots, Cheats & Exploits forum part of the S4 League category.
01/31/2017, 08:30
|
#1
|
elite*gold: 0
Join Date: Aug 2014
Posts: 196
Received Thanks: 176
|
[Address]Next-In Game Hamada
#Deleted#
|
|
|
01/31/2017, 09:14
|
#2
|
elite*gold: 0
Join Date: Dec 2014
Posts: 555
Received Thanks: 287
|
Like 90% don't know how to use it.
The 9% who do know how to use it know more and probably already have there own ****.
And not to forgot, 1% are just going to c+p it
|
|
|
01/31/2017, 09:17
|
#3
|
elite*gold: 0
Join Date: Aug 2014
Posts: 196
Received Thanks: 176
|
You use it with cheat engine, add the address with s4 opened... Then change de original value with the modified value, and have fun!
|
|
|
01/31/2017, 10:21
|
#4
|
elite*gold: 0
Join Date: May 2013
Posts: 175
Received Thanks: 125
|
Quote:
Originally Posted by whakezu
Hamada I still remember when I told you that I wanted to learn how to hack and you made fun of me, it's my turn.
|
If your object is to get his addresses, it's not really rocket science. His program is coded with AutoIt, it can just be decompiled:
Code:
Global $address1 = _winapi_getprocaddress(_winapi_loadlibrary("ADVAPI32.dll"), "OpenServiceW")
_memorywrite($address1, _memoryopen(ProcessExists("S4Client.exe")), "0xB801000000C20C00", "byte[8]")
Dim $conquest1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $200hp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $godmode1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7210F30F1085........F30F1185........8D8D........518B15......")
Dim $infsp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0F2F85........761E51F30F1085........F30F1104248B4D808B118B4D808B82........FFD08B4D808B118B4D808B82........")
Dim $infhp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00699F73D........8B1495")
Dim $instant1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "043B48087209C745B0........EB07C745B0........0FB655B085D20F85........8B45CC8B108B4DCC")
Dim $killyourself1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00499F73D........8B1495")
Dim $infammo1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7605E9........8B............0B8B")
Dim $wallshoot1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945EC51D91C248B4D08")
Dim $hitrange1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945C48B4DF464890D")
Dim $onehit1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCC558BEC51894DFC")
Dim $fastfire1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "8B4A043B48087209C745..........EB07C745BC000000000FB655BC85D20F84........8B45F005A003000089")
Dim $mission1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "75................8D4D08E8........E9........C7")
Dim $sentry1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC83EC08894DF8F3....05........F3....45FC8D45FC508B0D........8B0183C00299F73D........8B1495........528B4DF883C12CE8........D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC")
Dim $infblocktime11 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "1C516A038B4DF083C120E8........8D5520526A058B4DF083C120E8........8D4518506A018B4D")
Dim $infblocktime21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "FF8D........038B........20E8..............526A058B4DF083C120E8........8B45EC3B45")
Dim $camera1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0000AF430000C8430000FA43000000")
Dim $screenchanger1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0005........00000004000000000000001400")
Dim $screenchanger21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0600000007000000080000000100000002000000030000000400000005000000060000000700000008000000010000000200")
Dim $xray1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "04000000000000001400000015")
Dim $walk1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D853CFEFFFF50E8")
Dim $run1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "006A038D95C8")
Dim $dodgespeed1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D85B0FEFFFF50E8")
Dim $invisible1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "74108B55FC8B8A........E8........EB0E8B45FC8B88........E8........EB26")
Dim $baseaddress = _memorymodulegetbaseaddress2(ProcessExists("S4Client.exe"), "S4Client.exe")
|
|
|
01/31/2017, 10:27
|
#5
|
elite*gold: 0
Join Date: Aug 2014
Posts: 196
Received Thanks: 176
|
Quote:
Originally Posted by atom0s
If your object is to get his addresses, it's not really rocket science. His program is coded with AutoIt, it can just be decompiled:
Code:
Global $address1 = _winapi_getprocaddress(_winapi_loadlibrary("ADVAPI32.dll"), "OpenServiceW")
_memorywrite($address1, _memoryopen(ProcessExists("S4Client.exe")), "0xB801000000C20C00", "byte[8]")
Dim $conquest1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $200hp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00399F73D........8B1495")
Dim $godmode1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7210F30F1085........F30F1185........8D8D........518B15......")
Dim $infsp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0F2F85........761E51F30F1085........F30F1104248B4D808B118B4D808B82........FFD08B4D808B118B4D808B82........")
Dim $infhp1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00699F73D........8B1495")
Dim $instant1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "043B48087209C745B0........EB07C745B0........0FB655B085D20F85........8B45CC8B108B4DCC")
Dim $killyourself1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC51894DFC8D4508508B0D........8B0183C00499F73D........8B1495")
Dim $infammo1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "7605E9........8B............0B8B")
Dim $wallshoot1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945EC51D91C248B4D08")
Dim $hitrange1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945C48B4DF464890D")
Dim $onehit1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCC558BEC51894DFC")
Dim $fastfire1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "8B4A043B48087209C745..........EB07C745BC000000000FB655BC85D20F84........8B45F005A003000089")
Dim $mission1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "75................8D4D08E8........E9........C7")
Dim $sentry1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC558BEC83EC08894DF8F3....05........F3....45FC8D45FC508B0D........8B0183C00299F73D........8B1495........528B4DF883C12CE8........D945FC8BE55DC3CCCCCCCCCCCCCCCCCCCC")
Dim $infblocktime11 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "1C516A038B4DF083C120E8........8D5520526A058B4DF083C120E8........8D4518506A018B4D")
Dim $infblocktime21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "FF8D........038B........20E8..............526A058B4DF083C120E8........8B45EC3B45")
Dim $camera1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0000AF430000C8430000FA43000000")
Dim $screenchanger1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0005........00000004000000000000001400")
Dim $screenchanger21 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "0600000007000000080000000100000002000000030000000400000005000000060000000700000008000000010000000200")
Dim $xray1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "04000000000000001400000015")
Dim $walk1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D853CFEFFFF50E8")
Dim $run1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "006A038D95C8")
Dim $dodgespeed1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "6A038D85B0FEFFFF50E8")
Dim $invisible1 = _memoryscan(_memoryopen(ProcessExists("S4Client.exe")), "74108B55FC8B8A........E8........EB0E8B45FC8B88........E8........EB26")
Dim $baseaddress = _memorymodulegetbaseaddress2(ProcessExists("S4Client.exe"), "S4Client.exe")
|
Now get the address of the alexmen10 itc bypass  I donīt use the decompile methode,
Is ineffective in many cases.
|
|
|
01/31/2017, 11:40
|
#6
|
elite*gold: 0
Join Date: Jan 2017
Posts: 16
Received Thanks: 0
|
Plz İtc Enchant
|
|
|
01/31/2017, 11:51
|
#7
|
elite*gold: LOCKED
Join Date: Oct 2014
Posts: 1,258
Received Thanks: 12,469
|
What's the point of leeching leeched addresses? This is hilarious XD
|
|
|
01/31/2017, 18:15
|
#8
|
elite*gold: 26
Join Date: Jan 2012
Posts: 3,474
Received Thanks: 18,844
|
closed
|
|
|
All times are GMT +1. The time now is 06:57.
|
|