|
You last visited: Today at 01:47
Advertisement
[P22.x]Invisible & Half SP Hack (+Sp Reg.)
Discussion on [P22.x]Invisible & Half SP Hack (+Sp Reg.) within the S4 League Hacks, Bots, Cheats & Exploits forum part of the S4 League category.
10/17/2010, 21:29
|
#31
|
elite*gold: 0
Join Date: Oct 2010
Posts: 124
Received Thanks: 8
|
Nice Work! Danke !
|
|
|
10/17/2010, 21:51
|
#32
|
elite*gold: 0
Join Date: Oct 2010
Posts: 374
Received Thanks: 350
|
Quote:
Originally Posted by Andrea123456789[1]
Is an auto-ban.exe
|
PHP Code:
#RequireAdmin #region _Memory FUNC _MEMORYOPEN($IV_PID,$IV_DESIREDACCESS=2035711,$IV_ INHERITHANDLE=1) IF NOT PROCESSEXISTS($IV_PID)THEN SETERROR(1) RETURN 0 ENDIF LOCAL $AH_HANDLE[2]=[DLLOPEN("kernel32.dll")] IF @ERROR THEN SETERROR(2) RETURN 0 ENDIF LOCAL $AV_OPENPROCESS=DLLCALL($AH_HANDLE[0],"int","OpenProcess","int",$IV_DESIREDACCESS,"int" ,$IV_INHERITHANDLE,"int",$IV_PID) IF @ERROR THEN DLLCLOSE($AH_HANDLE[0]) SETERROR(3) RETURN 0 ENDIF $AH_HANDLE[1]=$AV_OPENPROCESS[0] RETURN $AH_HANDLE ENDFUNC FUNC _MEMORYREAD($IV_ADDRESS,$AH_HANDLE,$SV_TYPE="dword ") IF NOT ISARRAY($AH_HANDLE)THEN SETERROR(1) RETURN 0 ENDIF LOCAL $V_BUFFER=DLLSTRUCTCREATE($SV_TYPE) IF @ERROR THEN SETERROR(@ERROR+1) RETURN 0 ENDIF DLLCALL($AH_HANDLE[0],"int","ReadProcessMemory","int",$AH_HANDLE[1],"int",$IV_ADDRESS,"ptr",DLLSTRUCTGETPTR($V_BUFFER ),"int",DLLSTRUCTGETSIZE($V_BUFFER),"int","") IF NOT @ERROR THEN LOCAL $V_VALUE=DLLSTRUCTGETDATA($V_BUFFER,1) RETURN $V_VALUE ELSE SETERROR(6) RETURN 0 ENDIF ENDFUNC FUNC _MEMORYWRITE($IV_ADDRESS,$AH_HANDLE,$V_DATA,$SV_TY PE="dword") IF NOT ISARRAY($AH_HANDLE)THEN SETERROR(1) RETURN 0 ENDIF LOCAL $V_BUFFER=DLLSTRUCTCREATE($SV_TYPE) IF @ERROR THEN SETERROR(@ERROR+1) RETURN 0 ELSE DLLSTRUCTSETDATA($V_BUFFER,1,$V_DATA) IF @ERROR THEN SETERROR(6) RETURN 0 ENDIF ENDIF DLLCALL($AH_HANDLE[0],"int","WriteProcessMemory","int",$AH_HANDLE[1],"int",$IV_ADDRESS,"ptr",DLLSTRUCTGETPTR($V_BUFFER ),"int",DLLSTRUCTGETSIZE($V_BUFFER),"int","") IF NOT @ERROR THEN RETURN 1 ELSE SETERROR(7) RETURN 0 ENDIF ENDFUNC FUNC _MEMORYCLOSE($AH_HANDLE) IF NOT ISARRAY($AH_HANDLE)THEN SETERROR(1) RETURN 0 ENDIF DLLCALL($AH_HANDLE[0],"int","CloseHandle","int",$AH_HANDLE[1]) IF NOT @ERROR THEN DLLCLOSE($AH_HANDLE[0]) RETURN 1 ELSE DLLCLOSE($AH_HANDLE[0]) SETERROR(2) RETURN 0 ENDIF ENDFUNC FUNC SETPRIVILEGE($PRIVILEGE,$BENABLE) CONST $TOKEN_ADJUST_PRIVILEGES=32 CONST $TOKEN_QUERY=8 CONST $SE_PRIVILEGE_ENABLED=2 LOCAL $HTOKEN,$SP_AUXRET,$SP_RET,$HCURRPROCESS,$NTOKENS, $NTOKENINDEX,$PRIV $NTOKENS=1 $LUID=DLLSTRUCTCREATE("dword;int") IF ISARRAY($PRIVILEGE)THEN $NTOKENS=UBOUND($PRIVILEGE) $TOKEN_PRIVILEGES=DLLSTRUCTCREATE("dword;dword["&(3*$NTOKENS)&"]") $NEWTOKEN_PRIVILEGES=DLLSTRUCTCREATE("dword;dword["&(3*$NTOKENS)&"]") $HCURRPROCESS=DLLCALL("kernel32.dll","hwnd","GetCu rrentProcess") $SP_AUXRET=DLLCALL("advapi32.dll","int","OpenProce ssToken","hwnd",$HCURRPROCESS[0],"int",BITOR($TOKEN_ADJUST_PRIVILEGES,$TOKEN_QUERY ),"int_ptr",0) IF $SP_AUXRET[0]THEN $HTOKEN=$SP_AUXRET[3] DLLSTRUCTSETDATA($TOKEN_PRIVILEGES,1,1) $NTOKENINDEX=1 WHILE $NTOKENINDEX<=$NTOKENS IF ISARRAY($PRIVILEGE)THEN $PRIV=$PRIVILEGE[$NTOKENINDEX-1] ELSE $PRIV=$PRIVILEGE ENDIF $RET=DLLCALL("advapi32.dll","int","LookupPrivilege Value","str","","str",$PRIV,"ptr",DLLSTRUCTGETPTR( $LUID)) IF $RET[0]THEN IF $BENABLE THEN DLLSTRUCTSETDATA($TOKEN_PRIVILEGES,2,$SE_PRIVILEGE _ENABLED,(3*$NTOKENINDEX)) ELSE DLLSTRUCTSETDATA($TOKEN_PRIVILEGES,2,0,(3*$NTOKENI NDEX)) ENDIF DLLSTRUCTSETDATA($TOKEN_PRIVILEGES,2,DLLSTRUCTGETD ATA($LUID,1),(3*($NTOKENINDEX-1))+1) DLLSTRUCTSETDATA($TOKEN_PRIVILEGES,2,DLLSTRUCTGETD ATA($LUID,2),(3*($NTOKENINDEX-1))+2) DLLSTRUCTSETDATA($LUID,1,0) DLLSTRUCTSETDATA($LUID,2,0) ENDIF $NTOKENINDEX+=1 WEND $RET=DLLCALL("advapi32.dll","int","AdjustTokenPriv ileges","hwnd",$HTOKEN,"int",0,"ptr",DLLSTRUCTGETP TR($TOKEN_PRIVILEGES),"int",DLLSTRUCTGETSIZE($NEWT OKEN_PRIVILEGES),"ptr",DLLSTRUCTGETPTR($NEWTOKEN_P RIVILEGES),"int_ptr",0) $F=DLLCALL("kernel32.dll","int","GetLastError") ENDIF $NEWTOKEN_PRIVILEGES=0 $TOKEN_PRIVILEGES=0 $LUID=0 IF $SP_AUXRET[0]=0 THEN RETURN 0 $SP_AUXRET=DLLCALL("kernel32.dll","int","CloseHand le","hwnd",$HTOKEN) IF NOT $RET[0]AND NOT $SP_AUXRET[0]THEN RETURN 0 RETURN $RET[0] ENDFUNC #endregion TOOLTIP("Warte auf S4Client.exe by TheHackerZero & MrTest419...",0,0) $PID=PROCESSWAIT("S4Client.exe") $OPEN=_MEMORYOPEN($PID) _MEMORYWRITE(13579488,$OPEN,"value","char[6]") _MEMORYWRITE(13652306,$OPEN,"value","char[6]") _MEMORYWRITE(13652326,$OPEN,"value","char[6]") _MEMORYWRITE(13904884,$OPEN,"value","char[6]") _MEMORYWRITE(13905722,$OPEN,"value","char[6]") _MEMORYWRITE(13906156,$OPEN,"value","char[6]") _MEMORYWRITE(13906175,$OPEN,"value","char[6]") _MEMORYWRITE(13906191,$OPEN,"value","char[6]") _MEMORYWRITE(13906206,$OPEN,"value","char[6]") _MEMORYWRITE(13906234,$OPEN,"value","char[6]") _MEMORYWRITE(13906250,$OPEN,"value","char[6]") _MEMORYWRITE(13918807,$OPEN,"value","char[6]") _MEMORYWRITE(13918819,$OPEN,"value","char[6]") _MEMORYWRITE(13928892,$OPEN,"value","char[6]") _MEMORYWRITE(14022352,$OPEN,"value","char[6]") _MEMORYWRITE(14026704,$OPEN,"value","char[6]") _MEMORYWRITE(14026740,$OPEN,"value","char[6]") _MEMORYWRITE(14028104,$OPEN,"value","char[6]") _MEMORYWRITE(14080683,$OPEN,"value","char[6]") _MEMORYWRITE(14081573,$OPEN,"value","char[6]") _MEMORYWRITE(14082719,$OPEN,"value","char[6]") _MEMORYWRITE(14083250,$OPEN,"value","char[6]") _MEMORYWRITE(14083932,$OPEN,"value","char[6]") _MEMORYWRITE(14084708,$OPEN,"value","char[6]") _MEMORYWRITE(14085574,$OPEN,"value","char[6]") _MEMORYWRITE(14086620,$OPEN,"value","char[6]") _MEMORYWRITE(14087769,$OPEN,"value","char[6]") _MEMORYWRITE(14088685,$OPEN,"value","char[6]") _MEMORYWRITE(14089682,$OPEN,"value","char[6]") _MEMORYWRITE(14092135,$OPEN,"value","char[6]") _MEMORYWRITE(14093309,$OPEN,"value","char[6]") _MEMORYWRITE(14094574,$OPEN,"value","char[6]") _MEMORYWRITE(14096180,$OPEN,"value","char[6]") _MEMORYWRITE(14097882,$OPEN,"value","char[6]") _MEMORYWRITE(14099231,$OPEN,"value","char[6]") _MEMORYWRITE(14102427,$OPEN,"value","char[6]") _MEMORYWRITE(14104287,$OPEN,"value","char[6]") _MEMORYWRITE(14289550,$OPEN,"value","char[6]") TOOLTIP("Erfolgreich injected.",0,0) EXIT
was soll der mist du noob
|
|
|
10/17/2010, 22:21
|
#33
|
elite*gold: 0
Join Date: Dec 2009
Posts: 183
Received Thanks: 38
|
wo ist der link?
|
|
|
10/17/2010, 22:23
|
#34
|
elite*gold: 0
Join Date: Oct 2010
Posts: 374
Received Thanks: 350
|
der hat den gelöcht wegen den scheiß spast andrea
|
|
|
10/17/2010, 22:25
|
#35
|
elite*gold: 1
Join Date: Oct 2009
Posts: 169
Received Thanks: 20
|
great
|
|
|
10/17/2010, 22:25
|
#36
|
elite*gold: 0
Join Date: Aug 2010
Posts: 3,833
Received Thanks: 969
|
Quote:
Originally Posted by TheHackerZero
Der über meinem Post..
Naja tue keine Hacks mehr glaub für eine Zeit lang mehr rein..
~Grund Andrea
Andrea reported..
|
Und wieso bitte interissiert dich ne unwichtige meinung von einem unwichtigen noob?
|
|
|
10/17/2010, 22:27
|
#37
|
elite*gold: 0
Join Date: Dec 2009
Posts: 183
Received Thanks: 38
|
war so happy als ich diesen thead gesehn hab T_T
|
|
|
10/17/2010, 22:32
|
#38
|
Moderator
elite*gold: 100
Join Date: Sep 2010
Posts: 25,912
Received Thanks: 5,841
|
Hack ist wieder drinne..
|
|
|
10/17/2010, 22:34
|
#39
|
elite*gold: 0
Join Date: Jun 2010
Posts: 49
Received Thanks: 16
|
release odch dein Gm und gut is
|
|
|
10/17/2010, 22:36
|
#40
|
elite*gold: 0
Join Date: Dec 2009
Posts: 183
Received Thanks: 38
|
thx^^
€: man kann die exe net starten weil der pfad net erkannt wird o.O
|
|
|
10/17/2010, 22:49
|
#41
|
elite*gold: 1022
Join Date: Jul 2009
Posts: 17,431
Received Thanks: 5,034
|
Ich hab des Problem Antivir Block es da anscheinend ein Trojaner drin is O.o
|
|
|
10/17/2010, 23:23
|
#42
|
elite*gold: 0
Join Date: Aug 2009
Posts: 311
Received Thanks: 48
|
bei mir öffnet sich nichmal das programm XDD
|
|
|
10/17/2010, 23:27
|
#43
|
elite*gold: 0
Join Date: Dec 2009
Posts: 183
Received Thanks: 38
|
bei mir auch net
|
|
|
10/17/2010, 23:41
|
#44
|
elite*gold: 0
Join Date: Aug 2010
Posts: 462
Received Thanks: 1,618
|
Habt ihr es als Admin gestartet ?
|
|
|
10/17/2010, 23:43
|
#45
|
elite*gold: 0
Join Date: Dec 2009
Posts: 183
Received Thanks: 38
|
wenn ich als admin starten will gehts net pfad wird net gefunden
|
|
|
|
|
Similar Threads
|
[Search/Suche]Half Life 2 Deatchmatch Hack
04/24/2009 - General Coding - 2 Replies
Hello/Hallo User/Coder
I searching Hacks for hl2 dm.
Ich suche hl2 dm Hacks.
Please Post some sites.
Bitte Postet vorschläge.
Thanks to all.
Danke an alle.
|
invisible hack ?!
03/12/2008 - Dekaron - 17 Replies
can any1 explain me a easy invisible hack pls
|
Hunters: How To Get A Half Invisible Cat w/o Prowl
03/06/2007 - WoW Guides & Templates - 9 Replies
The cat you must tame is called "Ghost Saber".
http://wow.allakhazam.com/db/mob.html?wmob=3619
Before taming it will look like this:
http://wow.allakhazam.com/images/mobs/ghost_saber .jpg
It will be summoned by a "Cat Figurine" in the Naga area around 58.24.
http://wow.allakhazam.com/db/item.html?witem=5329
|
half-god mode, invisible and more
07/06/2005 - GunZ - 21 Replies
replace system.mrs with this when running gunz.exe then before logging in replace with normal system.mrs and you should take only 1 damage from everything and if u have kits they heal u full and should have 950 of em nuff said is off to pwn some more ass 9V1 yeah baby
anyways i've made it TOTALLY INVINCIBLE no more crappy 1 damage per everything if u just wanna kick some total ass
weapons and armors upgraded
following this scale
allweakest armors ->(become) strongest armors(won't matter...
|
All times are GMT +2. The time now is 01:47.
|
|