latest articles
G-Cash Generator
Cheat Lost Saga Indonesia (NoDelay) 7 Februari 2015
Cheat Lost Saga Indonesia (NoDelay) 7 Februari 2015
*Update Fitur Cheat :
*Battle Hack :
[x] No Delay Skill
[x] Unlimited HP
[x] No Fall Damage
[x] Anti Hit
[x] No Drop
*CSD/DG Hack :
[x] 1 Hit CSD
*Down Skill Hack
[x]Auto Drop
* Other Hack
[x] Drop Field
[x ]Hack Nick GM
* Emergency Hack
[x] Exit Game Cepat [ END ]
( ini digunakan kalo LS nyangkut / Terputus dari Server gak keluar-keluar pencet aja Tombol 'END' )
*Battle Hack :
[x] No Delay Skill
[x] Unlimited HP
[x] No Fall Damage
[x] Anti Hit
[x] No Drop
*CSD/DG Hack :
[x] 1 Hit CSD
*Down Skill Hack
[x]Auto Drop
* Other Hack
[x] Drop Field
[x ]Hack Nick GM
* Emergency Hack
[x] Exit Game Cepat [ END ]
( ini digunakan kalo LS nyangkut / Terputus dari Server gak keluar-keluar pencet aja Tombol 'END' )
*Cara Download :*
*Password Jika Di butuhkan :*
D-JumPer
[+] Extract Cheat
[+] Buka LS + Jangan Di Start Dulu
[+] Buka D-JumPer Cheat LSI.exe(jika pengguna Windows 7 , klik Kanan > Run As Administrator)
[+] Login Lost Saga
[+] Ada Notice Oke Oke saja
[+] Enjoy In My Cheat ^_^
Tutorial Inject Cheatnya:
Semoga Bermanfaat ^_^
Cara Buat Cheat Lost Saga
Kali Ini Saya Akan Share Cara Membuat Cheat Lost Saga
Peralatan nya Untuk Membuat Cheat Lost saga :
1. SC Dll
2. AOB Full
3. Injectornya
4. Otak
Sebenernya Kalian Sudah Tau Cara Membuat Cheat Lost Saga Menggunakan CE ,, Tapi Kalian Sudah Tau Cara Cari OFFSET pasti Make CE
Langsung Cari Bahan2nya SHARE :
Download AOB Full : DOWNLOAD
Download Dev C++ : DOWNLOAD
Download Injectornya : DOWNLOAD
Download Video Cara Membuat nya : DOWNLOAD Read more
Cara Membuat Cheat PB Sendiri
Cara Membuat Cheat Point Blank Sendiri Part 1
Posted by karwita ita
07.45, under Cara Membuat Cheat Point Blank Sendiri | No comments
Syaratnya sebenarnya cuma 1 aja kok, jadi teman-teman cuma butuh mengerti fungsi-fungsi dari microsoft visual C aja agar bisa menggunakan tutorial ini. Jika belum bisa ataupun belum mengerti caranya, silahkan bisa browsing di google.com (apa aja ada...hehehe...). Nah klo yang mau download silakan bisa kesini link atau cari aja di google.com hahaha...google lagi yah :P
Oke langsung aja saya mulai, jadi seperti yang kita ketahui bahwa anda menggunakan cheat pb selama ini adalah menggunakan dll untuk memanggil fungsi pada point blank (biasanya file i3exec yang terinject), walaupun pada beberapa fitur cheat, tidak selalu merubah value di i3exec. Jadi apakah Calling Message Box Function itu sendiri? Calling Message Box Function itu adalah memanggil fungsi dari message box yang ada pada game point blank. Jadi dalam kata lain, anda bisa merubah value dari message box sesuain dengan keinginan anda. Disini saya memberikan yang simple untuk memudahkan anda melakukan explorasi dalam cheating, dan jika anda sukses melakukan tutorial saya yang satu ini, maka dengan explorasi anda, bukan tidak mungkin anda bisa menemukan cheat point blank yang berbagai macam sesuai dengan pemikiran anda sendiri.
Pertama yang harus anda lakukan adalah :
1. Buka MSVC + anda (kalau bisa yang versi 2010)
2. Kemudian Copy dan Paste pada MSVC anda source dari ABU JAFAR N3 berikut ini :
/*
Coded by : abujafar
Time/date : 13:43 08/09/2011
Example for : Point Blank Indonesia
*/
#include <windows.h>
#define PTR_THIS 0x5efc2c
#define PTR_MSGROOT 0x219e10
#define PTR_CALLER 0x5a680
DWORD dwModule = NULL;
typedef void (__thiscall *pMsgBox)(void*, /* this pointer */
char*, /* text*/
char*, /* caption */
int, /* type */
void*, /* own message root (callback)*/
void*, /* system message root */
int, /* unknown, biasanya value 10 (0xA) */
int, /* unknown, biasanya value 1 (true?) */
int); /* unknown, biasanya value 1 (true?) */
/*
untuk parameter 'type':
0x10001 = ok only (force exit)
0x10002 = ok (exit) + cancel
0x10004 = no button (wait msgbox)
0x20001 = ok only (no exit)
0x20002 = ok (exit) + cancel
0x20004 = no button (wait msgbox)
*/
bool bInit = false;
pMsgBox _MsgBox;
void* pThis;
void* pProc;
void DoMsgBox() {
if(!bInit) {
pThis = (void*)*(DWORD*)(dwModule+PTR_THIS);
pProc = (void*)(dwModule+PTR_MSGROOT);
_MsgBox = (pMsgBox)(dwModule+PTR_CALLER);
bInit = true;
}
_MsgBox(pThis,
"Hello nyit-nyit...\nThis is MessageBox from your pwnd function.\n\nabujafar@nyit-nyit",
"Pwnd",
0x20001,
pProc,
0,
0xA,
1,
1);
}
void MainThread() {
while(!dwModule) {
dwModule = (DWORD)GetModuleHandle("PointBlank.i3Exec");
Sleep(100);
}
while(1) {
if(GetAsyncKeyState(VK_F1)&1) {
DoMsgBox();
}
Sleep(10);
}
}
BOOL WINAPI DllMain(HMODULE hDll, DWORD dwReason, LPVOID lpReserved) {
switch(dwReason) {
case DLL_PROCESS_ATTACH:
DisableThreadLibraryCalls(hDll);
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)MainThread, 0, 0, 0);
break;
case DLL_PROCESS_DETACH:
FreeLibrary(hDll);
break;
}
return true;
}
3. Setelah selesai build menjadi dll
4. Silahkan anda bisa inject dengan injector favorit anda (kalau saya menggunakan produk sendiri injector rio chikara)
5. Nanti anda akan melihat pada log in pertama point blank seperti ini
![]() | ||
Screenshot Calling Message Box |
6. Nah sudah bisa kan? tapi ini cuma calling message box function saja,
bayangin klo anda bisa membuat cheat pb headshot, cheat wallhack pb, dan
cheat point blank yang lain tanpa bug trap? alangkah bergunanya kan?
Sekian tutorial Cara Membuat Cheat Point Blank Sendiri Part 1, lain kali akan saya share lagi cara-cara atau trik untuk membuat cheat point blank sendiri, semoga bermanfaat. Salam dari saya
Read more
Cara Membuat Auto Injector
Alat/tool
yang diperlukan: [b]Microsoft Visual Basic 6 (VB6), bisa portable atau
instalable. Lebih disarankan memakai instalable karena komponennya lebih
lengkap.
A. Langkah Awal
buka vb6, saat pertama kali dibuka atau dijalankan akan muncul kotakdialog, salah satunya standard exe, pilih standard exe dan klik open,secara tidak langsung membuat project baru dengan 1 form.
B. Pengaturan Properties dan Design pada form
klik 1 kali pada form1 (ingat cuman 1 kali), kemudian liat dibagiankanan layar properties form1. Pada bagian propertiesnya, jadikanborderstyle = 0 None
untuk design silakan dikreasikan semaunya, contoh (ini saya ambil dari Rifki N3):
A. Langkah Awal
buka vb6, saat pertama kali dibuka atau dijalankan akan muncul kotakdialog, salah satunya standard exe, pilih standard exe dan klik open,secara tidak langsung membuat project baru dengan 1 form.
B. Pengaturan Properties dan Design pada form
klik 1 kali pada form1 (ingat cuman 1 kali), kemudian liat dibagiankanan layar properties form1. Pada bagian propertiesnya, jadikanborderstyle = 0 None
untuk design silakan dikreasikan semaunya, contoh (ini saya ambil dari Rifki N3):
untuk
image seperti diatas silakan dibuat melalui aplikasi photoshop atau sejenisnya
simpan kedalam format gif.
untuk menambahkan image pada form, klik pada Picture pada propertiesform1, maka akan muncul kotak dialog, pilih image berdasarkan yg kitabuat dalam format gif diatas.
C. Pemasangan Object/Komponen inti
adapun komponen yang akan digunakan adalah 2 Label, 1 Check dan 1 timer, klik dan drag ke form1.
untuk menambahkan image pada form, klik pada Picture pada propertiesform1, maka akan muncul kotak dialog, pilih image berdasarkan yg kitabuat dalam format gif diatas.
C. Pemasangan Object/Komponen inti
adapun komponen yang akan digunakan adalah 2 Label, 1 Check dan 1 timer, klik dan drag ke form1.
berikut component2 yang harus dibuat:
- 2 label, dengan name label1 dan label2. untuk label2 beri caption exit.
- 1 timer, dengan name timer1, jangan lupa set interval pada properties timernya 100
- 1 Check, dengan name check1 dan beri caption Auto Exit After Injection
D. Coding Form1
klik kanan pada form --> pilih view code.
isikan kode berikut pada form1,
- 2 label, dengan name label1 dan label2. untuk label2 beri caption exit.
- 1 timer, dengan name timer1, jangan lupa set interval pada properties timernya 100
- 1 Check, dengan name check1 dan beri caption Auto Exit After Injection
D. Coding Form1
klik kanan pada form --> pilih view code.
isikan kode berikut pada form1,
Spoiler:
|
Option Explicit
'Created Date: 16 November 2010 'Form1 Simple Injector by Imam Asseyka MFO 'This Code N` Tutorial Credit Goes to MFO, Do As MFO Rule. 'deklarasi variabel Private winHwnd As Long Private NamaDll As String 'deklarasi fungsi movable form Private Const WM_NCLBUTTONDOWN As Long = &HA1 Private Const HTCAPTION As Integer = 2 Private Declare Sub ReleaseCapture Lib "user32" () Private Declare Function SendMessage Lib "user32" Alias "SendMessageA" (ByVal hwnd As Long, _ ByVal wMsg As Long, _ ByVal wParam As Long, _ lParam As Any) As Long Private Sub Form_Load() 'Mengetengahkan Form CenterForm Me 'sesuaikan nama dll dibawah ini dengan nama dll yg ingin di injectkan. NamaDll = App.Path & "\nama-dll-anda.dll" 'nama game target terserah, misalnya pointblank FileTarget = "PointBlank.exe" 'jika ingin injector disetting otomatis exit 'berikan nilai 1 pada kode check1 dibawah, sebaliknya 'jika tidak berikan nilai 0 Check1.Value = 1 End Sub Private Sub Form_Unload(Cancel As Integer) 'auto open url setelah form di close OpenURL "snutz.us", Me.hwnd End Sub Private Sub Label2_Click() 'keluar aplikasi injector Unload Me End Sub Private Sub Timer1_Timer() winHwnd = GetProcessWndByName(FileTarget) If Not winHwnd = 0 Then 'jika ditemukan NTProcessList 'deteksi process game InjectExecute NamaDll 'inject library If Check1.Value = 1 Then 'jika check1 dicentang (Auto Exit After Injection) maka End 'tutup otomatis injector End If Else 'jika tidak Label1.Caption = "Waiting Game..." End If End Sub 'kode center form Private Sub CenterForm(frm As Form) frm.Top = Screen.Height / 2 - frm.Height / 2 frm.Left = Screen.Width / 2 - frm.Width / 2 End Sub 'kode movable form Private Sub Form_MouseMove(Button As Integer, _ Shift As Integer, _ X As Single, _ Y As Single) If Button = 1 Then ReleaseCapture SendMessage Me.hwnd, WM_NCLBUTTONDOWN, HTCAPTION, 0& End If Screen.MousePointer = vbDefault End Sub |
pada font warna merah isi kan nama dll kalian
E: Coding Modul
- bikin 1 modul, klik menu project --> add modules, berinama ModUniversal, masukkan code berikut:
Spoiler:
|
Option Explicit
'Created Date: 16 November 2010 'Modul Simple Injection by Imam Asseyka MFO 'beberapa bagian code berasal dari sourcecode Gesp 1.3 'Optimized code by Imam Asseyka MFO Public FileTarget As String Private sFlDLL As String Private IdTargetOne As Long Private Const TH32CS_SNAPHEAPLIST As Long = &H1 Private Const TH32CS_SNAPPROCESS As Long = &H2 Private Const TH32CS_SNAPTHREAD As Long = &H4 Private Const TH32CS_SNAPMODULE As Long = &H8 Private Const TH32CS_SNAPALL As Double = (TH32CS_SNAPHEAPLIST Or TH32CS_SNAPPROCESS Or TH32CS_SNAPTHREAD Or TH32CS_SNAPMODULE) Private Const MAX_PATH As Integer = 260 Private Const PROCESS_ALL_ACCESS As Long = &H1F0FFF Private Type PROCESSENTRY32 dwSize As Long cntUsage As Long th32ProcessID As Long th32DefaultHeapID As Long th32ModuleID As Long cntThreads As Long th32ParentProcessID As Long pcPriClassBase As Long dwFlags As Long szExeFile As String * MAX_PATH End Type Private Type MODULEENTRY32 dwSize As Long th32ModuleID As Long th32ProcessID As Long GlblcntUsage As Long ProccntUsage As Long modBaseAddr As Long modBaseSize As Long hModule As Long szModule As String * 256 szExePath As String * 260 End Type Private Type THREADENTRY32 dwSize As Long cntUsage As Long th32ThreadID As Long th32OwnerProcessID As Long tpBasePri As Long tpDeltaPri As Long dwFlags As Long End Type Public Declare Function ShellExecute Lib "shell32.dll" Alias "ShellExecuteA" _ (ByVal hwnd As Long, _ ByVal lpOperation As String, _ ByVal lpFile As String, _ ByVal lpParameters As String, _ ByVal lpDirectory As String, _ ByVal nShowCmd As Long) As Long Private Declare Function CreateToolhelp32Snapshot Lib "kernel32" (ByVal lFlags As Long, _ ByVal lProcessID As Long) As Long Private Declare Function Module32First Lib "kernel32" (ByVal hSnapshot As Long, _ uProcess As MODULEENTRY32) As Long Private Declare Function lstrlen Lib "kernel32" Alias "lstrlenA" (ByVal lpString As String) As Long Private Declare Function OpenProcess Lib "kernel32" (ByVal dwDesiredAccess As Long, _ ByVal bInheritHandle As Long, _ ByVal dwProcessId As Long) As Long Private Declare Function Process32First Lib "kernel32" (ByVal hSnapshot As Long, _ uProcess As PROCESSENTRY32) As Long Private Declare Function Process32Next Lib "kernel32" (ByVal hSnapshot As Long, _ uProcess As PROCESSENTRY32) As Long Private Declare Function CloseHandle Lib "kernel32" (ByVal hObject As Long) As Long Private Declare Function GetProcAddress Lib "kernel32" (ByVal hModule As Long, _ ByVal lpProcName As String) As Long Private Declare Function GetModuleHandle Lib "kernel32" Alias "GetModuleHandleA" (ByVal lpModuleName As String) As Long Private Declare Function VirtualAllocEx Lib "kernel32" (ByVal hProcess As Long, _ lpAddress As Any, _ ByVal dwSize As Long, _ ByVal fAllocType As Long, _ flProtect As Long) As Long Private Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As Long, _ ByVal lpBaseAddress As Any, _ lpBuffer As Any, _ ByVal nSize As Long, _ lpNumberOfBytesWritten As Long) As Long Private Declare Function CreateRemoteThread Lib "kernel32" (ByVal ProcessHandle As Long, _ lpThreadAttributes As Long, _ ByVal dwStackSize As Long, _ ByVal lpStartAddress As Any, _ ByVal lpParameter As Any, _ ByVal dwCreationFlags As Long, _ lpThreadID As Long) As Long Public Function GetFName(fn) As String Dim f As Integer Dim n As Integer GetFName = fn f = InStr(fn, "") Do While f n = f f = InStr(n + 1, fn, "") Loop If n > 0 Then GetFName = Mid$(fn, n + 1) End If End Function Public Function GetProcessIdByName(ByVal szProcessName As String) As Long Dim pe32 As PROCESSENTRY32 Dim hSnapshot As Long Dim bFoundProc As Boolean Dim dwProcId As Long dwProcId = 0 pe32.dwSize = Len(pe32) hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0&) bFoundProc = Process32First(hSnapshot, pe32) Do While bFoundProc If Right$(LCase$(Left$(pe32.szExeFile, InStr(1, pe32.szExeFile, vbNullChar) - 1)), Len(szProcessName)) = LCase$(szProcessName) Then dwProcId = pe32.th32ProcessID Exit Do End If bFoundProc = Process32Next(hSnapshot, pe32) Loop CloseHandle hSnapshot GetProcessIdByName = dwProcId End Function Public Function GetProcessWndByName(ByVal szProcessName As String) As Long Dim dwProcId As Long Dim dwProcWnd As Long dwProcId = GetProcessIdByName(szProcessName) If dwProcId = 0 Then GetProcessWndByName = 0 Else dwProcWnd = OpenProcess(PROCESS_ALL_ACCESS, False, dwProcId) CloseHandle dwProcId GetProcessWndByName = dwProcWnd End If End Function Public Sub InjectDll(DllPath As String, _ ProsH As Long) Dim DLLVirtLoc As Long Dim DllLength As Long Dim inject As Long Dim LibAddress As Long Dim CreateThread As Long Dim ThreadID As Long Dim Bla As VbMsgBoxResult g_loadlibary: LibAddress = GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA") If LibAddress = 0 Then Bla = MsgBox("Can't find LoadLibrary API from kernel32.dll", vbYesNo, "ERROR") If Bla = vbYes Then GoTo g_loadlibary Else Exit Sub End If End If g_virutalallocex: DllLength = Len(DllPath) DLLVirtLoc = VirtualAllocEx(ProsH, 0, DllLength, &H1000, ByVal &H4) If DLLVirtLoc = 0 Then Bla = MsgBox("VirtualAllocEx API failed! - try again?", vbYesNo, "ERROR") If Bla = vbYes Then GoTo g_virutalallocex Else Exit Sub End If End If g_writepmemory: inject = WriteProcessMemory(ProsH, ByVal DLLVirtLoc, ByVal DllPath, DllLength, vbNull) If inject = 0 Then Bla = MsgBox("Failed to Write DLL to Process! - try again?", vbYesNo, "ERROR") If Bla = vbYes Then GoTo g_writepmemory Else Exit Sub End If End If g_creatthread: CreateThread = CreateRemoteThread(ProsH, ByVal 0, 0, ByVal LibAddress, ByVal DLLVirtLoc, 0, ThreadID) If CreateThread = 0 Then Bla = MsgBox("Failed to Create Thead! - try again?", vbYesNo, "ERROR") If Bla = vbYes Then GoTo g_creatthread Else Exit Sub End If End If Form1.Label1.Caption = "Injected Successful!" MsgBox "Dll Injection Successful!", vbInformation, "Success" End Sub Public Sub InjectExecute(ByVal sFlDLL As String) Dim lProcInject As Long lProcInject = OpenProcess(PROCESS_ALL_ACCESS, 0, IdTargetOne) If lProcInject > "0" Then InjectDll sFlDLL, lProcInject End If CloseHandle lProcInject End Sub Public Function NTProcessList() As Long Dim FileName As String Dim ExePath As String Dim hProcSnap As Long Dim hModuleSnap As Long Dim lProc As Long Dim uProcess As PROCESSENTRY32 Dim uModule As MODULEENTRY32 On Error Resume Next hProcSnap = CreateToolhelp32Snapshot(TH32CS_SNAPALL, 0&) uProcess.dwSize = Len(uProcess) lProc = Process32First(hProcSnap, uProcess) Do While lProc If uProcess.th32ProcessID <> 0 Then hModuleSnap = CreateToolhelp32Snapshot(TH32CS_SNAPALL, uProcess.th32ProcessID) uModule.dwSize = Len(uModule) Module32First hModuleSnap, uModule If hModuleSnap > 0 Then ExePath = StripNulls(uModule.szExePath) FileName = GetFName(ExePath) If FileTarget = FileName Then IdTargetOne = uProcess.th32ProcessID End If End If End If lProc = Process32Next(hProcSnap, uProcess) Loop CloseHandle hProcSnap CloseHandle lProc On Error GoTo 0 End Function Private Function StripNulls(ByVal sStr As String) As String
StripNulls = Left$(sStr,
lstrlen(sStr))
End Function Public Sub OpenURL(situs As String, sourceHWND As Long) Call ShellExecute(sourceHWND, vbNullString, situs, vbNullString, vbNullString, 1) End Sub |
F. Tahap Terakhir, Compile ke exe.
jika udah selesai, klik menu file pilih make project exe*
Cara Membuat Cheat Counter Strike
[Tutorial]
Create Counter-Strike:Source Hacks
VB 2008
Note: I did not code this Module.
Adresses:
Wireframe Wallhack: 243AEC3C, 2, 4
1 = value, 4 = bytes
1. Download VB 2008
Ok after downloading Visual Basic 2008 you must create a new Project! (File/New Project/Windows Forms Application)
2. Build the Form
After Creating the Form , you must open the Toolbox (Look Picture)
![](file:///C:/DOCUME%7E1/Muslim/LOCALS%7E1/Temp/msohtmlclip1/01/clip_image001.gif)
When the Tool Box opens, create two Buttons and one timer.
3. The Coding!
-Look always that the timer is enabled = False at beginning and that the invental is always 1!
-Ok now press doubleclick on the button1 and write in the coding part.
Code:
Timer1.Enabled
= True
- Then double click on the button2 and write in the coding
part
Code:
Timer1.Enabled
= False
-Now press doubleclick on the timer1 (Look that the invental
is = 1. make sure it set on 1)
-After you doubleclick on the timer1 we come back to the coding part and must add the code for Wireframe Wallhack , the code is :
-After you doubleclick on the timer1 we come back to the coding part and must add the code for Wireframe Wallhack , the code is :
Code:
WriteMemory(&H243AEC3C,
2 , 4)
*You must always add &H before you put an address.
*2 = the value of the address
*4 = the bytes
5. Add the module
*2 = the value of the address
*4 = the bytes
5. Add the module
Code:
Module
Module1
Private
Declare Function OpenProcess Lib "kernel32" (ByVal dwDesiredAccess As
Integer, ByVal bInheritHandle As Integer, ByVal dwProcessId As Integer) As
Integer
Private
Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As
Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize
As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function WriteFloatMemory Lib "kernel32" Alias
"WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress
As Integer, ByRef lpBuffer As Single, ByVal nSize As Integer, ByRef
lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function ReadFloat Lib "kernel32" Alias
"ReadProcessMemory" (ByVal hProcess As IntPtr, ByVal lpBaseAddress As
IntPtr, ByRef buffer As Single, ByVal size As Int32, ByRef lpNumberOfBytesRead
As Int32) As Boolean
Private
Declare Function ReadProcessMemory Lib "kernel32" Alias
"ReadProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress
As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef
lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function CloseHandle Lib "kernel32" (ByVal hObject As
Integer) As Integer
Public
Declare Function GetAsyncKeyState Lib "user32" (ByVal vKey As Long)
As Integer
Public
RBuff As Long
Public
RBuff2 As Single
Public
RBuff3 As Integer
Public
Function Writememory(ByVal Address As Integer, ByVal Value As Long, ByVal Bytes
As Integer)
Dim
counter-strike sourceLookUp As Process() =
Process.GetProcessesByName("Counter-Strike Source")
If
counter-strike sourceLookUp.Length = 0 Then
End
End
If
Dim
processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, counter-strike
sourceLookUp(0).Id)
WriteProcessMemory(processHandle,
Address, Value, Bytes, Nothing)
CloseHandle(processHandle)
End
Function
End
Module
6. Making the Module Undetected.
Code:
Module
Module1
Private
Declare Function OpenProcess Lib "kernel32" (ByVal dwDesiredAccess As
Integer, ByVal bInheritHandle As Integer, ByVal dwProcessId As Integer) As
Integer
Private
Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As
Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize
As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function WriteFloatMemory Lib "kernel32" Alias
"WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress
As Integer, ByRef lpBuffer As Single, ByVal nSize As Integer, ByRef
lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function ReadFloat Lib "kernel32" Alias
"ReadProcessMemory" (ByVal hProcess As IntPtr, ByVal lpBaseAddress As
IntPtr, ByRef buffer As Single, ByVal size As Int32, ByRef lpNumberOfBytesRead
As Int32) As Boolean
Private
Declare Function ReadProcessMemory Lib "kernel32" Alias
"ReadProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress
As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten
As Integer) As Integer
Private
Declare Function CloseHandle Lib "kernel32" (ByVal hObject As
Integer) As Integer
Public
Declare Function GetAsyncKeyState Lib "user32" (ByVal vKey As Long)
As Integer
Public
RBuff As Long
Public
RBuff2 As Single
Public
RBuff3 As Integer
Public
Function Writememory(ByVal Address As Integer,
ByVal Value As Long, ByVal Bytes As Integer)
Dim
counter-strike sourceLookUp As Process() =
Process.GetProcessesByName("Counter-Strike Source")
If
counter-strike sourceLookUp.Length = 0 Then
End
End
If
Dim
processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, counter-strike
sourceLookUp(0).Id)
WriteProcessMemory(processHandle,
Address, Value, Bytes, Nothing)
CloseHandle(processHandle)
End
Function
End
Module
To make a Module Undetected is really simple , just Change
the red marked strings with your own definated... But dont forget if you change
it here you must change it in your Function part too!
For example, as you can see in the module 'Writememory' is red.
Now you need to change that to what ever definated you want.
For example, as you can see in the module 'Writememory' is red.
Now you need to change that to what ever definated you want.
Code:
Module
Module1
Private
Declare Function OpenProcess Lib "kernel32" (ByVal dwDesiredAccess As
Integer, ByVal bInheritHandle As Integer, ByVal dwProcessId As Integer) As
Integer
Private
Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As
Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize
As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function WriteFloatMemory Lib "kernel32" Alias
"WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress
As Integer, ByRef lpBuffer As Single, ByVal nSize As Integer, ByRef
lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function ReadFloat Lib "kernel32" Alias "ReadProcessMemory"
(ByVal hProcess As IntPtr, ByVal lpBaseAddress As IntPtr, ByRef buffer As
Single, ByVal size As Int32, ByRef lpNumberOfBytesRead As Int32) As Boolean
Private
Declare Function ReadProcessMemory Lib "kernel32" Alias
"ReadProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress
As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef
lpNumberOfBytesWritten As Integer) As Integer
Private
Declare Function CloseHandle Lib "kernel32" (ByVal hObject As
Integer) As Integer
Public
Declare Function GetAsyncKeyState Lib "user32" (ByVal vKey As Long)
As Integer
Public
RBuff As Long
Public
RBuff2 As Single
Public
RBuff3 As Integer
Public
Function mafioso(ByVal Address As Integer, ByVal
Value As Long, ByVal Bytes As Integer)
Dim
counter-strike sourceLookUp As Process() =
Process.GetProcessesByName("Counter-Strike Source")
If
counter-strike sourceLookUp.Length = 0 Then
End
End
If
Dim
processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, counter-strike
sourceLookUp(0).Id)
WriteProcessMemory(processHandle,
Address, Value, Bytes, Nothing)
CloseHandle(processHandle)
End
Function
End
Module
-In your function you have this:
Code:
WriteMemory(&H243AEC3C, 1 , 4)
-So what you do now is add your Definated.
Code:
mafioso(&H243AEC3C, 1 , 4)
VB6
Open VB6, hit make new Standard.exe,now we have are basic form page.
1. We need to rename this,notice on the righthand side.You will see project1 properties.
if you notice caption is highlighted, in our properties box.thats the name of our forum. Go ahead and rename it. My Trainer V1.0 or w/e.
2. Ok you need this module, for Counter-Strike Source, to add this module, at the top left of vb6 by the file ,and edit.
Code:
Public
Const PROCESS_ALL_ACCESS = &H1F0FFF
Dim
f1holder As Integer
Dim
timer_pos As Long
'API
Declaration
Public
Declare Function GetWindowThreadProcessId Lib "user32" (ByVal hwnd As
Long, lpdwProcessId As Long) As Long
Public
Declare Function OpenProcess Lib "kernel32" (ByVal dwDesiredAccess As
Long, ByVal bInheritHandle As Long, ByVal dwProcessId As Long) As Long
Public
Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As
Long, ByVal lpBaseAddress As Any, lpBuffer As Any, ByVal nSize As Long,
lpNumberOfBytesWritten As Long) As Long
Public
Declare Function CloseHandle Lib "kernel32" (ByVal hObject As Long)
As Long
Public
Declare Function FindWindow Lib "user32" Alias
"FindWindowA" (ByVal Classname As String, ByVal WindowName As String)
As Long
Public
Declare Function GetKeyPress Lib "user32" Alias
"GetAsyncKeyState" (ByVal key As Long) As Integer
Public
Declare Function ReadProcessMem Lib "kernel32" Alias
"ReadProcessMemory" (ByVal hProcess As Long, ByVal lpBaseAddress As
Any, ByRef lpBuffer As Any, ByVal nSize As Long, lpNumberOfBytesWritten As
Long) As Long
Public
Function WriteAByte(gamewindowtext As String, address As Long, value As Byte)
Dim
hwnd As Long
Dim
pid As Long
Dim
phandle As Long
hwnd
= FindWindow(vbNullString, gamewindowtext)
If
(hwnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hwnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
WriteProcessMemory
phandle, address, value, 1, 0&
CloseHandle
hProcess
End
Function
Public
Function WriteAnInt(gamewindowtext As String, address As Long, value As
Integer)
Dim
hwnd As Long
Dim
pid As Long
Dim
phandle As Long
hwnd
= FindWindow(vbNullString, gamewindowtext)
If
(hwnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
End
If
GetWindowThreadProcessId
hwnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
WriteProcessMemory
phandle, address, value, 2, 0&
CloseHandle
hProcess
End
Function
Public
Function WriteALong(gamewindowtext As String, address As Long, value As Long)
Dim
hwnd As Long
Dim
pid As Long
Dim
phandle As Long
hwnd
= FindWindow(vbNullString, gamewindowtext)
If
(hwnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hwnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
WriteProcessMemory
phandle, address, value, 4, 0&
CloseHandle
hProcess
End
Function
Public
Function ReadAByte(gamewindowtext As String, address As Long, valbuffer As
Byte)
Dim
hwnd As Long
Dim
pid As Long
Dim
phandle As Long
hwnd
= FindWindow(vbNullString, gamewindowtext)
If
(hwnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hwnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
ReadProcessMem
phandle, address, valbuffer, 1, 0&
CloseHandle
hProcess
End
Function
Public
Function ReadAnInt(gamewindowtext As String, address As Long, valbuffer As
Integer)
Dim
hwnd As Long
Dim
pid As Long
Dim
phandle As Long
hwnd
= FindWindow(vbNullString, gamewindowtext)
If
(hwnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hwnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
ReadProcessMem
phandle, address, valbuffer, 2, 0&
CloseHandle
hProcess
End
Function
Public
Function ReadALong(gamewindowtext As String, address As Long, valbuffer As
Long)
Dim
hwnd As Long
Dim
pid As Long
Dim
phandle As Long
hwnd
= FindWindow(vbNullString, gamewindowtext)
If
(hwnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hwnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
ReadProcessMem
phandle, address, valbuffer, 4, 0&
CloseHandle
hProcess
End
Function
Public
Function ReadAFloat(gamewindowtext As String, address As Long, valbuffer As
Single)
Dim
hWnd As Long
Dim
pid As Long
Dim
phandle As Long
hWnd
= FindWindow(vbNullString, gamewindowtext)
If
(hWnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hWnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
ReadProcessMem
phandle, address, valbuffer, 4, 0&
CloseHandle
hProcess
End
Function
Public
Function WriteAFloat(gamewindowtext As String, address As Long, value As
Single)
Dim
hWnd As Long
Dim
pid As Long
Dim
phandle As Long
hWnd
= FindWindow(vbNullString, gamewindowtext)
If
(hWnd = 0) Then
MsgBox
"The Game Is Not Working", vbCritical, "Error"
End
Exit
Function
End
If
GetWindowThreadProcessId
hWnd, pid
phandle
= OpenProcess(PROCESS_ALL_ACCESS, False, pid)
If
(phandle = 0) Then
MsgBox
"Can't get ProcessId", vbCritical, "Error"
Exit
Function
End
If
WriteProcessMemory
phandle, address, value, 4, 0&
CloseHandle
hProcess
End
Function
Ok now we have our module, were ready to build our trainer
Now heres how to do buttons.
3.Now to add a button, go to the lefthand side, to the toolbar, double click a button, now you have a button on your form, click it to put were you want it. Notice you can resize it and whatnot.ok now
4.rename this button, look into the properties box again,now your in the properties of this button, scroll threw it, look for caption (and rename it)
5.Adding a code to this button, double click the button, now your in the coding part of the button/trainer. This is what you should see.
Now heres how to do buttons.
3.Now to add a button, go to the lefthand side, to the toolbar, double click a button, now you have a button on your form, click it to put were you want it. Notice you can resize it and whatnot.ok now
4.rename this button, look into the properties box again,now your in the properties of this button, scroll threw it, look for caption (and rename it)
5.Adding a code to this button, double click the button, now your in the coding part of the button/trainer. This is what you should see.
Code:
Private
Sub Command1_Click()
End
Sub
Ok now to add the address and value.
Code:
Private
Sub Command1_Click()
Call
WriteAlong("Counter-Strike Source", &H243AEC3C , 2)
End
Sub
*Note like in VB 2008 you must add &H before every
address.
Now add a new button and add this to turn it off.
Now add a new button and add this to turn it off.
Code:
Private
Sub Command2_Click()
Call
WriteAlong("Counter-Strike Source", &H243AEC3C, 1)
End
Sub
*Note as you can see the value is different for the 'On' and
'Off' Buttons, reason for that is because in order to actually turn off the
hack, you must put the original value of the address.
8. Go to file and save your trainer, change the names to what you want, then go back to file and look for make project1.exe or w/e u named it.exe and your done find your trainer inside C:\Program Files\Microsoft Visual Studio\VB98.
*I hope this tutorial has helped some people. VB is maybe not the right choice to use to make hacks, knowing that C++ is better, but it can help you in some ways.
Credits go to the people who made these modules.
8. Go to file and save your trainer, change the names to what you want, then go back to file and look for make project1.exe or w/e u named it.exe and your done find your trainer inside C:\Program Files\Microsoft Visual Studio\VB98.
*I hope this tutorial has helped some people. VB is maybe not the right choice to use to make hacks, knowing that C++ is better, but it can help you in some ways.
Credits go to the people who made these modules.
Langganan:
Postingan (Atom)