Page 2 of 2 FirstFirst 12
Results 16 to 20 of 20
  1. #16
    BloodSkin's Avatar
    Join Date
    Jun 2010
    Gender
    male
    Location
    Columbus, OH
    Posts
    354
    Reputation
    11
    Thanks
    63
    English or GTFO

  2. #17
    Dewerong's Avatar
    Join Date
    Oct 2010
    Gender
    male
    Location
    Inside a Packet
    Posts
    59
    Reputation
    10
    Thanks
    2
    I can't understand you but I think I know what you mean. This is easy to fix. A module is injected when the game starts. The module name is "CShell.dll". This is what you need to do:

    GetModuleHandle Function (Windows)
    Read that above to understand the GetModuleHandle()

    Once you got the module handle, do your hacks/modifications like:

    invoke GetModuleHandle, CTEXT("CShell.dll")
    .if eax == 0
    invoke MessageBox, 0, CTEXT("You aren't in-game yet"), CTEXT("Error"), MB_OK
    .elseif
    ;The module is found then do modifications
    .endif
    Or it could just be that the hack you are using is either detected or outdated. Don't forget to thank me (click the button lol).

  3. The Following User Says Thank You to Dewerong For This Useful Post:

    dllbase (10-06-2010)

  4. #18
    dllbase's Avatar
    Join Date
    Oct 2010
    Gender
    male
    Location
    IN YOUR %#$
    Posts
    117
    Reputation
    10
    Thanks
    19
    My Mood
    Cool
    Dewerong
    Thank you , but What I wanted to know is how, with what program can I find adress as LTClient, No Recoil, chams ?

    please guys .
    help-me

    --
    Not them curse me
    Não me xinguem
    -------

    Look my code:

    Code:
    void __cdecl PushToConsole(char* sVal)
    {
    	if ( Ready() ){
    		DWORD zAddress = 0x377525F0;
    		void* szConsole = (void*)*(DWORD*)(zAddress);
    		_asm
    		{
    			push sVal
    			call szConsole
    			add esp, 4
    		}
    	}
    }
    DWORD zAddress = 0x377525F0; <- this adreesssss
    Last edited by dllbase; 10-06-2010 at 06:32 PM.

  5. #19
    ᶠᶸᶜᵏ's Avatar
    Join Date
    May 2010
    Gender
    male
    Posts
    174
    Reputation
    36
    Thanks
    159
    Quote Originally Posted by dllbase View Post
    Dewerong
    Thank you , but What I wanted to know is how, with what program can I find adress as LTClient, No Recoil, chams ?

    please guys .
    help-me

    --
    Not them curse me
    Não me xinguem
    -------

    Look my code:

    Code:
    void __cdecl PushToConsole(char* sVal)
    {
    	if ( Ready() ){
    		DWORD zAddress = 0x377525F0;
    		void* szConsole = (void*)*(DWORD*)(zAddress);
    		_asm
    		{
    			push sVal
    			call szConsole
    			add esp, 4
    		}
    	}
    }
    DWORD zAddress = 0x377525F0; <- this adreesssss
    You know, stickies aren't just there to be ignored.

  6. #20
    Dewerong's Avatar
    Join Date
    Oct 2010
    Gender
    male
    Location
    Inside a Packet
    Posts
    59
    Reputation
    10
    Thanks
    2
    I don't know much about CA as if it has a region thing with different offsets. If it doesn't than your pointer to the LTClient (or w.e. its called) is 0x377ED910. That is the problem of your crash. I program in assembly so I wouldn't know much about your functions. I JUST got the PushToConsole() to work in assembly so I'm testing things out.

    Here are some things you wanna look at http://www.mpgh.net/forum/207-combat...ga-thread.html

    As for no reload, I use this:

    .data
    NOP6 db 90h, 90h, 90h, 90h, 90h, 90h

    .code

    ReadyForHook proc

    invoke GetModuleHandle, CTEXT("d3d9.dll")
    .if eax == 0
    ;no
    .elseif
    invoke GetModuleHandle, CTEXT("ClientFX.fxd")
    .if eax == 0
    ;no
    .elseif
    invoke GetModuleHandle, CTEXT("CShell.dll")
    .if eax == 0
    ;no
    .elseif
    ;No Reload
    invoke WriteMem, 374AB714h, addr NOP6, 6

    ;No Recoil
    invoke WriteMem, 3745FA90h, addr NOP3, 3
    invoke WriteMem, 37232A69h, addr NOP3, 3
    invoke WriteMem, 3745FAA4h, addr NOP3, 3
    invoke WriteMem, 3745FAA7h, addr NOP3, 3
    invoke WriteMem, 3745FAB0h, addr NOP3, 3
    .endif
    .endif
    .endif
    ret

    ReadyForHook endp
    Those offsets was posted by someone on this forum. The topic is sticky.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. [Help Request] Help! How to break Ahn Hack shield program?
    By leekang in forum Vindictus Help
    Replies: 1
    Last Post: 06-02-2011, 11:38 AM
  2. [help]how would i get the superjump address?
    By fable741 in forum WarRock - International Hacks
    Replies: 9
    Last Post: 05-08-2007, 09:37 AM
  3. [HELP] how can i....
    By Evangelyon in forum WarRock - International Hacks
    Replies: 0
    Last Post: 04-29-2007, 05:43 PM
  4. Help! how do i make a jap warrock name?
    By gmgundamx7 in forum WarRock - International Hacks
    Replies: 4
    Last Post: 04-04-2007, 12:07 PM
  5. Help! how to use ardamax keylogg
    By gmgundamx7 in forum WarRock - International Hacks
    Replies: 8
    Last Post: 02-28-2007, 05:43 PM