omg use cheat engine
see in barracks how many kills you have or something search it
go in a game kill some and search for the new value =.
and you can find it on google
Well i found out the method,
now i only need the addresses,
Could someone send me a working Cheat Table or could someone send/make a tut about how to find them, i could not find a tut on various forums, so im asking!
Its true, im H4ckBlood and im back,
Still not afraid, Just Google me!
omg use cheat engine
see in barracks how many kills you have or something search it
go in a game kill some and search for the new value =.
and you can find it on google
I love it when people keep their agreements /sarcasm ftw
I knew i needed Cheat Engine, i was just asking the way how to!
Its true, im H4ckBlood and im back,
Still not afraid, Just Google me!
I was searchin for rank so i found 2 addresses,
0012E2AC
0012E224
These are the 2 good addresses, but if i set them in the memory hack.
It wont work, also it wont work when i combine the who, and not when i let them search for those two codes and change, could someone help me out please!
Its true, im H4ckBlood and im back,
Still not afraid, Just Google me!
0012E2AC
in vb
&H012E2AC
Last edited by lolbie; 02-28-2011 at 11:56 AM.
I love it when people keep their agreements /sarcasm ftw
nah that's right
wait let me test
uhm you use textbox to fill in things and for what are those addresses ?
I love it when people keep their agreements /sarcasm ftw
hmm in cheat engine those works
but i think your module doesn't inject into iw4mp.dat
only .exe
you have to put in the module
iw4mp.dat
not only
iw4mp
Last edited by lolbie; 02-28-2011 at 12:11 PM.
I love it when people keep their agreements /sarcasm ftw
double post 0.o
Last edited by H4ckBlood; 02-28-2011 at 12:14 PM.
Its true, im H4ckBlood and im back,
Still not afraid, Just Google me!
hahaha it's not yours =.=
and don't leech =.=Code:Module Injection #Region "Declarations" Private Declare Function OpenProcess Lib "kernel32" Alias "OpenProcess" (ByVal dwDesiredAccess As Integer, ByVal bInheritHandle As Integer, ByVal dwProcessId As Integer) As Integer Private Declare Function WriteProcessMemory Lib "kernel32" Alias "WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer Private Declare Function WriteFloatMemory Lib "kernel32" Alias "WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Single, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer Private Declare Function ReadFloat Lib "kernel32" Alias "ReadProcessMemory" (ByVal hProcess As IntPtr, ByVal lpBaseAddress As IntPtr, ByRef buffer As Single, ByVal size As Int32, ByRef lpNumberOfBytesRead As Int32) As Boolean Private Declare Function ReadProcessMemory Lib "kernel32" Alias "ReadProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer Private Declare Function CloseHandle Lib "kernel32" Alias "CloseHandle" (ByVal hObject As Integer) As Integer Private string1 As Long Private string2 As Integer Private RBuff1 As Long Private RBuff2 As Single Private RBuff3 As Integer #End Region #Region "Check Process/ReadDll" Private Function readdll(ByVal modulename As String) Dim procmodule As ProcessModule Dim constant1 As Integer Dim constant2 As Long Dim constant3 As Process() = Process.GetProcessesByName("iw4mp") If constant3.Length = 0 Then Return 0 End If For Each procmodule In constant3(0).Modules If modulename = procmodule.ModuleName Then constant1 = procmodule.BaseAddress End If Next constant2 = constant1 Return constant2 End Function Public Function IsProcessOpen(ByVal name As String) As Boolean For Each clsProcess As Process In Process.GetProcesses If clsProcess.ProcessName.Contains(name) Then Return True End If Next ' Do nothing Return False End Function #End Region #Region "Hacks" 'WriteMemory Private Function WriteMemory(ByVal Address As Integer, ByVal Value As Long, ByVal Bytes As Integer) Dim iw4mpLookUp As Process() = Process.GetProcessesByName("iw4mp") If iw4mpLookUp.Length = 0 Then End End If Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, iw4mpLookUp(0).Id) WriteProcessMemory(processHandle, Address, Value, Bytes, Nothing) CloseHandle(processHandle) Return Nothing End Function 'WriteFloat Private Function WriteFloat(ByVal Address As Integer, ByVal Value As Single) Dim iw4mpLookUp As Process() = Process.GetProcessesByName("iw4mp") If iw4mpLookUp.Length = 0 Then End End If Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, iw4mpLookUp(0).Id) WriteFloatMemory(processHandle, Address, Value, 4, Nothing) CloseHandle(processHandle) Return Nothing End Function 'NOP Private Function NOP(ByVal Address As Integer, ByVal value As Integer) Dim iw4mpLookUp As Process() = Process.GetProcessesByName("iw4mp") If iw4mpLookUp.Length = 0 Then End End If Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, iw4mpLookUp(0).Id) WriteProcessMemory(processHandle, Address, value, 1, Nothing) CloseHandle(processHandle) Return Nothing End Function #End Region #Region "Functions" Public Function memoryh4x(ByVal address As String, ByVal value As Long, ByVal bytes As Byte) If IsProcessOpen("iw4mp") Then string1 = readdll("cshell.dll") string2 = "&H" & Hex(string1 + address) WriteMemory(string2, value, bytes) End If Return Nothing End Function Public Function floath4x(ByVal address As String, ByVal value As Long) If IsProcessOpen("iw4mp") Then string1 = readdll("cshell.dll") string2 = "&H" & Hex(string1 + address) WriteFloat(string2, value) End If Return Nothing End Function Public Function noph4x(ByVal address As String, ByVal value As Long) If IsProcessOpen("iw4mp.dat") Then <<<<<<<<<<<<<<<<<<<<<<<< string1 = readdll("cshell.dll") string2 = "&H" & Hex(string1 + address) NOP(string2, value) End If Return Nothing End Function #End Region End Module
it's not urs
do this by everything
If IsProcessOpen("iw4mp.dat") Then <<<<<<<<<<<<<<<<<<<<<<<<
I love it when people keep their agreements /sarcasm ftw
u have to change them all =.=
u have any knowledge about it?
I love it when people keep their agreements /sarcasm ftw
Yeah i have knowledge, -_-" ,
I was Cookie™ on other forums, made many Injectors, own Intern OS system etc .and i already changed everything:
Code:Module Injection #Region "Declarations" Private Declare Function OpenProcess Lib "kernel32" Alias "OpenProcess" (ByVal dwDesiredAccess As Integer, ByVal bInheritHandle As Integer, ByVal dwProcessId As Integer) As Integer Private Declare Function WriteProcessMemory Lib "kernel32" Alias "WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer Private Declare Function WriteFloatMemory Lib "kernel32" Alias "WriteProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Single, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer Private Declare Function ReadFloat Lib "kernel32" Alias "ReadProcessMemory" (ByVal hProcess As IntPtr, ByVal lpBaseAddress As IntPtr, ByRef buffer As Single, ByVal size As Int32, ByRef lpNumberOfBytesRead As Int32) As Boolean Private Declare Function ReadProcessMemory Lib "kernel32" Alias "ReadProcessMemory" (ByVal hProcess As Integer, ByVal lpBaseAddress As Integer, ByRef lpBuffer As Integer, ByVal nSize As Integer, ByRef lpNumberOfBytesWritten As Integer) As Integer Private Declare Function CloseHandle Lib "kernel32" Alias "CloseHandle" (ByVal hObject As Integer) As Integer Private string1 As Long Private string2 As Integer Private RBuff1 As Long Private RBuff2 As Single Private RBuff3 As Integer #End Region #Region "Check Process/ReadDll" Private Function readdll(ByVal modulename As String) Dim procmodule As ProcessModule Dim constant1 As Integer Dim constant2 As Long Dim constant3 As Process() = Process.GetProcessesByName("iw4mp.dat") If constant3.Length = 0 Then Return 0 End If For Each procmodule In constant3(0).Modules If modulename = procmodule.ModuleName Then constant1 = procmodule.BaseAddress End If Next constant2 = constant1 Return constant2 End Function Public Function IsProcessOpen(ByVal name As String) As Boolean For Each clsProcess As Process In Process.GetProcesses If clsProcess.ProcessName.Contains(name) Then Return True End If Next ' Do nothing Return False End Function #End Region #Region "Hacks" 'WriteMemory Private Function WriteMemory(ByVal Address As Integer, ByVal Value As Long, ByVal Bytes As Integer) Dim iw4mpLookUp As Process() = Process.GetProcessesByName("iw4mp.dat") If iw4mpLookUp.Length = 0 Then End End If Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, iw4mpLookUp(0).Id) WriteProcessMemory(processHandle, Address, Value, Bytes, Nothing) CloseHandle(processHandle) Return Nothing End Function 'WriteFloat Private Function WriteFloat(ByVal Address As Integer, ByVal Value As Single) Dim iw4mpLookUp As Process() = Process.GetProcessesByName("iw4mp.dat") If iw4mpLookUp.Length = 0 Then End End If Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, iw4mpLookUp(0).Id) WriteFloatMemory(processHandle, Address, Value, 4, Nothing) CloseHandle(processHandle) Return Nothing End Function 'NOP Private Function NOP(ByVal Address As Integer, ByVal value As Integer) Dim iw4mpLookUp As Process() = Process.GetProcessesByName("iw4mp.dat") If iw4mpLookUp.Length = 0 Then End End If Dim processHandle As IntPtr = OpenProcess(&H1F0FFF, 0, iw4mpLookUp(0).Id) WriteProcessMemory(processHandle, Address, value, 1, Nothing) CloseHandle(processHandle) Return Nothing End Function #End Region #Region "Functions" Public Function memoryh4x(ByVal address As String, ByVal value As Long, ByVal bytes As Byte) If IsProcessOpen("iw4mp.dat") Then string1 = readdll("cshell.dll") string2 = "&H" & Hex(string1 + address) WriteMemory(string2, value, bytes) End If Return Nothing End Function Public Function floath4x(ByVal address As String, ByVal value As Long) If IsProcessOpen("iw4mp.dat") Then string1 = readdll("cshell.dll") string2 = "&H" & Hex(string1 + address) WriteFloat(string2, value) End If Return Nothing End Function Public Function noph4x(ByVal address As String, ByVal value As Long) If IsProcessOpen("iw4mp.dat") Then string1 = readdll("cshell.dll") string2 = "&H" & Hex(string1 + address) NOP(string2, value) End If Return Nothing End Function #End Region End Module
Last edited by H4ckBlood; 02-28-2011 at 12:27 PM.
Its true, im H4ckBlood and im back,
Still not afraid, Just Google me!