That dwRunConsoleCommand is actually the UnwrappedEngine Address. It is used in the common PTC function...
Your using C++ but you don't know C++.
You can NOP the addresses using bytes and a Memcyp function.
Ok guys i got the addresses (DWORD) now what do i do and where do i put em??
plzzz help!!!!!!!!!!!!
I have a menu base to use with it
DWORD dwRunConsoleCommand = 0x485FA0;
^^ example
Im using C++
[IMG]https://i1197.photobucke*****m/albums/aa436/xDex_/sigprojectbraviacopy.jpg[/IMG]
That dwRunConsoleCommand is actually the UnwrappedEngine Address. It is used in the common PTC function...
Your using C++ but you don't know C++.
You can NOP the addresses using bytes and a Memcyp function.
so how do i do this?
What does NOP'ing the address do?
Last edited by Bravia; 08-05-2011 at 02:47 PM.
[IMG]https://i1197.photobucke*****m/albums/aa436/xDex_/sigprojectbraviacopy.jpg[/IMG]
Code:void __cdecl RunConsoleCommand( const char* szCommand ) { void* address = ( void* ) ADDR_CONSOLEUNWRAPPED; __asm { Push szCommand call address add esp, 0x4 } }Example:Code:RunConsoleCommand( PTC Value );
Code:RunConsoleCommand( "ShowFps 1 " );Code:bool Memoria( void * pDest, char * szPatch, size_t sSize ) { DWORD dwOrgProtect = NULL; if ( !VirtualProtect ( pDest, sSize, PAGE_EXECUTE_READWRITE, &dwOrgProtect )) return FALSE; memcpy( pDest, szPatch, sSize ); VirtualProtect( pDest, sSize, dwOrgProtect, NULL ); return TRUE; }Example:Code:Memoria( Address, Bytes, # of Bytes );
Code:Memoria( (LPVOID)ADDR_SUPERBULLETS, "\x0F\x94\xC0", 3 ); //Off Memoria( (LPVOID)ADDR_SUPERBULLETS, "\x33\xC0\x90", 3 ); //On
2 more things
1) where do i put these codes to cooperate with the hack name?
2) Where can i find on/off codes?
[IMG]https://i1197.photobucke*****m/albums/aa436/xDex_/sigprojectbraviacopy.jpg[/IMG]
wow bro. learn c++. you're basically asking for someone to do everything for you then you're gonna c+p and claim it as yours.
Legen...wait for it...dary
You push the char* argument onto the stack, call unwrapped console, clean stack (cdecl)