Results 1 to 7 of 7
  1. #1
    Bravia's Avatar
    Join Date
    Jul 2011
    Gender
    male
    Posts
    30
    Reputation
    10
    Thanks
    1
    My Mood
    Bashful

    Coding With Addresses

    Ok guys i got the addresses (DWORD) now what do i do and where do i put em??

    plzzz help!!!!!!!!!!!!

    I have a menu base to use with it

    DWORD dwRunConsoleCommand = 0x485FA0;
    ^^ example

    Im using C++
    [IMG]https://i1197.photobucke*****m/albums/aa436/xDex_/sigprojectbraviacopy.jpg[/IMG]

  2. #2
    -Dimensions-'s Avatar
    Join Date
    Jul 2010
    Gender
    male
    Posts
    243
    Reputation
    2
    Thanks
    162
    My Mood
    Aggressive
    That dwRunConsoleCommand is actually the UnwrappedEngine Address. It is used in the common PTC function...

    Your using C++ but you don't know C++.

    You can NOP the addresses using bytes and a Memcyp function.

  3. #3
    Bravia's Avatar
    Join Date
    Jul 2011
    Gender
    male
    Posts
    30
    Reputation
    10
    Thanks
    1
    My Mood
    Bashful
    so how do i do this?

    What does NOP'ing the address do?
    Last edited by Bravia; 08-05-2011 at 02:47 PM.
    [IMG]https://i1197.photobucke*****m/albums/aa436/xDex_/sigprojectbraviacopy.jpg[/IMG]

  4. #4
    -Dimensions-'s Avatar
    Join Date
    Jul 2010
    Gender
    male
    Posts
    243
    Reputation
    2
    Thanks
    162
    My Mood
    Aggressive
    Quote Originally Posted by Bravia View Post
    so how do i do this?

    What does NOP'ing the address do?
    Code:
    void __cdecl RunConsoleCommand( const char* szCommand )
    {
    	void* address = ( void* ) ADDR_CONSOLEUNWRAPPED;
    
    	__asm
    	{
    		Push szCommand
    		call address
    		add esp, 0x4
    	}
    }
    Code:
    RunConsoleCommand( PTC Value );
    Example:

    Code:
    RunConsoleCommand( "ShowFps 1 " );
    Code:
    bool Memoria( void * pDest, char * szPatch, size_t sSize )
    {
        DWORD dwOrgProtect = NULL;
        if ( !VirtualProtect ( pDest, sSize, PAGE_EXECUTE_READWRITE, &dwOrgProtect ))
            return FALSE;
    
        memcpy( pDest, szPatch, sSize );
        VirtualProtect( pDest, sSize, dwOrgProtect, NULL );
        return TRUE;
    }
    Code:
    Memoria( Address, Bytes, # of Bytes );
    Example:
    Code:
    Memoria( (LPVOID)ADDR_SUPERBULLETS, "\x0F\x94\xC0", 3 ); //Off
    Memoria( (LPVOID)ADDR_SUPERBULLETS, "\x33\xC0\x90", 3 ); //On

  5. #5
    Bravia's Avatar
    Join Date
    Jul 2011
    Gender
    male
    Posts
    30
    Reputation
    10
    Thanks
    1
    My Mood
    Bashful
    2 more things

    1) where do i put these codes to cooperate with the hack name?

    2) Where can i find on/off codes?
    [IMG]https://i1197.photobucke*****m/albums/aa436/xDex_/sigprojectbraviacopy.jpg[/IMG]

  6. #6
    FailHacker's Avatar
    Join Date
    Sep 2010
    Gender
    male
    Posts
    444
    Reputation
    8
    Thanks
    49
    wow bro. learn c++. you're basically asking for someone to do everything for you then you're gonna c+p and claim it as yours.
    Legen...wait for it...dary







  7. #7
    kibbles18's Avatar
    Join Date
    Oct 2008
    Gender
    male
    Location
    US
    Posts
    860
    Reputation
    5
    Thanks
    127
    You push the char* argument onto the stack, call unwrapped console, clean stack (cdecl)

Similar Threads

  1. (help)with addresses
    By tobiasm9 in forum WarRock - International Hacks
    Replies: 8
    Last Post: 02-26-2008, 04:25 PM
  2. [request] Help with Address
    By Grim09 in forum WarRock - International Hacks
    Replies: 21
    Last Post: 11-20-2007, 01:41 PM
  3. Can I have some help with addresses?
    By thez6668 in forum WarRock - International Hacks
    Replies: 3
    Last Post: 09-02-2007, 03:45 PM
  4. Codes/values/addresses
    By crazy4her in forum WarRock - International Hacks
    Replies: 8
    Last Post: 06-09-2007, 05:52 AM