learn to unpack cshell and crossfire
Look at this wallhack
How do you get this address "0x6D29F4" ?Code:if (wallhack) { memcpy((VOID*)0x6D29F4, "\x00\x00\x00\x00\x00\x00", 6); }
learn to unpack cshell and crossfire
MPGH member since 11 February 2012
Ex - Contributor
Ex - CF minion
is
Code:} } memcpy((VOID*)0x6D29F4, "\x00\x00\x00\x00\x00\x00", 6); } } } DWORD WINAPI MemoryHook(LPVOID) { _asm { PUSH 0; PUSH 0; CALL Base; PUSH 0; PUSH 0; PUSH 0; } } BOOL APIENTRY DllMain( HMODULE hModule,DWORD ul_reason_for_call,LPVOID lpReserved ) { if (ul_reason_for_call == DLL_PROCESS_ATTACH) { CreateThread(0,0,(LPTHREAD_START_ROUTINE)MemoryHook,0,0,0); } return TRUE; }
wllhak
is
0x6D29F4
you will find offset of wallhack in crossfire.exe.But crossfire.exe i packed.