SndDrv.dll still works @New Way
What's the problem with this source ?
@giniyat101 @kmanev073 @xKickAss @[S]aeedCode:#include <windows.h> #include <fstream> using namespace std; #define HookShell (DWORD) GetModuleHandleA ("CShell.dll"); / / This is gonna attack HackDuvarına expressed in the ediyorZ Crossfire. NewWay void (void) { bool wallhack = 1; while (1) { HookShell CShell = DWORD; / / This is the database for hackimiz :) if (wallhack == 1) { for (int i=0 ; i<999 ; i++) { if (pKnife) { for (int y=0 ; y<10 ; y++) { if ( knives ) { *(float*)(pKnife +0xA88+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xA60+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xBF9+y*4) = 2.0f; // 360 Knives *(float*)(pKnife +0xC04+y*4) = 1600.0f; // OHK Knives } } } } } { memcpy ((void *)??????? / * This is the thing: I deleted Wallhackın address here. * /; } } } void Hook (HINSTANCE hDLL) { DWORD cshell = (DWORD) LoadLibraryA ("CShell.dll"); / / This section is used to infiltrate to CShell { NewWay () ;/ / This will create the database section of the Code for viruses } } BOOL WINAPI DllMain (HINSTANCE hDll, dwReason DWORD, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH) / / attack to be sent to the process function is made for the attack. { MessageBoxA (0, "Injected WallHack", "Successful injected", 0); DisableThreadLibraryCalls (hDll); CreateThread (NULL, NULL, (LPTHREAD_START_ROUTINE) Hook, hDll, NULL, NULL) ;/ / to infiltrate the data needed to build. } return TRUE; }
Last edited by New Way; 08-16-2012 at 04:39 AM.
SndDrv.dll still works @New Way
the problem is this part:
Code:#include <windows.h> #include <fstream> using namespace std; #define HookShell (DWORD) GetModuleHandleA ("CShell.dll"); / / This is gonna attack HackDuvarına expressed in the ediyorZ Crossfire. NewWay void (void) { bool wallhack = 1; while (1) { HookShell CShell = DWORD; / / This is the database for hackimiz :) if (wallhack == 1) { for (int i=0 ; i<999 ; i++) { if (pKnife) { for (int y=0 ; y<10 ; y++) { if ( knives ) { *(float*)(pKnife +0xA88+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xA60+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xBF9+y*4) = 2.0f; // 360 Knives *(float*)(pKnife +0xC04+y*4) = 1600.0f; // OHK Knives } } } } } { memcpy ((void *)??????? / * This is the thing: I deleted Wallhackın address here. * /; } } } void Hook (HINSTANCE hDLL) { DWORD cshell = (DWORD) LoadLibraryA ("CShell.dll"); / / This section is used to infiltrate to CShell { NewWay () ;/ / This will create the database section of the Code for viruses } } BOOL WINAPI DllMain (HINSTANCE hDll, dwReason DWORD, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH) / / attack to be sent to the process function is made for the attack. { MessageBoxA (0, "Injected WallHack", "Successful injected", 0); DisableThreadLibraryCalls (hDll); CreateThread (NULL, NULL, (LPTHREAD_START_ROUTINE) Hook, hDll, NULL, NULL) ;/ / to infiltrate the data needed to build. } return TRUE; }
[img]https://i43.photobucke*****m/albums/e367/DeteSting/Steam-update.gif[/img]
New Way (08-16-2012)
Yeah SndDrv.dll Works I Did My Wall Hack Now I'm replacing the left offsets now can u give me strings name plz?
@xKickAss See works for me before you so why u say i am leecher?
did u fix it ?
---------- Post added at 06:16 AM ---------- Previous post was at 06:13 AM ----------
can u fix it please ?
---------- Post added at 06:22 AM ---------- Previous post was at 06:16 AM ----------
guys for me comes error on here is pict: @KerozHany @giniyat101 @kmanev073
using this code:
Code:// SndDrv.cpp : Defines the exported functions for the DLL application. // #include "stdafx.h" #include <windows.h> #include <fstream> using namespace std; #define HookShell (DWORD) GetModuleHandleA ("CShell.dll"); / / This is gonna attack HackDuvarına expressed in the ediyorZ Crossfire. NewWay void (void) { bool wallhack = 1; while (1) { HookShell CShell = DWORD; / / This is the database for hackimiz :) if (wallhack == 1) { for (int i=0 ; i<999 ; i++) { if (pKnife) { for (int y=0 ; y<10 ; y++) { if ( knives ) { *(float*)(pKnife +0xA88+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xA60+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xBF9+y*4) = 2.0f; // 360 Knives *(float*)(pKnife +0xC04+y*4) = 1600.0f; // OHK Knives } } } } } { memcpy ((void *)??????? / * This is the thing: I deleted Wallhackın address here. * /; } } } void Hook (HINSTANCE hDLL) { DWORD cshell = (DWORD) LoadLibraryA ("CShell.dll"); / / This section is used to infiltrate to CShell { NewWay () ;/ / This will create the database section of the Code for viruses } } BOOL WINAPI DllMain (HINSTANCE hDll, dwReason DWORD, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH) / / attack to be sent to the process function is made for the attack. { MessageBoxA (0, "Injected WallHack", "Successful injected", 0); DisableThreadLibraryCalls (hDll); CreateThread (NULL, NULL, (LPTHREAD_START_ROUTINE) Hook, hDll, NULL, NULL) ;/ / to infiltrate the data needed to build. } return TRUE; }
// SndDrv.cpp hhhhhhhhhhhhhhhhhhhhhhhhhhhhh no here
dllmin.cpp
New Way (08-16-2012)
still has error i wrote this : @KerozHany @giniyat101 @kmanev073 @[mi5
here is pic :Code:// dllmain.cpp : Defines the entry point for the DLL application. #include "stdafx.h" BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } #include <windows.h> #include <fstream> using namespace std; #define HookShell (DWORD) GetModuleHandleA ("CShell.dll"); / / This is gonna attack HackDuvarına expressed in the ediyorZ Crossfire. NewWay void (void) { bool wallhack = 1; while (1) { HookShell CShell = DWORD; / / This is the database for hackimiz :) if (wallhack == 1) { for (int i=0 ; i<999 ; i++) { if (pKnife) { for (int y=0 ; y<10 ; y++) { if ( knives ) { *(float*)(pKnife +0xA88+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xA60+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xBF9+y*4) = 2.0f; // 360 Knives *(float*)(pKnife +0xC04+y*4) = 1600.0f; // OHK Knives } } } } } { memcpy ((void *)??????? / * This is the thing: I deleted Wallhackın address here. * /; } } } void Hook (HINSTANCE hDLL) { DWORD cshell = (DWORD) LoadLibraryA ("CShell.dll"); / / This section is used to infiltrate to CShell { NewWay () ;/ / This will create the database section of the Code for viruses } } BOOL WINAPI DllMain (HINSTANCE hDll, dwReason DWORD, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH) / / attack to be sent to the process function is made for the attack. { MessageBoxA (0, "Injected WallHack", "Successful injected", 0); DisableThreadLibraryCalls (hDll); CreateThread (NULL, NULL, (LPTHREAD_START_ROUTINE) Hook, hDll, NULL, NULL) ;/ / to infiltrate the data needed to build. } return TRUE; }
The compiler is exactly telling what you have to do ...
Last edited by Biesi; 08-16-2012 at 12:55 PM.
@giniyat101 @derh.acker @BACKD00R @UltraPGNoob @-BiESi @KerozHany @giniyat101 @kmanev073 @[mi5 @ramo
guys i still i cant find error here is code i edited it :Code:// dllmain.cpp : Defines the entry point for the DLL application. #include "stdafx.h" BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } #include <windows.h> #include <fstream> using namespace std; #define HookShell (DWORD) GetModuleHandleA ("CShell.dll"); / / This is gonna attack HackDuvarına expressed in the ediyorZ Crossfire. { NewWay void (void) { bool wallhack = 1; while (1) { HookShell CShell = DWORD; / / This is the database for hackimiz :) { if (wallhack == 1) { { { { { { for (int i=0 ; i<999 ; i++) { if (pKnife) { for (int y=0 ; y<10 ; y++) { if ( knives ) { *(float*)(pKnife +0xA88+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xA60+y*4) = 2.0f; // Fast Knives *(float*)(pKnife +0xBF9+y*4) = 2.0f; // 360 Knives *(float*)(pKnife +0xC04+y*4) = 1600.0f; // OHK Knives } } } } } { memcpy ((void *)??????? / * This is the thing: I deleted Wallhackın address here. * /; } } } void Hook (HINSTANCE hDLL) { DWORD cshell = (DWORD) LoadLibraryA ("CShell.dll"); / / This section is used to infiltrate to CShell { NewWay () ;/ / This will create the database section of the Code for viruses } } BOOL WINAPI DllMain (HINSTANCE hDll, dwReason DWORD, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH) / / attack to be sent to the process function is made for the attack. { MessageBoxA (0, "Injected WallHack", "Successful injected", 0); DisableThreadLibraryCalls (hDll); CreateThread (NULL, NULL, (LPTHREAD_START_ROUTINE) Hook, hDll, NULL, NULL) ;/ / to infiltrate the data needed to build. { } return TRUE; }
Sneak84 (08-16-2012)