Page 1 of 2 12 LastLast
Results 1 to 15 of 17
  1. #1
    foxofor6's Avatar
    Join Date
    May 2016
    Gender
    male
    Posts
    32
    Reputation
    10
    Thanks
    1

    Red face Does anyone know UAV address?

    Does some "smart brain" knows the uav address please? d: All I need to know is that address. I want to release my first public ava hack since old hackers don't release it anymore D:
    Last edited by foxofor6; 08-21-2016 at 06:01 PM.

  2. #2
    Avazocker's Avatar
    Join Date
    Jun 2016
    Gender
    male
    Location
    Germeny
    Posts
    1
    Reputation
    10
    Thanks
    0
    My Mood
    Angelic
    lol Ask ccman32 he need for Uav hack 5 Mins :v

  3. #3
    Hunter's Avatar
    Join Date
    Dec 2013
    Gender
    male
    Location
    Depths Of My Mind.
    Posts
    17,648
    Reputation
    3771
    Thanks
    6,104
    My Mood
    Cheerful
    ccman32 isn't even active on MPGH anymore. Maybe @Jabberwock or @RedHunter can provide you with the answer to this question of yours.

  4. #4
    Luffy's Avatar
    Join Date
    Jan 2016
    Gender
    male
    Location
    GameMon.des
    Posts
    2,159
    Reputation
    180
    Thanks
    9,970
    My Mood
    Innocent
    Quote Originally Posted by Hunter View Post
    ccman32 isn't even active on MPGH anymore. Maybe @Jabberwock or @RedHunter can provide you with the answer to this question of yours.
    Idk about UAV address because Im new on this game . Still learning on It .


    MPGH History:
    Member: 02/1/2016
    Contributor: 29/6/2016
    Minion: 25/8/2016
    Former Staff: 07/02/2017


  5. #5
    Scythen's Avatar
    Join Date
    Aug 2014
    Gender
    male
    Location
    delusional
    Posts
    497
    Reputation
    114
    Thanks
    699
    My Mood
    Busy
    Jabberwock's not active because he's in the military, he goes two weeks at a time and gets a week off + breaks in between and he has other things to do when he's off
    Also, there's no heartbeat so do some research and you'll find out how to find current xigncode address and make a bypass from that
    Last edited by Hunter; 09-05-2016 at 02:49 AM.
    Fixing any AVA related issues that are blocking you from joining the game!


  6. #6
    antep2727's Avatar
    Join Date
    Feb 2015
    Gender
    male
    Posts
    734
    Reputation
    10
    Thanks
    4,008
    My Mood
    Inspired
    Quote Originally Posted by Scythen View Post
    Also, there's no heartbeat so do some research and you'll find out how to find current xigncode address and make a bypass from that
    what so my bypass will work again

  7. #7
    Scythen's Avatar
    Join Date
    Aug 2014
    Gender
    male
    Location
    delusional
    Posts
    497
    Reputation
    114
    Thanks
    699
    My Mood
    Busy
    Quote Originally Posted by antep2727 View Post
    what so my bypass will work again
    Update your xigncode address in your source of course, it should work.
    Fixing any AVA related issues that are blocking you from joining the game!


  8. #8
    foxofor6's Avatar
    Join Date
    May 2016
    Gender
    male
    Posts
    32
    Reputation
    10
    Thanks
    1
    Quote Originally Posted by Scythen View Post
    Also, there's no heartbeat so do some research and you'll find out how to find current xigncode address and make a bypass from that
    OHh Im taking care of that right now buddy
    Last edited by Hunter; 09-05-2016 at 02:46 AM.

  9. #9
    SneakyM0F0's Avatar
    Join Date
    Aug 2016
    Gender
    male
    Location
    earth
    Posts
    4
    Reputation
    10
    Thanks
    1
    Quote Originally Posted by Scythen View Post
    Also, there's no heartbeat so do some research and you'll find out how to find current xigncode address and make a bypass from that

    0026CE40 55 PUSH EBP // Current addy for Xingcode initialization

    - - - Updated - - -

    UAV Starts at "ava.exe"+01C5AA10 / 3ac / 24cc / 0 / 59c type Binary length 1 / Start bit (7) You're welcome ....
    Increment the zero offset by a factor of two to get the others . ( 3ac / 24cc /8 / 59c ) ( 3ac / 24cc /10 / 59c )

    - - - Updated - - -

    Quote Originally Posted by foxofor6 View Post
    Does some "smart brain" knows the uav address please? d: All I need to know is that address. I want to release my first public ava hack since old hackers don't release it anymore D:
    If you know how to use cheat engine... The table below is for reference only...

     
    <?xml version="1.0" encoding="utf-8"?>
    <CheatTable CheatEngineTableVersion="16">
    <CheatEntries>
    <CheatEntry>
    <ID>4</ID>
    <Description>"super weapons "</Description>
    <Color>80000008</Color>
    <VariableType>4 Bytes</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>778</Offset>
    <Offset>40C</Offset>
    <Offset>230</Offset>
    </Offsets>
    <Hotkeys>
    <Hotkey>
    <Action>Activate</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <ID>0</ID>
    </Hotkey>
    <Hotkey>
    <Action>Deactivate</Action>
    <Keys>
    <Key>98</Key>
    </Keys>
    <ID>1</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <Value>55</Value>
    <ID>2</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>100</Key>
    </Keys>
    <Value>3</Value>
    <ID>3</ID>
    </Hotkey>
    </Hotkeys>
    </CheatEntry>
    <CheatEntry>
    <ID>5</ID>
    <Description>"unlimited ammo "</Description>
    <Color>80000008</Color>
    <VariableType>Byte</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>75D</Offset>
    <Offset>40C</Offset>
    <Offset>230</Offset>
    </Offsets>
    <Hotkeys>
    <Hotkey>
    <Action>Toggle Activation</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <ID>0</ID>
    </Hotkey>
    <Hotkey>
    <Action>Deactivate</Action>
    <Keys>
    <Key>98</Key>
    </Keys>
    <ID>1</ID>
    </Hotkey>
    </Hotkeys>
    </CheatEntry>
    <CheatEntry>
    <ID>7</ID>
    <Description>"recoil"</Description>
    <Color>80000008</Color>
    <VariableType>Float</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>894</Offset>
    <Offset>40C</Offset>
    <Offset>230</Offset>
    </Offsets>
    <Hotkeys>
    <Hotkey>
    <Action>Toggle Activation</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <ID>0</ID>
    </Hotkey>
    <Hotkey>
    <Action>Deactivate</Action>
    <Keys>
    <Key>98</Key>
    </Keys>
    <ID>1</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <Value>0</Value>
    <ID>2</ID>
    </Hotkey>
    </Hotkeys>
    </CheatEntry>
    <CheatEntry>
    <ID>8</ID>
    <Description>"recoil"</Description>
    <Color>80000008</Color>
    <VariableType>Float</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>890</Offset>
    <Offset>40C</Offset>
    <Offset>230</Offset>
    </Offsets>
    <Hotkeys>
    <Hotkey>
    <Action>Toggle Activation</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <ID>0</ID>
    </Hotkey>
    <Hotkey>
    <Action>Deactivate</Action>
    <Keys>
    <Key>98</Key>
    </Keys>
    <ID>1</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <Value>0</Value>
    <ID>2</ID>
    </Hotkey>
    </Hotkeys>
    </CheatEntry>
    <CheatEntry>
    <ID>9</ID>
    <Description>"spread"</Description>
    <Color>80000008</Color>
    <VariableType>Float</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>B58</Offset>
    <Offset>40C</Offset>
    <Offset>230</Offset>
    </Offsets>
    <Hotkeys>
    <Hotkey>
    <Action>Activate</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <ID>0</ID>
    </Hotkey>
    <Hotkey>
    <Action>Deactivate</Action>
    <Keys>
    <Key>98</Key>
    </Keys>
    <ID>1</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>97</Key>
    </Keys>
    <Value>3</Value>
    <ID>2</ID>
    </Hotkey>
    <Hotkey>
    <Action>Increase Value</Action>
    <Keys>
    <Key>38</Key>
    </Keys>
    <Value>.5</Value>
    <ID>3</ID>
    </Hotkey>
    <Hotkey>
    <Action>Decrease Value</Action>
    <Keys>
    <Key>40</Key>
    </Keys>
    <Value>0.5</Value>
    <ID>4</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>99</Key>
    </Keys>
    <Value>0.25</Value>
    <ID>5</ID>
    </Hotkey>
    <Hotkey>
    <Action>Set Value</Action>
    <Keys>
    <Key>100</Key>
    </Keys>
    <Value>0</Value>
    <ID>6</ID>
    </Hotkey>
    </Hotkeys>
    </CheatEntry>
    <CheatEntry>
    <ID>6</ID>
    <Description>"rapid fire "</Description>
    <Color>80000008</Color>
    <VariableType>Float</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>9D8</Offset>
    <Offset>230</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>16</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>0</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>10</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>8</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>15</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>10</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>17</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>18</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>18</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>28</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>19</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>50</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>20</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Binary</VariableType>
    <BitStart>7</BitStart>
    <BitLength>1</BitLength>
    <ShowAsBinary>0</ShowAsBinary>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>58</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    <CheatEntry>
    <ID>21</ID>
    <Description>"uav"</Description>
    <Color>80000008</Color>
    <VariableType>Byte</VariableType>
    <Address>"ava.exe"+01C5AA10</Address>
    <Offsets>
    <Offset>59C</Offset>
    <Offset>90</Offset>
    <Offset>24CC</Offset>
    <Offset>3AC</Offset>
    </Offsets>
    </CheatEntry>
    </CheatEntries>
    <CheatCodes>
    <CodeEntry>
    <Description>Change of movss xmm0,[ebp-04]</Description>
    <Address>016A98FB</Address>
    <ModuleName>ava.exe</ModuleName>
    <ModuleNameOffset>7798FB</ModuleNameOffset>
    <Before>
    <Byte>02</Byte>
    <Byte>8B</Byte>
    <Byte>E5</Byte>
    <Byte>5D</Byte>
    <Byte>C3</Byte>
    </Before>
    <Actual>
    <Byte>F3</Byte>
    <Byte>0F</Byte>
    <Byte>10</Byte>
    <Byte>45</Byte>
    <Byte>FC</Byte>
    </Actual>
    <After>
    <Byte>A1</Byte>
    <Byte>40</Byte>
    <Byte>1E</Byte>
    <Byte>01</Byte>
    <Byte>02</Byte>
    </After>
    </CodeEntry>
    <CodeEntry>
    <Description>Change of mov [ava.exe+1C5AA10],eax</Description>
    <Address>016A996F</Address>
    <ModuleName>ava.exe</ModuleName>
    <ModuleNameOffset>77996F</ModuleNameOffset>
    <Before>
    <Byte>FF</Byte>
    <Byte>83</Byte>
    <Byte>C4</Byte>
    <Byte>04</Byte>
    <Byte>5F</Byte>
    </Before>
    <Actual>
    <Byte>A3</Byte>
    <Byte>10</Byte>
    <Byte>AA</Byte>
    <Byte>B8</Byte>
    <Byte>02</Byte>
    </Actual>
    <After>
    <Byte>5E</Byte>
    <Byte>8B</Byte>
    <Byte>E5</Byte>
    <Byte>5D</Byte>
    <Byte>C3</Byte>
    </After>
    </CodeEntry>
    <CodeEntry>
    <Description>Change of add [eax],al</Description>
    <Address>5379DB38</Address>
    <ModuleName/>
    <ModuleNameOffset>0</ModuleNameOffset>
    <Before>
    <Byte>20</Byte>
    <Byte>00</Byte>
    <Byte>00</Byte>
    <Byte>C8</Byte>
    <Byte>42</Byte>
    </Before>
    <Actual>
    <Byte>00</Byte>
    <Byte>00</Byte>
    </Actual>
    <After>
    <Byte>C8</Byte>
    <Byte>42</Byte>
    <Byte>00</Byte>
    <Byte>00</Byte>
    <Byte>00</Byte>
    </After>
    </CodeEntry>
    <CodeEntry>
    <Description>Change of inc edx</Description>
    <Address>5379DB37</Address>
    <ModuleName/>
    <ModuleNameOffset>0</ModuleNameOffset>
    <Before>
    <Byte>34</Byte>
    <Byte>20</Byte>
    <Byte>00</Byte>
    <Byte>00</Byte>
    <Byte>C8</Byte>
    </Before>
    <Actual>
    <Byte>42</Byte>
    </Actual>
    <After>
    <Byte>90</Byte>
    <Byte>90</Byte>
    <Byte>C8</Byte>
    <Byte>42</Byte>
    <Byte>00</Byte>
    </After>
    </CodeEntry>
    <CodeEntry>
    <Description>Change of dec esp</Description>
    <Address>5379DB2D</Address>
    <ModuleName/>
    <ModuleNameOffset>0</ModuleNameOffset>
    <Before>
    <Byte>00</Byte>
    <Byte>00</Byte>
    <Byte>00</Byte>
    <Byte>00</Byte>
    <Byte>CD</Byte>
    </Before>
    <Actual>
    <Byte>4C</Byte>
    </Actual>
    <After>
    <Byte>80</Byte>
    <Byte>42</Byte>
    <Byte>00</Byte>
    <Byte>5D</Byte>
    <Byte>34</Byte>
    </After>
    </CodeEntry>
    </CheatCodes>

    </Structure>
    </Structures>
    <Comments>Info about this table:
    </Comments>
    </CheatTable>




     
    #include <Windows.h>
    #include <iostream>
    #include <tlhelp32.h>
    #include <stdio.h>

    using namespace std;

    DWORD GetProcessId(const TCHAR* lpProcessName)
    {
    DWORD dwProcessId = 0;

    PROCESSENTRY32 entry;
    entry.dwSize = sizeof(PROCESSENTRY32);

    HANDLE snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, NULL);

    if (snapshot != INVALID_HANDLE_VALUE)
    {
    if (Process32First(snapshot, &entry))
    {
    do
    {
    if (_wcsicmp(entry.szExeFile, lpProcessName) == 0)
    {
    dwProcessId = entry.th32ProcessID;
    break;
    }
    } while (Process32Next(snapshot, &entry));
    }

    CloseHandle(snapshot);
    }

    return dwProcessId;
    }

    void suspend(DWORD processId)
    {
    HANDLE hThreadSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPTHREAD, 0);

    THREADENTRY32 threadEntry;
    threadEntry.dwSize = sizeof(THREADENTRY32);

    if (hThreadSnapshot != INVALID_HANDLE_VALUE)
    {
    if (Thread32First(hThreadSnapshot, &threadEntry))
    {
    do
    {
    if (threadEntry.th32OwnerProcessID == processId)
    {
    HANDLE hThread = OpenThread(THREAD_ALL_ACCESS, FALSE, threadEntry.th32ThreadID);

    if (hThread)
    {
    SuspendThread(hThread);
    CloseHandle(hThread);
    }

    }
    } while (Thread32Next(hThreadSnapshot, &threadEntry));
    }

    CloseHandle(hThreadSnapshot);
    }
    }

    int main(int argc, TCHAR* argv[])
    {
    HANDLE h = GetStdHandle(STD_OUTPUT_HANDLE);
    SetConsoleTextAttribute(h, FOREGROUND_RED | FOREGROUND_INTENSITY);

    SetConsoleTitle(TEXT(" ByPass.exe "));



    cout << "ByPass" << endl;

    DWORD dwProcessId;

    while (!(dwProcessId = GetProcessId(TEXT("AVA.exe"))))
    Sleep(1);


    cout << "Searching for Xingcode!" << endl;

    SetConsoleTextAttribute(h, FOREGROUND_GREEN | FOREGROUND_INTENSITY);

    HANDLE hProcess = OpenProcess(PROCESS_VM_READ | PROCESS_VM_WRITE | PROCESS_VM_OPERATION, FALSE, dwProcessId);

    if (hProcess)
    {
    cout << "XingCode Located..." << endl;

    SetConsoleTextAttribute(h, FOREGROUND_RED | FOREGROUND_INTENSITY);


    const DWORD dwLocationOfFunction = 0x0026CE40; //Update this value

    INT Offsets;
    BYTE FirstByte;



    DWORD dwOldProtection;

    while (!ReadProcessMemory(hProcess, (LPVOID)dwLocationOfFunction, &FirstByte, sizeof(FirstByte), NULL) || FirstByte != 0x55)
    {
    if (GetLastError() == ERROR_ACCESS_DENIED)
    cout << "ERROR_ACCESS_DENIED" << endl;

    Sleep(1);
    }



    //cout << "Bypassing Xingcode" << endl;


    SetConsoleTextAttribute(h, FOREGROUND_GREEN | FOREGROUND_INTENSITY);

    const BYTE ByteToWrite = 0xc3;



    BOOL bSuccess = VirtualProtectEx(hProcess, (LPVOID)dwLocationOfFunction, sizeof(FirstByte), PAGE_EXECUTE_READWRITE, &dwOldProtection);

    if (bSuccess)
    bSuccess = WriteProcessMemory(hProcess, (LPVOID)dwLocationOfFunction, &ByteToWrite, sizeof(ByteToWrite), NULL);

    CloseHandle(hProcess);


    if (bSuccess)



    cout << "Xingcode Bypassed " << endl;




    }



    cin.get();
    return 0;
    }
    Last edited by SneakyM0F0; 08-28-2016 at 02:38 PM.

  10. The Following User Says Thank You to SneakyM0F0 For This Useful Post:

    foxofor6 (08-28-2016)

  11. #10
    foxofor6's Avatar
    Join Date
    May 2016
    Gender
    male
    Posts
    32
    Reputation
    10
    Thanks
    1
    Quote Originally Posted by SneakyM0F0 View Post
    0026CE40 55 PUSH EBP // Current addy for Xingcode initialization

    - - - Updated - - -

    UAV Starts at "ava.exe"+01C5AA10 / 3ac / 24cc / 0 / 59c type Binary length 1 / Start bit (7) You're welcome ....
    Increment the zero offset by a factor of two to get the others . ( 3ac / 24cc /8 / 59c ) ( 3ac / 24cc /10 / 59c )

    - - - Updated - - -



    If you know how to use cheat engine ...
    yea dude im working on it thanks men

  12. #11
    SneakyM0F0's Avatar
    Join Date
    Aug 2016
    Gender
    male
    Location
    earth
    Posts
    4
    Reputation
    10
    Thanks
    1
    I included some reference code . Copy paste will not work just use the info it is all correct . The bypass is working if you know how to use it in a C++ console app.

  13. #12
    Jabberwock's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Posts
    1,695
    Reputation
    191
    Thanks
    15,185
    My Mood
    Relaxed
    Hmm interesting to see that my source code is still on the web. And as a side note, SneakyM0F0; AVA.exe module has a dynamic base address this time so it might not always work... You need to find the base address of the module, then add the offset.
    Even familiar landscapes will
    reveal a different kind of beauty
    if you change your viewpoint.
    Where these new encounters
    and new bonds will lead you...
    Such dazzling golden days.
    I, too, look forward to
    what I might behold.

  14. #13
    SneakyM0F0's Avatar
    Join Date
    Aug 2016
    Gender
    male
    Location
    earth
    Posts
    4
    Reputation
    10
    Thanks
    1
    Quote Originally Posted by Jabberwock View Post
    Hmm interesting to see that my source code is still on the web. And as a side note, SneakyM0F0; AVA.exe module has a dynamic base address this time so it might not always work... You need to find the base address of the module, then add the offset.
    Thanks for the tip and yeah it is your source FULL CREDITS on the method. There is more than one way of doing this though
    Last edited by SneakyM0F0; 08-28-2016 at 03:24 PM.

  15. #14
    antep2727's Avatar
    Join Date
    Feb 2015
    Gender
    male
    Posts
    734
    Reputation
    10
    Thanks
    4,008
    My Mood
    Inspired
    Quote Originally Posted by Jabberwock View Post
    Hmm interesting to see that my source code is still on the web. And as a side note, SneakyM0F0; AVA.exe module has a dynamic base address this time so it might not always work... You need to find the base address of the module, then add the offset.
    Could you tell me if xigncode blocks openprocess ?
    Last edited by Hunter; 09-05-2016 at 02:52 AM.

  16. #15
    Jabberwock's Avatar
    Join Date
    Jun 2012
    Gender
    male
    Posts
    1,695
    Reputation
    191
    Thanks
    15,185
    My Mood
    Relaxed
    Quote Originally Posted by SneakyM0F0 View Post
    Thanks for the tip and yeah it is your source FULL CREDITS on the method. There is more than one way of doing this though
    nahh... Didn't mention it for the credits though.

    Quote Originally Posted by antep2727 View Post
    Could you tell me if xigncode blocks openprocess ?
    Yep. They do block it. That's why you need to do your stuff before they load their driver.

    With a lua script you can go about it like this:

    Code:
    function loop()
        local hud = readInteger('["ava.exe"+01c5aa10]+3ac')
        if hud ~= nil and hud ~= 0 then
           local count = readInteger('[["ava.exe"+01c5aa10]+3ac]+24d0')
           if count ~= nil and count > 1 then
              local array = readInteger('[["ava.exe"+01c5aa10]+3ac]+24cc')
              for i=0, count-2 do
                  local pawn = readInteger(array + i*8)
                  if pawn ~= nil and pawn ~= 0 then
                     local uav = pawn + 0x59c
                     local value = bOr(readBytes(uav, 1), 0x80)
                     writeBytes(uav, value)
                  end
              end
           end
        end
    end
    
    function bypass(timer)
      if getOpenedProcessID() == 0 then
        openProcess("ava.exe")
      end
      if getOpenedProcessID() ~= 0 then
        if readBytes('"ava.exe"+1d310', 1) == 0x55 then
          writeBytes('"ava.exe"+1d310', 0xc3)
          timer_setInterval(timer, 500)
          timer_onTimer(timer, loop)
        end
      end
    end
    
    t = createTimer(nil);
    timer_setInterval(t, 10)
    timer_onTimer(t, bypass)
    Last edited by Jabberwock; 08-28-2016 at 04:34 PM.
    Even familiar landscapes will
    reveal a different kind of beauty
    if you change your viewpoint.
    Where these new encounters
    and new bonds will lead you...
    Such dazzling golden days.
    I, too, look forward to
    what I might behold.

  17. The Following 2 Users Say Thank You to Jabberwock For This Useful Post:

    antep2727 (08-28-2016),Scythen (08-28-2016)

Page 1 of 2 12 LastLast

Similar Threads

  1. [Help] Does anyone know the health address for multiplayer?
    By eogfalconv2 in forum Call of Duty Black Ops 2 Coding, Programming & Source Code
    Replies: 10
    Last Post: 07-31-2014, 04:19 PM
  2. Does anyone know how to find addresses in ghosts?
    By TrailerHooker in forum Call of Duty Ghosts Discussions & Help
    Replies: 5
    Last Post: 11-28-2013, 10:44 PM
  3. Replies: 0
    Last Post: 08-07-2009, 08:01 PM
  4. Does anyone know a hack for warrock dinar
    By killa017 in forum WarRock - International Hacks
    Replies: 0
    Last Post: 05-30-2007, 06:17 PM
  5. Does anyone know why I was IP banned?
    By systemx84 in forum WarRock - International Hacks
    Replies: 2
    Last Post: 05-28-2007, 11:51 AM