1) Try spoofing CVar?
2)
char* VEngineCvarName = (char*)Utilities::Memory::FindTextPattern("engine.dll", "VEngineCvar00");
Type: Posts; User: SilentWarp
1) Try spoofing CVar?
2)
char* VEngineCvarName = (char*)Utilities::Memory::FindTextPattern("engine.dll", "VEngineCvar00");
He used perfect English.
Aimstep
//2short
Just make your own....
simply use MSDN for read and write process memory, along with tlhelp32
Well you'd find new patterns for the ones missing
If you are good at Java, there should be no issues porting over.
Just finding a Read/Write process memory library or function.
Hmm I wonder why I dont believe this....
You cant even give an exact answer
I need help with this crashing and visibility issue with my form. This is a form within a DLL that gets loaded upon startup. I have made a really longwinded post on StackOverflow to try and get a bit...
Why not just NULL m_szArmsModel?
m_bIsDormant (LocalPlayer + 0xE9)
if True then the entity is out of your ESP range.
When you force update the string gets written back to that position. Try:
I would figure out whats writing too it and save the bytes.
Save the current arm string
NOP the bytes
Remove the string...
I did know that lol. I tried what Wasser said but nothing worked so I just stopped trying to work with it
You do have to update the address depending on the method you use. If you use offsets then yes obviously you will. Using the SDK will mean you have to do it less but keep up to date with virtual...
Don't use API calls from DLLMain
You can use:
EVERYTHING YOU WANT FFS. (Where did the whole WriteProcessMemory is detected thing start)
Just make sure to normalize angles if you use them etc and do your sanity checks
You might be better off using python if you don't have much time
On another forum I posted this question. Even one of there better programmers couldn't find the issue. I attempted to call virtual functions on my own, but it crashed constantly. I didn't debug this...
Eh DLL Hijacking is obviously detectable and this is basically the same. So I guess if they get this module and analyse it it's up to them if they decide if this is a cheat or not.
I have thought of some starting places but haven't started researching yet. I was thinking about tracing a ConVar back to see what writes too it and maybe find something there? Does anyone know...
Why don't you give credits to the original makers.
Compile it using something other than polyloader to fix peoples issues.
Just don't create another pasta.
If it is truly your own cheat, you should know what to do.
I've used this for a good month with a few friends and haven't gotten banned. I assume it's not
There aren't really any "unsafe" methods.
Just saw it, love it
I've always preferred these menus