slight update on how its turning out with health bar and working mini map.
slight update on how its turning out with health bar and working mini map.
most of the shit carries over to mp. Only one issue. You need to be host. i can't seem to get force host as it seems to be a encrypted Int value now with the latest updates. Changing those values calls proccess terminate like IsDebuggerAttached.
no it closes if the value is encrypted. here is the function call to it.
some of the dvars have the function call to getdecryptedvalueCode:__int64 __fastcall Dvar_RegisterEncryptedInt(__int64 a1, int a2, unsigned int value, unsigned int a4, int a5, __int64 a6) { __int64 v6; // rbx int v7; // er11 signed int v8; // eax unsigned int v9; // er10 __m128i v10; // xmm1 int v11; // eax __m128i v13; // [rsp+40h] [rbp-28h] __m128i v14; // [rsp+50h] [rbp-18h] v6 = a1; v14.m128i_i32[0] = a2; v7 = 0; v8 = -2017020801; v9 = -1981700507; do { if ( v9 > 0x89E1A665 ) { switch ( v9 ) { case 0xC6F302F4: v8 = 792669748; goto LABEL_17; case 0xE2E4AE0C: a2 ^= v7; v8 = -2099100287; break; case 0xF6B9AD6A: v7 ^= 0xCA71u; v8 = 1390116181; break; } } else { switch ( v9 ) { case 0x89E1A665: v7 = a2; v8 = 9118588; break; case 0x1C9C36AAu: v7 = (a2 ^ 0x7434); v8 = -1418399068; LABEL_17: a2 = __ROR4__(a2, 16); break; case 0x6006EB8Du: v7 = (a2 ^ 0x9133); v8 = -1493833351; a2 = v7 ^ __ROL4__(a2, 16); break; case 0x896A8519: v7 ^= 0x52D0u; v8 = 1804479253; a2 = __ROL4__(a2, 16); break; } } v9 ^= v8; } while ( v9 != 0xE9CC2CC0 ); v14.m128i_i32[1] = a2; v10 = v14; v13.m128i_i64[0] = __PAIR__(a4, value); _mm_store_si128(&v13, v13); _mm_store_si128(&v14, v10); v11 = sub_140CE9FA0(a1); return sub_140CEB850(v6, v11, 5, a5, v14.m128i_i8, v13.m128i_i8, a6); }
I also am unable to locate Cbuf_addText
Last edited by Silent; 01-13-2018 at 01:17 PM.
I took party_minplayers as an example: It's a "protected" address which means it will close only if the next four bytes doesn't match. Let me give you a proof, you can try yourself.
party_minplayers: 0x14759FC30.
If you modify that and search for a game, it will immediately exit since the next 4 bytes doesn't match.
Now, let's try to modify it without crashes whatsoever, by setting it to 7 for example.
Set it to 14115216740480712711 as 8 bytes, you will notice it won't crash this time.
That's because the next four bytes does indeed match.
You can set any protected address to 14115216740480712711 (8 bytes), it will never crash, yet we modified it to 7.
Last edited by Headspace; 01-08-2018 at 03:14 PM.
epiccode (01-09-2018)
So what's the ban risk with using this? Is there anything I need to do to help prevent one? I haven't been able to find anything regarding this on this forum so sorry if it's already been asked and answered.
You won't be able to find anything because no one's been banned yet. yup. IW developers just don't give a shit anymore, at least Treyarch developers still watch the forums and know how to block programs with keywords like cheat engine or zombie trainer, but nope IW just doesn't give a shit. People submit obvious aimbotters videos on reddit for the developers to look at, but nope they still don't do shit.
I looked into this type of editing for Black Ops 3 and i managed to find the location for the LD count value and i was able to change it to what ever i wanted but within 30 minutes of doing so i was banned. So yes cod points would be changeable because even though cp is server sided,so is LD on BO3 & that was editable through cheat engine. But because it is server sided as soon as you edit the current (untouched) value to a strange new one like 9999999 your account instantly flags for review to devs because strange activity is occurring on your accounts live services. I was also able to freeze the current value without needing to increase it to a silly number to constantly keep buying gumballs while only having 3 and, This gave me unlimited purchases until i chose to unfreeze the value.
This will get you banned 100% But it is possible.
Last edited by Iwesley93I; 01-13-2018 at 12:41 AM.
By changing the LD value, it won't affect the server side, I suppose you always had an error while trying to spend it? I'm talking about the server side, so it's actually not possible to change it. Of course, changing it client side is, it will just not work though.
And yeah, they might have caught you modifying those values.
Correct me if I'm wrong but if you are able to spend it just by modifying your LD value, Treyarch seriously fucked up on this one.
Last edited by Headspace; 01-13-2018 at 03:02 AM.
why my windows defender look at it like a trojan?