Download SDK 2004 = ( goo_gl/kkRCX3 ) Remove _ to .
//////////////////IronHeart Hacker Team////////////////
////////////////www.facebook.com/BLSZin/////////////////
#include <windows.h>
#include <stdio.h>
#include <d3dx9.h>
#pragma comment(lib, "d3dx9.lib")
#pragma warning(disable: 4700)
DWORD dwI3EXEC, ofsMNZ1, dwBase, CheckProtection;
//==============================Replace============= =============================//
DWORD Replace;
//=================================Call Address ===============================//
BOOL Memek(unsigned long ADRexec, int OFSexec, int PTRexec)
{
if (!IsBadWritePtr((void*)ADRexec, sizeof(unsigned long)))
{
if (!IsBadWritePtr((void*)(*(unsigned long*)ADRexec + OFSexec), sizeof(unsigned long)))
{
*(int*)(*(unsigned long*)ADRexec + OFSexec) = PTRexec;
}
}
return (0);
}
int __fastcall ProtectShield(void)
{
return (0);
}
//==============================System Called==========================================//
void KzK(DWORD B,DWORD A1,DWORD B1, DWORD C1, DWORD ISI)
{ DWORD A=0;
if (IsBadHugeReadPtr((PDWORD)B,4)==0)
{ A=*(PDWORD)((DWORD)(B))+A1;
if (IsBadHugeReadPtr((PDWORD)A,4)==0)
{ A=*(PDWORD)((DWORD)(A))+B1;
if (IsBadHugeReadPtr((PDWORD)A,4)==0)
{ A=*(PDWORD)((DWORD)(A))+C1;
if (IsBadHugeReadPtr((PDWORD)A,4)==0)
{*(PDWORD)A=ISI;
}}}}}
//==============================System Protect==========================================//
void IronHeart(void *adr, void *ptr, int size)
{
DWORD CheckProtection;
VirtualProtect(adr,size,PAGE_EXECUTE_READWRITE, &ofsMNZ1);
RtlMoveMemory(adr,ptr,size);
VirtualProtect(adr,size,CheckProtection, &dwBase);
}
int SS = 0;
int BB = 0;
int __fastcall HookUndetect(void)
{
return 0;
}
DWORD WINAPI IronHeart(LPVOID param)
{
while (1)
{
HookUndetect();
//==============================GlitchSpeed========= =================================//
if(GetAsyncKeyState(VK_F9)&1){//on
dwI3EXEC = (DWORD)GetModuleHandleA("MAT.Exe");
DWORD GM = dwI3EXEC + 0x19A15E;
IronHeart((void *)(GM),(int*)(PBYTE)"\xF6\xC4\x11\x7B",4);
HookUndetect();
}
if(GetAsyncKeyState(VK_F10)&1){//off
dwI3EXEC = (DWORD)GetModuleHandleA("MAT.Exe");
DWORD GM = dwI3EXEC + 0x19A15E;
IronHeart((void *)(GM),(int*)(PBYTE)"\xF6\xC4\x41\x7B",4);
HookUndetect();
}
Sleep(5);
}
return(0);
}
//================================================== ===========================
DWORD * FindDevice(VOID)
{
DWORD Base = (DWORD)LoadLibraryW(L"d3d9.dll");
for(DWORD i = 0; i < 0x128000; i++ )
{
if ( (*(BYTE *)(Base+i+0x00))==0xC7
&& (*(BYTE *)(Base+i+0x01))==0x06
&& (*(BYTE *)(Base+i+0x06))==0x89
&& (*(BYTE *)(Base+i+0x07))==0x86
&& (*(BYTE *)(Base+i+0x0C))==0x89
&& (*(BYTE *)(Base+i+0x0D))==0x86 )
return (DWORD *)(Base + i + 2);
}
return NULL;
}
bool __stdcall DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
DisableThreadLibraryCalls(hDll);
if(dwReason == DLL_PROCESS_ATTACH) {
MessageBox(0,"Dll Injection Hack Tutorial | Create : IronHeart Hacking Team","INFORMATION",MB_OK | MB_ICONINFORMATION);
system("start https://www.facebook.com/IronHeartDLNH");
CreateThread(0, 0, (LPTHREAD_START_ROUTINE)IronHeart, 0, 0, 0);
}
return true;
}