rubenps2
Jumlah posting : 124 Points : 326 Reputation : 12 Join date : 11.02.11 Age : 44 Lokasi : padang
| Subyek: Code Source dll PB [PointBlank] Thu Feb 24, 2011 12:24 am | |
| Google translation... Sorry I Brazilian 1. Make a DLL in C Project in devcpp 2. Save all files all 3. Create a file named addys.h 4. Change name: dllmain.c -> cbase2.c dll.h -> cbase2.h 5. Fill with the following code: cbase2.c Code:- Spoiler:
#include "cbase2.h"
#include "addys.h"
LPTSTR i3engine = "PointBlank.i3Exec"; // handle PointBlank.i3Exec
DWORD adrWSOn, adrWSOff, OldProtection; // deklarasi variabel
BYTE RET[] = {0xC3}; //deklarasi byte untuk RET
BYTE PUSH_EBP[]= {0x55}; //deklarasi byte untuk PUSH_EBP
/*
Karena memwrite sudah terdeteksi HACKSHIELD, maka saya berupaya membuatkan
fungsi alternative selain memwrite dan undetected bernama MEMpatch
*/
//Check Apakah address tersebut di protect ?
void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &OldProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
VirtualProtect((void *)Offset, Length, OldProtection, &OldProtection); // protect lagi address tsb biar gk kena satpam
}
// Lakukan patch terhadap memory
void MEMpatch( BYTE *Offset, BYTE *ByteArray, DWORD Length){
UnProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);
}
DWORD WINAPI InitAllHacks(LPVOID param) // thread telah dipatch. undetected 6 desember 2010
{
while (1) { // jika thread telah aktif
if (GetAsyncKeyState(VK_INSERT)&1) { // jika hotkey ditekan.
DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT;
MEMpatch((BYTE*)adrWSOn, RET, sizeof(RET)); // lakukan hack terhadap memory
MessageBeep(1); // Beritahukan jika cheat telah sukses di eksekusi
}
}
if (GetAsyncKeyState(VK_DELETE)&1) { // jika hotkey ditekan.
DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT;
MEMpatch((BYTE*)adrWSOff, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
MessageBeep(1); // Beritahukan jika Hack telah sukses di eksekusi
}
}
Sleep(10); // jeda untuk menghindari overheat / kelebihan beban
}
return (0); // kembalikan nilai ke 0 agar thread menjadi loop selama-nya
}
BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
{
DisableThreadLibraryCalls(hDll); // mencegah boros memori. SAVE Resource <img src="http://s0.wp.com/wp-includes/images/smilies/icon_biggrin.gif?m=1218663747g" alt="" class="wp-smiley">
if (dwReason == DLL_PROCESS_ATTACH) { // jika dll ter-attach MessageBox, MB_OK | MB_ICONINFORMATION); // berikan salam pembuka jika dll telah ter-attach ke PROCESS CreateThread(0, 0, (LPTHREAD_START_ROUTINE)InitAllHacks, 0, 0, 0); // jalanin thread-nya }
return TRUE; // mencoba berulang kali sampai thread ter-attach }
cbase2.h Code:- Spoiler:
# Ifndef __RCD_BASE2_H
# Define __RCD_BASE2_H
# Define WIN32_LEAN_AND_MEAN / / Exclude rarely-Used stuff from Windows headers
# Include
DWORD WINAPI InitAllHacks ( LPVOID param);
# Endif
6. Run RCDLogger 3.0 and c & p addys that have been found to file "addys.h" 7. Click Execute | Rebuild All 8. Make sure there are no errors, try to inject etc which ye made to the PB 9. Making DLL Hack Done! NB: If you are not working etc. please run the RCD Logger 3 and c & p again offsets that have been found, if you've detected, etc. Try changing the code that is in part: - Loop (InitAllHacks) - Memory editing (MEMpatch) - Hook (Loop, GetAsyncKeyState, CreateThread, et al) Hook that has been detected Hackshield usually occurs in the Loop, is: - GetAsyncKeyState to call the function ex: i f (GetAsyncKeyState (VK_F12) & 1) { MajorMissionHack (); Sleep (500); } And also if (:: GetAsyncKeyState (VK_F12) & 1) DoMisiMayorHack (); CREDIT: RCD and CaPeVaLdOfOrMiNiOn sumber- Spoiler:
NB: BAGI YG BISA SEMPURNAKAN YA BY RUBENPS2
| |
|
rubenps2
Jumlah posting : 124 Points : 326 Reputation : 12 Join date : 11.02.11 Age : 44 Lokasi : padang
| Subyek: Re: Code Source dll PB [PointBlank] Thu Feb 24, 2011 12:46 am | |
| CHEAT HS TANBAH AMO AMO - Spoiler:
| |
|
SCâ„¢Hamim
Jumlah posting : 1 Points : 1 Reputation : 0 Join date : 27.03.11
| Subyek: Re: Code Source dll PB [PointBlank] Sun Mar 27, 2011 2:14 am | |
| | |
|
Sponsored content
| Subyek: Re: Code Source dll PB [PointBlank] | |
| |
|