Вопрос Есть ли рабочий AHK wh?

Начинающий
Статус
Оффлайн
Регистрация
24 Апр 2019
Сообщения
135
Реакции[?]
24
Поинты[?]
0
Хочу узнать есть ли рабочий фри ахк вх скрипт который будет работать за обе команды на любой карте или одной из карт? Если есть тогда можно его исходник :roflanBuldiga: ? Или просто оффсеты моделек
 
Последнее редактирование:
ПОПУГАЙ4ЕГ))8)8
Забаненный
Статус
Оффлайн
Регистрация
25 Июл 2019
Сообщения
720
Реакции[?]
71
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
Есть ли рабочий WH в png???
Если есть то дайте исходники)))
 
Пользователь
Статус
Оффлайн
Регистрация
21 Сен 2019
Сообщения
421
Реакции[?]
115
Поинты[?]
0
вот вы смеётесь а я щас сделал луашку для видео и тапаю бичей со скиьом
 
ПОПУГАЙ4ЕГ))8)8
Забаненный
Статус
Оффлайн
Регистрация
25 Июл 2019
Сообщения
720
Реакции[?]
71
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
ПОПУГАЙ4ЕГ))8)8
Забаненный
Статус
Оффлайн
Регистрация
25 Июл 2019
Сообщения
720
Реакции[?]
71
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
Хочу узнать есть ли рабочий фри ахк вх скрипт который будет работать за обе команды на любой карте или одной из карт? Если есть тогда можно его исходник :roflanBuldiga: ? Или просто оффсеты моделек
Это рил а ahk ???
 
Начинающий
Статус
Оффлайн
Регистрация
24 Апр 2019
Сообщения
135
Реакции[?]
24
Поинты[?]
0
Код:
; <COMPILER: v1.0.48.5>
F6::

Process = csgo.exe
DllName = client.dll
msgbox, [Undetected, Stable] Updating...

Process, Exist, %Process%
PID = %ErrorLevel%
SetFormat, Integer, Hex
Base := GetDllBase(DllName, PID)

start:=0x00000000
loop {
start:=start+0x1000
check:=ReadMemory(start+0x4,"Counter-Strike: Global Offensive")
check2:=ReadMemory(check,"Counter-Strike: Global Offensive")

if (check2==0x6574616D)


{

break
}
if (start>0xDDDDDDDD)
{
msgbox, Something went wrong O.o
}

}
offset:=start+0x550
end:=start+0x2000

loop
{
offset:=offset+0x4
check:=ReadMemory(offset,"Counter-Strike: Global Offensive")
checka:=check+0x1c
check2:=ReadMemory(check+0x1c,"Counter-Strike: Global Offensive")
if (check2==0x72617065)
{
break
}
if (offset>end)
{
msgbox, something went wrong OMG
}
}

msgbox, Cheat successfully injected... Press F6 In main menu...

offsets3:=offset

t1:=ReadMemory(offsets3,"Counter-Strike: Global Offensive")
t2:=ReadMemory(offsets3+0x8,"Counter-Strike: Global Offensive")
t3:=ReadMemory(offsets3+0x10,"Counter-Strike: Global Offensive")
t4:=ReadMemory(offsets3+0x18,"Counter-Strike: Global Offensive")
t5:=ReadMemory(offsets3+0x20,"Counter-Strike: Global Offensive")
t6:=ReadMemory(offsets3+0x28,"Counter-Strike: Global Offensive")
t7:=ReadMemory(offsets3+0x30,"Counter-Strike: Global Offensive")

offsetsct:=offsets3+0x30+0xC0

ct1:=ReadMemory(offsetsct,"Counter-Strike: Global Offensive")
ct2:=ReadMemory(offsetsct+0x8,"Counter-Strike: Global Offensive")
ct3:=ReadMemory(offsetsct+0x10,"Counter-Strike: Global Offensive")
ct4:=ReadMemory(offsetsct+0x18,"Counter-Strike: Global Offensive")
ct5:=ReadMemory(offsetsct+0x20,"Counter-Strike: Global Offensive")
ct6:=ReadMemory(offsetsct+0x28,"Counter-Strike: Global Offensive")
ct7:=ReadMemory(offsetsct+0x638,"Counter-Strike: Global Offensive")


t11:=t1+0x96D
t111:=ReadMemoryString(t11,"Counter-Strike: Global Offensive")
rewritetex(t111,t11)
t22:=t2+0xC0F
t222:=ReadMemoryString(t22,"Counter-Strike: Global Offensive")
rewritetex(t222,t22)
t33:=t3+0x45D
t333:=ReadMemoryString(t33,"Counter-Strike: Global Offensive")
rewritetex(t333,t33)
t44:=t4+0x7e1
t444:=ReadMemoryString(t44,"Counter-Strike: Global Offensive")
rewritetex(t444,t44)
t55:=t5+0xACC
t555:=ReadMemoryString(t55,"Counter-Strike: Global Offensive")
rewritetex(t555,t55)
t66:=t6+0xFD
t666:=ReadMemoryString(t66,"Counter-Strike: Global Offensive")
rewritetex(t666,t66)
t77:=t7+0x838
t777:=ReadMemoryString(t77,"Counter-Strike: Global Offensive")
rewritetex(t777,t77)



ct11:=ct1+0x27D
ct111:=ReadMemoryString(ct11,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct22:=ct2+0x219d
t222:=ReadMemoryString(ct22,"Counter-Strike: Global Offensive")
rewritetex2(ct222,ct22)
ct33:=ct3+0x378
ct333:=ReadMemoryString(ct33,"Counter-Strike: Global Offensive")
rewritetex2(ct333,ct33)
ct44:=ct4+0x7e1
ct444:=ReadMemoryString(ct44,"Counter-Strike: Global Offensive")
rewritetex2(ct444,ct44)
ct55:=ct5+0xA70
ct555:=ReadMemoryString(ct55,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct66:=ct6+0x111
ct666:=ReadMemoryString(ct66,"Counter-Strike: Global Offensive")
rewritetex2(ct666,ct66)
ct77:=ct7+0xEB7
ct777:=ReadMemoryString(ct77,"Counter-Strike: Global Offensive")
rewritetex2(ct777,ct77)








ExitApp


rewritetex(Haystack,offsettex)
{

Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
{ WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
WriteMemory(0x3020395B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
WriteMemory(0x225D3020,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
}

rewritetex2(Haystack,offsettex)
{

Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
{ WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
WriteMemory(0x3020305B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
WriteMemory(0x225D3920,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
}





ReadMemory(MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%
VarSetCapacity(MVALUE,4,0)
ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "UInt")
DllCall("ReadProcessMemory","UInt",ProcessHandle,"UInt",MADDRESS,"Str",MVALUE,"UInt",4,"UInt *",0)
Loop 4
result += *(&MVALUE + A_Index-1) << 8*(A_Index-1)
return, result
}






WriteMemory(WVALUE,MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%



ProcessHandle := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", PID, "UInt")
DllCall("WriteProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "Uint*", WVALUE,"Uint", 4, "Uint *", 0)

DllCall("CloseHandle", "int", ProcessHandle)
return
}



GetDllBase(DllName, PID = 0)
{
TH32CS_SNAPMODULE := 0x00000008
INVALID_HANDLE_VALUE = -1
VarSetCapacity(me32, 548, 0)
NumPut(548, me32)
snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
, "Uint", PID)
If (snapMod = INVALID_HANDLE_VALUE) {
Return 0
}
If (DllCall("Module32First", "Uint", snapMod, "Uint", &me32)){
while(DllCall("Module32Next", "Uint", snapMod, "UInt", &me32)) {
If !DllCall("lstrcmpi", "Str", DllName, "UInt", &me32 + 32) {
DllCall("CloseHandle", "UInt", snapMod)
Return NumGet(&me32 + 20)
}
}
}
DllCall("CloseHandle", "Uint", snapMod)
Return 0
}


ReadMemoryString(MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%

ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "Uint")
teststr =
Loop 32
{
Output := "x"
tempVar := DllCall("ReadProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "str", Output, "Uint", 1, "Uint *", 0)
if (ErrorLevel or !tempVar)
{
DllCall("CloseHandle", "int", ProcessHandle)
return teststr
}



teststr = %teststr%%Output%
MADDRESS++
}
DllCall("CloseHandle", "int", ProcessHandle)
return, teststr

}
старый код на ахк
 
ПОПУГАЙ4ЕГ))8)8
Забаненный
Статус
Оффлайн
Регистрация
25 Июл 2019
Сообщения
720
Реакции[?]
71
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
Код:
; <COMPILER: v1.0.48.5>
F6::

Process = csgo.exe
DllName = client.dll
msgbox, [Undetected, Stable] Updating...

Process, Exist, %Process%
PID = %ErrorLevel%
SetFormat, Integer, Hex
Base := GetDllBase(DllName, PID)

start:=0x00000000
loop {
start:=start+0x1000
check:=ReadMemory(start+0x4,"Counter-Strike: Global Offensive")
check2:=ReadMemory(check,"Counter-Strike: Global Offensive")

if (check2==0x6574616D)


{

break
}
if (start>0xDDDDDDDD)
{
msgbox, Something went wrong O.o
}

}
offset:=start+0x550
end:=start+0x2000

loop
{
offset:=offset+0x4
check:=ReadMemory(offset,"Counter-Strike: Global Offensive")
checka:=check+0x1c
check2:=ReadMemory(check+0x1c,"Counter-Strike: Global Offensive")
if (check2==0x72617065)
{
break
}
if (offset>end)
{
msgbox, something went wrong OMG
}
}

msgbox, Cheat successfully injected... Press F6 In main menu...

offsets3:=offset

t1:=ReadMemory(offsets3,"Counter-Strike: Global Offensive")
t2:=ReadMemory(offsets3+0x8,"Counter-Strike: Global Offensive")
t3:=ReadMemory(offsets3+0x10,"Counter-Strike: Global Offensive")
t4:=ReadMemory(offsets3+0x18,"Counter-Strike: Global Offensive")
t5:=ReadMemory(offsets3+0x20,"Counter-Strike: Global Offensive")
t6:=ReadMemory(offsets3+0x28,"Counter-Strike: Global Offensive")
t7:=ReadMemory(offsets3+0x30,"Counter-Strike: Global Offensive")

offsetsct:=offsets3+0x30+0xC0

ct1:=ReadMemory(offsetsct,"Counter-Strike: Global Offensive")
ct2:=ReadMemory(offsetsct+0x8,"Counter-Strike: Global Offensive")
ct3:=ReadMemory(offsetsct+0x10,"Counter-Strike: Global Offensive")
ct4:=ReadMemory(offsetsct+0x18,"Counter-Strike: Global Offensive")
ct5:=ReadMemory(offsetsct+0x20,"Counter-Strike: Global Offensive")
ct6:=ReadMemory(offsetsct+0x28,"Counter-Strike: Global Offensive")
ct7:=ReadMemory(offsetsct+0x638,"Counter-Strike: Global Offensive")


t11:=t1+0x96D
t111:=ReadMemoryString(t11,"Counter-Strike: Global Offensive")
rewritetex(t111,t11)
t22:=t2+0xC0F
t222:=ReadMemoryString(t22,"Counter-Strike: Global Offensive")
rewritetex(t222,t22)
t33:=t3+0x45D
t333:=ReadMemoryString(t33,"Counter-Strike: Global Offensive")
rewritetex(t333,t33)
t44:=t4+0x7e1
t444:=ReadMemoryString(t44,"Counter-Strike: Global Offensive")
rewritetex(t444,t44)
t55:=t5+0xACC
t555:=ReadMemoryString(t55,"Counter-Strike: Global Offensive")
rewritetex(t555,t55)
t66:=t6+0xFD
t666:=ReadMemoryString(t66,"Counter-Strike: Global Offensive")
rewritetex(t666,t66)
t77:=t7+0x838
t777:=ReadMemoryString(t77,"Counter-Strike: Global Offensive")
rewritetex(t777,t77)



ct11:=ct1+0x27D
ct111:=ReadMemoryString(ct11,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct22:=ct2+0x219d
t222:=ReadMemoryString(ct22,"Counter-Strike: Global Offensive")
rewritetex2(ct222,ct22)
ct33:=ct3+0x378
ct333:=ReadMemoryString(ct33,"Counter-Strike: Global Offensive")
rewritetex2(ct333,ct33)
ct44:=ct4+0x7e1
ct444:=ReadMemoryString(ct44,"Counter-Strike: Global Offensive")
rewritetex2(ct444,ct44)
ct55:=ct5+0xA70
ct555:=ReadMemoryString(ct55,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct66:=ct6+0x111
ct666:=ReadMemoryString(ct66,"Counter-Strike: Global Offensive")
rewritetex2(ct666,ct66)
ct77:=ct7+0xEB7
ct777:=ReadMemoryString(ct77,"Counter-Strike: Global Offensive")
rewritetex2(ct777,ct77)








ExitApp


rewritetex(Haystack,offsettex)
{

Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
{ WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
WriteMemory(0x3020395B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
WriteMemory(0x225D3020,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
}

rewritetex2(Haystack,offsettex)
{

Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
{ WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
WriteMemory(0x3020305B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
WriteMemory(0x225D3920,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
}





ReadMemory(MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%
VarSetCapacity(MVALUE,4,0)
ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "UInt")
DllCall("ReadProcessMemory","UInt",ProcessHandle,"UInt",MADDRESS,"Str",MVALUE,"UInt",4,"UInt *",0)
Loop 4
result += *(&MVALUE + A_Index-1) << 8*(A_Index-1)
return, result
}






WriteMemory(WVALUE,MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%



ProcessHandle := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", PID, "UInt")
DllCall("WriteProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "Uint*", WVALUE,"Uint", 4, "Uint *", 0)

DllCall("CloseHandle", "int", ProcessHandle)
return
}



GetDllBase(DllName, PID = 0)
{
TH32CS_SNAPMODULE := 0x00000008
INVALID_HANDLE_VALUE = -1
VarSetCapacity(me32, 548, 0)
NumPut(548, me32)
snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
, "Uint", PID)
If (snapMod = INVALID_HANDLE_VALUE) {
Return 0
}
If (DllCall("Module32First", "Uint", snapMod, "Uint", &me32)){
while(DllCall("Module32Next", "Uint", snapMod, "UInt", &me32)) {
If !DllCall("lstrcmpi", "Str", DllName, "UInt", &me32 + 32) {
DllCall("CloseHandle", "UInt", snapMod)
Return NumGet(&me32 + 20)
}
}
}
DllCall("CloseHandle", "Uint", snapMod)
Return 0
}


ReadMemoryString(MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%

ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "Uint")
teststr =
Loop 32
{
Output := "x"
tempVar := DllCall("ReadProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "str", Output, "Uint", 1, "Uint *", 0)
if (ErrorLevel or !tempVar)
{
DllCall("CloseHandle", "int", ProcessHandle)
return teststr
}



teststr = %teststr%%Output%
MADDRESS++
}
DllCall("CloseHandle", "int", ProcessHandle)
return, teststr

}
старый код на ахк
Я тоже это вижу???
 
ПОПУГАЙ4ЕГ))8)8
Забаненный
Статус
Оффлайн
Регистрация
25 Июл 2019
Сообщения
720
Реакции[?]
71
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
А сейчас работает???
 
ПОПУГАЙ4ЕГ))8)8
Забаненный
Статус
Оффлайн
Регистрация
25 Июл 2019
Сообщения
720
Реакции[?]
71
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
работает, но не на всех картах и не за все стороны, я для этого оффсеты моделек ищу
Я ахуел только что! Я зашёл со скриптом, и всё работает даже на картах сообщества
 
Сверху Снизу