Исходник AHK wallhack

Забаненный
Статус
Оффлайн
Регистрация
2 Фев 2017
Сообщения
55
Реакции[?]
1
Поинты[?]
0
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
Да паста, а шо?)0
  1. ; <COMPILER: v1.0.48.5>
  2. F6::
  3. Process = csgo.exe
  4. DllName = client.dll
  5. msgbox, [Undetected, Stable] Updating...
  6. Process, Exist, %Process%
  7. PID = %ErrorLevel%
  8. SetFormat, Integer, Hex
  9. Base := GetDllBase(DllName, PID)
  10. start:=0x00000000
  11. loop {
  12. start:=start+0x1000
  13. check:=ReadMemory(start+0x4,"Counter-Strike: Global Offensive")
  14. check2:=ReadMemory(check,"Counter-Strike: Global Offensive")
  15. if (check2==0x6574616D)
  16. {
  17. break
  18. }
  19. if (start>0xDDDDDDDD)
  20. {
  21. msgbox, Something went wrong O.o
  22. }
  23. }
  24. offset:=start+0x550
  25. end:=start+0x2000
  26. loop
  27. {
  28. offset:=offset+0x4
  29. check:=ReadMemory(offset,"Counter-Strike: Global Offensive")
  30. checka:=check+0x1c
  31. check2:=ReadMemory(check+0x1c,"Counter-Strike: Global Offensive")
  32. if (check2==0x72617065)
  33. {
  34. break
  35. }
  36. if (offset>end)
  37. {
  38. msgbox, something went wrong OMG
  39. }
  40. }
  41. msgbox, Cheat successfully injected... Press F6 In main menu...
  42. offsets3:=offset
  43. t1:=ReadMemory(offsets3,"Counter-Strike: Global Offensive")
  44. t2:=ReadMemory(offsets3+0x8,"Counter-Strike: Global Offensive")
  45. t3:=ReadMemory(offsets3+0x10,"Counter-Strike: Global Offensive")
  46. t4:=ReadMemory(offsets3+0x18,"Counter-Strike: Global Offensive")
  47. t5:=ReadMemory(offsets3+0x20,"Counter-Strike: Global Offensive")
  48. t6:=ReadMemory(offsets3+0x28,"Counter-Strike: Global Offensive")
  49. t7:=ReadMemory(offsets3+0x30,"Counter-Strike: Global Offensive")
  50. offsetsct:=offsets3+0x30+0xC0
  51. ct1:=ReadMemory(offsetsct,"Counter-Strike: Global Offensive")
  52. ct2:=ReadMemory(offsetsct+0x8,"Counter-Strike: Global Offensive")
  53. ct3:=ReadMemory(offsetsct+0x10,"Counter-Strike: Global Offensive")
  54. ct4:=ReadMemory(offsetsct+0x18,"Counter-Strike: Global Offensive")
  55. ct5:=ReadMemory(offsetsct+0x20,"Counter-Strike: Global Offensive")
  56. ct6:=ReadMemory(offsetsct+0x28,"Counter-Strike: Global Offensive")
  57. ct7:=ReadMemory(offsetsct+0x638,"Counter-Strike: Global Offensive")
  58. t11:=t1+0x96D
  59. t111:=ReadMemoryString(t11,"Counter-Strike: Global Offensive")
  60. rewritetex(t111,t11)
  61. t22:=t2+0xC0F
  62. t222:=ReadMemoryString(t22,"Counter-Strike: Global Offensive")
  63. rewritetex(t222,t22)
  64. t33:=t3+0x45D
  65. t333:=ReadMemoryString(t33,"Counter-Strike: Global Offensive")
  66. rewritetex(t333,t33)
  67. t44:=t4+0x7e1
  68. t444:=ReadMemoryString(t44,"Counter-Strike: Global Offensive")
  69. rewritetex(t444,t44)
  70. t55:=t5+0xACC
  71. t555:=ReadMemoryString(t55,"Counter-Strike: Global Offensive")
  72. rewritetex(t555,t55)
  73. t66:=t6+0xFD
  74. t666:=ReadMemoryString(t66,"Counter-Strike: Global Offensive")
  75. rewritetex(t666,t66)
  76. t77:=t7+0x838
  77. t777:=ReadMemoryString(t77,"Counter-Strike: Global Offensive")
  78. rewritetex(t777,t77)
  79. ct11:=ct1+0x27D
  80. ct111:=ReadMemoryString(ct11,"Counter-Strike: Global Offensive")
  81. rewritetex2(ct111,ct11)
  82. ct22:=ct2+0x219d
  83. t222:=ReadMemoryString(ct22,"Counter-Strike: Global Offensive")
  84. rewritetex2(ct222,ct22)
  85. ct33:=ct3+0x378
  86. ct333:=ReadMemoryString(ct33,"Counter-Strike: Global Offensive")
  87. rewritetex2(ct333,ct33)
  88. ct44:=ct4+0x7e1
  89. ct444:=ReadMemoryString(ct44,"Counter-Strike: Global Offensive")
  90. rewritetex2(ct444,ct44)
  91. ct55:=ct5+0xA70
  92. ct555:=ReadMemoryString(ct55,"Counter-Strike: Global Offensive")
  93. rewritetex2(ct111,ct11)
  94. ct66:=ct6+0x111
  95. ct666:=ReadMemoryString(ct66,"Counter-Strike: Global Offensive")
  96. rewritetex2(ct666,ct66)
  97. ct77:=ct7+0xEB7
  98. ct777:=ReadMemoryString(ct77,"Counter-Strike: Global Offensive")
  99. rewritetex2(ct777,ct77)
  100. ExitApp
  101. rewritetex(Haystack,offsettex)
  102. {
  103. Needle = "$rimlight"
  104. StringGetPos, pos, Haystack, %Needle%
  105. if (pos >= 0)
  106. { WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
  107. WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
  108. WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
  109. WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
  110. WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
  111. WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
  112. WriteMemory(0x3020395B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
  113. WriteMemory(0x225D3020,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
  114. WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
  115. WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
  116. WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
  117. }
  118. }
  119. rewritetex2(Haystack,offsettex)
  120. {
  121. Needle = "$rimlight"
  122. StringGetPos, pos, Haystack, %Needle%
  123. if (pos >= 0)
  124. { WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
  125. WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
  126. WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
  127. WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
  128. WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
  129. WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
  130. WriteMemory(0x3020305B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
  131. WriteMemory(0x225D3920,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
  132. WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
  133. WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
  134. WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
  135. }
  136. }
  137. ReadMemory(MADDRESS,PROGRAM)
  138. {
  139. winget, pid, PID, %PROGRAM%
  140. VarSetCapacity(MVALUE,4,0)
  141. ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "UInt")
  142. DllCall("ReadProcessMemory","UInt",ProcessHandle,"UInt",MADDRESS,"Str",MVALUE,"UInt",4,"UInt *",0)
  143. Loop 4
  144. result += *(&MVALUE + A_Index-1) << 8*(A_Index-1)
  145. return, result
  146. }
  147. WriteMemory(WVALUE,MADDRESS,PROGRAM)
  148. {
  149. winget, pid, PID, %PROGRAM%
  150. ProcessHandle := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", PID, "UInt")
  151. DllCall("WriteProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "Uint*", WVALUE,"Uint", 4, "Uint *", 0)
  152. DllCall("CloseHandle", "int", ProcessHandle)
  153. return
  154. }
  155. GetDllBase(DllName, PID = 0)
  156. {
  157. TH32CS_SNAPMODULE := 0x00000008
  158. INVALID_HANDLE_VALUE = -1
  159. VarSetCapacity(me32, 548, 0)
  160. NumPut(548, me32)
  161. snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
  162. , "Uint", PID)
  163. If (snapMod = INVALID_HANDLE_VALUE) {
  164. Return 0
  165. }
  166. If (DllCall("Module32First", "Uint", snapMod, "Uint", &me32)){
  167. while(DllCall("Module32Next", "Uint", snapMod, "UInt", &me32)) {
  168. If !DllCall("lstrcmpi", "Str", DllName, "UInt", &me32 + 32) {
  169. DllCall("CloseHandle", "UInt", snapMod)
  170. Return NumGet(&me32 + 20)
  171. }
  172. }
  173. }
  174. DllCall("CloseHandle", "Uint", snapMod)
  175. Return 0
  176. }
  177. ReadMemoryString(MADDRESS,PROGRAM)
  178. {
  179. winget, pid, PID, %PROGRAM%
  180. ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "Uint")
  181. teststr =
  182. Loop 32
  183. {
  184. Output := "x"
  185. tempVar := DllCall("ReadProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "str", Output, "Uint", 1, "Uint *", 0)
  186. if (ErrorLevel or !tempVar)
  187. {
  188. DllCall("CloseHandle", "int", ProcessHandle)
  189. return teststr
  190. }
  191. teststr = %teststr%%Output%
  192. MADDRESS++
  193. }
  194. DllCall("CloseHandle", "int", ProcessHandle)
  195. return, teststr
  196. }
 
Начинающий
Статус
Оффлайн
Регистрация
2 Авг 2017
Сообщения
28
Реакции[?]
10
Поинты[?]
0
Фулл андетект при том,что он делает запись в память. Я не знаю как )))
 
Сверху Снизу