0
- Главная/
- Игры/
- Dark Sector/
- Читы
All hack:
This scripts like flexible code-injected. What allows a full introduction to the
process
game "Dark Sector" a modified executable file (patchs game, etc..)
"Active Cheat-codes"
Code:
[ENABLE]
aobscan(_faddress1,83xxxxxxxxxxxx0fxxxxxxxxxx8dxxxxxxxx8dxxxxxxe8xxxxxxxx80)
alloc(_newmem1,2048)
label(_returnhere1)
label(_Aoriginalcode)
label(_pId)
label(_cheatHealth)
registersymbol(_pId)
registersymbol(_cheatHealth)
aobscan(_faddress2,8bxxxxxxxxxx8bxx8bxx8bxxxxxxxxxx8dxxxxxxxxc7xxxxxxxxxxxxxxffxxd9)
label(_newmem2)
label(_returnhere2)
label(_originalcode2)
label(_pres)
registersymbol(_pres)
label(_cheatmoney)
registersymbol(_cheatmoney)
_newmem1:
mov [_pId],edx
_cheatHealth:
jmp short _Aoriginalcode
mov [edx+468],#100000
mov [edx+464],#100000
_Aoriginalcode:
cmp dword ptr [edx+00000468],00
jmp _returnhere1
_newmem2:
mov [_pres],eax
_cheatmoney:
jmp short _originalcode2
mov eax,[eax]
mov [eax+1d4],#1000000
_originalcode2:
mov eax,[ebx+9c]
jmp _returnhere2
_pres:
dd 0
_pId:
dd 0
_faddress1: // 00969FE2 = DS.exe+569FE2
jmp _newmem1
nop
nop
_returnhere1:
_faddress2: // 00969D8E = DS.exe+569D8E
jmp _newmem2
nop
_returnhere2:
[DISABLE]
{ aobscan(_faddress1,90900fxxxxxxxxxx8dxxxxxxxx8dxxxxxxe8xxxxxxxx80)
_faddress1-5:
cmp dword ptr [edx+00000468],00
unregistersymbol(_pId)
unregistersymbol(_cheatHealth)
dealloc(_newmem)
aobscan(_faddress2,908bxx8bxx8bxxxxxxxxxx8dxxxxxxxxc7xxxxxxxxxxxxxxffxxd9)
_faddress2-5:
mov eax,[ebx+0000009c]
unregistersymbol(_pres)
unregistersymbol(_cheatmoney) }
Health:
Code:
[ENABLE]
_cheatHealth:
db 90 90
[DISABLE]
_cheatHealth:
db eb 14
No Reload:
Code:
[ENABLE]
aobscan(_faddress,8bxx8bxxxxxxxxxx8dxxxxxxxx8bxxbbxxxxxxxxffxx8bxx8bxxe8xxxxxxxx84xx75xx83)
alloc(_newmem,2048)
label(_returnhere)
label(_originalcode)
_newmem:
mov eax,[eax]
mov byte [eax+3e8],#30
_originalcode:
mov eax,[esi]
mov edx,[eax+00000104]
jmp _returnhere
_faddress: // 0094D900 = DS.exe+54D900
jmp _newmem
nop
nop
nop
_returnhere:
[DISABLE]
aobscan(_faddress,9090908dxxxxxxxx8bxxbbxxxxxxxxffxx8bxx8bxxe8xxxxxxxx84xx75xx83)
_faddress-5:
mov eax,[esi]
mov edx,[eax+00000104]
dealloc(_newmem)
//Alt: db 8B 06 8B 90 04 01 00 00
Inf. Ammo
Code:
[ENABLE]
aobscan(_faddress,8bxxxxxxxxxxxx74xxxxxx8dxxxxxxxxxxbfxxxxxxxx8bxx85xx74xx83xxxx74)
alloc(_newmem,2048)
label(_returnhere)
label(_originalcode)
_newmem:
pushf
push eax
mov eax,[_pres]
or eax,eax
jz short _originalcode
cmp ecx,[eax]
jne short _originalcode
mov [ecx+ebp*8+00000394],#99999
_originalcode:
pop eax
popf
mov ebx,[ecx+ebp*8+394]
jmp _returnhere
_faddress: // 0094AE8C = DS.exe+54AE8C
jmp _newmem
nop
nop
_returnhere:
[DISABLE]
aobscan(_faddress,909074xxxxxx8dxxxxxxxxxxbfxxxxxxxx8bxx85xx74xx83xxxx74)
_faddress-5:
mov ebx,[ecx+ebp*8+00000394]
dealloc(_newmem)
//Alt: db 8B 9C E9 94 03 00 00
Inf. Money:
Code:
[ENABLE]
_cheatmoney:
db 90 90
[DISABLE]
_cheatmoney:
db eb 0c
This scripts like flexible code-injected. What allows a full introduction to the
process
game "Dark Sector" a modified executable file (patchs game, etc..)
"Active Cheat-codes"
Code:
[ENABLE]
aobscan(_faddress1,83xxxxxxxxxxxx0fxxxxxxxxxx8dxxxxxxxx8dxxxxxxe8xxxxxxxx80)
alloc(_newmem1,2048)
label(_returnhere1)
label(_Aoriginalcode)
label(_pId)
label(_cheatHealth)
registersymbol(_pId)
registersymbol(_cheatHealth)
aobscan(_faddress2,8bxxxxxxxxxx8bxx8bxx8bxxxxxxxxxx8dxxxxxxxxc7xxxxxxxxxxxxxxffxxd9)
label(_newmem2)
label(_returnhere2)
label(_originalcode2)
label(_pres)
registersymbol(_pres)
label(_cheatmoney)
registersymbol(_cheatmoney)
_newmem1:
mov [_pId],edx
_cheatHealth:
jmp short _Aoriginalcode
mov [edx+468],#100000
mov [edx+464],#100000
_Aoriginalcode:
cmp dword ptr [edx+00000468],00
jmp _returnhere1
_newmem2:
mov [_pres],eax
_cheatmoney:
jmp short _originalcode2
mov eax,[eax]
mov [eax+1d4],#1000000
_originalcode2:
mov eax,[ebx+9c]
jmp _returnhere2
_pres:
dd 0
_pId:
dd 0
_faddress1: // 00969FE2 = DS.exe+569FE2
jmp _newmem1
nop
nop
_returnhere1:
_faddress2: // 00969D8E = DS.exe+569D8E
jmp _newmem2
nop
_returnhere2:
[DISABLE]
{ aobscan(_faddress1,90900fxxxxxxxxxx8dxxxxxxxx8dxxxxxxe8xxxxxxxx80)
_faddress1-5:
cmp dword ptr [edx+00000468],00
unregistersymbol(_pId)
unregistersymbol(_cheatHealth)
dealloc(_newmem)
aobscan(_faddress2,908bxx8bxx8bxxxxxxxxxx8dxxxxxxxxc7xxxxxxxxxxxxxxffxxd9)
_faddress2-5:
mov eax,[ebx+0000009c]
unregistersymbol(_pres)
unregistersymbol(_cheatmoney) }
Health:
Code:
[ENABLE]
_cheatHealth:
db 90 90
[DISABLE]
_cheatHealth:
db eb 14
No Reload:
Code:
[ENABLE]
aobscan(_faddress,8bxx8bxxxxxxxxxx8dxxxxxxxx8bxxbbxxxxxxxxffxx8bxx8bxxe8xxxxxxxx84xx75xx83)
alloc(_newmem,2048)
label(_returnhere)
label(_originalcode)
_newmem:
mov eax,[eax]
mov byte [eax+3e8],#30
_originalcode:
mov eax,[esi]
mov edx,[eax+00000104]
jmp _returnhere
_faddress: // 0094D900 = DS.exe+54D900
jmp _newmem
nop
nop
nop
_returnhere:
[DISABLE]
aobscan(_faddress,9090908dxxxxxxxx8bxxbbxxxxxxxxffxx8bxx8bxxe8xxxxxxxx84xx75xx83)
_faddress-5:
mov eax,[esi]
mov edx,[eax+00000104]
dealloc(_newmem)
//Alt: db 8B 06 8B 90 04 01 00 00
Inf. Ammo
Code:
[ENABLE]
aobscan(_faddress,8bxxxxxxxxxxxx74xxxxxx8dxxxxxxxxxxbfxxxxxxxx8bxx85xx74xx83xxxx74)
alloc(_newmem,2048)
label(_returnhere)
label(_originalcode)
_newmem:
pushf
push eax
mov eax,[_pres]
or eax,eax
jz short _originalcode
cmp ecx,[eax]
jne short _originalcode
mov [ecx+ebp*8+00000394],#99999
_originalcode:
pop eax
popf
mov ebx,[ecx+ebp*8+394]
jmp _returnhere
_faddress: // 0094AE8C = DS.exe+54AE8C
jmp _newmem
nop
nop
_returnhere:
[DISABLE]
aobscan(_faddress,909074xxxxxx8dxxxxxxxxxxbfxxxxxxxx8bxx85xx74xx83xxxx74)
_faddress-5:
mov ebx,[ecx+ebp*8+00000394]
dealloc(_newmem)
//Alt: db 8B 9C E9 94 03 00 00
Inf. Money:
Code:
[ENABLE]
_cheatmoney:
db 90 90
[DISABLE]
_cheatmoney:
db eb 0c