Affichage des articles dont le libellé est Information. Afficher tous les articles
Affichage des articles dont le libellé est Information. Afficher tous les articles

lundi 10 mars 2014

[Information] Engine wallhack topic




Since nobody released this yet and im starting to hate the game, take this candy

CG_AddCEntity

Code:


.text:0000000140261C80                mov    [rsp+arg_0], rbx
.text:0000000140261C85                push    rdi
.text:0000000140261C86                sub    rsp, 20h
.text:0000000140261C8A                cmp    dword ptr [rdx+17Ch], 0
.text:0000000140261C91                mov    rbx, rdx
.text:0000000140261C94                mov    edi, ecx
.text:0000000140261C96                jz      short loc_140261C9D
.text:0000000140261C98                call    sub_14025E250
.text:0000000140261C9D
.text:0000000140261C9D loc_140261C9D:                          ; CODE XREF: sub_14025E5B0+36E6j
.text:0000000140261C9D                movsxd  rax, dword ptr [rbx+0FCh] //type check
.text:0000000140261CA4                cmp    eax, 13h        ; switch 20 cases
.text:0000000140261CA7                ja      loc_140261D9F  ; jumptable 0000000140261CBE default case
.text:0000000140261CAD                lea    rdx, cs:140000000h
.text:0000000140261CB4                mov    ecx, ds:(off_140261DAC - 140000000h)[rdx+rax*4]
.text:0000000140261CBB                add    rcx, rdx
.text:0000000140261CBE                jmp    rcx            ; switch jump
.text:0000000140261CC0
.text:0000000140261CC0 loc_140261CC0:                          ; DATA XREF: .text:off_140261DACo
.text:0000000140261CC0                mov    rdx, rbx        ; jumptable 0000000140261CBE case 11
.text:0000000140261CC3                mov    ecx, edi
.text:0000000140261CC5                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261CCA                add    rsp, 20h
.text:0000000140261CCE                pop    rdi
.text:0000000140261CCF                jmp    loc_1402625C0
.text:0000000140261CD4 ; ---------------------------------------------------------------------------
.text:0000000140261CD4
.text:0000000140261CD4 loc_140261CD4:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261CD4                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261CD4                mov    rdx, rbx        ; jumptable 0000000140261CBE case 0
.text:0000000140261CD7                mov    ecx, edi
.text:0000000140261CD9                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261CDE                add    rsp, 20h
.text:0000000140261CE2                pop    rdi
.text:0000000140261CE3                jmp    loc_14025FF90
.text:0000000140261CE8 ; ---------------------------------------------------------------------------
.text:0000000140261CE8
.text:0000000140261CE8 loc_140261CE8:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261CE8                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261CE8                mov    rdx, CEntity        ; jumptable 0000000140261CBE cases 1,18 //humans and dawgs
.text:0000000140261CEB                mov    ecx, edi
.text:0000000140261CED                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261CF2                add    rsp, 20h
.text:0000000140261CF6                pop    rdi
.text:0000000140261CF7                jmp    loc_14027A150 //cg_player
.text:0000000140261CFC ; ---------------------------------------------------------------------------
.text:0000000140261CFC
.text:0000000140261CFC loc_140261CFC:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261CFC                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261CFC                mov    rdx, rbx        ; jumptable 0000000140261CBE case 2
.text:0000000140261CFF                mov    ecx, edi
.text:0000000140261D01                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D06                add    rsp, 20h
.text:0000000140261D0A                pop    rdi
.text:0000000140261D0B                jmp    loc_1402791A0
.text:0000000140261D10 ; ---------------------------------------------------------------------------
.text:0000000140261D10
.text:0000000140261D10 loc_140261D10:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D10                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D10                mov    rdx, rbx        ; jumptable 0000000140261CBE case 19
.text:0000000140261D13                mov    ecx, edi
.text:0000000140261D15                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D1A                add    rsp, 20h
.text:0000000140261D1E                pop    rdi
.text:0000000140261D1F                jmp    loc_140278D40
.text:0000000140261D24 ; ---------------------------------------------------------------------------
.text:0000000140261D24
.text:0000000140261D24 loc_140261D24:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D24                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D24                mov    rdx, rbx        ; jumptable 0000000140261CBE case 3
.text:0000000140261D27                mov    ecx, edi
.text:0000000140261D29                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D2E                add    rsp, 20h
.text:0000000140261D32                pop    rdi
.text:0000000140261D33                jmp    loc_140260A30
.text:0000000140261D38 ; ---------------------------------------------------------------------------
.text:0000000140261D38
.text:0000000140261D38 loc_140261D38:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D38                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D38                mov    rdx, rbx        ; jumptable 0000000140261CBE case 4
.text:0000000140261D3B                mov    ecx, edi
.text:0000000140261D3D                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D42                add    rsp, 20h
.text:0000000140261D46                pop    rdi
.text:0000000140261D47                jmp    loc_140260E10
.text:0000000140261D4C ; ---------------------------------------------------------------------------
.text:0000000140261D4C
.text:0000000140261D4C loc_140261D4C:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D4C                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D4C                mov    edx, [rbx+0F8h] ; jumptable 0000000140261CBE case 13
.text:0000000140261D52                mov    ecx, edi
.text:0000000140261D54                call    loc_140253390
.text:0000000140261D59
.text:0000000140261D59 loc_140261D59:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D59                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D59                mov    rdx, rbx        ; jumptable 0000000140261CBE case 6
.text:0000000140261D5C                mov    ecx, edi
.text:0000000140261D5E                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D63                add    rsp, 20h
.text:0000000140261D67                pop    rdi
.text:0000000140261D68                jmp    loc_140261FC0
.text:0000000140261D6D ; ---------------------------------------------------------------------------
.text:0000000140261D6D
.text:0000000140261D6D loc_140261D6D:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D6D                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D6D                mov    rdx, rbx        ; jumptable 0000000140261CBE case 7
.text:0000000140261D70                mov    ecx, edi
.text:0000000140261D72                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D77                add    rsp, 20h
.text:0000000140261D7B                pop    rdi
.text:0000000140261D7C                jmp    loc_140262420
.text:0000000140261D81 ; ---------------------------------------------------------------------------
.text:0000000140261D81
.text:0000000140261D81 loc_140261D81:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D81                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D81                mov    rdx, rbx        ; jumptable 0000000140261CBE case 10
.text:0000000140261D84                mov    ecx, edi
.text:0000000140261D86                mov    rbx, [rsp+28h+arg_0]
.text:0000000140261D8B                add    rsp, 20h
.text:0000000140261D8F                pop    rdi
.text:0000000140261D90                jmp    loc_140261A00
.text:0000000140261D95 ; ---------------------------------------------------------------------------
.text:0000000140261D95
.text:0000000140261D95 loc_140261D95:                          ; CODE XREF: sub_14025E5B0+370Ej
.text:0000000140261D95                                        ; DATA XREF: .text:off_140261DACo
.text:0000000140261D95                mov    rdx, rbx        ; jumptable 0000000140261CBE cases 12,14
.text:0000000140261D98                mov    ecx, edi
.text:0000000140261D9A                call    sub_14055F530
.text:0000000140261D9F
.text:0000000140261D9F loc_140261D9F:                          ; CODE XREF: sub_14025E5B0+36F7j
.text:0000000140261D9F                                        ; sub_14025E5B0+370Ej
.text:0000000140261D9F                                        ; DATA XREF: ...
.text:0000000140261D9F                mov    rbx, [rsp+28h+arg_0] ; jumptable 0000000140261CBE default case
.text:0000000140261DA4                add    rsp, 20h
.text:0000000140261DA8                pop    rdi
.text:0000000140261DA9                retn


Inside CG_Player you can find AddRefEntity2Scene where you can patch the renderflags for wallhack and other stuff.


Code:


enum RenderFlags
{       
        flag_enemy_outline = 0x4,
        flag_friendly_outline = 0x8,
        flag_oracle_outline = 0xC,
        flag_wh = 0xF,
};




Credits Crx & King Orgy





dimanche 9 mars 2014

[Information] info topic




hello I need a information?
I recently received this email from bp and appeared during the game!
and the second time it appears to me, I think the first time I had used a software
to lock the U.A.C. and the D.E.P. sbloccai and any restrictions.
the second time I had a rapid-fire that was activated and disattivava with insert.
What do you think?





vendredi 7 mars 2014

S duos 2 users I need some information.. topic




I was thinking to buy s duos 2. I want to know following things. It will help me enough to decide if I need to buy it or not.

1.Will it get kit kat update??

2. How many ram is available to user??

3. Tell about battery

4. Is it lags or like that??

5. Any touch problem??





dimanche 23 février 2014

[Information] which BF2 hack topic




Since all sites write we r n°1 and google search is full of crap, I want ask here since all hacks here were what I expected ( for free ones ). Which do you think is the best BF2 hack site ? Since 187ci is dead ( sadly ), any advice ?





[Information] For players scared to use hacks topic




for people afraid to take the ban call of duty ghosts do not you worry so you will return to level 1 when taking ban anything

Im brazilian an i used google translate sorry





mercredi 12 février 2014

[Q] Specific information about flashing 4.3 DN3 on N7105 anyone? Got a bit confused! topic




Hey everyone, I tried to search different threads, lots of places, but could not find anything specific.

Can anyone help me on this thread? This one: http://forum.xda-developers.com/show....php?t=2541860

I have a N7105
JediX19
OS 4.1.2
Boot Loader N7105XXDMC3

I always used ROM Manager to install new ROMs. No secret there, just download the zip to sd card, wipe everything, and boot the new ROM.

From what I read, this ROM needed the following:

- 4.3 bootloader
- MK5 Kernel
- TWRP to flash it

Can a good soul help me on the steps I should do coming from my current ROM?

Couldn't I just do the ROM manager way to flash this new ROM?

I did not get the steps necessary.

Sorry if there is a thread somewhere like this, I really tried to search. Thanks alot everyone.





jeudi 30 janvier 2014

mercredi 29 janvier 2014

[Information] How To Not Get Banned From PunkBuster topic




Granted, it isn't perfect, but it could help other hackers out there.

When starting up battlefield 4 (or any game that uses PunkBuster for that matter) Join a server, and spawn, walk around, and maybe even die (DO NOT HAVE YOU HACK STARTED!!)

after you have walked around a bit, Alt+Tab and Ctrl+Alt+Del and open up Your Task Manager

Go into you your processes part, and find the process titled "PukBustrB"

Now open your hack and play

(WARNING PunkBuster will Kick You after 5-10 min of having it off)

Better Then Getting Banned XD





mardi 28 janvier 2014

[Information] Insurgency: No Recoil Information topic




Hey folks.

You probably know the way of doing no recoil in Counter-Strike by subtracting m_viewPunchAngle *2.f from your current QAngle.
However, this has changed in insurgency as m_viewPunchAngle is no longer used (always -1 it seems).

The following only applies to aimbots, not shooting while having a dynamic QAngle:

The yaw kick can be compensated by simply setting the aimangle over and over again, it's not a relative offset to your current QAngle anymore (as it used to be in Counter-Strike).

Now for the pitch kick, which still is relative to your current QAngle!
Lookup the strings "m_Local" and "m_viewPunchAngle" and add their offsets.








onClick="if (this.parentNode.parentNode.getElementsByTagName('div')['show_spoil'].style.display != '')
{
this.parentNode.parentNode.getElementsByTagName('div')['show_spoil'].style.display = '';
this.parentNode.parentNode.getElementsByTagName('div')['hide_spoil'].style.display = 'none';
this.value = 'Hide Spoiler!';
}
else
{
this.parentNode.parentNode.getElementsByTagName('div')['show_spoil'].style.display = 'none';
this.parentNode.parentNode.getElementsByTagName('div')['hide_spoil'].style.display = '';
this.value = 'Show Spoiler!';
}" />





In this case that is 0x1364 + 0x64 = 0x13C8. Add this to your local player and check the memory region around that (scroll down). There should be a value that increases when firing and decreases over time while not firing. This is the pitch kick.


Code:


void CAimbot::SetAngle(QAngle qa)
{
        qa.pitch -= m_pPlayerMngr->GetLocalPlayer()->GetPitchKick();
        m_pProcess->WriteStruct( m_pViewVec, &qa, sizeof(QAngle) );
}


That's it. Once you've done that you can happily start aimbotting.








onClick="if (this.parentNode.parentNode.getElementsByTagName('div')['show_spoil'].style.display != '')
{
this.parentNode.parentNode.getElementsByTagName('div')['show_spoil'].style.display = '';
this.parentNode.parentNode.getElementsByTagName('div')['hide_spoil'].style.display = 'none';
this.value = 'Hide Spoiler!';
}
else
{
this.parentNode.parentNode.getElementsByTagName('div')['show_spoil'].style.display = 'none';
this.parentNode.parentNode.getElementsByTagName('div')['hide_spoil'].style.display = '';
this.value = 'Show Spoiler!';
}" />





Enjoy!





[Information] Mac binary for tf2 topic









vendredi 24 janvier 2014

[Information] Battlefiel 4 for ps3 topic




Hello gang haven't been on this site for a wile miss being on here but my I blew up my PC but that's another story lol but I was wondering if there is a hack on this site for battlefield 4 for ps3? Or know where I an get it.... thank you all!!





Rom information topic




Are there any roms that have the Japanese region feature?

Sent from my SM-N9005 using xda app-developers app