Created
June 20, 2017 20:26
-
-
Save uruskan/623807b62d5ce9cf1a4292f531e40eff to your computer and use it in GitHub Desktop.
Teleport Hack Concept
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ENABLE] | |
//code from here to '[DISABLE]' will be used to enable the cheat | |
alloc(newmem,2048) | |
label(returnhere) | |
label(originalcode) | |
label(exit) | |
label(code) | |
label(save_coords) | |
label(load_coords) | |
label(xpos) | |
label(ypos) | |
label(zpos) | |
label(s_enable) | |
label(l_enable) | |
registersymbol(s_enable) | |
registersymbol(l_enable) | |
newmem: //this is allocated memory, you have read,write,execute access | |
//place your code here | |
xpos: | |
dd 0 | |
ypos: | |
dd 0 | |
zpos: | |
dd 0 | |
s_enable: | |
dd 0 | |
l_enable: | |
dd 0 | |
code: | |
cmp [s_enable],1 | |
je save_coords | |
cmp [l_enable],1 | |
je load_coords | |
jmp originalcode | |
save_coords: | |
mov [s_enable],0 | |
push edi | |
mov edi,[eax+34] | |
mov [xpos],edi | |
mov edi,[eax+38] | |
mov [ypos],edi | |
mov edi,[eax+3C] | |
mov [zpos],edi | |
pop edi | |
jmp originalcode | |
load_coords: | |
mov [l_enable],0 | |
push edi | |
mov edi,[xpos] | |
mov [eax+34],edi | |
mov edi,[ypos] | |
mov [eax+38],edi | |
mov edi,[zpos] | |
mov [eax+3C],edi | |
pop edi | |
jmp originalcode | |
originalcode: | |
mov ecx,[eax+3C] | |
mov [eax+08],edx | |
exit: | |
jmp returnhere | |
"ac_client.exe"+5BCAC: | |
jmp code | |
nop | |
returnhere: | |
[DISABLE] | |
//code from here till the end of the code will be used to disable the cheat | |
dealloc(newmem) | |
"ac_client.exe"+5BCAC: | |
mov ecx,[eax+3C] | |
mov [eax+08],edx | |
unregistersymbol(l_enable) | |
unregistersymbol(s_enable) | |
//Alt: db 8B 48 3C 89 50 08 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment