Advertisement
toko214

Scripts

Mar 16th, 2016
221
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. //Perfect Tubi v171.1 Updated By toko214
  2. // Called address (First mov below called address)
  3. // E8 ? ? ? ? 8B 86 ? ? ? ? C6 44 24 ? 05 85 C0 74 ? 83 C0 04
  4. Define(Tubi, 00872295)
  5.  
  6.  
  7. // calculate_parbolic_motion_duration
  8. // DC 0D ? ? ? ? 83 C4 ? E9 ? ? ? ? DD 05
  9. Define(InstantDrop, 00730934)
  10.  
  11.  
  12. // 2B 70 ? 81 FE ? ? ? 00 0F 8D ? ? ? 00 85 ED 0F 84
  13. Define(NoAnimation, 0050ABD3)
  14.  
  15.  
  16. [Enable]
  17. Tubi:
  18. db 90 90 90 90 90 90
  19.  
  20.  
  21. InstantDrop:
  22. fsub qword ptr [017C4778]
  23.  
  24.  
  25. NoAnimation+5:
  26. dd 0
  27.  
  28.  
  29. [Disable]
  30. Tubi:
  31. mov [esi+00001CE8],eax
  32.  
  33.  
  34. InstantDrop:
  35. fmul qword ptr [01D1C4B8]
  36.  
  37.  
  38. NoAnimation+5:
  39. dd 2B 70
  40.  
  41.  
  42.  
  43. X3 No Delay v171.1 Updated By toko214
  44. [ENABLE]
  45. alloc(DelayHook,128)
  46. label(Return)
  47. label(DH_Reset)
  48. alloc(Counter,4)
  49. alloc(AttackHook,128)
  50. label(Return2)
  51. label(AH_Original)
  52.  
  53. Counter:
  54. dd 0
  55.  
  56. DelayHook:
  57. inc [Counter]
  58. cmp [Counter],3
  59. jae DH_Reset
  60. ret 0014
  61.  
  62. DH_Reset:
  63. mov [Counter],0
  64. push -01 // Original Opcode
  65. push 01B6CCC8 // Original Opcode
  66. jmp Return
  67.  
  68. AttackHook:
  69. push [esp+4]
  70. mov ecx,esi
  71. call AH_Original
  72. push [esp+4]
  73. mov ecx,esi
  74. call AH_Original
  75. push [esp+4]
  76. mov ecx,esi
  77. call AH_Original
  78. ret 0004
  79.  
  80. AH_Original:
  81. push -01 // Original Opcode
  82. push 01B7F758 // Original Opcode
  83. jmp Return2
  84.  
  85. 015E2CB0:
  86. jmp DelayHook
  87. nop
  88. nop
  89. Return:
  90.  
  91. 013701B0:
  92. jmp AttackHook
  93. nop
  94. nop
  95. Return2:
  96.  
  97. [DISABLE]
  98. 015E2CB0: // 6A FF 68 ?? ?? ?? ?? 64 A1 00 00 00 00 50 83 EC ?? 53 55 56 57 A1 ?? ?? ?? ?? 33 C4 50 8D 44 24 ?? 64 A3 00 00 00 00 8B D9 83 BB ?? ?? ?? ?? 00 8B 7C 24 ?? 0F 84
  99. push -01
  100. push 01B6CCC8
  101.  
  102. 013701B0: // 6A FF 68 ? ? ? ? 64 A1 00 00 00 00 50 83 ? ? 53 55 56 57 A1 ? ? ? ? 33 C4 50 8D ? ? ? 64 A3 00 00 00 00 8B F1 8B ? ? ? ? ? 6A 00 68 ? ? ? ? 8B ? 89  [Third Result]
  103. push -01
  104. push 01B7F758
  105.  
  106. dealloc(DelayHook)
  107. dealloc(Counter)
  108. dealloc(AttackHook)
  109.  
  110.  
  111. Demon Slayer Instant Final Slash v171.1 Updated By toko214
  112. [ENABLE]
  113. 016B0AFE:
  114. push 01D909B0
  115.  
  116. [DISABLE]
  117. 016B0AFE: // 68 C4 05 D9 01 8B CE E8
  118. push 01D905C4
  119.  
  120.  
  121. Evan Dragon Kami v171.1 Updated By toko214
  122. [ENABLE]
  123. alloc(EvanDragonKami,128)
  124. label(DragonTeleport)
  125. label(NextTeleport)
  126. label(Ending)
  127. label(Check)
  128. label(ReturnXor)
  129. label(ReturnPop)
  130.  
  131. EvanDragonKami:
  132. lea eax,[esp+2C]
  133. push eax
  134. call DragonTeleport
  135. test eax,eax
  136. je Ending
  137. mov edx,[eax+04]
  138. sub edx, #0 // Dragon Kami Range Y
  139. mov eax,[eax]
  140. add eax, #0 // Dragon Kami Range X
  141. add esp,0C
  142. jmp 00734EB3 // 8B 00 8B 4E ? 52 mov ecx,[esi+10] below
  143.  
  144. DragonTeleport:
  145. push ebp
  146. mov ebp,esp
  147. push ecx
  148. push esi
  149. mov eax,[0050AB70] // Mob Base: 8B 0D ? ? ? ? ? E8 ? ? ? ? 8B ? 85 ? 74 ? 8B ? ? 8B ? ? 8D
  150. test eax,eax
  151. je ReturnXor
  152. mov eax,[eax+28]
  153. test eax,eax
  154. je ReturnXor
  155. mov [ebp-04],eax
  156.  
  157. NextTeleport:
  158. lea eax,[ebp-04]
  159. push eax
  160. call 004793F6 // E8 ? ? ? ? 8B ? ? 8B ? ? 8B ? ? 8B ? ? 8B ? ? 8B [Follow Call]
  161. add esp,04
  162. mov esi,[eax+04]
  163. // Assembly Scan: mov [esi+00000804],eax
  164. // GMS v.170.1 00D8AF2A
  165. cmp dword ptr [esi+00000804],00
  166. je Check
  167. lea ecx,[esi+04]
  168. mov edx,[ecx]
  169. mov edx,[edx+10]
  170. mov eax,[ebp+08]
  171. push eax
  172. call edx
  173. jmp ReturnPop
  174.  
  175. Check:
  176. cmp byte ptr [ebp-04],00
  177. jne NextTeleport
  178.  
  179. ReturnXor:
  180. xor eax,eax
  181.  
  182. ReturnPop:
  183. pop esi
  184. mov esp,ebp
  185. pop ebp
  186. ret 0004
  187.  
  188. Ending:
  189. call dword ptr [020D090C] // Original Opcode
  190. jmp 017B7A63 // test eax,eax below
  191.  
  192. 017BDA2D:
  193. jmp EvanDragonKami
  194. db 90
  195.  
  196. [DISABLE]
  197. 017BDA2D: // FF 15 ? ? ? ? 85 C0 75 ? 8B ? 8B ? ? 8D [First Result]
  198. call dword ptr [020D090C]
  199.  
  200. dealloc(EvanDragonKami)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement