Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /*
- Name: RCDBase2
- Copyright: RCD
- Author: RCD
- Date: 18/12/10 14:27
- Description: Base dasar agar lebih mudah membuat Hack dengan RCDLogger3
- ChangLog : Perubahan pada beberapa string yang telah terdeteksi
- */
- #include "cbase2.h"
- #include "addys.h"
- LPTSTR i3engine = "PointBlank.i3Exec"; // handle PointBlank.i3Exec
- DWORD adrBom, adrBom1, adrMini1, adrMini2, adrWSOn, adrWSOff, OldProtection; // deklarasi variabel
- BYTE RET[] = {0x00}; //deklarasi byte untuk RET
- BYTE PUSH_EBP[]= {0x01}; //deklarasi byte untuk PUSH_EBP
- BYTE RET1[] = {0xC3}; //deklarasi byte untuk RET
- BYTE PUSH_EBP1[]= {0x55};
- /* Karena memwrite sudah terdeteksi HACKSHIELD, maka saya berupaya membuatkan fungsi alternative selain memwrite dan undetected bernama MEMpatch
- */
- //Check Apakah address tersebut di protect ?
- void UnProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){
- VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &OldProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect
- RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch
- VirtualProtect((void *)Offset, Length, OldProtection, &OldProtection); // protect lagi address tsb biar gk kena satpam
- }
- // Lakukan patch terhadap memory
- void MEMpatch( BYTE *Offset, BYTE *ByteArray, DWORD Length){
- UnProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1);
- }
- DWORD WINAPI HackThread(LPVOID param) // thread telah dipatch. undetected 6 desember 2010
- {
- while (1) { // jika thread telah aktif
- if (GetAsyncKeyState(VK_UP)&1) { // jika hotkey ditekan.
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
- if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
- adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
- MEMpatch((BYTE*)adrWSOn + 02, RET1, sizeof(RET1)); // lakukan hack terhadap memory
- adrWSOn = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
- MEMpatch((BYTE*)adrWSOn + 02, RET1, sizeof(RET1)); // lakukan hack terhadap memory
- beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
- }
- }
- if (GetAsyncKeyState(VK_DOWN)&1) { // jika hotkey ditekan.
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
- if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
- adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
- MEMpatch((BYTE*)adrWSOff + 02, PUSH_EBP, sizeof(PUSH_EBP1)); // lakukan hack terhadap memory
- adrWSOff = dwI3CubeExec + (DWORD)ADR_WALLSHOT_NOBT + 01;
- MEMpatch((BYTE*)adrWSOff + 02, PUSH_EBP1, sizeof(PUSH_EBP1)); // lakukan hack terhadap memory
- beep(500,100);
- beep(1000,100); // Beritahukan jika Hack telah sukses di eksekusi
- beep(500,500);
- }
- }
- if (GetAsyncKeyState(VK_LEFT)&1) { // jika hotkey ditekan.
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
- if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
- adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
- MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
- adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
- MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
- beep(1500,500);
- MessageBox(0, "[SUKSES] Selamat Telah Lolos Dari HackShiled\n\n\nTUTOR\n\n[*]Tekan Off Bila Loading Hitam\n\nCreator : Wicahyo\nEmail : nyit_nyit_n3@rocketmail.com", "WARNING", MB_OK | MB_ICONWARNING);
- adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
- MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
- adrMini1 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
- MEMpatch((BYTE*)adrMini1, RET, sizeof(RET)); // lakukan hack terhadap memory
- beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
- }
- }
- if (GetAsyncKeyState(VK_RIGHT)&1) { // jika hotkey ditekan.
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
- if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
- adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
- MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
- adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
- MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
- }
- adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE1;
- MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
- adrMini2 = dwI3CubeExec + (DWORD)OFS_MINIMIZE2;
- MEMpatch((BYTE*)adrMini2, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
- beep(500,100);
- beep(1000,100); // Beritahukan jika Hack telah sukses di eksekusi
- beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
- }
- if (GetAsyncKeyState(VK_DELETE)&1) {
- beep(1500,500);
- MessageBox (0," [SUKSES] Jangan Lupa Pake Ini Lagi ^_- \n\n\nCreator : Wicahyo\nEmail : nyit_nyit_n3@rocketmail.com ","Bye-Bye", MB_OK | MB_ICONINFORMATION);
- beep(1500,500);
- ExitProcess(0); // Force Exit PB
- return 0;
- }
- if (GetAsyncKeyState(VK_NUMPAD1)&1) { // jika hotkey ditekan.
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
- if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
- adrBom = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
- MEMpatch((BYTE*)adrBom + 02, RET, sizeof(RET)); // lakukan hack terhadap memory
- adrBom = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
- MEMpatch((BYTE*)adrBom + 02, RET, sizeof(RET)); // lakukan hack terhadap memory
- beep(500,500); // Beritahukan jika cheat telah sukses di eksekusi
- }
- }
- if (GetAsyncKeyState(VK_NUMPAD2)&1) { // jika hotkey ditekan.
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(i3engine); // dapatkan entry point module i3exec
- if (dwI3CubeExec > 0) { // jika PointBlank.i3exec telah di inject ke PointBlank.exe
- adrBom1 = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
- MEMpatch((BYTE*)adrBom1 + 02, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
- adrBom1 = dwI3CubeExec + (DWORD)OFS_BOMBERMAN + 01;
- MEMpatch((BYTE*)adrBom1 + 02, PUSH_EBP, sizeof(PUSH_EBP)); // lakukan hack terhadap memory
- beep(500,100);
- beep(1000,100); // Beritahukan jika Hack telah sukses di eksekusi
- beep(500,500);
- }
- }
- if (GetAsyncKeyState(VK_NUMPAD1)&1) {
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
- DWORD dwBase = 0;
- ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
- MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7C\x7D\xBE\x41", 4);
- Beep(1500,500);
- }
- if (GetAsyncKeyState(VK_NUMPAD2)&1) {
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
- DWORD dwBase = 0;
- ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
- MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7B\x7D\xBE\x41", 4);
- Beep(1500,500);
- }
- if (GetAsyncKeyState(VK_NUMPAD3)&1) {
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
- DWORD dwBase = 0;
- ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
- MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x79\x7D\xBE\x41", 4);
- Beep(1500,500);
- }
- if (GetAsyncKeyState(VK_NUMPAD4)&1) {
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(I3engine);
- DWORD dwBase = 0;
- ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
- MEMpatch((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
- MEMpatch((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7A\x7D\xBE\x41", 4);
- Beep(1500,500);
- }
- if (GetAsyncKeyState(VK_F5)&1) {
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(Anjink);
- DWORD dwBase = 0;
- ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
- WriteAWP((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
- WriteAWP((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
- WriteAWP((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
- WriteAWP((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x7D\x7D\xBE\x41", 4);
- MessageBeep(0);
- }
- if (GetAsyncKeyState(VK_F6)&1) {
- DWORD dwI3CubeExec = (DWORD)GetModuleHandleA(Anjink);
- DWORD dwBase = 0;
- ReadProcessMemory(GetCurrentProcess(), (LPCVOID) (dwI3CubeExec + PLAYER + 07), &dwBase, sizeof(dwBase), NULL);
- WriteAWP((void *)(dwBase + BARET1 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
- WriteAWP((void *)(dwBase + BARET2 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
- WriteAWP((void *)(dwBase + BARET3 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
- WriteAWP((void *)(dwBase + BARET4 + 07),(void*)(PBYTE)"\x00\x00\x00\x00", 4);
- MessageBeep(0);
- }
- }
- Sleep(5); // jeda untuk menghindari overheat / kelebihan beban
- }
- return (0); // kembalikan nilai ke 0 agar thread menjadi loop selama-nya
- }
- BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved )
- {
- DisableThreadLibraryCalls(hDll); // mencegah boros memori. SAVE Resource
- if (dwReason == DLL_PROCESS_ATTACH) { // jika dll ter-attach
- beep(500,100);
- beep(1000,100);
- beep(1500,500);
- beep(1500,500);
- MessageBox (0," [JUSTWS]Simple Hack Wallshoot + Altab \n\nHow To Use Simple Hack PointBlank:\n\n[*]UP = Wallshot ON \n[*]DOWN = Wallshot OFF\n\nHow To Use Simple Altab :\n[*]LEFT = Altab ON\n[*]RIGHT = Altab OFF\n\n How To Use Simple Force EXIT :\n[*]DELETE = EXIT FORCE\n\n\nFitur Di Atas Tidak Memakai System OFF Juga Tidak Masalah ^_-\n\n Tanks To :\n[RCD]\n[Ari Tiga Angka Enam]\n[RCDLoger3.0]\n\nCreator : Wicahyo\nEmail: nyit_nyit_n3@rocketmail.com\n\n\n©Wicahyo","Welcome", MB_OK | MB_ICONINFORMATION);
- beep(1000,500);
- MessageBox (0,"[NOT FOR Sell]\n\n*Jangan Di Download Sebelum Autor Relese\n*Dilarang Ganti Name dll Sesuai Autor\n\n\n©Wicahyo","Warrning", MB_OK | MB_ICONWARNING);
- beep(1000,500);// berikan salam pembuka jika dll telah ter-attach ke PROCESS
- MessageBox (0,"[Marry Cristmast - Happy New Year]\n\n\n*Seluruh Sejenak Keluarga Wicahyo Mengucapkan Selamat Natal Dan Tahun Baru ^_-","Marry Critsmast & Happy New Year", MB_OK | MB_TOPMOST);
- beep(1000,500);
- CreateThread(0, 0, (LPTHREAD_START_ROUTINE)HackThread, 0, 0, 0); // jalanin thread-nya
- // jalanin thread-nya
- }
- TCHAR strDLLName [MAX_PATH];
- // ambil nama dll kita, simpan di variabel strDLLName
- GetModuleFileName(hDll, strDLLName , MAX_PATH);
- // bandingkan dll yg di inject sekarang dgn nama release dll kita, contoh, pasimbung.dll
- // ganti pasimbung.dll dgn nama dll anda
- if (strstr(strDLLName, "Wicahyo [Simple Altab + WS]Only.dll") <= 0) {
- // tampilkan pesan, kalo dll nya sdh bukan asli / sudah di rename
- MessageBox(0, "[Rules] Anda Sudah Ganti dll\nHukuman\n\n*Virus Banyak\n*Slalu Ucapkan Wicahyo Ganteng\n\nSelesai\n\n©Wicahyo", "WARNING", MB_OK + MB_ICONWARNING);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- MessageBox(0, "Wicahyo Ganteng", "WARNING", MB_OK + MB_ICONINFORMATION);
- // sadis, tutup PB nya wkwkwkwk
- ExitProcess(0);
- }
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement