冰楓論壇

標題: C++ 2010 DLL寫ICS全圖打的問題 [打印本頁]

作者: bac66485    時間: 2019-7-19 17:42
標題: C++ 2010 DLL寫ICS全圖打的問題
小弟我奮鬥了2天多,還是ˊ找不出哪裡寫錯以下是數據
  1. // ICS 全職全圖打
  2. DWORD AttackOnOff = 0;
  3. DWORD VariantInit_Address = (DWORD)GetProcAddress(GetModuleHandleA("oleaut32"), "VariantInit");
  4. DWORD CheckESPAddress = 0x0333F414;
  5. DWORD CheckESP_Disable = VariantInit_Address;
  6. DWORD CheckESP_Call = 0x02298BE0;
  7. DWORD CheckESP_Calll = 0x00C40E70;
  8. DWORD CheckESP_Jmp = 0x014973C6;
  9. void __declspec(naked) __stdcall FullMapAttack()
  10. {   
  11.     __asm
  12.         {
  13. mov ecx,[0x03A848AC]
  14. add Ecx, 0x04
  15. lea eax,[ebp-0x000000C0]
  16. push eax
  17. call CheckESP_Call
  18. push eax
  19. lea ecx,[ebx+0x0000054C]
  20. call CheckESP_Calll
  21. jmp CheckESP_Jmp
  22.         }
  23. }
  24. DWORD FullMapAttackAddress = (DWORD)FullMapAttack;

  25. void __declspec(naked) __stdcall DoFullMapAttack()
  26. {
  27.         __asm
  28.         {
  29. cmp dword ptr[AttackOnOff],0
  30. je VariantInitBack
  31. cmp dword ptr[esp], 0x014973C6
  32. jne VariantInitBack
  33. push FullMapAttackAddress
  34. pop dword ptr[esp]
  35. VariantInitBack:
  36. jmp CheckESP_Disable
  37.         }
  38. }
  39. DWORD DoFullMapAttack_Enable = (DWORD)DoFullMapAttack;

  40. void InjectScript()
  41. {
  42.         memcpy((void *)CheckESPAddress, &DoFullMapAttack_Enable, sizeof(DoFullMapAttack_Enable));
  43. }
  44. System::Void FormMain::checkBox4_CheckedChanged(System::Object^  sender, System::EventArgs^  e)
  45. {
  46.     if (this->checkBox4->Checked)
  47.     {
  48.         //memcpy((void *)CheckESPAddress, &DoFullMapAttack_Enable, sizeof(DoFullMapAttack_Enable));
  49.                 AttackOnOff = 1;
  50.     }
  51.     else
  52.     {
  53.         //memcpy((void *)CheckESPAddress, &CheckESP_Disable, sizeof(CheckESP_Disable));
  54.                 AttackOnOff = 0;
  55.     }
  56. }
複製代碼
DLL有加上延遲Sleep
數據我是從版上的ICS全圖打小改一下的 以下是我改的 保證可以用
  1. //TwMS v217.3 ICS 全職全圖打
  2. [ENABLE]
  3. Alloc(AttackOnOff,4)
  4. Alloc(CheckESP, 256)
  5. Registersymbol(AttackOnOff)
  6. Label(FullMapAttack)

  7. AttackOnOff:
  8. DD 01

  9. CheckESP:
  10. Cmp [AttackOnOff], 0
  11. Je VariantInit
  12. Cmp [esp],014973C6
  13. Jne VariantInit
  14. Mov [esp],FullMapAttack
  15. Jmp VariantInit


  16. FullMapAttack:
  17. mov ecx,[03A848AC]
  18. add ecx,04
  19. lea eax,[ebp-000000C0]
  20. push eax
  21. call 02298BE0
  22. push eax
  23. lea ecx,[ebx+0000054C]
  24. call 00C40E70
  25. jmp 014973C6

  26. 0333F414:
  27. DD CheckESP

  28. [DISABLE]
  29. 0333F414:
  30. dd VariantInit
  31. DeAlloc(CheckESP)
複製代碼
希望大大們可以幫助小弟我解決這個難題 這個寫法我是看Toby的教學的

作者: huanghy_gz    時間: 2020-7-25 18:53
问题解决了吗?怎么解决的?




歡迎光臨 冰楓論壇 (https://bingfong.com/) Powered by 冰楓