- UID
- 158075
- 帖子
- 262
- 主題
- 64
- 精華
- 0
- 積分
- 317
- 楓幣
- 9240
- 威望
- 307
- 存款
- 0
- 贊助金額
- 0
- 推廣
- 0
- GP
- 96
- 閱讀權限
- 30
- 性別
- 保密
- 在線時間
- 197 小時
- 註冊時間
- 2016-8-23
- 最後登入
- 2024-11-20
|
本帖最後由 ke90927 於 2019-1-22 05:27 編輯
- //TwMs213.2 無限技能 [ICS]
- //ICS:ke90927
- //轉自:GMS技能注入CRC,版上的智能施法貌似是這個。
- [ENABLE]
- alloc(hook,1028)
- alloc(delay,4)
- label(return)
- label(normal)
- Label(Hack2)
- Label(Hack3)
- Label(Hack4)
- Label(Hack5)
- Label(Hack6)
- Label(Hack7)
- Label(Hack8)
- Label(Hack9)
- Label(Hack10)
- Label(Hack11)
- Label(Hack12)
- Label(Hack13)
- Label(Hack14)
- delay://延遲
- db 00
- hook:
- cmp [esp+14],0237F78D
- jne InterlockedDecrement
- mov [esp+14],Hack2
- jmp InterlockedDecrement
- //老樣子無效果的話,請把ESP+14,減4或加4。。。陸服大於台服8個字節
- Hack2:
- mov [ebp-10],00000000
- jmp Hack3
- nop
- nop
- Hack3:
- call GetTickCount
- mov edx,eax
- sub edx,[delay]
- cmp edx,0
- jl normal
- mov [delay],eax
- mov [esi+0001529C],#31001008//技能
- jmp return
- normal:
- cmp dword ptr [esi+0001529C],00
- jmp return
- return:
- db 90 90 90 90 90 90
- sub edi,[esi+000152A4]
- db 90 90 90 90 90 90
- mov ecx,[03BBDFDC]
- test ecx,ecx
- je Hack4
- mov eax,[ecx+04]
- add ecx,04
- push 03915D14
- call dword ptr [eax+64]
- test eax,eax
- je Hack4
- mov edi,[03BBDFDC]
- test edi,edi
- je Hack5
- mov eax,[edi+04]
- lea ecx,[edi+04]
- push 03915D14
- call dword ptr [eax+64]
- test eax,eax
- jne Hack6
- Hack5:
- xor edi,edi
- Hack6:
- push [esi+0001529C]
- mov ecx,edi
- call 01001360
- test eax,eax
- jne 0237FA64
- Hack4:
- lea edi,[esi+00000120]
- push ebx
- mov ecx,edi
- call 00CD9680
- push eax
- xor bl,bl
- call 004DF6E0
- add esp,04
- cmp eax,[esi+000152A0]
- nop
- jmp Hack7
- mov eax,[esi]
- mov ecx,esi
- call dword ptr [eax+70]
- cmp eax,00002710
- je Hack8
- cmp eax,00002774
- je Hack8
- cmp eax,0000277E
- je Hack8
- cmp eax,0000277F
- je Hack8
- cmp eax,00002780
- jne Hack9
- Hack8:
- lea eax,[ebp-1C]
- mov ecx,esi
- push eax
- call 021FC170
- mov ecx,00000001
- cmp dword ptr [eax+04],00
- je Hack10
- mov bl,cl
- jmp Hack11
- Hack9:
- mov ecx,[ebp-08]
- Hack10:
- xor bl,bl
- Hack11:
- test cl,01
- je Hack12
- cmp dword ptr [ebp-18],00
- je Hack12
- push 00
- lea ecx,[ebp-1C]
- call 005A4D70
- Hack12:
- test bl,bl
- je 0237FA63
- lea eax,[ebp-1C]
- mov ecx,esi
- push eax
- call 021FC170
- cmp dword ptr [ebp-18],00
- mov eax,[eax+04]
- mov edi,[eax+51]
- je Hack13
- push 00
- lea ecx,[ebp-1C]
- call 005A4D70
- Hack13:
- push edi
- mov bl,01
- call 004DF6E0
- add esp,04
- cmp eax,[esi+000152A0]
- jne 0237FA63
- lea edi,[esi+00000120]
- Hack7:
- cmp [esi+0001529C],00423D3E
- jne Hack14
- mov eax,[esi]
- mov ecx,esi
- call dword ptr [eax+70]
- lea edx,[eax-00000960]
- cmp edx,64
- jb Hack14
- cmp eax,000007D3
- je Hack14
- mov ecx,edi
- call 00CD9690
- push eax
- call 004DF6E0
- add esp,04
- cmp eax,22
- jne 0237FA63
- Hack14:
- mov ecx,[0392B324]
- lea eax,[ebp-04]
- push 01
- push 00
- push 00
- push 00
- push eax
- push [esi+0001529C]
- mov [ebp-04],00000000
- push [ebp-0C]
- call 007E2C00
- mov edi,eax
- test edi,edi
- jng 0237FA63
- mov ecx,[esi+000152A0]
- add ecx,-17
- cmp ecx,23
- db 90 90 90 90 90 90
- db 0f b6 89 84 fa 37 02
- jmp 0237F980
- dw 9090
- jmp 0237F954
- 03207138:
- DD hook
- [DISABLE]
- 03207138:
- dd InterlockedDecrement
- dealloc(hook)
複製代碼 |
|