- UID
- 222393
- 帖子
- 156
- 主題
- 29
- 精華
- 0
- 積分
- 71
- 楓幣
- 206
- 威望
- 31
- 存款
- 3
- 贊助金額
- 150
- 推廣
- 1
- GP
- 45
- 閱讀權限
- 30
- 性別
- 保密
- 在線時間
- 59 小時
- 註冊時間
- 2018-2-4
- 最後登入
- 2019-7-21
|
小弟我奮鬥了2天多,還是ˊ找不出哪裡寫錯以下是數據- // ICS 全職全圖打
- DWORD AttackOnOff = 0;
- DWORD VariantInit_Address = (DWORD)GetProcAddress(GetModuleHandleA("oleaut32"), "VariantInit");
- DWORD CheckESPAddress = 0x0333F414;
- DWORD CheckESP_Disable = VariantInit_Address;
- DWORD CheckESP_Call = 0x02298BE0;
- DWORD CheckESP_Calll = 0x00C40E70;
- DWORD CheckESP_Jmp = 0x014973C6;
- void __declspec(naked) __stdcall FullMapAttack()
- {
- __asm
- {
- mov ecx,[0x03A848AC]
- add Ecx, 0x04
- lea eax,[ebp-0x000000C0]
- push eax
- call CheckESP_Call
- push eax
- lea ecx,[ebx+0x0000054C]
- call CheckESP_Calll
- jmp CheckESP_Jmp
- }
- }
- DWORD FullMapAttackAddress = (DWORD)FullMapAttack;
- void __declspec(naked) __stdcall DoFullMapAttack()
- {
- __asm
- {
- cmp dword ptr[AttackOnOff],0
- je VariantInitBack
- cmp dword ptr[esp], 0x014973C6
- jne VariantInitBack
- push FullMapAttackAddress
- pop dword ptr[esp]
- VariantInitBack:
- jmp CheckESP_Disable
- }
- }
- DWORD DoFullMapAttack_Enable = (DWORD)DoFullMapAttack;
- void InjectScript()
- {
- memcpy((void *)CheckESPAddress, &DoFullMapAttack_Enable, sizeof(DoFullMapAttack_Enable));
- }
- System::Void FormMain::checkBox4_CheckedChanged(System::Object^ sender, System::EventArgs^ e)
- {
- if (this->checkBox4->Checked)
- {
- //memcpy((void *)CheckESPAddress, &DoFullMapAttack_Enable, sizeof(DoFullMapAttack_Enable));
- AttackOnOff = 1;
- }
- else
- {
- //memcpy((void *)CheckESPAddress, &CheckESP_Disable, sizeof(CheckESP_Disable));
- AttackOnOff = 0;
- }
- }
複製代碼 DLL有加上延遲Sleep
數據我是從版上的ICS全圖打小改一下的 以下是我改的 保證可以用- //TwMs v217.3 ICS 全職全圖打
- [ENABLE]
- Alloc(AttackOnOff,4)
- Alloc(CheckESP, 256)
- Registersymbol(AttackOnOff)
- Label(FullMapAttack)
- AttackOnOff:
- DD 01
- CheckESP:
- Cmp [AttackOnOff], 0
- Je VariantInit
- Cmp [esp],014973C6
- Jne VariantInit
- Mov [esp],FullMapAttack
- Jmp VariantInit
- FullMapAttack:
- mov ecx,[03A848AC]
- add ecx,04
- lea eax,[ebp-000000C0]
- push eax
- call 02298BE0
- push eax
- lea ecx,[ebx+0000054C]
- call 00C40E70
- jmp 014973C6
- 0333F414:
- DD CheckESP
- [DISABLE]
- 0333F414:
- dd VariantInit
- DeAlloc(CheckESP)
複製代碼 希望大大們可以幫助小弟我解決這個難題 這個寫法我是看Toby的教學的
|
|