Aprendiz How do I cheat? Reputation: 0
Joined: 25 Nov 2016 Posts: 7
|
Posted: Sat Sep 08, 2018 11:34 am Post subject: How to convert a script into (DLL) (Cheat Engine / DLL) |
|
|
Is there an injectable fraud mechanism?
if so, where can I find it?
how to make a (DLL) to change the value of an address
example: I inject the (DLL / CT) into the game
when inject opens the Cheat Engine screen
How to convert a script into (DLL)
<?xml version="1.0" encoding="utf-8"?>
<CheatTable>
<CheatEntries>
<CheatEntry>
<ID>4</ID>
<Description>"speed"</Description>
<LastState Value="74" RealAddress="0018D2EC"/>
<VariableType>Byte</VariableType>
<Address>0018D2EC</Address>
<Hotkeys>
<Hotkey>
<Action>Toggle Activation Allow Decrease</Action>
<Keys>
<Key>192</Key>
</Keys>
<Description>Speed</Description>
<ID>0</ID>
</Hotkey>
</Hotkeys>
</CheatEntry>
<CheatEntry>
<ID>1</ID>
<Description>"Agi-65500"</Description>
<LastState Value="0" RealAddress="0A25933A"/>
<VariableType>2 Bytes</VariableType>
<Address>"mucabrasil.exe"+072E3CF8</Address>
<Offsets>
<Offset>1A</Offset>
</Offsets>
<Hotkeys>
<Hotkey>
<Action>Set Value</Action>
<Keys>
<Key>18</Key>
<Key>49</Key>
</Keys>
<Value>65500</Value>
<Description>65500</Description>
<ID>0</ID>
</Hotkey>
<Hotkey>
<Action>Set Value</Action>
<Keys>
<Key>18</Key>
<Key>50</Key>
</Keys>
<Value>47000</Value>
<Description>47000</Description>
<ID>1</ID>
</Hotkey>
<Hotkey>
<Action>Set Value</Action>
<Keys>
<Key>18</Key>
<Key>51</Key>
</Keys>
<Value>33000</Value>
<Description>33000</Description>
<ID>2</ID>
</Hotkey>
<Hotkey>
<Action>Set Value</Action>
<Keys>
<Key>18</Key>
<Key>52</Key>
</Keys>
<Value>32500</Value>
<Description>32500</Description>
<ID>3</ID>
</Hotkey>
</Hotkeys>
</CheatEntry>
<CheatEntry>
<ID>7</ID>
<Description>"stern"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mucabrasil.exe
Version:
Date : 2017-04-29
Author : LDM
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT,mucabrasil.exe,89 86 A8 00 00 00 8B 46) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov [esi+000000A8],10
jmp return
INJECT:
jmp newmem
nop
return:
registersymbol(INJECT)
[DISABLE]
INJECT:
db 89 86 A8 00 00 00
unregistersymbol(INJECT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mucabrasil.exe"+100912
"mucabrasil.exe"+1008EB: 8B D5 - mov edx,ebp
"mucabrasil.exe"+1008ED: 81 E2 00 10 00 00 - and edx,00001000
"mucabrasil.exe"+1008F3: 81 FA 00 10 00 00 - cmp edx,00001000
"mucabrasil.exe"+1008F9: 0F 85 15 01 00 00 - jne mucabrasil.exe+100A14
"mucabrasil.exe"+1008FF: 8B 86 A8 00 00 00 - mov eax,[esi+000000A8]
"mucabrasil.exe"+100905: 8B 4E 14 - mov ecx,[esi+14]
"mucabrasil.exe"+100908: 8B 56 18 - mov edx,[esi+18]
"mucabrasil.exe"+10090B: 80 CC 10 - or ah,10
"mucabrasil.exe"+10090E: 6A 00 - push 00
"mucabrasil.exe"+100910: 6A FF - push -01
// ---------- INJECTING HERE ----------
"mucabrasil.exe"+100912: 89 86 A8 00 00 00 - mov [esi+000000A8],eax
// ---------- DONE INJECTING ----------
"mucabrasil.exe"+100918: 8B 46 10 - mov eax,[esi+10]
"mucabrasil.exe"+10091B: 6A 00 - push 00
"mucabrasil.exe"+10091D: 6A 00 - push 00
"mucabrasil.exe"+10091F: 6A FF - push -01
"mucabrasil.exe"+100921: 89 44 24 24 - mov [esp+24],eax
"mucabrasil.exe"+100925: 68 00 00 F0 41 - push 41F00000
"mucabrasil.exe"+10092A: 89 4C 24 2C - mov [esp+2C],ecx
"mucabrasil.exe"+10092E: 56 - push esi
"mucabrasil.exe"+10092F: 8D 44 24 38 - lea eax,[esp+38]
"mucabrasil.exe"+100933: 89 54 24 34 - mov [esp+34],edx
}
</AssemblerScript>
<Hotkeys>
<Hotkey>
<Action>Toggle Activation</Action>
<Keys>
<Key>18</Key>
<Key>83</Key>
</Keys>
<Description>Stern Of</Description>
<ID>0</ID>
</Hotkey>
</Hotkeys>
</CheatEntry>
<CheatEntry>
<ID>9</ID>
<Description>"ice"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mucabrasil.exe
Version:
Date : 2017-04-30
Author : LDM
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT,mucabrasil.exe,89 86 A8 00 00 00 8B D5 83 E2 04) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov [esi+000000A8],0
jmp return
INJECT:
jmp newmem
nop
return:
registersymbol(INJECT)
[DISABLE]
INJECT:
db 89 86 A8 00 00 00
unregistersymbol(INJECT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mucabrasil.exe"+1006C5
"mucabrasil.exe"+1006A3: 75 0E - jne mucabrasil.exe+1006B3
"mucabrasil.exe"+1006A5: 8B 86 A8 00 00 00 - mov eax,[esi+000000A8]
"mucabrasil.exe"+1006AB: 0C 01 - or al,01
"mucabrasil.exe"+1006AD: 89 86 A8 00 00 00 - mov [esi+000000A8],eax
"mucabrasil.exe"+1006B3: 8B CD - mov ecx,ebp
"mucabrasil.exe"+1006B5: 83 E1 02 - and ecx,02
"mucabrasil.exe"+1006B8: 80 F9 02 - cmp cl,02
"mucabrasil.exe"+1006BB: 75 0E - jne mucabrasil.exe+1006CB
"mucabrasil.exe"+1006BD: 8B 86 A8 00 00 00 - mov eax,[esi+000000A8]
"mucabrasil.exe"+1006C3: 0A C1 - or al,cl
// ---------- INJECTING HERE ----------
"mucabrasil.exe"+1006C5: 89 86 A8 00 00 00 - mov [esi+000000A8],eax
// ---------- DONE INJECTING ----------
"mucabrasil.exe"+1006CB: 8B D5 - mov edx,ebp
"mucabrasil.exe"+1006CD: 83 E2 04 - and edx,04
"mucabrasil.exe"+1006D0: 80 FA 04 - cmp dl,04
"mucabrasil.exe"+1006D3: 75 0E - jne mucabrasil.exe+1006E3
"mucabrasil.exe"+1006D5: 8B 86 A8 00 00 00 - mov eax,[esi+000000A8]
"mucabrasil.exe"+1006DB: 0A C2 - or al,dl
"mucabrasil.exe"+1006DD: 89 86 A8 00 00 00 - mov [esi+000000A8],eax
"mucabrasil.exe"+1006E3: 8B C5 - mov eax,ebp
"mucabrasil.exe"+1006E5: 83 E0 08 - and eax,08
"mucabrasil.exe"+1006E8: 3C 08 - cmp al,08
}
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>11</ID>
<Description>"hit hacker"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mucabrasil.exe
Version:
Date : 2017-05-08
Author : LDM
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT,mucabrasil.exe,88 91 45 01 00 00 8B 45 0Cool // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov [ecx+00000145],1
jmp return
INJECT:
jmp newmem
nop
return:
registersymbol(INJECT)
[DISABLE]
INJECT:
db 88 91 45 01 00 00
unregistersymbol(INJECT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mucabrasil.exe"+104DAE
"mucabrasil.exe"+104D84: 8B 4D 08 - mov ecx,[ebp+08]
"mucabrasil.exe"+104D87: 8B 55 08 - mov edx,[ebp+08]
"mucabrasil.exe"+104D8A: 8A 82 45 01 00 00 - mov al,[edx+00000145]
"mucabrasil.exe"+104D90: 88 81 46 01 00 00 - mov [ecx+00000146],al
"mucabrasil.exe"+104D96: 8B 4D 08 - mov ecx,[ebp+08]
"mucabrasil.exe"+104D99: 8B 55 08 - mov edx,[ebp+08]
"mucabrasil.exe"+104D9C: 8B 82 48 01 00 00 - mov eax,[edx+00000148]
"mucabrasil.exe"+104DA2: 89 81 4C 01 00 00 - mov [ecx+0000014C],eax
"mucabrasil.exe"+104DA8: 8B 4D 08 - mov ecx,[ebp+08]
"mucabrasil.exe"+104DAB: 8A 55 0C - mov dl,[ebp+0C]
// ---------- INJECTING HERE ----------
"mucabrasil.exe"+104DAE: 88 91 45 01 00 00 - mov [ecx+00000145],dl
// ---------- DONE INJECTING ----------
"mucabrasil.exe"+104DB4: 8B 45 08 - mov eax,[ebp+08]
"mucabrasil.exe"+104DB7: C7 80 48 01 00 00 00 00 00 00 - mov [eax+00000148],00000000
"mucabrasil.exe"+104DC1: 8B E5 - mov esp,ebp
"mucabrasil.exe"+104DC3: 5D - pop ebp
"mucabrasil.exe"+104DC4: C3 - ret
"mucabrasil.exe"+104DC5: 55 - push ebp
"mucabrasil.exe"+104DC6: 8B EC - mov ebp,esp
"mucabrasil.exe"+104DC8: 83 EC 14 - sub esp,14
"mucabrasil.exe"+104DCB: 8B 45 08 - mov eax,[ebp+08]
"mucabrasil.exe"+104DCE: 8B 4D 0C - mov ecx,[ebp+0C]
}
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>17</ID>
<Description>"anti reflet"</Description>
<LastState Value="0" RealAddress="0C03E9C4"/>
<VariableType>4 Bytes</VariableType>
<Address>"mucabrasil.exe"+0708A34C</Address>
<Offsets>
<Offset>144</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>24</ID>
<Description>"Auto Assemble script"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>{ Game : mucabrasil.exe
Version:
Date : 2017-08-17
Author : LDM
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT,mucabrasil.exe,8A 88 D9 03 00 00 85) // should be unique
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov cl,[eax+1]
jmp return
INJECT:
jmp newmem
nop
return:
registersymbol(INJECT)
[DISABLE]
INJECT:
db 8A 88 D9 03 00 00
unregistersymbol(INJECT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: "mucabrasil.exe"+117B11
"mucabrasil.exe"+117AEE: D8 41 24 - fadd dword ptr [ecx+24]
"mucabrasil.exe"+117AF1: 8B 55 0C - mov edx,[ebp+0C]
"mucabrasil.exe"+117AF4: D9 5A 24 - fstp dword ptr [edx+24]
"mucabrasil.exe"+117AF7: 8B 45 08 - mov eax,[ebp+08]
"mucabrasil.exe"+117AFA: 8A 88 D8 03 00 00 - mov cl,[eax+000003D8]
"mucabrasil.exe"+117B00: 80 E9 01 - sub cl,01
"mucabrasil.exe"+117B03: 8B 55 08 - mov edx,[ebp+08]
"mucabrasil.exe"+117B06: 88 8A D8 03 00 00 - mov [edx+000003D8],cl
"mucabrasil.exe"+117B0C: 8B 45 08 - mov eax,[ebp+08]
"mucabrasil.exe"+117B0F: 33 C9 - xor ecx,ecx
// ---------- INJECTING HERE ----------
"mucabrasil.exe"+117B11: 8A 88 D9 03 00 00 - mov cl,[eax+000003D9]
// ---------- DONE INJECTING ----------
"mucabrasil.exe"+117B17: 85 C9 - test ecx,ecx
"mucabrasil.exe"+117B19: 0F 8E 5E 02 00 00 - jng mucabrasil.exe+117D7D
"mucabrasil.exe"+117B1F: C7 45 FC CD CC 4C 3E - mov [ebp-04],3E4CCCCD
"mucabrasil.exe"+117B26: 8B 55 0C - mov edx,[ebp+0C]
"mucabrasil.exe"+117B29: 0F BF 42 02 - movsx eax,word ptr [edx+02]
"mucabrasil.exe"+117B2D: 3D A0 01 00 00 - cmp eax,000001A0
"mucabrasil.exe"+117B32: 75 07 - jne mucabrasil.exe+117B3B
"mucabrasil.exe"+117B34: C7 45 FC 29 5C 8F 3D - mov [ebp-04],3D8F5C29
"mucabrasil.exe"+117B3B: 8B 0D 2C 8B 71 00 - mov ecx,[mucabrasil.exe+318B2C]
"mucabrasil.exe"+117B41: 51 - push ecx
}
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>26</ID>
<Description>"uniria 70"</Description>
<VariableType>Byte</VariableType>
<Address>"wzAudio.dll"+00507D44</Address>
<Offsets>
<Offset>358</Offset>
<Offset>4</Offset>
<Offset>6C</Offset>
<Offset>6C</Offset>
<Offset>384</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>27</ID>
<Description>"uniria 28/255"</Description>
<VariableType>Byte</VariableType>
<Address>"wzAudio.dll"+00507D44</Address>
<Offsets>
<Offset>359</Offset>
<Offset>4</Offset>
<Offset>6C</Offset>
<Offset>6C</Offset>
<Offset>384</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatTable>
|
|