sojibrema16 How do I cheat?
Reputation: 0
Joined: 08 Jan 2026 Posts: 1 Location: N/A
|
Posted: Fri Jan 09, 2026 4:07 pm Post subject: How to use the code for anti disconnect |
|
|
I need your like i used someone trainer he made mc5 anti disconnect hack so i open the Cheat engine and i saw WindowsEntryPoint.Windows_W10.exe+689182 this address patch with nop but here is a problem his hack when patched with nop its working very well but when i try replace with nop its not working i am sharing you this file pls help me i have stuck for 6 month i cant get it make by self
Code
{ Game : WindowsEntryPoint.Windows_W10.exe
Version:
Date : 2026-01-08
Author : Sojib Kethy
This script does blah blah blah
}
[ENABLE]
aobscanmodule(INJECT,WindowsEntryPoint.Windows_W10.exe,E8 D9 68 01 00) // should be unique
alloc(newmem,$1000,INJECT)
label(code)
label(return)
newmem:
code:
call WindowsEntryPoint.Windows_W10.exe+69FA60
jmp return
INJECT:
jmp newmem
return:
registersymbol(INJECT)
[DISABLE]
INJECT:
db E8 D9 68 01 00
unregistersymbol(INJECT)
dealloc(newmem)
{
// ORIGINAL CODE - INJECTION POINT: WindowsEntryPoint.Windows_W10.exe+689182
WindowsEntryPoint.Windows_W10.exe+68915A: E8 C1 E5 9F FF - call WindowsEntryPoint.Windows_W10.jtl::string::~string+1750
WindowsEntryPoint.Windows_W10.exe+68915F: E9 62 1C 00 00 - jmp WindowsEntryPoint.Windows_W10.exe+68ADC6
WindowsEntryPoint.Windows_W10.exe+689164: B9 2A 00 00 00 - mov ecx,0000002A
WindowsEntryPoint.Windows_W10.exe+689169: E8 32 45 C7 FF - call WindowsEntryPoint.Windows_W10.exe+2FD6A0
WindowsEntryPoint.Windows_W10.exe+68916E: 48 8B D8 - mov rbx,rax
WindowsEntryPoint.Windows_W10.exe+689171: 49 8B D6 - mov rdx,r14
WindowsEntryPoint.Windows_W10.exe+689174: 48 8B C8 - mov rcx,rax
WindowsEntryPoint.Windows_W10.exe+689177: E8 44 90 C8 FF - call WindowsEntryPoint.Windows_W10.exe+3121C0
WindowsEntryPoint.Windows_W10.exe+68917C: 48 8B D3 - mov rdx,rbx
WindowsEntryPoint.Windows_W10.exe+68917F: 48 8B CE - mov rcx,rsi
// ---------- INJECTING HERE ----------
WindowsEntryPoint.Windows_W10.exe+689182: E8 D9 68 01 00 - call WindowsEntryPoint.Windows_W10.exe+69FA60
// ---------- DONE INJECTING ----------
WindowsEntryPoint.Windows_W10.exe+689187: E9 3A 1C 00 00 - jmp WindowsEntryPoint.Windows_W10.exe+68ADC6
WindowsEntryPoint.Windows_W10.exe+68918C: B9 2B 00 00 00 - mov ecx,0000002B
WindowsEntryPoint.Windows_W10.exe+689191: E8 0A 45 C7 FF - call WindowsEntryPoint.Windows_W10.exe+2FD6A0
WindowsEntryPoint.Windows_W10.exe+689196: 48 8B D8 - mov rbx,rax
WindowsEntryPoint.Windows_W10.exe+689199: 49 8B D6 - mov rdx,r14
WindowsEntryPoint.Windows_W10.exe+68919C: 48 8B C8 - mov rcx,rax
WindowsEntryPoint.Windows_W10.exe+68919F: E8 4C 96 C8 FF - call WindowsEntryPoint.Windows_W10.exe+3127F0
WindowsEntryPoint.Windows_W10.exe+6891A4: 48 8B D3 - mov rdx,rbx
WindowsEntryPoint.Windows_W10.exe+6891A7: 48 8B CE - mov rcx,rsi
WindowsEntryPoint.Windows_W10.exe+6891AA: E8 81 75 01 00 - call WindowsEntryPoint.Windows_W10.exe+6A0730
}
_________________
N/A |
|