Admin
nama : -[rizalls]-Anak TkJ-2 Jumlah posting : 135 Join date : 22.03.11 Age : 33 Lokasi : Babat psycho
| Subyek: SC bom defuse 0 detik Wed May 25, 2011 8:50 pm | |
| - Code:
-
#include <windows.h> #include "stdio.h" #include "stdlib.h"
///DM
#define PASANG 0x3C1B04 #define NORES 0x3C1B04 #define DEFUSE 0x3BC172
LPTSTR dwGambler007 = "PointBlank.i3Exec";
DWORD dwNgopi = 0; //DM DWORD adrNOKICK, adrPASANG, adrDEFUSE, adrDEFUSE2, adrNORES2, adrNORES, adrNORES3, adrNORES4, adrHIT_SG, adrHIT2 = 0; DWORD adrWall, adrMNZ1, adrMNZ2, adrAmmo, CheckProtection; //
//Check Apakah address tersebut di protect ? void InProtectAndModify(DWORD Offset, DWORD Pointer, DWORD Length){ VirtualProtect((void *)Offset, Length, PAGE_EXECUTE_READWRITE, &CheckProtection); // check apakah address tsb dikunci / protected ? kalau iya, lakukan unprotect RtlMoveMemory((void *)Offset, (const void*)Pointer, Length); // ubah address tsb menjadi writeable, dan lakukan patch dengan MEMpatch VirtualProtect((void *)Offset, Length, CheckProtection, &CheckProtection); // protect lagi address tsb biar gk kena satpam }
// Lakukan patch terhadap memory void MEMhack( BYTE *Offset, BYTE *ByteArray, DWORD Length){ InProtectAndModify((DWORD)Offset , (DWORD)ByteArray , 1); } //______________________________________________||________________________________________ void UnknowProtectAndIbenGanteng(void *adr, void *ptr, int size) { unsigned long CheckProtection; VirtualProtect((void*)adr,size,PAGE_READWRITE, &CheckProtection); RtlMoveMemory((void*)adr,(const void*)ptr,size); VirtualProtect((void*)adr,size,CheckProtection, 0); } int __fastcall Silincah_Yovie(void) { return 0; } DWORD WINAPI ProccesAllHacking(LPVOID param) { while (1) { Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie(); Silincah_Yovie();
//MAPHACK ON Mini Indo
if (GetAsyncKeyState(VK_MBUTTON)&1) { DWORD dwNgopi = (DWORD)GetModuleHandleA(dwGambler007); adrPASANG = dwNgopi + (DWORD)PASANG; adrDEFUSE = dwNgopi + (DWORD)DEFUSE; adrNORES = dwNgopi + (DWORD)NORES; if (dwNgopi > 0) { //DM UnknowProtectAndIbenGanteng((void *)(adrPASANG),(void*)(PBYTE)"\x00\x00\x00\x00",4); UnknowProtectAndIbenGanteng((void *)(adrNORES),(void*)(PBYTE)"\x00\x00\x00\x00",4); UnknowProtectAndIbenGanteng((void *)(adrDEFUSE),(void*)(PBYTE)"\x00\x00\x00\x00",4); MessageBeep(0); Beep(329,300); Beep(493,300); Beep(698,300); Beep(659,300); } }
Sleep(5); } return (0); } BOOL WINAPI DllMain ( HMODULE hDll, DWORD dwReason, LPVOID lpReserved ) { DisableThreadLibraryCalls(hDll); if (dwReason == DLL_PROCESS_ATTACH) { MessageBox (0,":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\nReleased on : Tuesday. April 19.2011\nCreator : Iben Hadi Putro a.k.a ™X-beNz™\nGreetz To :\n [*]Wicahyo\n [*]Farid\n [*]Arifin Mcdohl\n [*]Rizky Nanda Parely\n:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\nFitur :\n [*]Pasang Bomb 0 Detik + Defuse 0 Detik + No Respawn\n [*] Respawn All Map termasuk Map 4vs4\n:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\nHotkey : Gatau deh >,< [hehe Allways ON kaka]\n\nCara Pakai :\nLah tinggal maen kok susah amat , orang Allways on sih >,< wkwkwk\n:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\nNB :\n [*]HWID Protect !\n [*]Not For Share To Public !\n [*]Dan yang paling Penting :\nCheat ini bukan punya PKL , F2F , C2 Forum , Galaxy Cyber\n[Wow sampah tuh mereka cuma bisa colong DLL]\n:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\nMy FB : http://facebook.com/BlazeNewbieProgrammer\nMy YM : [You must be registered and logged in to see this link.]\n:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::","(C)™X-beNz™ a.k.a Iben Hadi Putro | 2011", MB_OK | MB_ICONINFORMATION); CreateThread(0, 0, (LPTHREAD_START_ROUTINE)ProccesAllHacking, 0, 0, 0);
TCHAR strDLLName [MAX_PATH]; GetModuleFileName(hDll, strDLLName , MAX_PATH); if (strstr(strDLLName, "IbenMemangGanteng.dll") <= 0) { MessageBox(0, "Wow kamu maling DLL saya >,<", "™X-beNz™", MB_OK + MB_ICONSTOP ); MessageBox(0, "kalo ndak dapat persetujuan dari Iben\nMending che*t nya gak usah dipake !\nNanti kalo kesebar gimana ?\nMau tanggung jawab loe ?\nHoaaamsss ....\nTanya sana sama Iben nya langsung !\nBoleh make che*t nya apa enggak !.", "™X-beNz™", MB_OK + MB_ICONSTOP ); MessageBox(0, "Gw kasih hukuman karena lo udah rename DLL gw (MAMPUS)", "Rasakan ini !!", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 10x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 9x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 8x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 7x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 6x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 5x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 4x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 3x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 2x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); MessageBox(0, "Mampus kompi anda akan Hang setelah anda menekan 1x Massage ini", "Hukuman buat maling seperti PKL !", MB_OK + MB_ICONSTOP ); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ShellExecute(NULL, "open", "http://kombre.co.cc/",NULL,NULL,SW_SHOWNORMAL); ExitProcess(0); } } return TRUE; | |
|