-
Will try and fix tonight, or tomorrow at the latest.
-
Member
-
Member
100% its related to destroying WQGF addon in latest patch, where they protected some more api functions related to Group Finder
-
Member
Probably being warden scanned now
-
1.5.4
+7.2.X Patch
I need to improve my code a little, I have the jumps hardcoded. I could read the jumps or just set the flags. It had nothing to do with warden.
-
Post Thanks / Like - 3 Thanks
-
Member
Originally Posted by
DarkLinux
1.5.4
+7.2.X Patch
I need to improve my code a little, I have the jumps hardcoded. I could read the jumps or just set the flags. It had nothing to do with warden.
Thanks for the update, much appreciated
-
Member
Originally Posted by
DarkLinux
1.5.4
+7.2.X Patch
I need to improve my code a little, I have the jumps hardcoded. I could read the jumps or just set the flags. It had nothing to do with warden.
yeah i have looked over your code and noticed that you set 3 hardware breakpoints and when they triggered you advance instruction pointer by hardcoded 0x5d, 0x5a, 0x7f respectively on each. this time i guess this destination EIP(RIP) jump offset(s) changed. wanted to ask, what each breakpoint is for? whats purpose of each
and yeah, if breakpoints are on conditional jumps like jz/jnz, it might be better to just change Z flag
Last edited by necr0n0mic0n; 04-29-2017 at 07:51 PM.
-
Member
Originally Posted by
DarkLinux
1.5.4
+7.2.X Patch
1
I need to improve my code a little, I have the jumps hardcoded. I could read the jumps or just set the flags. It had nothing to do with warden.
Excellent - thanks for the update
-
Active Member
Originally Posted by
necr0n0mic0n
and yeah, if breakpoints are on conditional jumps like jz/jnz, it might be better to just change Z flag
Didn't tested this cheat for an year. But if it mention to support Windows XP... You can't just set Z flag here without using RF (Resume) Flag which is not supported by windows XP. Ofc you can change EIP to next instruction when doing it but where is the difference then... Know too much guys who still asking me to remake my cheats using "same methods" to work on this OS.
-
Member
Sup. Tried to use on private server 7.0.3 (22594) got http://puu.sh/vBRUI/97e0d15597.png every time. Tried all versions (from 1.5.0), no reaction. Any ideas how to fix it?
-
Member
Originally Posted by
Justsome
Sup. Tried to use on private server 7.0.3 (22594) got
http://puu.sh/vBRUI/97e0d15597.png every time. Tried all versions (from 1.5.0), no reaction. Any ideas how to fix it?
rename wow client to "Wow-64.exe"
and use version 1.5.1
Last edited by NightlyBlooD; 05-01-2017 at 06:01 AM.
-
Member
It showed the waay it supposed to be. But when I tried to enter script in game with BindPad it just threw it into the chat. Or it doesn't work this way?
UPD: Everything works, problem was in macro. Thx for help
Last edited by Justsome; 05-06-2017 at 12:53 AM.
-
Contributor
intressting --- ty man <3
-
Member
Originally Posted by
DarkLinux
1.5.4
+7.2.X Patch
I need to improve my code a little, I have the jumps hardcoded. I could read the jumps or just set the flags. It had nothing to do with warden.
Hey man, i have a request for you if it doesnt take too much of your time.
I need simple LUA unlock for x64 bit client for 5.4.8 based private server, could you make this for me i would appreciate it a lot!
Here is the wow exe if you need to get adresses
Wow-64.zip - Google Drive
Thank you!
Last edited by ivicask; 05-24-2017 at 02:45 AM.
-
Member
Broken with 7.2.5 patch that just released today.