VirtualProtectEx menu

User Tag List

Results 1 to 3 of 3
  1. #1
    Lindoz12's Avatar Member
    Reputation
    19
    Join Date
    Apr 2007
    Posts
    51
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    VirtualProtectEx

    Hello!... Again

    Alright, so i was trying to make my first WoW hack but got some problems! I think VirtualProtectEx is the thing thats wrong, i dont get it:confused: Here is my code :
    Code:
    #include <windows.h>
    #include <tlhelp32.h>
    #include <iostream>
    #include <cstring>
    using namespace std;
    int main()
    {
    LONG address = 0x008D6080; 
    int newvalue = 18;
    HWND hwnd;
    HANDLE phandle;
    DWORD pid;
    hwnd = FindWindow(NULL, "World of Warcraft"); 
     
    if (hwnd != 0) 
    { 
    cout << "World of Warcraft found...";
    GetWindowThreadProcessId(hwnd, &pid); 
    phandle = OpenProcess(PROCESS_ALL_ACCESS, 0, pid); 
    }
    else
    {
    Sleep(500);
    main(); 
    }
    if(phandle != 0)
    {
    while(true)
    {
               cout << "Injection found...";
                               WriteProcessMemory(phandle, (LPVOID) address, (LPVOID) &newvalue, sizeof(newvalue), 0);
    VirtualProtectEx(phandle, (LPVOID) address, sizeof(newvalue), PAGE_READWRITE, &pid);
    WriteProcessMemory(phandle, (LPVOID) address, (LPVOID) &newvalue, sizeof(newvalue), 0);
    cout << "Injection Complete...";
    Sleep(1000); 
    }
    }
    cin.get();
    return 0;
    }

    VirtualProtectEx
  2. #2
    Xarg0's Avatar Member
    Reputation
    61
    Join Date
    Jan 2008
    Posts
    389
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    If you'd read my post, you'd now whats wrong with your code...
    If you can't figure out your self what's wrong with your code just stop trying to code hacks...
    I hacked 127.0.0.1

  3. #3
    kynox's Avatar Account not activated by Email
    Reputation
    830
    Join Date
    Dec 2006
    Posts
    888
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Lindoz12 View Post
    Hello!... Again

    Alright, so i was trying to make my first WoW hack but got some problems! I think VirtualProtectEx is the thing thats wrong, i dont get it:confused: Here is my code :
    Code:
    #include <windows.h>
    #include <tlhelp32.h>
    #include <iostream>
    #include <cstring>
    using namespace std;
    int main()
    {
    LONG address = 0x008D6080; 
    int newvalue = 18;
    HWND hwnd;
    HANDLE phandle;
    DWORD pid;
    hwnd = FindWindow(NULL, "World of Warcraft"); 
     
    if (hwnd != 0) 
    { 
    cout << "World of Warcraft found...";
    GetWindowThreadProcessId(hwnd, &pid); 
    phandle = OpenProcess(PROCESS_ALL_ACCESS, 0, pid); 
    }
    else
    {
    Sleep(500);
    main(); 
    }
    if(phandle != 0)
    {
    while(true)
    {
               cout << "Injection found...";
                               WriteProcessMemory(phandle, (LPVOID) address, (LPVOID) &newvalue, sizeof(newvalue), 0);
    VirtualProtectEx(phandle, (LPVOID) address, sizeof(newvalue), PAGE_READWRITE, &pid);
    WriteProcessMemory(phandle, (LPVOID) address, (LPVOID) &newvalue, sizeof(newvalue), 0);
    cout << "Injection Complete...";
    Sleep(1000); 
    }
    }
    cin.get();
    return 0;
    }
    Every post i see of yours, is you asking for help with code you obviously don't understand.
    Instead of begging others for help, why don't you actually put the time into learning the programming language for yourself?

Similar Threads

  1. vb.net ReadProcessMemory and VirtualProtectEx example.
    By abuckau907 in forum Programming
    Replies: 3
    Last Post: 11-29-2012, 12:43 AM
All times are GMT -5. The time now is 01:36 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search