[Hack] Open Source Track Hack menu

User Tag List

Page 2 of 2 FirstFirst 12
Results 16 to 27 of 27
  1. #16
    jagged software's Avatar Member
    Reputation
    -4
    Join Date
    Feb 2009
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Cool thanks for posting the source. I'm into c++, but I wanted to get into autoit for simple tasks. Big help, thanks! +rep

    [Hack] Open Source Track Hack
  2. #17
    Dead_Man's Avatar Active Member
    Reputation
    35
    Join Date
    Jan 2007
    Posts
    161
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Cleaned the code up a lot

    NoMorePasting.com

    To compare: NoMorePasting.com

    By the way, where did you get 0x3C40 pointer?
    Last edited by Dead_Man; 03-14-2009 at 03:26 AM.

  3. #18
    elinventor's Avatar Member
    Reputation
    1
    Join Date
    Mar 2009
    Posts
    10
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    ¿Is it a teleport?

  4. #19
    SKU's Avatar Contributor
    Reputation
    306
    Join Date
    May 2007
    Posts
    565
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Dead_Man View Post
    ...
    By the way, where did you get 0x3C40 pointer?
    Have a look at the memory editing section, it's quite simple.


    1) 3.0.9 Offsets thread, theres a LUA dump -> 0x006333E0 - UnitTracking
    2) Open WoW in IDA/OllyDbg and take a look
    3) Follow the function flow, you'll then find a call to this function at 0x0062E160.

    Code:
    0062E160  /$  53               PUSH EBX
    0062E161  |.  56               PUSH ESI
    0062E162  |.  8BF1             MOV ESI,ECX ; ECX = ESI = basepointer
    0062E164  |.  8B46 08          MOV EAX,DWORD PTR DS:[ESI+8]
    0062E167  |.  8B58 04          MOV EBX,DWORD PTR DS:[EAX+4]
    0062E16A  |.  57               PUSH EDI
    0062E16B  |.  8B38             MOV EDI,DWORD PTR DS:[EAX]
    0062E16D  |.  E8 BEE0E3FF      CALL Wow.0046C230
    0062E172  |.  3BF8             CMP EDI,EAX
    0062E174  |.  75 04            JNZ SHORT Wow.0062E17A
    0062E176  |.  3BDA             CMP EBX,EDX
    0062E178  |.  74 06            JE SHORT Wow.0062E180
    0062E17A  |>  5F               POP EDI
    0062E17B  |.  5E               POP ESI
    0062E17C  |.  33C0             XOR EAX,EAX
    0062E17E  |.  5B               POP EBX
    0062E17F  |.  C3               RETN
    0062E180  |>  8B86 38100000    MOV EAX,DWORD PTR DS:[ESI+1038] ; [basepointer + 0x1038]
    0062E186  |.  8B80 88130000    MOV EAX,DWORD PTR DS:[EAX+1388] ; [[basepointer + 0x1038] + 0x1388] = tracking stuff
    0062E18C  |.  5F               POP EDI 
    0062E18D  |.  5E               POP ESI
    0062E18E  |.  5B               POP EBX
    0062E18F  \.  C3               RETN
    [[basepointer + 0x1038] + 0x1388] = tracking stuff

    4) Have another look at the 3.0.9 Offsets thread, Arigity posted the local playerbase pointer

    [[[[[0x127F13C]+0x30]+0x28]+0x1038]+0x1388] = tracking stuff

    Greetings

  5. #20
    Jadd's Avatar 🐸 Premium Seller
    Reputation
    1514
    Join Date
    May 2008
    Posts
    2,433
    Thanks G/R
    81/335
    Trade Feedback
    1 (100%)
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Dead_Man View Post
    By the way, where did you get 0x3C40 pointer?
    Cheat Engine works fine.

    1. Search for Unknown Initial value as Float.
    2. Move a direction.
    3. Search for Increased/Decreased value.
    4. Repeat 2 & 3 until you get a few results.
    5. Find the closest address to the Player Base address ([[[0x127F13C] + 0x30] + 0x28])
    6. ???
    7. Profit.

    It's a lot quicker than it sounds.



    Originally Posted by Leenotrio View Post
    Is it meant to be in a specific folder? Because nothing happens when i have WoW open, have logged in and entered world, and type in any of the numbers listed in the readme. Doesnt work with letters either.
    Are you running XP or Vista?


    Originally Posted by Oconline View Post
    This is a very nice guide while learning the memory functions. I have a problem though. I used

    $read = _MemoryRead("0x" & hex(0x00528E14), $program)
    MsgBox(0, "Test", "Points: " &$read)

    And this worked, but if I want to use the

    _MemoryWrite-function

    to change that value, what do I have to do?
    Thanks.
    _MemoryWrite("0x" & hex(0x00528E14), $program, 'new value', 'type')

    Where 'new value' will be the new value written to the address 0x00528E14.
    'type' will be the type of address, for example, 'byte', 'word', 'dword', 'float' etc.

  6. #21
    shingetterrobo's Avatar Banned
    Reputation
    15
    Join Date
    Mar 2009
    Posts
    29
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    its the long version of PLAYER_TRACK_CREATURES

  7. #22
    morgalis's Avatar Member
    Reputation
    1
    Join Date
    Mar 2009
    Posts
    22
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    is memory write not detected by warden?
    is this safe to play with?

  8. #23
    UnknOwned's Avatar Legendary
    Reputation
    713
    Join Date
    Nov 2006
    Posts
    583
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by morgalis View Post
    is memory write not detected by warden?
    is this safe to play with?
    Im pretty sure that if you delete scan.dll then you should not fear of getting banned for "memory write".
    Just don't write to any offsets that warden scan for...

  9. #24
    Cursed's Avatar Contributor
    Reputation
    270
    Join Date
    Jun 2007
    Posts
    1,380
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by UnknOwned View Post
    Im pretty sure that if you delete scan.dll then you should not fear of getting banned for "memory write".
    Just don't write to any offsets that warden scan for...
    He's totally right!
    Hint: Look in the system32 folder for the hidden Warden files...

  10. #25
    Robske's Avatar Contributor
    Reputation
    305
    Join Date
    May 2007
    Posts
    1,062
    Thanks G/R
    3/4
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Cursed View Post
    He's totally right!
    Hint: Look in the system32 folder for the hidden Warden files...

    delete/rename kernel32.dll
    "Always code as if the guy who ends up maintaining your code will be a violent psychopath who knows where you live." - Martin Golding
    "I cried a little earlier when I had to poop" - Sku

  11. #26
    morgalis's Avatar Member
    Reputation
    1
    Join Date
    Mar 2009
    Posts
    22
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Funny guys , after banned 12 accounts i think you will have also paranoia.
    btw new base pointer available?

    cheers

  12. #27
    SKU's Avatar Contributor
    Reputation
    306
    Join Date
    May 2007
    Posts
    565
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    all sold out, sorry.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. Wow hack for 2.3.3 [Open Source] Delphi
    By robotkid in forum WoW Memory Editing
    Replies: 15
    Last Post: 05-23-2018, 10:53 PM
  2. Any open source hacks for 3.3.5/4/.3.4/5.4.8?
    By Chas3down in forum WoW Memory Editing
    Replies: 0
    Last Post: 10-03-2016, 11:46 PM
  3. [Hack] Found a open source Map/Zoom hack that needs updated
    By dtmajors in forum PoE Bots and Programs
    Replies: 1
    Last Post: 03-09-2016, 01:16 AM
  4. [C#] NWOHack - An open-source in-process memory hack for NeverWinter
    By Jadd in forum Neverwinter Bots and Programs
    Replies: 23
    Last Post: 06-28-2013, 10:01 AM
  5. [Hack] Z Hack (Open Source)
    By FuryExploiting in forum World of Warcraft Bots and Programs
    Replies: 34
    Last Post: 10-06-2012, 07:40 AM
All times are GMT -5. The time now is 08:05 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search