
المشاركة الأصلية كتبت بواسطة MAX2FAX
guyes i need hacks for maple sea
هذا CRC Bypass
كود:
[enable]
alloc(newmem,2048)
alloc(blaaaa,3670018)
label(originalcode)
loadbinary(blaaaa,MapleStory.CEM)
newmem:
cmp ecx,00400000
jb originalcode
cmp ecx,00780000
ja originalcode
mov eax,blaaaa
sub eax,00400000
add ecx, eax
originalcode:
mov eax,[ebp+10]
push esi
push edi
jmp 00452454
0045244F:
jmp newmem
[disable]
0045244F:
mov eax,[ebp+10]
push esi
push edi
dealloc(newmem)
dealloc(blaaaa)
وهذا لسحب الايتيم بسرعة
كود:
[enable]
004801CF:
nop
004801CF:
nop
[disable]
004801CF:
jne 00480208
وهذا الكود GOd Mood
كود:
[enable]
00623031:
je 006237bc
[disable]
00623031:
jne 006237bc
وهذا للطيراان
كود:
[enable]
006526F5:
jne 006527af
[disable]
006526F5:
je 006527af
وهذا لظرب الوحووش
كود:
[ENABLE]
registersymbol(dvtype)
alloc(dv,100)
alloc(uvx,100)
alloc(uvy,100)
alloc(dvtype,4)
label(normalx)
label(normaly)
label(endx)
label(endy)
label(backdv)
label(backuvy)
label(backuvx)
label(dvzero)
label(dvone)
label(uvzero)
label(uvone)
// setting monsters to character coordinates
dv:
mov eax, [74B8B0]
push eax
mov eax, [eax+390]
mov [ebx+398], eax
add [ebx+398], 100
cmp [dvtype], 0
je dvzero
cmp [dvtype], 1
je dvone
sub eax, 100
jmp dvzero
dvone:
add eax, 100
dvzero:
mov [ebx+390], eax
pop eax
mov eax, [eax+394]
mov [ebx+394], eax
mov [ebx+39C], eax
jmp backdv
// filtering monsters coordinates
uvx:
push ecx
mov ecx, [74B8B0]
add ecx,390
cmp ebx, ecx
je normalx
mov ecx, [ecx]
cmp [dvtype], 0
je uvzero
cmp [dvtype], 1
je uvone
sub ecx, 100
jmp uvzero
uvone:
add ecx, 100
uvzero:
cmp [ebx],ecx
je endx
normalx:
mov [ebx],eax
endx:
pop ecx
mov edi, [ebp+10]
jmp backuvx
// filtering monsters coordinates
uvy:
push ecx
mov ecx, [74B8B0]
add ecx,394
cmp edi, ecx
je normaly
mov ecx, [ecx]
cmp [edi],ecx
je endy
normaly:
mov [edi],eax
endy:
pop ecx
mov ebx, [ebp+14]
jmp backuvy
0050D657:
jmp dv
nop
backdv:
00655D5B:
jmp uvx
backuvx:
00655DC0:
jmp uvy
backuvy:
[DISABLE]
0050D657:
mov [ebx+39c], eax
00655D5B:
mov [ebx],eax
mov edi, [ebp+10]
00655DC0:
mov [edi],eax
mov ebx, [ebp+14]
dealloc(dv)
dealloc(uvx)
dealloc(uvy)
dealloc(dvtype)
unregistersymbol(dvtype)
لسرقة الايتيم
كود:
[enable]
alloc(itemvac, 1024)
label(returnhere)
itemvac:
pushad
mov ecx, [ebp+8]
mov ebx, [ebp-24]
mov [ecx], ebx
mov [ecx+4], eax
mov ecx, eax
mov eax, ebx
lea edx, [eax-19]
mov [ebp-34], edx
lea edx, [ecx-32]
add eax, 19
add ecx, A
mov [ebp-30], edx
mov [ebp-2C], eax
mov [ebp-28], ecx
popad
push eax
push [ebp-24]
lea eax,[ebp-34]
jmp returnhere
004869AC:
jmp itemvac
nop
nop
returnhere:
[disable]
004869AC:
push eax
push [ebp-24]
lea eax,[ebp-34]
dealloc(itemvac, 1024)
unregistersymbol(returnhere)
هذا المهم