如果您是新手,請使用DLL方法: http://bbs.yoyo-do.com/thread-724222-1-1.html
注意!
Attention!
※請不要用於商業用途
1. 這個數據只能在TWMS 1.13 上使用,其他版本必須更新Address (A11481, A11487)
1. This script is for TWMS(Taiwan MapleStory) 1.13 only. If you want to use on another version of MapleStory, please update your addresses.
2. 我不是MSCRC的原作者,我只是把他寫成數據罷了!
2. I'm not the origin. I just rewrite it with CE Assembly script.
3. 請在使用任何數據前,先執行這個數據!
3. Please execute this script FIRST before using your hack.
4. 如果你無法執行這個數據,請確認Memory View->View->Kernelmode symbols 是否打勾
4. If you can't execute this script, please press Memory view->View. Check whether "Kernelmode symbols" item is checked.
4. 這個數據只能不能在CE 5.3的版本執行,請升級到5.4, 5.5 或 5.6, (ME是以5.4為核心),不能再MS- Memory Writer上使用!(以5.3為核心)
4. This script cannot work fine with CE 5.3. Please update to 5.4, 5.5 or 5.6. (MoonLight Engine is based on CE 5.4).
- [Enable]
- //MS+HS CRC Bypass v1.1 for "TWMS 1.13" & "HackShield 5.3.5.1024"
- //CE Assembly Script by nimo1993. I love CE!
- //The original address of MS-CRC Bypass is not found by me.
- //If you can't execute this script, please press "Memory view"->"View". Check whether "Kernelmode symbols" item is checked.
- //如果你無法執行這個數據,請按Memory View->View->Kernelmode symbols 打勾
- Alloc(CRCBypass,512)
- Alloc(FakeDump,8376320)
- Label(HSCRCBypass)
- Label(BackToOP)
- Label(MSCRCBypass)
- Label(Normal)
- Label(MSmemcpy)
- RegisterSymbol(HSCRCBypass)
- RegisterSymbol(MSCRCBypass)
- RegisterSymbol(FakeDump)
- CreateThread(MSmemcpy)
- CRCBypass:
- HSCRCBypass:
- mov eax, fs:[20]
- cmp eax, [esp+0c]
- jne BackToOP
- mov fs:[34], 57
- xor eax, eax
- ret 000c
- BackToOP:
- push ebp
- mov ebp, esp
- jmp OpenProcess+5
- MSCRCBypass:
- push eax
- lea eax, [ecx]
- cmp eax, 00401000
- jb Normal
- cmp eax, 00BFE000
- ja Normal
- push ebx
- mov ebx, FakeDump
- sub eax, 00401000
- add eax, ebx
- movzx ecx, byte ptr [eax]
- pop ebx
- pop eax
- jmp Normal+04
- Normal:
- pop eax
- movzx ecx, byte ptr [ecx]
- mov edx, [ebp+14]
- jmp 00A11487 //A11481 + 6
- MSmemcpy:
- mov edi, FakeDump
- mov esi, 00401000
- mov ecx, 001FF400
- repe movsd
- ret
- OpenProcess:
- jmp HSCRCBypass
- //AOB: 0F B6 09 8B
- 00A11481:
- jmp MSCRCBypass
- nop
- [Disable]
- OpenProcess:
- mov edi, edi
- push ebp
- mov ebp, esp
- A11481:
- movzx ecx, byte ptr [ecx]
- mov edx, [ebp+14]
- DeAlloc(CRCBypass)
- DeAlloc(FakeDump)
- UnregisterSymbol(HSCRCBypass)
- UnregisterSymbol(MSCRCBypass)
- UnregisterSymbol(FakeDump)
只是你不必放DLL於CE目錄下,全部交給CE自己執行.
不知這種數據該放在代碼發布區,還是這裡...
沒有留言:
張貼留言