Tampilkan postingan dengan label Point Blank. Tampilkan semua postingan
Tampilkan postingan dengan label Point Blank. Tampilkan semua postingan

Cara Membuat Injector Transparan Image

Bahan-bahan :

[*] Niat
[*] Visual Basic 6 (bisa yang portable, bisa juga yg installable)
[*] gambar berekstensi .png (save as juga dalam format gif sebagai patokan ukuran gambar)



oke lanjut... pertama2 kita buka dulu vb6 nya...
File>New Project Standard EXE

tambahkan 2 buah timer

pada properties form, pilih picture lalu pilih gambar gif mu tadi
dan sesuaikan ukuran form dengan gambar
Posted Image

lalu buat 5 buah modul dan beri nama : basMain, modInjection, modBrowser, modProcess, OnTopCrot
isikan koding berikut kedalamnya


BasMain

Option Explicit

Public Declare Function GdipCreateFromHDC Lib "gdiplus" (ByVal hdc As Long, graphics As Long) As GpStatus
Public Declare Function GdipCreateFromHWND Lib "gdiplus" (ByVal hwnd As Long, graphics As Long) As GpStatus
Public Declare Function GdipDeleteGraphics Lib "gdiplus" (ByVal graphics As Long) As GpStatus
Public Declare Function GdipGetDC Lib "gdiplus" (ByVal graphics As Long, hdc As Long) As GpStatus
Public Declare Function GdipReleaseDC Lib "gdiplus" (ByVal graphics As Long, ByVal hdc As Long) As GpStatus
Public Declare Function GdipDrawImageRect Lib "gdiplus" (ByVal graphics As Long, ByVal image As Long, ByVal x As Single, ByVal y As Single, ByVal Width As Single, ByVal Height As Single) As GpStatus
Public Declare Function GdipLoadImageFromFile Lib "gdiplus" (ByVal fileName As String, image As Long) As GpStatus
Public Declare Function GdipCloneImage Lib "gdiplus" (ByVal image As Long, cloneImage As Long) As GpStatus
Public Declare Function GdipGetImageWidth Lib "gdiplus" (ByVal image As Long, Width As Long) As GpStatus
Public Declare Function GdipGetImageHeight Lib "gdiplus" (ByVal image As Long, Height As Long) As GpStatus
Public Declare Function GdipCreateBitmapFromHBITMAP Lib "gdiplus" (ByVal hbm As Long, ByVal hpal As Long, bitmap As Long) As GpStatus
Public Declare Function GdipBitmapGetPixel Lib "gdiplus" (ByVal bitmap As Long, ByVal x As Long, ByVal y As Long, color As Long) As GpStatus
Public Declare Function GdipBitmapSetPixel Lib "gdiplus" (ByVal bitmap As Long, ByVal x As Long, ByVal y As Long, ByVal color As Long) As GpStatus
Public Declare Function GdipDisposeImage Lib "gdiplus" (ByVal image As Long) As GpStatus
Public Declare Function GdipCreateBitmapFromFile Lib "gdiplus" (ByVal fileName As Long, bitmap As Long) As GpStatus

Public Declare Function ReleaseCapture Lib "user32" () As Long
Public Declare Function SendMessage Lib "user32" Alias "SendMessageA" (ByVal hwnd As Long, ByVal wMsg As Long, ByVal wParam As Long, lParam As Any) As Long

Public Const HTCAPTION = 2
Public Const WM_NCLBUTTONDOWN = &HA1
Public Const WM_SYSCOMMAND = &H112

Public Type GdiplusStartupInput
GdiplusVersion As Long
DebugEventCallback As Long
SuppressBackgroundThread As Long
SuppressExternalCodecs As Long
End Type

Public Declare Function GdiplusStartup Lib "gdiplus" (token As Long, inputbuf As GdiplusStartupInput, Optional ByVal outputbuf As Long = 0) As GpStatus
Public Declare Sub GdiplusShutdown Lib "gdiplus" (ByVal token As Long)

Public Enum GpStatus
Ok = 0
GenericError = 1
InvalidParameter = 2
OutOfMemory = 3
ObjectBusy = 4
InsufficientBuffer = 5
NotImplemented = 6
Win32Error = 7
WrongState = 8
Aborted = 9
FileNotFound = 10
ValueOverflow = 11
AccessDenied = 12
UnknownImageFormat = 13
FontFamilyNotFound = 14
FontStyleNotFound = 15
NotTrueTypeFont = 16
UnsupportedGdiplusVersion = 17
GdiplusNotInitialized = 18
PropertyNotFound = 19
PropertyNotSupported = 20
End Enum


modInjection

Option Explicit
Private Declare Function GetProcAddress Lib "kernel32" (ByVal hModule As Long, _
ByVal lpProcName As String) As Long
Private Declare Function GetModuleHandle Lib "kernel32" Alias "GetModuleHandleA" (ByVal lpModuleName As String) As Long
Private Declare Function LoadLibrary Lib "kernel32" Alias "LoadLibraryA" (ByVal lpLibFileName As String) As Long
Private Declare Function VirtualAllocEx Lib "kernel32" (ByVal hProcess As Long, _
lpAddress As Any, _
ByVal dwSize As Long, _
ByVal fAllocType As Long, _
flProtect As Long) As Long
Private Declare Function WriteProcessMemory Lib "kernel32" (ByVal hProcess As Long, _
ByVal lpBaseAddress As Any, _
lpBuffer As Any, _
ByVal nSize As Long, _
lpNumberOfBytesWritten As Long) As Long
Private Declare Function CreateRemoteThread Lib "kernel32" (ByVal ProcessHandle As Long, _
lpThreadAttributes As Long, _
ByVal dwStackSize As Long, _
ByVal lpStartAddress As Any, _
ByVal lpParameter As Any, _
ByVal dwCreationFlags As Long, _
lpThreadID As Long) As Long
Private Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)


Public Sub InjectDll(DllPath As String, _
ProsH As Long)


Dim DLLVirtLoc As Long
Dim DllLength As Long

Dim inject As Long
Dim LibAddress As Long
Dim CreateThread As Long
Dim ThreadID As Long
Dim Bla As VbMsgBoxResult
g_loadlibary:
LibAddress = GetProcAddress(GetModuleHandle("kernel32.dll"), "LoadLibraryA")
If LibAddress = 0 Then
Bla = MsgBox("Can't find LoadLibrary API from kernel32.dll", vbYesNo, "ERROR")
If Bla = vbYes Then
GoTo g_loadlibary
Else 'NOT BLA...
Exit Sub
End If
End If
g_virutalallocex:
DllLength = Len(DllPath)
DLLVirtLoc = VirtualAllocEx(ProsH, 0, DllLength, &H1000, ByVal &H4)
If DLLVirtLoc = 0 Then
Bla = MsgBox("VirtualAllocEx API failed! - try again?", vbYesNo, "ERROR")
If Bla = vbYes Then
GoTo g_virutalallocex
Else 'NOT BLA...
Exit Sub
End If
End If
g_writepmemory:
inject = WriteProcessMemory(ProsH, ByVal DLLVirtLoc, ByVal DllPath, DllLength, vbNull)
If inject = 0 Then
Bla = MsgBox("Failed to Write DLL to Process! - try again?", vbYesNo, "ERROR")
If Bla = vbYes Then
GoTo g_writepmemory
Else 'NOT BLA...
Exit Sub
End If
End If
g_creatthread:
CreateThread = CreateRemoteThread(ProsH, ByVal 0, 0, ByVal LibAddress, ByVal DLLVirtLoc, 0, ThreadID)
If CreateThread = 0 Then
Bla = MsgBox("Failed to Create Thead! - try again?", vbYesNo, "ERROR")
If Bla = vbYes Then
GoTo g_creatthread
Else 'NOT BLA...
Exit Sub
End If
End If

MsgBox "Crooooot!!!^^", vbCritical, "USn-AutoInjector"

End Sub

Public Sub InjectExecute(ByVal sFlDLL As String)

Dim lProcInject As Long

lProcInject = OpenProcess(PROCESS_ALL_ACCESS, 0, IdTargetOne)
If lProcInject > "0" Then
Call InjectDll(sFlDLL, lProcInject)

End If
Call CloseHandle(lProcInject)


End Sub


modBrowser

Public Declare Function ShellExecute Lib "shell32.dll" Alias "ShellExecuteA" _
(ByVal hwnd As Long, _
ByVal lpOperation As String, _
ByVal lpFile As String, _
ByVal lpParameters As String, _
ByVal lpDirectory As String, _
ByVal nShowCmd As Long) As Long

Public Sub OpenURL(situs As String, sourceHWND As Long)
Call ShellExecute(sourceHWND, vbNullString, situs, vbNullString, vbNullString, 1)
End Sub


modProcess

Option Explicit
Public FileTarget As String
Public sFlDLL As String
Public IdTargetOne As Long
Private Const TH32CS_SNAPHEAPLIST As Long = &H1
Private Const TH32CS_SNAPPROCESS As Long = &H2
Private Const TH32CS_SNAPTHREAD As Long = &H4
Private Const TH32CS_SNAPMODULE As Long = &H8
Private Const TH32CS_SNAPALL As Double = (TH32CS_SNAPHEAPLIST Or TH32CS_SNAPPROCESS Or TH32CS_SNAPTHREAD Or TH32CS_SNAPMODULE)
Private Const MAX_PATH As Integer = 260
Public Const PROCESS_ALL_ACCESS As Long = &H1F0FFF
Private Type PROCESSENTRY32
dwSize As Long
cntUsage As Long
th32ProcessID As Long
th32DefaultHeapID As Long
th32ModuleID As Long
cntThreads As Long
th32ParentProcessID As Long
pcPriClassBase As Long
dwFlags As Long
szExeFile As String * MAX_PATH
End Type
Private Type MODULEENTRY32
dwSize As Long
th32ModuleID As Long
th32ProcessID As Long
GlblcntUsage As Long
ProccntUsage As Long
modBaseAddr As Long
modBaseSize As Long
hModule As Long
szModule As String * 256
szExePath As String * 260
End Type
Private Type THREADENTRY32
dwSize As Long
cntUsage As Long
th32ThreadID As Long
th32OwnerProcessID As Long
tpBasePri As Long
tpDeltaPri As Long
dwFlags As Long
End Type
Private Const THREAD_SUSPEND_RESUME As Long = &H2
Private hThread As Long
Private Declare Function CreateToolhelp32Snapshot Lib "kernel32" (ByVal lFlags As Long, _
ByVal lProcessID As Long) As Long
Private Declare Function Module32First Lib "kernel32" (ByVal hSnapShot As Long, _
uProcess As MODULEENTRY32) As Long
Private Declare Function lstrlen Lib "kernel32" Alias "lstrlenA" (ByVal lpString As String) As Long
Private Declare Function GetFileTitle Lib "COMDLG32.DLL" Alias "GetFileTitleA" (ByVal lpszFile As String, _
ByVal lpszTitle As String, _
ByVal cbBuf As Integer) As Integer
Private Declare Function Thread32First Lib "kernel32.dll" (ByVal hSnapShot As Long, _
ByRef lpte As THREADENTRY32) As Boolean
Private Declare Function Thread32Next Lib "kernel32.dll" (ByVal hSnapShot As Long, _
ByRef lpte As THREADENTRY32) As Boolean
Public Declare Function OpenProcess Lib "kernel32" (ByVal dwDesiredAccess As Long, _
ByVal bInheritHandle As Long, _
ByVal dwProcessId As Long) As Long
Private Declare Function TerminateProcess Lib "kernel32" (ByVal hProcess As Long, _
ByVal uExitCode As Long) As Long
Public Declare Function FindWindow Lib "user32" Alias "FindWindowA" (ByVal Classname As String, _
ByVal WindowName As String) As Long
Private Declare Function PostMessage Lib "user32" Alias "PostMessageA" (ByVal hwnd As Long, _
ByVal wMsg As Long, _
ByVal wParam As Long, _
lParam As Any) As Long
Private Declare Function Process32First Lib "kernel32" (ByVal hSnapShot As Long, _
uProcess As PROCESSENTRY32) As Long
Private Declare Function Process32Next Lib "kernel32" (ByVal hSnapShot As Long, _
uProcess As PROCESSENTRY32) As Long
Public Declare Function CloseHandle Lib "kernel32" (ByVal hObject As Long) As Long
Private Declare Function OpenThread Lib "kernel32.dll" (ByVal dwDesiredAccess As Long, _
ByVal bInheritHandle As Boolean, _
ByVal dwThreadId As Long) As Long
Private Declare Function ResumeThread Lib "kernel32.dll" (ByVal hThread As Long) As Long
Private Declare Function SuspendThread Lib "kernel32.dll" (ByVal hThread As Long) As Long

Public Function NTProcessList() As Long

Dim fileName As String

Dim ExePath As String
Dim hProcSnap As Long
Dim hModuleSnap As Long
Dim lProc As Long
Dim uProcess As PROCESSENTRY32
Dim uModule As MODULEENTRY32
On Error Resume Next
hProcSnap = CreateToolhelp32Snapshot(TH32CS_SNAPALL, 0&)
uProcess.dwSize = Len(uProcess)
lProc = Process32First(hProcSnap, uProcess)
Do While lProc
If uProcess.th32ProcessID <> 0 Then
hModuleSnap = CreateToolhelp32Snapshot(TH32CS_SNAPALL, uProcess.th32ProcessID)
uModule.dwSize = Len(uModule)
Module32First hModuleSnap, uModule
If hModuleSnap > 0 Then
ExePath = StripNulls(uModule.szExePath)
fileName = GetFName(ExePath)
If FileTarget = fileName Then
IdTargetOne = uProcess.th32ProcessID
End If
End If
End If
lProc = Process32Next(hProcSnap, uProcess)
Loop
Call CloseHandle(hProcSnap)
Call CloseHandle(lProc)
On Error GoTo 0

End Function

Private Function StripNulls(ByVal sStr As String) As String


StripNulls = Left$(sStr, lstrlen(sStr))

End Function

Public Function GetFName(fn) As String
Dim f%, n%
GetFName = fn
f% = InStr(fn, "\")
Do While f%
n% = f%
f% = InStr(n% + 1, fn, "\")
Loop
If n% > 0 Then GetFName = Mid$(fn, n% + 1)
End Function

Private Function Thread32Enum(ByRef Thread() As THREADENTRY32, _
ByVal lProcessID As Long) As Long

Dim THREADENTRY32 As THREADENTRY32
Dim hThreadSnap As Long
Dim lThread As Long

On Error Resume Next
ReDim Thread(0) As THREADENTRY32
hThreadSnap = CreateToolhelp32Snapshot(TH32CS_SNAPTHREAD, lProcessID)
THREADENTRY32.dwSize = Len(THREADENTRY32)
If Thread32First(hThreadSnap, THREADENTRY32) = False Then
Thread32Enum = -1
Exit Function
Else
ReDim Thread(lThread) As THREADENTRY32
Thread(lThread) = THREADENTRY32
End If
Do
If Thread32Next(hThreadSnap, THREADENTRY32) = False Then
Exit Do
Else
lThread = lThread + 1
ReDim Preserve Thread(lThread)
Thread(lThread) = THREADENTRY32
End If
Loop
Thread32Enum = lThread
Call CloseHandle(hThreadSnap)
On Error GoTo 0

End Function






OnTopCrot

Public Type RECT
Left As Long
Top As Long
Right As Long
Bottom As Long
End Type

Public Const HWND_TOPMOST = -1
Public Const HWND_NOTOPMOST = -2
Public Const SWP_NOSIZE = &H1

Public Declare Function SetWindowPos Lib "user32" (ByVal hwnd As Long, ByVal hWndInsertAfter As Long, ByVal x As Long, ByVal y As Long, ByVal cx As Long, ByVal cy As Long, ByVal wFlags As Long) As Long
Public Declare Function GetWindowRect Lib "user32" (ByVal hwnd As Long, lpRect As RECT) As Long


Form1


Option Explicit

Private Const ULW_OPAQUE = &H4
Private Const ULW_COLORKEY = &H1
Private Const ULW_ALPHA = &H2
Private Const BI_RGB As Long = 0&
Private Const DIB_RGB_COLORS As Long = 0
Private Const AC_SRC_ALPHA As Long = &H1
Private Const AC_SRC_OVER = &H0
Private Const WS_EX_LAYERED = &H80000
Private Const GWL_STYLE As Long = -16
Private Const GWL_EXSTYLE As Long = -20
Private Const HWND_TOPMOST As Long = -1
Private Const SWP_NOMOVE As Long = &H2
Private Const SWP_NOSIZE As Long = &H1
Private Const LWA_ALPHA As Long = &H2
Private winHwnd As Long
Private NamaDll As String

Private Type BLENDFUNCTION
BlendOp As Byte
BlendFlags As Byte
SourceConstantAlpha As Byte
AlphaFormat As Byte
End Type

Private Type Size
cx As Long
cy As Long
End Type

Private Type POINTAPI
x As Long
y As Long
End Type

Private Type RGBQUAD
rgbBlue As Byte
rgbGreen As Byte
rgbRed As Byte
rgbReserved As Byte
End Type

Private Type BITMAPINFOHEADER
biSize As Long
biWidth As Long
biHeight As Long
biPlanes As Integer
biBitCount As Integer
biCompression As Long
biSizeImage As Long
biXPelsPerMeter As Long
biYPelsPerMeter As Long
biClrUsed As Long
biClrImportant As Long
End Type

Private Type BITMAPINFO
bmiHeader As BITMAPINFOHEADER
bmiColors As RGBQUAD
End Type

Private Declare Function BitBlt Lib "gdi32.dll" (ByVal hDestDC As Long, ByVal x As Long, ByVal y As Long, ByVal nWidth As Long, ByVal nHeight As Long, ByVal hSrcDC As Long, ByVal xSrc As Long, ByVal ySrc As Long, ByVal dwRop As Long) As Long
Private Declare Function DeleteObject Lib "gdi32" (ByVal hObject As Long) As Long
Private Declare Function SetWindowLong Lib "user32" Alias "SetWindowLongA" (ByVal hwnd As Long, ByVal nIndex As Long, ByVal dwNewLong As Long) As Long
Private Declare Function AlphaBlend Lib "Msimg32.dll" (ByVal hdcDest As Long, ByVal nXOriginDest As Long, ByVal lnYOriginDest As Long, ByVal nWidthDest As Long, ByVal nHeightDest As Long, ByVal hdcSrc As Long, ByVal nXOriginSrc As Long, ByVal nYOriginSrc As Long, ByVal nWidthSrc As Long, ByVal nHeightSrc As Long, ByVal bf As Long) As Boolean
Private Declare Function UpdateLayeredWindow Lib "user32.dll" (ByVal hwnd As Long, ByVal hdcDst As Long, pptDst As Any, psize As Any, ByVal hdcSrc As Long, pptSrc As Any, ByVal crKey As Long, ByRef pblend As BLENDFUNCTION, ByVal dwFlags As Long) As Long
Private Declare Function CreateDIBSection Lib "gdi32.dll" (ByVal hdc As Long, pBitmapInfo As BITMAPINFO, ByVal un As Long, ByRef lplpVoid As Any, ByVal handle As Long, ByVal dw As Long) As Long
Private Declare Function GetDIBits Lib "gdi32.dll" (ByVal aHDC As Long, ByVal hBitmap As Long, ByVal nStartScan As Long, ByVal nNumScans As Long, lpBits As Any, lpBI As BITMAPINFO, ByVal wUsage As Long) As Long
Private Declare Function SetDIBits Lib "gdi32.dll" (ByVal hdc As Long, ByVal hBitmap As Long, ByVal nStartScan As Long, ByVal nNumScans As Long, lpBits As Any, lpBI As BITMAPINFO, ByVal wUsage As Long) As Long
Private Declare Function CreateCompatibleDC Lib "gdi32.dll" (ByVal hdc As Long) As Long
Private Declare Function SelectObject Lib "gdi32.dll" (ByVal hdc As Long, ByVal hObject As Long) As Long
Private Declare Function DeleteDC Lib "gdi32.dll" (ByVal hdc As Long) As Long
Private Declare Sub CopyMemory Lib "kernel32.dll" Alias "RtlMoveMemory" (Destination As Any, Source As Any, ByVal Length As Long)
Private Declare Function SetWindowPos Lib "user32.dll" (ByVal hwnd As Long, ByVal hWndInsertAfter As Long, ByVal x As Long, ByVal y As Long, ByVal cx As Long, ByVal cy As Long, ByVal wFlags As Long) As Long
Private Declare Function GetWindowLong Lib "user32.dll" Alias "GetWindowLongA" (ByVal hwnd As Long, ByVal nIndex As Long) As Long
Private Declare Function GetDC Lib "user32.dll" (ByVal hwnd As Long) As Long

Private Declare Function GetWindowLongA Lib "user32" (ByVal hwnd As Long, _
ByVal nIndex As Long) As Long
Private Declare Function SetWindowLongA Lib "user32" (ByVal hwnd As Long, _
ByVal nIndex As Long, _
ByVal dwNewLong As Long) As Long
Private Declare Function SetLayeredWindowAttributes Lib "user32" (ByVal hwnd As Long, _
ByVal crey As Byte, _
ByVal bAlpha As Byte, _
ByVal dwFlags As Long) As Long


Dim mDC As Long
Dim mainBitmap As Long
Dim blendFunc32bpp As BLENDFUNCTION
Dim token As Long
Dim oldBitmap As Long


Private Sub Form_Load()


Dim GpInput As GdiplusStartupInput
GpInput.GdiplusVersion = 1

Dim rc As RECT
GetWindowRect Me.hwnd, rc
SetWindowPos Me.hwnd, HWND_TOPMOST, rc.Left, rc.Top, 0, 0, SWP_NOSIZE ' always on top broooow :lol:

If GdiplusStartup(token, GpInput) <> 0 Then
Unload Me
End If

MakeTrans (App.Path & "\666.png") 'ganti nama file png yang mw d load sesuai keinginanmu
App.TaskVisible = False 'hidden aplikasi dari window taskmanager
'perintah menghindari aplikasi dijalankan 2 kali
'----------------------------------------
If App.PrevInstance Then
MsgBox "udah jalan om...jgn d pencet lagi aduuuuhh...", vbCritical
End
End If
'----------------------------------------
NginjekYuk
End Sub
Private Sub NginjekYuk()
Me.Caption = "beNsix™autoInjexcRot"
NamaDll = App.Path & "\" & "usnet.dll" ' nama dll yang mw d inject
FileTarget = "PointBlank.exe"
Timer1.Interval = 20
End Sub



Private Sub Form_Unload(Cancel As Integer)

Call GdiplusShutdown(token)
SelectObject mDC, oldBitmap
DeleteObject mainBitmap
DeleteObject oldBitmap
DeleteDC mDC

End Sub



Private Sub Timer1_Timer()

winHwnd = FindWindow(vbNullString, "HSUpdate")
If Not winHwnd = 0 Then 'jika ditemukan
NTProcessList 'deteksi process pointblank
InjectExecute (NamaDll) 'inject library
End
Else 'jika tidak
End If
End Sub

Private Sub Form_QueryUnload(Cancel As Integer, UnloadMode As Integer)
OpenURL "http://forum.us-net.org", Me.hwnd
Unload Me

End Sub


Private Sub Timer2_Timer()
If Me.Top < 100 Then Me.Top = Me.Top + 100 Else Me.Top = 1 Timer2.Enabled = False Timer1.Enabled = True Timer1.Interval = 1 End If End Sub Private Function MakeTrans(pngPath As String) As Boolean Dim tempBI As BITMAPINFO Dim tempBlend As BLENDFUNCTION Dim lngHeight As Long, lngWidth As Long Dim curWinLong As Long Dim img As Long Dim graphics As Long Dim winSize As Size Dim srcPoint As POINTAPI With tempBI.bmiHeader .biSize = Len(tempBI.bmiHeader) .biBitCount = 32 .biHeight = Me.ScaleHeight .biWidth = Me.ScaleWidth .biPlanes = 1 .biSizeImage = .biWidth * .biHeight * (.biBitCount / 8) End With mDC = CreateCompatibleDC(Me.hdc) mainBitmap = CreateDIBSection(mDC, tempBI, DIB_RGB_COLORS, ByVal 0, 0, 0) oldBitmap = SelectObject(mDC, mainBitmap) Call GdipCreateFromHDC(mDC, graphics) Call GdipLoadImageFromFile(StrConv(pngPath, vbUnicode), img) Call GdipGetImageHeight(img, lngHeight) Call GdipGetImageWidth(img, lngWidth) Call GdipDrawImageRect(graphics, img, 0, 0, lngWidth, lngHeight) curWinLong = GetWindowLong(Me.hwnd, GWL_EXSTYLE) SetWindowLong Me.hwnd, GWL_EXSTYLE, curWinLong Or WS_EX_LAYERED SetWindowPos Me.hwnd, HWND_TOPMOST, 0, 0, 0, 0, SWP_NOMOVE Or SWP_NOSIZE srcPoint.x = 0 srcPoint.y = 0 winSize.cx = Me.ScaleWidth winSize.cy = Me.ScaleHeight With blendFunc32bpp .AlphaFormat = AC_SRC_ALPHA .BlendFlags = 0 .BlendOp = AC_SRC_OVER .SourceConstantAlpha = 255 End With Call GdipDisposeImage(img) Call GdipDeleteGraphics(graphics) Call UpdateLayeredWindow(Me.hwnd, Me.hdc, ByVal 0&, winSize, mDC, srcPoint, 0, blendFunc32bpp, ULW_ALPHA) End Function


Untuk Keluhan Code

Bisa Tanyakan Kpd Wheldt

 :   dhani.hacker86@gmail.com
READMORE
 

Inject dll tanpa menggunakan injector

Ini Hanya Sekedar Tutorial Untuk Menggunakan Cheat PointBlank
Credit : N3

1.siapkan file dll km (misalkan Ghue.dll)
2. copykan file dll km di folder PB km.
3. buka run
4. Ketik Regedit
5. HKEY_LOCAL_MACHINE >>> SOFTWARE >>>> MICROSOFT >>> WINDOWS NT >> CURRENT VERSION >> WINDOWS >> AppInit_DLLs (Value data nya masukan nama dll nya., Contoh : "Ghue.dll", nah masukin aja value datanya jadi "Ghue.dll"
6. buka laucer PB mu
7. klik start
8. Dll km otomatis sdh terinject.
9. kalau km ingin main pb lagi gak perlu klik2 injector tingal langsung ke point 6

Biar gak susah-susah harus ke regedit lagi

1. setelah tutorial diatas km selesaikan dan berhasil inject PBnya
2. pilih file pada jendela regedit
3. export
4. km tinggal namakan register km.
5. save di flash disk jika main diwarnet yg menggunakan system freeze

Jika Kalian main diwarnet
1. copykan file dll km di folder PB nya
2. klik 2 kali register yang sudah tersave di flash disk dan ok2 aja trs
3. silahkan langsung buka launcer
4. start
READMORE
 

mencari offset dengan ce ( cheat eggine )

Fitur Tutor :
offset, Name + Exp + Point + Grade + Cash.

Credit : RebronJR & Member N3
Go..go..go..go

1. Bikin PB BugTrap dolo.. seperti Gambar dibawah
Spoiler:





2. Buka CE kalian lalu open PB lewat CE liat gambar lagi dibawah
Spoiler:



3. Masukan nick kalian lalu rubah Value Type menjadi Text..lalu klik First SCan liat gambar dibawah
Spoiler:





4.dapet deh adress nya di sebelah kiri.. lalu klik kanan adress tersebut, lalu browse
Spoiler:


5.
lalu cari seperti gambar dibawah.. jika tidak ketemu.. kalian coba klik
kanan adress nomor 2, kalo masih ga ketemu ya nomor 3, kalo ga ketemu
juga.. brarti mata lo siwer..
Spoiler:





6.nah
perhatikan Value byet yg di beri kotak merah dan nama Valuenya,
sekarang kita coba cari offset . add sendlist value paling awal sesuai
gambar dibawah. semua Value ya.. nick + point + Grade + cash.. liat
gambar dibawah

add send list Nama
Spoiler:




add send list Exp
Spoiler:





add send list Grade
Spoiler:


add send list Point
Spoiler:




add send list Cash
Spoiler:



7.
Jika sudah di add semua closed aja.. lalu balik ke CE awal.. liat hasil
add tadi.. nah mari kita cari offset NAME aja. liat gambar dibawah klik
kanan hasil dari add send list NAME tadi lalu pilih pointer scan.
Spoiler:




8. setting dolo untuk pencarianya sebagai mana contoh gambar di bawah. kalo udah klik OK. lalu Save dengan nama "NAME" OK lagi.
Spoiler:



9. Kalo dah selesai.. liat Pointer yg didapat.. dari hasil pencarian sekarang yg didapat adalah
di klik dua kali pointer yg didapat... agar muncul di CE
PointBlank.i3Exec+004C8FC0 dan offset A80
cara penulisanya pointer = 0x4C8FC0 , Offset = 0xA80

10. Untuk Pencarian offset lainnya kalian tinggal kurang saja dari hasil tadi.. liat gambar dibawah.
untuk pengurangan gunakan Kalkulator dengan Mode HEX
Spoiler:




pada gambar diatas kalian klik kanan pada hasil offset NAME yg didapat tadi lalu pilih Change Record - Address

11. Nah tahap akhirnya... lihat yang saya Blog dengan warna merah, yg paling atas adalah adress pengurangan. atau gini aja
Spoiler:




address pengurangan = 00A42FF48
address NAME = 00A409C8
address Exp = 00A409E9

untuk cari offset.
address dikurang address pengurangan
00A409C8 - 00A42FF48 = A80 << 00a42ff48 =" AA1">


Tutor Tambahan

PointBlank.i3Exec+004C8FC0 + AAD - CASH
PointBlank.i3Exec+004C8FC0 + A80 - NAME
PointBlank.i3Exec+004C8FC0 + AA5 - GRADE
PointBlank.i3Exec+004C8FC0 + AA1 - XP
PointBlank.i3Exec+004C8FC0 + AA9 - Point
PointBlank.i3Exec+004C8FC0 + 173A1 - Title Pertama (untuk Title kelanjutanya tinggal anda tambah 4 )

PointBlank.i3Exec+004C8FC0 + B54 - \x3F\x3B\xAF\x41 - Def++ sama Value .. untuk Topeng tolong yang punya SHare

PointBlank.i3Exec+004C8FC0 + 940 - \x7C\x7D\xBE\x41 - Baret SG dan Value
PointBlank.i3Exec+004C8FC0 + B58 - \x7C\x7D\xBE\x41 - Baret SG dan Value
PointBlank.i3Exec+004C8FC0 + B90 - \x7C\x7D\xBE\x41 - Baret SG dan Value
PointBlank.i3Exec+004C8FC0 + C6C - \x7C\x7D\xBE\x41 - Baret SG dan Value

PointBlank.i3Exec+004C8FC0 + 940 - \x7B\x7D\xBE\x41 - Baret AWP dan Value
PointBlank.i3Exec+004C8FC0 + B58 - \x7B\x7D\xBE\x41 - Baret AWP dan Value
PointBlank.i3Exec+004C8FC0 + B90 - \x7B\x7D\xBE\x41 - Baret AWP dan Value
PointBlank.i3Exec+004C8FC0 + C6C - \x7B\x7D\xBE\x41 - Baret AWP dan Value

PointBlank.i3Exec+004C8FC0 + 940 - \x79\x7D\xBE\x41 - Baret Asault dan Value
PointBlank.i3Exec+004C8FC0 + B58 - \x79\x7D\xBE\x41 - Baret Asault dan Value
PointBlank.i3Exec+004C8FC0 + B90 - \x79\x7D\xBE\x41 - Baret Asault dan Value
PointBlank.i3Exec+004C8FC0 + C6C - \x79\x7D\xBE\x41 - Baret Asault dan Value

PointBlank.i3Exec+004C8FC0 + 940 - \x7A\x7D\xBE\x41 - Baret SMG dan Value
PointBlank.i3Exec+004C8FC0 + B58 - \x7A\x7D\xBE\x41 - Baret SMG dan Value
PointBlank.i3Exec+004C8FC0 + B90 - \x7A\x7D\xBE\x41 - Baret SMG dan Value
PointBlank.i3Exec+004C8FC0 + C6C - \x7A\x7D\xBE\x41 - Baret SMG dan Value

PointBlank.i3Exec+004C8FC0 + 940 - \x7D\x7D\xBE\x41 - Baret HandGUN dan Value
PointBlank.i3Exec+004C8FC0 + B58 - \x7D\x7D\xBE\x41 - Baret HandGUN dan Value
PointBlank.i3Exec+004C8FC0 + B90 - \x7D\x7D\xBE\x41 - Baret HandGUN dan Value
PointBlank.i3Exec+004C8FC0 + C6C - \x7D\x7D\xBE\x41 - Baret HandGUN dan Value

PointBlank.i3Exec+004C8FC0 + 934 + CHAR TERO
PointBlank.i3Exec+004C8FC0 + B4C + CHAR TERO
PointBlank.i3Exec+004C8FC0 + B84 + CHAR TERO
PointBlank.i3Exec+004C8FC0 + C60 + CHAR TERO

PointBlank.i3Exec+004C8FC0 + 938 + CHAR CT
PointBlank.i3Exec+004C8FC0 + B50 + CHAR CT
PointBlank.i3Exec+004C8FC0 + B88 + CHAR CT
PointBlank.i3Exec+004C8FC0 + C64 + CHAR CT

Untuk Value Character.. silahkan yg tau Share.. saya ga punya

PointBlank.i3Exec+004C8FC0 + 94C + Senjata
PointBlank.i3Exec+004C8FC0 + B5C + Senjata
PointBlank.i3Exec+004C8FC0 + B70 + Senjata
PointBlank.i3Exec+004C8FC0 + C78 + Senjata

untuk Value senjata..cuma ada 4 ini aja

8D B6 E1 11 magnum
AD D1 EB 0B Kriss
73 9B D7 17 Spash
A4 D1 EB 0B - MP7

udah cuma segini aja.. cuma iseng nyarinya.. buat yang udah mahir.. ingat

READMORE
 

Cheat New Update ( WallHack)

DownLoad Heeree
http://adf.ly/1OYe

Thank'to :
[]SC™ Wheldt
[]SC™ Danang
[]chivaaz
[]ṤḈ™♪Ḉἆṕṫἆȋṋ♪™
[]ṤḈ™♪ḭѷắḼḑ♪™ ^_^
[]aGuS_TKJ™
[]Ş©™βąŦăŖā
[]Hackazer
[]SC™ Patrol
[]SC™NÀTÀ™
[]SC™Chibi

Game Target : PointBlank
Anti-che*t : AhnLab HackShield Pro
tested xp 2,.,.,work 1000% jam 2.32 AM

Menggunakan FlashDisk

Toturial :
- Pindahkan Hasil Download ke FD & Extrack
- Buka Wallhack Scarletzer.Us.exe
- Buka PBLauncher & start
- Klik Select dll & Klik injeck now
- Akan keluar notis OK
- Jangan dulu resume, lepas FD kamu, baru resume


bila tidak ada epeck apa² coba kamu masukan file ini " d3dx9_41.dll" 
ke dalam Folder Point Blank kamu

Credit DLL : Snutz.Us
Credit Injector : N2_RedhoCyberJr



Kalau Berguna Kasih Dong Cendol
Walaupun Hanya 1 Gelas 



 



Sumber : Faceinteraction.forumid.net
READMORE
 

[Tutorial] Pembuatan DLL Minimize With Video

Tools :


1. _hrd_Logger v1.1

2. Source dll hrdbase2

3. MS VC++ 2008 ( Bisa di download di LINK)

4. Source Code brayyy (Bs Pk SC N2 Di Dalam Folder)


(Untuk Link Download Tool Diatas Ada DiBawah Thread)

Tutorial :

1. Extract _hrd_loggernya dan jalankan

2. Masuk PB Launcher dan Start

4. Tunggu Logging PBnya

3. Nanti Offset PBnya akan keluar dengan notepad bernama addys.txt dan otomatis PBnya akan Close

Build DLL :

1. Buka Ms C++2008

2. File-Open-Project/Solution ( Ctrl+Shift+O )

3. Cari file hrdbase.sln yang sudah di download dan di extract.

4. Copas semua isi notepad addys.txt ke addys.h*

5. Klo Mo Edit Source/ Mo di Upgarde ma brayyy Sendiri Masuknya ke main.cpp

6. Sekarang Build dll, pilih Build – Build Solution ( Ctrl+Shift+B )

7. Klo Ga Error, DLL Siap di Gunakan

Untuk Minimize Tekan Tombol Insert dan Gunakan Tombol Delete Untuk Off Minimizenya << Bila Copas Source Codenya N2 .dll Source Code

Untuk Gampang nya Silahkan Lihat Videonya dan Download Toolnya

Untuk Scan Virus _hrd_loggernya :
Antivir: Nothing found
ArcaVir: Nothing found
AVG: Nothing found
BitDefender: Nothing found
VirusBlokAda32: Trojan.Vilsel.asca

VirusBuster: Nothing found

Untuk Download Tool Dan Videonya :

link

Selamat Belajar .....

Jangan Lupa Wajib + (CENDOL) Ya bro ....

Tambahan : Jika PB Update dan che*t brayyy Yang brayyy Gunakan Tidak Bisa Digunakan, Maka Cari Lagi Offsetnya dengan cara yang sama dengan yang diatas.

Semoga Bermanfaat
READMORE
 

Editing DLL With PE|Explorer & Create Trainer WIth TMK

 maafkan saya membuat topik yg tidak bermutu dan jelek ini ,mari belajar bersama
(terutama saya minta maaf buat para donatur)

pertama kita harus download dulu softwarenya.
download PE Explorer di SINI !
kalo udah install,itu ada trial 30 hari nya swt
download cracked version yg R5 aja gpp ,download sini ! (tinggal di copas ke folder PE mu)
tapi kalau ada yg punya newer version dari yg punya ku boleh di tambahkan

udah di download ?
siapin dll yg mau di edit (tentunya disini kita mau edit WH)
klik kanan di dll seperti gambar dibawah ini :



Uploaded with ImageShack.us

jgn hiraukan bulatan merah hehehe

lalu :


Uploaded with ImageShack.us

klik bulatan biru !dari sini kalian udah bisa mulai otak atik sendiri..jgn takut rusak ..makanya sesuatu yg mau di edit harus di BACK-UP
lalu klik shift+ctrl+E !
taraaa..keluar section editor

Maaf W Gak Bisa Ngasih Tutor Yang Lengkap

silahkan berkreasi masing2.

untuk WH donasi kemarin aku edit dengan ini ,terbukti aku yg pure inject.(no trik hs lama,suspend,bla bla bla)

untuk bumbu lain bisa ditambahin packer/compressor.

logikanya seperti ini :
WH = teroris mau pasang bom di kantor polisi.
PB = kantor polisi.
HS = polisi bersenjata lengkap.

sekarang WH misal kamu inject tanpa kamu otak atik ,sama aja kayak teroris itu mau pasang bom tapi ga pake baju.apa jadinya teroris ga pake baju tapi bawa bom ?baru masuk dah di tangkap polisi bersenjata lengkap.^^

gimana caranya supaya dia ga ketauan ?pakein baju kek,celana kek.
edit kek mukanya supaya ga mencurigakan.^^

logika jalan,pikiran jalan.

all credits by Hikari.
PE Explorer 1.99 R5 cracked by Veltaros.
semoga bisa jadi awal bahan pembelajaran.
semoga snutz lebih maju lagi ^^



pensi pb <> start pra-kuliah
---
perlu di pin ?kayaknya ga usah deh hehe
READMORE
 

Bahan Bahan Dll YANG KALIAN CARI



Uploaded with ImageShack.us



NI DOWNLOAD



JANGAN CUMA JD LEACER

ABIS DAPAT...,, LARI


KASIH ++++++++++ biar gak jera


LINK
LINK
READMORE
 

Cara MembuaT Dll Cheat Point Blank [Source Minimize]

1) Instal Dulu Dev-C++ 4.9.9.2 Ketika Sudah Di Instal Akan Muncul Gambar
 Seperti Di Bawah Ini Dan Kalian Harus Klik No, I prefer To Use Dev-C++
 without it.!!!!



2. Jalankan RCDlogger 3.1 Terus Start Point Blank !!! Lalu Keluar Teks Seperti Gambar Di Bawah .!!!



3. Buka Dev-C++Project1 Seperti Gambar Di Bawah .!!!



4. Gambar Dibawah Adalah Offset Minimize Yang Harus Di EDIT/FIX Dari Penjumlahan KeyLogger !!



5. Buka Calculator Yang Ada Di Bawa'an Windows Dengan Settingan Seperti
Gambar di Bawah Dengan Cara Klik View>>Scientific>>Hex .!!



6. Cara Penjumlahan Dan Lain² nya Lihat Gambar [ Baca Dengan JELAS ] .!!!

7. Apabila Sudah Di Pindahkan Hasil Dari Penjumlahan Offset RCDlogger Ke
Offset pada Source Code cbase2.c , Maka kalian tinggal Klik Execute
Pada Menu Bar Dev-C++ ,, Lalu Klik Rebuild ALL(CTRL+F11) , Lalu Kalian
Ambil DLL Nya Di Dalam Folder [SourCod]MiNiMiZe™ ,, Seperti Gambar Di
Bawah Ini .!!!



Untuk membuat Dll seperti di atas harus menyediakan jamu :

- Source code minimize
- RCD|logger 3.1
- Dev C++ v4.9.9.2
Semoga membantu

Download Src Minimize, Rcd ,& Dev C++ Ada Di-
Posting Selanjutnya
READMORE
 

Cara Merubah Tampilan Pb Launcher

oke kali ini saya ingin sekedar berbagi apa yang saya ketahui ,,,
sudah lah langsung saja pada inti judul posting kali ini saya ingin memberikan sesuatu yang beda kebanyakan orang berlomba menciptakan CHEAT terbaru kali ini saya mencoba dan berbagi tutorial yang memang ga berguna tapi CUKUP MENARIK LOH apa lagi kalo anda semua main di warnet waw ada nama anda di LAUNCHER PB heehhehe.....
ok langsung saja ke topik utama

pertama buka file PB anda berada KALAU saya si DI C:/ ya kalian dimana di cari ajah ya.. pasti beda hehehe...
sesudah masuk kedalam coba anda buka FILE UI.XML dengan cara OPEN WITH notepad nah kalo sudah anda cari deh kata CHECK , start, UPdate, pause , inget yang dirubah pada bagian text="start" jangan yang Button name oke .... ganti deh kalau saya sih jadi START CRU hehehe dan pada CHECK juga sama yang di edit atau do ganti pada bagian text="CHECK" oke jangan button name ... ihihihih kalau saya sih JADI CRU HEHEHEH ni SS nya heheh

Resized to 59% (was 1023 x 563) - Click image to enlargePosted Image


nah selain itu juga bisa edit edit lagi yang lain jika kalian sudah membuka launcer terus klik tanda X untuk exit pasti ada noticenya thu heheh ini juga bisa diganti dengan ,,,, cari di folder PB kalian masage.xml nah buka pake open with notepad ok,, heheheh,, nah dah di lihat kalo mau ganti notice saat klik tanda X cari "" tanpa tanda seru hihihi nie contoh yang saya edit ,,,

Resized to 59% (was 1023 x 563) - Click image to enlargePosted Image


keren kanheheh disini juga bisa edit apa pun seterah anda deh hehehe... bisa kalo lagi server penuh atau sedang update dan banyak lagi coba dilihat saja ya dan di coba coba gunakan imajinasi anda ,, anda GAMERS pasti tinggi imajinasinya heheheh cukup sekian




terimakasih
READMORE
 

Cara Membuat Dll Point Blank

Alat yang di butuhkan :
* Visual C++ 2008 Express Edition (free)
* Injector (Bebas)

Adapun target game yang ada dalam tutorial ini adalah Point Blank, dengan contoh hack misi mayor.
Silakan ikuti langkah-langah di bawah ini:
1. Jalankan Visual C++ 2008 Express Edition, buat sebuah project dengan cara akses menu File – New – Project atau dengan menekan tombol CTRL + SHIFT + N. gambar 1
2. Pada jendela New Project, pilih Empty Project (1) pada bagian Templates, kemudian pada kolom Name masukkan nama project (2) dan klik tombol OK (3) gambar 2
3. Project telah berhasil dibuat. Pada bagian Solution Explorer, klik kanan pada nama project (1), kemudian pilih menu Properties (2).gambar 3
4. Jendela project properties akan tampil. Pada tree menu sebelah kiri, pilih Configuration Properties (1), kemudian bagian opsi Project Defaults, ubah opsi Configuration Type menjadi Dynamic Library (.dll) (2), kemudian tekan tombol OK (3) untuk melakukan perubahan. gambar 4
5. Pada jendela Add New Item yang tampil, pada bagian templates pilih C++ File (.cpp) (1), beri nama ‘Main.cpp’ (2) pada bagian kolom Name, kemudian tekan tombol OK (3). gambar 5
6. Sebuah file bernama ‘Main.cpp’ berhasil dibuat. Silakan masukkan kode-kode di bawah ini pada file tersebut, kemudian simpan (save). gambar 6
7. Berikutnya adalah membuat sebuah file bernama Main.cpp untuk memasukkan kode-kode utama, dengan cara pilih direktori Source Files (1) pada bagian Solution Explorer, kemudian klik menu ProjectAdd New Item (2) atau dengan menekan tombol CTRL + SHIFT + A. gambar 7
#define _CRT_SECURE_NO_WARNINGS
#include 3windows.h3 ganti 3 dengan <......... >
#include 3tlhelp32.h3 ganti 3 dengan <......... >
// definisikan variable dengan ‘window title’, ‘window classname’ dan modul
char *pProcessWindowTitle = “Point Blank”;
char *pProcessWindowClass = “I3VIEWER”;
char *pProcessModuleName = “PointBlank.i3Exec”;
// etc…
UINT_PTR uipUserRankValue = 35; // major? :D
UINT_PTR uipUserPointsValue = 999999; // OMG!
UINT_PTR uiptrFinalRank, uiptrFinalPoints;
bool isInitMmhMemory = true;
DWORD dwProcessID;
UINT_PTR uipMmhBaseAddress;
HANDLE hProcess;
DWORD GetModuleBase(LPSTR lpModuleName, DWORD dwProcessId)
{
MODULEENTRY32 lpModuleEntry = {0};
HANDLE hSnapShot = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, dwProcessId);
if(!hSnapShot)
return NULL;
lpModuleEntry.dwSize = sizeof(lpModuleEntry);
BOOL bModule = Module32First( hSnapShot, &lpModuleEntry );
while(bModule)
{
if(!strcmp( lpModuleEntry.szModule, lpModuleName ) )
{
CloseHandle(hSnapShot);
return (DWORD)lpModuleEntry.modBaseAddr;
}
bModule = Module32Next( hSnapShot, &lpModuleEntry );
}
CloseHandle( hSnapShot );
return NULL;
}
// DeRef() = credit L. Spiro (MHS)
UINT_PTR DeRef( UINT_PTR _uiptrPointer ) {
UINT_PTR uiptrRet;
if (!::ReadProcessMemory(hProcess, reinterpret_cast(_uiptrPointer), &uiptrRet, sizeof(uiptrRet), NULL)) { return 0UL; }
return uiptrRet;
}
// inisialisasi proses
void InitApplicationProcess()
{
bool isFindWindow = true;
HWND hWnd = NULL;
while(isFindWindow)
{
if((hWnd = FindWindowA(pProcessWindowClass, pProcessWindowTitle)) != NULL) // jika window ditemukan
{
isFindWindow = false;
}
Sleep(500);
}
GetWindowThreadProcessId(hWnd, &dwProcessID);
hProcess = OpenProcess(PROCESS_ALL_ACCESS|PROCESS_VM_OPERATION|PROCESS_VM_READ|PROCESS_VM_WRITE|PROCESS_QUERY_INFORMATION, FALSE, dwProcessID);
}
void MajorMissionHack()
{
if(isInitMmhMemory)
{
uipMmhBaseAddress = GetModuleBase(pProcessModuleName, dwProcessID);
// misal: pointer yang didapat = PointBlank.i3Exec+00471234 dengan offset 0xA12, tuliskan seperti di bawah!
uiptrFinalRank = DeRef(uipMmhBaseAddress + 0x4XXXXX) + 0xXXX; // User rank pointer – masked, untuk address & offset-nya.
uiptrFinalPoints = DeRef(uipMmhBaseAddress + 0x4XXXXX) + 0xXXX; // User points pointer – masked, untuk address & offset-nya.
isInitMmhMemory = false;
}
// WriteProcessMemory pada pointer ‘rank’, berikan nilai uipUserRankValue (35)
::WriteProcessMemory(hProcess, reinterpret_cast(uiptrFinalRank), &uipUserRankValue, sizeof(uipUserRankValue), NULL);
// WriteProcessMemory pada pointer ‘points’, berikan nilai uipUserPointsValue (999999) LOL!
::WriteProcessMemory(hProcess, reinterpret_cast(uiptrFinalPoints), &uipUserPointsValue, sizeof(uipUserPointsValue), NULL);
}
void LovelyLoopy()
{
// ok, berikan salam dulu! :D
MessageBox(0, “DLL berhasil di-inject. Lanjutkan!”, “Hello World”, MB_OK + MB_ICONASTERISK);
InitApplicationProcess();
while(1) // loop selamanya :D
{
if(GetAsyncKeyState(VK_F12)&1) // jika F12 ditekan
{
MajorMissionHack(); // panggil fungsi ‘MajorMissionHack()’
Sleep(500);
}
Sleep(1);
}
}
BOOL WINAPI DllMain(HMODULE hDll, DWORD dwReason, LPVOID lpReserved)
{
DisableThreadLibraryCalls(hDll);
if(dwReason == DLL_PROCESS_ATTACH)
{
CreateThread(NULL, NULL, (LPTHREAD_START_ROUTINE)LovelyLoopy, NULL, NULL, NULL);
}
else if(dwReason == DLL_PROCESS_DETACH)
{
CloseHandle(hProcess);
}
return TRUE;
}
8. Jika kode sudah disimpan (save), langkah berikutnya adalah membentuk file DLL-nya dengan cara klik menu Build – Build Solution atau dengan menekan tombol F7.gambar 8
9. Setelah proses build solution, pada jendela Output akan menampilkan hasil dari proses compile/build tersebut, jika tidak ada kesalahan (error) berarti kode-kode sudah benar dan file DLL sudah terbentuk. Jika ternyata ada kesalahan (error), silakan periksa langkah-langkah sebelumnya jika ada yang terlewatkan. gambar 9.
10. Kemudian buka direktori tempat project anda disimpan, dalam tutorial ini ane simpan di direktori D:\!PROJECTS!\SukaSukaEnte dan buka direktori yang bernama Debug di dalamnya (sesuaikan letak direktori anda).Bisa kita lihat ada beberapa file yang terbentuk, namun yang kita perlukan hanyalah file yang berekstensi .dll, karena file tersebut yang akan kita injeksikan ke proses program/game. Agar tidak membingungkan, sekaligus ane copy-kan file injector-nya (x1nject.exe) ke direktori tersebut. gambar 10
11. Kemudian jalankan injector (x1nject.exe), ubah pada kolom ‘What to inject’ dengan nama proses program/game, (contoh: PointBlank.exe), pada bagian ‘Add to injection list’ tambahkan file .dll yang telah kita buat dengan menekan tombol Browse dan cari pada direktori Debug project kita. Gambar 11
12. Star PB, Berikutnya kita coba hack misi mayor yang telah kita buat (lihat fungsi LovelyLoopy() dan MajorMissionHack() pada kode untuk lebih jelas), dengan menekan tombol F12 pada keyboard

NB:
1. Untuk melihat penjelasan gambar ss silahkan cari link ini http://www.ziddu.com/download/11576996/gambarbelajardll.rar.html
2. Pointer & offset pada fungsi MajorMissionHack( ) sengaja tidak tampilkan atau cari sendiri sendiri, Silakan dimodifikasi jika ingin menambahkan fungsi-fungsi lainnya (unlimited ammo, grenade dsb).
3. Jika tidak bisa running (no action) di OS Windows XP, ternyata ada kesalahan pada argumen fungsi API OpenProcess()
silakan jika anda menggunakan OS Windows XP, ubah kode pada bagian:
hProcess=OpenProcess(PROCESS_ALL_ACCESS|PROCESS_VM_OPERATION|PROCESS_VM_READ|PROCESS_VM_WRITE|PROCESS_QUERY_INFORMATION, FALSE, dwProcessID);
Menjadi
hProcess=OpenProcess(PROCESS_VM_OPERATION|PROCESS_VM_READ|PROCESS_VM_WRITE|PROCESS_QUERY_INFORMATION, FALSE, dwProcessID);
4.Marilah kita belajar bersama
Argumen PROCESS_ALL_ACCESS hanya bisa dilakukan di OS Vista dan Windows 7, sementara di Windows XP tidak bisa
READMORE
 

Cara Membuat Injector Point Blank

Ok.............!!!!!!!!!!!!!!!
            Kali Ini Kita Akan Membuat Tool Atau Cheat(Injector)
Pasti Kalian Semua Udah Pada Tau Apa Itu (Cheat)..........:D


 Pada Tutorial Kali ini Saya Akan Membuat Injector PointBlank
 Tool Yang Di Butuhkan

1- Visual Basic 6.0

2- Makanan Ringan

3- Marimas Mangga



• Pertama, Anda Download Dulu Vb 6.0 nya
• Lalu Anda Buka Vb Nya Maka Anda Akan Melihat Seperti Ini

Klik Standard EXE,



• Lalu beri nama form tersebut Di Kolom Categorized►Caption
" ganti form1 Dengan nama exe anda".
• Klik kanan Form tersebut Dan Klik View Code
• Jika Sudah Anda Copy Kode Dibawah ini
"      
• Nah Close Aja.........................
• Klik project Di atas Lalu pilih add module Dan Beri nama " ModProcess "
• Dan Copy Lagi Kode Dibawah


• Pilih Add module Lagi Dan Beri nama  " ModBrowser "
• lalu Copy Code Berikut

• Pilih Add module Lagi Dan Beri nama " ModCDialog "

• lalu Copy Code Berikut



• Pilih Add module Lagi Dan Beri nama " ModInjector "


• lalu Copy Code Berikut

• Setelah Di Copy Semua Code Tersebut,
         - Sisipkan 6 Buah Timer
         - 4 Label
         - Dan 6 Command Button
• Naaaah.....,
 Dari pada Bingung Mendingan Download Aja Video Tutorialnya

Sumber : http://wheldt.forumid.net
READMORE
 
U Have Website We have Cash
If you have website put our banner on it, make money for each visitor
homezwork.com

Instructions

Wheldthacker. Diberdayakan oleh Blogger.

Translate

Music