0% found this document useful (0 votes)
66 views4 pages

Modpara Cree Fire

The document contains C# code for a Windows Forms application that uses process injection to modify the memory of other processes, specifically mobile emulator programs. It defines constants, structures, and functions for retrieving process IDs and memory addresses using toolhelp APIs. The main form code searches for an emulator process, gets its PID, then calls functions like "AkEvo" and "DRIERSSSS_LOAD_AUTO_IN_PROCESSS" to find and write to memory addresses in the target process.

Uploaded by

Nuno Wa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views4 pages

Modpara Cree Fire

The document contains C# code for a Windows Forms application that uses process injection to modify the memory of other processes, specifically mobile emulator programs. It defines constants, structures, and functions for retrieving process IDs and memory addresses using toolhelp APIs. The main form code searches for an emulator process, gets its PID, then calls functions like "AkEvo" and "DRIERSSSS_LOAD_AUTO_IN_PROCESSS" to find and write to memory addresses in the target process.

Uploaded by

Nuno Wa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

using System;

using System.Collections.Generic;
using System.ComponentModel;
using System.Diagnostics;
using System.Drawing;
using System.Linq;
using System.Management;
using System.Net;
using System.Runtime.InteropServices;
using System.Text;
using System.Threading;
using System.Threading.Tasks;
using System.Windows.Forms;
using Memory;
using Microsoft.VisualBasic;
using System.IO;

namespace Panel_zz
{
public partial class Form1 : Form
{

//Inicial Code :)
const int WM_NCHITTEST = 0x84;
const int HTCLIENT = 0x1;
const int HTCAPTION = 0x2;

public Form1()
{
InitializeComponent();
}

//Code Busqueda del Emulador : Es Desir Bluestacks y Msi Su Nombre es


//HD-Player
//Nombre del Programa del Emulador

protected override void WndProc(ref Message message)


{
base.WndProc(ref message);

if (message.Msg == WM_NCHITTEST && (int)message.Result == HTCLIENT)


message.Result = (IntPtr)HTCAPTION;
}
[DllImport("KERNEL32.DLL")]
public static extern IntPtr CreateToolhelp32Snapshot(uint flags, uint
processid);
[DllImport("KERNEL32.DLL")]
public static extern int Process32First(IntPtr handle, ref ProcessEntry32
pe);
[DllImport("KERNEL32.DLL")]
public static extern int Process32Next(IntPtr handle, ref ProcessEntry32
pe);

private async Task PutTaskDelay(int Time)


{
await Task.Delay(Time);
}
private async Task<IntPtr> FUCK_IS_ALWAYS_REAL(string type)
{
string gameloop = "HD-Player";

var intPtr = IntPtr.Zero;


uint num = 0U;
var intPtr2 = CreateToolhelp32Snapshot(2U, 0U);
if ((int)intPtr2 > 0)
{
ProcessEntry32 processEntry = default;
processEntry.dwSize = (uint)Marshal.SizeOf(processEntry);
int num2 = Process32First(intPtr2, ref processEntry);
while (num2 == 1)
{
var intPtr3 = Marshal.AllocHGlobal((int)processEntry.dwSize);
Marshal.StructureToPtr(processEntry, intPtr3, true);
ProcessEntry32 processEntry2 =
(ProcessEntry32)Marshal.PtrToStructure(intPtr3, typeof(ProcessEntry32));
Marshal.FreeHGlobal(intPtr3);
if (processEntry2.szExeFile.Contains(gameloop) &&
processEntry2.cntThreads > num)
{
num = processEntry2.cntThreads;
intPtr = (IntPtr)(long)(ulong)processEntry2.th32ProcessID;
}

num2 = Process32Next(intPtr2, ref processEntry);


}
PID.Text = Convert.ToString(intPtr);
PID.Text = Convert.ToString(intPtr);
await PutTaskDelay(1000);

switch (type)
{

case "AkEvo": AkEvo(); break;


// case "AIMFOV": AIMFOV(); break;
// case "AIMBOT": AIMBOT(); break;
// case "ANTIBAN": ANTIBAN(); break;
// case "SENSIPRO": SENSIPRO(); break;
// case "AIMNECK": AIMNECK(); break;
// case "BYPASS": BYPASS(); break;
// case "NORECOIL": NORECOIL(); break;
// case "FAKEST": FAKEST(); break;
// case "EXACTLY": EXACTLY(); break;
/* case "MAGICBULLET": magic_bullet(); break;
case "ANTENAHAND": ANTENAHAND(); break;
case "SPEED5": SPEED5(); break;
case "SPEED2": SPEED2(); break;
case "OFFAIMBOT": OFFAIMBOT(); break; */

}
return intPtr;
}
private string sr;

//Poner Codigo que Modificara el juego


public async void AkEvo()
{
bool k = false;
int counter = 1;
if (Convert.ToInt32(PID.Text) == 0)
{
PSPS.ForeColor = Color.Red;
PSPS.Text = "Game not Found";
}
else
{
PSPS.ForeColor = Color.Green;
PSPS.Text = "Hmmmmm...";
MemLib.OpenProcess(Convert.ToInt32(PID.Text));

Thread.Sleep(2000);

PSPS.ForeColor = Color.Orange;
PSPS.Text = "Waitting...";

var enumerable = await MemLib.AoBScan(0x0000000000000000,


0x00007fffffffffff, "80 37 8F 3C", true, true, string.Empty);
string_0 = "0x" + enumerable.FirstOrDefault().ToString("X");
Mem.MemoryProtection memoryProtection;
MemLib.ChangeProtection(string_0, Mem.MemoryProtection.ReadWrite,
out memoryProtection, "");
foreach (long num in enumerable)
{
MemLib.WriteMemory(num.ToString("X"), "bytes", "00 D7 5B 00",
string.Empty, null);
k = true;
}

if (k == true)
{
PSPS.Text = "Successful";
PSPS.ForeColor = Color.Green;
await PutTaskDelay(500);
}
else if (counter < 4)
{
PSPS.ForeColor = Color.Red;
PSPS.Text = "Error.";
counter += 1;
await FUCK_IS_ALWAYS_REAL("AkEvo");
}
else
{
PSPS.Text = "No aplicado...";
PSPS.ForeColor = Color.Red;
}

Mem.MemoryProtection memoryProtection2;
MemLib.ChangeProtection(string_0, Mem.MemoryProtection.ReadOnly,
out memoryProtection2, "");
}
}
//Memlib
//Codes del Panel De Modificar La Memoria del Juego o Programa
public async void DRIERSSSS_LOAD_AUTO_IN_PROCESSS(string type)
{
x = 0;
await FUCK_IS_ALWAYS_REAL(type);
}
public long enumerable = new long();

private int x;
public Mem MemLib = new Mem();
private static string string_0;
private IContainer icontainer_0;
public struct ProcessEntry32
{
public uint dwSize;
public uint cntUsage;
public uint th32ProcessID;
public IntPtr th32DefaultHeapID;
public uint th32ModuleID;
public uint cntThreads;
public uint th32ParentProcessID;
public int pcPriClassBase;
public uint dwFlags;
[MarshalAs(UnmanagedType.ByValTStr, SizeConst = 260)]
public string szExeFile;
}

private void Form1_Load(object sender, EventArgs e)


{

private void guna2GradientButton1_Click(object sender, EventArgs e)


{
this.DRIERSSSS_LOAD_AUTO_IN_PROCESSS("AkEvo");
PSPS.Text = "Waiting process.....";
PSPS.ForeColor = Color.Yellow;
}
}
}

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy