欢迎光临散文网 会员登陆 & 注册

代码

2023-08-30 22:24 作者:鼠民  | 我要投稿



1.敌人速度将为1 自身物理魔法提高(一击必杀)


{ Game   : PTS_Unicode.exe

  Version: 

  Date   : 2023-08-28

  Author : shuming


  This script does blah blah blah

}


[ENABLE]


aobscanmodule(INJECT,PTS_Unicode.exe,89 03 41 B8 03 00 00 00) // should be unique

alloc(newmem,$1000,"PTS_Unicode.exe"+5D012)


label(code)

label(return)


newmem:

  cmp [rbx+0098],c8

  jne code1

  mov [rbx+0040],100000

  mov [rbx+0030],100000

  mov r8d,00000003

  jmp return


code1:

  cmp [rbx+0098],cd

  jne code2

  mov [rbx+0040],100000

  mov [rbx+0034],100000

  mov r8d,00000003

  jmp return


code2:

  cmp [rbx+0098],d2

  jne code

  mov [rbx+0040],100000

  mov [rbx+0034],100000

  mov r8d,00000003

  jmp return


code:

  mov [rbx+0040],1

  mov [rbx],eax

  mov r8d,00000003

  jmp return


INJECT:

  jmp newmem

  nop 3

return:

registersymbol(INJECT)


[DISABLE]


INJECT:

  db 89 03 41 B8 03 00 00 00


unregistersymbol(INJECT)

dealloc(newmem)


{

// ORIGINAL CODE - INJECTION POINT: "PTS_Unicode.exe"+5D012


"PTS_Unicode.exe"+5CFE9: 75 09                 -  jne PTS_Unicode.exe+5CFF4

"PTS_Unicode.exe"+5CFEB: 83 FF 01              -  cmp edi,01

"PTS_Unicode.exe"+5CFEE: 0F 8E 38 02 00 00     -  jng PTS_Unicode.exe+5D22C

"PTS_Unicode.exe"+5CFF4: 8B 83 08 FF FF FF     -  mov eax,[rbx-000000F8]

"PTS_Unicode.exe"+5CFFA: 85 C0                 -  test eax,eax

"PTS_Unicode.exe"+5CFFC: 0F 84 2A 02 00 00     -  je PTS_Unicode.exe+5D22C

"PTS_Unicode.exe"+5D002: 8B 53 F8              -  mov edx,[rbx-08]

"PTS_Unicode.exe"+5D005: 41 B8 03 00 00 00     -  mov r8d,00000003

"PTS_Unicode.exe"+5D00B: 8B 0B                 -  mov ecx,[rbx]

"PTS_Unicode.exe"+5D00D: E8 7E 74 04 00        -  call PTS_Unicode.exe+A4490

// ---------- INJECTING HERE ----------

"PTS_Unicode.exe"+5D012: 89 03                 -  mov [rbx],eax

"PTS_Unicode.exe"+5D014: 41 B8 03 00 00 00     -  mov r8d,00000003

// ---------- DONE INJECTING  ----------

"PTS_Unicode.exe"+5D01A: 8B 53 FC              -  mov edx,[rbx-04]

"PTS_Unicode.exe"+5D01D: 8B 4B 04              -  mov ecx,[rbx+04]

"PTS_Unicode.exe"+5D020: E8 6B 74 04 00        -  call PTS_Unicode.exe+A4490

"PTS_Unicode.exe"+5D025: 89 43 04              -  mov [rbx+04],eax

"PTS_Unicode.exe"+5D028: 41 B8 03 00 00 00     -  mov r8d,00000003

"PTS_Unicode.exe"+5D02E: 8B 53 14              -  mov edx,[rbx+14]

"PTS_Unicode.exe"+5D031: 8B 4B 1C              -  mov ecx,[rbx+1C]

"PTS_Unicode.exe"+5D034: E8 57 74 04 00        -  call PTS_Unicode.exe+A4490

"PTS_Unicode.exe"+5D039: 89 43 1C              -  mov [rbx+1C],eax

"PTS_Unicode.exe"+5D03C: 41 B8 03 00 00 00     -  mov r8d,00000003

}



2.陷阱锁定解除一直生效

{ Game   : PTS_Unicode.exe

  Version: 

  Date   : 2023-08-30

  Author : shuming


  This script does blah blah blah

}


[ENABLE]


aobscanmodule(INJECT,PTS_Unicode.exe,89 05 1B D5 0E 02) // should be unique

alloc(newmem,$1000,"PTS_Unicode.exe"+A5DF)


label(code)

label(return)


newmem:

  jmp return

code:

  mov [PTS_Unicode.exe+20F7B00],eax

  jmp return


INJECT:

  jmp newmem

  nop

return:

registersymbol(INJECT)


[DISABLE]


INJECT:

  db 89 05 1B D5 0E 02


unregistersymbol(INJECT)

dealloc(newmem)


{

// ORIGINAL CODE - INJECTION POINT: "PTS_Unicode.exe"+A5DF


"PTS_Unicode.exe"+A5BD: EB 13                    -  jmp PTS_Unicode.exe+A5D2

"PTS_Unicode.exe"+A5BF: 33 C9                    -  xor ecx,ecx

"PTS_Unicode.exe"+A5C1: 8B D9                    -  mov ebx,ecx

"PTS_Unicode.exe"+A5C3: B9 D2 00 00 00           -  mov ecx,000000D2

"PTS_Unicode.exe"+A5C8: 3B C1                    -  cmp eax,ecx

"PTS_Unicode.exe"+A5CA: B8 02 00 00 00           -  mov eax,00000002

"PTS_Unicode.exe"+A5CF: 0F 44 D8                 -  cmove ebx,eax

"PTS_Unicode.exe"+A5D2: 33 C0                    -  xor eax,eax

"PTS_Unicode.exe"+A5D4: 89 05 16 D5 0E 02        -  mov [PTS_Unicode.exe+20F7AF0],eax

"PTS_Unicode.exe"+A5DA: BA 38 15 00 00           -  mov edx,00001538

// ---------- INJECTING HERE ----------

"PTS_Unicode.exe"+A5DF: 89 05 1B D5 0E 02        -  mov [PTS_Unicode.exe+20F7B00],eax

// ---------- DONE INJECTING  ----------

"PTS_Unicode.exe"+A5E5: 8B 0E                    -  mov ecx,[rsi]

"PTS_Unicode.exe"+A5E7: E8 64 9C 09 00           -  call PTS_Unicode.exe+A4250

"PTS_Unicode.exe"+A5EC: 8B C8                    -  mov ecx,eax

"PTS_Unicode.exe"+A5EE: E8 5D 9F 09 00           -  call PTS_Unicode.exe+A4550

"PTS_Unicode.exe"+A5F3: 44 8B C8                 -  mov r9d,eax

"PTS_Unicode.exe"+A5F6: 48 8D 15 07 60 42 01     -  lea rdx,[PTS_Unicode.exe+1430604]

"PTS_Unicode.exe"+A5FD: 48 69 C3 7C F9 00 00     -  imul rax,rbx,0000F97C

"PTS_Unicode.exe"+A604: 8B 0C 10                 -  mov ecx,[rax+rdx]

"PTS_Unicode.exe"+A607: 44 3B C9                 -  cmp r9d,ecx

"PTS_Unicode.exe"+A60A: 7C 04                    -  jl PTS_Unicode.exe+A610

}


代码的评论 (共 条)

分享到微博请遵守国家法律