How should I proceed if I found this
https://imgur.com/a/pYyvTlF
But I couldn't find something that would remove the damage in the bugs
I think i need found "loop" when when I go to the address. Right?
https://imgur.com/a/xdx7kOp
Last edited by Formula23; 03-17-2022 at 08:17 AM.
Formula23 (03-17-2022)
I didn't know I'm sorry
'I have a cheat on my hands and this function works there, so there is another way?'
and....
I can't find it can you please explain to me how, pleaseCode:CPointers::get()->Bypass_31_0[0] = CShell + 0x00; // \x48\x8B\xF8\x48\x85\xC0\x0F\x84\x00\x00\x00\x00\xC7\x45\xA8\x01\x00\x00\x00, xxxxxxxx????xxxxxxx CPointers::get()->Bypass_31_0[1] = CShell + 0x00; // FE 47 21 Bypass_31_0(0) = jz = JMP 6 Bypass_31_0(1) = nop = 3
Last edited by Formula23; 03-17-2022 at 02:11 PM.
CFPH Address/OffsetsCode:uint64_t m_CZoneManMgr = 0x2293310; uint64_t m_NoBugDamage = 0x2FC;
try this pattern if workCode:NetVars::get()->Pointer.m_CZoneManMgr = NetVarManager::get()->GetOffset(xorstr_(_T("m_CZoneManMgr")), eCShell, (BYTE*)"\x48\x89\x05\x00\x00\x00\x00\x48\x8B\x8A\x00\x00\x00\x00", "xxx????xxx????", 3, false, 0, 7); NetVars::get()->Offset.m_NoBugDamage = NetVarManager::get()->GetOffset(xorstr_(_T("m_NoBugDamage")), eCShell, (BYTE*)"\x88\x87\x00\x00\x00\x00\x89\x9F\x00\x00\x00\x00\x33\xD2", "xx????xx????xx", 2, true);
Formula23 (03-20-2022)
could someone make a file for CrossFire Brazil?
for ru cf
<cshell_x64.dll>+437A888
screen: https://imgur.com/a/VtLWfiA
and just below ( + 2FC )
screen: https://imgur.com/a/Vf50T7u
Formula23 (03-24-2022)