Как включить radar hack в cs go с помощью ahk

Обновлено: 05.07.2024

Last Achievements

Beschreibung:
New Radar Hack (NEW VERSION) Undetected For Ever

Credits :
balto
SerGio


HOW TO RUN IT:

This is the new code radar hack / triggerbot /* Bhop / glow and colored HP !*
Copy & Paste the Script into .AHK file & dont forget to update it with new offsets of Dumper because
the last update it was 13/12/2016 :3 & protect the file with vmprotect or enigma (he cant vac detect it for ever)*
- Open CSGO
- Open Hack.ahk Protected By (VMP or Enigma)
- Profit

HOW TO USE IT:

BHOP is always activated.
Numpad 0 activates Radar hack.
Numpad 1 activates Triggerbot. [HOLD MMB] It has a randomized 80ms to 200ms delay.
Numpad 2 activates Triggerbot. [Activate once and it will automatically shoot]
Numpad 3 activates Aiming Help. [Will automatically aim at enemy once you shoot at him. It will slowly, softly and smoothly aim at his head]
Numpad 4 activates HEALTH. It will print out the enemy team's health. [NOT REALLY WELL MADE]


AutoHotKey = NEVER VAC detected!

SOURCE CODE:

Process = csgo.exe
DllName = client.dll
msgbox, WAIT WAIT WAIT

Process, Exist, %Process%
PID = %ErrorLevel%
SetFormat, Integer, Hex
Base := GetDllBase(DllName, PID)

start:=0x00000000
loop start:=start+0x1000
check:=ReadMemory(start+0x4,"Counter-Strike: Global Offensive")
check2:=ReadMemory(check,"Counter-Strike: Global Offensive")

break
>
if (start>0xDDDDDDDD)
msgbox, Something went wrong O.o
>

loop
offset:=offset+0x4
check:=ReadMemory(offset,"Counter-Strike: Global Offensive")
checka:=check+0x1c
check2:=ReadMemory(check+0x1c,"Counter-Strike: Global Offensive")
if (check2==0x72617065)
break
>
if (offset>end)
msgbox, something went wrong OMG
>
>

msgbox, OMG!WALLHACKER. D:

t1:=ReadMemory(offsets3,"Counter-Strike: Global Offensive")
t2:=ReadMemory(offsets3+0x8,"Counter-Strike: Global Offensive")
t3:=ReadMemory(offsets3+0x10,"Counter-Strike: Global Offensive")
t4:=ReadMemory(offsets3+0x18,"Counter-Strike: Global Offensive")
t5:=ReadMemory(offsets3+0x20,"Counter-Strike: Global Offensive")
t6:=ReadMemory(offsets3+0x28,"Counter-Strike: Global Offensive")
t7:=ReadMemory(offsets3+0x30,"Counter-Strike: Global Offensive")

ct1:=ReadMemory(offsetsct,"Counter-Strike: Global Offensive")
ct2:=ReadMemory(offsetsct+0x8,"Counter-Strike: Global Offensive")
ct3:=ReadMemory(offsetsct+0x10,"Counter-Strike: Global Offensive")
ct4:=ReadMemory(offsetsct+0x18,"Counter-Strike: Global Offensive")
ct5:=ReadMemory(offsetsct+0x20,"Counter-Strike: Global Offensive")
ct6:=ReadMemory(offsetsct+0x28,"Counter-Strike: Global Offensive")
ct7:=ReadMemory(offsetsct+0x638,"Counter-Strike: Global Offensive")


t11:=t1+0x96D
t111:=ReadMemoryString(t11,"Counter-Strike: Global Offensive")
rewritetex(t111,t11)
t22:=t2+0xC0F
t222:=ReadMemoryString(t22,"Counter-Strike: Global Offensive")
rewritetex(t222,t22)
t33:=t3+0x45D
t333:=ReadMemoryString(t33,"Counter-Strike: Global Offensive")
rewritetex(t333,t33)
t44:=t4+0x7e1
t444:=ReadMemoryString(t44,"Counter-Strike: Global Offensive")
rewritetex(t444,t44)
t55:=t5+0xACC
t555:=ReadMemoryString(t55,"Counter-Strike: Global Offensive")
rewritetex(t555,t55)
t66:=t6+0xFD
t666:=ReadMemoryString(t66,"Counter-Strike: Global Offensive")
rewritetex(t666,t66)
t77:=t7+0x838
t777:=ReadMemoryString(t77,"Counter-Strike: Global Offensive")
rewritetex(t777,t77)

ct11:=ct1+0x27D
ct111:=ReadMemoryString(ct11,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct22:=ct2+0x219d
t222:=ReadMemoryString(ct22,"Counter-Strike: Global Offensive")
rewritetex2(ct222,ct22)
ct33:=ct3+0x378
ct333:=ReadMemoryString(ct33,"Counter-Strike: Global Offensive")
rewritetex2(ct333,ct33)
ct44:=ct4+0x7e1
ct444:=ReadMemoryString(ct44,"Counter-Strike: Global Offensive")
rewritetex2(ct444,ct44)
ct55:=ct5+0xA70
ct555:=ReadMemoryString(ct55,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct66:=ct6+0x111
ct666:=ReadMemoryString(ct66,"Counter-Strike: Global Offensive")
rewritetex2(ct666,ct66)
ct77:=ct7+0xEB7
ct777:=ReadMemoryString(ct77,"Counter-Strike: Global Offensive")
rewritetex2(ct777,ct77)

Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
< WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
WriteMemory(0x3020395B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
WriteMemory(0x225D3020,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
>
>

Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
< WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
WriteMemory(0x3020305B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
WriteMemory(0x225D3920,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
>
>

ReadMemory(MADDRESS,PROGRAM)
winget, pid, PID, %PROGRAM%
VarSetCapacity(MVALUE,4,0)
ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "UInt")
DllCall("ReadProcessMemory","UInt",ProcessHandle,"UInt",MADDRESS,"Str",MVALUE,"UInt",4,"UInt *",0)
Loop 4
result += *(&MVALUE + A_Index-1) << 8*(A_Index-1)
return, result
>


WriteMemory(WVALUE,MADDRESS,PROGRAM)
winget, pid, PID, %PROGRAM%

ProcessHandle := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", PID, "UInt")
DllCall("WriteProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "Uint*", WVALUE,"Uint", 4, "Uint *", 0)

DllCall("CloseHandle", "int", ProcessHandle)
return
>

GetDllBase(DllName, PID = 0)
TH32CS_SNAPMODULE := 0x00000008
INVALID_HANDLE_VALUE = -1
VarSetCapacity(me32, 548, 0)
NumPut(548, me32)
snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
, "Uint", PID)
If (snapMod = INVALID_HANDLE_VALUE) Return 0
>
If (DllCall("Module32First", "Uint", snapMod, "Uint", &me32)) while(DllCall("Module32Next", "Uint", snapMod, "UInt", &me32)) If !DllCall("lstrcmpi", "Str", DllName, "UInt", &me32 + 32) DllCall("CloseHandle", "UInt", snapMod)
Return NumGet(&me32 + 20)
>
>
>
DllCall("CloseHandle", "Uint", snapMod)
Return 0
>


ReadMemoryString(MADDRESS,PROGRAM)
winget, pid, PID, %PROGRAM%

ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "Uint")
teststr =
Loop 32
Output := "x"
tempVar := DllCall("ReadProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "str", Output, "Uint", 1, "Uint *", 0)
if (ErrorLevel or !tempVar)
DllCall("CloseHandle", "int", ProcessHandle)
return teststr
>

teststr = %teststr%%Output%
MADDRESS++
>
DllCall("CloseHandle", "int", ProcessHandle)
return, teststr

После того как я создал эту тему я был уверен что еще что-то создадут через AHK , я не прогадал, внимание, RADAR HACK через AutoHotkey.

Как он устроен и как это вообще работает:
1. Лично BunnyHop работает тем что цикл прыжка бесконечно повторяется при нажатии на клавишу SPACE , WallHack через память игры, а вот радар уже неизвестно, потому что у меня нету исходника скрипта.
2. Почему в формате .exe ? Если запустить через .ahk , будет проблема запустится скрипту, так как он не прочтет память игры, radar.exe скомпилирован через ANSI-32 , поэтому и .exe формат.

Запуск:
1. Запускаем CS:GO , желательно чтобы Вы были на сервере.
2. Запускаем radar.exe .
3. Если не отображает врагов, нажмите на F6 .

Насчет VAC 'a я уверен что он будет долго UNDETECT , так как тот же Wallhack через .ahk меняет память игры, считайте это уже внедрение, а Radar только считывает информацию и дает её на радаре (если я в чём-то не прав поправьте ниже).


Константин Градобойнов

Показать полностью.
Process = csgo.exe
DLLName = client.dll

dwLocalPlayer = 0xD8C2CC
dwEntityList = 0x4DA541C

dw_bSpotted = 0x93D
dw_iTeamNum = 0xF4
dw_bDormant = 0xED

Process, Exist, %Process%
ProcessID = %ErrorLevel%

ProcessHandle := GetProcessHandle("Counter-Strike: Global Offensive")

Client := GetDllBase(DLLName, ProcessID)

LocalPlayer := ReadMemory(Client + dwLocalPlayer, ProcessHandle)
LocalTeam := ReadMemory(LocalPlayer + dw_iTeam, ProcessHandle)
Loop
<
if (Num <= 64)
Num++
else
Num = 1

; needed functions - dont touch unless you know what youre doing

GetProcessHandle(name)
<
winget, pid, PID, %name%
h := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", pid, "UInt")
return, h
>

WriteMemory(address, newval, processhandle)
<
return DllCall("WriteProcessMemory", "UInt", processhandle, "UInt", address, "UInt*", newval, "UInt", 4, "UInt *", 0)
>

ReadMemory(address, processhandle)
<
VarSetCapacity(addr,4,0)
DllCall("ReadProcessMemory", "UInt", processhandle, "UInt", address, "Str", addr, "UInt", 4, "UInt *", 0)
Loop 4
result += *(&addr + A_Index-1) « 8*(A_Index-1)
return, result
>

GetDllBase(DllName, PID = 0)
<
TH32CS_SNAPMODULE := 0x00000008
INVALID_HANDLE_VALUE = -1
VarSetCapacity(me32, 548, 0)
NumPut(548, me32)
snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
, "Uint", PID)
If (snapMod = INVALID_HANDLE_VALUE) <
Return 0
>

Читайте также: