Continuing on in our from start to trainer series, we are looking at a very
complicated value to find. Here I show possible ways to limit your searches as we
only have one opportunity to find this value, (when we purchase an upgrade).
Okay guys. Here is the newest installment of my free ESP. It now includes signature scanning, so it should continue to work for a very long time. (even after updates).
Adjustable ESP Color
A ton of people have been asking me for the source so here it is. The source(C#) is a little messy. As I have said in my previous posts: It's a very simple project that I didn't want to spend a ton of time on. So it is by no means a coding masterpiece. It is however, a great learning resource by nature since it is so simple. All of the classes are very straight forward, and I spent about 15 extra mins adding some comments to help comprehend some things that people(noobs) may find confusing. Honestly just made it for fun to see what all could be done with GDI in C#. I would never use GDI in a private hack because it is way too slow. BUT for a free hack, it's pretty good. For those who want to start making their own esps using directx I would recommend starting this route.
Again. This is undetected as of now, but you do risk a ban (as you do using any hack) by using this online. So use at your own risk.
To use this hack, run the game first... [Read More]
Here we go guys, part 3 of the How to Call Game Functions tutorial. In this tutorial you will learn how to reverse engineer __thiscall member functions and call them in your hacks. __thiscall functions are much different from calling functions of normal calling conventions like stdcall and cdecl, and sooner or later you will have to learn how to do this to call a game function in one of your hacks.
We're gonna be using, C++, x64dbg and IDA Pro to reverse engineer a little test program I made.
Like the last videos, We will reverse engineer the function prototypes using x64dbg and IDA Pro disassembler and write a internal DLL hack that will call the functions by address using a DLL injector.
Make sure to watch the first 2 parts of this tutorial before watching this one.