heya! this video is kinda old i know, i know. but just in case you're going to read this or.. anyone else with the proper experience.. i followed the tutorial and did end up with the same result, i also tried to rewrite it on my own a few times and happened to bump into things i can't quite explain. what's the reason for such return types we have to use for the dllmain and the actual thread, i seem being able to execute the code no matter if i leave the winapi out or use void as return type etc... kinda puzzling. also is there any reason we use DWORD as datatype instead of uintptr_t? it doesn't matter probably but i'm not sure. also i tried to write different assembly in my method but it doesn't change anything apparently. i checked the memory address in cheat engine and it does correctly jump into my function and NOPs the bytes i wanted to overwrite but it seems my assembly doesn't have any effect on the application (it's pretty much the same one you showed, probably slightly different but same procedure). when i put some console log in there instead it does actually print whatever i included in the console but assembly doesn't seem to work for me. i included the assembly past my console log to get back in memory so that works heh. if you have any idea i would really appreciate the help, thanks a lot for the video anyway it was really helpful and combined with other material very good material to get a better understanding of the topic!
great tutorial. Will this work in x64 processes too? inline assembly doesn't work in x64 architecture visual studio. but what about the detour you showed?
Dude I love your tutorials, I downloaded them all and I really want and hope to learn this stuff :) Because I love catching cheaters and I need to know how shit works before catching them, I'm not catching CSGO cheaters in particular but I do love to check pc's remotely in 1.6. Also I'll donate whenever I can, I promise :)
or you can read the current value, compare it with when it changed and add the result, it works better if the health taken is random, like getting shot by different weapons
do an assembly tutorial please, there is really not much about it. good content as always tho.
Please could you explain how to convert this to x64, since _asm is not aupported
that was a very good explanation at the beginning!
background music go hardd 🔥🔥
22:51 I like that Fu*********** folder
Why do you have len when it doesnt even matter because the relative address can only be 4 bytes long and the jmp is always 1 byte long?
which option you selected in new project->C/C++-> WHICH option? is it .dll or windows console?
heya! this video is kinda old i know, i know. but just in case you're going to read this or.. anyone else with the proper experience.. i followed the tutorial and did end up with the same result, i also tried to rewrite it on my own a few times and happened to bump into things i can't quite explain. what's the reason for such return types we have to use for the dllmain and the actual thread, i seem being able to execute the code no matter if i leave the winapi out or use void as return type etc... kinda puzzling. also is there any reason we use DWORD as datatype instead of uintptr_t? it doesn't matter probably but i'm not sure. also i tried to write different assembly in my method but it doesn't change anything apparently. i checked the memory address in cheat engine and it does correctly jump into my function and NOPs the bytes i wanted to overwrite but it seems my assembly doesn't have any effect on the application (it's pretty much the same one you showed, probably slightly different but same procedure). when i put some console log in there instead it does actually print whatever i included in the console but assembly doesn't seem to work for me. i included the assembly past my console log to get back in memory so that works heh. if you have any idea i would really appreciate the help, thanks a lot for the video anyway it was really helpful and combined with other material very good material to get a better understanding of the topic!
Please could you explain how to convert this to x64, since _asm is _declspec(naked) not aupported
Great tutorial but it's not actually working because you stomped th eax move when you went 8 bytes?
how do you know that the hp is stored on the eax register?
great tutorial. Will this work in x64 processes too? inline assembly doesn't work in x64 architecture visual studio. but what about the detour you showed?
no it wont, for x64 it's different because the jmp instruction is FF 25 00 00 00 00, etc it has 14 bytes minimum
Hey you didn't nop the unused bytes, what happened to those 3 unused bytes? are they auto nop'ed by the compiler?
How do I make it externally?
Can you make a tutorial about internal game hacking
Dude I love your tutorials, I downloaded them all and I really want and hope to learn this stuff :) Because I love catching cheaters and I need to know how shit works before catching them, I'm not catching CSGO cheaters in particular but I do love to check pc's remotely in 1.6.
Also I'll donate whenever I can, I promise :)
deprcsgo Appreciate it!
Thanks. assembly tutorial would be cool
yay
finally i found game hacking videos thank help me alot . can you make video persent1 hook or expl the consept hook bro ?
is old man peeing ? in corner
or you can read the current value, compare it with when it changed and add the result, it works better if the health taken is random, like getting shot by different weapons
nice one. keep it up!
Assembly tutorial plz? Also sick beats. Its sex musik
king
my man is epic
thank you
nice tut
skrt skrt nice voice
okay
Error LNK1120 1 unresolved externals Function Detouring Tutorial C:\Users\oneon\source
epos\Function Detouring Tutorial\Debug\Function Detouring Tutorial.exe 1
Error LNK2019 unresolved external symbol _main referenced in function "int __cdecl invoke_main(void)" (?invoke_main@@YAHXZ) Function Detouring Tutorial
How do I fix this?
nvm got it
@@-dead-3787 How?
thx
stop saying you are god and some shit
jmp inside _declspec(naked) void ourFunc() dont return to right address.