ce修改吧 关注:2,150贴子:3,727
  • 32回复贴,共1

求星际战甲CE修改

只看楼主收藏回复

有偿


IP属地:广东1楼2021-08-10 21:26回复
    无限能量的,无敌和子弹的需要再找我吧
    { Game : Warframe.x64.exe
    Version:
    Date : 2021-10-09
    Author : zsz
    This script does blah blah blah
    }
    [ENABLE]
    aobscanmodule(POWER,Warframe.x64.exe,0C 48 8B D9 F3 0F 11 08 8B 10) // should be unique
    alloc(newmem,$1000,"Warframe.x64.exe"+CAFBD)
    label(code)
    label(return)
    newmem:
    code:
    movss [rax],xmm0
    mov edx,[rax]
    jmp return
    POWER+04:
    jmp code
    nop
    return:
    registersymbol(POWER)
    [DISABLE]
    POWER+04:
    db F3 0F 11 08 8B 10
    unregistersymbol(POWER)
    dealloc(newmem)
    {
    // ORIGINAL CODE - INJECTION POINT: "Warframe.x64.exe"+CAFBD
    "Warframe.x64.exe"+CAFAA: CC - int 3
    "Warframe.x64.exe"+CAFAB: CC - int 3
    "Warframe.x64.exe"+CAFAC: CC - int 3
    "Warframe.x64.exe"+CAFAD: CC - int 3
    "Warframe.x64.exe"+CAFAE: CC - int 3
    "Warframe.x64.exe"+CAFAF: CC - int 3
    "Warframe.x64.exe"+CAFB0: 40 53 - push rbx
    "Warframe.x64.exe"+CAFB2: 48 83 EC 20 - sub rsp,20
    "Warframe.x64.exe"+CAFB6: 48 8D 41 0C - lea rax,[rcx+0C]
    "Warframe.x64.exe"+CAFBA: 48 8B D9 - mov rbx,rcx
    // ---------- INJECTING HERE ----------
    "Warframe.x64.exe"+CAFBD: F3 0F 11 08 - movss [rax],xmm1
    "Warframe.x64.exe"+CAFC1: 8B 10 - mov edx,[rax]
    // ---------- DONE INJECTING ----------
    "Warframe.x64.exe"+CAFC3: 33 D0 - xor edx,eax
    "Warframe.x64.exe"+CAFC5: 81 F2 2C 22 B3 4C - xor edx,4CB3222C
    "Warframe.x64.exe"+CAFCB: C1 CA 09 - ror edx,09
    "Warframe.x64.exe"+CAFCE: 89 10 - mov [rax],edx
    "Warframe.x64.exe"+CAFD0: 81 F2 58 23 D5 76 - xor edx,76D52358
    "Warframe.x64.exe"+CAFD6: 89 54 24 38 - mov [rsp+38],edx
    "Warframe.x64.exe"+CAFDA: F3 0F 10 44 24 38 - movss xmm0,[rsp+38]
    "Warframe.x64.exe"+CAFE0: F3 0F 11 41 08 - movss [rcx+08],xmm0
    "Warframe.x64.exe"+CAFE5: 48 8D 4C 24 38 - lea rcx,[rsp+38]
    "Warframe.x64.exe"+CAFEA: E8 81 EF 05 00 - call Warframe.x64.exe+129F70
    }


    IP属地:湖南2楼2021-11-08 22:00
    收起回复
      无限子弹,这个包括弓箭类的,弓箭类的和枪类的子弹不是一个地址
      [ENABLE]
      aobscanmodule(ammo1,Warframe.x64.exe,C7 66 C1 C8 0B 66 89 01 B9 09 7D 00 00) // should be unique
      alloc(newmem1,$1000,"Warframe.x64.exe"+D22E4D)
      label(code1)
      label(return1)
      newmem1:
      code1:
      mov ecx,00007D09
      jmp return1
      ammo1+05:
      jmp code1
      nop
      nop
      nop
      return1:
      registersymbol(ammo1)
      aobscanmodule(ammo,Warframe.x64.exe,66 89 3A 48 8B 5C 24 30) // should be unique
      alloc(newmem,$1000,"Warframe.x64.exe"+DC5516)
      label(code)
      label(return)
      newmem:
      code:
      mov rbx,[rsp+30]
      jmp return
      ammo:
      jmp code
      nop
      nop
      nop
      return:
      registersymbol(ammo)
      [DISABLE]
      ammo1+05:
      db 66 89 01 B9 09 7D 00 00
      unregistersymbol(ammo1)
      dealloc(newmem1)
      ammo:
      db 66 89 3A 48 8B 5C 24 30
      unregistersymbol(ammo)
      dealloc(newmem)


      IP属地:湖南3楼2021-11-10 21:08
      收起回复
        资源和经验都可以改,但是动经验和资源必封,活不过三天。
        倍功的话也简单,改护甲和血的时候加格判断,不是自己的护甲或血直接改为1,枪枪秒
        国际服一异常就半天上不去,麻烦,连吸怪都没心情做了


        IP属地:湖南4楼2021-11-10 21:12
        回复
          改护甲。下面有个地方自己根据情况改为你自己的护甲十六进制
          { Game : Warframe.x64.exe
          Version:
          Date : 2021-11-05
          Author : zsz
          This script does blah blah blah
          }
          [ENABLE]
          aobscanmodule(hp1,Warframe.x64.exe,E8 72 36 17 FF) // should be unique
          alloc(newmem,$1000,"Warframe.x64.exe"+151B649)
          label(code)
          label(code1)
          label(code2)
          label(return)
          newmem:
          code:
          cmp rax,62c //这个地方守护吸收护甲的,一级MOD不要改,高级的MOD自己调试着改
          je code1
          jmp code2
          code1:
          jmp return
          code2:
          cmp rax,2d5 //这个地方改自己护甲最高值的十六进制
          je code1
          //这个地方要改敌人1护甲的加个赋值1就可以了,我不记得是RAX还是RSI了,自己调试试试就知道了
          call Warframe.x64.exe+68ECC0
          jmp return
          hp1:
          jmp code
          return:
          registersymbol(hp1)
          [DISABLE]
          hp1:
          db E8 72 36 17 FF
          unregistersymbol(hp1)
          dealloc(newmem)
          {
          // ORIGINAL CODE - INJECTION POINT: "Warframe.x64.exe"+151B649
          "Warframe.x64.exe"+151B624: 48 8D 8B C0 1A 00 00 - lea rcx,[rbx+00001AC0]
          "Warframe.x64.exe"+151B62B: 8B D0 - mov edx,eax
          "Warframe.x64.exe"+151B62D: 85 F6 - test esi,esi
          "Warframe.x64.exe"+151B62F: 45 8B C4 - mov r8d,esp
          "Warframe.x64.exe"+151B632: 44 8B F8 - mov r15d,eax
          "Warframe.x64.exe"+151B635: 44 0F 4F C6 - cmovg r8d,esi
          "Warframe.x64.exe"+151B639: 44 3B C0 - cmp r8d,eax
          "Warframe.x64.exe"+151B63C: 41 0F 4C D0 - cmovl edx,r8d
          "Warframe.x64.exe"+151B640: 89 54 24 50 - mov [rsp+50],edx
          "Warframe.x64.exe"+151B644: 48 8D 54 24 50 - lea rdx,[rsp+50]
          // ---------- INJECTING HERE ----------
          "Warframe.x64.exe"+151B649: E8 72 36 17 FF - call Warframe.x64.exe+68ECC0
          // ---------- DONE INJECTING ----------
          "Warframe.x64.exe"+151B64E: 3B F7 - cmp esi,edi
          "Warframe.x64.exe"+151B650: 0F 8D 89 01 00 00 - jnl Warframe.x64.exe+151B7DF
          "Warframe.x64.exe"+151B656: F3 0F 10 B3 20 1D 00 00 - movss xmm6,[rbx+00001D20]
          "Warframe.x64.exe"+151B65E: 48 8D BB EC 1A 00 00 - lea rdi,[rbx+00001AEC]
          "Warframe.x64.exe"+151B665: 8B 07 - mov eax,[rdi]
          "Warframe.x64.exe"+151B667: C1 C0 11 - rol eax,11
          "Warframe.x64.exe"+151B66A: 33 C7 - xor eax,edi
          "Warframe.x64.exe"+151B66C: 3D B3 CA AE AC - cmp eax,ACAECAB3
          "Warframe.x64.exe"+151B671: 75 08 - jne Warframe.x64.exe+151B67B
          "Warframe.x64.exe"+151B673: F3 0F 58 B3 9C 1E 00 00 - addss xmm6,[rbx+00001E9C]
          }


          IP属地:湖南5楼2021-11-10 21:23
          收起回复
            弓箭类子弹的地址更新后已经失效,等有时间我再去找吧,这两天没怎么上游戏啊,玩暗黑3去了


            IP属地:湖南6楼2021-11-13 22:31
            收起回复
              范围吸物,给个思路大佬


              来自Android客户端7楼2021-11-16 17:37
              收起回复
                裙修改吧


                IP属地:广东来自iPhone客户端10楼2023-03-11 21:45
                回复
                  怎么联系


                  IP属地:河北来自iPhone客户端13楼2023-09-28 23:49
                  回复