viewtopic.php?p=71135#p71135
CODEX USERS:
Of course the table isn't going to work properly for you. Why? You've been reporting issues that have existed long before this updated anti-cheat came out, so I know you are working with an old version. A number of things have changed since then. The current table also uses the module address in some of the scripts which is specifically tied to the Steam Version, let alone Build ID. While they may enable, its hooking a completely different location. I said I would help you out eventually, but to be honest, I'm not sure when I'll get around to it. In the meantime, start sifting through Flings old trainers. Or try this, again not all options will work:
Code: Select all
{$lua}
local function hex(input)
return string.format("%02X", input)
end
local function restoreCheck(start_address)
local indx = 100
while indx < 200 do
if readBytes(start_address+indx,1) == 0xB0 then
if readBytes(start_address+indx+1,1) == 0x01 then
if readBytes(start_address+indx+2,1) == 0x90 then
writeBytes(start_address+indx,0x0f, 0x94, 0xc0)
return 1
end
end
end
indx = indx + 1
end
return 0
end
local function removeCheck(start_address)
local indx = 100
while indx < 200 do
if readBytes(start_address+indx,1) == 0x0f then
if readBytes(start_address+indx+1,1) == 0x94 then
if readBytes(start_address+indx+2,1) == 0xc0 then
writeBytes(start_address+indx,0xB0, 0x01, 0x90)
return 1
end
end
end
indx = indx + 1
end
return 0
end
local function aa_tamper(activate)
local aobs = AOBScan("8B 02 48 8D 52 04 48 33 D8", "+X-C-W", 0)
local modded = 0
if aobs ~= nil then
for ind = 0,aobs.count-1 do
if activate then
modded = modded + removeCheck(getAddress(aobs[ind]))
else
modded = modded + restoreCheck(getAddress(aobs[ind]))
end
end
end
--print(modded.." places modified.")
end
[ENABLE]
aa_tamper(true)
[DISABLE]
aa_tamper(false)
^Seikur0's old bypass, should work on Codex. I'm pretty sure if you grab his table, that'll work as well.