Page 1 of 1

CS:GO - "Phlick's ESP"

Posted: 16 Apr 2017, 04:49
by Phlick
This cheat is undetectable due to it not actually injecting nor changing any files in the game directory/directories. VAC can't detect this for shit, however if you use it too obviously you might get Overwatched. Use it at your risk!

Instructions:
- 1. Open/Launch the cheat. (Phlick's ESP.ahk)
- 2. Open/Launch CS:GO.
- 3. Whilst in main menu, press F6.
- 4. Wait...
- 5. After message has been received, press F6 in main menu again.
- 6. Nothin' will happen, but the cheat is injected...

Code: Select all

; <COMPILER: v1.0.48.5>
F6::
 
Process = csgo.exe
DllName = client.dll
 msgbox, [Phlick's ESP] Updating...
 
Process, Exist, %Process%
PID = %ErrorLevel%
SetFormat, Integer, Hex
Base := GetDllBase(DllName, PID)
 
start:=0x00000000
loop {
start:=start+0x1000
check:=ReadMemory(start+0x4,"Counter-Strike: Global Offensive")
check2:=ReadMemory(check,"Counter-Strike: Global Offensive")
 
if (check2==0x6574616D)
 
 
{
 
break
}
if (start>0xDDDDDDDD)
{
msgbox, [Phlick's ESP] Failed!
}
 
}
offset:=start+0x550
end:=start+0x2000
 
loop
{
offset:=offset+0x4
check:=ReadMemory(offset,"Counter-Strike: Global Offensive")
checka:=check+0x1c
check2:=ReadMemory(check+0x1c,"Counter-Strike: Global Offensive")
if (check2==0x72617065)
{
break
}
if (offset>end)
{
msgbox, [Phlick's ESP] Failed!
}
}
 
msgbox, [Phlick's ESP] Done, press F6 in main menu!
 
offsets3:=offset
 
t1:=ReadMemory(offsets3,"Counter-Strike: Global Offensive")
t2:=ReadMemory(offsets3+0x8,"Counter-Strike: Global Offensive")
t3:=ReadMemory(offsets3+0x10,"Counter-Strike: Global Offensive")
t4:=ReadMemory(offsets3+0x18,"Counter-Strike: Global Offensive")
t5:=ReadMemory(offsets3+0x20,"Counter-Strike: Global Offensive")
t6:=ReadMemory(offsets3+0x28,"Counter-Strike: Global Offensive")
t7:=ReadMemory(offsets3+0x30,"Counter-Strike: Global Offensive")
 
offsetsct:=offsets3+0x30+0xC0
 
ct1:=ReadMemory(offsetsct,"Counter-Strike: Global Offensive")
ct2:=ReadMemory(offsetsct+0x8,"Counter-Strike: Global Offensive")
ct3:=ReadMemory(offsetsct+0x10,"Counter-Strike: Global Offensive")
ct4:=ReadMemory(offsetsct+0x18,"Counter-Strike: Global Offensive")
ct5:=ReadMemory(offsetsct+0x20,"Counter-Strike: Global Offensive")
ct6:=ReadMemory(offsetsct+0x28,"Counter-Strike: Global Offensive")
ct7:=ReadMemory(offsetsct+0x638,"Counter-Strike: Global Offensive")
 
 
t11:=t1+0x96D
t111:=ReadMemoryString(t11,"Counter-Strike: Global Offensive")
rewritetex(t111,t11)
t22:=t2+0xC0F
t222:=ReadMemoryString(t22,"Counter-Strike: Global Offensive")
rewritetex(t222,t22)
t33:=t3+0x45D
t333:=ReadMemoryString(t33,"Counter-Strike: Global Offensive")
rewritetex(t333,t33)
t44:=t4+0x7e1
t444:=ReadMemoryString(t44,"Counter-Strike: Global Offensive")
rewritetex(t444,t44)
t55:=t5+0xACC
t555:=ReadMemoryString(t55,"Counter-Strike: Global Offensive")
rewritetex(t555,t55)
t66:=t6+0xFD
t666:=ReadMemoryString(t66,"Counter-Strike: Global Offensive")
rewritetex(t666,t66)
t77:=t7+0x838
t777:=ReadMemoryString(t77,"Counter-Strike: Global Offensive")
rewritetex(t777,t77)
 
 
 
ct11:=ct1+0x27D
ct111:=ReadMemoryString(ct11,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct22:=ct2+0x219d
t222:=ReadMemoryString(ct22,"Counter-Strike: Global Offensive")
rewritetex2(ct222,ct22)
ct33:=ct3+0x378
ct333:=ReadMemoryString(ct33,"Counter-Strike: Global Offensive")
rewritetex2(ct333,ct33)
ct44:=ct4+0x7e1
ct444:=ReadMemoryString(ct44,"Counter-Strike: Global Offensive")
rewritetex2(ct444,ct44)
ct55:=ct5+0xA70
ct555:=ReadMemoryString(ct55,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct66:=ct6+0x111
ct666:=ReadMemoryString(ct66,"Counter-Strike: Global Offensive")
rewritetex2(ct666,ct66)
ct77:=ct7+0xEB7
ct777:=ReadMemoryString(ct77,"Counter-Strike: Global Offensive")
rewritetex2(ct777,ct77)
 
 
 
 
 
 
 
 
ExitApp
 
 
rewritetex(Haystack,offsettex)
{
 
Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
  {  WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
    WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
    WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
	WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
    WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
    WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
    WriteMemory(0x3020395B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
    WriteMemory(0x225D3020,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
	}
 
rewritetex2(Haystack,offsettex)
{
 
Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
   { WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
    WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
    WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
	WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
    WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
    WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
    WriteMemory(0x3020305B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
    WriteMemory(0x225D3920,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
	}
 
 
 
 
 
ReadMemory(MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%
VarSetCapacity(MVALUE,4,0)
ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "UInt")
DllCall("ReadProcessMemory","UInt",ProcessHandle,"UInt",MADDRESS,"Str",MVALUE,"UInt",4,"UInt *",0)
Loop 4
result += *(&MVALUE + A_Index-1) << 8*(A_Index-1)
return, result
}
 
 
 
 
 
 
WriteMemory(WVALUE,MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%
 
 
 
ProcessHandle := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", PID, "UInt")
DllCall("WriteProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "Uint*", WVALUE,"Uint", 4, "Uint *", 0)
 
DllCall("CloseHandle", "int", ProcessHandle)
return
}
 
 
 
GetDllBase(DllName, PID = 0)
{
   TH32CS_SNAPMODULE := 0x00000008
    INVALID_HANDLE_VALUE = -1
    VarSetCapacity(me32, 548, 0)
    NumPut(548, me32)
    snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
                                                 , "Uint", PID)
    If (snapMod = INVALID_HANDLE_VALUE) {
        Return 0
    }
    If (DllCall("Module32First", "Uint", snapMod, "Uint", &me32)){
        while(DllCall("Module32Next", "Uint", snapMod, "UInt", &me32)) {
            If !DllCall("lstrcmpi", "Str", DllName, "UInt", &me32 + 32) {
                DllCall("CloseHandle", "UInt", snapMod)
                Return NumGet(&me32 + 20)
            }
        }
    }
    DllCall("CloseHandle", "Uint", snapMod)
    Return 0
}
 
 
ReadMemoryString(MADDRESS,PROGRAM)
{
	winget, pid, PID, %PROGRAM%
 
			ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "Uint")
			teststr =
			Loop 32
			{
			   Output := "x"
			   tempVar := DllCall("ReadProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "str", Output, "Uint", 1, "Uint *", 0)
			   if (ErrorLevel or !tempVar)
			   {
				  DllCall("CloseHandle", "int", ProcessHandle)
				  return teststr
			   }
 
 
 
			   teststr = %teststr%%Output%
			   MADDRESS++
			}
			DllCall("CloseHandle", "int", ProcessHandle)
			return, teststr
 
}

Re: CS:GO - "Phlick's ESP"

Posted: 16 Apr 2017, 14:15
by SnowFlake
is this code mabe by balto?

also i made some changes

Code: Select all

IF  (A_ahkversion <= 1.1.25.04)
{
MsgBox,You have an old Autohotkey version! Downlad the latest verion here: https://autohotkey.com/download/
ExitApp
}

IF NOT A_IsAdmin
{
   Run *RunAs "%A_ScriptFullPath%"
   ExitApp
}

#SingleInstance,Force

F6::
SoundBeep
Process = csgo.exe
DllName = client.dll
Sleep,2000
 
Process, Exist, %Process%
PID = %ErrorLevel%
SetFormat, Integer, Hex
Base := GetDllBase(DllName, PID)
 
start:=0x00000000
loop {
start:=start+0x1000
check:=ReadMemory(start+0x4,"Counter-Strike: Global Offensive")
check2:=ReadMemory(check,"Counter-Strike: Global Offensive")
 
if (check2==0x6574616D)
 
 
{
 
break
}
if (start>0xDDDDDDDD)
{
msgbox, [Phlick's ESP] Failed!
}
 
}
offset:=start+0x550
end:=start+0x2000
 
loop
{
offset:=offset+0x4
check:=ReadMemory(offset,"Counter-Strike: Global Offensive")
checka:=check+0x1c
check2:=ReadMemory(check+0x1c,"Counter-Strike: Global Offensive")
if (check2==0x72617065)
{
break
}
if (offset>end)
{
msgbox, [Phlick's ESP] Failed!
}
}
 
msgbox, [Phlick's ESP] Done, press F6 in main menu!
 
offsets3:=offset
 
t1:=ReadMemory(offsets3,"Counter-Strike: Global Offensive")
t2:=ReadMemory(offsets3+0x8,"Counter-Strike: Global Offensive")
t3:=ReadMemory(offsets3+0x10,"Counter-Strike: Global Offensive")
t4:=ReadMemory(offsets3+0x18,"Counter-Strike: Global Offensive")
t5:=ReadMemory(offsets3+0x20,"Counter-Strike: Global Offensive")
t6:=ReadMemory(offsets3+0x28,"Counter-Strike: Global Offensive")
t7:=ReadMemory(offsets3+0x30,"Counter-Strike: Global Offensive")
 
offsetsct:=offsets3+0x30+0xC0
 
ct1:=ReadMemory(offsetsct,"Counter-Strike: Global Offensive")
ct2:=ReadMemory(offsetsct+0x8,"Counter-Strike: Global Offensive")
ct3:=ReadMemory(offsetsct+0x10,"Counter-Strike: Global Offensive")
ct4:=ReadMemory(offsetsct+0x18,"Counter-Strike: Global Offensive")
ct5:=ReadMemory(offsetsct+0x20,"Counter-Strike: Global Offensive")
ct6:=ReadMemory(offsetsct+0x28,"Counter-Strike: Global Offensive")
ct7:=ReadMemory(offsetsct+0x638,"Counter-Strike: Global Offensive")
 
 
t11:=t1+0x96D
t111:=ReadMemoryString(t11,"Counter-Strike: Global Offensive")
rewritetex(t111,t11)
t22:=t2+0xC0F
t222:=ReadMemoryString(t22,"Counter-Strike: Global Offensive")
rewritetex(t222,t22)
t33:=t3+0x45D
t333:=ReadMemoryString(t33,"Counter-Strike: Global Offensive")
rewritetex(t333,t33)
t44:=t4+0x7e1
t444:=ReadMemoryString(t44,"Counter-Strike: Global Offensive")
rewritetex(t444,t44)
t55:=t5+0xACC
t555:=ReadMemoryString(t55,"Counter-Strike: Global Offensive")
rewritetex(t555,t55)
t66:=t6+0xFD
t666:=ReadMemoryString(t66,"Counter-Strike: Global Offensive")
rewritetex(t666,t66)
t77:=t7+0x838
t777:=ReadMemoryString(t77,"Counter-Strike: Global Offensive")
rewritetex(t777,t77)
 
 
 
ct11:=ct1+0x27D
ct111:=ReadMemoryString(ct11,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct22:=ct2+0x219d
t222:=ReadMemoryString(ct22,"Counter-Strike: Global Offensive")
rewritetex2(ct222,ct22)
ct33:=ct3+0x378
ct333:=ReadMemoryString(ct33,"Counter-Strike: Global Offensive")
rewritetex2(ct333,ct33)
ct44:=ct4+0x7e1
ct444:=ReadMemoryString(ct44,"Counter-Strike: Global Offensive")
rewritetex2(ct444,ct44)
ct55:=ct5+0xA70
ct555:=ReadMemoryString(ct55,"Counter-Strike: Global Offensive")
rewritetex2(ct111,ct11)
ct66:=ct6+0x111
ct666:=ReadMemoryString(ct66,"Counter-Strike: Global Offensive")
rewritetex2(ct666,ct66)
ct77:=ct7+0xEB7
ct777:=ReadMemoryString(ct77,"Counter-Strike: Global Offensive")
rewritetex2(ct777,ct77)
 
ExitApp
 
 
rewritetex(Haystack,offsettex)
{
 
Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
  {  WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
    WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
    WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
	WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
    WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
    WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
    WriteMemory(0x3020395B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
    WriteMemory(0x225D3020,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
	}
 
rewritetex2(Haystack,offsettex)
{
 
Needle = "$rimlight"
StringGetPos, pos, Haystack, %Needle%
if (pos >= 0)
   { WriteMemory(0x6E676924,offsettex+pos+0x0,"Counter-Strike: Global Offensive")
    WriteMemory(0x7A65726F,offsettex+pos+0x4,"Counter-Strike: Global Offensive")
    WriteMemory(0x20203120,offsettex+pos+0x8,"Counter-Strike: Global Offensive")
	WriteMemory(0x0A0D0A0D,offsettex+pos+0xC,"Counter-Strike: Global Offensive")
    WriteMemory(0x6C6F6324,offsettex+pos+0x10,"Counter-Strike: Global Offensive")
    WriteMemory(0x2220726F,offsettex+pos+0x14,"Counter-Strike: Global Offensive")
    WriteMemory(0x3020305B,offsettex+pos+0x18,"Counter-Strike: Global Offensive")
    WriteMemory(0x225D3920,offsettex+pos+0x1C,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x20,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x24,"Counter-Strike: Global Offensive")
    WriteMemory(0x0A0D0A0D,offsettex+pos+0x28,"Counter-Strike: Global Offensive")
}
	}
 
 
  
ReadMemory(MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%
VarSetCapacity(MVALUE,4,0)
ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "UInt")
DllCall("ReadProcessMemory","UInt",ProcessHandle,"UInt",MADDRESS,"Str",MVALUE,"UInt",4,"UInt *",0)
Loop 4
result += *(&MVALUE + A_Index-1) << 8*(A_Index-1)
return, result
}

WriteMemory(WVALUE,MADDRESS,PROGRAM)
{
winget, pid, PID, %PROGRAM%
 
ProcessHandle := DllCall("OpenProcess", "int", 2035711, "char", 0, "UInt", PID, "UInt")
DllCall("WriteProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "Uint*", WVALUE,"Uint", 4, "Uint *", 0)
 
DllCall("CloseHandle", "int", ProcessHandle)
return
}
 
GetDllBase(DllName, PID = 0)
{
   TH32CS_SNAPMODULE := 0x00000008
    INVALID_HANDLE_VALUE = -1
    VarSetCapacity(me32, 548, 0)
    NumPut(548, me32)
    snapMod := DllCall("CreateToolhelp32Snapshot", "Uint", TH32CS_SNAPMODULE
                                                 , "Uint", PID)
    If (snapMod = INVALID_HANDLE_VALUE) {
        Return 0
    }
    If (DllCall("Module32First", "Uint", snapMod, "Uint", &me32)){
        while(DllCall("Module32Next", "Uint", snapMod, "UInt", &me32)) {
            If !DllCall("lstrcmpi", "Str", DllName, "UInt", &me32 + 32) {
                DllCall("CloseHandle", "UInt", snapMod)
                Return NumGet(&me32 + 20)
            }
        }
    }
    DllCall("CloseHandle", "Uint", snapMod)
    Return 0
}
 
 
ReadMemoryString(MADDRESS,PROGRAM)
{
	winget, pid, PID, %PROGRAM%
 
			ProcessHandle := DllCall("OpenProcess", "Int", 24, "Char", 0, "UInt", pid, "Uint")
			teststr =
			Loop 32
			{
			   Output := "x"
			   tempVar := DllCall("ReadProcessMemory", "UInt", ProcessHandle, "UInt", MADDRESS, "str", Output, "Uint", 1, "Uint *", 0)
			   if (ErrorLevel or !tempVar)
			   {
				  DllCall("CloseHandle", "int", ProcessHandle)
				  return teststr
			   }
 
 
 
			   teststr = %teststr%%Output%
			   MADDRESS++
			}
			DllCall("CloseHandle", "int", ProcessHandle)
			return, teststr
 
}

Re: CS:GO - "Phlick's ESP"

Posted: 17 Apr 2017, 22:05
by 99muppets
Wrong, reading memory is still detected by vac, I would take this down.

Re: CS:GO - "Phlick's ESP"

Posted: 18 Apr 2017, 04:34
by stallionz
Hello! Why is the cheat only working to see terrorists and not CT

Re: CS:GO - "Phlick's ESP"

Posted: 04 Jan 2018, 17:18
by ALIENshoop
99muppets wrote:Wrong, reading memory is still detected by vac, I would take this down.
Actually, I was pretty sure they couldn't detect memory reading, but they could detect lines of code that have been used by people who were banned. That is why private cheats cost money, each hack is programmed differently as to not be detected if somebody else using the same private cheat gets banned using it.

Re: CS:GO - "Phlick's ESP"

Posted: 23 Jan 2018, 13:42
by GreatGazoo
ALIENshoop wrote:
99muppets wrote:Wrong, reading memory is still detected by vac, I would take this down.
Actually, I was pretty sure they couldn't detect memory reading, but they could detect lines of code that have been used by people who were banned. That is why private cheats cost money, each hack is programmed differently as to not be detected if somebody else using the same private cheat gets banned using it.
funny how he says it doesn't actually inject anything, then on the instructions #6 he says nothing happens but the cheat IS injected

so which is it?