Created
July 17, 2014 10:49
-
-
Save erayarslan/9b9042432d105e20df7f to your computer and use it in GitHub Desktop.
Memory Hack Attacker
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <iostream> | |
#include <conio.h> | |
#include <windows.h> | |
using namespace std; | |
int main() | |
{ | |
int yenideger1 = 61; // yeni degeri 61 olarak tanimladik | |
HWND pencere = FindWindow(0,"/* Müdahale edilecek yazılımın Görev yöneticisindeki -Görev- altındaki ismi yazılacaktır*/"); // | |
if (pencere == 0) | |
{ | |
cerr << "Uygulama bulunamadi."<<endl; | |
} | |
else | |
{ | |
DWORD uygulamaid; | |
GetWindowThreadProcessId(pencere,&uygulamaid); | |
HANDLE islem= OpenProcess(PROCESS_ALL_ACCESS,FALSE,uygulamaid); | |
if(!islem) | |
{ | |
cerr<<"Islem yapilamadi."<<endl; | |
} | |
else | |
{ | |
int basarili1 = WriteProcessMemory(islem,(LPVOID)0x22ff0c,¥ideger1,(DWORD)sizeof(yenideger1),NULL);// 0x22ff0c değeri değiştirilecek değişkenin adresi | |
if(basarili1>0) | |
{ | |
clog<<"Basarili."<<endl; | |
} | |
else | |
{ | |
cerr<<"Hata."<<endl; | |
} | |
CloseHandle(islem); | |
} | |
} | |
getch(); | |
return 0; | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment