anyone want code? i dont give a crap at this stage
email dpeterson@viztek.net
-jk.exe not modified
-procedurally generates x86 assembly functions in JK's virtual space
-run-time injection of code / eg. hijacking jk's process
-experimental work with supplanting pieces of executable code; overwriting functionality while process is active
-experimental work with hijacking directdraw interface for custom gui overlays
on another note:
i cancelled my dedicated server but i still have the files that were stored on the respository for the 'JKUP' project most recently headed by Zeq; this includes the disassembler software and the JK project with several people's hard work identifying specific functions and components inside the jk engine. my additions involved DirectDraw and DirectShow involvement
[ B A H ]
Bad *** by nature,
Hackers by choice
Bad *** by nature,
Hackers by choice