This is a shitty working method:
Code:
#include <windows.h>
#pragma comment(lib, "User32.lib")
#pragma comment(lib, "psapi.lib")
#include <psapi.h>
#include <TlHelp32.h>
#using <System.dll>
using namespace System;
BYTE* GetRemoteBase(unsigned long pId, char *module)
{
MODULEENTRY32 modEntry;
HANDLE tlh = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, pId);
modEntry.dwSize = sizeof(MODULEENTRY32);
Module32First(tlh, &modEntry);
do
{
System::String^ modx = gcnew String(modEntry.szModule);
System::String^ mody = gcnew String(module);
if(modx == mody)
return modEntry.modBaseAddr;
modEntry.dwSize = sizeof(MODULEENTRY32);
}
while(Module32Next(tlh, &modEntry));
return NULL;
}
Code:
char user[128];
char pass[128];
int base = (int)GetRemoteBase(PIDZz, "Tibia.exe");
int userAddr = base + 5570108;
int passAddr = base + 5570136;
ReadProcessMemory(Booz, (void*)userAddr, user, 30, NULL);
ReadProcessMemory(Booz, (void*)passAddr, pass, 30, NULL);
And i'm quite sure this really is a "reconnect" thinggy you're looking for and absolutely not a way to steal accounts lol xD