This offset may contain a pointer to a desired memory location or a function call you wish to use.
Unlike offsets, signatures still remain the same in most cases when the binary is updated as long as that related code section is not modified, making it an excellent choice to find pointers to memory locations that survive updates.
Windower has been using this technique for years to survive update, and now we are providing it to you guys.
Download here: http://windower.net/...can/SigScan.zip
Download contains full examples in C++, C# and VB.NET.
Please read the documentation for usage information.
Note: The documentation does not yet contain a tutorial on FINDING signatures. I'll have to get to writing that up when I get time. If someone else wishes to write a tutorial please do. I highly recommend CheatEngine.
Some useful signatures
UTCTime = (unsigned int*) ((unsigned int)SigScan("b0015ec390518b4c24088d4424005068",36) + 0xC); IsInCombat = (BYTE*) SigScan("83C408DFE0F6C4050F8A610100005FC605"); Target = (TargetInfo**) SigScan("53568bf18b480433db3bcb75065e33c05b59c38b0d",24); //note this is a double pointer.. MobArray = (Mob**) SigScan("8B560C8B042A8B0485"); //note this is a double pointer.. Party = (PartyDisplay*) SigScan("0fbec38d0c5256578bf58d04488d0c808d0448b9130000008d04c5"); Inventory = (sInventory**) SigScan("3b05XXXXXXXX741285c0"); //note this is a double pointer..