C01 C++ Modding

 Modding
Programs running on a user-controlled computer are amenable to “modding” . If a piece of information, such as an integer representing health or lives, exists in RAM, one may find and edit it to their liking. Taken to the extreme,
entirely new pieces of content may be added by users regardless of the author’s original intent (left : popular childrens’ character Thomas the Tank Engine has become the unofficial mascot of this flavor of hacking ). Some
game studios, such as the team behind Binding of Isaac , choose to add official support for modding via an  exposed Lua interface (right), making this activity much easier. The more “moddable” a game becomes, the more it begins to resemble a fully-expressive, turing-complete game engine.
Pitch
Homework #4 : Modding introduces students to the basics of customizable ( “moddable” ) software. Students will explore how software, such as games, expose their data and logic for the pleasure and productivity of their users. When software refuses to be customizable, students will employ RAM-searching tools to hack changes into existing programs, discovering the surprising agency they have over the software they run.
Purpose
On the path from finalized, unchangeable games to expressive, flexible game engines lies an interesting middle point– the topic of “ moddable ” games, or games that may be heavily customized by the users themselves. The original Skyrim was well-received when it released in November 2011, but users wanted more. They wanted Thomas . Skyrim ’s flexibility and customizability is why many are still playing it today– the community kept it alive through new content. As a game becomes more flexible and user-configurable, it begins to take on the qualities of a bonafide game engine– capable of expressing the creativity of the user, whatever that may be.
This assignment will--
Introduce tools for modding any software, such as the CrySearch Memory Scanner , and the principles required for modding / hacking in the hardest case (no developer support).
Familiarize students with typical patterns in software customizability (modding) and data externalization in anticipation of making our own text adventure games “moddable”.
Upgrade our text adventure codebases into a significantly more expressive “Text Adventure Engine”.
Tasks
Modding Without Developer Support (windows required - or use CAEN labs)
Investigate a Game
1. Download this game ( warning : consider turning sound down in public).
2. Familiarize yourself with the game’s mechanics and content. No need to play more than a few minutes.
Mod Your Experience
3. Try looking for human-readable, externalized asset files near the executable (but don’t look too long).
a. Your objective is to alter your in-game ring count.
4. Unable to easily locate any human-readable asset files, we’ll assert our agency over the game’s working memory to make our changes.
a. Run the game.
b. Run CrySearch Memory Scanner (also available on CAEN windows machines).
c. Attach to the target process.
d. Begin a new scan by attempting to guess the value of your “ring counter” variable.
e. Play the game and do something you think will make the variable change its value. Then, continue the scan by filtering for that specific kind of change (increased value, decreased, etc).
f. When only a small number of possible addresses / locations remain for the variable, save them by double-clicking and then change the value . If the UI changes in the game, congratulations! You have identified where the ring counter variable lies in memory. If not, start over with a new scan.
5. While playing the game, mod it such that you have at least 494 rings– a feat long thought impossible.
Share your Totally Genuine Accomplishment
6. Impress your peers by posting a screenshot or photo of your strangely-exceptional ring count in the discord “exhibition” channel. Imagine the things you could change or add if you had enough time and patience for this kind of thing (some do!)

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/758053.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

threejs 模型聚焦定位

需求:鼠标选中模型,然后点击定位按钮,将相机平移到模型跟前,相机视线不变 var box new THREE.Box3();//包围盒box.expandByObject(model);//model是模型var center new THREE.Vector3();box.getCenter(center);//获取中心点var …

测试人员如何进行需求分析?

在进行测试用例设计之前,我们通常需要对需求文档进行分析,甚至在需求评审阶段从测试角度给出建议。通过需求分析,不仅可以输出测试点,也可以发现需求中存在的问题。 业务角度和技术角度 测试需求的分析可以从两个不同的角度进行…

介绍5款 世界范围内比较广的 5款 mysql Database Management Tool

介绍5款 世界范围内比较广的 5款 Mysql Database Management Tool 文章目录 介绍5款 世界范围内比较广的 5款 Mysql Database Management Tool前言MySQL Workbench:Navicat Premium:DBeaver Community:HeidiSQL:SQLyog&#xff1a…

如何解决node-sass下载用的还是过期的淘宝源?

下载node-sass发现报错过期的证书 把npm的淘宝源换成最新的https://registry.npmmirror.com后发现还是指向了以前的淘宝源,看到一位博主说,单改npm源不够还要改下载node-sass的源,再次搜索另外一位博主提供了命令npm config ls可以使用它来查…

文件包含漏洞之包含NGINX日志文件(常用)

条件:知道目标服务器的日志文件存贮路径,并且存在文件包含漏洞 首先对目标服务器发送一次含有木马的请求,目的是让目标服务器日志中生成含有木马的日志记录。因为发送过程中,使用了url编码,我们抓包进行更改成能够执行…

图文详解io_uring高性能异步IO架构

说到高性能网络编程,我们第一时间想到的是epoll机制,epoll很长一段时间统治着整个网络编程江湖,然而io_uring的出现,似乎在撼动epoll的统治地位,今天我们来揭开io_uring的神秘面纱。 1.io_uring简介 io_uring是一个L…

竞赛 - 基于机器视觉的图像拼接算法

前言 图像拼接在实际的应用场景很广,比如无人机航拍,遥感图像等等,图像拼接是进一步做图像理解基础步骤,拼接效果的好坏直接影响接下来的工作,所以一个好的图像拼接算法非常重要。 再举一个身边的例子吧,…

Mac 使用 pip install mysqlclient 爆错 error: subprocess-exited-with-error 解决办法

在虚拟环境中安装 mysqlclient 发生报错: pipenv install mysqlclient报错如下: ERROR:pip.subprocessor:Getting requirements to build wheel exited with 1 [ResolutionFailure]: File "/Users/zhangyongxin/.local/share/virtualenvs/movie…

express+mysql+vue,从零搭建一个商城管理系统16--收货地址(全国省市县名称和code列表)

提示:学习express,搭建管理系统 文章目录 前言一、新建config/area.js二、新建models/address.js三、新建dao/address.js四、新建routes/address.js五、添加地址六、查询用户地址列表总结 前言 需求:主要学习express,所以先写serv…

Spring Data访问Elasticsearch----脚本和运行时字段Scripted and runtime fields

Spring Data访问Elasticsearch----脚本和运行时字段Scripted and runtime fields 一、person 实体二、存储库接口三、service类四、脚本化字段Scripted fields五、运行时字段Runtime fields Spring Data Elasticsearch支持脚本(scripted)字段和运行时(runtime)字段。有关此方面…

浅谈大模型“幻觉”问题

大模型的幻觉大概来源于算法对于数据处理的混乱,它不像人类一样可以by the book,它没有一个权威的对照数据源。 什么是大模型幻觉 大模型的幻觉(Hallucination)是指当人工智能模型生成的内容与提供的源内容不符或没有意义的现象。…

SpringCloud Gateway工作流程

Spring Cloud Gateway的工作流程 具体的流程: 用户发送请求到网关 请求断言,用户请求到达网关后,由Gateway Handler Mapping(网关处理器映射)进行Predicates(断言),看一下哪一个符合…

windows docker

写在前面的废话 最近在学习riscv的软件相关内容,倒是有别人的sg2042机器可以通过ssh使用,但是用起来太不方便了,经常断掉,所以想着在自己的机器上跑一跑riscv的操作系统。最常见的有两种方法吧,第一个就是qemu&#xf…

数据库运行状况和性能监控工具

数据库监控是跟踪组织中数据库的可用性、安全性和性能的过程,它涉及通过跟踪各种关键指标来分析数据库的性能,确保数据库的正常运行并具有深入的可见性,并在出现潜在问题时触发即时警报,以采取主动措施来确保数据库的高可用性。 …

制定工业物联网战略? 成功的5个关键考虑因素

随着越来越多的公司争夺注意力和收入,成功和创造、建设和创新的压力也在增加,这导致了对工业物联网战略的更大需求。 随着越来越多的公司争夺注意力和收入,成功和创造、建设和创新的压力也在增加,这导致了对工业物联网战略的更大需…

Win11专业工作站版系统密钥

Windows 11 专业工作站版是 Windows 11 专业版的加强版本,专为满足高性能工作负载的需求而设计。它在专业版的基础上增加了以下功能: 更高的硬件支持: 支持多达 4 个 CPU 和 6 TB 内存,支持最新的服务器级处理器和图形卡。增强的存储性能: 支…

一招让你的Mac重获新生,CleanMyMac助你轻松清理无用垃圾!

一招让你的Mac重获新生,CleanMyMac助你轻松清理无用垃圾! 告别卡顿,让你的Mac跑得更快更稳! 在当今这个快节奏的生活中,我们的工作和生活早已离不开电脑。特别是对于Mac用户来说,一台轻巧、快捷、稳定的Mac…

java算法第28天 | 93.复原IP地址 78.子集 90.子集II

93.复原IP地址 思路: 这里startIndex为插入‘.’的位置,使用回溯法遍历所有插入的位置,直接在原始字符串上操作。要注意的是开闭区间的规定(这里我规定的是左闭右闭区间)。还要明确什么时候能return。 class Solution…

HTML中的常用标签用法总结(持续更新...)

&#x1f31f; 欢迎来到 我的博客&#xff01; &#x1f308; &#x1f4a1; 探索未知, 分享知识 !&#x1f4ab; 本文目录 1. 标题标签2. 段落标签3. 链接标签4. 列表标签5. 图像标签6. 表格标签 1. 标题标签 <h1>至<h6>用于定义标题。<h1>是最大的标题&am…

模型部署——RKNN模型量化精度分析及混合量化提高精度

模型部署——RKNN模型量化精度分析及混合量化提高精度&#xff08;附代码&#xff09;-CSDN博客 3.1 量化精度分析流程 计算不同情况下&#xff0c;同一层网络输入值的余弦距离&#xff0c;来近似的查看每一层精度损失的情况。具体量化精度分析的流程如下&#xff1a; 3.2 量…