Yes, I did.
Also, since it's open source, you can just look for what the different hacks entail. Most of them are just single addresses, moving one address to another, etc. Only one employs any if-then flow with process memory.
Invincibility is just a count down after you are hit. Using any...