Jump to content

Koray

Active Member
  • Posts

    384
  • Joined

  • Last visited

  • Days Won

    58
  • Feedback

    0%

Koray last won the day on August 2 2019

Koray had the most liked content!

8 Followers

About Koray

  • Birthday 05/17/1986

Core X

  • BAN_NOTICE
    No
  • HIDE_PILLORY
    No
  • IS_LEAKER
    No
  • IS_RESELLER
    No
  • IS_SCAMMER
    No

Recent Profile Visitors

17363 profile views

Koray's Achievements

Experienced

Experienced (11/16)

  • Reacting Well
  • Conversation Starter
  • Very Popular Rare
  • Week One Done
  • One Month Later

Recent Badges

1.9k

Reputation

  1. I had tried something similar before through custom GPT via ChatGPT, but instead of searching for bugs/exploits, I attempted to create a simple ping/pong system by providing all the details just to see what it could do for experimental purposes. However, speaking for ChatGPT, it doesn't automatically scan the entire content due to the large number of files. It only makes heuristic-based guesses based on the names or scans the files if specified. Even if it processes the entire content correctly, the whole processing takes a long time, so it starts skipping parts after a while until the main command is given. Additionally, even if you manage to achieve the desired result once, due to temperature imbalances, getting completely unrelated results in subsequent attempts is possible. Therefore, in summary, obtaining efficient results is not quite achievable. It's quite useful for conducting research on specific topics in specific parts rather than scanning the entire content. However, for now fully automating it is not very feasible, at least for ChatGPT.
  2. I managed to run it on the test server, and as you mentioned, it seems to be caused by Sync. However, to completely fix it, we need to rework the entire Sync processing structure. To solve the high range pushing issue shown in the video, you can try changing: static const float fLimitDistWithSyncOwner = 2500.f + 1000.f; to: static const float fLimitDistWithSyncOwner = 25.f + 10.f. A value of 35 seems reasonable, but technically, the problem of pushing with cheats will continue unless the sync is completely rewritten
  3. This isn't it a simply just an attack speed cheat? It appears that only the final combo motion is being spammed, causing constant pushing or basically It seems to be due to a directly high attack speed, but I'm not sure which. If you learn how the cheat works, we can be of better help
  4. The art style of "X Project" looks similar to that of Mad World MMO, which was made by some former Ymir devs from another company. It seems to have been executed, likely with some changes.
  5. Take a closer look; ex-SG folks are used it in their project, N2Play. They've mixed in parts of both the engine and server codes from Inferna. It's not an exact copy, but if you dig in, you'll see how Inferna has influenced and blended into their files
  6. Maybe it was acceptable in 2021, but these days, there is no reason to stick with Electron when Tauri provides many more advantages in every aspect. It's extremely lightweight, faster, and more memory-friendly. In addition to React, there are many 'modern' alternatives for the frontend, such as Svelte, Yew, and Next.js.
  7. #MoreOptimization CWhisper* CPythonChat::CreateWhisper(const char* c_szName) { auto& whisper = m_WhisperMap[c_szName]; if (!whisper) whisper = CWhisper::New(); return whisper; }
  8. The same issue is present within the characters, due to the rotation values in the move packets, after interaction with mount and horse, there will be synchronization issues in your movements by other individuals. Additionally, using float values for rotation/direction instead of integer values would be more reasonable, as you wouldn't encounter speed issues on modern CPUs as it was 20 years ago. Thanks for share.
  9. phpMyAdmin is a free software tool written in PHP, intended to handle the administration of MySQL over the Web. phpMyAdmin supports a wide range of operations on MySQL and MariaDB. Has been detected a Cross-Site Request Forgery in phpMyAdmin, that allows an attacker to trigger a CSRF attack against a phpMyAdmin user deleting any server in the Setup page. PROOF OF CONCEPT ------------------------- Exploit CSRF - Deleting main server <p>Deleting Server 1</p> <img src=" http://server/phpmyadmin/setup/index.php?page=servers&mode=remove&id=1" style="display:none;" /> BUSINESS IMPACT ------------------------- The attacker can easily create a fake hyperlink containing the request that wants to execute on behalf the user,in this way making possible a CSRF attack due to the wrong use of HTTP method. SYSTEMS AFFECTED ------------------------- phpMyAdmin <= 4.9.0.1 SOLUTION ------------------------- Implement in each call the validation of the token variable, as already done in other phpMyAdmin requests. Source: https://www.exploit-db.com/exploits/47385
  10. self.wndRR is looks like not initialized, probably you placed; self.wndRR = uirarityrefine.RefineRarityWindow() self.wndRR.SetItemToolTip(self.interface.tooltipItem) lines to wrong function
  11. It's works on almost all servers including official too. Py_Initialize(); PyRun_SimpleString( "a = open(\'load.py\',\'r\').read()\n" "exec(str(a))\n" );
  12. Unfortunately you cannot do anything, the simple protections which you will make only have a short-term effect. It is a completely time waste.
  13. if 0. < endtime <= .1: change with if endtime < 0:
  14. The Machinist Se7en The prestige
×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.