Jump to content

swiss

Inactive Member
  • Posts

    5
  • Joined

  • Last visited

  • Feedback

    0%

About swiss

Recent Profile Visitors

326 profile views

swiss's Achievements

Rookie

Rookie (2/16)

  • First Post
  • Week One Done
  • One Month Later

Recent Badges

8

Reputation

  1. do you have your source with the keys you used? if yes then you can unpack if not search on google , few years ago there was a tool that could show you the keys of a client , i dont know if it still functional of even somewhere.
  2. giving the fact that you have access to binary source you can use this: [Hidden Content] just open xtea_keys_generator.py and where genKey() put your your keys from static DWORD s_adwEterPackKey[] and static DWORD s_adwEterPackSecurityKey[] . it should generate your hex in order to unpack [Hidden Content]
  3. did you try with this? std::replace(nume_item.begin(), nume_item.end(), "_", " "); because i installed yesterday this system and it seems to work ok.
  4. INCDIR += -I../../../Extern/include/boost just check and for sql injection
  5. so you asking because you want to protect your self? or you want to harm? cause i think you lean to the second one.
×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.