Jump to content

Koray

Active Member
  • Posts

    384
  • Joined

  • Last visited

  • Days Won

    58
  • Feedback

    0%

Everything posted by Koray

  1. telestatu = 0 def __Teleport(self): global telestatu if telestatu == 0: import uiteleport telestatu = 1 uiteleport.TeleportWindow().Open() else: import uiteleport telestatu = 0 uiteleport.TeleportWindow().Hide() try this
  2. change locale.cfg with to mine You make this for that feature? Best Regards Ellie I'm using squence patcher This tool
  3. Hello community I created windows files with small fixed Base: Game & DB Core Base > mainline, Client Base novaline Files Base (ThatGuyPT v2) Locale Base (Maxmi v3.2) Client base (iExchange & WeiShen) Features: AhnLab HS Included Server & Client Side ThatGuyPT v2 files mklink problems fixed Internal ip changed 192.168 > 999.999 Python core upgrade 2.2.3 > 2.7.6 Belt & DSS Systems Activiated Dice and Korean dice commands & features deleted /war crash command bug fixed Change equipment with full inventory fixed Removed Time bomb Invisible bug fixed Hp & Mp negative bug fixed Dropable dss materials(with /e ds_drop 1) Changed drop time calculated to seconds Stun bug fixed Skillbook remove just one Polymorph's Bug Damage fixed Chat bug fixed Activiated 6-7 bonus Added QC & QC Gui(from ThatGuyPT) Belt Inventory bug fixed Bonus and Stones if EQ is Equipped fixed Deactivited Log.txt(Clientside) Map allow changed 32 > 64 Shutdown bug fixed Added 3.Inventory Added Dragon Coins and NP for inventory (incompleted serverside) Added new inventory style Added DSS Button to inventory Fixed Guild exploit Fixed sura skill bug Item stealer fixed 0 yang shop bug fixed CHECKPOINT shutdown: tics did not updated fixed Priv empire drops changed 200 > 1000 Costume 6-7 bonus bug fixed Added trade effect Activiated pc_change_name 70024 & 70035 activiated add to NPC Removed bonus time limit Max status changed 90> max level Kill quest trigger fixed ImmuneBug fixed Added CONFIG option 'TXT_STARTUP = 1' DB Startup error fixed Added 'dead' event for quest Deleted glass need for link items Guild level limit changed 100 Guild member limit changed UNLIMITED CheckClientPacket fixed Item drop time changed 30 seconds Unknown packet header error fixed Adding python opttions TRUE and FALSE New Commands: /ban /unban /kill_all /drop_item New Quest Funcs: pc_get_ip pc_kill pc_set_coins pc_get_empire_name item_get_wearflag item_is_wearflag item_get_attr item_set_attr item_equip npc_select npc_get_pid pc_warp_to_map_observer_position get_level get_name get_type get_rank is_metin is_boss show_effect_on_target get_ip get_client_version get_job get_pid get_exp get_mount_vnum get_point get_real_point show_effect disconnect_with_delay get_max_level get_ip get_client_version kill drop_item_and_select is_mine purge_vid get_flag get_wearflag get_antiflag has_antiflag get_refine_set get_limit get_apply get_applies get_refine_materials get_addon_type dec inc add_attribute get_attribute set_attribute change_attribute add_rare_attribute get_rare_attribute set_rare_attribute change_rare_attribute equip set_count game_drop_item_and_select Installition: Download & Install xampp Move Mysql > Mysql Files >>> C:xamppmysqldata Open xampp and Activate mysql Connect mysql and repair account table Unrar".rar" folder and open "install.bat" with notepad Change folder directory "cd C:UsersasusDesktopSFWindows" Run install.bat Open game with "start - 1ch.bat" or "start - 4ch.bat" Acc Info: Game: paci admin Mysql: mt2 yolo Connect Info: 127.0.0.1 ch1 13001 ch2 62210 ch3 62310 ch4 62410 auth 4000 New Pack(tab5 problem fixed): [Hidden Content] Game v1.2: Python version downgrade 2.7.6 > 2.7.3 (due to the lib problems) Max level status problems fixed Added version info Link: [Hidden Content] Virustotal: [Hidden Content] Game v1.1: -Sequence Error disabled -Normal exp, yang,item drop bug fixed(my fault ) Link: [Hidden Content] Virustotal: [Hidden Content] Files: Test client for 40250 > [Hidden Content] My binary and packs: [Hidden Content] Server files: [Hidden Content] Virustotal: Test Client 40250: [Hidden Content] My Binary and packs: [Hidden Content] Server files: [Hidden Content] Sorry my bad english Regards
  4. YmirBase/AntiAccess.h(7) : error C4430: missing type specifier - int assumed. Note: C++ does not support default-int Line 7: '{' how to fix?
  5. try adding two spaces at the end ListBox.SetScrollBar(scroll) return bar, ListBox
  6. when login with pc.is_gm() begin send_letter("Admin Panel") end when button or info begin if pc.is_gm() then now is better because get_name easily bypass as clientside
  7. This is not game play system, I think SMS system(half PM system) for online players because; ...commontables.h _ line 1029 - 1035 typedef struct SPacketGDSMS { char szFrom[CHARACTER_NAME_MAX_LEN + 1]; char szTo[CHARACTER_NAME_MAX_LEN + 1]; char szMobile[MOBILE_MAX_LEN + 1]; char szMsg[SMS_MAX_LEN + 1]; } TPacketGDSMS; Edit: I have tried at 34083 but not work(net.SendChatPacket("/mobile " + text))
  8. Hello community [Hidden Content] [Hidden Content] How to activate, does anyone have any information?
  9. Download this script and call with prototype.py, like "import pyname" This is basic anti cheat system, not fully game protection system
  10. Thank you, nice work :-) nice but bypassable yep this only base protection like enigma, this not completely anti cheat. in addition to you only need to disable readmemory for anti-bypass
  11. well its not impossible to make but this will just stupid why work on 34k with shity and limited difs while you can do (almost anything) with src as long as you are a pro in c++ You are really right but i don't interesting about source of metin2 i just need communicate client and game of file for securing my hackshield, i am only developing security softwares for metin2. interesting.. hackshield have to do server communication ? communication dif file don't done with dissamble, and communication nothing to do with dif
  12. Name and byte check for game launcher def syslog func use win module I forget remove to downloadbadwordlist this method for <40k users because no more than an alternative, this only log table so help to gm
  13. M2 Download Center Download Here ( Internal ) Hello my own use simple anti cheat protection like enigma; What u need? Simple php file for logging Win32modules for 2.2 or 2.7 and badlist.php([Hidden Content]) and secur.dll([Hidden Content]) What this Functions: Base protection > Name + Byte Folder Secuirty > BGM + Miles + Lib + Main Folder Folder Check > ".py" + ".mix" + ".m3d" + ".bat" + ".flt" + ".asi" Hash Check > Miles folder, python core, security base dll, os.pyc(for baseinit methode) TaskList Check Windows Check Script; import sys import os import app import time import thread import dbg import ui import md5 import urllib import uiCommon from os.path import basename try: import win32api except: syslog('Cant import win32api module') dbg.LogBox("Cant import win32api module") app.Exit() DATA_URL = "[Hidden Content]" launchername = sys.executable taskname = basename(launchername) launchers = os.path.getsize(taskname) launchersize = int(launchers) check=' '.join(os.listdir(os.getcwd())) check_miles=' '.join(os.listdir(os.getcwd()+"miles")) check_bgm=' '.join(os.listdir(os.getcwd()+"bgm")) check_lib=' '.join(os.listdir(os.getcwd()+"lib")) check_folder=' '.join(os.listdir(os.getcwd())) ######preparation################################# ##HashFonk def getMd5(file): m = md5.new() fp = open(file,"rb") while 1: data = fp.read(1024) if not data:break m.update(data) fp.close() return m.hexdigest() def getMD5ByFileName(file): try: file = file.strip() md5hash = md5.new() dllFile = open(file, 'rb') tmpFileBlock = dllFile.read() dllFile.close() md5hash.update(tmpFileBlock) md5hash = md5hash.hexdigest() return md5hash except: return '' def ReturnMd5(file,hash): if(getMd5(file) != hash ):return TRUE else:return FALSE def syslog(s): file = open('syserr.txt', 'a') file.write('n' + s + 'n') file.close() def ingameNotifyPopupAndExit(text = ''): popup = uiCommon.PopupDialog() popup.SetWidth(700) popup.SetText(text) popup.Show() time.sleep(7) ###/////////###################################### #Base Security > Name+Byte def BaseCheck(): global launchername, taskname, launchersize if not taskname == "metin2cliento.exe" or launchersize == "3171985": dbg.LogBox("Wrong launcher") os.system("taskkill /im %s /f" % taskname) #Folder Secuirty > BGM + Miles + Lib + Main Folder def FileCheck(): global check, check_bgm, check_folder, check_miles, check_lib banned_ext=[".mix", ".m3d", ".flt", ".asi", ".bat"] miles_clean=["mssa3d.m3d", "mssds3d.m3d", "mssdsp.flt", "mssdx7.m3d", "msseax.m3d", "mssmp3.asi", "mssrsx.m3d", "msssoft.m3d", "mssvoice.asi"] lib_clean=['__future__.pyc','copy_reg.pyc','linecache.pyc','ntpath.pyc','os.pyc','site.pyc','stat.pyc','string.pyc','traceback.pyc','types.pyc','UserDict.pyc','urllib.pyc','win32con.pyc','threading.pyc'] folder_clean=['BGM', 'artpclnt.dll', 'pn.dll', 'channel.inf', 'config.exe', 'devil.dll', 'DSETUP.dll', 'errorlog.exe', 'errorlog.txt', 'granny2.dll', 'ijl15.dll', 'ilu.dll', 'locale.cfg', 'metin2cliento.exe', 'metin2.cfg', 'mouse.cfg', 'mscoree.dll', 'MSS32.DLL', 'msvcp60.dll', 'MSVCRTD.DLL', 'patchw32.dll', 'python22.dll', 'SpeedTreeRT.dll', 'syserr.txt', 'unicows.dll', 'hshield', 'lib', 'mark', 'miles', 'pack', 'temp', 'upload', 'patchskin', 'skins', 'screenshot'] bgm_clean=['a_rhapsody_of_war.mp3','another_way.mp3','back_to_back.mp3','blacksea.mp3','catacomb_of_devil.mp3','characterselect.mp3','death_of_landmark.mp3','desert.mp3','enter_the_east.mp3','follow_war_god.mp3','last-war2.mp3','login_window.mp3','lost_my_name.mp3','m2bg.mp3','misty_forest.mp3','monkey_temple.mp3','mountain_of_death.mp3','mt.mp3','only_my_battle.mp3','open_the_gate.mp3','save_me.mp3','wedding.mp3','wonderland.mp3','xmas.mp3'] for i in miles_clean: check_miles=check_miles.replace(i, '') for i in lib_clean: check_lib=check_lib.replace(i, '') for i in bgm_clean: check_bgm=check_bgm.replace(i, '') for i in folder_clean: check_folder=check_folder.replace(i, '') for i in banned_ext: if check.find(i) != -1: f=open("syserr.txt", "w") nome="%s%s" % (i[0].upper(), i[1:]) f.write("[HACKSHIELD]Invaild File!n" + nome) f.close() app.Exit() if check_bgm.find(i) != -1: f=open("syserr.txt", "w") nome="%s%s" % (i[0].upper(), i[1:]) f.write("[HACKSHIELD]Invaild File!n" + nome) f.close() app.Exit() if check_miles.find(i) != -1: f=open("syserr.txt", "w") nome="%s%s" % (i[0].upper(), i[1:]) f.write("[HACKSHIELD]Invaild File!n" + nome) f.close() app.Exit() if check_lib.find(i) != -1: f=open("syserr.txt", "w") nome="%s%s" % (i[0].upper(), i[1:]) f.write("[HACKSHIELD]Invaild File!n" + nome) f.close() app.Exit() if check_folder.find(i) != -1: f=open("syserr.txt", "w") nome="%s%s" % (i[0].upper(), i[1:]) f.write("[HACKSHIELD]Invaild File!n" + nome) f.close() app.Exit() #Folder check > ".py" def PyDelete(): while 1 == 1: files = [f for f in os.listdir('.') if os.path.isfile(f)] for f in files: if f.endswith(".py"): f1 = f try: os.remove(f) except: pass if f1 == "logininfo.py": syslog("[HACKSHIELD]Detected Hack File") app.Exit("") time.sleep(1) #######Hash Control def HashCheck(): ##Miles if len(os.listdir('miles')) != 10 : return 'Wrong file detected' d = { 'miles/mss32.dll': '6400e224b8b44ece59a992e6d8233719', 'miles/mssa3d.m3d':'e089ce52b0617a6530069f22e0bdba2a', 'miles/mssds3d.m3d':'85267776d45dbf5475c7d9882f08117c', 'miles/mssdsp.flt':'cb71b1791009eca618e9b1ad4baa4fa9', 'miles/mssdx7.m3d':'2727e2671482a55b2f1f16aa88d2780f', 'miles/msseax.m3d':'788bd950efe89fa5166292bd6729fa62', 'miles/mssmp3.asi':'189576dfe55af3b70db7e3e2312cd0fd', 'miles/mssrsx.m3d':'7fae15b559eb91f491a5f75cfa103cd4', 'miles/msssoft.m3d':'bdc9ad58ade17dbd939522eee447416f', 'miles/mssvoice.asi':'3d5342edebe722748ace78c930f4d8a5' } for x in d: if ReturnMd5(x, d[x]): return TRUE else: return FALSE if getMd5("python22.dll") != "97FB91610702B63F071282E9CF86B8C0" : dbg.LogBox("Invaild file:" + "python22.dll") app.Exit() if getMd5("secur.dll") != "F01C8F12DD4662F566433B6DA1B2735E" : dbg.LogBox("Invaild file:" + "secur.dll") app.Exit() if getMd5("lib/os.pyc") != "d0d09c7daa9d57373cd7586a74ec4099" : dbg.LogBox("Invaild file:" + "os.pyc") app.Exit() ##CheckProcess def ProcCheck(): whitelist = ["putty.exe","filezilla.exe"] hack = [] result = [] while 1==1: for l in os.popen("secur.dll "+ str(os.getpid())).readlines(): line = l.lower() if (line.find("switch") != -1 or line.find("hack") != -1 or line.find("inject") != -1 or line.find("bot") != -1 or line.find("loader") != -1 or line.find("lalaker") != -1 or line.find("hile") != -1): urllib.urlopen(DATA_URL + "hack.php?oyuncu=" + player.GetName() + "&server=" + str(net.GetServerInfo().split(',')[0]) + "&hack=" + l[0]) time.sleep(5) break for line in os.popen('secur.dll ' + str(os.getpid())).readlines(): try: if line.strip() != '' and line.strip().startswith('EXE'): line = line.split(' ') line.pop(0) line.pop(0) line = ' '.join(line) f = open(line.strip(), 'r') if f: result.append(line.strip()) except: continue return [] for p in os.popen("tasklist v"): processi = p.read().lower() if (processi.find("hack") != -1 or processi.find("inject") != -1 or processi.find("inject") != -1 or processi.find("bot") != -1 or processi.find("cheat") != -1 or processi.find("ollydbg") != -1 or processi.find("actool") != -1 or processi.find("allydbg") != -1 or processi.find("ollyice") != -1 or processi.find("windbg") != -1 or processi.find("softice") != -1 or processi.find("m2bob") != -1): p = processi.split() if p[0] in whitelist: continue time.sleep(4) if p[0] not in hack: urllib.urlopen(DATA_URL + "hack.php?oyuncu=" + player.GetName() + "&server=" + str(net.GetServerInfo().split(',')[0]) + "&hack=" + l[0]) time.sleep(5) time.sleep(20) return FileCheck() BaseCheck() HashCheck() thread.start_new_thread(PyDelete, ()) thread.start_new_thread(ProcCheck, ()) regards
  14. Reading problem solved but very irregular, what can i do? [Hidden Content]
  15. 0828 20:52:08681 :: CInstanceBase::RegisterEffect(eEftType=266, c_szEftAttachBone=, c_szEftName=d:/ymir work/effect/hit/percent_damage3.mse, isCache=1) - Error 0828 20:52:14288 :: Unknown packet header: 196, last: 76 21 0828 20:52:15416 :: GRANNY: r:/granny/rt/granny_file_info.cpp(145): File has run-time type tag of 0x8000000f, which doesn't match this version of Granny (0x80000010). Automatic conversion will be attempted. fix?
  16. Cancığım Mainline_sg/Srcs kısımında Extern adlı klasör ve içeriği olmadığı için bu hatayı veriyor. Novalina ya da diğer sourcelerden Extern adlı klasör ve içeriğini atarsan sorun kalkar. Hayır maxmiciğim sorun ondan kaynaklı değil. Sorun Makefileyi Depend etmediğinden kaynaklı. Ayrıca Novaline branşı mainlineye uymaz. Çok bilmiş seni. WOOW! HE IS REALLY DEVOLEPER
  17. how to do use "net.SendQuestInputStringPacket" func? example how read to serverside string
×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.