Jump to content
Metin2 Network
Create New...

Leaderboard

Popular Content

Showing content with the highest reputation on 11/18/2024 in all areas

  1. Password: metin2.network In item_proto.txt at line LIMIT_NONE 0 change to LIMIT_PITTY_REFINE 3 And value 3; is the necessarry pitty you must have to "guarantee success" Pitty System.rar
    2 points
  2. You can take all the zenaris graphics from here to added in your source + fix [Hidden Content] [Hidden Content]
    2 points
  3. Download: Martysama Download link.rar @SFX has fix for you search shop buttons position Fix: uiikashop.py For those who do not know how to install it, you have here the OVA and Game with Mysql tar.gz Download: Ova Download.rar Ova: User: root Password: password Navicat: (You need to create SSH Tunnel) User: root Password: password
    1 point
  4. Password: metin2.network 2a73efe636332b4c0ed4409567281b77.mp4 Dragon Soul Assistment.rar
    1 point
  5. Old: New: Metin2 Mini Map .rar
    1 point
  6. Advanced Duel System (Exchange).zip
    1 point
  7. A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory integrity checks, thread execution restrictions, hook detection, memory honeypots, and more. *Memory Integrity Check Gathers a collection of memory pages initially within the game's module (anticheat::cheat_monitor::init) and generates a CRC32 hash based on the memory contents of each page (calc_vpt_hashes) - each validated every cycle (anticheat::cheat_monitor::check_pages). *Thread Blocking Hooks RtlUserThreadStart and checks if the designated address of execution for the thread is within the correct memory bounds. In this case, it is called "image-only execution", where only threads within the primary image (and some other excluded images such as ucrtbased.dll) are allowed to have threads run. If a thread is running outside of these bounds then it is detected as malicious inside an invalid execution space. This also prevents debuggers from attaching the process since RtlUserThreadStart is executed before DbgUiRemoteBreakIn is called which executes outside of the secure boundaries. *Memory Honeypots Memory honeypots are created within the init routine, where memory pages aren't yet accessed, but when they are (which they shouldn't be), it is detected. Prevents "cheat" scanners. *Anti-Debugging Checks the PEB directly (instead of using IsDebuggerPresent, which can be easily looked up) for the value of the BeingDebugged flag as well as the value of NtGlobalFlag. Prone to just directly modifying the BeingDebugged flag to bypass this check though. DbgUiRemoteBreakIn is blocked because debug threads can't be executed in the process (DebugActiveProcess executes a thread within the process, but our process has memory bounds checking, simplified when thread scanning is mentioned.) TBA: Arbitrary Vectored Exception Handling Detection *Protected Functions Similar in concept to a memory integrity check, but specifically detects if Winsock routines designated as "protected" are hooked/modified, preventing user-mode packet modification and reading by software such as WPE Pro and rPE. *Process Scanner Scans each process based on the contents (process name, window name) and unique memory signature. *Module Scanner Scans the loaded modules in the process for any with blacklisted names. Download: RudiAC-master.zip
    1 point
  8. > FreeBSD 12+ > Mysql 5.6 > Visual Studio 2022 Presentation: [Hidden Content] Download Drive: [Hidden Content] Mega: [Hidden Content] VM: [Hidden Content]
    0 points
×
×
  • Create New...

Important Information

Terms of Service

Write what you are looking for and press enter or click the search icon to begin your search