Jump to content
Moopler

All Activity

This stream auto-updates     

  1. Yesterday
  2. Last week
  3. Razz

    Moopler Script editing

    Hey all, I just wanted to let you know that anyone can edit (read: update) scripts in the Scripts Database now. For now only the script, MapleStory version and optional remarks can be updated after the script has been posted. Hopefully this will make it easier to update scripts and prevent the Script Database from getting cluttered with outdated scripts. How to Open a script in the Script Database and press the 'Edit' link under the script. Rules The general 'core' rules apply. Abuse will result in a permanent ban. Yours sincerely, Razz
  4. retaz

    Help GMS Bypass

    wshh is the self proclaimed god tier hacker aka phoenixgk. in reality he is dumber than a sack of rocks. he probably even use the bypass posted by sprux.
  5. Razz

    Help GMS Bypass

    This should work fine:
  6. wshh

    Help GMS Bypass

    Not able to use the bypass over at gk for some reason i'm thinking its there Auth system and i'm not getting much help over there to fix it, is it possible for anyone on this forum to release a bypass without the auth system where you dont have to login into your GK acc to use the bypass. (or any site for that matter) Thank you guys in advance.
  7. smulikom

    Help LF>help with updating a bypass

    ohh i know u.. lol u the one who hacked kinney lol
  8. Kernel

    Help LF>help with updating a bypass

    Add me VirtualKernel#7177
  9. smulikom

    Help LF>help with updating a bypass

    30$ for just pass hashcheck of skills.wz i got all other bypass
  10. Kernel

    Help LF>help with updating a bypass

    How much you willing to pay?
  11. hey all, i got a modify client for elisionms and im trying to update it but i dont have enough knowledge .. its suppose to be small work just to pass hashcheck of skills.wz file im willing to pay for it
  12. sleeveless

    Information Scripts for v162.4

    Wrong, unpack the client and you'll see.
  13. Earlier
  14. koreanrice

    Help Do you know anyone?

    You can use lemmings with this script
  15. tlqkf12

    Help Do you know anyone?

    Mob Fall Down Script Do you know anyone? GMS
  16. Sweet, I keep running in to typing issues that are all alien to me and having to stop to do some reading. Progress is slow, but it's been a lot faster thanks to you guys Having been a C# engineer for years I'm amazed by all the things that I've taken for granted. Right now I'm comparing Cryptography libraries for C++, whereas I'm so used to just using System.Security.Cryptography.
  17. NewSprux2.0?

    Help Hooking ws2_32.dll send/recv functions

    Yes, if it is raw packets then byte arrays are just ... well... a sequence of bytes 😛 Strings can be both char-strings and wchar-strings. In a regular string (char-string) every character is 1 byte long. In a wchar-string (wide char), every character is 2 bytes.
  18. I did consider that, but I wouldn't have expected packets to be coming in with different encodings in the same packet right? (EDIT: I think what I said is retarded, it's been a long day...) I can see my email in plaintext in the first logged packet surrounded by what look like encrypted bytes. I've had a look online for information around the packet encryption in the game I'm working with and I already understand the methods involved, just need to work on a C++ implementation. I think my main struggle will be figuring out the correct types to use for the information, for example byte arrays would be a vector of chars?
  19. NewSprux2.0?

    Help Hooking ws2_32.dll send/recv functions

    Could also look like some kind of wrong encoding (utf8 vs unicode vs ascii).
  20. Awesome, turns out this was the main problem. I can now see my process loaded in to memory! I've managed to get both examples working in the end, thank you again for the code snippets you've posted! I'm now able to log packets out to file but it looks like they're encrypted. I'm logging out to file like so decltype(&send) send_hook = [](SOCKET s, const char *buf, int len, int flags) -> int { std::ofstream myfile; myfile.open("C:\\Users\\jamie\\Desktop\\test.txt", std::ios_base::app | std::ios_base::out); myfile << len << " " << buf << " " << "\n"; myfile.close(); return _send(s, buf, len, flags); }; I've made the assumption that writing them out like this doesn't require me to do anything like construct a string with the characters coming in. Here's a snippet of what I see in my file: 14 ÚK)ʯú¶E�E\ÕŸë{k{7�–il.com� 3 bZŽÊ¯ú¶E�E\ÕŸë{k{7�–il.com� 3 y�Âʯú¶E�E\ÕŸë{k{7�–il.com� 3 �´ ʯú¶E�E\ÕŸë{k{7�–il.com� 3 �L¦Ê¯ú¶E�E\ÕŸë{k{7�–il.com� 3 Á(êʯú¶E�E\ÕŸë{k{7�–il.com� 3 �»uʯú¶E�E\ÕŸë{k{7�–il.com� 3 ÏàÞʯú¶E�E\ÕŸë{k{7�–il.com� 3 ÿ{õʯú¶E�E\ÕŸë{k{7�–il.com� Judging by the characters at the end, could that contain my email address? 😕 There was a packet that didnt look encrypted at the beginning which was solely my login email address. Looks like the next step is to try and find the encryption/decryption functions with IDA.
  21. It is because you are returning 0 upon DLL_PROCESS_ATTACH, refer https://msdn.microsoft.com/en-us/library/windows/desktop/ms682583(v=vs.85).aspx
  22. @Roast Go by the CreateMutex example (in above code you're not using the correct return type and so on, not sure why your hook is not correctly allocated though): #include <winsock2.h> #include <Ws2tcpip.h> #pragma comment(lib, "Ws2_32.lib") bool Detour__Send() { static decltype(&send) _send = &send; decltype(&send) send_hook = [](SOCKET s, const char *buf, int len, int flags) -> int { /* your code */ return _send(s, buf, len, flags); }; return SetHook(true, reinterpret_cast<void**>(&_send), send_hook); }
  23. NewSprux2.0?

    Help Hooking ws2_32.dll send/recv functions

    It appears that the hook address is not allocated in the given process.
  24. Ok, sweet. I'm set up with Microsoft's detours library, but I'm having a similar problem to before where the jump is being set to empty memory. I ended up trying to apply the 2nd example first as it was a lot simpler to read and understand. Here's what I've tried to do, which is very similar to before. typedef int(*WINAPI ws2Send_t)(SOCKET s, const char* buf, int len, int flags); auto ws2Send = reinterpret_cast<ws2Send_t>(0x752B5E40); // I assumed this is meant to be the address of the function I'm hooking. void WINAPI SendHook(SOCKET s, const char* buf, int len, int flags) { std::ofstream myfile; myfile.open(<FilePathHere>); myfile << len << " " << buf << " " << "\n"; myfile.close(); ws2Send(s, buf, len, flags); } In DllMain, I'm calling the SetHook function you posted like this BOOL WINAPI DllMain(HINSTANCE hInst, DWORD dwReason, LPVOID reserved) { if (dwReason == DLL_PROCESS_ATTACH) { SetHook(true, reinterpret_cast<PVOID*>(&ws2Send), &SendHook); return 0; } } I'm stuck as to what the problem is, but I'll keep trying.
  25. NewSprux2.0?

    Help Hooking ws2_32.dll send/recv functions

    Haha didn't notice, my bad
  26. Why inject a dll and call the function in dllmain then o.o plus he writes to same process WriteProcessMemory(GetCurrentProcess()
  27. NewSprux2.0?

    Help Hooking ws2_32.dll send/recv functions

    @Erotica he uses WriteProcessMemory so I think he's writing from a remote procesS
  1. Load more activity
×