Jump to content
Moopler Closing Read more... ×
Moopler

NewSprux2.0?

Donator
  • Content Count

    288
  • Joined

  • Last visited

  • Days Won

    91

Everything posted by NewSprux2.0?

  1. NewSprux2.0?

    Question Structured Sniffing Logger

    Aasdf is once again trying to steal credit for my stuff, but I haven't released the source for QtPacket yet.
  2. View File NexonGameThreat (NexonGameSecurity bypass) So I started working on a new NexonGameSecurity bypass about a week ago, because I was very interested in the new security model of their anti-tampering modules, and I am proud to say that this is without doubt the most advanced piece of software that has been developed in the efforts to bypass MapleStory anti-cheat solutions. The primary goal of the bypass, was to make it compatible with any game that runs NexonGameSecurity, and that seems to have been accomplished. However, this bypass will only work on x64 systems, and therefore does not support x86 (32-bit) systems. If the demand for 32-bit support is high, this might be implemented in the future. Since this is a generic bypass, it was not possible to code it as a DLL stub that auto-injects itself (different games has different dependencies), so I've also included a simple MapleStory stub DLL (dinput8.dll), which will auto-load itself, block the internal MapleStory multiclient-checks and load the NexonGameThreat.dll file. If you use this with MapleStory, simply: Drop all files (NexonGameThreat.dll, NexonGameHooks_x64.dll, dinput8.dll) into the MapleStory folder, and run MapleStory as always. If you use this with another game, it is important to understand that: The NexonGameThreat-files assumes that: The game folder is found in an arbitrary location: "<drive>:\<game_path>" The ngs folder is found in an arbitrary location: "<drive>:\<game_path>\<ngs_folder>" Due to the nature of this, the following constraints are in place: NexonGameThreat.dll doesn't care about its own location, as it must be injected manually into the host process. NexonGameHooks_x64.dll must be exactly one folder upstream from the ngs_folder. The wisest would be to place both files exactly one folder upstream from the ngs_folder, as that is the test-environment they were developed in. Submitter NewSprux2.0? Submitted 06/03/18 Category General Resources Virusscan https://virusscan.jotti.org/en-US/filescanjob/nnpmbb8g99  
  3. NewSprux2.0?

    Release NexonGameThreat (NexonGameSecurity bypass)

    Nope, I am done with the public scene and maplestory, I only do Ms2 now.
  4. NewSprux2.0?

    Release NexonGameThreat (NexonGameSecurity bypass)

    He’s a troll, ignore him. I made the emulator back in 2012, and I don’t remember much about it anymore, sorry.
  5. Legit the most misinforming post I’ve ever seen - goes to show just how bad Aasdf really is, when he doesn’t even understand the basics of this 😂 1. fs:0xc0 is not a “TEB hook” - you just hook the KiFastSystemcall. 2. It doesn’t intercept ALL WinAPIs, only the ones that needs to trampoline into a 64-bit environment so they can elevate execution to ring0 (it’s not even that many...) 3. The entire thing you explained about how BlackCipher worked now is straight wrong :s 4. Nice credit leech Imagine spending every single of your woken hours of healthcare provided stability on trying to hack games, and yet, after 12 years of autistic attempting, continue to fail... I feel sad for you, but I suppose we aren’t all meant to succeed... in anything, ever, I guess. 🤔
  6. NewSprux2.0?

    Farewell A long overdue goodbye

    Nobody cares lol
  7. NewSprux2.0?

    Release NexonGameThreat (NexonGameSecurity bypass)

    But it doesn’t block background detections for GMS2 - you’re looking at heavy information sharing with nexon if you don’t block that.
  8. NewSprux2.0?

    Question Getting mob ID

    Idk, I removed it from my github after I got an internship that disallows me to do illegal work off-site 😅
  9. NewSprux2.0?

    Question Getting mob ID

    Firefly featured mob iteration, you could just rip it from there
  10. One could wonder if the infamous Assdf is able to come up with anything that isn’t a copy-paste 😂
  11. Hint: IntersectRect
  12. NewSprux2.0?

    Question Need some help with locating KMS MSCRC

    There’s anti-breakpoint routines too. Iirc, KMS, they even reset the flags upon detection.
  13. NewSprux2.0?

    Question Need some help with locating KMS MSCRC

    It looks like any average crc32 algo, idk why you think otherwise. the CRCs doesn’t always access memory, some or them might just access eachother. Also, most CRCs are put in specific memory positions making them trigger on special events.
  14. NewSprux2.0?

    Question Need some help with locating KMS MSCRC

    Last I checked, there was like 50-ish 😂
  15. NewSprux2.0?

    Question Need some help with locating KMS MSCRC

    KMS has an entire web of dynamically allocated interconnected CRCs checking eachother across the net, making it very hard to bypass
  16. NewSprux2.0?

    Question Need some help with locating KMS MSCRC

    The current GMS method you explained is based on the fact that the function that executes the mscrc in GMS isn’t vital, so people just return it and skip the entire mscrc scheme at the cost of having minor memory leaks (they return a cleanup function for maps iirc) The MSEA version is the one you should focus on. However, KMS has polymorphic mscrc routines, so you cannot make static hooks - you have to be smart
  17. Good to see you’re still trying to replicate anything I dish out, aasdf ;))
  18. No guide can actually teach you. You just have to learn it on your own.
  19. NewSprux2.0?

    Help CLB Channel Server

    You can request tokens using their nmco DLLs. They’ll generate the correct tokens for you.
  20. Version 1.0.0

    1,251 downloads

    So I started working on a new NexonGameSecurity bypass about a week ago, because I was very interested in the new security model of their anti-tampering modules, and I am proud to say that this is without doubt the most advanced piece of software that has been developed in the efforts to bypass MapleStory anti-cheat solutions. The primary goal of the bypass, was to make it compatible with any game that runs NexonGameSecurity, and that seems to have been accomplished. However, this bypass will only work on x64 systems, and therefore does not support x86 (32-bit) systems. If the demand for 32-bit support is high, this might be implemented in the future. Since this is a generic bypass, it was not possible to code it as a DLL stub that auto-injects itself (different games has different dependencies), so I've also included a simple MapleStory stub DLL (dinput8.dll), which will auto-load itself, block the internal MapleStory multiclient-checks and load the NexonGameThreat.dll file. If you use this with MapleStory, simply: Drop all files (NexonGameThreat.dll, NexonGameHooks_x64.dll, dinput8.dll) into the MapleStory folder, and run MapleStory as always. If you use this with another game, it is important to understand that: The NexonGameThreat-files assumes that: The game folder is found in an arbitrary location: "<drive>:\<game_path>" The ngs folder is found in an arbitrary location: "<drive>:\<game_path>\<ngs_folder>" Due to the nature of this, the following constraints are in place: NexonGameThreat.dll doesn't care about its own location, as it must be injected manually into the host process. NexonGameHooks_x64.dll must be exactly one folder upstream from the ngs_folder. The wisest would be to place both files exactly one folder upstream from the ngs_folder, as that is the test-environment they were developed in.
  21. NewSprux2.0?

    Help Help me to make Pet Item Vac faster

    Because a pet too far away from you will teleport back to you
  22. NewSprux2.0?

    Discussion Packet Library

    So I'm currently building a Packet Library (extendable plugin for Packet Editor developers). With this, packet-editor development will be simplified tremendeously, and hopefully this will be the cause for some very advanced Packet Editor projects popping up. I'm currently deciding what features to implement, so feel free to join in on the discussion. Imagine you were a developer, who was gonna implement a packet editor interface using this library. What would you want the library to do for you, and in what way? For example: "I'd like to be able to inject packets, allowing me to choose between send/recv, and supply a payload." or "I'd like to be able to decide if the hooks are toggled on/off at a given time.".
  23. Somewhere in EnterField (iirc) it calls some identification API on the socket object to check the IP address of the remote host. If it is not within the "allowed" range of MapleStory IPs, the game is crashed.
  24. That works too, but you'll still face problems with the gethostname checks
×