Jump to content
Moopler

Search the Community

Showing results for tags 'Bypass'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Moopler & You
    • Feedback
    • General Discussion
    • Introductions & Farewells
    • News
  • MapleStory Global
    • Discussion
    • Questions
    • Hacks, Resources & Tutorials
    • Programming
  • Other MapleStory Regions
    • South-East Asia
    • Mobile

Categories

  • MapleStory Global
    • Hacks
    • Resources
  • Programming
    • General Resources
  • MapleStory M

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Found 4 results

  1. View File NexonGameThreat (NexonGameSecurity bypass) So I started working on a new NexonGameSecurity bypass about a week ago, because I was very interested in the new security model of their anti-tampering modules, and I am proud to say that this is without doubt the most advanced piece of software that has been developed in the efforts to bypass MapleStory anti-cheat solutions. The primary goal of the bypass, was to make it compatible with any game that runs NexonGameSecurity, and that seems to have been accomplished. However, this bypass will only work on x64 systems, and therefore does not support x86 (32-bit) systems. If the demand for 32-bit support is high, this might be implemented in the future. Since this is a generic bypass, it was not possible to code it as a DLL stub that auto-injects itself (different games has different dependencies), so I've also included a simple MapleStory stub DLL (dinput8.dll), which will auto-load itself, block the internal MapleStory multiclient-checks and load the NexonGameThreat.dll file. If you use this with MapleStory, simply: Drop all files (NexonGameThreat.dll, NexonGameHooks_x64.dll, dinput8.dll) into the MapleStory folder, and run MapleStory as always. If you use this with another game, it is important to understand that: The NexonGameThreat-files assumes that: The game folder is found in an arbitrary location: "<drive>:\<game_path>" The ngs folder is found in an arbitrary location: "<drive>:\<game_path>\<ngs_folder>" Due to the nature of this, the following constraints are in place: NexonGameThreat.dll doesn't care about its own location, as it must be injected manually into the host process. NexonGameHooks_x64.dll must be exactly one folder upstream from the ngs_folder. The wisest would be to place both files exactly one folder upstream from the ngs_folder, as that is the test-environment they were developed in. Submitter NewSprux2.0? Submitted 06/03/18 Category General Resources Virusscan https://virusscan.jotti.org/en-US/filescanjob/nnpmbb8g99  
  2. Version 1.0.0

    915 downloads

    So I started working on a new NexonGameSecurity bypass about a week ago, because I was very interested in the new security model of their anti-tampering modules, and I am proud to say that this is without doubt the most advanced piece of software that has been developed in the efforts to bypass MapleStory anti-cheat solutions. The primary goal of the bypass, was to make it compatible with any game that runs NexonGameSecurity, and that seems to have been accomplished. However, this bypass will only work on x64 systems, and therefore does not support x86 (32-bit) systems. If the demand for 32-bit support is high, this might be implemented in the future. Since this is a generic bypass, it was not possible to code it as a DLL stub that auto-injects itself (different games has different dependencies), so I've also included a simple MapleStory stub DLL (dinput8.dll), which will auto-load itself, block the internal MapleStory multiclient-checks and load the NexonGameThreat.dll file. If you use this with MapleStory, simply: Drop all files (NexonGameThreat.dll, NexonGameHooks_x64.dll, dinput8.dll) into the MapleStory folder, and run MapleStory as always. If you use this with another game, it is important to understand that: The NexonGameThreat-files assumes that: The game folder is found in an arbitrary location: "<drive>:\<game_path>" The ngs folder is found in an arbitrary location: "<drive>:\<game_path>\<ngs_folder>" Due to the nature of this, the following constraints are in place: NexonGameThreat.dll doesn't care about its own location, as it must be injected manually into the host process. NexonGameHooks_x64.dll must be exactly one folder upstream from the ngs_folder. The wisest would be to place both files exactly one folder upstream from the ngs_folder, as that is the test-environment they were developed in.
  3. hey all, i got a modify client for elisionms and im trying to update it but i dont have enough knowledge .. its suppose to be small work just to pass hashcheck of skills.wz file im willing to pay for it
  4. vkiko2

    Question NGClient.aes obfuscation

    I'm trying to reverse engineer ngclient.aes, but most of the code section seems to be obfuscated. Lots of useless filler instructions like "add esi, 4; sub esi, 4", adding or bitwise OR'ing two immediate constants together to get the actual constant value, etc. (example and screenshot below) Was this obfuscation done by a common program? If so, could someone give me the name or a hint of how I would identify it? If this is a custom thing by Nexon, does anyone have any resources or hints about how to tackle this? Example: 5E3CEBCB | 81 04 24 1A 47 47 53 | add dword ptr ss:[esp],5347471A | 5E3CEBD2 | 81 04 24 02 D5 EB 48 | add dword ptr ss:[esp],48EBD502 | 5E3CEBD9 | 56 | push esi | 5E3CEBDA | 89 E6 | mov esi,esp | 5E3CEBDC | 81 C6 04 00 00 00 | add esi,4 | 5E3CEBE2 | 81 EE 04 00 00 00 | sub esi,4 | 5E3CEBE8 | 56 | push esi | Instead of: add dword ptr ss:[esp], 9C331C1C push esi mov esi, esp push esi
×