With V2 of crack request thread, users are now allowed to post duplicate entries, meaning if someone else requested something you want, then request it aswell. This way we can see popularity of some content
FPS hacks that are run via loaders will NOT be considered
Do not bump older requests.
When you're making a crack request you MUST include the download link to the application.
mega.co.nz/ or www.mediafire.com/.
Please use this template when posting.
Kind regards,
CDStaff.
ive thought about that a while now and i think its a quite good idea to start looking for other dudes to form up a little "Team" .
There is a private discord server for the Team , where we can discuss reversing / coding topics without the public having access.
Why ? Because when there is a project i want to work on it often fails because i cant afford the time needed to get deep into the project . So with some more team members that can help out and take over some tasks like research / reversing / documenting etc we could achieve higher goals together.
So yeah the main idea is to be able to outsource tasks to members that are already quite experienced in the certain topic.
That said, the (groups) tree looks like this :
- Native Reversing
- ASM
- .NET Reversing
- Cryptography / Packers / Obfuscators
- Web / Server / SQLi etc
- Design
- Coding ( PHP , C# , C++ , AutoIT )
So if you have a solid base of knowledge in one or more of this topics please send me a message
]]>
Please login or register to see this link.
]]>Please login or register to see this link.
project, which in turn is based onPlease login or register to see this link.
source. This program is free and released under thePlease login or register to see this link.
.As of DAoC client version 1.68c, Mythic has changed their packet encryption process which breaks DaocSkilla. After two and a half years, they are finally taking steps to secure the game world for their customers. The new process is much more secure, using RSA to exchange a symmetric key as well as swapping out their symmetric algorithm for a new one. This essentially protects the conversation from external sniffers and is a giant leap forward from an otherwise reticent Mythic Entertainment.
Please login or register to see this link.
daocskilla is a opensource radar, but it was made for pay-to-play servers. I am very new to programming, and was wondering if someone could look at it and see if they can change it to run for uthgard.
If you dont release it public, which i wouldn't recommend (small community), we could make some good $$$ on this.
]]>Please login or register to see this link.
This project was made out of a decompiled version of "AmpedServerEmulator" which was used to bypass "The Noob Bot" auth server back in the days.
It is yet functionable but also a mess of code. The decompilation process destroyed and messed up the whole code , obfuscation and packing of the original binary files were also a bad thing for
organized code ..
Anyways, i have managed to fix most of the stuff and already tested it with some random windows application to fake a auth server response for it and it worked quite well.
The most important things you should take a look at when you want to emulate a certain server response with this , are :
- Start method for the serveremulator_0 contains the adress and port to use
- Inside the ServerEmulator Class you have to add a new if statement for checking incoming requests and their fake responses.
(Take a look at the existing answers in that class to get an idea of how responses should look like ).
If anyone can make any use of this , just fork the github project or maybe even contribute to it
]]>
Please login or register to see this link.
]]>
I'm willing to pay well but so far I've been on other forums and literally all of them have been frauds trying to scam me so please only serious offers.
A small portfolio or something from the engineer would also be great.
You can add me on Skype [email protected]
]]>Since I can't post it here for some reason (error 500) here is
Please login or register to see this link.
It is sending not so complicated POST request to server, getting session cookie and checking for user (membership key), licence, patch..
Please help
]]>
Programs like Protection ID says is UPX 3.91, I tried " UPX -d " it worked no errors but now the file wont run, it freezes, crash.
Pic with UPX on, 64bit app
Can someone help me, please
]]>So i decided to start dipping my toes into the reverse engineering world. I do know programming and i thought it would be a good learning experience to try develop a hack or something like that for a game.
So i have some questions that maybe someone of you more experienced developers could answer.
Best Regards
]]>Please login or register to see this link.
Please login or register to see this link.
Hello Guys, Can you make crack for this bots?
]]>Here is a download link of the files :
Please login or register to see this link.
Virustotal not really needed as i analyzed every file myself and they are clean.
Anyways heres your virustotal link if you feel better now (False positives because level 4 and 7 are obfuscated !) :
Please login or register to see this link.
Last but not least ive prepared a solution for every level , PM me or reply here if you are stuck somewhere and i will help you with a quick tipp
]]>
Please login or register to see this attachment.
]]>
Please login or register to see this link.
Thank you in advance.
you can download this awesome tool to unbann your softbann! it works like a charm!
Please login or register to see this link.
Cheers
kellerbier
]]>
Please login or register to see this link.
Thank you
]]>
Please login or register to see this link.
I hope someone will find it useful.
Is it possible to find out the obfuscator that used by a .NET Program? Most of the time, I able dump the .NET assembly, so I had no problem about modifying the binary, but sometimes I curious with the obfuscator that being used, because I love to code with .NET platform too.
Currently, I'm curious about obfuscator that used by WTFast (
Please login or register to see this link.
Thanks in advance!
]]>