[Release] Packet injector(Source)

02/18/2016 21:51 R3D*#76
Quote:
Originally Posted by 哈野浅哈 View Post
Fix >

PHP Code:
}
                            if (
current.Opcode == 0x70e5)
                            if (
current.Opcode == 0x70a7)
                            if (
current.Opcode == 0x7001)
                            if (
current.Opcode == 0x34A9)
                            if (
current.Opcode == 0x7021)
                            {
                                try
                                {
                                    
this.can_connect_yes 0;
                                    
this.SendMessage("Blocked."false);
                                    continue;
                                } 
W.T.F You 're talking about man, Get the fuck out :D
02/18/2016 21:58 B1Q#77
Quote:
Originally Posted by 哈野浅哈 View Post
Fix > :D

PHP Code:
}
                            if (
current.Opcode == 0x70e5)
                            if (
current.Opcode == 0x70a7)
                            if (
current.Opcode == 0x7001)
                            if (
current.Opcode == 0x34A9)
                            if (
current.Opcode == 0x7021)
                            {
                                try
                                {
                                    
this.can_connect_yes 0;
                                    
this.SendMessage("Blocked."false);
                                    continue;
                                } 
Oh fake ass nigga i can see right through your flower ass
02/18/2016 23:13 ​Goofie​#78
Quote:
Originally Posted by 哈野浅哈 View Post
Fix > :D

PHP Code:
}
                            if (
current.Opcode == 0x70e5)
                            if (
current.Opcode == 0x70a7)
                            if (
current.Opcode == 0x7001)
                            if (
current.Opcode == 0x34A9)
                            if (
current.Opcode == 0x7021)
                            {
                                try
                                {
                                    
this.can_connect_yes 0;
                                    
this.SendMessage("Blocked."false);
                                    continue;
                                } 
Do that, "very" smart to prevent people from walking and using zerk and from all other shits that you do not understand that these packets make.

BTW, The fixes is already released for filter coding if you check the main thread content.
02/19/2016 02:22 EdwardTeach+-#79
Quote:
Originally Posted by 哈野浅哈 View Post
Fix > :D

PHP Code:
}
                            if (
current.Opcode == 0x70e5)
                            if (
current.Opcode == 0x70a7)
                            if (
current.Opcode == 0x7001)
                            if (
current.Opcode == 0x34A9)
                            if (
current.Opcode == 0x7021)
                            {
                                try
                                {
                                    
this.can_connect_yes 0;
                                    
this.SendMessage("Blocked."false);
                                    continue;
                                } 
Quote:
Originally Posted by ​Goofie​ View Post
Do that, "very" smart to prevent people from walking and using zerk and from all other shits that you do not understand that these packets make.

BTW, The fixes is already released for filter coding if you check the main thread content.
it was joke april joke trololo, calm ur $$$$
02/20/2016 22:30 EdwardTeach+-#80
Zerk hack
PHP Code:
;Agent
Client
->Server Opcode(0x70a7)

if(
_pck.Opcode == 0x70a7) {
    if(
_pck.ReadUInt8() != 1) {
        
/*
            Here is where you set what you want to do with the "injectors"
            ETC:
            DISCONNECT, CONTINUE, BAN.
        */
    
}

CharName injection
PHP Code:
;Register a boolean at the top of ur context
bool CharName_sent 
false;

;
Agent
Client
->Server Opcode(0x7001)

if(
_pck.Opcode == 0x7001 && (!this.CharName_sent)) {
    
// Register
    
this.CharName_sent true;

    
// CharName
    
this.charname _pck.ReadAscii();

Avatar injection
PHP Code:
;Agent
Client
->Server Opcode(0x34A9)

if(
_pck.Opcode == 0x34A9) {
    
// Avatar blue name
    
string avatar_blue _pck.ReadAscii().ToLower();

    if(!
avatar_blue.Contains("avatar")) {
        
/*
            Here is where you set what you want to do with the "injectors"
            ETC:
            DISCONNECT, CONTINUE, BAN.
        */ 
    
}

Region injection
PHP Code:
;Agent
Client
->Server Opcode(0x7021)

Change it from "Client->Server" to "Server->Client"
Server-Client Opcode(0xB021
can anyone explain me how to use this fixes ?
02/21/2016 04:24 Kara Sro#81
Quote:
Originally Posted by ​Goofie​ View Post
UPDATE:
  • 2015-02-09
  • * Added fake region sender, will bypass anti job cheats on filters.

Anyone have suggestions? Let me know and I will code them :)
Greay :mofo:
02/23/2016 17:46 sybtek#82
:)
02/26/2016 00:15 mahmoudzare#83
when iwrite invis got DC Why !! :/
03/06/2016 10:03 serkidz1#84
Thank you it works perfect. For "invis" command you need full zerk.
Cheers!
03/07/2016 14:06 FenixL#85
This can be used with a bot?
03/07/2016 18:35 vnkzo01#86
Quote:
Originally Posted by FenixL View Post
This can be used with a bot?

Yep. mBot working !
03/07/2016 21:20 WarTuneSro#87
thank you for share it with us
03/09/2016 11:54 musty77#88
Any1 can help how can i replace 'invis' and 'invin' letters to another one ?
cuz fkin letters made insult chat via server gm after exploit
03/10/2016 01:19 serkidz1#89
Its open source. You can sneak around Goofie`s codes, only "invis" and "mattr" are working commands.

Let`s get started: Open ExploitFilter Project > AgentContext.cs > Scroll down until you will see:

Quote:
if (message.Contains("invis"))
Now replace "invis" whatever you want.

Thats all. Cheers!
03/12/2016 07:43 liminha#90
And when i open Client and try log in but nothing happens, its ''Stuck'' at start. i click Connect and Its says ''Requesting User Confirmation'' But not happens, it means on that server this dont work/Fixed?