Jump to content

Newbies Introduce Urself

Introduce yourself here.


3,088 topics in this forum

  1. Hello

    • 3 replies
    • 459 views
  2. Hi all

    • 3 replies
    • 480 views
  3. ello all :D

    • 9 replies
    • 698 views
  4. hi

    • 3 replies
    • 454 views
  5. Hi everyone

    • 1 reply
    • 442 views
  6. hello ppl

    • 1 reply
    • 411 views
  7. hey everyone ^^

    • 1 reply
    • 421 views
  8. hi all

    • 1 reply
    • 630 views
    • 8 replies
    • 683 views
    • 6 replies
    • 593 views
  9. Hey everyone!

    • 2 replies
    • 387 views
  10. Hey guys

    • 11 replies
    • 725 views
  11. Hi guys

    • 0 replies
    • 406 views
  12. Hello all :P

    • 8 replies
    • 532 views
  13. hi all

    • 9 replies
    • 568 views
  14. hi all and read me :P 1 2

    • 22 replies
    • 1.9k views
  15. Hola O.o

    • 0 replies
    • 396 views
  16. SUUUUUP

    • 3 replies
    • 521 views
  17. "HI EVERYBODY"

    • 1 reply
    • 444 views
  18. aloha

    • 1 reply
    • 486 views
  19. Hello to all

    • 3 replies
    • 469 views
  20. Hello All

    • 3 replies
    • 460 views
    • 0 replies
    • 494 views
  21. Sup yal!

    • 0 replies
    • 494 views
  22. yo

    • 1 reply
    • 473 views
  23. hi guys

    • 5 replies
    • 542 views
  24. hi/ciao

    • 1 reply
    • 506 views
    • 3 replies
    • 560 views
  25. Hi ^^

    • 3 replies
    • 433 views
  26. hallo

    • 7 replies
    • 641 views
  27. Hi Everyone :)

    • 2 replies
    • 487 views
  28. Hello All

    • 2 replies
    • 513 views
    • 0 replies
    • 493 views
  29. Hi

    • 3 replies
    • 504 views
  30. Hello For everyone

    • 4 replies
    • 496 views
  31. Hi

    • 4 replies
    • 512 views
  32. Hi MxC

    • 9 replies
    • 712 views
  33. Hello

    • 5 replies
    • 543 views
  34. Hey Yo!

    • 4 replies
    • 487 views
    • 2 replies
    • 548 views


  • Posts

    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy               Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello, I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet. My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities. Init packet(0x00) LoginServer. Currently in the java Cores I checked there is no decode function for this package, only encript.
    • whats password from the archivie ?
    • All that shit are false positives of the vanganth cliext, sources are well and who sell it is a big scammer
  • Topics

×
×
  • Create New...