What text do you use at your Assist macro?
-
Posts
-
The guy is a scam. I've paid him for launcher and logo, after 2 months he did not delivered anything and stopped responding on Skype. Do not trust this guy.
-
Get in touch via Discord, I created the autofarm you are looking for. discord: admkelly
-
Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal. when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷♂️ the argue comes down to trusting you (a nobody) versus AV vendors Popular threat label trojan.tedy Threat categories trojan Family labels tedy can i call you Teddy from now on? yes i can Teddy Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
-
https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude I transferred these methods to Unity c# and everything works fine https://ibb.co/DHhP0JYr I think the first 2 bytes are the packet size. Third byte packet id And then the information itself It's all there in l2j servers
-
-
Topics
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.