Jump to content

Recommended Posts

Posted (edited)

Well, as the title says I'm selling the detection methods for detecting adrenaline and tower so you can use it on your own antibot.

Only for serious buyers who know what they do. This is not an antibot solutions, this is just the code (C/C++) that detects the bots. Will be sold only once and it will be really detailed.

 

 

Price ~1200€

Edited by Asmodeus
Posted

Well, try to talk with official L2 owners  :happyforever: 1200€? I guess only OFF servers can afford this, but...GL with Your sale.

 

they should try talking with me :-) well I would negotiate it, that's what (~) mark means. Thank you.

LoL 1200eur, mb 120eur ? 

what bullshit you are selling ?

Code that detects ? Another MU Online source =D

 

You obviously know shit. Please justify the "Another MU Online source" you said. I bet you are just spamming around. And yes, if you are selling every potential bot block method (not crappy winapi hooks) then you can sell it for as much as you want.

Posted

dat price :D

 

That's the market buddy, sell something unique, set your price. It's not just a bunch of code lines, it's more the debug time needed to get all the information. After all I'm not forcing anyone to buy it and it's not eligible for anyone. :D

Posted

First of all, noone is goin to buy it for SUCH A HUGE price. Second - if someone wants to buy it to use it later, then he probably already have knowledge + skills to find it himself. If he does not, then bypassing his antibot made from existing chunks of detection code will be 5 minute works, ebcause he doesnt know anti-antis. So in my opinion, that will not sell at all.

 

But i dont discourage you in any way, good luck

Posted

they should try talking with me :-) well I would negotiate it, that's what (~) mark means. Thank you.

 

You obviously know shit. Please justify the "Another MU Online source" you said. I bet you are just spamming around. And yes, if you are selling every potential bot block method (not crappy winapi hooks) then you can sell it for as much as you want.

WinApi hooks for bot detecing/blocking,

6848721.jpg

thats damn logic...

Posted (edited)

First of all, noone is goin to buy it for SUCH A HUGE price. Second - if someone wants to buy it to use it later, then he probably already have knowledge + skills to find it himself. If he does not, then bypassing his antibot made from existing chunks of detection code will be 5 minute works, ebcause he doesnt know anti-antis. So in my opinion, that will not sell at all.

 

But i dont discourage you in any way, good luck

the price is negotiable. Well I could partially agree about (2)

WinApi hooks for bot detecing/blocking,

6848721.jpg

thats damn logic...

whatever. You obviously got no clue so anything more i write to you is a waste of energy and bandwidth.

I love how people have no idea how software is priced.

 

Good luck with your sales mate. The price is super reasonable.

:) Edited by Asmodeus
Posted

there are trivial ways to block adrenalin and such protection won't be even considered to be bypassed until server hit certain interest from bot users, so keeping in mind there are maybe 10 non-rus servers with 4 digits online, you are safe with any budget antibots :D

Posted

there are trivial ways to block adrenalin and such protection won't be even considered to be bypassed until server hit certain interest from bot users, so keeping in mind there are maybe 10 non-rus servers with 4 digits online, you are safe with any budget antibots :D

 

The more public an antibot is the more bypassing attempts it will provoke. Hence the bypass rates of most known antibots. If serious projects would maintain a private solution they could update it to their needs and the bypass rate would be near 0, since none would bother bypassing it unless if the server using it had tons of online players. :-)

Posted

 

 Expanded the range of “/NextTarget” command, enabling the targeting of subjects that are much farther away than before.

 

 Added Repeat Macro function.

         o After assigning a macro to a shortcut, right-clicking the mouse repeats the macro.

         o While the macro is being repeated, performing another action stops the macro.

 Added [Copy All]/[Paste] button.

        o Players can use the button to copy or paste macros.

 Added [Preset] button.

        o Players can assign a frequently used macro set to Preset, and can add to their macros by drag and drop or double-clicking.

 

Adrenaline? What adrenaline?

Posted

The more public an antibot is the more bypassing attempts it will provoke. Hence the bypass rates of most known antibots. If serious projects would maintain a private solution they could update it to their needs and the bypass rate would be near 0, since none would bother bypassing it unless if the server using it had tons of online players. :-)

thats true,

my point is, any working solution, even simple memory scan, will be as useful as well made protection, because average gamers simply has no clue, the one who does will not share own solutions for obvious reasons (and its <1% of online at most), and the one who develop bots don't touch servers which are not popular cuz its plain waste of resources. In case your server will hit certain interest, your protection will be reviewed by veteran reversers anyway, so there is no point in spending 1,2k for single time solution when you are missing needed knowledge (what szakalaka pointed out), because antibots are all about updates when you are already target of bot software.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



  • Posts

    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy               Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello, I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet. My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities. Init packet(0x00) LoginServer. Currently in the java Cores I checked there is no decode function for this package, only encript.
    • whats password from the archivie ?
    • All that shit are false positives of the vanganth cliext, sources are well and who sell it is a big scammer
  • Topics

×
×
  • Create New...