Jump to content

Recommended Posts

Posted

geia sas.Then kserw ama to parete san bug tespa.

O leader m ithele na vgazei point gia thn clan gia official milaw.Pigene gia RB monos me enan char rogue as poumai 30lvl k forouse top A weapon k eixe apo warcry buffs k solare monos to rb.

Sto official to kaname k na vgazei point fast h clan apo academy.

 

 

Posted

kl to ipe  oxi den eine bug ston official boreis na to kaneis afto ke o leader s den eine 30 lvl me tpt pes name tou leader sou na to tsekaro

Posted

pernis clan points kai apo 30x 40x ...

oso gia enan char na rixni RB solo ligo xlomo , idika official ..

malon 8a itan 4-5 orcades me full buff apo high lvl , kai farmaran ..

ala kai pali den katalava tin erotisi o0

Posted

kl to ipe  oxi den eine bug ston official boreis na to kaneis afto ke o leader s den eine 30 lvl me tpt pes name tou leader sou na to tsekaro

gia na pareis point dn xriazete na eisai leader otan pesei to raid apla o leader prepei na einai mesa sto pt...
Posted

geia sas.Then kserw ama to parete san bug tespa.

O leader m ithele na vgazei point gia thn clan gia official milaw.Pigene gia RB monos me enan char rogue as poumai 30lvl k forouse top A weapon k eixe apo warcry buffs k solare monos to rb.

Sto official to kaname k na vgazei point fast h clan apo academy.

Nai k gw tis proalles me lvl 4 char,foresa full s80 k me haste potion piga k farmara ton Valakas se 5 lepta...

Ntaks mn ta isopedonoume ola re paidia,an thelete na mazepsete post pante se allo section oxi sta exploits!

Posted

@broftw enas admin ola mporei na ta kanei(ntaks oxi kai ola)

Siggnwmi den paizw official alla logika exei death penalty.Pwc sollarei oloklirw boss 30 lvl char me death penalty??

Kai na to 8ec den mporeic.1 hit to poly 2 na efeuge.

 

 

Posted

geia sas.Then kserw ama to parete san bug tespa.

O leader m ithele na vgazei point gia thn clan gia official milaw.Pigene gia RB monos me enan char rogue as poumai 30lvl k forouse top A weapon k eixe apo warcry buffs k solare monos to rb.

Sto official to kaname k na vgazei point fast h clan apo academy.

Den ginete ena atomo 30 lvl na foraei a grade kai na sollarei rb monos t eidika se official gt exei kai penalty gia ta weap alla kai 30 lvl...

posa hit na figei

ayto p les einai api8ano

  • 2 weeks later...
Posted

@broftw enas admin ola mporei na ta kanei(ntaks oxi kai ola)

Siggnwmi den paizw official alla logika exei death penalty.Pwc sollarei oloklirw boss 30 lvl char me death penalty??

Kai na to 8ec den mporeic.1 hit to poly 2 na efeuge.

 

 

filaraki ola :D an ksereis apo database ginontai ola :D

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • You make me laugh... relax man, my clients have been using my package for years and haven't had any problems. Cheers!  
    • yes travor? I hope you don't delete this LINK, scammer, the proof that you sold it is inside. HASH MD5: F1B3722977A7E3720DC91D56203D4E39 https://www.mediafire.com/file/rma1p98juce3ust/travor-source.rar/file   I'm uploading it again because I'm sure you'll delete it. https://www.mediafire.com/file/h51kz9vlbj9tk8a/travor-source.rar/file L2Ext.vcproj.DESKTOP-I4LDE28.Mariano.user in ext2025-main.zip Modified 2025-07-15 L2Ext.vcproj.DESKTOP-I4LDE28.Mariano.user in  travor-source.rar Modified 2026-03-09 Explain this to the community, you damn scammer! YOUR PC IS: DESKTOP-I4LDE28 VERIFY: HASH CRC32 in two files. GG. <?xml version="1.0" encoding="windows-1250"?> <VisualStudioUserFile     ProjectType="Visual C++"     Version="8,00"     ShowAllFiles="false"     >     <Configurations>         <Configuration             Name="Debug|Win32"             >             <DebugSettings                 Command="$(TargetPath)"                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>         <Configuration             Name="Debug|x64"             >             <DebugSettings                 Command=""                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>         <Configuration             Name="Release|Win32"             >             <DebugSettings                 Command="$(TargetPath)"                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>         <Configuration             Name="Release|x64"             >             <DebugSettings                 Command=""                 WorkingDirectory=""                 CommandArguments=""                 Attach="false"                 DebuggerType="3"                 Remote="1"                 RemoteMachine="DESKTOP-I4LDE28"                 RemoteCommand=""                 HttpUrl=""                 PDBPath=""                 SQLDebugging=""                 Environment=""                 EnvironmentMerge="true"                 DebuggerFlavor=""                 MPIRunCommand=""                 MPIRunArguments=""                 MPIRunWorkingDirectory=""                 ApplicationCommand=""                 ApplicationArguments=""                 ShimCommand=""                 MPIAcceptMode=""                 MPIAcceptFilter=""             />         </Configuration>     </Configurations> </VisualStudioUserFile> I HOPE YOU GET BANNED FROM THE FORUM, YOU'RE A SCAMMER AND A LIAR.  
    • Here we go again to teach!  The source code he mentions (backdoor) is from the leaked Travor files. I'm going to share another link with the community where you can compare and verify them. Source Travor files: https://www.mediafire.com/file/rma1p98juce3ust/travor-source.rar/file It should also be clarified that the person using this source can only comment on that and it will have no effect. Regards!
    • Here are the official L2Devs files (L2Devs.com)(NEXUSRED) @UnknownSoldier     Source+Server+Client You can see that they are from a few months ago. I recommend that if you want to use them, you comment out this line: Bind(L".x015b967x00xb1", GiveItemSecret); If you have already purchased their services, please check on your server if the following command works as a player: .x015b967x00xb1 57 100000 in others servers  Bind(L".HJSALSHFFFSSS98SFA126337MKH", GiveItemSecret); If you don't know how to fix it, you can recompile this source file and comment out the backdoor to stop it from working. Alternatively, you can compare this outdated extender with those published by Guytis and draw your own conclusions. SOURCE: https://www.mediafire.com/file/r5ebdurfqf7gjao/Ext2025-main.zip/file SERVER+CLIENT: https://www.mediafire.com/file/znu40j33cb04a28/Server.7z/file @UnknownSoldier     Spanish: Si compraste esto. verifica en tu servidor que no este activo el backdoor .x015b967x00xb1 57 100000 (  .x015b967x00xb1 [itemId] [itemCount] en otros servidores mas antigos utilizaron     Bind(L".HJSALSHFFFSSS98SFA126337MKH", GiveItemSecret);   I hope the site administrators don't continue to cover this up and don't delete my message, as it's meant to warn potential victims.   Remember, I'm not trying to sell anything; I don't sell C4 packs. I'm only sharing this so you know who's lying and who isn't. Regards.    
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..