Jump to content

Recommended Posts

Posted

Visusakos, nomizeis oti esy eisai pio e3upnos? A, nai sosta, +1 post count. Opoiosdipote mporouse na pei search. Apla as min postares

 

here you go thanatos: http://register.l2wasted.nl/

 

An kai itan 3eka8aro, to link einai stin main page, edw 8a sumfonisw mazi s virus :) [mpa, twra pou to 3anaskeftika alla3a gnwmi dikio exeis, eprepe na psaxei prwta, soz gia tis prwtes 2 grammes.]

Posted

paradeigma : hero is registerd.

But you can use it when admin Validated this account.

This could take a day.

 

 

paw meta pataw to id hero kai to pass p ebala kai mou leei oti einai la8os to pass.

eixa ftiaxei ki alla account prin 3 meres paw na balw ekeina ta account mou leei oti einai la8os to pass :/

Posted

www.google.gr

after dont ask if the day goes wrong from -1 karma write google write what he must do  but give the advise always man!''oh i write google.gr WOW +1 post count now im the best!dont fuck it!

Posted

re sis 8a me help kanis  den xero TOURKIKA apo ayti ti selida kapios na help

 

http://www.lineage2-100ka.estranky.cz/

 

pls na bali to link gia to REGISTER kai to DOWNLOAD

 

Pia tourkika re oxi na min einai kinezika auto einai ta host

# Copyright © 1993-1999 Microsoft Corp.

#

# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

#

# This file contains the mappings of IP addresses to host names. Each

# entry should be kept on an individual line. The IP address should

# be placed in the first column followed by the corresponding host name.

# The IP address and the host name should be separated by at least one

# space.

#

# Additionally, comments (such as these) may be inserted on individual

# lines or following the machine name denoted by a '#' symbol.

#

# For example:

#

#      102.54.94.97    rhino.acme.com          # source server

#      38.25.63.10    x.acme.com              # x client host

 

127.0.0.1      localhost

89.248.245.82  L2authd.lineage2.com

89.248.245.82  L2testauthd.lineage2.com

 

O server einai c4 ama katevis kato kato 8a dis lei SYSTEM

Posted

http://89.248.245.82/registrace.htm register

 

http://aaaaaaaaaa.unas.cz/hosts.zip hosts

 

http://www.aaaaaaaaaa.unas.cz/system.zip system

 

http://www.filemirrors.com/search.src?file=L2_C4_Installer.zip&size=2487262696 c4 client

i have try to make a acc but i dont know

 

 

the server is offline i think!

 

 

Posted

And what are we going to do?

To hack a server which is EMPTY...

there is no reason talking about hLaPEx...

hLaPEx IS DEAD!<<<

Posted

Akou file 2% na vris interlude server gia hlapex os sini8os to hlapex douleui se palious server. se autou pou exw dali douleuoun elpizo na mi to exoun fixari

Guest
This topic is now closed to further replies.



  • Posts

    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy               Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello, I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet. My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities. Init packet(0x00) LoginServer. Currently in the java Cores I checked there is no decode function for this package, only encript.
    • whats password from the archivie ?
    • All that shit are false positives of the vanganth cliext, sources are well and who sell it is a big scammer
  • Topics

×
×
  • Create New...