Jump to content

Recommended Posts

Posted

[hide]

Hello MxC Members,Devs who watch this thread and leeching ppls who are ready to copy it ....

 

Today i will show you how to make unlimited crystals.

 

To do this "thing" we will need :

 

1.L2-PhX (hell yeah  ;D )

 

2.One low grade item and few high rate.

 

[glow=red,2,300]Ready...set...go ![/glow]

Just joking....i`m not going to explain..better download the video i made !  :D

 

Shortcomings :

 

1.You must use DIFFERENT ITEMS !

 

2.You must relog always after making the crystal exploit !

 

3.Sometimes the weapons will broke cuz...dunno...game suck a little.  >:(

 

4.To be safe just relog,change ID items,and make the procedure again and again !

 

5.I`m not responsible about any broken items - do it first on pvp server !  ::)

 

6.Do not upload my "really super duper great video" on youtube...specially i`m saying for the *** who upload my trade bug on youtube...if you read that you know what i mean....

 

7.Sry if is already posted.I searched something similiar like that but i didn`t find anything.

 

8.Enjoy

 

http://www.mirrorcreator.com/files/1O8BMILW/7.10.2009_19-28-06.rar_links

 

 

 

 

 

Posted

I`m caling idiot to the man who upload my video (trade bug by raigon) on youtube..not you or anyone here... xD

 

Already watched the hole video ! xD

that's why leeching is prohibited on the forum..
Posted

This file is neither allocated to a Premium Account, or a Collector's Account, and can therefore only be downloaded 10 times.

 

This limit is reached.

 

To download this file, the uploader either needs to transfer this file into his/her Collector's Account, or upload the file again. The file can later be moved to a Collector's Account. The uploader just needs to click the delete link of the file to get further information.

 

Posted

This file is neither allocated to a Premium Account, or a Collector's Account, and can therefore only be downloaded 10 times.

 

This limit is reached.

 

To download this file, the uploader either needs to transfer this file into his/her Collector's Account, or upload the file again. The file can later be moved to a Collector's Account. The uploader just needs to click the delete link of the file to get further information.

 

 

:O

 

I will upload it right now...

 

EDIT  : LInk changed with 4shared

Posted

:O

 

I will upload it right now...

 

Either ask GrisoM to do it for you, or upload it somewhere with no limit, like 4shared (it sux but it has not any limits)

 

BTW I got the vid some mins before.

[hide]

If you relog, you still cant use the same weapon for the exploit, because maybe the server shows the weapon as broken so it gives no stats? Or it is just a weird thing that can't be explained? xD

 

Regards.

Posted

[hide] Pretty sure im the only one it didnt work for, this server has alot of protection... its weird... it has alot of protection from the wh, liek theres times were i says cannot diposite item, please try again later. Im guessing some kinda patch, anyone know how to get passed that? Cuz wen i try this the item breaks and doesnt show up in my WH... weird?[hide]

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • A widespread proxy service, operating through hijacked devices, has been shut down in a cross-industry effort led by Google. The network, known as IPIDEA, functioned by secretly converting millions of personal devices into proxies for malicious actors. The Mechanism of the Scheme The operation distributed hidden code within seemingly legitimate free apps and VPN services. Once installed, this code enrolled the user’s device into a pool of residential IP addresses. These addresses were then sold anonymously, primarily to cybercriminal and state-sponsored groups, to mask the origin of attacks, fraud, and espionage. Key impacts of the network included: Facilitating operations for more than 550 identified threat actors. Exposing unsuspecting device owners to potential legal and security risks by associating their IP addresses with criminal traffic. The Takedown Strategy Google and its partners disrupted the service by: Seizing core operational domains. Using Google Play Protect to detect and remove malicious applications. Coordinating with infrastructure providers to prevent the network from reestablishing itself. The action highlights the necessity of continuous user awareness, developer diligence in code reviews, and proactive industry cooperation to maintain cybersecurity. Front Companies Associated with IPIDEA IPIDEA masked its activities under various brand names, such as: Proxy Brands: 360 Proxy, 922 Proxy, Luna Proxy, IP2World, ABC Proxy. VPN Brands: Door VPN, Radish VPN, Galleon VPN. SDK Brands: PacketSDK, HexSDK (the toolkits used to embed proxy code).   Choosing Ethical Proxy Services Alternatives For lawful purposes like market research, ad verification, or data aggregation, selecting a transparent and consensual provider is essential. Reputable services obtain explicit user permission for their networks and enforce strict compliance measures. Examples of Established Providers: Bright Data: A leading, consent-based residential proxy network. Oxylabs: Provides large-scale proxy solutions for enterprise needs. MoMoProxy: Maintains a large pool of residential IPs for tasks like web scraping.   Only $850/1TB.  https://momoproxy.com   Identifying a Legitimate Provider: A trustworthy service will typically demonstrate: Informed Consent: Networks are built with the clear agreement of participants. Robust Compliance: Proactive systems to prevent abuse and respect website terms. Operational Transparency: Public-facing policies, identifiable corporate structure, and genuine customer support. Conduct thorough due diligence. Opt for providers that are clear about their IP sources and maintain strong anti-abuse policies, ensuring your legitimate activities do not inadvertently support harmful operations.
    • Lineage 2 Interlude Developer – Cliente + Datapack Hola, soy developer especializado en Lineage 2 Interlude con experiencia tanto en cliente como datapack/core. ✔ Desarrollo datapack (Java, scripts, quests, balance PvP/PvE) ✔ Fixes core / geodata / exploits ✔ Sistemas custom (events, Olympiad, instancias, mods PvP) ✔ Cliente: interface mods, system patches, .dat edits, UI personalizada ✔ Optimización y estabilidad de servidor ✔ Trabajo freelance o colaboración fija Si necesitáis soporte dev o mejoras para vuestro servidor Interlude, podéis contactarme por DM. Portfolio y ejemplos disponibles bajo petición.
    • Lineage 2 Interlude Developer – Cliente + Datapack Hola, soy developer especializado en Lineage 2 Interlude con experiencia tanto en cliente como datapack/core. ✔ Desarrollo datapack (Java, scripts, quests, balance PvP/PvE) ✔ Fixes core / geodata / exploits ✔ Sistemas custom (events, Olympiad, instancias, mods PvP) ✔ Cliente: interface mods, system patches, .dat edits, UI personalizada ✔ Optimización y estabilidad de servidor ✔ Trabajo freelance o colaboración fija Si necesitáis soporte dev o mejoras para vuestro servidor Interlude, podéis contactarme por DM. Portfolio y ejemplos disponibles bajo petición.
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..