Jump to content

Recommended Posts

Posted

LoL... post count = more people posting useless stuff to own their posts. There is no enchant exploit/bug/trick. Its all random.

 

void Enchant()

{

int sucess;

sucess = RandomFrom(1, 100);

if (sucess > =40) // 60% sucess rate

printf("Sucessful enchant!");

else

printf("Enchant failed!");

}

 

cant be more simple than that!!

Posted

many apologies for the unbelievers. this is my technique that i wish to share. fake or not its for the user to decide. i post because it works for me not because i want to read others. afterall, this is a forum for "exploits" even though my subject isn't exactly relevant, its the closest that i can choose.

Posted

LoL... post count = more people posting useless stuff to own their posts. There is no enchant exploit/bug/trick. Its all random.

 

void Enchant()

{

int sucess;

sucess = RandomFrom(1, 100);

if (sucess > =40) // 60% sucess rate

printf("Sucessful enchant!");

else

printf("Enchant failed!");

}

 

cant be more simple than that!!

 

yes, that working like that.

but ur "RandomForm()" is not "random". u can't have simple random funcion. u need use some varible to create random numbers. u can use time, or something what is fast changing.

so it's not that simpe :p

Posted

Well this is basic c++ and l2 I know is made in visualc++ with unrealII engine so it might be that exact kind of random. We all knew that enchant is calculated like this but what I would like to know is how the function random is calculated *keep in mind this program was created in the `80 so it could be a rather simple and predictible function.

void Enchant()

{

int sucess;

sucess = RandomFrom(1, 100);

if (sucess > =40) // 60% sucess rate

printf("Sucessful enchant!");

else

printf("Enchant failed!");

}

 

cant be more simple than that!!

 

derf thanks for your share, working or not I made a +6, still I need more tries to be sure this is really working. Also you`re saing between 3 and 6 europe time the succes is higher, might be cause then the number of people on server is low so your enchanting way works better ;)

Posted

Even on the official lineage 2 page it even states the ent rate is 1 out of 3 chance of failing your weapon. But im sure this doesnt apply to private servers so lol we will never know unless the owner of the server told you the right % of ent rate.

Guest
This topic is now closed to further replies.



  • Posts

    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello, I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet. My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities. Init packet(0x00) LoginServer. Currently in the java Cores I checked there is no decode function for this package, only encript.
    • whats password from the archivie ?
    • All that shit are false positives of the vanganth cliext, sources are well and who sell it is a big scammer
  • Topics

×
×
  • Create New...