Jump to content
  • Announcements

    • .Kori

      M2tec Event   02/28/18

      Hello M2tec Users,    M2tec present a new donate Event.      Premium Event :
      Premium Pack 1 : 5€ /2 month + 1 month free 
      Premium Pack 2 : 7€ / 4 month + 2 month free 
      Premium Pack 3 : 9€ / 6 month + 2 month free *
      Premium Pack 4: 15€ /  1 year + 4 month free *   Source Pack :  Source Light Pack : 15€ Source full Pack : 20€ *   Advertisements Packs :  Little Pack : 5€ Middle Pack : 10€ Big Pack : 15€ *   All packets with * become after buy a donator rank for the Support on M2tec.    The M2tec Team.   
M

MxCool

Members
  • Content count

    57
  • Posts on chatbox

    3
  • Joined

  • Last visited

  • Days Won

    7

MxCool last won the day on May 15

MxCool had the most liked content!

Community Reputation

328 M2tec Professional

About MxCool

  • Rank
    M2tec Pro
  1. I think David has it all, so who the fuck are you?
  2. Which change you want to see? These kiddos are stupid. As I said there is no virus inside, just virtualized codes and compression, both with cracked tools, without license, this why the antiviruses mark it as a virus. Without knowledge keep your mouths in shut, kids.
  3. I do not know what are you talking about. Btw, you can also make it in c++ with a basic knowledge.
  4. If anyone has it, would be kind to share it with me? Thank you in advance.
  5. The real developers are using the source code instead of the lib :rofl: :lol: But for the children the lib is enough. And no, it isn't a good protection nowadays. The source of it is public, I wrote already a tool to unpack global/aeldra(the same shit by m2bob developers), rubinum, and lethal war, I think more than a half year ago. At least the guys at Global changed the length of the key and iv to make it being different than the others. So I don't recommend to use that shit if you have usefull paid stuffs =)
  6. Stop being stupid please.
  7. Ahh, because some users are able to download the uploaded file from there ;)
  8. Are you thinking about the compression? Or what? I've packed and virtualized(tiger white) the code just for fun, nothing else. And of course it has some encrypted texts also for fun :D typedef std::map< std::string, std::map< std::vector<char>, size_t > > TStringTable; TStringTable mapFakeStringTable{ { "fsXxc", { { { 0x49, 0x49, 0x49, 0x49, 0x2f, 0x8, 0x0, 0x5, 0xc, 0xd, 0x49, 0x1d, 0x6, 0x49, 0x1e, 0x1b, 0x0, 0x1d, 0xc, 0x49, 0xd, 0x8, 0x1d, 0x8, 0x49, 0x0, 0x7, 0x1d, 0x6, 0x49, 0xf, 0x0, 0x5, 0xc, 0x47, 0x47, 0x47 }, 37 } } }, { "lIEedkc", { { { 0x49, 0x1b, 0xc, 0x8, 0xd, 0x49, 0xf, 0x1b, 0x6, 0x4, 0x49, 0x19, 0x8, 0xa, 0x2, 0x49, 0xc, 0x1b, 0x1b, 0x6, 0x1b, 0x47, 0x49, 0x2c, 0x2a, 0x53, 0x49 }, 27 } } }, { "cCcAqxX", { { { 0x49, 0x0, 0x1a, 0x49, 0x7, 0x6, 0x1d, 0x49, 0xc, 0x11, 0x0, 0x1a, 0x1d, 0x1a, 0x49, 0x0, 0x7, 0x49, 0x1d, 0x1, 0x0, 0x1a, 0x49, 0x19, 0x8, 0xa, 0x2, 0x47, 0x49, 0x2c, 0x2a, 0x53, 0x49 }, 33 } } }, { "iieuzqs", { { { 0x20, 0x7, 0x1f, 0x8, 0x5, 0x0, 0xd, 0x49, 0x1c, 0x1a, 0x8, 0xe, 0xc, 0x48, 0x63, 0x60, 0x3c, 0x1a, 0x8, 0xe, 0xc, 0x53, 0x49, 0x2f, 0x6, 0x11, 0x3d, 0x6, 0x6, 0x5, 0x47, 0xc, 0x11, 0xc, 0x49, 0x55, 0x4e, 0x28, 0x1b, 0xa, 0x1, 0x0, 0x1f, 0xc, 0x27, 0x8, 0x4, 0xc, 0x4e, 0x57, 0x49, 0x55, 0x4e, 0x2f, 0x0, 0x5, 0xc, 0x27, 0x8, 0x4, 0xc, 0x4e, 0x57 }, 63 } } }, }; >>> enc(" Failed to write data into file...", "fsXxc") { "fsXxc", { { { 0x49, 0x49, 0x49, 0x49, 0x2f, 0x8, 0x0, 0x5, 0xc, 0xd, 0x49, 0x1d, 0x6, 0x49, 0x1e, 0x1b, 0x0, 0x1d, 0xc, 0x49, 0xd, 0x8, 0x1d, 0x8, 0x49, 0x0, 0x7, 0x1d, 0x6, 0x49, 0xf, 0x0, 0x5, 0xc, 0x47, 0x47, 0x47 }, 37 } } } >>> enc(" read from pack error. EC: ", "lIEedkc") { "lIEedkc", { { { 0x49, 0x1b, 0xc, 0x8, 0xd, 0x49, 0xf, 0x1b, 0x6, 0x4, 0x49, 0x19, 0x8, 0xa, 0x2, 0x49, 0xc, 0x1b, 0x1b, 0x6, 0x1b, 0x47, 0x49, 0x2c, 0x2a, 0x53, 0x49 }, 27 } } } >>> enc(" is not exists in this pack. EC: ", "cCcAqxX") { "cCcAqxX", { { { 0x49, 0x0, 0x1a, 0x49, 0x7, 0x6, 0x1d, 0x49, 0xc, 0x11, 0x0, 0x1a, 0x1d, 0x1a, 0x49, 0x0, 0x7, 0x49, 0x1d, 0x1, 0x0, 0x1a, 0x49, 0x19, 0x8, 0xa, 0x2, 0x47, 0x49, 0x2c, 0x2a, 0x53, 0x49 }, 33 } } } >>> enc("Invalid usage!\n\tUsage: FoxTool.exe <'ArchiveName'> <'FileName'>", "iieuzqs") { "iieuzqs", { { { 0x20, 0x7, 0x1f, 0x8, 0x5, 0x0, 0xd, 0x49, 0x1c, 0x1a, 0x8, 0xe, 0xc, 0x48, 0x63, 0x60, 0x3c, 0x1a, 0x8, 0xe, 0xc, 0x53, 0x49, 0x2f, 0x6, 0x11, 0x3d, 0x6, 0x6, 0x5, 0x47, 0xc, 0x11, 0xc, 0x49, 0x55, 0x4e, 0x28, 0x1b, 0xa, 0x1, 0x0, 0x1f, 0xc, 0x27, 0x8, 0x4, 0xc, 0x4e, 0x57, 0x49, 0x55, 0x4e, 0x2f, 0x0, 0x5, 0xc, 0x27, 0x8, 0x4, 0xc, 0x4e, 0x57 }, 63 } } }
  9. Hi folks, today I'm gonna share with you a tool to unpack the rubinum2 client . Feel free to use it and have fun with it. It's a patience game, becase you are not able to unpack the whole pack files, just file by file.. There is a reason why, but I'll not explain it. The tool has been compressed with a cracked WinLicense so some of the antiviruses could be marked as false positive, btw here is the results: [Hidden Content] And here is the result to the uncompressed version: Usage is so simple: Just drop the tool into the pack folder of the rubinum client, and open the command prompt window there into the pack folder and write: foxtool root "atlasinfo.txt" foxtool root "warrior_m.msm" foxtool root "UIScript/CustomInventoryController.py" foxtool pc_warrior "d:/ymir work/pc/warrior/warrior_easter_day_2018.gr2" As you can see the first argument is the filename of the pack where the file can be found and the second is the file what you would like to get. Password:
  10. The binary is a part of the client so it is a client side part, and stop defending the idiot, if I have to be rude, I will be.
  11. You are a totally idiot. Isn't the binary clientside? Holly cow.
  12. At the official it's clientside.
  13. Do you know what did you C&P here?
  14. a-a-a-a-a to the official, he has to code into the source too =)
×