Welcome!

Join our community of MMO enthusiasts and game developers! By registering, you'll gain access to discussions on the latest developments in MMO server files and collaborate with like-minded individuals. Join us today and unlock the potential of MMO server development!

Join Today!

Recent content by GHOST107

  1. GHOST107

    Learn C++ Hex Editing for Save Data and Memory Editing

    Serialization, the example below is in c#: You must be registered for see element. And this is in C++: class IWriter // @suppress("Class has a virtual method and non-virtual destructor") { public: virtual void Write(const void* buffer, const int& nSize) = 0; public...
  2. GHOST107

    Use of anassigned local variable

    does length1 has a value? Means you declared the variable length1 but you didn't assign a value to it.
  3. GHOST107

    Trying my way into machine learning

    You can do that using a pattern detection algorithm and a classifier, you can extract unique features from images, like shape texture, etc then feed them to a classifier like SVM, KNN, etc to train it. The simplest patter detection and feature extraction is LPB, and multi-scale LPB variant is...
  4. GHOST107

    How to Get Started in Game Server Emualtion

    I think C++ is enough to develop an emulator, depending on how well you know c++( I'm talking about c++17 or c++20 standards), Since you are 16 you should also learn about Data Structures(some structures are defined in std library, but they are not thread safe, and having knowledge on how they...
  5. GHOST107

    How to Get Started in Game Server Emualtion

    To make an emulator you will need to know network programming and also a data set of a client network packets, you will need to respond to the client requests with the proper packet. To get a client dataset you will need a sniffer, to sniff the packets from the client when it makes an request...
  6. GHOST107

    Need help Reverse engineering game king of kings 3

    It was a long time since I looked at this game, I gave up on it since the server was leaked, but in what I remember you can easily backtrace from the send method to the encryption, which is a XOR. Also the client on connection receives from the server the seed key before sending login details.
  7. GHOST107

    Machine Learning Project - idea

    For hand gestures is a good Idea, for sound, I'm not an expert but when having background noise(being in public), you will end in the cocktail party problem, where you have to separate the background sound. As for what type of computer you need, any computer will do, if the image is too big you...
  8. GHOST107

    Machine Learning Project - idea

    You could try using the LBP descriptor to extract textures/patterns with a classifier. There are a lot of descriptors that extract texture features from images, I chose LBP because it is the most simplest one, and can be used with any classifier. The feature extracting is like this: Input...
  9. GHOST107

    Time Issue

    Querying the database is slow, also doing that will slow the application performance, it is easier to use an API or Syscall then using some workarounds.
  10. GHOST107

    Need Intro

    Oh yeah, if you end up writing patches(either by an external program or by an injected module), this site gives a good list of OP codes for each instruction and what type of parameters it requires. This also is helpful if you're doing it old-school, using a disassembler + hex editor. You must...
  11. GHOST107

    Need Intro

    Then you should start learning assembly language, but assembly language is hard to learn, I recommend before starting learning it you should learn at least one high level programming language(I suggest C/C++) As a good assembly language book is Art of assembly language, read DOS 16-bit edition...
  12. GHOST107

    Need Intro

    Depends on what you want to reverse You must be registered for see element.
  13. GHOST107

    What're you reading?

    Reading some fantasy light novels, like Grimgar of Fantisy and Ash volume 8, Log horizon volume 2, Brave Story. Also the horror novel Another volume 2(part two of the book). Gonna Start to read Baccano, Durarara and The SAGA of Tanya the Evil after I finish these.
  14. GHOST107

    Key retrieval and XOR decryption

    That packet is encrypted data, I don't know if the packet is encrypted, because you can see part of the structure there (because will be rare to have four consecutive 00). You first need to analyze more packets from the client. try to make a rough classification of the packets depending on...
  15. GHOST107

    Key retrieval and XOR decryption

    To retrieve the XOR key, you just have to make a big packet and XOR it with your original data. ^ = XOR data ^ key = encrypted_data encrypted_data ^ key = data encrypted_data ^ data = key So to put it simple, just input a big enough data(use a long string made of a repeating character) to...
Back
Top