Jump to content

AngelWolf

Contributor
  • Posts

    179
  • Joined

  • Last visited

  • Days Won

    28

Everything posted by AngelWolf

  1. and just like caps hack it do be having bugs, cuz again this replace all other functions that uses addCurrency but like always we can narrow it down to specific to shop only, and feel free to do that, i have my script readable if ya want to modify it for example just duplicate caps hack and replace the value it search to this and boom currency hack, also also for love of the god dont claim it the script as yours lmao while it's true most of the script use the thing here on GG, i still take credit making it :3, i made it readable for peeps to contribute, you can add your name on the script as contributor lol, i also hate script kiddies. bruh.mp4 1. use Query search and search addCurrency 2. use Query search and search spendCurrency 3. copy addCurrency address 4. pointer search spendCurrency in Qword 5. editAll pointer, and paste step 3, the address+h, to make it HEX 6. enjoy, Disclamer, you must have atleast the minimum amount of emba disk or any currency to buy things out, there's a check to check if currency < priceTag dont do anything, but it's too broad to change soo just get the bare minimun of said currency to buy the cheapest items and then just scale from there.
  2. well that make life easy lmfao, go check lib.level files lmao, it has EXP and Currency Functions. io thought it'll be super convoluted to modify freebuy for currencies, well apparently i can buy it on shop now yay, im smort and dum lmao, so to get currency we can replace spendCurrency to addCurrency and voila, and this is POC too also GIB ME THE Encryption on JS
  3. tbh, most of the stuff is editable via gameguardian lol, the reason im kinda interested with this http request is just to add new functionality to the script to yk self_unban lol or anything that's related,but if this specific http request only for accesing saves and modify sum keys, then there's not much for it, maybe it's better to just tamper with account's access level, and go from there
  4. GIB JS SNIPPET, i cant for love of the god understand this OPENSSL bull****, im tooo dumb to understand it
  5. it's AES-256-CBC with custom String Replace after, i already found it, the thing i wanted is replicate it with Nodejs or perhaps JS, on browser or back end, soo i dont need to runs it on lua, and that's what makes me spent alot of time, it just send different thing while has the same message in it, on lua i can just send Data + Key and done, while i do that on js, Data + Key, it send absolutely different thing,maybe im just too dumb to know it.
  6. i see the AccessLevel you mentions, tho im unsure on how to modify it, i will experiment more, but you can get premium on profile level but items still getting checked locally i think, i'll test more, today i spent good 10 hours making a website page to encrypt and decrypt a SaveData, so im not bound to do it manually 80% of the time spent on figuringing the encryptions
  7. unsure, ill see bout it yea, i still wondering on how to ban and such, there's no exposed endpoint, and im incline to believe it's websocket connection rather post request, i also dont know where tf the pincode is the code keeps refering to main.multiplayer.masterServer.pincode, and when i look into it, it gives main.profile.get('pincode') and when i look both profile and saves, no key is called pincode, i'll assume it's either the name obfuscated or it just doesnt exist without websocket connection
  8. imma chill now, i've been trial and error for 6 hours, and yeah, cool innit, free hacks for yall and me dying kek
  9. BEHOLD second test changing to alex third to other name, and NO LIMIT, normal peeps will only get once, and pay after explanation below on the decrypt, it should be JSON.stringify(response.body), ma bad
  10. BROOOOOO. DID I JUST DO THAT OR THAT'S JUST A FLUKE
  11. i think this is how AUTH_SAVE works, this can be used after you already made a handshake or whatever the thing called, basically already authenticate with the server and made a connection MasterServer = Library.Multiplayer.HandShake().Auth(); MasterServer.Request("https://auth.tltgames.net/save_2.0", { Headers: { method: POST "Content-Type": "application/x-www-form-urlencoded" "Accept-Language": "en-US" "Cache-Control": "no-cache" }, Body: { data: { Base64( AES_Encrypted( JSON.stringify( {UserSaveJSONFile} ), "6g83zKNShmZcYE747WaLuKdzyMNspM4Y" ) ) } } }) which makes me think, i'll do analysis with the dumped datas i have since it's yeah, kinda interest me
  12. perhaps get the item id and then pointerscan the item id adn then add pointer offset by idk 4 or so? then refine the double value by 3, since the game always need to do pointer call to get the item data yk i also add 1.766 to the repo btw
  13. fun fact on your savefile it has 2 thing inside of it, a 128 random letters and a readable json and you thinks maybe i can tamper the save, nope you cant, cuz on load the game did server checks on it using that 128 random letters or SHA512, basically it goes like - read the file - do request to a server and fetch the save file (cloud save using that sha512 as identifier) - compare both local and server, and if it mismatch, start new game, and i was thinking what if i send external rest api call to their server and says, here my new save, and remember this sha512 okie, and since the loads always be checked on load, for example, if you start a new game from existing game then play abit, then quit and then resume same save, it'll ask if you want to load cloud or use local, soo basically that what i mean. sooooooooo....... :3 basically, i can tamper it all i want, since it has deviceID, userID, caps, and most importantly ShoppingList where you can just insert stuff in it as "topup", i admit it, using irreversible method of checking is quite good than old save file that add this (i found this specifically on 1.462 to compare what changes) L3_2.****YouCoolHackerSuckMyBinaryBalls = {} lol, kinda defeats the purpose of the sumchecks when you can easily tamper it. i also understand WHY you need UserID for the topup, cuz you can ask for pincode, and then from that pincode you can basically do everything, Changename, tampersave, unban yourself, add items to yourself, basically Admin priv, in scope of your own account obviously you'll understand what i mean by 128 SHA512 on 1st line and then JSON data on 2nd line, if you see the datas
  14. it just like badcase's, replacing pet pointer with other pet and do something minimal to make the game save, iirc you can get infinite pumpkin pet, but i havent checked it for awhile
  15. @cthalso if possible replace the download links on the reddit thread with the link on my youtube desc, i mean i need sumthing yk lol you get like freebies that if other scripter made it, it'll be premium yk, atleast i get is sum ads from downloads yk
  16. i create my hacks free of charges, soo basically no money involved, like if i go through premium version, there's like 7 options will be marked as premium only hacks, but i choose make it free for people, all i ask is simply donation if you like, but if you want to buy their hacks or whatever it is go for it, and also for rebuilding custom client, it's possible, but i wanted the game literally open to edits without recompling the .car, for example World Conqueror mods, those game were compiled and some modder rebuilds the game and uses custom loader to loads Json, soo hopefully i can recreate that in day r, i also will replace Instant Level to get set of EXP from battles, cuz i did experiments on it awhile ago
  17. it seems that battle hacks failed to pinpoint the max AP value, if i understand what you mean. hmm, im unsure about the you can't pick any lvl 1+ perks, all i did was replacing the calculation of perk points, i'll see if i can fix it, if not then ig it is what it is. bruh, im incline to removes starting AP hack, cuz it always broken, for others. yeah its my fault for the mismatch name for rep exp, because idk what to name the hack and probably forgot to rename the hack too lol. for instant leveling, i still uses the old revolted 2 instant level, it's known issue to dupe other items and such, i'll find something like gains exp from battle or something like that and replace it on revolted 4. I havent tested the rep hack while also rerolling quests, and now since you mentioned it, i'll look into it later, for the perk hacks, maybe i accidentally modify the perk selection. lol
  18. alright, hope it works for everyone else, this script is just for general use, soo not specific stuff such as event specific MediaFire Direct Download Link it's zip file, you gotta extract it first :3
  19. i call it, replacing instruction, or basically, replace pointer to DO what i want instead what it supposedly do
  20. POC.mp4 POGGERS, IT WORKS, pepepog ( watch the caps ) it doesnt work if you dont have caps to start with, bare minimun is 50, cuz that's iirc the cheapest thing on the store, there's a check for it, but since i have 25k i cant test it lmao here's the code lmao, this is what responsible for those free stuffies target = spendCaps replace = addCaps 0x00 L4_2 = main 0x10 L4_2 = L4_2.profile 0x20 L5_2 = L4_2 0x30 L4_2 = L4_2.spendCaps
  21. yoooooooo, i have proof of concept for caps hacks soo i found something on the code that basically identify if we spent caps or not, and im thinking to just make a script that, points to function to add caps instead, this is proof of concept, if it works, i'll be pogging lmao, cuz ive been snooping a new way to gain caps since they add somekind checks to prevent negatives, hopefully they dont have such checks for this concept. and maybe get premium feature, without buying one too
  22. yall do modify the modifier lmao, anyway, that's where most calculation is calculated, either on calculate.lua or on the utils libs or on _masters, and such, you can find most battle hacks calculation on battle_masters. too, soo yeh, also you each line of code basically offset by 0x10, for example L_02 = L_01.math L_03 = L_02.max L_04 = 1 L_01 = L_03(L_05, L_04) so from math to 04 is 0x20, that's basically how most my complicated hacks finds it, just looks up math and then uses the offset, but most value has dummy or duplicate, soo i currently trying to make it check if the target value's -0x10 offset is max or min or codeToNum, soo it'll always hard find it, rather blindly editAll and cause a crash probs on base_masters.lua or sum, because there i found rep reward.
  23. i found modifier for reputatation reward for quest, i just need to add gazilion checks to hard find the correct value, since it has dummy value and for caps, again you can make use of survivor base refresh value group, and modify them as much as you want and for currency, just modify the worth of it, and just like inflate it soooo much you can gains alot of it by either casino or quest reward. i still need to finalize the code to it checks everything before applying a changes to avoid crash and such you can fool the client to think you're not banned, but it's boolean or true and false, and idfk on how to find it on memory, while some said it's 00 and 01 in byte, reading memory in GG is hard, there's no memory view like Cheat Engine soo it's just stab in the dark.
  24. uh, the emba disk?, personally i havent snoop into the code yet, but i assume it just works like quest reward, basically modifiying the currency worth should supplied it, that's basically how you get kk's of currencies. also you cant use make everything {currency} 1 anymore, cuz it seems they have check in place to not do anything if the cost is lower than the item's worth, tbf you can modify it, but i couldnt be bother to snoop the awful code.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.