And a more original server-focused package following the missions of the original game.
The entire calling package was restructured, making it lighter and easier to execute.
It is good for people who want to start a package, without customizing equipment and skills.
* I put together 4 bases: "RusaCis3.5" "Lucera" "aCis" "Dev"
It has a Modern UI template.
Author post: IFox
I share this guide with you to be able to use the Smart Crypt Decrypt code that is used to decrypt the client's files (utx, ukx and u).
The programs that you will need is Microsoft Visual Studio (in my case I will use the 2013 version, you can use other versions) and CFF Explorer.
Microsoft Visual Studio 2013: [Hidden Content]
CFF Explorer: [Hidden Content]
Smart Crypt Decryptor Code:
#include <windows.h>
void DumpFile()
{
typedef void(__cdecl *f_appLoadFileToArray)(char *, wchar_t *, int);
typedef void(__cdecl *f_appSaveArrayToFile)(char *, wchar_t *, int);
f_appLoadFileToArray appLoadFileToArray = (f_appLoadFileToArray)GetProcAddress(GetModuleHandleA("Core.dll"), "?appLoadFileToArray@@YAHAAV?$TArray@E@@PBGPAVFFileManager@@@Z");
f_appSaveArrayToFile appSaveArrayToFile = (f_appSaveArrayToFile)GetProcAddress(GetModuleHandleA("Core.dll"), "?appSaveArrayToFile@@YAHABV?$TArray@E@@PBGPAVFFileManager@@@Z");
char TArray[0x14];
memset(TArray, 0, 0x14);
appLoadFileToArray(TArray, L"..\\System\\Interface.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
appSaveArrayToFile(TArray, L"..\\System\\Interface.decrypted.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
}
bool dumped = false;
void StartCheck()
{
// wait until WinDrv is loaded just so we know everything we need is initialized correctly
if (GetModuleHandleA("WinDrv.dll") != NULL) {
if (!dumped) {
DumpFile();
dumped = true;
}
}
}
__declspec(dllexport) BOOL APIENTRY DllMain(HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved)
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
case DLL_THREAD_ATTACH:
StartCheck();
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
Once they have these programs installed, let's continue.
First of all we open the Microsoft Visual Studio and let's FILE> New> Project or in another faster way Ctrl + Shift + N It will show us the following We
select Visual C ++ thenWin32 Console Application and we end withOK the name is put or not, the only thing it will do is give a name to the solution, that is, if you put "juanito" when compiling the DLL it will have a name of "juanito.dll"
Then another window does not appear we give Next we select DLL and we mark Empty project and Finish
It should show us the following:
We right click on Header Files> Add> New item ...
Another window appears, with two optionsC ++ File (.cpp) and Header File (.h) select C ++ File and then OK] in this case the name is also optional to add, we are not creating a NASA program to worry about references and / or names.
We copy the code that you leave above
#include <windows.h>
void DumpFile()
{
typedef void(__cdecl *f_appLoadFileToArray)(char *, wchar_t *, int);
typedef void(__cdecl *f_appSaveArrayToFile)(char *, wchar_t *, int);
f_appLoadFileToArray appLoadFileToArray = (f_appLoadFileToArray)GetProcAddress(GetModuleHandleA("Core.dll"), "?appLoadFileToArray@@YAHAAV?$TArray@E@@PBGPAVFFileManager@@@Z");
f_appSaveArrayToFile appSaveArrayToFile = (f_appSaveArrayToFile)GetProcAddress(GetModuleHandleA("Core.dll"), "?appSaveArrayToFile@@YAHABV?$TArray@E@@PBGPAVFFileManager@@@Z");
char TArray[0x14];
memset(TArray, 0, 0x14);
appLoadFileToArray(TArray, L"..\\System\\Interface.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
appSaveArrayToFile(TArray, L"..\\System\\Interface.decrypted.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
}
bool dumped = false;
void StartCheck()
{
// wait until WinDrv is loaded just so we know everything we need is initialized correctly
if (GetModuleHandleA("WinDrv.dll") != NULL) {
if (!dumped) {
DumpFile();
dumped = true;
}
}
}
__declspec(dllexport) BOOL APIENTRY DllMain(HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved)
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
case DLL_THREAD_ATTACH:
StartCheck();
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
and save it (it is also optional, I usually do it)
Once done, with Ctrl + Shift + B we compile the project
We should get the following message
========== Build: 1 succeeded, 0 failed, 0 up-to-date, 0 skipped ==========
That says everything went well.
We go to where the projects are saved by default, in my case:
\ users \ user \ documents \ visual studio 2013 \ Projects
inside a folder was created with the default name or the one that we add in my case is ConsoleApplication1 we go inside and then to the Debug folder and our DLL ConsoleApplication1.dll should be We copy and paste it into the system and we are done with this.
Then we go to l2.exe(before we make a copy of the exe) right click, and if they installed the CFF Explorer, Open With CFF Explorer should appear and if not, they go to the program and open it from there.
They go to the Import Adder part then Add and we look for the dll that we create and copy into the system. Once the DLL has been added, the following appears: We
select _DllMain @ 12 >> Import By Name and then Rebuild Import Table . There is no sign saying Import Table correctly rebuilt. and we finish saving the l2.exe with the changes made. Then it is only to open the L2 and within the system "Interface.decrypted.u" will be created
for you. To be able to decrypt other files (ukx or utx) you will have to change something in the code and it is the following
appLoadFileToArray(TArray, L"..\\System\\Interface.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
appSaveArrayToFile(TArray, L"..\\System\\Interface.decrypted.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
for example, if you want to decrypt a texture, copy the .utx into the system, changing the extension to .u (I think it's not necessary, but never try) and in the code change the following:
appLoadFileToArray(TArray, L"..\\System\\Textura_que_quiero_desencryptar.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
[background=#2a2e31]appSaveArrayToFile(TArray, L"..\\System\\Textura_que_quiero_desencryptar.decrypted.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
compile the dll again and copy it into the system and voila, open l2 and create the Texture_que_want_desencryptar.decrypted.u then with the umodel you can extract the textures.
Decryptor for * u files encrypted by Smart Crypt of early revisions.
By default, for Interface.u, however, using the source below and the C / C ++ compiler,
you can use this method for other files as well.
Place decrypt files in the System folder
Place encrypted files in the System folder ( interface.u )
Run L2.exe
Now there are decrypted files in the System folder ( Interface.decrypted.u )
Our portal is not the developer of this program and does not provide advice on its work.
Source is in the public domain and provided below.
Smart Crypt Decrypt code:
#include <windows.h>
void DumpFile()
{
typedef void (__cdecl *f_appLoadFileToArray)(char *, wchar_t *, int);
typedef void (__cdecl *f_appSaveArrayToFile)(char *, wchar_t *, int);
f_appLoadFileToArray appLoadFileToArray = (f_appLoadFileToArray)GetProcAddress(GetModuleHandleA("Core.dll"), "?appLoadFileToArray@@YAHAAV?$TArray@E@@PBGPAVFFileManager@@@Z");
f_appSaveArrayToFile appSaveArrayToFile = (f_appSaveArrayToFile)GetProcAddress(GetModuleHandleA("Core.dll"), "?appSaveArrayToFile@@YAHABV?$TArray@E@@PBGPAVFFileManager@@@Z");
char TArray[0x14];
memset(TArray,0,0x14);
appLoadFileToArray(TArray, L"..\\System\\Interface.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
appSaveArrayToFile(TArray, L"..\\System\\Interface.decrypted.u", *((int *)GetProcAddress(GetModuleHandleA("Core.dll"), "?GFileManager@@3PAVFFileManager@@A")));
}
bool dumped = false;
void StartCheck()
{
// wait until WinDrv is loaded just so we know everything we need is initialized correctly
if (GetModuleHandleA("WinDrv.dll") != NULL) {
if (!dumped) {
DumpFile();
dumped = true;
}
}
}
__declspec(dllexport) BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved )
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
case DLL_THREAD_ATTACH:
StartCheck();
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
Downloads: Smart Decrypt.rar
Password: [Hidden Content]
As title says, simulating the damage u make vs the target. Currently works only for players (self too) . It's up to you if u want to add more creature instances. By default all simulations use ss/bss except bare hand hits.
Known Issues* Simulation for chargeable physical (ex.tyrant,duelist) skills is not precise (auto hits,magical skills work fine).
+else if(command.startsWith("_menuSimulation") || command.startsWith("_menuSelectSkill") || +command.startsWith("_menuDoSim")){
+ DamageSimulator.getInstance().parseCmd(command, activeChar);
+}
DamageSimulation.java
DimSim.java
SimManager.java
simulation.html
Video with normal hits
Video with skills
Credits for this mod: LordPanic (I have been approved to upload his codes)
Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.