Bounce-Killer Project
-
@skiderkiller most of them arent obfuscated
also this project is cool, starred it in gh
@suicidemouse if they arent obfuscating how r they keeping the clients safe lmfao
-
Why build this project
Many Chinese developers do not abide by the open source agreement. Make no contribution when using the results of others. To this end, we will deal with their procedures.
For the open source project liquidbource (GPLv3), the original developers required to open source their modified products when using their code.
As far as I am concerned, only FDP client & liquidbounceplus has truly complied with the agreement.
Most people sell with verification, but they don't open source to users, which is a serious violation of the original intention of the source.
Now we will crack these clients or other operations to prevent them from continuing their violations.
It is worth noting that we will use all means
Project address@skiderkiller May i join the team? Marshadow#5056
-
@skiderkiller May i join the team? Marshadow#5056
@shadowofmarsh I have experience with client development and know how auth systems work.
I should be able to write a deobfuscator for some of these clients and maybe crack them -
Noteless also skidded from FDP, skidding from a skid.
-
Noteless also skidded from FDP, skidding from a skid.
No but like fdp grabs all the leaks into one place making it easy to access
-
No but like fdp grabs all the leaks into one place making it easy to access
@plumer-man true
-
@shadowofmarsh I have experience with client development and know how auth systems work.
I should be able to write a deobfuscator for some of these clients and maybe crack them@shadowofmarsh You can prove your ability in the forum. We welcome all capable people to join us.
-
Auth:
public boolean shouldLaunch(HWID hwid) { return authenticate(hwid); } public void launch() { if(!shouldLaunch(AuthUtils.getHWID())) return; }
Crack:
public boolean shouldLaunch(HWID hwid) { return true; } public void launch() { if(!shouldLaunch(AuthUtils.getHWID())) return; }
@plumer-man how is that cracking
-
@plumer-man how is that cracking
@suicidemouse if the auth is shit and it just return a boolean you can just modify it to always say true
-
@suicidemouse if the auth is shit and it just return a boolean you can just modify it to always say true
-
@suicidemouse if the auth is shit and it just return a boolean you can just modify it to always say true
@plumer-man said in Bounce-Killer Project:
@suicidemouse if the auth is shit and it just return a boolean you can just modify it to always say true
basically making the client think that you are always authenticated
-
@suicidemouse if they arent obfuscating how r they keeping the clients safe lmfao
@plumer-man uh, they dont
-
@aftery rise does it
-
@aftery rise does it
@plumer-man lmao.
-
@shadowofmarsh You can prove your ability in the forum. We welcome all capable people to join us.
@skiderkiller just leaked vestige src to mof13fps
-
@skiderkiller just leaked vestige src to mof13fps
@shadowofmarsh bro all versions of vestige have been cracked lol
-
@shadowofmarsh bro all versions of vestige have been cracked lol
@plumer-man yes but 0 src leaks so i'm first to leak it.
-
@skiderkiller just leaked vestige src to mof13fps