I don't know what map.cft you're talking about, but I have this python snippet that I used to "decrypt" CFT files a while back.
#!/usr/bin/python3
import sys
input_file_name = sys.argv[1]...
Type: Posts; User: Biesi
I don't know what map.cft you're talking about, but I have this python snippet that I used to "decrypt" CFT files a while back.
#!/usr/bin/python3
import sys
input_file_name = sys.argv[1]...
Not anymore, I also have some code to extract 2.0 REZ files, the encrypted and compressed ones. If you're interested in the source let me know.
I don't understand.. it de-compiles it and then compiles it again? Causing it to not work anymore? I'm rather surprised it even compiles
DAT, CFT and LTC are not texture files, you cannot open them in photoshop. The character textures are in another REZ file, not RB001
type the path where crossfire is installed.. e.g. C:\Program Files\CrossFire
"Extract here", if it doesn't show then change the file extension to ".lzma" first
Get 7zip and use it to decompress them
I'm currently experimenting with CrossFire REZ files in order to improve in a new programming language.
And thus I created this little tool! It allows you to replace the default killmarks with the...
More like because they have no clue on how to do it or even what it means
My eyes bleed
You won't need a Visual Studio Pro... 2019 Community is free for non-commercial use
Mostly because
std::system("exit"); won't exit the program... Try it with an actual exit function, like this, or just return from your main.
The matrix stuff isn't "process dependent" it's maths and just consists of a few numbers depending on what you want to do. If you really want to understand it you'll have to do maths (a lot). Good...
There is (not too sure, at least there was) a method you can call to write text, see here.
I swear to god I've done this like 4 years ago but couldn't get it to work... weird shit
Is 0x171A9CB000000000 the base address of the module?
Edit: You should usually compare your pointers with (pointer - baseAddrressOfModuleTheyreIn) to get an actual result
It has always been hack to win anyways.. so who cares boh1
You've done something and it doesn't work... you should tell us what exactly you've done and why you think it's not working the way it should be working
Depends... you could search for DOS or NT headers in memory and dump according to what they say about size etc. ... But this of course needs the manual mapping to be performed on fully loaded images...
Handling memory in C is a very complex topic that also depends on how you allocated the memory.. if you're working on the stack, you're mostly just fine, otherwise every allocate call should...
Here you go... should be compatible with XP if compiled correctly and resets the time every 60 seconds... you might need to adjust this because it's currencly UTC.
#include <Windows.h>
#include...
Assuming you're working on the heap, no! You're assigning NULL before you call free. You end up calling free with NULL as the memory pointer to free. You need to switch those two operations and free...
Perfectly working alternatives: dnSpy, ILSpy
ComputerInfo.AvailablePhysicalMemory and ComputerInfo.TotalPhysicalMemory.
But you still need to actually allocate the available memory using Marshal.AllocHGlobal or something similar. You cannot...
Doesn't this work out of the box? Do you have access to some sort of API for pasting values to the target application?