Jump to content

Aerospark

Members
  • Posts

    14
  • Joined

  • Last visited

  • Feedback

    0%

Profile Information

  • Gender
    Male

Recent Profile Visitors

652 profile views

Aerospark's Achievements

Newbie

Newbie (1/10)

2

Reputation

  1. Bit of a follow up to this, it is possible to access the random solvers before the login screen, onStart runs pretty much right away, but the login solver seems to be in RandomExecutor.otherSolvers instead of the standard solver map. I'm not sure if I can access this without using reflection, will edit this post with more info shortly. EDIT: Here's the code I eventually ended up using, it's a bit overboard, but it does work public void clearALLRandomHooksAndSolvers() throws IllegalAccessException, SecurityException, NoSuchFieldException{ bot.getRandomExecutor().clearHooks(); // does nothing bot.getRandomExecutor().unregisterHook(RandomEvent.AUTO_LOGIN); // also does nothing RandomExecutor exec = bot.getRandomExecutor(); Field other = exec.getClass().getDeclaredField("otherSolvers"); other.setAccessible(true); ((Set<RandomSolver>)other.get(exec)).clear(); Field solver = exec.getClass().getDeclaredField("solvers"); solver.setAccessible(true); ((Map<RandomEvent, RandomSolver>)solver.get(exec)).clear(); Field hooks = exec.getClass().getDeclaredField("hooks"); hooks.setAccessible(true); ((Map<RandomEvent, RandomBehaviourHook>)hooks.get(exec)).clear(); }
  2. Thanks for the reply Exactly what I was looking for. So the script doesn't run until it's logged in, do you happen to know if it stops the active script on log out or?
  3. Hey, just wondering if there’s a way to disable auto-login, whether it be in the settings or a way to specify it in the script. I couldn't find anything in the API docs, but I could have easily missed something. I'd mainly like to know because its important that my script uses it's own login handling code.
  4. Is there any way to disable this for development, aside from blacklisting the ad server hostname? I Could see it causing major issues with interface picking... I understand the need to have advertising, running a community isnt cheap, but there are some situations where it makes no sense. It's not like I'm going to click ads when im in the middle of creating content. /entitled rant
  5. Interesting info thanks for explaining. Also, I was aware that Xboot works like that. The only reason I mentioned modifying rt.jar is because it's something I did myself "back in the day" with openjdk, I'm not sure if it supported -Xbootclasspath at the time. It does work "in a pinch," and breaking classes generally wasnt an issue because I had the full source of rt.jar Definitely not a good idea to actually use though, Xboot on the otherhand can be really usefull for getting into things. more obvious redundant statements
  6. Do you know if anyone tried injecting into the code that detects injection? I know it sounds like inception, but it could work.
  7. Well technically... my question was about running the client to scrape data, not botting. If I was banned, it would be for using 3rd party software or something like that, not macroing I'd assume in more tiny text /nitpick
  8. I'm guessing overly technical questions aren't what are ususally asked around here? Just trying to figure out how things have changed, ive been gone a long time..
  9. D: quickly! Save me from my ignorance, I hate being popcornfodder.
  10. I'm sure this has been asked before but it would be cool to have a more definitive answer, there's a lot of conflicting information out there. Anyway, is the OSBot client safe just by it's self? If I were to say, write a script that dumps all interface/object/NPC/ground item data, and played the game normally for a while through the client, is there any chance of getting banned for just that? More technically, does jagex actually check for "injection"? They could just as easily check for reflection (if people are meaning standard java.lang.reflect stuff.) If so, does OSBot and the like actively disable such checks? Yet more technobabble Also, does anyone know if any bot has tried editing rt.jar or used -Xbootclasspath to gain access to various objects used by the client?
  11. Not sure if this is ok to mention, but I think it needs to be: It's also really easy to crack wireless passwords, ESPECIALLY if they are WEP, I've got access to a few neighbouring routers for botting. (It's not very legal though, depending on where you live) If anyone's interested search aircrack-ng, I'd recommend using https://github.com/derv82/wifite, it makes things a lot easier. You should also change your computer's hostname to something that won't throw up red flags if someone sees it on the network. I've got mine set to "router"
×
×
  • Create New...