Alek Posted September 30, 2018 Share Posted September 30, 2018 This release patches the Worlds API so it should be more dynamic to updates in the future. Additionally there was a detection concern that was addressed, so hopefully you should see less bans. This was only for stealth injection mode, mirror mode does not have this concern (of which I cannot discuss in detail). Finally, if a user does not have the proper Java version to run OSBot they will get a specific error message instead of a generalized "please verify your boot options" message. They will be redirected to this article I wrote:https://osbot.org/forum/java Let me know how this release works/doesn't work. Edit: Also big thanks to @Fruity for lending me an account to test with! 9 1 2 Link to comment
Rainbow Road Posted September 30, 2018 Share Posted September 30, 2018 Thanks Alek! 1 Link to comment
Hope Posted September 30, 2018 Share Posted September 30, 2018 Was waiting for this, much love Alek! 2 Link to comment
Alek Posted September 30, 2018 Author Share Posted September 30, 2018 Added you to the credits @Fruity 1 Link to comment
Token Posted September 30, 2018 Share Posted September 30, 2018 I always knew mirror mode reduces bans, now there is even more evidence 1 Link to comment
The_Flan Posted September 30, 2018 Share Posted September 30, 2018 big bow, world hopping works again, thank you 1 Link to comment
Elysiano Posted September 30, 2018 Share Posted September 30, 2018 Thank you Alek for these updates Link to comment
MasterChief117 Posted September 30, 2018 Share Posted September 30, 2018 Awesome! Keep up the great work Link to comment
Elbotijas Posted September 30, 2018 Share Posted September 30, 2018 (edited) I'm sorry I do not understand that Do mirror and stealthy some good-hearted human being explain this to me Edited September 30, 2018 by Elbotijas Link to comment
Trackmarks Posted October 1, 2018 Share Posted October 1, 2018 (edited) EDIT. using stealth injection, gets to the login menu, and crashes after i login to runescape. Left a HS error code on my desktop screen. have Java 8, worked until this new update. # # A fatal error has been detected by the Java Runtime Environment: # # EXCEPTION_ILLEGAL_INSTRUCTION (0xc000001d) at pc=0x0000000002c535a8, pid=10972, tid=0x000000000000112c # # JRE version: Java(TM) SE Runtime Environment (8.0_171-b11) (build 1.8.0_171-b11) # Java VM: Java HotSpot(TM) 64-Bit Server VM (25.171-b11 mixed mode windows-amd64 compressed oops) # Problematic frame: # j org.osbot.rs07.Bot.getScriptExecutor()Lorg/osbot/rs07/event/ScriptExecutor;+0 # # Failed to write core dump. Minidumps are not enabled by default on client versions of Windows # # If you would like to submit a bug report, please visit: # http://bugreport.java.com/bugreport/crash.jsp # --------------- T H R E A D --------------- Current thread (0x00000000166db000): JavaThread "Random Executor" [_thread_in_Java, id=4396, stack(0x000000001b3b0000,0x000000001b4b0000)] siginfo: ExceptionCode=0xc000001d Registers: RAX=0x00000000c0569eed, RBX=0x00000000000000b0, RCX=0x0000000018fb10b0, RDX=0x0000000000000050 RSP=0x000000001b4af0a0, RBP=0x000000001b4af0e0, RSI=0x00000000200123bf, RDI=0x0000000002c3835d R8 =0x0000000000000000, R9 =0x0000000000008000, R10=0x0000000065bdb2f0, R11=0x000000001b4aef10 R12=0x0000000000000000, R13=0x0000000014b90c6c, R14=0x000000001b4af0f0, R15=0x00000000166db000 RIP=0x0000000002c535a8, EFLAGS=0x0000000000010293 Top of Stack: (sp=0x000000001b4af0a0) 0x000000001b4af0a0: 000000001b4af0a0 0000000014b90c68 0x000000001b4af0b0: 000000001b4af0f0 0000000018fb10b0 0x000000001b4af0c0: 0000000000000000 0000000014b90c80 0x000000001b4af0d0: 0000000000000000 000000001b4af0f0 0x000000001b4af0e0: 000000001b4af138 0000000002c380e0 0x000000001b4af0f0: 00000000c0567908 000000001b4af0f8 0x000000001b4af100: 000000001acd27da 000000001b4af178 0x000000001b4af110: 000000001acd3320 0000000000000000 0x000000001b4af120: 000000001acd2d98 000000001b4af0f0 0x000000001b4af130: 000000001b4af178 000000001b4af1c0 0x000000001b4af140: 0000000002c383a2 0000000000000000 0x000000001b4af150: 0000000000000000 0000000000000000 0x000000001b4af160: 0000000000000000 0000000000000000 0x000000001b4af170: 0000000000000000 00000000c056a1f0 0x000000001b4af180: 000000001b4af180 000000001478c4ab 0x000000001b4af190: 000000001b4af1d0 000000001480ee30 Instructions: (pc=0x0000000002c535a8) 0x0000000002c53588: 54 38 05 20 00 00 00 00 01 00 00 00 00 00 00 00 0x0000000002c53598: 00 00 9f 11 00 00 00 00 e8 64 70 c0 00 00 00 00 0x0000000002c535a8: f0 ba bd 65 00 00 00 00 68 03 c5 eb 00 00 00 00 0x0000000002c535b8: 00 00 00 00 00 00 00 00 84 c8 77 14 00 00 00 00 Register to memory mapping: RAX=0x00000000c0569eed is pointing into object: 0x00000000c0569ed8 org.osbot.rs07.event.ScriptExecutor - klass: 'org/osbot/rs07/event/ScriptExecutor' RBX=0x00000000000000b0 is an unknown value RCX=0x0000000018fb10b0 is pointing into metadata RDX=0x0000000000000050 is an unknown value RSP=0x000000001b4af0a0 is pointing into the stack for thread: 0x00000000166db000 RBP=0x000000001b4af0e0 is pointing into the stack for thread: 0x00000000166db000 RSI=0x00000000200123bf is an unknown value RDI=0x0000000002c3835d is at code_begin+2301 in an Interpreter codelet invoke return entry points [0x0000000002c37a60, 0x0000000002c38440] 2528 bytes R8 =0x0000000000000000 is an unknown value R9 =0x0000000000008000 is an unknown value R10=0x0000000065bdb2f0 is an unknown value R11=0x000000001b4aef10 is pointing into the stack for thread: 0x00000000166db000 R12=0x0000000000000000 is an unknown value R13=0x0000000014b90c6c is pointing into metadata R14=0x000000001b4af0f0 is pointing into the stack for thread: 0x00000000166db000 R15=0x00000000166db000 is a thread Stack: [0x000000001b3b0000,0x000000001b4b0000], sp=0x000000001b4af0a0, free space=1020k Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code) C 0x0000000002c535a8 Edited October 1, 2018 by Trackmarks more indepth Link to comment