[Source] Basic Item Alerter menu

User Tag List

Page 4 of 5 FirstFirst 12345 LastLast
Results 46 to 60 of 68
  1. #46
    corz's Avatar Member
    Reputation
    2
    Join Date
    May 2010
    Posts
    31
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hey, if i want to add say a Normal Item - Gold ring, how do i do to add it?
    Thanks in advance

    [Source] Basic Item Alerter
  2. #47
    shogo's Avatar Banned
    Reputation
    3
    Join Date
    Mar 2013
    Posts
    92
    Thanks G/R
    8/2
    Trade Feedback
    2 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Can't launch any file:

    What's wrong? Libraries was installed.

  3. #48
    Spl3en's Avatar Corporal
    Reputation
    31
    Join Date
    Mar 2013
    Posts
    20
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hi,
    Thanks for the share SKU.

    I've produced some utility code for this script ; I wanted something which retrieve the adresses of breakpoints, even after new patch so I can update it myself
    Here my work : http://spl3en.alwaysdata.net/src/C/P...fsetFinder.exe
    And the source : http://spl3en.alwaysdata.net/src/C/P...tFinder/main.c

    It will automatically overwrites the addresses BP0, BP1 and BP2 in the file "ItemAlertPoE.py" with the new ones if the exe is in the same folder than the executable

    A bit explaination about where I put the breakpoints (more details in the source)
    Code:
           015486B6  ¦ ·  53            push ebx                       ; +> Arg4 : _In_ int flags
           015486B7  ¦ ·  50            push eax                       ; ¦  Arg3 : _In_ int len
           015486B8  ¦ ·  8D8431 980002 lea eax, [esi+ecx+20098]       ; ¦
           015486BF  ¦ ·  8B0E          mov ecx, [dword ds:esi]        ; ¦
    BP1 -> 015486C1  ¦ ·  50            push eax                       ; ¦  Arg2 : _Out_ char *buf <- get_eax = char *buf
           015486C2  ¦ ·  51            push ecx                       ; ¦  Arg1 : _In_ SOCKET s
           015486C3  ¦ ·  FF15 B0898801 call [dword ds:<&WS2_32.#16>]  ; +> WS2_32.recv
    BP0 -> 015486C9  ¦ ·  8BF8          mov edi, eax     <- get_eax = bytes_readen
    [...]
           0154870D  ¦ ·  FFD2          call edx  <- Arg2 is unserialized
    [...]
           01548730  ¦ ·  5B            pop ebx
    BP2 -> 01548731  +>·  C3            retn  <- We wait until the end of the function to get Arg2

    shogo : nothing wrong, just doubleclick on your ItemAlertPoE.py
    If it doesn't work, open a new cmd.exe shell, type "python " then drag&drop your ItemAlertPoE.py so you ask to your python to launch this file.
    Last edited by Spl3en; 03-25-2013 at 06:23 AM.

  4. #49
    vitek's Avatar Member CoreCoins Purchaser
    Reputation
    1
    Join Date
    Mar 2013
    Posts
    49
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Spl3en View Post
    Hi,
    Thanks for share SKU.

    I've produced some utility code for this script ; I wanted something which retrieve the adresses of breakpoints, even after new patch so I can update it myself
    Here my work : http://spl3en.alwaysdata.net/src/C/P...fsetFinder.exe
    And the source : http://spl3en.alwaysdata.net/src/C/P...tFinder/main.c

    It will automatically overwrites the addresses BP0, BP1 and BP2 in the file "ItemAlertPoE.py" with the new ones if the exe is in the same folder than the executable
    Hi,

    Quick question - after I used Finder it deleted everything in my ItemAlertPoE.py file and writes only one line: "xCO"

    Any idea how to fix it?

    Btw, program is finding addresses before it corupts the ItemAlertPoE.py, so I took addresses and manually wrote it to the ItemAlertPoE.py, but it didn't help - not catching anyhting. I removed "_filterItems = True" line to see all the droped objects - didn't help.
    Last edited by vitek; 03-24-2013 at 07:48 AM.

  5. #50
    Spl3en's Avatar Corporal
    Reputation
    31
    Join Date
    Mar 2013
    Posts
    20
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hi, thanks for the bug reporting vitek.

    Quick question - after I used Finder it deleted everything in my ItemAlertPoE.py file and writes only one line: "xCO"
    Erm... I'm confused, I've already got that bug, but I hadn't time to see where it comes from ;
    My guess is that the string research fails and it overwrites with junk data (it searchs for the strings : "BP0 = ", "BP1 = " and BP2 = ".

    I will add some piece of code to handle that error and prevents the code from erasing the ItemAlertPoe.py content.
    There, I've updated the code slightly to check that case : (the exe has been updated aswell)
    http://spl3en.alwaysdata.net/src/C/P...tFinder/main.c

    but it didn't help - not catching anyhting.
    Alright, I guess I will need to do more testing, it works fine on my computer
    It's really weird because if it catch something, it's supposed to work... Please make sure you didn't modify anything in ItemAlertPoE.py except the addresses, it's my only one advice for the moment until it is fixed
    Last edited by Spl3en; 03-24-2013 at 01:10 PM.

  6. #51
    vitek's Avatar Member CoreCoins Purchaser
    Reputation
    1
    Join Date
    Mar 2013
    Posts
    49
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Spl3en View Post
    Hi, thanks for the bug reporting vitek.

    Alright, I guess I will need to do more testing, it works fine on my computer
    It's really weird because if it catch something, it's supposed to work... Please make sure you didn't modify anything in ItemAlertPoE.py except the addresses, it's my only one advice for the moment until it is fixed
    Hey, thanks for the replay!

    I have checked addresses with a buddy - he got the same addresses:

    BP0 = 0x001D86C9
    BP1 = 0x001D86C1
    BP2 = 0x001D872E

    I have checked as well this option:

    BP0 = 0x001D86C9
    BP1 = 0x001D86C1
    BP2 = PB1 + 2

    Both didn't work )

  7. #52
    Spl3en's Avatar Corporal
    Reputation
    31
    Join Date
    Mar 2013
    Posts
    20
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Please update; BP2 has been fixed
    I hope it will fix the problem (still not sure why BP2 refused to breakpoint, but the new BP2 should be better, i've placed it right after the call edx)
    Index of /src/C/PoeOffsetFinder
    EDIT : It should work perfectly now! Tested on multiple configurations.

    I have checked as well this option:

    BP0 = 0x001D86C9
    BP1 = 0x001D86C1
    BP2 = PB1 + 2

    Both didn't work )
    It's not going to work with BP2 = BP1 + 2 ; The unserialize function is at BP0 + 0x4C (call edx), you have to breakpoint somewhere after this instruction
    Last edited by Spl3en; 03-24-2013 at 03:02 PM.

  8. #53
    vitek's Avatar Member CoreCoins Purchaser
    Reputation
    1
    Join Date
    Mar 2013
    Posts
    49
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Spl3en View Post
    Please update; BP2 has been fixed
    I hope it will fix the problem (still not sure why BP2 refused to breakpoint, but the new BP2 should be better, i've placed it right after the call edx)
    Index of /src/C/PoeOffsetFinder
    EDIT : It should work perfectly now! Tested on multiple configurations.



    It's not going to work with BP2 = BP1 + 2 ; The unserialize function is at BP0 + 0x4C (call edx), you have to breakpoint somewhere after this instruction
    Hi,

    Still killing my .py file, wrote manually - not registering even with "# _filterItems = True"

    P.S. Is finding a new BP2, which is : 0x001D870F now

  9. #54
    Spl3en's Avatar Corporal
    Reputation
    31
    Join Date
    Mar 2013
    Posts
    20
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Could you paste the content of your log.txt with the new addresses ? I would like to see the instructions at the new breakpoints adresses

    I got that for comparison :
    ========================================
    Started ItemAlertPoE version 20130319a at 2013-03-24 20:20:51.125000.
    Python version: sys.version_info(major=2, minor=7, micro=3, releaselevel='final', serial=0)
    "Client.exe" processes found: [4372L]
    Base address: 0x012c0000
    bp0: 0x014986c9: mov edi,eax
    bp1: 0x014986c1: push eax
    bp2: 0x0149870f: mov eax,[esi+0x54]
    Starting main loop.
    Detected item drop: Scroll of Wisdom (id=0x50880baf)
    Last edited by Spl3en; 03-24-2013 at 03:33 PM.

  10. #55
    vitek's Avatar Member CoreCoins Purchaser
    Reputation
    1
    Join Date
    Mar 2013
    Posts
    49
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Here we go, thanks!

    Started ItemAlertPoE version 20130319a at 2013-03-24 22:20:09.128000.
    Python version: sys.version_info(major=2, minor=7, micro=3, releaselevel='final', serial=0)
    "Client.exe" processes found: [3980L]
    Base address: 0x00b30000
    bp0: 0x009086c9: Unable to disassemble at 009086c9
    bp1: 0x009086c1: Unable to disassemble at 009086c1
    bp2: 0x0090870f: Unable to disassemble at 0090870f
    <class 'pydbg.pdx.pdx'>
    ()
    Failed setting breakpoint at 009086c9
    Traceback (most recent call last):
    File "itemalertpoe.py", line 149, in run
    self.dbg.bp_set(ItemAlert.BP0, handler=self.grabPacketSize)
    File "C:\Python27\lib\site-packages\pydbg\pydbg.py", line 568, in bp_set
    raise pdx("Failed setting breakpoint at %08x" % address)
    pdx: Failed setting breakpoint at 009086c9
    Starting main loop.

  11. #56
    Spl3en's Avatar Corporal
    Reputation
    31
    Join Date
    Mar 2013
    Posts
    20
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Base address: 0x00b30000
    bp0: 0x009086c9: Unable to disassemble at 009086c9
    That's not normal :
    The breakpoints values are supposed to be :
    BP0 = 0x001d86c9 + BaseAddress
    BP0 = 0x001d86c9 + 0x00b30000
    BP0 = 0x00D086C9
    for your particular case

    So I don't know why your script tries to breakpoint at 0x009086c9 ?
    Please make sure you're using an original ItemAlertPoe.py
    I'm using this one : http://pastebin.com/17Hk28QM


    EDIT : Okay, my bad. I was using an "outdated" ItemAlertPoE.py, I can reproduce your bugs with the '0.10.3c' on github.
    I'm fixing it
    Last edited by Spl3en; 03-24-2013 at 04:07 PM.

  12. #57
    vitek's Avatar Member CoreCoins Purchaser
    Reputation
    1
    Join Date
    Mar 2013
    Posts
    49
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Spl3en View Post
    That's not normal :
    The breakpoints values are supposed to be :
    BP0 = 0x001d86c9 + BaseAddress
    BP0 = 0x001d86c9 + 0x00b30000
    BP0 = 0x00D086C9
    for your particular case

    So I don't know why your script tries to breakpoint at 0x009086c9 ?
    Please make sure you're using an original ItemAlertPoe.py
    I'm using this one : [Python] #!/usr/bin/env python # -*- coding: ISO-8859-1 -*- ''' sku wrote this progr - Pastebin.com


    EDIT : Okay, my bad. I was using an outdated ItemAlertPoE.py (1.0.3g) .
    I'm fixing it
    Just downloaded your version and all is perfect! thanks a lot for the help!!!

  13. #58
    Spl3en's Avatar Corporal
    Reputation
    31
    Join Date
    Mar 2013
    Posts
    20
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Thank you, I've finally discovered what's wrong :

    1) I've definitely fixed the problem with the file erased
    2) I know why your addresses where incorrect : You copy-pasted the output of the console which was :
    BP0 = 0x001d86c9 #(0x004a86c9)
    BP1 = 0x001d86c1 #(0x004a86c1)
    BP2 = 0x001d870f #(0x004a870f)


    But in fact it must be :
    BP0 = 0x001d86c9 + 0x00400000 #(0x004a86c9)
    BP1 = 0x001d86c1 + 0x00400000 #(0x004a86c1)
    BP2 = 0x001d870f + 0x00400000 #(0x004a870f)


    I've fixed the output of the console log so the + 0x00400000 appears

    New version updated !
    Index of /src/C/PoeOffsetFinder

    thanks a lot for the help!!!
    Thank you for testing it vitek
    Last edited by Spl3en; 03-24-2013 at 04:29 PM.

  14. #59
    FattyXP's Avatar Member
    Reputation
    20
    Join Date
    Feb 2009
    Posts
    168
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Spl3en View Post
    Hi,
    Thanks for the share SKU.

    I've produced some utility code for this script ; I wanted something which retrieve the adresses of breakpoints, even after new patch so I can update it myself
    Here my work : http://spl3en.alwaysdata.net/src/C/P...fsetFinder.exe
    And the source : http://spl3en.alwaysdata.net/src/C/P...tFinder/main.c

    It will automatically overwrites the addresses BP0, BP1 and BP2 in the file "ItemAlertPoE.py" with the new ones if the exe is in the same folder than the executable

    A bit explaination about where I put the breakpoints (more details in the source)
    Code:
           015486B6  ¦ ·  53            push ebx                       ; +> Arg4 : _In_ int flags
           015486B7  ¦ ·  50            push eax                       ; ¦  Arg3 : _In_ int len
           015486B8  ¦ ·  8D8431 980002 lea eax, [esi+ecx+20098]       ; ¦
           015486BF  ¦ ·  8B0E          mov ecx, [dword ds:esi]        ; ¦
    BP1 -> 015486C1  ¦ ·  50            push eax                       ; ¦  Arg2 : _Out_ char *buf <- get_eax = char *buf
           015486C2  ¦ ·  51            push ecx                       ; ¦  Arg1 : _In_ SOCKET s
           015486C3  ¦ ·  FF15 B0898801 call [dword ds:<&WS2_32.#16>]  ; +> WS2_32.recv
    BP0 -> 015486C9  ¦ ·  8BF8          mov edi, eax     <- get_eax = bytes_readen
    [...]
           0154870D  ¦ ·  FFD2          call edx  <- Arg2 is unserialized
    [...]
           01548730  ¦ ·  5B            pop ebx
    BP2 -> 01548731  +>·  C3            retn  <- We wait until the end of the function to get Arg2

    shogo : nothing wrong, just doubleclick on your ItemAlertPoE.py
    If it doesn't work, open a new cmd.exe shell, type "python " then drag&drop your ItemAlertPoE.py so you ask to your python to launch this file.

    Holy crap batman! Thanks for the nifty tool! +rep

  15. #60
    z77777's Avatar Member
    Reputation
    2
    Join Date
    Mar 2013
    Posts
    23
    Thanks G/R
    2/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Wow, that's pretty amazing too.

    I tried compiling the main.c myself to see if I could try to learn from it but I get the error undefined reference to many functions in memblock / memproc files. Is there something I am missing?

    The current files linked are Memchunk, memproc, win32 tools, ztring and bbqueue. Thanks!

Page 4 of 5 FirstFirst 12345 LastLast

Similar Threads

  1. Item Alerter - offsets needed.
    By Swisstrade in forum PoE Bots and Programs
    Replies: 451
    Last Post: 02-08-2015, 08:10 PM
  2. [Fork] Basic Item Alerter
    By Theadd in forum PoE Bots and Programs
    Replies: 29
    Last Post: 11-12-2013, 07:02 PM
  3. [Source] Basic Item Alerter
    By SKU in forum Path of Exile
    Replies: 24
    Last Post: 02-07-2013, 07:59 AM
  4. [h4xx] basic item hacking
    By Zomg waffles in forum WoW EMU Exploits & Bugs
    Replies: 10
    Last Post: 03-19-2008, 09:25 AM
  5. basics items
    By alex2630 in forum World of Warcraft Guides
    Replies: 6
    Last Post: 12-08-2006, 01:00 PM
All times are GMT -5. The time now is 11:44 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search