Compare commits

...

7 Commits

Author SHA1 Message Date
neru e933515e45 fix: typo
Build / build (push) Successful in 3m10s
2026-04-06 21:54:57 -03:00
neru ff7284dfbf fix: update dumper to use xbox game 2026-04-06 21:54:52 -03:00
neru 7a710f2e17 feat: update catalog 2026-04-06 21:54:11 -03:00
neru b36d47a8fb chore: update file names to reflect platform 2026-04-06 21:51:49 -03:00
neru 6e2c709426 chore: add mappings
Build / build (push) Has been cancelled
2026-04-06 21:50:08 -03:00
neru 8929c0e39b fix: spoof level for every char < 15 or p0
Build / build (push) Successful in 4m27s
2026-04-02 01:21:03 -03:00
neru ab2385fc2f fix: comment out unused param
Build / build (push) Successful in 3m10s
2026-03-22 07:57:36 -03:00
5 changed files with 13 additions and 8 deletions
+1 -1
View File
File diff suppressed because one or more lines are too long
Binary file not shown.
Binary file not shown.
+3 -3
View File
@@ -13,9 +13,9 @@ using Newtonsoft.Json;
class DumpByDaylight
{
private const string _pakDir = "E:\\Program Files (x86)\\Steam\\steamapps\\common\\Dead by Daylight\\DeadByDaylight\\Content\\Paks";
private const string _pakDir = "D:\\XboxGames\\Dead By Daylight\\Content\\DeadByDaylight\\Content\\Paks";
private const string _aesKey = "0x22B1639B548124925CF7B9CBAA09F9AC295FCF0324586D6B37EE1D42670B39B3";
private const string _mappingURL = "https://github.com/Masusder/FModel-DbdMappings/raw/refs/heads/main/Mappings/9.5.0/5.4.4-3172922+++DeadByDaylight+Quiche_REL-DeadByDaylight.usmap";
private const string _mappingURL = "https://git.neru.rip/neru/UnlockedByDaylight/raw/branch/main/res/mappings/latest-xbox.usmap";
public static async Task<string?> DownloadMappingFileAsync(string url, string savePath)
{
@@ -67,7 +67,7 @@ class DumpByDaylight
Console.WriteLine("\nProvider Initialized. Extracting Databases...");
var dataPak = provider.GetArchive("pakchunk4-Windows.utoc");
var dataPak = provider.GetArchive("pakchunk4-WinGDK.utoc");
/*
* itemdb dump
+9 -4
View File
@@ -384,11 +384,16 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
for (auto& charInfo : charList)
{
if (charInfo.contains("bloodWebLevel") && charInfo.at("bloodWebLevel").get<int>() <= 15)
if (!charInfo.contains("prestigeLevel") || charInfo.at("prestigeLevel").get<int>() <= 0)
charInfo["bloodWebLevel"] = 15;
if (charInfo.contains("bloodWebData") && charInfo.at("bloodWebData").contains("level"))
charInfo["bloodWebData"]["level"] = 1;
if (charInfo["isEntitled"] == false)
{
charInfo["isEntitled"] = true;
if (charInfo.contains("bloodWebLevel")) charInfo["bloodWebLevel"] = 15;
if (charInfo.contains("bloodWebData")) charInfo["bloodWebData"]["level"] = 1;
if (charInfo.contains("origin"))
{
charInfo["purchaseInfo"] = {{"quantity", 1},
@@ -418,7 +423,7 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
if (body.find("NotAllowedException") != std::string::npos && body.find("not owned") != std::string::npos)
{
Log::info("Spoofing bloodweb error error for unowned character");
Log::info("Spoofing bloodweb error for unowned character");
json mock;
mock["bloodWebLevelChanged"] = false;
mock["updatedWallets"] = json::array();
@@ -454,7 +459,7 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
}
}
void Spoofer::clientRequestHandler(std::string& url, const std::string& body, std::string& reqHeaders)
void Spoofer::clientRequestHandler(std::string& url, const std::string& body, std::string& /*reqHeaders*/)
{
if (url.find("api/v1/dbd-character-data/bloodweb") != std::string::npos ||
url.find("api/v1/dbd-character-data/bulk-spending-bloodweb") != std::string::npos)