Compare commits
15 Commits
v0.1.14
...
e933515e45
| Author | SHA1 | Date | |
|---|---|---|---|
| e933515e45 | |||
| ff7284dfbf | |||
| 7a710f2e17 | |||
| b36d47a8fb | |||
| 6e2c709426 | |||
| 8929c0e39b | |||
| ab2385fc2f | |||
| 510241e311 | |||
| 5e701e1e1b | |||
| edc4a8b500 | |||
| 7e878a1ac1 | |||
| 5f7ab419b0 | |||
| 38b98bc3ab | |||
| fd0f55bd5e | |||
| 502a35357c |
+1
-1
File diff suppressed because one or more lines are too long
Binary file not shown.
Binary file not shown.
+3
-3
@@ -13,9 +13,9 @@ using Newtonsoft.Json;
|
||||
|
||||
class DumpByDaylight
|
||||
{
|
||||
private const string _pakDir = "E:\\Program Files (x86)\\Steam\\steamapps\\common\\Dead by Daylight\\DeadByDaylight\\Content\\Paks";
|
||||
private const string _pakDir = "D:\\XboxGames\\Dead By Daylight\\Content\\DeadByDaylight\\Content\\Paks";
|
||||
private const string _aesKey = "0x22B1639B548124925CF7B9CBAA09F9AC295FCF0324586D6B37EE1D42670B39B3";
|
||||
private const string _mappingURL = "https://github.com/Masusder/FModel-DbdMappings/raw/refs/heads/main/Mappings/9.5.0/5.4.4-3172922+++DeadByDaylight+Quiche_REL-DeadByDaylight.usmap";
|
||||
private const string _mappingURL = "https://git.neru.rip/neru/UnlockedByDaylight/raw/branch/main/res/mappings/latest-xbox.usmap";
|
||||
|
||||
public static async Task<string?> DownloadMappingFileAsync(string url, string savePath)
|
||||
{
|
||||
@@ -67,7 +67,7 @@ class DumpByDaylight
|
||||
|
||||
Console.WriteLine("\nProvider Initialized. Extracting Databases...");
|
||||
|
||||
var dataPak = provider.GetArchive("pakchunk4-Windows.utoc");
|
||||
var dataPak = provider.GetArchive("pakchunk4-WinGDK.utoc");
|
||||
|
||||
/*
|
||||
* itemdb dump
|
||||
|
||||
@@ -335,6 +335,10 @@ void Proxy::handleClient(SOCKET hClientSocket)
|
||||
{
|
||||
std::string emptyBody = "";
|
||||
OnClientRequest.run(url, emptyBody, headers);
|
||||
|
||||
if (!pendingUrls.empty())
|
||||
pendingUrls.back() = url;
|
||||
|
||||
SSL_write(remoteSSL, headers.data(), (int)headers.size());
|
||||
clientStream.buffer.erase(0, clientStream.headersEnd + 4);
|
||||
clientStream.reset();
|
||||
@@ -383,6 +387,9 @@ void Proxy::handleClient(SOCKET hClientSocket)
|
||||
if (complete)
|
||||
{
|
||||
OnClientRequest.run(url, body, headers);
|
||||
if (!pendingUrls.empty() && pendingUrls.back() != url)
|
||||
pendingUrls.back() = url;
|
||||
|
||||
SSL_write(remoteSSL, headers.data(), (int)headers.size());
|
||||
SSL_write(remoteSSL, clientStream.buffer.data() + bodyStart,
|
||||
(int)(clientStream.buffer.size() - bodyStart));
|
||||
@@ -534,10 +541,6 @@ void Proxy::handleClient(SOCKET hClientSocket)
|
||||
if (!pendingUrls.empty()) pendingUrls.pop_front();
|
||||
|
||||
std::string respHeaders = serverStream.buffer.substr(0, bStart);
|
||||
size_t firstSpace = respHeaders.find(' ');
|
||||
int sc =
|
||||
(firstSpace != std::string::npos) ? safe_stoi(respHeaders.substr(firstSpace + 1, 3)) : 0;
|
||||
|
||||
OnServerResponse.run(url, body, respHeaders);
|
||||
|
||||
removeHeader(respHeaders, "Transfer-Encoding");
|
||||
|
||||
@@ -25,7 +25,7 @@ class Proxy
|
||||
bool Init();
|
||||
void Shutdown();
|
||||
|
||||
CallbackEvent<const std::string&, const std::string&, std::string&> OnClientRequest;
|
||||
CallbackEvent<std::string&, const std::string&, std::string&> OnClientRequest;
|
||||
CallbackEvent<const std::string&, std::string&, std::string&> OnServerResponse;
|
||||
|
||||
private:
|
||||
|
||||
+25
-10
@@ -34,10 +34,9 @@ void Spoofer::registerListeners(Proxy* proxy)
|
||||
this->serverResponseHandler(url, body, respHeaders);
|
||||
});
|
||||
|
||||
proxy->OnClientRequest.addListener(
|
||||
[this](const std::string& url, const std::string& body, std::string& reqHeaders) {
|
||||
this->clientRequestHandler(url, body, reqHeaders);
|
||||
});
|
||||
proxy->OnClientRequest.addListener([this](std::string& url, const std::string& body, std::string& reqHeaders) {
|
||||
this->clientRequestHandler(url, body, reqHeaders);
|
||||
});
|
||||
}
|
||||
|
||||
void Spoofer::loadData()
|
||||
@@ -217,6 +216,7 @@ void Spoofer::modifyCharacterData(json& js)
|
||||
stackableIds.insert(_camperOfferingIds.begin(), _camperOfferingIds.end());
|
||||
stackableIds.insert(_camperAddonIds.begin(), _camperAddonIds.end());
|
||||
stackableIds.insert(_slasherAddonIds.begin(), _slasherAddonIds.end());
|
||||
stackableIds.insert(_slasherOfferingIds.begin(), _slasherOfferingIds.end());
|
||||
|
||||
if (js.contains("characterItems") && js["characterItems"].is_array())
|
||||
{
|
||||
@@ -266,7 +266,9 @@ void Spoofer::modifyCharacterData(json& js)
|
||||
|
||||
void Spoofer::serverResponseHandler(const std::string& url, std::string& body, std::string& respHeaders)
|
||||
{
|
||||
#ifdef _DEBUG
|
||||
if (url.find("bhvrdbd.com") != std::string::npos) Log::verbose("BHVR api res @ {}", url);
|
||||
#endif
|
||||
|
||||
if (url.find("api/v1/extensions/store/getCatalogItems") != std::string::npos) return parseAndDumpCatalog(body);
|
||||
|
||||
@@ -382,11 +384,24 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
|
||||
|
||||
for (auto& charInfo : charList)
|
||||
{
|
||||
charInfo["isEntitled"] = true;
|
||||
if (charInfo.contains("bloodWebLevel") && charInfo["bloodWebLevel"] <= 1)
|
||||
if (charInfo.contains("bloodWebLevel") && charInfo.at("bloodWebLevel").get<int>() <= 15)
|
||||
if (!charInfo.contains("prestigeLevel") || charInfo.at("prestigeLevel").get<int>() <= 0)
|
||||
charInfo["bloodWebLevel"] = 15;
|
||||
|
||||
if (charInfo.contains("bloodWebData") && charInfo.at("bloodWebData").contains("level"))
|
||||
charInfo["bloodWebData"]["level"] = 1;
|
||||
|
||||
if (charInfo["isEntitled"] == false)
|
||||
{
|
||||
charInfo["bloodWebLevel"] = 15;
|
||||
if (charInfo["bloodWebData"].contains("level")) charInfo["bloodWebData"]["level"] = 1;
|
||||
charInfo["isEntitled"] = true;
|
||||
if (charInfo.contains("origin"))
|
||||
{
|
||||
charInfo["purchaseInfo"] = {{"quantity", 1},
|
||||
{"origin", "PlayerInventory"},
|
||||
{"reason", "Item(s) added via Purchase"},
|
||||
{"lastUpdateAt", 1770702482},
|
||||
{"objectId", charInfo["characterName"]}};
|
||||
}
|
||||
}
|
||||
|
||||
modifyCharacterData(charInfo);
|
||||
@@ -408,7 +423,7 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
|
||||
|
||||
if (body.find("NotAllowedException") != std::string::npos && body.find("not owned") != std::string::npos)
|
||||
{
|
||||
Log::info("Spoofing bloodweb error error for unowned character");
|
||||
Log::info("Spoofing bloodweb error for unowned character");
|
||||
json mock;
|
||||
mock["bloodWebLevelChanged"] = false;
|
||||
mock["updatedWallets"] = json::array();
|
||||
@@ -444,7 +459,7 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
|
||||
}
|
||||
}
|
||||
|
||||
void Spoofer::clientRequestHandler(const std::string& url, const std::string& body, std::string& /*reqHeaders*/)
|
||||
void Spoofer::clientRequestHandler(std::string& url, const std::string& body, std::string& /*reqHeaders*/)
|
||||
{
|
||||
if (url.find("api/v1/dbd-character-data/bloodweb") != std::string::npos ||
|
||||
url.find("api/v1/dbd-character-data/bulk-spending-bloodweb") != std::string::npos)
|
||||
|
||||
@@ -22,7 +22,7 @@ class Spoofer
|
||||
void modifyCharacterData(nlohmann::json& js);
|
||||
|
||||
void serverResponseHandler(const std::string& url, std::string& body, std::string& respHeaders);
|
||||
void clientRequestHandler(const std::string& url, const std::string& body, std::string& reqHeaders);
|
||||
void clientRequestHandler(std::string& url, const std::string& body, std::string& reqHeaders);
|
||||
|
||||
std::unordered_set<std::string> _camperItemIds;
|
||||
std::unordered_set<std::string> _slasherPowerIds;
|
||||
|
||||
Reference in New Issue
Block a user