Compare commits

..

20 Commits

Author SHA1 Message Date
neru 441c49d31a style: run clang-format
Build / build (push) Failing after 2m28s
2026-04-13 01:09:21 -03:00
neru e282a10f4d chore: add dlc dump 2026-04-13 01:09:12 -03:00
neru 8f6fbbb244 feat: initialize cache cleaner 2026-04-13 01:09:06 -03:00
neru 5adf5e6417 feat: add cachecleaner 2026-04-13 01:08:46 -03:00
neru a421793a54 fix: utf8 to 16 conversion missing on encrypt 2026-04-13 01:08:41 -03:00
neru bda519e70a fix: use ends_with instead of find when possible 2026-04-13 01:08:27 -03:00
neru b7aa912e1b style: misc formatting changes 2026-04-13 01:08:17 -03:00
neru 7db8048469 feat: add DLC unlocking 2026-04-13 01:08:02 -03:00
neru 091418eb53 fix: remove leftover print 2026-04-13 00:16:00 -03:00
neru 533b992a45 fix: incorrect str fmt 2026-04-12 23:18:52 -03:00
neru 937734ff7b fix: remove odd characters 2026-04-12 21:09:24 -03:00
neru 72c5466ce6 feat: add accessKey and keyId to config 2026-04-12 20:57:57 -03:00
neru 8a828db908 fix: push type 2 encryption 2026-04-12 20:57:01 -03:00
neru 3b461cd845 feat: add dbdcrypt 2026-04-12 20:56:25 -03:00
neru b2dfd9e1e5 build: link zlib statically 2026-04-12 20:56:18 -03:00
neru 448f6b7167 build: add zlib 2026-04-12 20:10:52 -03:00
neru ebe2000993 feat: send characters on /get-all request 2026-04-12 14:09:58 -03:00
neru 26038a03d1 feat: make body editable on proxy client req listeners 2026-04-12 13:12:42 -03:00
neru 698ac445e0 style: move code to onBloodwebClient 2026-04-12 13:12:24 -03:00
neru 45431e29f1 fix: remove repeated statement 2026-04-12 13:12:00 -03:00
15 changed files with 1405 additions and 22 deletions
+3
View File
@@ -7,3 +7,6 @@
[submodule "vendor/json"]
path = vendor/json
url = https://github.com/nlohmann/json
[submodule "vendor/zlib"]
path = vendor/zlib
url = https://github.com/madler/zlib
+1 -1
View File
@@ -76,7 +76,7 @@ add_executable(dbd-unlocker ${UNLOCKER_SOURCES})
string(RANDOM LENGTH 12 ALPHABET "abcdefghijklmnopqrstuvwxyz0123456789" RANDOM_EXE_NAME)
set_target_properties(dbd-unlocker PROPERTIES OUTPUT_NAME "${RANDOM_EXE_NAME}")
target_link_libraries(dbd-unlocker PRIVATE dbd-unlocker-warnings OpenSSL::SSL OpenSSL::Crypto nerutils wsock32 ws2_32 wininet crypt32 nlohmann_json)
target_link_libraries(dbd-unlocker PRIVATE dbd-unlocker-warnings OpenSSL::SSL OpenSSL::Crypto nerutils wsock32 ws2_32 wininet crypt32 nlohmann_json zlibstatic )
if(NOT MSVC)
target_link_options(dbd-unlocker PRIVATE -static -static-libgcc -static-libstdc++)
+95
View File
@@ -0,0 +1,95 @@
[
"Ace",
"Adam",
"Ash",
"Bear",
"Bill",
"Bob",
"Cannibal",
"Chuckles",
"Claudette",
"Clown",
"Demogorgon",
"Dwight",
"Eric",
"Feng",
"Ghostface",
"Gunslinger",
"HillBilly",
"Jake",
"Jane",
"Jeff",
"K20",
"K21",
"K22",
"K23",
"K24",
"K25",
"K26",
"K27",
"K28",
"K29",
"K30",
"K31",
"K32",
"K33",
"K34",
"K35",
"K36",
"K37",
"K38",
"K39",
"K40",
"K41",
"K42",
"Kate",
"Killer07",
"Laurie",
"Legion",
"Meg",
"Nancy",
"Nea",
"Nightmare",
"Nurse",
"Oni",
"Pig",
"Plague",
"Quentin",
"S22",
"S23",
"S24",
"S25",
"S26",
"S27",
"S28",
"S29",
"S30",
"S31",
"S32",
"S33",
"S34",
"S35",
"S36",
"S37",
"S38",
"S39",
"S40",
"S41",
"S42",
"S43",
"S44",
"S45",
"S46",
"S47",
"S48",
"S49",
"S50",
"S51",
"Shape",
"Smoke",
"Spirit",
"Steve",
"Witch",
"Yui",
"Zarina"
]
+427
View File
@@ -0,0 +1,427 @@
[
{
"name": "The 80's Suitcase",
"grdk": "9NF6VS6NVC2P",
"egs": "a1f208be98e64c5ea5e946b86f7d19c3"
},
{
"name": "ACPack_01",
"grdk": "9N4LWJH8J800",
"egs": "168d750b4a6f451ca6eb68618a741f2c"
},
{
"name": "ACPack_02",
"grdk": "9NSD3C05HVNM",
"egs": "d9ba2a71c7664785a1cfff524edb768c"
},
{
"name": "ACPack_03",
"grdk": "9N6FGJW61X23",
"egs": "81c99b3171f941ff9f7915b51e371f05"
},
{
"name": "ACPack_04",
"grdk": "9PLG9SM9GNLM",
"egs": "916bfd0101c24561b75e984751e46e95"
},
{
"name": "ACPack_05",
"grdk": "9N310FS0QMG8",
"egs": "920f365a9b454af3a9bc675f839bed64"
},
{
"name": "ACPack_06",
"grdk": "9N82ZN5T0VB3",
"egs": "87bb22af1b6c4ee19404b34b7321fb4c"
},
{
"name": "All Things Wicked Chapter",
"grdk": "9NLCTCL61ZZ2",
"egs": "9a0c250555c14679a6208e57d89918d2"
},
{
"name": "A Binding of Kin Chapter",
"grdk": "9N02CL4TC7CQ",
"egs": "ffda316a960d4f41930027dbe0772e0f"
},
{
"name": "BaseGame",
"grdk": "9NMS4SFNBGBH",
"egs": "daedda2898b74feeac35f222ef02539a"
},
{
"name": "Leatherface\u2122 Chapter",
"grdk": "9NKNQ2DZMLZW",
"egs": "06f5b0d8cf56445390f14516b28ea5c2"
},
{
"name": "ChineseEventOct2017",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Dungeons & Dragons Chapter",
"grdk": "9PCWX77XPKLP",
"egs": "19bb1e99cbaa41b08fa06ddde6befa28"
},
{
"name": "ChurrosCust",
"grdk": "9PC5X94ST9QK",
"egs": "f5940ef33904476b945229c70c0508b3"
},
{
"name": "All Kill Chapter",
"grdk": "9N54CBKZBV44",
"egs": "87fafa3c2a724dddb87fb2a5cd350dae"
},
{
"name": "DeathGarden",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Tomb Raider Chapter",
"grdk": "9P7BL680J1XZ",
"egs": "b12e9ce935c04bda8624a02d5d14ea02"
},
{
"name": "DonutCust",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Terror Expansion Pack",
"grdk": "9N343FZ245RD",
"egs": "489ff36aa1ba47089591bf623f0af9df"
},
{
"name": "Escape Expansion Pack",
"grdk": "9NR9FPF9G79L",
"egs": "f8c85b036b0c418097f7abf10384c821"
},
{
"name": "Castlevania Chapter",
"grdk": "9NGXBJNF1C13",
"egs": "18a5a780992347afa03d190a9c1927f9"
},
{
"name": "Resident Evil Chapter",
"grdk": "9P29W29LSSG2",
"egs": "dbf62759c9cc439699256801ee09095c"
},
{
"name": "EpicBrillFreeWeek",
"grdk": "9ZZZZZZZZZZZ",
"egs": "a9e88f5bd1a047539c772370f15deb48"
},
{
"name": "EpicBrillGeneral",
"grdk": "9ZZZZZZZZZZZ",
"egs": "daedda2898b74feeac35f222ef02539a"
},
{
"name": "The Saw\u00ae Chapter",
"grdk": "9N2P7KNZ816R",
"egs": "18b030008f8847af868aff2f0eaab510"
},
{
"name": "GStar2017",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Doomed Course Chapter",
"grdk": "9P4PV6KXJGL2",
"egs": "80cf38fedc164b2c97d6d9570a9ab2cc"
},
{
"name": "Hellraiser Chapter",
"grdk": "9PJNHM94SW0S",
"egs": "bc146268c50b4716a65a132a70d12c0a"
},
{
"name": "Curtain Call Chapter",
"grdk": "9P0HLNG7X2D0",
"egs": "2e8b8ed7a3cd481abcae1f7986153e50"
},
{
"name": "Shattered Bloodline Chapter",
"grdk": "9N78HGQN56L7",
"egs": "ca6f548dabef4026b804aaa0a606a8fa"
},
{
"name": "Maddening Darkness Pack",
"grdk": "9NB4CC8GN5S7",
"egs": "c8d9fd67a4184f069c3c080f104b89a4"
},
{
"name": "Old Wounds Pack",
"grdk": "9NGRVV847PN9",
"egs": "ac0bf77a00eb43cd822b8ac3690f3731"
},
{
"name": "Macabre Tales Pack",
"grdk": "9NP99MKHQHZS",
"egs": "b96de0a9a2294e69a6fb0667ef6ddf74"
},
{
"name": "Endless Hunt Pack",
"grdk": "9NVVCQKVPTQR",
"egs": "e0d3d8e56d934016be3ebf74c5ecc85e"
},
{
"name": "Hour of The Witch Chapter",
"grdk": "9N1XTPLC8DGB",
"egs": "4eb6bf2cdef2438b924c5d8cd2137cc5"
},
{
"name": "Tokyo Ghoul Chapter",
"grdk": "9NRWN81GQ9CJ",
"egs": "cee46f4734a94018be459b5a642f0536"
},
{
"name": "@#DLC_IcecreamCust_SHORT_NAME",
"grdk": "9NPTQDMHG1DT",
"egs": "71836318753941dd8efb7ab68575005b"
},
{
"name": "Portrait of a Murder Chapter",
"grdk": "9NZFJHT080C9",
"egs": "9e8f8dace7a243c480c6d6d06ab429c9"
},
{
"name": "Steady Pulse Chapter",
"grdk": "9P7GG0L4LJBN",
"egs": "e65a462d873046499c01f29910b00b1a"
},
{
"name": "Kabuki",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Darkness Among Us Chapter",
"grdk": "9P62QBBJZSD4",
"egs": "268cae6e74134dee92198670d7b30bcc"
},
{
"name": "Sadako Rising Chapter",
"grdk": "9PKPS8SDQQM8",
"egs": "1f3b9ad501c24864b20a9e6faef38310"
},
{
"name": "Five Nights at Freddy's Chapter",
"grdk": "9NK4H61J4B39",
"egs": "ea868d5b96b94b8ba2c2392d9a8505c0"
},
{
"name": "The Walking Dead Chapter",
"grdk": "9NZJ81G57RGT",
"egs": "f7dfa0fab53146358c1f87bc08d00b7c"
},
{
"name": "Demise of the Faithful Chapter",
"grdk": "9N29SR96GQS4",
"egs": "4f8625dec370441da5fd0a11ff0732d8"
},
{
"name": "Sinister Grace Chapter",
"grdk": "9N7WDS85VBZG",
"egs": "8ddd7882dca64a5f80ec9f1bea49892d"
},
{
"name": "Roots of Dread Chapter",
"grdk": "9PKZR14F59HK",
"egs": "511e4db16dc544faa03b8fb6811efcc5"
},
{
"name": "Ash vs Evil Dead Chapter",
"grdk": "9N55M38QNMCS",
"egs": "f8ead4a3752f41e69632bfce9838ca9b"
},
{
"name": "Ghost Face\u00ae Chapter",
"grdk": "9NMC8SZPD9GF",
"egs": "cd2c0734ab444693884d200be769be0c"
},
{
"name": "@#DLC_Omelet_SHORT_NAME",
"grdk": "9NMS4SFNBGBH",
"egs": "daedda2898b74feeac35f222ef02539a"
},
{
"name": "Resident Evil: PROJECT W Chapter",
"grdk": "9P47ZQQJM1N4",
"egs": "a523401428b54369880fd3e9d343ffe8"
},
{
"name": "Resident Evil: Project W Chapter",
"grdk": "9NX0ZCNSRNR1",
"egs": ""
},
{
"name": "Stranger Things Chapter 2",
"grdk": "9PJ0JD3ZWTBX",
"egs": "76d10ee1eacd469797a5d13bddd3850a"
},
{
"name": "Pulcinella Chapter",
"grdk": "9MTC8NRZLQ5T",
"egs": ""
},
{
"name": "Stranger Things Chapter",
"grdk": "9MSMWW173HB5",
"egs": "42e370c2688e4e96a7bf67d87a01874a"
},
{
"name": "Forged in Fog Chapter",
"grdk": "9N6Z2RG4GSD4",
"egs": "f6ac362ab0aa462e894e698682a92801"
},
{
"name": "All-Kill: Comeback Chapter",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "A Nightmare on Elm Street\u2122 Chapter",
"grdk": "9NW2X83B4JJV",
"egs": "439c3c5df54b468696f880401660d7ad"
},
{
"name": "Tools of Torment Chapter",
"grdk": "9PCSC363JX1B",
"egs": "e3ec01697342406c89110b8d117eccaf"
},
{
"name": "StoreItem",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Cursed Legacy Chapter",
"grdk": "9NJG10XN1LGL",
"egs": "01bbc39db2f446daab0b283343fc99c8"
},
{
"name": "Chains of Hate Chapter",
"grdk": "9PK2JHM3C71C",
"egs": "9a109c018e17400eae350a423e595107"
},
{
"name": "End Transmission Chapter",
"grdk": "9N5390XWCVZ6",
"egs": "19e7cf4f9329474fa0a2692a14e37fe2"
},
{
"name": "Attack on Titans Armored Chapter",
"grdk": "9P4SDDKMV045",
"egs": "956738aff598412c9a5247cfc7dae735"
},
{
"name": "Attack on Titans War Hammer Chapter",
"grdk": "9NRRQPTBW978",
"egs": "7dbb037c212947fc8011d0c934dd89f5"
},
{
"name": "Nicolas Cage Chapter",
"grdk": "9NCZMBJCLTJ3",
"egs": "29fe12a4cb51431793239261cb1fd8c3"
},
{
"name": "Silent Hill Chapter",
"grdk": "9NWVSBTG89KQ",
"egs": "e7d0828eb497411c813951058d8fd931"
},
{
"name": "Silent Hill Chapter",
"grdk": "9PHV0FJ8HXVJ",
"egs": "3280c01d39a74adc83be41e3fd74b5d1"
},
{
"name": "WinterEvent2017",
"grdk": "9NMS4SFNBGBH",
"egs": "daedda2898b74feeac35f222ef02539a"
},
{
"name": "Alien Chapter",
"grdk": "9NC2M3W7NHB5",
"egs": "4ebd4f31838549e38eecb23130e57700"
},
{
"name": "XboxPerkNov2020",
"grdk": "9N2DHTZ1D9CC",
"egs": ""
},
{
"name": "Descend Beyond Chapter",
"grdk": "9NFXH0QD1M7C",
"egs": "89120707a96a4210a9e23dced174632e"
},
{
"name": "Chucky Chapter",
"grdk": "9P0NJ7CS0TM1",
"egs": "f1e1bce49652456e85de167fbcc52a6a"
},
{
"name": "Alan Wake Chapter",
"grdk": "9MZ841F14MXK",
"egs": "8fbd0077488b4334ae91de61588870ff"
},
{
"name": "bloodletting",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "The Bloodstained Sack",
"grdk": "9NW55H5J9NH2",
"egs": "abc74084457d46f5a51f062f540bdeee"
},
{
"name": "A Lullaby for the Dark Chapter",
"grdk": "9NMS4SFNBGBH",
"egs": "daedda2898b74feeac35f222ef02539a"
},
{
"name": "Charity Case",
"grdk": "9P1CNFD3MMC7",
"egs": "0885718299d640708080b66ddb9dceb1"
},
{
"name": "development",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
},
{
"name": "Of Flesh and Mud Chapter",
"grdk": "9NJQTSL5PZJL",
"egs": "b18a490a58d548588eb60c2fd6b4c3cc"
},
{
"name": "Halloween\u00ae Chapter",
"grdk": "9NJ77BPBRSFH",
"egs": "c9d4a48a9576483fb6ba27a99bcb3780"
},
{
"name": "Headcase",
"grdk": "9NCLGTXXZ18Q",
"egs": "93f4e154df3a4254a0ece7241659d84e"
},
{
"name": "The Last Breath Chapter",
"grdk": "9NMS4SFNBGBH",
"egs": "daedda2898b74feeac35f222ef02539a"
},
{
"name": "Spark of Madness Chapter",
"grdk": "9NX58MLKKQWD",
"egs": "4b9c8d9424ca4a2899505254ba46b109"
},
{
"name": "steamOnly",
"grdk": "9ZZZZZZZZZZZ",
"egs": ""
}
]
+128
View File
@@ -0,0 +1,128 @@
#include "cachecleaner.h"
#include <nerutils/log.h>
#include <filesystem>
#include <unordered_set>
#include <ShlObj_core.h>
#include <TlHelp32.h>
CacheCleaner::CacheCleaner() : _running(false), _monitorThread(nullptr) {}
CacheCleaner::~CacheCleaner()
{
shutdown();
}
void CacheCleaner::init()
{
std::string localAppData = getLocalAppDataPath();
if (localAppData == "") return Log::error("Failed to get LocalAppData?");
_cacheDir = localAppData + "\\DeadByDaylight\\Saved\\PersistentDownloadDir";
// this is pointless but just in case
std::filesystem::create_directories(_cacheDir);
clearFolder(_cacheDir);
_running = true;
//_monitorThread = std::make_unique<std::thread>(&CacheCleaner::monitorLoop, this);
}
void CacheCleaner::shutdown()
{
if (!_running) return;
_running = false;
if (_monitorThread && _monitorThread->joinable()) _monitorThread->join();
}
std::string CacheCleaner::getLocalAppDataPath()
{
char buffer[MAX_PATH];
if (SHGetFolderPathA(NULL, CSIDL_LOCAL_APPDATA, NULL, 0, buffer) == S_OK)
{
return std::string(buffer);
}
return "";
}
void CacheCleaner::clearFolder(std::string& path)
{
try
{
for (const auto& entry : std::filesystem::directory_iterator(path))
{
std::filesystem::remove_all(entry.path());
}
}
catch (...)
{
}
}
void CacheCleaner::monitorLoop()
{
HANDLE changeHandle = FindFirstChangeNotificationA(_cacheDir.c_str(), TRUE,
FILE_NOTIFY_CHANGE_FILE_NAME | FILE_NOTIFY_CHANGE_DIR_NAME |
FILE_NOTIFY_CHANGE_LAST_WRITE);
if (changeHandle == INVALID_HANDLE_VALUE)
{
Log::error("Failed to create change notification");
_running = false;
return;
}
Log::verbose("Cache cleaner monitoring started");
std::unordered_set<DWORD> previousPids;
while (_running)
{
// Wait 2 seconds between checks
for (int i = 0; i < 20 && _running; i++)
Sleep(100);
if (!_running) break;
// Take snapshot and check for new processes in one pass
HANDLE hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
if (hSnapshot == INVALID_HANDLE_VALUE) continue;
PROCESSENTRY32 pe32;
pe32.dwSize = sizeof(PROCESSENTRY32);
std::unordered_set<DWORD> currentPids;
if (Process32First(hSnapshot, &pe32))
{
do
{
DWORD pid = pe32.th32ProcessID;
currentPids.insert(pid);
if (previousPids.find(pid) == previousPids.end())
{
std::string processName(pe32.szExeFile);
for (char& c : processName)
c = static_cast<char>(tolower(c));
if (processName.find("deadbydaylight") != std::string::npos)
{
Log::verbose("New DeadByDaylight process detected (PID: {}), clearing cache", pid);
clearFolder(_cacheDir);
}
}
} while (Process32Next(hSnapshot, &pe32));
}
CloseHandle(hSnapshot);
previousPids = std::move(currentPids);
}
FindCloseChangeNotification(changeHandle);
}
+24
View File
@@ -0,0 +1,24 @@
#pragma once
#include <string>
#include <atomic>
#include <thread>
class CacheCleaner
{
public:
CacheCleaner();
~CacheCleaner();
void init();
void shutdown();
private:
std::string getLocalAppDataPath();
void clearFolder(std::string& path);
void monitorLoop();
std::atomic<bool> _running;
std::unique_ptr<std::thread> _monitorThread;
std::string _cacheDir;
};
+473
View File
@@ -0,0 +1,473 @@
#include "dbdcrypt.h"
#include <nerutils/log.h>
#include <algorithm>
#include <zlib.h>
#include <openssl/types.h>
#include <openssl/evp.h>
#include <openssl/bio.h>
#include <openssl/buffer.h>
std::string DBDCrypt::decrypt(const std::string& data, const std::string& accessKey, PayloadType* outType)
{
if (outType) *outType = NONE;
if (data.starts_with("DbdDAQEB"))
{
if (outType && *outType == NONE) *outType = TYPE_1;
return decType1(data, accessKey, outType);
}
if (data.starts_with("DbdDAgAC"))
{
if (outType && *outType == NONE) *outType = TYPE_2;
return decType2(data, accessKey, outType);
}
if (data.starts_with("DbdDAwAC"))
{
if (outType && *outType == NONE) *outType = TYPE_3;
return decType3(data, accessKey, outType);
}
Log::warning("Attempted to decrypt non encrypted string");
return data;
}
std::string DBDCrypt::encrypt(const std::string& data, const std::string& accessKey, PayloadType type,
std::string keyId)
{
if (type == TYPE_1)
{
auto compressed = zLibCompress(data); // Type 1 is UTF-8
if (compressed.empty()) return "";
uint32_t rawSize = (uint32_t)data.size();
std::vector<uint8_t> fullPayload(4);
std::memcpy(fullPayload.data(), &rawSize, 4);
fullPayload.insert(fullPayload.end(), compressed.begin(), compressed.end());
return "DbdDAQEB" + b64Enc(fullPayload);
}
if (type == TYPE_2)
{
auto transformedKey = transformCDNKey(CDN_KEY_BASE64);
std::string utf16Data = utf8ToUtf16(data);
for (char& c : utf16Data)
c = (char)((unsigned char)c - 1);
std::vector<uint8_t> padded(utf16Data.begin(), utf16Data.end());
int padLen = 16 - (padded.size() % 16);
if (padLen < 16) padded.insert(padded.end(), padLen, 0);
auto encryptedBody = aesECBEncrypt(padded, transformedKey);
if (encryptedBody.empty()) return "";
std::vector<uint8_t> fullPayload(encryptedBody.begin(), encryptedBody.end());
return "DbdDAgAC" + b64Enc(fullPayload);
}
if (type == TYPE_3)
{
auto decodedKey = b64Dec(accessKey);
if (decodedKey.empty()) return "";
std::string utf16Data = utf8ToUtf16(data);
for (char& c : utf16Data)
c = (char)((unsigned char)c - 1);
std::vector<uint8_t> padded(utf16Data.begin(), utf16Data.end());
int padLen = 16 - (padded.size() % 16);
if (padLen < 16) padded.insert(padded.end(), padLen, 0);
auto encryptedBody = aesECBEncrypt(padded, decodedKey);
if (encryptedBody.empty()) return "";
std::string shiftedId = shiftKeyID(keyId, -1);
std::vector<uint8_t> fullData(shiftedId.begin(), shiftedId.end());
fullData.push_back(0); // Null terminator
fullData.insert(fullData.end(), (uint8_t*)encryptedBody.data(),
(uint8_t*)encryptedBody.data() + encryptedBody.size());
return "DbdDAwAC" + b64Enc(fullData);
}
return std::string();
}
std::string DBDCrypt::decType1(const std::string& data, const std::string& key, PayloadType* outType)
{
if (data.length() < 8) return data;
auto decoded = b64Dec(data.substr(8));
if (decoded.size() < 4)
{
Log::error("Type 1 base64 too short ({})", decoded.size());
return "";
}
std::vector<uint8_t> body(decoded.begin() + 4, decoded.end());
std::string decompressed = zlibDecompress(body);
if (decompressed.length() >= 2 && decompressed[1] == '\0') decompressed = utf16ToUtf8(decompressed);
if (decompressed.starts_with("DbdD")) return decrypt(decompressed, key, outType);
return decompressed;
}
std::string DBDCrypt::decType2(const std::string& data, const std::string& key, PayloadType* outType)
{
if (data.length() < 8) return data;
auto decoded = b64Dec(data.substr(8));
if (decoded.empty()) return "";
std::vector<uint8_t> body = decoded;
auto transformedKey = transformCDNKey(CDN_KEY_BASE64);
std::string decrypted = aesECBDecrypt(body, transformedKey);
if (decrypted.empty()) return "";
for (char& c : decrypted)
c = (char)((unsigned char)c + 1);
if (decrypted.length() >= 2 && decrypted[1] == '\0') decrypted = utf16ToUtf8(decrypted);
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x01), decrypted.end());
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x00), decrypted.end());
for (size_t offset : {0ULL, 4ULL})
{
if (offset + 1 < decrypted.size() && (unsigned char)decrypted[offset] == 0x78)
{
std::vector<uint8_t> zlibPart((uint8_t*)decrypted.data() + offset,
(uint8_t*)decrypted.data() + decrypted.size());
std::string decompressed = zlibDecompress(zlibPart);
if (!decompressed.empty()) return decompressed;
}
}
if (decrypted.starts_with("DbdD")) return decrypt(decrypted, key, outType);
return decrypted;
}
std::string DBDCrypt::decType3(const std::string& data, const std::string& key, PayloadType* outType)
{
if (data.length() < 8) return data;
auto rawKey = b64Dec(key);
auto decoded = b64Dec(data.substr(8));
if (decoded.empty()) return "";
auto it = std::find(decoded.begin(), decoded.end(), 0);
if (it == decoded.end()) return "";
std::vector<uint8_t> body(it + 1, decoded.end());
std::string decrypted = aesECBDecrypt(body, rawKey);
if (decrypted.empty())
{
Log::error("AES decryption failed (body size: {})", body.size());
return "";
}
for (char& c : decrypted)
c = (char)((unsigned char)c + 1);
if (decrypted.length() >= 2 && decrypted.at(1) == '\0') decrypted = utf16ToUtf8(decrypted);
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x01), decrypted.end());
decrypted.erase(std::remove(decrypted.begin(), decrypted.end(), (char)0x00), decrypted.end());
for (size_t offset : {0ULL, 4ULL})
{
if (offset + 1 < decrypted.size() && (unsigned char)decrypted[offset] == 0x78)
{
//Log::verbose("nested zlib at offset {}", offset);
std::vector<uint8_t> zlibPart((uint8_t*)decrypted.data() + offset,
(uint8_t*)decrypted.data() + decrypted.size());
std::string decompressed = zlibDecompress(zlibPart);
if (!decompressed.empty())
{
//Log::verbose("nested zlib decompressed, size: {}", decompressed.length());
return decompressed;
}
}
}
if (decrypted.starts_with("DbdD")) return decrypt(decrypted, key, outType);
return decrypted;
}
std::string DBDCrypt::aesECBDecrypt(const std::vector<uint8_t>& cipherText, const std::vector<uint8_t>& key)
{
if (key.size() < 32) return "";
EVP_CIPHER_CTX* ctx = EVP_CIPHER_CTX_new();
EVP_DecryptInit_ex(ctx, EVP_aes_256_ecb(), NULL, key.data(), NULL);
EVP_CIPHER_CTX_set_padding(ctx, 0);
std::string plaintext;
plaintext.resize(cipherText.size());
int len = 0;
if (EVP_DecryptUpdate(ctx, (unsigned char*)plaintext.data(), &len, cipherText.data(), (int)cipherText.size()) != 1)
{
EVP_CIPHER_CTX_free(ctx);
return "";
}
int outLen = len;
int finalLen = 0;
if (EVP_DecryptFinal_ex(ctx, (unsigned char*)plaintext.data() + len, &finalLen) != 1)
{
// ignore?
}
outLen += finalLen;
EVP_CIPHER_CTX_free(ctx);
plaintext.resize(outLen);
return plaintext;
}
std::string DBDCrypt::aesECBEncrypt(const std::vector<uint8_t>& plainText, const std::vector<uint8_t>& key)
{
if (key.size() < 32) return "";
EVP_CIPHER_CTX* ctx = EVP_CIPHER_CTX_new();
EVP_EncryptInit_ex(ctx, EVP_aes_256_ecb(), NULL, key.data(), NULL);
EVP_CIPHER_CTX_set_padding(ctx, 0);
std::string ciphertext;
ciphertext.resize(plainText.size() + 16);
int len = 0;
if (EVP_EncryptUpdate(ctx, (unsigned char*)ciphertext.data(), &len, plainText.data(), (int)plainText.size()) != 1)
{
EVP_CIPHER_CTX_free(ctx);
return "";
}
int outLen = len;
int finalLen = 0;
if (EVP_EncryptFinal_ex(ctx, (unsigned char*)ciphertext.data() + outLen, &finalLen) == 1)
{
outLen += finalLen;
}
EVP_CIPHER_CTX_free(ctx);
ciphertext.resize(outLen);
return ciphertext;
}
std::vector<uint8_t> DBDCrypt::b64Dec(const std::string& input)
{
std::string in = input;
std::replace(in.begin(), in.end(), '-', '+');
std::replace(in.begin(), in.end(), '_', '/');
BIO *bio, *b64;
int decodeLen = (int)in.length();
std::vector<uint8_t> buffer(decodeLen);
bio = BIO_new_mem_buf(in.data(), decodeLen);
b64 = BIO_new(BIO_f_base64());
bio = BIO_push(b64, bio);
BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL);
int len = BIO_read(bio, buffer.data(), decodeLen);
BIO_free_all(bio);
if (len < 0) return {};
buffer.resize(len);
return buffer;
}
std::string DBDCrypt::b64Enc(const std::vector<uint8_t>& input)
{
if (input.empty()) return "";
BIO *bio, *b64;
BUF_MEM* bufferPtr;
b64 = BIO_new(BIO_f_base64());
bio = BIO_new(BIO_s_mem());
bio = BIO_push(b64, bio);
BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL);
BIO_write(bio, input.data(), (int)input.size());
BIO_flush(bio);
BIO_get_mem_ptr(bio, &bufferPtr);
std::string result(bufferPtr->data, bufferPtr->length);
BIO_free_all(bio);
return result;
}
std::string DBDCrypt::zlibDecompress(const std::vector<uint8_t>& compressed)
{
if (compressed.empty()) return "";
z_stream strm;
strm.zalloc = Z_NULL;
strm.zfree = Z_NULL;
strm.opaque = Z_NULL;
strm.avail_in = (uInt)compressed.size();
strm.next_in = (Bytef*)compressed.data();
if (inflateInit(&strm) != Z_OK) return "";
std::string result;
char buffer[32768];
do
{
strm.avail_out = sizeof(buffer);
strm.next_out = (Bytef*)buffer;
int ret = inflate(&strm, Z_NO_FLUSH);
if (ret != Z_OK && ret != Z_STREAM_END)
{
inflateEnd(&strm);
return "";
}
result.append(buffer, sizeof(buffer) - strm.avail_out);
} while (strm.avail_out == 0);
inflateEnd(&strm);
return result;
}
std::vector<uint8_t> DBDCrypt::zLibCompress(const std::string& data)
{
if (data.empty()) return {};
z_stream strm;
strm.zalloc = Z_NULL;
strm.zfree = Z_NULL;
strm.opaque = Z_NULL;
if (deflateInit(&strm, Z_DEFAULT_COMPRESSION) != Z_OK) return {};
strm.avail_in = (uInt)data.size();
strm.next_in = (Bytef*)data.data();
std::vector<uint8_t> result;
uint8_t buffer[32768];
do
{
strm.avail_out = sizeof(buffer);
strm.next_out = (Bytef*)buffer;
deflate(&strm, Z_FINISH);
result.insert(result.end(), buffer, buffer + (sizeof(buffer) - strm.avail_out));
} while (strm.avail_out == 0);
deflateEnd(&strm);
return result;
}
std::vector<uint8_t> DBDCrypt::transformCDNKey(const std::string& b64CDNKey)
{
auto encryptedKey = b64Dec(b64CDNKey);
std::vector<uint8_t> uuidKey(32, 0);
std::memcpy(uuidKey.data(), CDN_UUID, std::min((size_t)32, strlen(CDN_UUID)));
std::string decrypted = aesECBDecrypt(encryptedKey, uuidKey);
std::vector<uint8_t> finalKey(decrypted.begin(), decrypted.end());
if (finalKey.size() > 32)
finalKey.resize(32);
else if (finalKey.size() < 32)
finalKey.resize(32, 0);
return finalKey;
}
std::string DBDCrypt::shiftKeyID(const std::string& id, int shift)
{
std::string res = id;
for (char& c : res)
c = (char)((unsigned char)c + shift);
return res;
}
std::string DBDCrypt::utf16ToUtf8(const std::string& utf16)
{
if (utf16.empty()) return "";
std::string utf8;
for (size_t i = 0; i < utf16.length(); i += 2)
{
uint16_t cp = *(uint16_t*)(utf16.data() + i);
if (cp == 0) break;
if (cp < 0x80)
utf8 += (char)cp;
else if (cp < 0x800)
{
utf8 += (char)(0xC0 | (cp >> 6));
utf8 += (char)(0x80 | (cp & 0x3F));
}
else
{
utf8 += (char)(0xE0 | (cp >> 12));
utf8 += (char)(0x80 | ((cp >> 6) & 0x3F));
utf8 += (char)(0x80 | (cp & 0x3F));
}
}
return utf8;
}
std::string DBDCrypt::utf8ToUtf16(const std::string& utf8)
{
if (utf8.empty()) return "";
std::string utf16;
for (size_t i = 0; i < utf8.length();)
{
uint32_t cp = 0;
unsigned char c = utf8[i];
if (c < 0x80)
{
cp = c;
i += 1;
}
else if (c < 0xE0)
{
cp = ((c & 0x1F) << 6) | (utf8[i + 1] & 0x3F);
i += 2;
}
else if (c < 0xF0)
{
cp = ((c & 0x0F) << 12) | ((utf8[i + 1] & 0x3F) << 6) | (utf8[i + 2] & 0x3F);
i += 3;
}
else
{
cp = ((c & 0x07) << 18) | ((utf8[i + 1] & 0x3F) << 12) | ((utf8[i + 2] & 0x3F) << 6) | (utf8[i + 3] & 0x3F);
i += 4;
}
if (cp < 0x10000)
{
utf16.push_back((char)(cp & 0xFF));
utf16.push_back((char)(cp >> 8));
}
else
{
cp -= 0x10000;
uint16_t high = (uint16_t)(0xD800 | (cp >> 10));
uint16_t low = (uint16_t)(0xDC00 | (cp & 0x3FF));
utf16.push_back((char)(high & 0xFF));
utf16.push_back((char)(high >> 8));
utf16.push_back((char)(low & 0xFF));
utf16.push_back((char)(low >> 8));
}
}
return utf16;
}
+51
View File
@@ -0,0 +1,51 @@
#pragma once
#include <string>
#include <vector>
// 9.5.2_live
#define ACCESS_KEY "BGz7nwlRX8QP__fzvqrgpNRVqrlEyuY54vuGVAqDO_g="
#define KEY_ID "9.5.2_live"
/*
hardcoded variables (they have been the same since like 2017)
*/
#define CDN_KEY_BASE64 "lEQWeCt51ET+MIuxdTs7Ig/gzVZP2vdkVZA1BDfz+L0="
#define CDN_UUID "6EF35759-454D-4EBC-8041-9A94CB99FD5D"
class DBDCrypt
{
public:
enum PayloadType
{
NONE = 0,
TYPE_1, // compressed
TYPE_2, // CDN
TYPE_3 // dyn / accesskey
};
static std::string decrypt(const std::string& data, const std::string& accessKey,
PayloadType* outType = nullptr);
static std::string encrypt(const std::string& data, const std::string& accessKey, PayloadType type,
std::string keyId);
private:
static std::string decType1(const std::string& data, const std::string& key, PayloadType* outType);
static std::string decType2(const std::string& data, const std::string& key, PayloadType* outType);
static std::string decType3(const std::string& data, const std::string& key, PayloadType* outType);
static std::string aesECBDecrypt(const std::vector<uint8_t>& cipherText, const std::vector<uint8_t>& key);
static std::string aesECBEncrypt(const std::vector<uint8_t>& plainText, const std::vector<uint8_t>& key);
static std::vector<uint8_t> b64Dec(const std::string& input);
static std::string b64Enc(const std::vector<uint8_t>& input);
static std::string zlibDecompress(const std::vector<uint8_t>& compressed);
static std::vector<uint8_t> zLibCompress(const std::string& data);
static std::vector<uint8_t> transformCDNKey(const std::string& b64CDNKey);
static std::string shiftKeyID(const std::string& id, int shift);
static std::string utf16ToUtf8(const std::string& utf16);
static std::string utf8ToUtf16(const std::string& utf8);
};
+15
View File
@@ -1,5 +1,6 @@
#include "proxy.h"
#include "spoofing.h"
#include "cachecleaner.h"
#include <nerutils/log.h>
@@ -55,6 +56,7 @@ bool setProxyAddress(bool enable, const std::string& proxyAddr)
bool running = true;
Proxy* proxy = nullptr;
CacheCleaner* cleaner = nullptr;
void cleanup()
{
@@ -72,6 +74,12 @@ void cleanup()
Log::info("Shutting down proxy");
proxy->shutdown();
}
if (cleaner)
{
Log::info("Shutting down cache cleaner");
cleaner->shutdown();
}
}
BOOL WINAPI consoleHandler(DWORD dwType)
@@ -117,6 +125,13 @@ int main()
spoofer->init(proxy);
/*
cache cleaner setup
*/
Log::info("Cache cleaner init");
cleaner = new CacheCleaner();
cleaner->init();
/*
pause
*/
+5
View File
@@ -526,6 +526,11 @@ void Proxy::handleClient(SOCKET clientSocket)
OnClientRequest.run(url, fullBody, headers);
removeHeader(headers, "Transfer-Encoding");
removeHeader(headers, "Content-Length");
headers.insert(headers.size() - 2,
"Content-Length: " + std::to_string(fullBody.size()) + "\r\n");
SSL_write(remoteSSL.get(), headers.data(), (int)headers.size());
SSL_write(remoteSSL.get(), fullBody.data(), (int)fullBody.size());
+1 -1
View File
@@ -30,7 +30,7 @@ class Proxy
bool init();
void shutdown();
CallbackEvent<std::string&, const std::string&, std::string&> OnClientRequest;
CallbackEvent<const std::string&, std::string&, std::string&> OnClientRequest;
CallbackEvent<const std::string&, std::string&, std::string&> OnServerResponse;
void addWhitelistDomain(const std::string& domain);
+160 -19
View File
@@ -1,4 +1,4 @@
#include "spoofing.h"
#include "spoofing.h"
#include "utils.h"
#include <string>
@@ -51,7 +51,7 @@ void Spoofer::registerListeners(Proxy* proxy)
this->serverResponseHandler(url, body, respHeaders);
});
proxy->OnClientRequest.addListener([this](std::string& url, const std::string& body, std::string& reqHeaders) {
proxy->OnClientRequest.addListener([this](const std::string& url, std::string& body, std::string& reqHeaders) {
this->clientRequestHandler(url, body, reqHeaders);
});
}
@@ -101,6 +101,47 @@ void Spoofer::loadData()
Log::verbose("Loaded customizations.json");
}
/*
characters
*/
std::ifstream characterFile(utils::getExePath() + "characters.json");
if (characterFile.is_open())
{
std::stringstream buff;
buff << characterFile.rdbuf();
json doc = json::parse(buff.str(), nullptr, false);
if (doc.is_discarded())
Log::error("Failed to parse characters.json");
else
{
for (const auto& character : doc)
{
if (character.is_string()) _characterList.insert(character.get<std::string>());
}
}
}
/*
dlcs
*/
std::ifstream dlcFile(utils::getExePath() + "dlcs.json");
if (dlcFile.is_open())
{
std::stringstream buff;
buff << dlcFile.rdbuf();
json doc = json::parse(buff.str(), nullptr, false);
if (doc.is_discarded())
Log::error("Failed to parse dlcs.json");
else
{
for (const auto& dlc : doc)
{
if (dlc.contains("grdk")) _dlcListGRDK.insert(dlc["grdk"].get<std::string>());
if (dlc.contains("egs")) _dlcListEGS.insert(dlc["egs"].get<std::string>());
}
}
}
Log::verbose("Finished loading data");
Log::verbose("Items - {} camper", _camperItemIds.size());
@@ -110,6 +151,8 @@ void Spoofer::loadData()
Log::verbose("Perks - {} camper | {} slasher ", _camperPerkIds.size(), _slasherPerkIds.size());
Log::verbose("Catalog - {} outfits | {} items", _catalogOutfitIds.size(), _catalogItemIds.size());
Log::verbose("Characters - {}", _characterList.size());
Log::verbose("DLCs - GRDK {} - EGS: {}", _dlcListGRDK.size(), _dlcListEGS.size());
}
void Spoofer::loadConfig()
@@ -126,6 +169,8 @@ void Spoofer::loadConfig()
configJson.value("spoofCharacterOwnership", _config.spoofCharacterOwnership);
_config.spoofInventory = configJson.value("spoofInventory", _config.spoofInventory);
_config.spoofCustomization = configJson.value("spoofCustomization", _config.spoofCustomization);
_config.accessKey = configJson.value("accessKey", _config.accessKey);
_config.keyId = configJson.value("keyId", _config.keyId);
}
catch (...)
{
@@ -137,13 +182,16 @@ void Spoofer::loadConfig()
Log::info("config.json not found, using default settings");
json defaultConfig = {{"spoofCharacterOwnership", _config.spoofCharacterOwnership},
{"spoofInventory", _config.spoofInventory},
{"spoofCustomization", _config.spoofCustomization}};
{"spoofCustomization", _config.spoofCustomization},
{"accessKey", _config.accessKey},
{"keyId", _config.keyId}};
std::ofstream out(configPath);
out << defaultConfig.dump(4);
}
Log::info("Loaded config: Ownership={}, Inventory={}, Customization={}", _config.spoofCharacterOwnership,
_config.spoofInventory, _config.spoofCustomization);
Log::info("Loaded config: Ownership={}, Inventory={}, Customization={}, AccessKey={}, keyId={}",
_config.spoofCharacterOwnership, _config.spoofInventory, _config.spoofCustomization, _config.accessKey,
_config.keyId);
}
/*
@@ -382,6 +430,28 @@ void Spoofer::modifyCharacterData(json& js)
#endif
}
void Spoofer::onGetAllClient(std::string& body)
{
if (!_config.spoofCharacterOwnership) return;
json doc = json::parse(body, nullptr, false);
if (doc.is_discarded()) return Log::error("JSON parse error for dbd-inventories/all (client)");
if (doc.contains("ownedCharacters") && doc["ownedCharacters"].is_array())
{
auto& jsonList = doc["ownedCharacters"];
for (const std::string& charName : _characterList)
{
if (charName == "K25") continue;
if (std::find(jsonList.begin(), jsonList.end(), charName) == jsonList.end()) jsonList.push_back(charName);
}
body = doc.dump();
}
}
/*
endpoint handlers
*/
@@ -530,6 +600,13 @@ void Spoofer::onMessageList(std::string& body)
#endif
}
void Spoofer::onBloodwebClient(std::string& body)
{
json req = json::parse(body, nullptr, false);
if (req.is_discarded()) return Log::error("JSON parse error for bloodweb request handler");
if (req.contains("characterName")) this->_lastBloodWebChar = req["characterName"];
}
void Spoofer::onBloodweb(std::string& body, std::string& respHeaders)
{
json doc = json::parse(body, nullptr, false);
@@ -605,6 +682,66 @@ void Spoofer::onBloodweb(std::string& body, std::string& respHeaders)
#endif
}
void Spoofer::onUpdateEntitlements(const std::string& url, std::string& body)
{
if (!_config.spoofCharacterOwnership) return;
json js = json::parse(body, nullptr, false);
if (js.is_discarded()) return Log::error("JSON parse error for get-update-entitlements");
if (js.contains("entitlements"))
{
auto& jsonList = js["entitlements"];
std::unordered_set<std::string>* list = nullptr;
if (url.starts_with("https://grdk.live.bhvrdbd.com/"))
list = &_dlcListGRDK;
else if (url.starts_with("https://egs.live.bhvrdbd.com/"))
list = &_dlcListEGS;
else
return Log::error("Invalid url?");
if (list == nullptr) return;
for (const std::string& dlcId : *list)
{
if (std::find(jsonList.begin(), jsonList.end(), dlcId) == jsonList.end()) jsonList.push_back(dlcId);
}
}
body = js.dump();
}
void Spoofer::onUpdateEntitlementsClient(const std::string& url, std::string& body)
{
if (!_config.spoofCharacterOwnership) return;
json js = json::parse(body, nullptr, false);
if (js.is_discarded()) return Log::error("JSON parse error for get-update-entitlements");
if (js.contains("clientEntitlementIds"))
{
auto& jsonList = js["clientEntitlementIds"];
std::unordered_set<std::string>* list = nullptr;
if (url.starts_with("https://grdk.live.bhvrdbd.com/"))
list = &_dlcListGRDK;
else if (url.starts_with("https://egs.live.bhvrdbd.com/"))
list = &_dlcListEGS;
else
return Log::error("Invalid url?");
if (list == nullptr) return;
for (const std::string& dlcId : *list)
{
if (std::find(jsonList.begin(), jsonList.end(), dlcId) == jsonList.end()) jsonList.push_back(dlcId);
}
}
body = js.dump();
}
/*
event handlers
*/
@@ -617,25 +754,29 @@ void Spoofer::serverResponseHandler(const std::string& url, std::string& body, s
Log::verbose("BHVR api res @ {}", url);
#endif
if (url.find("api/v1/dbd-character-data/get-all") != std::string::npos) return onGetAll(body);
if (url.find("api/v1/dbd-character-data/get-all") != std::string::npos) return onGetAll(body);
if (url.find("api/v1/dbd-inventories/all") != std::string::npos) return onInventoryAll(body);
if (url.find("/api/v1/messages/listV2") != std::string::npos) return onMessageList(body);
if (url.find("api/v1/dbd-character-data/bloodweb") != std::string::npos ||
url.find("api/v1/dbd-character-data/bulk-spending-bloodweb") != std::string::npos)
if (url.ends_with("api/v1/dbd-inventories/all")) return onInventoryAll(body);
if (url.find("api/v1/messages/listV2") != std::string::npos) return onMessageList(body);
if (url.ends_with("api/v1/dbd-character-data/get-all")) return onGetAll(body);
if (url.ends_with("api/v1/dbd-character-data/bloodweb") ||
url.ends_with("api/v1/dbd-character-data/bulk-spending-bloodweb"))
return onBloodweb(body, respHeaders);
if (url.ends_with("api/v1/owned-products/get-update-entitlements")) return onUpdateEntitlements(url, body);
}
void Spoofer::clientRequestHandler(std::string& url, const std::string& body, std::string& /*reqHeaders*/)
void Spoofer::clientRequestHandler(const std::string& url, std::string& body, std::string& /*reqHeaders*/)
{
if (url.find("bhvrdbd.com") == std::string::npos) return;
std::lock_guard<std::mutex> lock(_mtx);
if (url.find("api/v1/dbd-character-data/bloodweb") != std::string::npos ||
url.find("api/v1/dbd-character-data/bulk-spending-bloodweb") != std::string::npos)
{
json req = json::parse(body, nullptr, false);
if (req.is_discarded()) return Log::error("JSON parse error for bloodweb request handler");
if (req.contains("characterName")) this->_lastBloodWebChar = req["characterName"];
}
if (url.ends_with("api/v1/dbd-character-data/get-all")) return onGetAllClient(body);
if (url.ends_with("api/v1/dbd-character-data/bloodweb") ||
url.ends_with("api/v1/dbd-character-data/bulk-spending-bloodweb"))
return onBloodwebClient(body);
if (url.ends_with("api/v1/owned-products/get-update-entitlements")) return onUpdateEntitlementsClient(url, body);
}
+15 -1
View File
@@ -9,11 +9,15 @@
#include <nlohmann/json_fwd.hpp>
#include "dbdcrypt.h"
struct SpooferConfig
{
bool spoofCharacterOwnership = false;
bool spoofInventory = true;
bool spoofCustomization = true;
std::string accessKey = ACCESS_KEY;
std::string keyId = KEY_ID;
};
class Spoofer
@@ -40,9 +44,15 @@ class Spoofer
void onInventoryAll(std::string& body);
void onMessageList(std::string& body);
void onBloodweb(std::string& body, std::string& respHeaders);
void onGameConfigs(std::string& body);
void onUpdateEntitlements(const std::string& url, std::string& body);
void onGetAllClient(std::string& body);
void onBloodwebClient(std::string& body);
void onUpdateEntitlementsClient(const std::string& url, std::string& body);
void serverResponseHandler(const std::string& url, std::string& body, std::string& respHeaders);
void clientRequestHandler(std::string& url, const std::string& body, std::string& reqHeaders);
void clientRequestHandler(const std::string& url, std::string& body, std::string& reqHeaders);
SpooferConfig _config;
@@ -62,6 +72,10 @@ class Spoofer
std::unordered_set<std::string> _catalogItemIds;
std::unordered_set<std::string> _unownedCharacters;
std::unordered_set<std::string> _characterList;
std::unordered_set<std::string> _dlcListGRDK;
std::unordered_set<std::string> _dlcListEGS;
std::string _lastBloodWebChar = "";
std::mutex _mtx;
+6
View File
@@ -1,2 +1,8 @@
add_subdirectory(nerutils)
add_subdirectory(json)
set(ZLIB_BUILD_TESTING OFF)
set(ZLIB_BUILD_STATIC ON)
set(ZLIB_BUILD_SHARED OFF)
set(ZLIB_INSTALL OFF)
add_subdirectory(zlib)
Vendored Submodule
+1
Submodule vendor/zlib added at f9dd6009be