Jump to content

gamingmagic

Members
  • Posts

    19
  • Joined

  • Last visited

  • Days Won

    5

gamingmagic last won the day on September 9 2024

gamingmagic had the most liked content!

1 Follower

Profile Information

  • Gender
    Not Telling
  • Location
    Singapore
  • Server
    Elves
  • Github: None

Contact Methods

Recent Profile Visitors

5551 profile views

gamingmagic's Achievements

Poporing

Poporing (4/15)

  • Collaborator
  • Reacting Well
  • First Post
  • Conversation Starter
  • Dedicated

Recent Badges

21

Reputation

  1. View File Trade Log Fluxcp Addons TradeLog FluxCP Addons Easily find character trades by searching using character name, item ID, item unique ID, or date. Submitter gamingmagic Submitted 08/07/24 Category FluxCP Addons Video Content Author gamingmagic  
  2. View File Sonic Blow and Arrow Vulcan v3.patch for 2018/12/19 Up Client thanks to ckx_, syon, gidz, sadre Submitter gamingmagic Submitted 08/06/24 Category Source Modifications Video Content Author Gamingmagic  
  3. Added: Arrow Vulcan, skill_animation.txt, Monster Facing Please adjust the facing for the monster rotation of the Sonic Blow skill. +// Directions for animation steps; assuming 0 = right, 3 = down, 6 = left, and 9 = up +int get_direction_for_step(int step) { + // Adjust according to your coordinate system + switch (step) { + case 1: return 0; // Right + case 2: return 3; // Down + case 3: return 6; // Left + case 4: return 9; // Up + case 5: return 12; // Right + case 6: return 3; // Down + case 7: return 6; // Left + case 8: return 9; // Up + default: return 0; // Default direction if step is invalid + } +} Video_2024_08_04-7_edit_0 (1).webm Video_2024_08_04-5_edit_0.webm sonic blow v3.patch
  4. Version 1.0.0

    153 downloads

    TradeLog FluxCP Addons Easily find character trades by searching using character name, item ID, item unique ID, or date.
    Free
  5. Version 1.0.0

    296 downloads

    thanks to ckx_, syon, gidz, sadre Video_2024_08_04-5_edit_0.webm
    Free
  6. Please apply the same adjustments I made for Sonic Blow to any skill, including adjusting the delay. thank you for feedback about rotating 360 is this fine? Video_2024_08_04-1_edit_0.webm
  7. I managed to convert Herc to rathena and I'm not selling it myself. However, since some people are reselling it, I've decided to make it public. SonicBlow.diff
  8. I managed to convert it and I'm not selling it myself. However, since some people are reselling it, I've decided to make it public.
  9. Yeah even python is possible. If you say something, you better share the code. import socket import threading # Configuration for login-server LOGIN_SERVER_PROXY_HOST = '45.118.132.189' LOGIN_SERVER_PROXY_PORT = 6050 LOGIN_SERVER_TARGET_HOST = 'xx.xx.xx.xx' LOGIN_SERVER_TARGET_PORT = 6050 # Configuration for char-server CHAR_SERVER_PROXY_HOST = '45.118.132.189' CHAR_SERVER_PROXY_PORT = 6051 CHAR_SERVER_TARGET_HOST = 'xx.xx.xx.xx' CHAR_SERVER_TARGET_PORT = 6051 # Configuration for map-server MAP_SERVER_PROXY_HOST = '45.118.132.189' MAP_SERVER_PROXY_PORT = 6052 MAP_SERVER_TARGET_HOST = 'xx.xx.xx.xx' MAP_SERVER_TARGET_PORT = 6052 # Forward traffic between source and destination sockets def forward_traffic(source_socket, destination_socket): while True: data = source_socket.recv(4096) if len(data) == 0: break destination_socket.sendall(data) # Main proxy server loop def proxy_server(proxy_host, proxy_port, target_host, target_port): proxy_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) proxy_socket.bind((proxy_host, proxy_port)) proxy_socket.listen(5) print(f"Proxy server is listening on {proxy_host}:{proxy_port}") while True: client_socket, addr = proxy_socket.accept() client_ip = addr[0] print(f"Accepted connection from {client_ip}:{addr[1]}") # Start a new thread to handle the client client_thread = threading.Thread(target=handle_client, args=(client_socket, client_ip, target_host, target_port)) client_thread.start() # Handle client requests def handle_client(client_socket, client_ip, target_host, target_port): # Connect to the target server target_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) target_socket.connect((target_host, target_port)) # Forward client IP to the target server target_socket.sendall(client_ip.encode()) # Forward traffic between client and target server client_to_target_thread = threading.Thread(target=forward_traffic, args=(client_socket, target_socket)) target_to_client_thread = threading.Thread(target=forward_traffic, args=(target_socket, client_socket)) client_to_target_thread.start() target_to_client_thread.start() # Wait for the threads to complete client_to_target_thread.join() target_to_client_thread.join() # Close the sockets client_socket.close() target_socket.close() # Start the proxy servers def start_proxy_servers(): # Start login-server proxy login_server_thread = threading.Thread(target=proxy_server, args=(LOGIN_SERVER_PROXY_HOST, LOGIN_SERVER_PROXY_PORT, LOGIN_SERVER_TARGET_HOST, LOGIN_SERVER_TARGET_PORT)) login_server_thread.start() # Start char-server proxy char_server_thread = threading.Thread(target=proxy_server, args=(CHAR_SERVER_PROXY_HOST, CHAR_SERVER_PROXY_PORT, CHAR_SERVER_TARGET_HOST, CHAR_SERVER_TARGET_PORT)) char_server_thread.start() # Start map-server proxy map_server_thread = threading.Thread(target=proxy_server, args=(MAP_SERVER_PROXY_HOST, MAP_SERVER_PROXY_PORT, MAP_SERVER_TARGET_HOST, MAP_SERVER_TARGET_PORT
  10. HI I ALWAYS FORGOT THE CONFIGURATION AND ALWAYS NEED TO CONVERT WITH IPTABLES THE GUIDE IN RATHENA. IN THIS REGARDS I JUST WANNA SHARE SO WHEN I GOOGLE IT I WILL NOT FORGET ABOUT IT. sysctl net.ipv4.ip_forward=1 iptables -t nat -A POSTROUTING -j MASQUERADE iptables -t nat -A PREROUTING -p tcp --dport 6121 -j DNAT --to-destination XXX.XXX.XXX.XXX:6121 iptables -t nat -A PREROUTING -p tcp --dport 5121 -j DNAT --to-destination XXX.XXX.XXX.XXX:5121 iptables -t nat -A PREROUTING -p tcp --dport 6900 -j DNAT --to-destination XXX.XXX.XXX.XXX:6900 iptables-save > /etc/iptables_rules iptables-save > /etc/iptables_rules iptables -A INPUT -p tcp --dport 6900 -m state --state NEW -j ACCEPT iptables -A INPUT -p tcp --dport 6121 -m state --state NEW -j ACCEPT iptables -A INPUT -p tcp --dport 5121 -m state --state NEW -j ACCEPT iptables -A INPUT -p udp --dport 6900 -m state --state NEW -j ACCEPT iptables -A INPUT -p udp --dport 6121 -m state --state NEW -j ACCEPT iptables -A INPUT -p udp --dport 5121 -m state --state NEW -j ACCEPT
  11. there is no error log right? even for typo. ?
  12. add this to sql ALTER TABLE `vendings` ADD COLUMN `extended_vending_item` int(10) unsigned NOT NULL DEFAULT '0' AFTER `sit`;
  13. #define itemdb_ename(n) itemdb_search(n)->ename.c_str() check that line revise it. dont use jname
  14. its not yml sucks. they change jname to ename #define itemdb_ename(n) itemdb_search(n)->ename.c_str()
×
×
  • Create New...