CabConModding
Facebook
Twitter
youtube
Discord
Contact us
RSS
Menu
CabConModding
Home
New
Top
Premium
Rules
FAQ - Frequently Asked Questions
Games
Fornite
Call of Duty: Black Ops 3
Clash of Clans
Grand Theft Auto 5
Apex Legends
Assassin’s Creed Origins
Forums
Premium
Latest posts
What's new
Latest posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Log in
Register
What's new
Premium
Latest posts
Menu
Log in
Register
Navigation
Install the app
Install
More options
Dark Theme
Contact us
Close Menu
Forums
Gaming
Call of Duty Classics
Call of Duty: Modern Warfare 2
Call of Duty: Modern Warfare 2 Mods and Scripts
Call of Duty: Modern Warfare 2 Mods
Call of Duty: Modern Warfare 2 DVAR Tool Steam 1.2.211 +Download
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="TheNigel" data-source="post: 39998" data-attributes="member: 185038"><p>Here is a virus scan of the executable: <a href="https://www.virustotal.com/#/file/17412407dc7581b7d74dc39e6892ab4064cefcdff2a77ec64837c68615b09e93/detection" target="_blank">https://www.virustotal.com/#/file/17412407dc7581b7d74dc39e6892ab4064cefcdff2a77ec64837c68615b09e93/detection</a></p><p>Here is a virus scan of the rar archive: <a href="https://www.virustotal.com/#/file/771223fd9dd846b81b0c0e007670030cef576469913c01129fd323b5f3d79de5/detection" target="_blank">https://www.virustotal.com/#/file/771223fd9dd846b81b0c0e007670030cef576469913c01129fd323b5f3d79de5/detection</a></p><p></p><p>The 4 detections are more than likely from the kernel imports used to extract and load the rpc into the game, if you don't feel safe using my application you are more than welcome to extract the rpc from the app and create your own injector + tool. Nothing is obfuscated or encrypted so it is all open for anyones eyes to see.</p><p></p><p>The rar contains this thread as well as a list of dvars. Credits to whoever released the dvar list, I can't remember where I got it.</p><p></p><p>I was quite shocked to see that no one else had done this yet so here it is. Enjoy <img src="/styles/default/xenforo/smilies.emoji/people/slight_smile.emoji.svg" class="smilie" loading="lazy" alt=":smile:" title="Smile :smile:" data-shortname=":smile:" /></p><p>How to use:</p><p></p><p>Open MW2 and then press load RPC. This will inject my RPC into the game creating a TCP listener on port 1234.</p><p>This listener will listen for commands and execute said commands in the game.</p><p>eg. ui_debugmode, cg_thirdperson or any other dvars you can think of.</p><p>Once you have pressed the load rpc button you will not need to do it again until you restart the game.</p><p></p><p>*warning*</p><p>Changing resolution while the rpc is loaded will crash your game.</p><p></p><p>Example of the tool in use:</p><p><img src="https://i.imgur.com/iw5tTwC.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /> </p><p> </p><p>If you would like to create your own tool you can feel free to do so. After you press LoadRPC, the RPC is stored in the temp folder on your c drive which can be found by typing %temp% into your start menu.</p><p>To execute the commands you will just need to make a tool that sends tcp messages as following;</p><p>The messages are case sensitive.</p><p></p><p>Cbuf: "cmd commandhere"</p><p>Get Int: "getInt commandhere"</p><p>Get Float: "getFloat commandhere"</p><p>Get String: "getString commandhere"</p><p></p><p>Here is an example of how I am doing it.</p><p><img src="https://i.imgur.com/g3xjRW0.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /> </p><p>I may get around to making a lib for this eventually but for now I will just leave it like this.</p><p></p><p>When using get int, float or string the listener will reply to your message with the data you are requesting.</p><p></p><p></p><p>I have been using this tool for many hours while testing without receiving a ban but I will not be held responsible for any VAC bans that are the result of this.</p><p></p><p></p><p>If you have any ideas of anything else like this that you want just send me a message and I will look into it when I have time</p></blockquote><p></p>
[QUOTE="TheNigel, post: 39998, member: 185038"] Here is a virus scan of the executable: [URL]https://www.virustotal.com/#/file/17412407dc7581b7d74dc39e6892ab4064cefcdff2a77ec64837c68615b09e93/detection[/URL] Here is a virus scan of the rar archive: [URL]https://www.virustotal.com/#/file/771223fd9dd846b81b0c0e007670030cef576469913c01129fd323b5f3d79de5/detection[/URL] The 4 detections are more than likely from the kernel imports used to extract and load the rpc into the game, if you don't feel safe using my application you are more than welcome to extract the rpc from the app and create your own injector + tool. Nothing is obfuscated or encrypted so it is all open for anyones eyes to see. The rar contains this thread as well as a list of dvars. Credits to whoever released the dvar list, I can't remember where I got it. I was quite shocked to see that no one else had done this yet so here it is. Enjoy :) How to use: Open MW2 and then press load RPC. This will inject my RPC into the game creating a TCP listener on port 1234. This listener will listen for commands and execute said commands in the game. eg. ui_debugmode, cg_thirdperson or any other dvars you can think of. Once you have pressed the load rpc button you will not need to do it again until you restart the game. *warning* Changing resolution while the rpc is loaded will crash your game. Example of the tool in use: [IMG]https://i.imgur.com/iw5tTwC.jpg[/IMG] If you would like to create your own tool you can feel free to do so. After you press LoadRPC, the RPC is stored in the temp folder on your c drive which can be found by typing %temp% into your start menu. To execute the commands you will just need to make a tool that sends tcp messages as following; The messages are case sensitive. Cbuf: "cmd commandhere" Get Int: "getInt commandhere" Get Float: "getFloat commandhere" Get String: "getString commandhere" Here is an example of how I am doing it. [IMG]https://i.imgur.com/g3xjRW0.png[/IMG] I may get around to making a lib for this eventually but for now I will just leave it like this. When using get int, float or string the listener will reply to your message with the data you are requesting. I have been using this tool for many hours while testing without receiving a ban but I will not be held responsible for any VAC bans that are the result of this. If you have any ideas of anything else like this that you want just send me a message and I will look into it when I have time [/QUOTE]
Verification
Post reply
Forums
Gaming
Call of Duty Classics
Call of Duty: Modern Warfare 2
Call of Duty: Modern Warfare 2 Mods and Scripts
Call of Duty: Modern Warfare 2 Mods
Call of Duty: Modern Warfare 2 DVAR Tool Steam 1.2.211 +Download
CabConModding is now on facebook! Check the latest Updates, the Site Status and much more now!
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top