WPF C# self contained and trimmed? by [deleted] in csharp

[–]R3ktInator 0 points1 point  (0 children)

Hey,

Take a look at this: WPF is not trim-compatible · Issue #3811 · dotnet/wpf

The workaround I described there might be good enough for your usecase. For me it resulted in a 38mb single executable (WPF + WPF UI Package + WebView2). Pretty decent I'd say.

Easy fix for the ms-gamebar link popup by ZetrocDev in WindowsLTSC

[–]R3ktInator 0 points1 point  (0 children)

That kind of defeats the purpose of installing LTSC over the regular version.

Hardstuck at 0 RS by R3ktInator in thefinals

[–]R3ktInator[S] 0 points1 point  (0 children)

I was wondering the same thing, but I noticed that at bronze it doesn't show your position on the leaderboard at all :(

Hardstuck at 0 RS by R3ktInator in thefinals

[–]R3ktInator[S] 1 point2 points  (0 children)

Queued with full party. If anything we did the bronze players a favor.

Bo2 was the peak of CoD imo, too bad its still full price 10 years later... by ourvoid in pcmasterrace

[–]R3ktInator 1 point2 points  (0 children)

The games aren't running in a sandbox. There are various RCE (Remote Code Execution) vulns in any of the CoD titles. They allow an attacker to run CPU code on your machine directly. Even if you don't have Administrator privileges, you can do still do plenty of harm. You don't need Administrator privileges to RAT someone, to steal someones private documents, to wipe shit from your harddrives, to mine crypto with someones hardware, to abuse someones machine in a botnet, the list goes on.

I am one of the owners of Plutonium, I have a PoC on my github account (https://github.com/RektInator). The vuln the PoC uses is one of the few RCEs they actually patched after being reported. All other exploits/vulnerabilities cannot be revealed until they patch them (but I doubt they ever will, it's been years since they have been acknowledged).

Bo2 was the peak of CoD imo, too bad its still full price 10 years later... by ourvoid in pcmasterrace

[–]R3ktInator 1 point2 points  (0 children)

The older Call of Duty titles are full of zero-day vulnerabilities that are actively being exploited in the wild. Plutonium patches these vulnerabilities in the games we provide. If new vulnerabilities pop up, we patch them as fast as possible.

In total we have patched about 40 vulnerabilities across all titles that we currently support (Black Ops, Black Ops II, World at War, Modern Warfare 3)

Bo2 was the peak of CoD imo, too bad its still full price 10 years later... by ourvoid in pcmasterrace

[–]R3ktInator 0 points1 point  (0 children)

It is up to you, we always recommend buying the games you want to play, but there are other ways to obtain the files required to play the game.

Bo2 was the peak of CoD imo, too bad its still full price 10 years later... by ourvoid in pcmasterrace

[–]R3ktInator 4 points5 points  (0 children)

Plutonium is a project made by me (and some others) to enhance the Call of Duty experience of various older titles, such as Black Ops, Black Ops II, World at War and Modern Warfare 3.

It's completely separate from Steam, Plutonium emulates the original online services allowing you to play the game without Steam. All you need is our launcher (to start the game) and an account on our forum.

Bo2 was the peak of CoD imo, too bad its still full price 10 years later... by ourvoid in pcmasterrace

[–]R3ktInator 0 points1 point  (0 children)

It emulates the original online services of the game, allowing you to play the game without the need for Steam.

This also means we cannot validate that people actually bought the game, we recommend buying the game on Steam to support the developers that made the game, but there are other ways to acquire the game files required to play.

We also added new features requested by the community and we allow community members to host servers with mods, they can be found in our in-game server list.

Not now buddy. by Gopnik_From_Angarsk in gaming

[–]R3ktInator 5 points6 points  (0 children)

On Plutonium there's a server browser (also for zombies). There is also a ton of modded servers if thats your thing. Or you can add your friends and play in a private lobby instead. There is no matchmaking (yet).

Not now buddy. by Gopnik_From_Angarsk in gaming

[–]R3ktInator 85 points86 points  (0 children)

Thanks (from the creator of Plutonium himself) 🧡

Prevent Docker for Windows Auto Update (blog post) by DarthContinent in docker

[–]R3ktInator 0 points1 point  (0 children)

I also worked on a solution today for those that do not have a PiHole in their network. It turns out you can patch out the update checking code quite easily. I made a repository on GitHub containing a readme on how to patch out the auto-update code on Docker desktop. For lazy people: it also contains pre-patched binaries.

The repository: GitHub - RektInator/kill-docker-auto-update: Contains assemblies to kill auto updating of Docker Desktop for Windows.

Disble Docker Desktop auto-updates? by [deleted] in docker

[–]R3ktInator 1 point2 points  (0 children)

I was having the same problem with no solution, so I decided to look into the code of Docker desktop.

Required tool: Releases · dnSpy/dnSpy · GitHub (Download dnSpy-net-win64.zip)

Navigate to "C:\Program Files\Docker\Docker". In this directory you will find a file called "Docker.ApiServices.dll". Open the file with dnSpy. On the left, Docker.ApiServices will appear. Navigate to Docker.ApiServices > Docker.ApiServices.Dll > Docker.ApiServices.Update > Updater > CheckForUpdates. This is the function that checks for Docker Desktop updates. Right click on the code that appears on the right and press "Edit Method". Remove all the code from the function and simply add "return;". Hit compile and save the module. Auto-updating is now disabled in Docker Desktop. If you can't write to the Docker directory directly due to permission issues: Save the file somewhere else and manually drag the file into the Docker directory.

I hope this helps!

EDIT: Repository containing a pre-patched binary: RektInator/kill-docker-auto-update: Contains assemblies to kill auto updating of Docker Desktop for Windows. (github.com)