Difference between revisions of "Vice keys"
Devicenull (talk | contribs) |
(key does not appear to change on CS2) |
||
(13 intermediate revisions by 6 users not shown) | |||
Line 1: | Line 1: | ||
+ | VICE keys are used to encrypt the game's weapon config files in an effort to make them more difficult to tamper with. It's not really a great protection, as usually the key is just hardcoded into the server binaries. Some games, such as Golden Eye Source, try to make it more difficult to retrieve these, but even then it's trivial. | ||
+ | |||
+ | These keys can be used to decrypt the CTX files that many games provide. | ||
+ | |||
{| | {| | ||
− | | Game | + | !width="340"| Game |
− | | Key | + | !width="100"| Key |
|- | |- | ||
− | | Counter-Strike: Source | + | | Contagion |
+ | | fUk0fF69 | ||
+ | |- | ||
+ | | Counter-Strike: Source / Global Offensive / 2 | ||
| d7NSuLq2 | | d7NSuLq2 | ||
|- | |- | ||
Line 12: | Line 19: | ||
| Wl0u5B3F | | Wl0u5B3F | ||
|- | |- | ||
− | | Dystopia | + | | Dystopia (1.2?) |
| pH3apO8w | | pH3apO8w | ||
+ | |- | ||
+ | | Dystopia 1.3 RC2 | ||
+ | | G8stUh3F | ||
|- | |- | ||
| Golden Eye Source | | Golden Eye Source | ||
| Gr3naDes | | Gr3naDes | ||
+ | | | ||
+ | |- | ||
+ | | Half-Life 2: Capture the Flag 2.1 | ||
+ | | R1dj3axP | ||
|- | |- | ||
| Half-Life 2: Deathmatch | | Half-Life 2: Deathmatch | ||
Line 23: | Line 37: | ||
| Insurgency | | Insurgency | ||
| DrA5e3EB | | DrA5e3EB | ||
+ | |- | ||
+ | | Left 4 Dead 2 (VScript .nuc) | ||
+ | | SDhfi878 | ||
+ | |- | ||
+ | | No More Room In Hell | ||
+ | | lREeeapA | ||
+ | |- | ||
+ | | Nuclear Dawn | ||
+ | | TA+*veh9 | ||
|- | |- | ||
| TF2 (items.ctx) | | TF2 (items.ctx) | ||
Line 32: | Line 55: | ||
| ZPS | | ZPS | ||
| 5R0ni0pZ | | 5R0ni0pZ | ||
+ | |- | ||
+ | | Tactical Intervention | ||
+ | | 71B4Dt1Z | ||
|} | |} |
Latest revision as of 16:08, 25 March 2023
VICE keys are used to encrypt the game's weapon config files in an effort to make them more difficult to tamper with. It's not really a great protection, as usually the key is just hardcoded into the server binaries. Some games, such as Golden Eye Source, try to make it more difficult to retrieve these, but even then it's trivial.
These keys can be used to decrypt the CTX files that many games provide.
Game | Key | |
---|---|---|
Contagion | fUk0fF69 | |
Counter-Strike: Source / Global Offensive / 2 | d7NSuLq2 | |
CSPromod | H1aRQ0n1 | |
Day of Defeat: Source | Wl0u5B3F | |
Dystopia (1.2?) | pH3apO8w | |
Dystopia 1.3 RC2 | G8stUh3F | |
Golden Eye Source | Gr3naDes | |
Half-Life 2: Capture the Flag 2.1 | R1dj3axP | |
Half-Life 2: Deathmatch | x9Ke0BY7 | |
Insurgency | DrA5e3EB | |
Left 4 Dead 2 (VScript .nuc) | SDhfi878 | |
No More Room In Hell | lREeeapA | |
Nuclear Dawn | TA+*veh9 | |
TF2 (items.ctx) | A5fSXbf7 | |
TF2 (everything else) | E2NcUkG2 | |
ZPS | 5R0ni0pZ | |
Tactical Intervention | 71B4Dt1Z |