WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Source [Release] NosTale PacketLogger — Qt/PolyHook Base with TCP Server

byte_corvus

Newbie
Newbie
Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
677
Reaction score
457
Anyone still digging into NosTale knows the struggle with old, broken loggers that don't save filters or crash when things get spicy. I found a solid build that actually holds up, built on the Qt framework and PolyHook 2.0.

This isn't just a basic logger—it includes a TCP server feature that essentially acts as a proxy, allowing you to hook up external scripts in Python, AutoIt, or whatever language you prefer to manipulate game traffic in real-time.

Core Features
  1. Full Send/Recv packet logging with mouse-over inspection.
  2. Persistent filtering—no more re-entering your ignore list every time you restart.
  3. Integrated TCP Server: Communicate with the client from external apps.
  4. Pattern-based hooks for better stability across different game versions (including Vendetta).

Technical Breakdown for Developers
The TCP Proxy Logic
Small TCP server running inside the logger allows you to connect as many clients as you want. All packets follow the standard NosTale space-splitted format. The first byte defines the direction: 0 for receive, 1 for send.

Code:
// Logical structure for external handling
packet = receiveFromPacketLogger();
splitted = split(packet, ' ');
type = splitted[0]; // 0 = Recv, 1 = Send
header = splitted[1];

// Sending back to manipulate traffic
sendPacket = "1 walk 22 33 1";
sendToPacketLogger(sendPacket);

If you're automating your setup, use this to grab the active logger ports from the process:
Code:
from typing import List
from psutil import process_iter, AccessDenied, Process

def get_nostale_packet_logger_ports() -> List[int]:
    processes = [p for p in process_iter() if "NostaleClientX.exe" in p.name()]
    ports = []
    for process in processes:
        for connection in process.connections():
            if connection.laddr and connection.laddr.ip == "127.0.0.1":
                ports.append(connection.laddr.port)
    return ports

Setup & Deployment
  1. Drop all files from the PacketLogger archive directly into your NosTale directory.
  2. Inject PacketLogger.dll using your preferred method.
  3. If you hit injection errors, make sure your VC Redists are updated and Secure Boot is handled if your injector requires it.

Reversing & Source Notes
Found the build repository on GitLab -
You cant view this link please login.

It utilizes PolyHook 2.0 for the internal detours and Qt for the UI. If you plan to compile this yourself, you'll need the Qt environment set up correctly—don't expect a hand-holding guide for that, just use Google.

- Fixed pattern of recv function and encoding issues.
- Added TCP Server for cross-process communication.
- Updated patterns for private server compatibility (Vendetta).
- Fixed pointers and UI marking for selected packets.

Note: Since this relies on internal hooks, always test on a burner account first. While it's more stable than older pastes, any DLL injection carries a risk depending on the current state of the AC.

Anyone got a working structure dump for the latest packets?
 
Top