Skip to content

Latest commit

 

History

History
72 lines (54 loc) · 2.08 KB

README.md

File metadata and controls

72 lines (54 loc) · 2.08 KB

Trickster Arts Monolisk reverse engineering

GitHub Tests

Overview

This tool provides a sandbox for researching of the network API of the Monolisk mobile game, originally developed by Trickster Arts

Disclaimer

This project is for research purposes only. All source code is provided as is. I don't condone of exploiting vulnerabilities or cheating in this game, you act at your own risk.

Sandbox

It uses my sandbox-ruby gem

The sandbox consists of the following contexts:

  • dungeon Dungeons list
  • player Managing your profile, avatars, cards, etc
  • query Creating and analyzing queries to the API server
  • script Running your own scripts to interact with the sandbox
  • top Top players

How to run it

Clone the repository to your local machine and prepare the environment:

git clone https://github.com/animotto/ta-monolisk
cd ta-monolisk
bundle install
export RUBYLIB=$PWD/lib

Create a new account and write the credentials to the config named my:

./bin/sandbox -n my

Run the sandbox with the config my:

./bin/sandbox -c my

All config files are in your home directory ~/.ta-monolisk/configs/

Scripting

Script file should be in the scripts directory.

There are two entry points:

# Executed when your script was started
def start
end

# Executed when your script was finished
def finish
end

There are several instance variables you can use inside your script:

  • @shell Sandbox shell
  • @game Game instance
  • @id Job ID
  • @name Script name
  • @args Script arguments passed from the sandbox
  • @logger Logger to write messages to the sandbox

Contributing

Any suggestions are welcome, just open an issue on Github. If you want to contribute to the source code, you can fork this repository and submit a pull request.

License

See the LICENSE file