It's pointless using an application to do this considering it can be done using php and/or javascript lmao. The exploit was patched by most people ages ago.
If you still have it then just delete the code out of the rev password reset function.
if ($handle = opendir('../app/tpl/skins/Habbo/images/web_promo'))
I assume it's trying to get /ase/app/tpl/skins/Habbo/images/web_promo, so just add the ../ infront and try that.
if the code is on the same page as the form delete action="area.php" and put:
<?php
if(isset($_POST['username']) && isset($_POST['password']))
{
//Put the code I gave you here
}
?>
Good luck but for future reference remember this:
You're using un-needed functions for grabbing things by the looks of it, which reduces page speed.
if($templateMapper->verifyExistance($page_name)) {
$templateMapper->loadPage($page_name);
}
I assume "verifyExistance" contains...
New emu download link posted, didn't fully test it but the shitty errors should be gone and all project files are there so you should now be able to edit the code properly. Sorry for the wait, this isn't priority
<?php
require_once 'global.php';
$getdata = mysql_query("SELECT `users_online` FROM `server_status`");
$data = mysql_fetch_assoc($getdata);
echo '<font color=" #78AB46">Online Status:</font> There are currently <b>'.$data['users_online'].'</b> members online! ';
?>