The "Custom-MPT" floating around scene forums (often signed off with the tag -superRubens- ) was not an official release. It was a reverse-engineered plugin file. SuperRubens—likely a German or Nordic coder based on linguistic traces in older NFO files—realized that by modifying the MediaProtocolTracker.dll , you could inject custom regex strings to catch streams that RMC was ignoring (like early HLS encryption or obscure Shoutcast metadata).
But here is where it gets interesting: A simple crack wasn't enough. Users realized that while the patch removed the timer, the protocol filters were still outdated. MPT stands for Media Protocol Tracker . Think of it as the translator. Without an MPT, RMC sees a stream as gibberish. The "Custom-MPT" floating around scene forums (often signed
To the uninitiated, this looks like a typical crack scene release. But to digital archaeologists, it represents the final golden era of the "stream sniffer"—software that didn't just record your screen, but actually tricked the internet into giving it the original file. Unlike modern screen-recording bloatware, Replay Media Catcher (RMC) acted like a man-in-the-middle. It installed a virtual network adapter or tapped into your system's Winsock (the Windows networking API). When you played a video in your browser, RMC didn't "see" pixels; it saw the raw segments —the .ts , .flv , or .mp4 chunks. But here is where it gets interesting: A