玩家秀去除UI
cl_drawhud 0 //这条指令会隐藏所有的HUD(头部显示器)元素,包括血量、弹药、雷达等。
r_drawviewmodel 0 //隐藏武器模型:
绿幕指令
ent_fire post_processing_volume Kill;
ent_fire env_gradient_fog Kill;
ent_fire env_cubemap_fog Kill;
ent_create env_gradient_fog {"heightfog" "false" "clientSideEntity" "1" "fogend" "1" "fogstart" "0" "fogmaxopacity" "1" "fogstrength" "1" "fogcolor" "0 255 0"};
r_drawpanorama 0
其他常用
整活无线电
playerchatwheel CW.IFixBomb "从武器箱中获得了:蝴蝶刀(★) | 伽马多普勒"
sv_cheats 1 //开启作弊
r_fullscreen_gamma 2.6 //画面亮度调整,默认2.2越高越暗
bind "mwheeldown" +jump //滚轮下跳
cl_showpos //显示速度
bind "n" "toggle voice_modenable 0 1"//残局静音队友(一键开启关闭)
+turnright(原地顺时针转圈)
cl_sniper_scope_shader_enabled//鱼眼镜头
一键跳投CFG(需要跑图模式开启作弊指令)
cl_allow_multi_input_binds 1
alias "+jumpaction" "+jump;"
alias "+throwaction" "-attack; -attack2"
alias "-jumpaction" "-jump"
bind v "+jumpaction;+throwaction;"
alias "+runthrow" "+forward;+jump;"
alias "-runthrow" "-jump;-forward"
bind h "+runthrow;+throwaction"
//(V键跳投、H键前进跳投。可更改为任意按键。)
空格蹲跳(大跳)
cl_allow_multi_input_binds 1
alias +DJUMP "+jump; +duck"
alias -DJUMP "-JUMP; -DUCK"
bind space "+DJUMP"
查看已经绑定的键位输入
key_listboundkeys //查看已经绑定的键位
unbind //解绑
bind绑定键位对应代码如下,
扩散准星预估实用射程范围
cl_crosshairstyle 2;weapon_debug_spread_show 1
切换枪械旧模型指令
ent_fire weapon_* setbodygroup body,1
调整队友名字透明度
cl_teamid_overhead_fade_near_crosshair
禁用闪光弹耳鸣音效,在游戏主菜单时输入
snd_remove_soundevent Flashbang.Ring.Short;
snd_remove_soundevent Flashbang.Ring.Long;
snd_remove_soundevent Flashbang.Ring.Medium
一键保存位置&一键传送
bind “F2” “getpos | bind “F1”;say “•position 1 saved””
bind “F4” “getpos 2 | bind “F3”;say “•position 2 saved””
F2/F4保存位置,F1/F3传送到对应位置
只用一组的话推荐绑到右alt/ctrl上(RALT RCTRL)
getpos 2=getpos_exact,相比getpos,传送时不会悬空
显示谁用了探员皮肤
cl_show_equipped_character_for_player_avatars
测试hitbox:bot_mimic;ent_hitbox
在主界面内让探员手持道具
ui_vanitysetting_loadoutslot_t equipment1 //防弹衣+头盔进攻方
ui_vanitysetting_loadoutslot_ct equipment1 //防弹衣+头盔防守方
ui_vanitysetting_loadoutslot_t equipment2 //电击枪进攻方
ui_vanitysetting_loadoutslot_ct equipment2 //电击枪防守方
ui_vanitysetting_loadoutslot_ct equipment3 //拆弹器防守方
微信扫描下方的二维码阅读本文
发表回复