-
Corporal
LUAProtectionRemover!
Hi,
same thread as on e*pvp forums:
I want to share with u this little Tool...
This is a simpel LUA Unlocker, not more
Im NOT the Creator off this Tool, he gives me only permission to post projects from him in the community...
Original Author of the Program: Master674
Name of the Program: lua.exe (u can also rename it...)
Description of the program: simple LUA unlocker Run as administrator!( if your UAC is aktiv )
Link of the virus scan: lua.exe - Jottis Malwarescanner
Download link to the program:Filebeam - Beam up that File Scottie!
Mini FAQ!
With this Tool ,u can Unlock Protected LUA Funktions !
U can automate Scripts :
World of Warcraft API/Protected Functions - WoWWiki - Your guide to the World of Warcraft
...or a 1 Button DPS Macro
WoW UI, Macros and Talent Specs
or glitch a little bit
ExploiterMacro :
/dismount
/dump MoveForwardStart(GetTime()*1000 + 1000);
/dump JumpOrAscendStart()
/dump MoveForwardStop(GetTime()*1000 + 2000);
With this macro u mounting down and jump forward @ the same time
I will also keep this post up2date...
Warden Detection Status: Not detected! 08.09.2011
Last edited by Ion78; 09-08-2011 at 02:38 AM.
Reason: Still undetected...
-
Member
-
Member
i need a lua unlocker but not enough positive comments atm...
-
Corporal
Originally Posted by
Nogorn
i need a lua unlocker but not enough positive comments atm...
N1 =D than use it, this Comment from a user with stats like Reputation: 1 ,Join Date Jul 2011 and Posts 7.
think about it ;D
alternativ use this : http://www.jadd-dev.info/
Last edited by Ion78; 09-02-2011 at 06:55 PM.
-
Post Thanks / Like - 1 Thanks
xrendanx (1 members gave Thanks to Ion78 for this useful post)
-
Member
i had annother account i made a few years back.. forgot the info. and im not big into making programs so i cant contribute.. the only think i know is how to use them.
-
Originally Posted by
Nogorn
i need a lua unlocker but not enough positive comments atm...
I reversed it, and it's not a virus. It looks like it'll work, but I haven't tested it.
-
Corporal
so do it, if u need it
u can try it out with a TrialAcc. ,so your mainaccount is not involved...
some scansites and protections flagg this as a Virus...(Trojan.Malware.Win32.xPack.i)
u can ask other members, is it NOT a virus....
Last edited by Ion78; 09-02-2011 at 07:36 PM.
-
Member
-
Member
Won't work for me either is it a virus?
-
Sergeant
run as administrator and it work
Attachment 4687
Last edited by veany; 09-02-2011 at 09:07 PM.
-
Corporal
Originally Posted by
veany
Thanks, post edited
you can also try if it works with the macro from mainpost
-
My Code
Code:
Lua = 0x4B2671, // [4.2.2]
BYTE Lua_write_origin[]={0x8B, 0xEC};
BYTE Lua_write_hack[]={0xEB, 0x76};
This will **** the stack up but it works!
Last edited by DarkLinux; 09-02-2011 at 11:40 PM.
-
Originally Posted by
DarkLinux
This will **** the stack up but it works!
lol u funni
-
I would have never known lols
-
Elite User
Originally Posted by
DarkLinux
My Code
Code:
Lua = 0x4B2671, // [4.2.2]
BYTE Lua_write_origin[]={0x8B, 0xEC};
BYTE Lua_write_hack[]={0xEB, 0x76};
This will **** the stack up but it works!
Im using another memory location
i overwrite an add [eax],al instruction and it works :P
Its just a simple GetModule and WriteProcessMemory function inside it .. should not be detected as false positive by any antivirus prog :P
Also running as admin should not be necessary (just 4 injections but this hack is not injected).
if it fails patching the memory address it should give an error output.. i think i've left something from my exception handler in this shitty tool :P
Last edited by Master674; 09-03-2011 at 04:30 AM.