Eidolon decrypt menu

Shout-Out

User Tag List

Page 1 of 2 12 LastLast
Results 1 to 15 of 29
  1. #1
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Eidolon decrypt

    Code:
    // main.cpp
            PatchDecryptGadget(SDK::Memory::BaseAddress + 0x1A901D); 
            for (uintptr_t address = SDK::Memory::BaseAddress; address < SDK::Memory::EndAddress; address += 0x100) {
                DecryptAddress(address);
            }
    Code:
    // decrypt.hpp
    #pragma  once
    #include  <stdint.h>
    
    extern "C" {
        uint64_t __fastcall DecryptAddress(uint64_t encryptedPtr);
        extern   uint64_t          FindGadget;
    }
    
    inline void PatchDecryptGadget(uintptr_t gadgetVA)
    {
        FindGadget = gadgetVA;
    }
    Code:
    // decrypt.asm
    PUBLIC  DecryptAddress
    PUBLIC  FindGadget
    
    .code
    DecryptAddress PROC
        jmp     qword ptr [FindGadget]
    DecryptAddress ENDP
    
    .data
        ALIGN 8
    FindGadget  dq 0
    END
    Enjoy.

    Just dump with x64 now, or whatever you'd like.
    Last edited by numerbo; 07-14-2025 at 03:54 PM.

    Eidolon decrypt
  2. Thanks std233, Confucius, topkekerino, gdfsxwy, rik.chong, Saze03, w1dl4r, 810810810, Hrap (9 members gave Thanks to numerbo for this useful post)
  3. #2
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    wink )))))))))))))

  4. #3
    std233's Avatar Member
    Reputation
    1
    Join Date
    Dec 2024
    Posts
    2
    Thanks G/R
    2/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    thanks for sharing~
    Last edited by std233; 07-16-2025 at 12:14 AM.

  5. #4
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    61965 it was for the official retail implementation that went up and was removed.


    .text:00000000001A901D mov rax, [rcx]
    .text:00000000001A9020 retn

  6. Thanks air999 (1 members gave Thanks to numerbo for this useful post)
  7. #5
    rik.chong's Avatar Member
    Reputation
    7
    Join Date
    Oct 2009
    Posts
    44
    Thanks G/R
    1/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by numerbo View Post
    Code:
    // main.cpp
            PatchDecryptGadget(SDK::Memory::BaseAddress + 0x1A901D); 
            for (uintptr_t address = SDK::Memory::BaseAddress; address < SDK::Memory::EndAddress; address += 0x100) {
                DecryptAddress(address);
            }
    Code:
    // decrypt.hpp
    #pragma  once
    #include  <stdint.h>
    
    extern "C" {
        uint64_t __fastcall DecryptAddress(uint64_t encryptedPtr);
        extern   uint64_t          FindGadget;
    }
    
    inline void PatchDecryptGadget(uintptr_t gadgetVA)
    {
        FindGadget = gadgetVA;
    }
    Code:
    // decrypt.asm
    PUBLIC  DecryptAddress
    PUBLIC  FindGadget
    
    .code
    DecryptAddress PROC
        jmp     qword ptr [FindGadget]
    DecryptAddress ENDP
    
    .data
        ALIGN 8
    FindGadget  dq 0
    END
    Enjoy.

    Just dump with x64 now, or whatever you'd like.
    I noticed that some expansions are applying the Eidolon protection.
    Can I ask how to run these codes 'internally'? By injecting a dll?

    My previous dll injector (using GitHub - guided-hacking/GuidedHacking-Injector: The BEST DLL Injector Library.) did not work.
    I tried different injection method with no luck.
    In classic expansion the GH-Injector with 'INJECTION_MODE::IM_LdrLoadDll + LAUNCH_METHOD::LM_NtCreateThreadEx' is working perfectly though.

  8. #6
    Saze03's Avatar Member
    Reputation
    3
    Join Date
    Sep 2023
    Posts
    6
    Thanks G/R
    6/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Tyvm still working with current release but different offsett

  9. #7
    ostapus's Avatar Active Member
    Reputation
    60
    Join Date
    Nov 2008
    Posts
    183
    Thanks G/R
    3/10
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Saze03 View Post
    Tyvm still working with current release but different offsett
    mind to share offset for current release ?

    tia

  10. #8
    w1dl4r's Avatar Member
    Reputation
    3
    Join Date
    Aug 2025
    Posts
    5
    Thanks G/R
    3/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by ostapus View Post
    mind to share offset for current release ?

    tia
    There is no point in posting an offset for a 2 instruction pattern that will be relocated on every patch. You just need something like the two instructions numbero posted. Just do a pattern scan.
    The reason for all of this is to dereference a pointer inside wow.exe so eidolon kicks in and decrypts it on the fly.
    Last edited by w1dl4r; 08-28-2025 at 03:28 AM.

  11. Thanks aeo (1 members gave Thanks to w1dl4r for this useful post)
  12. #9
    Saze03's Avatar Member
    Reputation
    3
    Join Date
    Sep 2023
    Posts
    6
    Thanks G/R
    6/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    11.2.0.62801
    0x4C5AA0

  13. #10
    imnothonorbuddy's Avatar Member
    Reputation
    3
    Join Date
    Oct 2023
    Posts
    14
    Thanks G/R
    2/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    62876 0x4C4950
    pattern: 48 8B 01 C3

  14. Thanks thateuler (1 members gave Thanks to imnothonorbuddy for this useful post)
  15. #11
    imnothonorbuddy's Avatar Member
    Reputation
    3
    Join Date
    Oct 2023
    Posts
    14
    Thanks G/R
    2/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    how did you even figure this thing out ? no refereces, nothing to be honest. works like a charm

  16. #12
    w1dl4r's Avatar Member
    Reputation
    3
    Join Date
    Aug 2025
    Posts
    5
    Thanks G/R
    3/2
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    It is known for quite some time. Same as in Overwatch. If you look at the ingame memory you can see how parts of the code get decrypted when they are used and encrypted again when not.

  17. #13
    lidoof's Avatar Member
    Reputation
    1
    Join Date
    Apr 2025
    Posts
    7
    Thanks G/R
    1/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    hello guys, can someone orient me to how to dump the binary, i used to use the namreeb dumper , it is not working anymore, do you guys have some tips, on how to dump or create my own ?

  18. #14
    ring3's Avatar Member
    Reputation
    2
    Join Date
    Nov 2014
    Posts
    17
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    EDIT: nevermind
    Last edited by ring3; 3 Weeks Ago at 10:06 AM.

  19. #15
    thateuler's Avatar Active Member
    Reputation
    31
    Join Date
    May 2019
    Posts
    46
    Thanks G/R
    26/22
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Code:
    0:  48 8b 01                mov    rax,QWORD PTR [rcx]
    3:  c3                      ret
    Thats pretty clever. Kudos to whoever figured that out.

    Any volatile register could be used in place of rax right? I have no idea what the possibility is that this specific pattern can't be found. Probably very unlikely.

    I guess there's several variations on this gadget hey.

    Code:
    0:  80 39 00                cmp    BYTE PTR [rcx],0x0
    3:  c3                      ret
    Last edited by thateuler; 2 Weeks Ago at 02:59 PM.

Page 1 of 2 12 LastLast

Similar Threads

  1. Packet capture/decrypt lib
    By amadmonk in forum WoW Memory Editing
    Replies: 17
    Last Post: 08-14-2009, 04:37 AM
  2. Working POC Decrypt/Encrypt gate
    By amadmonk in forum WoW Memory Editing
    Replies: 1
    Last Post: 06-10-2009, 07:37 PM
  3. LUA Decryption
    By undrgrnd59 in forum WoW UI, Macros and Talent Specs
    Replies: 5
    Last Post: 05-17-2008, 12:54 PM
  4. *Decrypted* Brian Knopps (5/23/07)
    By firezip in forum World of Warcraft Guides
    Replies: 58
    Last Post: 10-19-2007, 10:49 PM
All times are GMT -5. The time now is 01:25 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search