Eidolon decrypt menu

Shout-Out

User Tag List

Page 2 of 2 FirstFirst 12
Results 16 to 29 of 29
  1. #16
    Hrap's Avatar Active Member
    Reputation
    17
    Join Date
    Oct 2018
    Posts
    135
    Thanks G/R
    18/8
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Hi guys, as I understand it, the fact that I can no longer read code from an external program in Pandaria Classic is also related to Eidolon and the only solution at the moment is the above code using code injection?


    Is it possible to implement something similar from an external program?
    Last edited by Hrap; 2 Weeks Ago at 01:51 PM.

    Eidolon decrypt
  2. #17
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Hrap View Post
    Hi guys, as I understand it, the fact that I can no longer read code from an external program in Pandaria Classic is also related to Eidolon and the only solution at the moment is the above code using code injection?


    Is it possible to implement something similar from an external program?
    The game will decrypt itself from a few different ways, for example if you were to use the games imported memcpy it would have the same affect - or there's a ton of memcpy adjacent library functions, functions that just read or write arbitrary memory. It's possible to have similar affects externally but what is the point. Just manually map a dll and use a proper spoof call that doesn't break stack unwinding and they won't really see or care about you unless you give them a reason to and you'll bypass all the eidolon runtime garbage by acting like you're part of the game.

  3. Thanks InnerSilence (1 members gave Thanks to numerbo for this useful post)
  4. #18
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by thateuler View Post
    Code:
    0:  48 8b 01                mov    rax,QWORD PTR [rcx]
    3:  c3                      ret
    Thats pretty clever. Kudos to whoever figured that out.

    Any volatile register could be used in place of rax right? I have no idea what the possibility is that this specific pattern can't be found. Probably very unlikely.

    I guess there's several variations on this gadget hey.

    Code:
    0:  80 39 00                cmp    BYTE PTR [rcx],0x0
    3:  c3                      ret
    any code that causes a dereference will trigger this, you just have to get the address into the registrar. They probably eventually will walk the stack backwards or add trap pages but you should only use this code to get a decrypted binary and not rely on it to handle your full bypass stack.

  5. #19
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by lidoof View Post
    hello guys, can someone orient me to how to dump the binary, i used to use the namreeb dumper , it is not working anymore, do you guys have some tips, on how to dump or create my own ?
    just decrypt and use x64dbg

  6. #20
    Hrap's Avatar Active Member
    Reputation
    17
    Join Date
    Oct 2018
    Posts
    135
    Thanks G/R
    18/8
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by numerbo View Post
    The game will decrypt itself from a few different ways, for example if you were to use the games imported memcpy it would have the same affect - or there's a ton of memcpy adjacent library functions, functions that just read or write arbitrary memory. It's possible to have similar affects externally but what is the point. Just manually map a dll and use a proper spoof call that doesn't break stack unwinding and they won't really see or care about you unless you give them a reason to and you'll bypass all the eidolon runtime garbage by acting like you're part of the game.
    Could you please help me with this and suggest an implementation? I've been using external programs for years and now everything's broken. The last time I tried using DLL injections, I got banned.

    I'm afraid the same thing will happen this time, and I won't have enough accounts to get a proper implementation.)


    You're writing about a fake call. Could you explain this in more detail?
    Last edited by Hrap; 2 Weeks Ago at 02:47 PM.

  7. #21
    Hrap's Avatar Active Member
    Reputation
    17
    Join Date
    Oct 2018
    Posts
    135
    Thanks G/R
    18/8
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Sorry for the noob question but
    What do you mean by manually connecting the library What do you mean by manually connecting a library and how is manual connection different from regular connection?

  8. #22
    InnerSilence's Avatar Active Member
    Reputation
    40
    Join Date
    Oct 2019
    Posts
    74
    Thanks G/R
    15/24
    Trade Feedback
    0 (0%)
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Hrap View Post
    Sorry for the noob question but
    What do you mean by manually connecting the library What do you mean by manually connecting a library and how is manual connection different from regular connection?
    Are you translating the text? He mentioned manual mapping not connecting. It is a technique regarding injecting a Dll into the target process. It doesn't easily solve your problem tho, since you said you are external. The player object is also no longer part of the object manager entity list as far as I can say and obtaining a reference to it requires more effort. They can do it with other objects too. Well, this new protection so far seems more effective against the external tools while 99% of bots out there are using unlockers anyway so seems they did it because it seemed cool

  9. #23
    Hrap's Avatar Active Member
    Reputation
    17
    Join Date
    Oct 2018
    Posts
    135
    Thanks G/R
    18/8
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Heh, I'll have to adapt the bot for use with the unlocker. one while I look for a working way to inject the DLL. I'm trying nt-mapper from a related thread, and the DLL seems to load, but the code isn't executing.

    Does anyone know of a working injector?

    I would be very grateful for any hint or advice
    Last edited by Hrap; 2 Weeks Ago at 01:54 PM.

  10. #24
    InnerSilence's Avatar Active Member
    Reputation
    40
    Join Date
    Oct 2019
    Posts
    74
    Thanks G/R
    15/24
    Trade Feedback
    0 (0%)
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by InnerSilence View Post
    Are you translating the text? He mentioned manual mapping not connecting. It is a technique regarding injecting a Dll into the target process. It doesn't easily solve your problem tho, since you said you are external. The player object is also no longer part of the object manager entity list as far as I can say and obtaining a reference to it requires more effort. They can do it with other objects too. Well, this new protection so far seems more effective against the external tools while 99% of bots out there are using unlockers anyway so seems they did it because it seemed cool
    I just want to correct myself. Player object is indeed in the entity list. No manual mapping or injection is needed for an external tool.

  11. #25
    Hrap's Avatar Active Member
    Reputation
    17
    Join Date
    Oct 2018
    Posts
    135
    Thanks G/R
    18/8
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by InnerSilence View Post
    I just want to correct myself. Player object is indeed in the entity list. No manual mapping or injection is needed for an external tool.

    But the program I used to search for templates no longer works, although everything worked before the recent update and ReClass now reads empty memory at the base address of the process
    How can I now read memory from an external application, what has changed?

  12. #26
    InnerSilence's Avatar Active Member
    Reputation
    40
    Join Date
    Oct 2019
    Posts
    74
    Thanks G/R
    15/24
    Trade Feedback
    0 (0%)
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Hrap View Post
    But the program I used to search for templates no longer works, although everything worked before the recent update and ReClass now reads empty memory at the base address of the process
    How can I now read memory from an external application, what has changed?
    As I said it's possible, but not as easy as before. You must make sure the memory page is loaded before trying to use your tool to find offsets. Using the same technique discussed in this topic. You can as well use an unlocker and save the headache and do the fun stuff.

  13. #27
    Hrap's Avatar Active Member
    Reputation
    17
    Join Date
    Oct 2018
    Posts
    135
    Thanks G/R
    18/8
    Trade Feedback
    0 (0%)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by InnerSilence View Post
    As I said it's possible, but not as easy as before. You must make sure the memory page is loaded before trying to use your tool to find offsets. Using the same technique discussed in this topic. You can as well use an unlocker and save the headache and do the fun stuff.
    As I understand it, in order to use the method from this topic, I need to execute the code translated here from inside wow to decrypt the memory, right?

  14. #28
    numerbo's Avatar Active Member
    Reputation
    78
    Join Date
    Nov 2024
    Posts
    31
    Thanks G/R
    1/15
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Hrap View Post
    But the program I used to search for templates no longer works, although everything worked before the recent update and ReClass now reads empty memory at the base address of the process
    How can I now read memory from an external application, what has changed?
    Cheat engine just works fine for me and its structure tools are way better.

    Not seeing anything that’s inherently blocking memory access externally from any blizzard game. Wouldn’t use it for your cheat tho.

    Use thread hijacking if you don’t know how to reverse and you’ll be alright.

    Warden is still UM just don’t be dumb and you can hook things intelligently. Watch sys calls to gain insight.

    It’s legitimately not that bad unless you sell and are targeted but if youre targeted it doesn’t matter what you do basically they’ll eventually win.

    Use themida or another software for unique builds and it substantially reduces your chances of being fully waved — this is how basically everyone is avoiding warden outside of privileged information nobody will share here. For privates it’s enough.
    Last edited by numerbo; 1 Week Ago at 11:39 AM.

  15. #29
    j872's Avatar Member
    Reputation
    1
    Join Date
    May 2023
    Posts
    2
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    0x4C4F90 correct offset for 63660?
    Last edited by j872; 4 Days Ago at 04:45 AM.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. Packet capture/decrypt lib
    By amadmonk in forum WoW Memory Editing
    Replies: 17
    Last Post: 08-14-2009, 04:37 AM
  2. Working POC Decrypt/Encrypt gate
    By amadmonk in forum WoW Memory Editing
    Replies: 1
    Last Post: 06-10-2009, 07:37 PM
  3. LUA Decryption
    By undrgrnd59 in forum WoW UI, Macros and Talent Specs
    Replies: 5
    Last Post: 05-17-2008, 12:54 PM
  4. *Decrypted* Brian Knopps (5/23/07)
    By firezip in forum World of Warcraft Guides
    Replies: 58
    Last Post: 10-19-2007, 10:49 PM
All times are GMT -5. The time now is 03:32 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search