fixed gramar
This commit is contained in:
parent
6a8a200fae
commit
dd36c535a7
|
@ -10,7 +10,7 @@
|
|||
[Maintained open source menu based on human menu](https://github.com/sinfail/Windbreaker)
|
||||
## The story
|
||||
#### read the story and watch the proofs before telling me that im lying and deciding which side is right.
|
||||
The Ethereal team falsely accused me of ratting people after a reseller of them got ratted and his keys got leaked to the public. At the beginning i tried to talk to Jaguar(Admin at Ethereal) peacefully but he didnt believe me and kept trash talking so I had enough of it. I cracked the menu in around 2 hours of work. The auth of them is basically a function which returns a bool which is highly virtualised and mutated. VMProtect and its sdk is used for the main protection. There are two methods of cracking it: One by returning true in the part where the Macro of VMP in the source is placed(which was found by timiostimio and is the method used in this source because its easier to use and stabler) or by setting the rax register to 1 before the original return after the vm.(which is shown in the et.1337 x64dbg patchfile) But lets continue with the story: After i released the crack Jaguar started shittalking me again and released an announcement where he tried to save his ass by saying that the crack is outdated, infected with a rat or just crashes very often, which is not true as only the auth function that only gets called one time gets patched. Jaguar also borrowed around 800 dollars to protect a crash from Jack the Ripper and never paid it back, Jack was kicked from the team instead. They also used the leaked source from human menu which was coded by huangmo for most of their stuff. They are also collecting a lot of information about the users pc that is not used to determine the hwid of a user for "Support reasons". Last but not least Jaguar is accusing me of having something to hide because i packed the Ethereal crack with themida(it was not packed) and provides a screenshot of assembler code that loads a dll as proof.
|
||||
The Ethereal team falsely accused me of ratting people after a reseller of them got ratted and his keys got leaked to the public. In the beginning, I tried to talk to Jaguar(Admin at Ethereal) peacefully, but he didn't believe me and kept trash-talking, so I had enough of it. I cracked the menu in around 2 hours of work. Their auth is a highly virtualized and mutated function that returns a bool. VMProtect and its SDK are used for primary protection. There are two methods of cracking it: One by returning true in the part where the Macro of VMP in the source is placed(which was found by timiostimio and is the method used in this source because it is easier to use and stabler) or by setting the rax register to 1 before the original return after the VM.(which is shown in the et.1337 x64dbg patch file) But let us continue with the story: After I released the crack Jaguar started shit-talking me again and released an announcement where he tried to save his ass by saying that the crack is outdated, infected with a rat or just crashes very often, which is not true as only the auth function that only gets called one time gets patched. Jaguar also borrowed around 800 dollars to protect a crash from Jack the Ripper and never paid it back. Jack was kicked from the team instead. They also used the leaked source from human menu, which was coded by huangmo for most of their stuff. They are also collecting much information about the user's pc that is not used to determine the hwid of a user for "Support reasons." Last but not least, Jaguar is accusing me of having something to hide because I packed the Ethereal crack with themida (it was not packed) and provided a screenshot of the assembler code that loads a DLL as proof.
|
||||
|
||||
## Screenshots and proofs
|
||||
<p align="center">
|
||||
|
|
Loading…
Reference in New Issue