small update

This commit is contained in:
EinTim 2022-10-04 18:31:27 +02:00
parent 53e5efe81d
commit 0f2c1e19fc
6 changed files with 17 additions and 1 deletions

3
.gitignore vendored
View File

@ -1 +1,4 @@
release/* release/*
1.2.7/*
1.2.6/*
*/.vs/*

View File

@ -8,7 +8,10 @@
[Asset files for human menu](https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/assets/hbase-cdrive.zip) [Asset files for human menu](https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/assets/hbase-cdrive.zip)
<br/> <br/>
[Maintained open source menu based on human menu](https://github.com/sinfail/Windbreaker) [Maintained open source menu based on human menu](https://github.com/sinfail/Windbreaker)
## The story ## The story
#### Update: The shittalk didnt stop after i told them that i would stop cracking them once it stops, so here we go again. New crack versions wont be open source as i dont want to support them to patch the new crack methods and i already proved that there is no rat in it. If you dont trust me with that just dont use the newer versions and stick with the open source 1.2.5 crack.
#### read the story and watch the proofs before telling me that im lying and deciding which side is right. #### read the story and watch the proofs before telling me that im lying and deciding which side is right.
The Ethereal team falsely accused me of ratting people after a reseller of them got ratted and his keys got leaked to the public. In the beginning, I tried to talk to Jaguar(Admin at Ethereal) peacefully, but he didn't believe me and kept trash-talking, so I had enough of it. I cracked the menu in around 2 hours of work. Their auth is a highly virtualized and mutated function that returns a bool. VMProtect and its SDK are used for primary protection. There are two methods of cracking it: One by returning true in the part where the Macro of VMP in the source is placed(which was found by timiostimio and is the method used in this source because it is easier to use and stabler) or by setting the rax register to 1 before the original return after the VM.(which is shown in the et.1337 x64dbg patch file) But let us continue with the story: After I released the crack Jaguar started shit-talking me again and released an announcement where he tried to save his ass by saying that the crack is outdated, infected with a rat or just crashes very often, which is not true as only the auth function that only gets called one time gets patched. Jaguar also borrowed around 800 dollars to protect a crash from Jack the Ripper and never paid it back. Jack was kicked from the team instead. They also used the leaked source from human menu, which was coded by huangmo for most of their stuff. They are also collecting much information about the user's pc that is not used to determine the hwid of a user for "Support reasons." Last but not least, Jaguar is accusing me of having something to hide because I packed the Ethereal crack with themida (it was not packed) and provided a screenshot of the assembler code that loads a DLL as proof. The Ethereal team falsely accused me of ratting people after a reseller of them got ratted and his keys got leaked to the public. In the beginning, I tried to talk to Jaguar(Admin at Ethereal) peacefully, but he didn't believe me and kept trash-talking, so I had enough of it. I cracked the menu in around 2 hours of work. Their auth is a highly virtualized and mutated function that returns a bool. VMProtect and its SDK are used for primary protection. There are two methods of cracking it: One by returning true in the part where the Macro of VMP in the source is placed(which was found by timiostimio and is the method used in this source because it is easier to use and stabler) or by setting the rax register to 1 before the original return after the VM.(which is shown in the et.1337 x64dbg patch file) But let us continue with the story: After I released the crack Jaguar started shit-talking me again and released an announcement where he tried to save his ass by saying that the crack is outdated, infected with a rat or just crashes very often, which is not true as only the auth function that only gets called one time gets patched. Jaguar also borrowed around 800 dollars to protect a crash from Jack the Ripper and never paid it back. Jack was kicked from the team instead. They also used the leaked source from human menu, which was coded by huangmo for most of their stuff. They are also collecting much information about the user's pc that is not used to determine the hwid of a user for "Support reasons." Last but not least, Jaguar is accusing me of having something to hide because I packed the Ethereal crack with themida (it was not packed) and provided a screenshot of the assembler code that loads a DLL as proof.
@ -73,3 +76,13 @@ Jaguar trying to prove that im using themida to hide something and destroying hi
<img src="https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/imgs/noknowledge3.png"> <img src="https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/imgs/noknowledge3.png">
</p> </p>
Jaguar just talking bullshit Jaguar just talking bullshit
<p align="center">
<img src="https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/imgs/itsame.png">
</p>
<p align="center">
<img src="https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/imgs/wontstop.png">
</p>
A few hours later after i got my fat ass up and got my hands on the new files:
<p align="center">
<img src="https://raw.githubusercontent.com/EinTim23/ethereal-crack/master/imgs/heheheha.png">
</p>

Binary file not shown.

BIN
imgs/heheheha.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 172 KiB

BIN
imgs/itsame.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 168 KiB

BIN
imgs/wontstop.PNG Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 93 KiB