fixed gramar issues
This commit is contained in:
parent
0f2c1e19fc
commit
17571cef85
|
@ -10,7 +10,7 @@
|
||||||
[Maintained open source menu based on human menu](https://github.com/sinfail/Windbreaker)
|
[Maintained open source menu based on human menu](https://github.com/sinfail/Windbreaker)
|
||||||
|
|
||||||
## The story
|
## The story
|
||||||
#### Update: The shittalk didnt stop after i told them that i would stop cracking them once it stops, so here we go again. New crack versions wont be open source as i dont want to support them to patch the new crack methods and i already proved that there is no rat in it. If you dont trust me with that just dont use the newer versions and stick with the open source 1.2.5 crack.
|
#### Update: The shittalk didnt stop after i told them that i would stop cracking them once it stops, so here we go again. New crack versions wont be open source as i dont want to support them with patching the new crack methods and i already proved that there is no rat in my cracks. If you dont trust me with that just dont use the newer versions of the crack and stick with the open source 1.2.5 crack.
|
||||||
|
|
||||||
#### read the story and watch the proofs before telling me that im lying and deciding which side is right.
|
#### read the story and watch the proofs before telling me that im lying and deciding which side is right.
|
||||||
The Ethereal team falsely accused me of ratting people after a reseller of them got ratted and his keys got leaked to the public. In the beginning, I tried to talk to Jaguar(Admin at Ethereal) peacefully, but he didn't believe me and kept trash-talking, so I had enough of it. I cracked the menu in around 2 hours of work. Their auth is a highly virtualized and mutated function that returns a bool. VMProtect and its SDK are used for primary protection. There are two methods of cracking it: One by returning true in the part where the Macro of VMP in the source is placed(which was found by timiostimio and is the method used in this source because it is easier to use and stabler) or by setting the rax register to 1 before the original return after the VM.(which is shown in the et.1337 x64dbg patch file) But let us continue with the story: After I released the crack Jaguar started shit-talking me again and released an announcement where he tried to save his ass by saying that the crack is outdated, infected with a rat or just crashes very often, which is not true as only the auth function that only gets called one time gets patched. Jaguar also borrowed around 800 dollars to protect a crash from Jack the Ripper and never paid it back. Jack was kicked from the team instead. They also used the leaked source from human menu, which was coded by huangmo for most of their stuff. They are also collecting much information about the user's pc that is not used to determine the hwid of a user for "Support reasons." Last but not least, Jaguar is accusing me of having something to hide because I packed the Ethereal crack with themida (it was not packed) and provided a screenshot of the assembler code that loads a DLL as proof.
|
The Ethereal team falsely accused me of ratting people after a reseller of them got ratted and his keys got leaked to the public. In the beginning, I tried to talk to Jaguar(Admin at Ethereal) peacefully, but he didn't believe me and kept trash-talking, so I had enough of it. I cracked the menu in around 2 hours of work. Their auth is a highly virtualized and mutated function that returns a bool. VMProtect and its SDK are used for primary protection. There are two methods of cracking it: One by returning true in the part where the Macro of VMP in the source is placed(which was found by timiostimio and is the method used in this source because it is easier to use and stabler) or by setting the rax register to 1 before the original return after the VM.(which is shown in the et.1337 x64dbg patch file) But let us continue with the story: After I released the crack Jaguar started shit-talking me again and released an announcement where he tried to save his ass by saying that the crack is outdated, infected with a rat or just crashes very often, which is not true as only the auth function that only gets called one time gets patched. Jaguar also borrowed around 800 dollars to protect a crash from Jack the Ripper and never paid it back. Jack was kicked from the team instead. They also used the leaked source from human menu, which was coded by huangmo for most of their stuff. They are also collecting much information about the user's pc that is not used to determine the hwid of a user for "Support reasons." Last but not least, Jaguar is accusing me of having something to hide because I packed the Ethereal crack with themida (it was not packed) and provided a screenshot of the assembler code that loads a DLL as proof.
|
||||||
|
|
Loading…
Reference in New Issue