Are there any known exploits that don't require programs on Tehgamers l2J? If so please share it here. Also, can someone explain how the duping and enchanting exploits work?
08/05/2009 14:25Obilee#2
[no question] here, create a new thread ! But this time in the right section.