I fix mine (no expert at all) and i tested it with two different bots for an hour now.
use at your own risk and share any mistakes you find.
happy egg hunt
Absolute legend thanks for the hard work!
Do you mind explaining how you fixed the GWA2 file as I along with most people only know how to update the headers :/
Absolute legend thanks for the hard work!
Do you mind explaining how you fixed the GWA2 file as I along with most people only know how to update the headers :/
To be honest it was a lot of trial and error which took a friend and myself about 8 hours.
We basically went with the changed pattern from the GWCA-commit linked some posts before and dug into the memory with CheatEngine. We verified our findings by running a Toolbox in debug-mode (download sources and build it yourself).
There was no real "method" or" "process" involved, just a lot of educated guesses and some math...
It's simple, the new GWA2 file you are using doesn't have that function.
Copy it from the old GWA2 and put it in the new one.
Since this question is very noob you should be more carefull on using scripts posted here untill some trusted guy say it's ok.
You can have your accont stolen pretty fast if you don't pay some attention.
It's simple, the new GWA2 file you are using doesn't have that function.
Copy it from the old GWA2 and put it in the new one.
Since this question is very noob you should be more carefull on using scripts posted here untill some trusted guy say it's ok.
You can have your accont stolen pretty fast if you don't pay some attention.
How could they steal my account though? They would need to have access to my email and phone where the verification code gets sent every time I have a login from new IP address.
Well, some people don't have 2FA on their accounts. Generally, it is always good advice not to run foreign code without checking it first. Especially in the case of botting and such, which even for "legit" files often triggers Antivirus solutions.
However, in this case, since the only required changes are to headers and patterns, you can simply copy only the changed lines (which the people that fixed them helpfully posted seperately from their own full GWA2) and paste them over your corresponding lines. This is a bit harder of course, but generally can be a good exercise.
In theory, a lot of nastiness could be hidden deep inside the GWA2 and might be hard to spot. After all, you execute those bots with admin rights on your PC. An attacker can do a lot with admin privileges on your machine.