Hello.
Recently it came to my attention that somebody was selling adventure coins at a discounted price. It is my assumption that the seller probably found the same vulnerability that I found. Because AE are exceptionally fond of the money coming in from people purchasing adventure coins, I sense that they will soon find out about this and patch the vulnerability and I therefore decided to release this.
By exploiting this vulnerability you can set the stack of an item to almost any value. However, the item has to be stackable and you cannot exceed the max stack (except for temp items). This vulnerability affects:
- Temp items. Meaning you can complete quests incredibly quickly. If you are doing a quest that requires x100 of an item, all you need to do is to get 1 of that item and then use this plugin to set the stack to whatever. Level 85 in a few hours? Yep!
- Items. Like temp items, you only need 1 of an item in order to set the stack to whatever you decide. But like I said earlier, the items has to be stackable, and you can't exceed its max stack.
- AC items. Yes, using this exploit you can generate ACs. Get a stackable item that sells for ACs like treasure chest keys, set the stack to the max value, and start selling. If you don't have any ACs you can do ballyhoo until you get a total of 15 adventure coins and then buy Dragon Runestone in /alchemyacademy, or create a new account, confirm its email and you'll receive 200 coins.
WARNING
If you exploit this vulnerability to generate ACs, it's pretty much guaranteed that your account will be banned because AE logs AC transactions made on your account.
However, if you use it for other purposes the chance of getting banned is significantly lower.
Have fun while it lasts.
If you get this error when loading the plugin:
Code:
An attempt was made to load an assembly from a network location which would have caused the assembly to be sandboxed in previous versions of the .NET Framework. This release of the .NET Framework does not enable CAS policy by default, so this load may be dangerous. If this load is not intended to sandbox the assembly, please enable the loadFromRemoteSources switch.
Here's how to fix it:
I am in no way, shape or form responsible for what you do with this plugin. You, the user of the plugin, are completely responsible for your own actions.
https://www.virustotal.com/#/file/7f...2fd4/detection
https://virusscan.jotti.org/en-US/fi...job/0ruq0wabnm