wh00hw
wh00hw
 Same issue, if I understand correctly the exploit leverage the pkm id `0xce` "name" to push `0xD7A3` as ret address in `PlaceString:` subroutine, so that the execution jumps 228...
https://archives.glitchcity.info/forums/board-115/thread-7576/page-0.html well, the explaination is that if we are near endgame, those nops are actually set as event flags ex. D7B3 - Fought Sabrina Yet? The exploit works correctly with...
same error on Arch, try to checkout the latest release tag then compile as usual. `git checkout tags/v4.18341`