Last active
November 13, 2021 19:37
-
-
Save k1zn/71eae4fcb7bc83730bc0548aa6af87ea to your computer and use it in GitHub Desktop.
VimeWorld RAM Bypass
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # thx LoganFrench | |
| import os, base64 | |
| def base64_encode(text): | |
| return base64.b64encode(bytes(text, 'utf-8')).decode('ascii') | |
| ram = input('Enter RAM amount (example 3G, 3000M): ') | |
| os.system('cmd /d /c start "" /D "%APPDATA%\\.vimeworld" "%APPDATA%\\.vimeworld\\VimeWorld.exe" -home "%APPDATA%\\.vimeworld\\" -jre "%APPDATA%\\.vimeworld\\jre-x64" -jvmargs -Xmx' + ram + ' -XX:+UnlockExperimentalVMOptions -XX:+UseG1GC -jar "launcher.jar" -updater ' + base64_encode(os.getenv('APPDATA') + '\\.vimeworld\\VimeWorld.exe') + ' -appdata ' + base64_encode(os.getenv('APPDATA'))) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment