Client side Lua scripting for Enemy Territory - Wolfenstein.
Added README. | 6ede3d0, 31 Jul 2020 |
---|---|
detours/ | |
lua/ | |
src/ | |
.gitignore | |
CMakeLists.txt | |
README.md |
ETCLUA
Client side Lua scripting for Enemy Territory - Wolfenstein. Note that this is more of a proof of concept and it's far from to be finished. To be honest, it's never going to be.
Support
- Windows
- ET 2.60b (any mod should be working)
Released DLL is undetected by ETPro 3.2.6 anti-cheat, relevant addresses are, however, stripped from this source.
Usage
Download and inject the DLL and connect a server.
Loading a module
lua_load <module>.lua
<module>.lua
is relative to your ET executable.
lua_unload <module>.lua
Unloads a previously loaded module. You can list loaded modules with lua_show
command.
Lua API
Functions
et.Print(string)
et.Cvar_Get(string name): string|nil
et.Cvar_Set(string name, string value)
et.Milliseconds(): number
et.AddCommand(string command)
et.RemoveCommand(string command)
et.SendConsoleCommand(string command)
et.Argv(number)
- argument handling forCG_ConsoleCommand()
andCG_ServerCommand()
callbackset.Argc(): number
Callbacks
CG_ConsoleCommand(string command): bool
- handles a command entered in client console, returntrue
to intercept itCG_ServerCommand()
- called on every server command