Client side Lua scripting for Enemy Territory - Wolfenstein.
| Added README. | 6ede3d0, 31 Jul 2020 |
|---|---|
| detours/ | |
| lua/ | |
| src/ | |
| .gitignore | |
| CMakeLists.txt | |
| README.md | |
ETCLUA
Client side Lua scripting for Enemy Territory - Wolfenstein. Note that this is more of a proof of concept and it's far from to be finished. To be honest, it's never going to be.
Support
- Windows
- ET 2.60b (any mod should be working)
Released DLL is undetected by ETPro 3.2.6 anti-cheat, relevant addresses are, however, stripped from this source.
Usage
Download and inject the DLL and connect a server.
Loading a module
lua_load <module>.lua
<module>.lua is relative to your ET executable.
lua_unload <module>.lua
Unloads a previously loaded module. You can list loaded modules with lua_show command.
Lua API
Functions
et.Print(string)et.Cvar_Get(string name): string|nilet.Cvar_Set(string name, string value)et.Milliseconds(): numberet.AddCommand(string command)et.RemoveCommand(string command)et.SendConsoleCommand(string command)et.Argv(number)- argument handling forCG_ConsoleCommand()andCG_ServerCommand()callbackset.Argc(): number
Callbacks
CG_ConsoleCommand(string command): bool- handles a command entered in client console, returntrueto intercept itCG_ServerCommand()- called on every server command