Minimalistic sandbox that allows user's to spoof MAC address, Serial Number, and monitor any System properties that alora accesses during run time. Uses ASM's remapping capabilities to circumvent hardware bans on a (mostly) vanilla client
Run with JDK 8
java -jar AloraBypasser-fat.jar --path C:\path\to\alora\folder\
--mac "random" => use a random Vendored MAC address
--mac "XX:XX:XX:XX:XX:XX" => use the specified MAC address
--serial "random" => use a random Serial Number
--serial "XXXXXXXXXXXXXX" => use the specified Serial number
--debug => enable verbose debugging