this is a bit complicated, their anti-bot DLL gets updated very often, I made universal patcher but I don't want it to be studied for now, I'll explain it later, and this is only the client part.
For OpenKore there are just some minor changes needed, Currently, in X0.5 bot and client exchange their functions compared to X1.
Some ideas may be added into master OpenKore, for example, XKore 1 with random client port(NetRedirect improvements), and this X0.5 mode to use a zombie client as packet generator(very like Posideon, but it processes all packets). I'm not very familiar with Perl, so maybe someone else can write this code better than me. EAC bypass is server specific, I don't think it have any constructive usage in the future.
For anyone has disconnect problem after map login, check sent packet, it should be HMACed, if it is not, either your injection is detected, you can modify audioses.dll, and put hooktest.dll into SysWOW64, or you didn't send 0436 as map_login, or simply your account is banned(you can try clean client login).