Profile Picture

tomvere

Reputation: 0 [rate]

Joined: Feb, 2025

Last online:

Etc

Send Message

Threads List
Possible Alts

Activity Feed

Created a new thread : [HELP] Hello i need help for exploiting in a game that have securized the damage remote


Hey, 
here is my analyse:

 

local args = {
    [1] = 2,
    [2] = {
        [1] = 78,
        [2] = 58847,
        [3] = 12033162,
        [4] = 10835316,
        [5] = 4135116,
        [6] = 8232403
    },
    [3] = game:GetService("Players"):WaitForChild("sltbye1234").Character.RightUpperArm,
    [4] = CFrame.new(972.6941528320312, 25.247312545776367, -1012.1983642578125, 0.2905203402042389, 0, -0.9568688273429871, -0, 1, -0, 0.9568688273429871, 0, 0.2905203402042389)
}

game:GetService("ReplicatedStorage"):WaitForChild("remoteInterface"):WaitForChild("interactions"):WaitForChild("meleePlayer"):FireServer(unpack(args))

 

first arg is the slot of the weapon

third is the part to be touched

and fourth is the position of part

 

but second is requierd and cant be modified.

i searched a lot and found that every players instance has attributes that is very similar to second argument, so i damaged my alt and take the values to compare:

 

target:
_pk = 65537
_pq1 = 175
_pq2 = 2657817
_pq3 = 6656890
_pq4 = 6677074
_pq5 = 4678075
_pq6 = 3792163
_pqC = 6

 

me:
_pk = 65537
_pq1 = 121
_pq2 = 16154961
_pq3 = 1584909
_pq4 = 6382146
_pq5 = 7627837
_pq6 = 7186943
_pqC = 6

 

my conclusion is that the script encrypt the target values and server decrypt them and check if equal, i found a crypt module in replicatedstorage and here is the script decompiled:

https://pastebin.com/raw/p5b2syG7

so, now i thing pk means public key,
pk is the key for encrypting

pqC the the amount of keys to verify

and so pq(n) the keys

 

i tryed the functions with my pqs and pk but thers some bug, its hard to find how it works, can someone help me please ?

Commented to thread : Fix some JJSploit functions


what ? you mean a remote spy ?

Replied to thread : Fix some JJSploit functions


up: 
getsenv return always that: {["script"] = thescript}

Created a new thread : Fix some JJSploit functions


hey bros, i exploit since a lot of time, i exploit remote events teleportations touch interest, proximity prompts etc but recently i learned to hack localscript for some modding etc, using getsenv, can you please fix it ? it returns the script and not the environment of the script thats my dream lol.

and can you add WebSocket please ?

Replied to thread : Imagine saying JJSploit got fixed and xeno still patched but using Xeno API for JJSploit


Oh i have it, you taken xeno code and made your exploit with it, and now when exploits are patched you updated your modified version of xeno but xeno still outdated. Im sorry i dont know why im so toxic like that.

Replied to thread : Imagine saying JJSploit got fixed and xeno still patched but using Xeno API for JJSploit


Oh and for proofs, when you do an error with JJSploit the stack is called by game.RobloxReplicatedStorage.Xeno.etc

 

Created a new thread : Imagine saying JJSploit got fixed and xeno still patched but using Xeno API for JJSploit


I know you do that, and thats strange, is JJSPloit a virus ? And if not, your just doing that to steal Xeno users for JJSploit ?