Activity Feed
Created a new thread : [HELP] Hello i need help for exploiting in a game that have securized the damage remote
Hey,
here is my analyse:
local args = {
[1] = 2,
[2] = {
[1] = 78,
[2] = 58847,
[3] = 12033162,
[4] = 10835316,
[5] = 4135116,
[6] = 8232403
},
[3] = game:GetService("Players"):WaitForChild("sltbye1234").Character.RightUpperArm,
[4] = CFrame.new(972.6941528320312, 25.247312545776367, -1012.1983642578125, 0.2905203402042389, 0, -0.9568688273429871, -0, 1, -0, 0.9568688273429871, 0, 0.2905203402042389)
}
game:GetService("ReplicatedStorage"):WaitForChild("remoteInterface"):WaitForChild("interactions"):WaitForChild("meleePlayer"):FireServer(unpack(args))
first arg is the slot of the weapon
third is the part to be touched
and fourth is the position of part
but second is requierd and cant be modified.
i searched a lot and found that every players instance has attributes that is very similar to second argument, so i damaged my alt and take the values to compare:
target:
_pk = 65537
_pq1 = 175
_pq2 = 2657817
_pq3 = 6656890
_pq4 = 6677074
_pq5 = 4678075
_pq6 = 3792163
_pqC = 6
me:
_pk = 65537
_pq1 = 121
_pq2 = 16154961
_pq3 = 1584909
_pq4 = 6382146
_pq5 = 7627837
_pq6 = 7186943
_pqC = 6
my conclusion is that the script encrypt the target values and server decrypt them and check if equal, i found a crypt module in replicatedstorage and here is the script decompiled:
https://pastebin.com/raw/p5b2syG7
so, now i thing pk means public key,
pk is the key for encrypting
pqC the the amount of keys to verify
and so pq(n) the keys
i tryed the functions with my pqs and pk but thers some bug, its hard to find how it works, can someone help me please ?
Replied to thread : Fix some JJSploit functions
up:
getsenv return always that: {["script"] = thescript}
Created a new thread : Fix some JJSploit functions
hey bros, i exploit since a lot of time, i exploit remote events teleportations touch interest, proximity prompts etc but recently i learned to hack localscript for some modding etc, using getsenv, can you please fix it ? it returns the script and not the environment of the script thats my dream lol.
and can you add WebSocket please ?
Replied to thread : Imagine saying JJSploit got fixed and xeno still patched but using Xeno API for JJSploit
Oh i have it, you taken xeno code and made your exploit with it, and now when exploits are patched you updated your modified version of xeno but xeno still outdated. Im sorry i dont know why im so toxic like that.
Replied to thread : Imagine saying JJSploit got fixed and xeno still patched but using Xeno API for JJSploit
Oh and for proofs, when you do an error with JJSploit the stack is called by game.RobloxReplicatedStorage.Xeno.etc
Created a new thread : Imagine saying JJSploit got fixed and xeno still patched but using Xeno API for JJSploit
I know you do that, and thats strange, is JJSPloit a virus ? And if not, your just doing that to steal Xeno users for JJSploit ?