Categories > Exploiting > Roblox >
pseudo 'obfuscator' source
Posted
sup! today ill be sharing some random psuedo obfuscator ( it literally shows the bytecode but yeah ) i had it on my desktop and decided to publish it. it can be good for learning some basics, to deobfuscate it simply put
function loadstring(str)
return function() print(str) end
end
at the top
source:
local scriptt = [[
local hello = "hi"
print(hello)
]]
local waterMarkName = "WRD"
local encoded = scriptt:gsub(".", function(bb) return "\\" .. bb:byte() end) or scriptt .. "\""
local function genRandomVarLetter(hm)
local letters = {"IlIllllI", "lIIIlll", "llIIIlIlI"}
local list = {}
local function letter(howMuch)
for i = 1, howMuch do
table.insert(list, letters[math.random(#letters)])
end
end
letter(hm)
local str = ""
for i, v in next, list do
str = str .. v
end
return str
end
local function weirdThing() return '"' end
local function weirdThing2() return "'" end
local function weirdThing3() return ".." end
local function weirdThing4() local thing = "/n" thing = thing:gsub("/", [[\]]) return thing end
local scriptObf = ""
local function getTimeWastinVar()
local amount1 = math.random(5, 20)
local amount2 = math.random(10, 30)
local timeVastingVar = "local ".. waterMarkName .."_"..tostring(genRandomVarLetter(amount1)).." = '".. "".. waterMarkName .."_"..tostring(genRandomVarLetter(amount2)) .."' "
return timeVastingVar
end
local function getVars(amount)
for i = 1, amount do
scriptObf = scriptObf .. getTimeWastinVar()
end
end
getVars(35)
scriptObf = scriptObf .. "local ".. waterMarkName .."_LIIllIIllllIIlIIIlIIIlllIIIllIIIIlII = '".. encoded .."' "
getVars(15)
scriptObf = scriptObf .. "local function IlILiIIIlIIIlILL(".. waterMarkName ..") local ".. waterMarkName .."_IDIDI = '".."loadstring([[".. weirdThing4() ..""..weirdThing2()..weirdThing3().." ".. waterMarkName .."_LIIllIIllllIIlIIIlIIIlllIIIllIIIIlII "..weirdThing3().."'".. weirdThing4() .."]])()".."' loadstring(".. waterMarkName .."_IDIDI)() end; "
getVars(40)
scriptObf = scriptObf .. "IlILiIIIlIIIlILL('".. waterMarkName .."'); "
getVars(90)
print(scriptObf)
https://cdn.discordapp.com/attachments/909012795851407390/927492917394821140/siggy.png
Replied
seems cool imo
Cancel
Post
https://cdn.discordapp.com/attachments/909012795851407390/927492917394821140/siggy.png
Replied
Cancel
Post
Replied
Bytecode? If it literally has bytecode it can be easily deobfuscated.
Cancel
Post
https://cdn.discordapp.com/attachments/822379977440886834/917427277770407946/the_one_only_banner.png
https://cdn.discordapp.com/attachments/909012795851407390/927492917394821140/siggy.png
Users viewing this thread:
( Members: 0, Guests: 1, Total: 1 )
Cancel
Post