Categories > WeAreDevs > Hangout >

[warning to you idiots] erlc logs your ip lmfao

SeizureSalad

i love femboys

Posts: 1159

Threads: 79

Joined: Mar, 2021

Reputation: 40

Posted

if have synapse run this in erlc and get ip logged lol

 

local network = require(game.ReplicatedStorage.Modules.Network)

network()

 

this is real btw i check for meself

 

https://cdn.discordapp.com/attachments/1066003147274850334/1086108235624362134/image.png

  • 0

"Questionable intellegence, but I like the mystery" - CubeFaces

https://cdn.discordapp.com/attachments/1136067487847415848/1138948596679589898/sig.png

N4ri

truly gamer pro :suncool:

contentCreator

Posts: 575

Threads: 88

Joined: Mar, 2020

Reputation: 46

Replied

whuh

https://cdn.discordapp.com/attachments/979946522865172520/1086116685255294976/image.png

  • 0

<3 N4ri
---

Exploits i use: Comet
Scripts i use: anything cool

Posts: 421

Threads: 117

Joined: Mar, 2018

Reputation: 37

Replied

this has been known for a while.

 

the reason this isn't patched in mainstream exploits is, you need to set the environment to something. for example: secure_call has arguments that allow you to run the function under a script's environment, but require would need a whole different arg for this to work. 

 

another reason is that it will lead to many (un-neccessary) detections. if i'm correct scriptware tried patching this in require, but their script still leaks on debug.traceback. to spoof the traceback, you have to deal with line-info spoofing (making sure it's actually a valid line or that could be used as a detection vector), and finding a script that actually calls that module, ALL IN ONE require call. you would also be having a ####-show with function blocking in general, and fixing debug.info detections.

 

other games use this strategy too (phantom forces uses it, i think?)

 

in short, just use secure_call for calling functions (this isn't the best solution as synapse's secure call sucks, but its the only thing we got), and use raw??? functions for setting, or getting.

 

  • 0

‏‏‏‏‏

SeizureSalad

i love femboys

Posts: 1159

Threads: 79

Joined: Mar, 2021

Reputation: 40

Replied

@N4ri don't look at your workspace folder lfmao

  • 0

Added

@atariXD yeah they're able to do that via getfenv(2).syn or whatever one of those envirnonment functions

  • 0

"Questionable intellegence, but I like the mystery" - CubeFaces

https://cdn.discordapp.com/attachments/1136067487847415848/1138948596679589898/sig.png

Posts: 388

Threads: 36

Joined: May, 2022

Reputation: -2

Replied

  • 0

Added

@Astronemi they think their game can ultimately stop exploiters with a simple line of code that can be bypassed

  • 0

Exploits i own:

Script-Ware (Down rn) Electron (UWP) Shadow (UWP)

i dont use verm that much so dont contact me there

Posts: 278

Threads: 23

Joined: Mar, 2022

Reputation: 24

Replied

fine of 10k? huh

  • 0

https://cdn.discordapp.com/attachments/1066053366758780978/1078052772567597127/image.png

Posts: 388

Threads: 36

Joined: May, 2022

Reputation: -2

Replied

@Jebxnt,

its a guilt-trip attempt to stop exploiting

roblox doesn't really care about exploiters and is definitely not considering finding a persons address and tracking them down due to robloxs vulnerabilities THEY wont bother to fix.

  • 0

Added

WARNING! DO NOT EXECUTE THIS. I'VE EXECUTED IT AND FORCED ME TO REINSTALL WINDOWS 11 FOR BETTER FRAME RATES!!

  • 0

Exploits i own:

Script-Ware (Down rn) Electron (UWP) Shadow (UWP)

i dont use verm that much so dont contact me there

Posts: 278

Threads: 23

Joined: Mar, 2022

Reputation: 24

Replied

@matty324, adding on to this it will spam make files some where.

  • 0

https://cdn.discordapp.com/attachments/1066053366758780978/1078052772567597127/image.png

Users viewing this thread:

( Members: 0, Guests: 1, Total: 1 )