Hi everyone!
Today, I’m releasing an anti-injection method targeting Xeno exploit. The method is NOT meant for detection.
While examining Xeno’s compiled DLL binary, I came across a portion of its init script that looks like this:
local x=game.CorePackages.Packages._Index.UIBlox.UIBlox.App.Text.Parent.Parent.Parent local y=require(x.Roact).PureComponent:extend('StyledTextLabel')
Interesting, right? They forgot to use FindFirstChildOfClass
or GetService
.
Taking advantage of this vulnerability, we can use the following script to crash Xeno’s injection:
-- Renaming TextService to CorePackages breaks some CoreScripts in Studio, but works fine in-game.
if not game:GetService("RunService"):IsStudio() then
game:GetService("TextService").Name = "CorePackages"
end
I placed this inside a LocalScript
under ReplicatedFirst
. Here’s the result:
Running any script after this causes an error in the Xeno exploit:
That’s it for today!