Had a giggle, thanks for the good laugh
What they are saying is that the cheat engine exploit that is currently out is a level 2 and does not have these custom methods to even bypass itâŚ
why this still up lil bro
Something like this might work though, but I honestly donât know:
local ProtectMethodString = function(SObject: string)
return string.format("%s%s%e", SObject, string.rep("\000", math.random(1, 6)), os.clock() ^ 5 + 0.1)
end
local LogService = game.GetService(game,ProtectMethodString("LogService"))
local Players = game.GetService(game,ProtectMethodString("Players"))
local LocalPlayer = Players[ProtectMethodString("LocalPlayer")]
local Backpack = LocalPlayer[ProtectMethodString("Backpack")]
local Tools = {}
local Lookfor = {
"IY";
"dex";
"CMDY";
}
local function LookForMessage(...)
local Args = {...} :: string
local Suspicious_Messages = {
"we wait now";
"got those";
"sucessfully injected";
}
for _ ,v in Suspicious_Messages do
local Lower = string.lower(Args[1])
if Lower:find(v) then
LocalPlayer:Kick(Args[1])
end
end
end
local function toolCheck(tool)
if not table.find(Tools,tool.Name) then
local function LookForAddedScripts(instance: Instance)
if instance:IsA("Script") or instance:IsA("LocalScript") then
LocalPlayer:Kick("You been trolled for having an illegal script")
end
end
if tool:IsA("Tool") then
task.delay(0.01,function()
for _,scripts in pairs(tool:GetChildren()) do
if scripts:IsA("Script") or scripts:IsA("LocalScript") then
scripts:GetPropertyChangedSignal("Name"):Connect(function()
LocalPlayer:Kick("You been trolled for changing the name of a script inside a tool")
end)
end
end
tool.ChildAdded:Connect(LookForAddedScripts)
end)
end
table.insert(Tools,tool.Name)
end
end
for _, tool in Backpack:GetChildren() do
toolCheck(tool)
end
Backpack.ChildAdded:Connect(function(tool)
toolCheck(tool)
end)
LogService.MessageOut:Connect(LookForMessage)
Players.Name = Random.new():NextInteger(-9999,9999)
while true do
for _, v in Lookfor do
local sucess,errormessage = pcall(function()
return _G[v]
end)
if not sucess or errormessage ~= nil then
LocalPlayer:Kick("You been trolled for injecting with level 2 executor (cheat engine)")
end
end
task.wait(5)
end
This shouldnât need detection by developers, this will be patched in like a week by Roblox themselves. Any type of detection strategy you try will probably be patched by the exploiters.
It doesnât let you inject, how will they patch it?
Thatâs some very good advice: Trying is useless.
It injects code into LocalScripts that are in your Character (it can only detect LocalScripts that become a descendant of your Character after you inject using a modified CheatEngine, which is why it wants you to equip a Tool with a LocalScript in it), itâs the only âexploitâ that works on UWP and Web that is currently out.
Yeah but⌠Once you inject you are detected, so it canât be bypassed
I donât know if itâs really detected or not, I thought using exploits on Hyperion would crash it (I read some posts by Bitdancer and apparently using exploits would crash the Hyperion build, since a user was exploiting and sent a crash log to Roblox since it kept crashing), but the CheatEngine method obviously doesnât crash since people ARE using it to exploit. If it doesnât get patched in like a week Iâd assume itâs detected and Roblox is waiting until a ton of people use it so they can ban them.
Cheat engine does crash a lot and Itâs very unstable, Itâs more like a joke executor than anything else, there are other executors coming out this year or the next one that are above level 2, and have actual execution
By detected I mean the detection from this post would be triggered
Pretty sure most of the âdetectionâ methods from this thread wonât work or can be easily fixed, theyâre trying to overcomplicate things, why not just detect for ScreenGUIs that get added to your PlayerGui? Itâs not that hard. (Detecting a GUI too can be fixed but at least it would require a small rewrite)
please tell me every single post in here is satire, nobody uses cheat engine and its barely level 2 access
im honestly surprised it still works on the roblox client anymore, let alone work period
Roblox, just add Hyperion on UWP client already, i canât look at both sides (exploiters & developers) whom 1 trying anything to exploit again and another one trying everything in their power to detect it
just please let Roblox handles this for now, so atleast both parties wonât bother too much and can just focus on developing games and maybe put the security on the SERVER rather than trying to protect the CLIENT
it is on uwp (they added it quite recently)
levels arent a thing in executors, levels dont exist.
it still can barely do anything
Security context | Roblox Wiki | Fandom the cheat engine executors dont feel like setting identity (i think?) but this is what levels do
I hope you are joking
Clearly you know nothing about how exploits work, because they are using CoreGui
instead of PlayerGui
. This method is indeed working as my friend who is on the âCE Teamâ of rune has made a similar detection.