Detect and crash every string in CoreGui

Maybe it’s just me but this will immediately crash the mobile client when joining. Have you ever tested with that platform?

this method will require high memory u will need to optimize it by urself

Claims to have a CoreGui string detection
Posts a string.rep that would literally work in any container other than CoreGui :broken_heart:

2 Likes

That is because your exploit simulator does not have RobloxScriptSecurity, you are just placing the GUI in PlayerGui

2 Likes

same guy that creates a CoreScript from a LocalScript please stick to copying public GitHub RCEs and scraping DevForum detections, then slapping your name on it as an “anti-cheat”

3 Likes

reading comprehension of an 8 year old

the detection was to see if it actually ran and didn’t error in a specific way since the “creating a corescript from a localscript” was actually a way to achieve remote code execution in executors

if it was hookfunctioned and ran an executor would catch it an display an error that said “Tried to run a blocked function” instead of just the error that you don’t have the priviledge to do that since its from a localscript.

stick to stealing other peoples devforum detections :rofl: :rofl: :rofl:


a 2023 detection method btw
FireClickDetector and FireProximityPrompt Exploit Detection - Resources / Community Resources - Developer Forum | Roblox

Detect CoreGui Exploits (INCLUDING JJSPLOIT, FLUXES AND CELERY UPON INJECTION)! - Resources / Community Resources - Developer Forum | Roblox

Wait, what is this? It sounds like GUI then like anti-exploit.

writing this on mobile because my incompetence alarm rang

“the detection was to see if it actually ran and didn’t error in a specific” you cannot use AddCoreScriptLocal from a local script it just simply cannot run regardless of elevated environments

“stick to stealing other peoples devforum detections :rofl: :rofl: :rofl:” if you were on the internet for over a year or two you would know that this detection has existed long since 2022 and likely prior, no the post you referenced isn’t the original poster sorry buddy, the only reason it’s in a public post under my account is to gain traction to counter the older scripts that for some reason are still undetected in most games

And there you are praising a detection that does NOT work :broken_heart: please stick to copy pasting every public detection and label it as your own

Absolute cinema of an argument to watch :popcorn:

2 Likes

image

maybe if i put it in a picture form he can understand

ironic :sob::sob: just because it existed in 2022 doesnt mean you didnt paste it, post it on the devforum, AND make it worse than the post you based the detection off of


CoreGui Instance Detection - Resources / Community Resources - Developer Forum | Roblox

who da hell is gonna hook addcorescriptlocal
youd literally need to env grab the exploit or pray the exploit env leaks to get the blocked function error

1 Like

tell me you have no idea about what you’re yapping about without telling me you have no idea what you’re yapping about :broken_heart:

You cannot cause an asserted blocked function error from AddCoreScriptLocal because there’s absolutely no reason for anybody to assert it and it’s practically impossible to cause it without hijacking their exploit-env which you obviously lack the integrity to know that it’s a thing

Anyone who puts their exploit gui inside the roblox process is incredibly stupid

people that don’t want their pc running doom (if you know you know #LatteSoftworks)

heres a list of github “vulnerability patches” that are detected

Moreunc’s Vulnerability patch (which basically just loadstrings aBlock’s code)
aBlock’s Vulnerability patch
uwuware/skripts/vulnerability at 4ceadec599c89054cb28d55082ebb61780777a09 · rrixh/uwuware
moreunc/archive/7.lua at 51bdb614ecce656c90e8df5f31a757ec2c073d26 · FurryBoyYT/moreunc

basically if you run moreunc your detected by me and your probably detected by hyperion anyway because why do u need to make an executor with moreunc :angst:

30 limit 30 limit 30 limit 30 limit

your clearly delusional any semi competent exploit dev wouldnt use lua to block vulnerable functions and would instead do it in whatever language their exploit is made in

if you need lua scripts to patch vulns you shouldnt be allowed to develop an exploit

and ur entire detection is bypassed by using an if statement with check caller

literally nobody uses moreunc

im clearly delusional but the evidence is right there that it works so who is actually delusional

plenty do

they dont which is why its a detection method

name 1 person that has an iq above room temp and uses moreunc

the detection has close to 0 effectiveness.
in all my years of exploiting and working on snticheats and script hubs i have not met one person that uses moreunc

just because it exists doesnt mean its used

this doesnt affect anything in coregui so unless ur a mobile exploiter you wont get affected