who da hell is gonna hook addcorescriptlocal
youd literally need to env grab the exploit or pray the exploit env leaks to get the blocked function error
tell me you have no idea about what you’re yapping about without telling me you have no idea what you’re yapping about
You cannot cause an asserted blocked function error from AddCoreScriptLocal because there’s absolutely no reason for anybody to assert it and it’s practically impossible to cause it without hijacking their exploit-env which you obviously lack the integrity to know that it’s a thing
Anyone who puts their exploit gui inside the roblox process is incredibly stupid
people that don’t want their pc running doom (if you know you know #LatteSoftworks)
heres a list of github “vulnerability patches” that are detected
Moreunc’s Vulnerability patch (which basically just loadstrings aBlock’s code)
aBlock’s Vulnerability patch
uwuware/skripts/vulnerability at 4ceadec599c89054cb28d55082ebb61780777a09 · rrixh/uwuware
moreunc/archive/7.lua at 51bdb614ecce656c90e8df5f31a757ec2c073d26 · FurryBoyYT/moreunc
basically if you run moreunc your detected by me and your probably detected by hyperion anyway because why do u need to make an executor with moreunc
30 limit 30 limit 30 limit 30 limit
your clearly delusional any semi competent exploit dev wouldnt use lua to block vulnerable functions and would instead do it in whatever language their exploit is made in
if you need lua scripts to patch vulns you shouldnt be allowed to develop an exploit
and ur entire detection is bypassed by using an if statement with check caller
literally nobody uses moreunc
im clearly delusional but the evidence is right there that it works so who is actually delusional
plenty do
they dont which is why its a detection method
name 1 person that has an iq above room temp and uses moreunc
the detection has close to 0 effectiveness.
in all my years of exploiting and working on snticheats and script hubs i have not met one person that uses moreunc
just because it exists doesnt mean its used
this doesnt affect anything in coregui so unless ur a mobile exploiter you wont get affected
yall lowk get too heated about video game anti exploits it is NOT that serious
why are you getting the feds involved that was not off topic
anyway to be on topic this method will probably be patched sooner or later since it was publicly released, it’s better to stay server sided with checks there
if i had access to executors source code maybe i could find out
plus it doesnt just affect moreunc it affects 90% of vulnerability patches
me when i get kicked for flying by a server ac due to my high ping
thats never happened to me before when playing on servers with server ac while having high ping
(citadel works best)
still wont natter all that much as popular exploits like AWP, SynZ, Macsploit, Sirhurt, Nihon and Swift dont use lua to block vulnerable functions instead they do it in their exploits source according to the developers atleast
still theres going to be some random somalian child that plays on 3k ping getting kicked while not exploiting
seems like a player issue. there are more exploiters than Somalian children playing Roblox therefore combating exploiters is more of an issue
a false positive is still a false positive doesnt matter on who it is or how many people were affected
some false positives can’t be fixed in a meaningful way, but to minimize who’s affected is most important
if your on a client ac they can be fixed easily
your best option for an ac is mixing server and client like any semi decent ac does