Detect and crash every string in CoreGui

who da hell is gonna hook addcorescriptlocal
youd literally need to env grab the exploit or pray the exploit env leaks to get the blocked function error

1 Like

tell me you have no idea about what you’re yapping about without telling me you have no idea what you’re yapping about :broken_heart:

You cannot cause an asserted blocked function error from AddCoreScriptLocal because there’s absolutely no reason for anybody to assert it and it’s practically impossible to cause it without hijacking their exploit-env which you obviously lack the integrity to know that it’s a thing

Anyone who puts their exploit gui inside the roblox process is incredibly stupid

people that don’t want their pc running doom (if you know you know #LatteSoftworks)

heres a list of github “vulnerability patches” that are detected

Moreunc’s Vulnerability patch (which basically just loadstrings aBlock’s code)
aBlock’s Vulnerability patch
uwuware/skripts/vulnerability at 4ceadec599c89054cb28d55082ebb61780777a09 · rrixh/uwuware
moreunc/archive/7.lua at 51bdb614ecce656c90e8df5f31a757ec2c073d26 · FurryBoyYT/moreunc

basically if you run moreunc your detected by me and your probably detected by hyperion anyway because why do u need to make an executor with moreunc :angst:

30 limit 30 limit 30 limit 30 limit

your clearly delusional any semi competent exploit dev wouldnt use lua to block vulnerable functions and would instead do it in whatever language their exploit is made in

if you need lua scripts to patch vulns you shouldnt be allowed to develop an exploit

and ur entire detection is bypassed by using an if statement with check caller

literally nobody uses moreunc

im clearly delusional but the evidence is right there that it works so who is actually delusional

plenty do

they dont which is why its a detection method

name 1 person that has an iq above room temp and uses moreunc

the detection has close to 0 effectiveness.
in all my years of exploiting and working on snticheats and script hubs i have not met one person that uses moreunc

just because it exists doesnt mean its used

this doesnt affect anything in coregui so unless ur a mobile exploiter you wont get affected

yall lowk get too heated about video game anti exploits it is NOT that serious
why are you getting the feds involved that was not off topic :sob:

anyway to be on topic this method will probably be patched sooner or later since it was publicly released, it’s better to stay server sided with checks there

3 Likes

if i had access to executors source code maybe i could find out

plus it doesnt just affect moreunc it affects 90% of vulnerability patches

me when i get kicked for flying by a server ac due to my high ping

thats never happened to me before when playing on servers with server ac while having high ping
(citadel works best)

still wont natter all that much as popular exploits like AWP, SynZ, Macsploit, Sirhurt, Nihon and Swift dont use lua to block vulnerable functions instead they do it in their exploits source according to the developers atleast

still theres going to be some random somalian child that plays on 3k ping getting kicked while not exploiting

seems like a player issue. there are more exploiters than Somalian children playing Roblox therefore combating exploiters is more of an issue

a false positive is still a false positive doesnt matter on who it is or how many people were affected

some false positives can’t be fixed in a meaningful way, but to minimize who’s affected is most important

if your on a client ac they can be fixed easily
your best option for an ac is mixing server and client like any semi decent ac does