Detect script's and exploit's

I fixed this issue completely in the newest update. Thank you again :blush:

Okay so I think you don’t understand the fact that exploits arent like synapse 2020 era, They are GARBAGE And can be detected using a simple methods, CloneRef Does NOT bypass Rbxassetid detection and you can go ahead and test yourself self lol.

2 Likes

I have already tested this before stating anything. I never said that exploits where good in anyway, you’re putting words in my mouth.

I’m clarifying that exploits aren’t even good and don’t do the service as provided, Clone Ref Does not bypass RbxAssetID detection, I don’t know what you tested but no it does not bypass it lol.:sob:

1 Like

I can confirm this as I tested the code provided by OP on a mobile executor Delta. IY and DEX were both detected…

1 Like

cloneref is it is an exploit function which takes one parameter and returns one value (which is that one argument you put in). It’s name is self explanatory (it clones a reference to an Instance). Really the only use for this function is to bypass hard reference detentions.

An example said detection is:

local IsReferenced = game:GetService("Players")
local CollectionTable = setmetatable({newproxy(), IsReferenced}, {__mode = "v"})

IsReferenced = nil

while CollectionTable[1] do
   task.wait()
end

if CollectionTable[2] then
   print("Players is referenced")
end
5 Likes

True The only reason is to bypass weaktable detection, thank you for clarifying to him :heart:

1 Like

it doesn’t copy it, it’s just another reference for the exact same instance, i haven’t tried but im pretty sure this wont bypass the detection

this bypass is ud (ultra detected), first of all, your hook is terrible and easily detected with many ways, like detecting __namecall not being a c closure, or detecting the function not being called at IDs that should be there, or detecting the amount of args, since __namecall is supposed to take … only

2 Likes

Yup, that’s true. You can actually detect majority if not all PreloadAsync hooks. Was just stating and showcasing that it can be bypassed if you don’t have those checks. I didn’t make that hookmetamethod that I posted.

2 Likes

jjsploit has been dead for years

No, WeAreDevs version of JJSploit is out there lol.

Have you got any easy ways to do this?

1 Like

Unfortunately none that I’d give away for free, sorry.

There are multiple ways you can detect PreloadAsync Hooks though.

1 Like
local contentProvider = cloneref(game:GetService("ContentProvider"))
local old = clonefunction(contentProvider.PreloadAsync)

hookmetamethod(game, "__namecall", newcclosure(function(...)

local method = getnamecallmethod()
    if tostring(method) == "PreloadAsync" and not checkcaller() then
        return nil
    end    

return old(...)
end))
2 Likes

Ya this is a better way of hooking PreloadAsync, the hookmetamethod I posted I didn’t make.

no, they came back as a xeno paste, funny thing is they forgot to change xeno’s init script so it printed “game.RobloxReplicatedStorage.Xeno” whenever an error happened

local found_it = false

game.ContentProvider:PreloadAsync({game.CoreGui}, function(assetId, status)
    if assetId == "rbxasset://textures/ui/Scroll/scroll-top.png" then
        found_it = true
    end
end)

if not found_it then
    print("EZ")
end
2 Likes

just hookfunc preload async and make it not run when the table contains ur asset ids lol

wearedevs pasted xeno and put 5000000000000000 rats inside of it i bet :fire:. #wearedevsontop

1 Like