I fixed this issue completely in the newest update. Thank you again
Okay so I think you don’t understand the fact that exploits arent like synapse 2020 era, They are GARBAGE And can be detected using a simple methods, CloneRef Does NOT bypass Rbxassetid detection and you can go ahead and test yourself self lol.
I have already tested this before stating anything. I never said that exploits where good in anyway, you’re putting words in my mouth.
I’m clarifying that exploits aren’t even good and don’t do the service as provided, Clone Ref Does not bypass RbxAssetID detection, I don’t know what you tested but no it does not bypass it lol.
I can confirm this as I tested the code provided by OP on a mobile executor Delta. IY and DEX were both detected…
cloneref
is it is an exploit function which takes one parameter and returns one value (which is that one argument you put in). It’s name is self explanatory (it clones a reference to an Instance). Really the only use for this function is to bypass hard reference detentions.
An example said detection is:
local IsReferenced = game:GetService("Players")
local CollectionTable = setmetatable({newproxy(), IsReferenced}, {__mode = "v"})
IsReferenced = nil
while CollectionTable[1] do
task.wait()
end
if CollectionTable[2] then
print("Players is referenced")
end
True The only reason is to bypass weaktable detection, thank you for clarifying to him
it doesn’t copy it, it’s just another reference for the exact same instance, i haven’t tried but im pretty sure this wont bypass the detection
this bypass is ud (ultra detected), first of all, your hook is terrible and easily detected with many ways, like detecting __namecall not being a c closure, or detecting the function not being called at IDs that should be there, or detecting the amount of args, since __namecall is supposed to take … only
Yup, that’s true. You can actually detect majority if not all PreloadAsync hooks. Was just stating and showcasing that it can be bypassed if you don’t have those checks. I didn’t make that hookmetamethod that I posted.
jjsploit has been dead for years
No, WeAreDevs version of JJSploit is out there lol.
Have you got any easy ways to do this?
Unfortunately none that I’d give away for free, sorry.
There are multiple ways you can detect PreloadAsync Hooks though.
local contentProvider = cloneref(game:GetService("ContentProvider"))
local old = clonefunction(contentProvider.PreloadAsync)
hookmetamethod(game, "__namecall", newcclosure(function(...)
local method = getnamecallmethod()
if tostring(method) == "PreloadAsync" and not checkcaller() then
return nil
end
return old(...)
end))
Ya this is a better way of hooking PreloadAsync, the hookmetamethod I posted I didn’t make.
no, they came back as a xeno paste, funny thing is they forgot to change xeno’s init script so it printed “game.RobloxReplicatedStorage.Xeno” whenever an error happened
local found_it = false
game.ContentProvider:PreloadAsync({game.CoreGui}, function(assetId, status)
if assetId == "rbxasset://textures/ui/Scroll/scroll-top.png" then
found_it = true
end
end)
if not found_it then
print("EZ")
end
just hookfunc preload async and make it not run when the table contains ur asset ids lol
wearedevs pasted xeno and put 5000000000000000 rats inside of it i bet . #wearedevsontop