So the genius developers behind Fluxus thought it was a good idea to change the memory address from 64 bit to 32 bit hoping nobody would notice, well to bad.
This has to be one of the simplest injection detections out there, I can’t believe it even works in the first place.
while task.wait(0.5) do
local BufferAddress = tostring(buffer.create(123))
if string.find(BufferAddress, '0x000000') then
print("fluxus")
end
end
Not to mention, you can find many more detections by just messing around in studio for an hour or so. Their “internal UI” is handled in lua so if you get their environment you can make changes to their UI (it’s very much possible to get their environment)
It can detect all players who downgraded to 32 bit. Afaik every main OS (even macOS) is 64-bit only.
Fluxus doesn’t really matter, it’s just one of those exploits who downgrade the client, otherwise they would have to write code themselves (which exploit devs despise)
But mobile still appears to be 32 bit. There was a part of RDC revealing Hyperion was being ported over to Android however, besides, it’s a simple check for UserInputService.TouchEnabled or not GuiService.IsWindows.
EDIT: Uhhh… It’s just a simple additional check? This detection was posted here before, and the solution to stop mobile players getting kicked was the same: just don’t detect mobile players with the same way you can know if the device running the game is a mobile device.