Oh weird…Ok well sorry for the trouble.
Exploiter means Cheater, Hacker means you’re hacking into ROBLOX Database, or any storage, that has personal, and private information, that isn’t suppose to be shown to unwanted people, or leaked.
This helped so much, me and my friend stopped being friends due to an argument, so he added Backdoors into my game before I could take his team-create. I added this plugin and it detected ALL of them. This saved my project. Thank you so much.
I think exoliner is a backdoor/serverside name.
yea it is the developer of the anti virus works for them (idk if they do anymore) but its kinda funny
Why should I honestly trust this plugin even if you tell me to, You have videos on your channel telling others how to steal a plugin’s source code and copy shirts, Imma pass from this plugin.
Not sure how making videos on gaining source to a plugin which is used for checking if a plugin is malicious can make me untrustable.
And, I do regret making the shirt video as it’s really petty. Pardon me for that.
You can always check my plugin’s source for backdoors and determine if the plugin is safe yourself.
Alr alr man I didnt “mean” to be that “mean”, Imma just install it again.
After all thats why I have a “friendly smile”
How do you get back a script that has been quarantined? Since I fogot to whitelist it and now I can’t get it back. Is there a possible way?
You can use CTRL + Z. If that doesnt work, you can do it manually through information in the comments.
you’re antivirus is really cool that but theres something wrong
for example in one of my scripts i have this line of code
proximityprompt.RequiresLineOfSight = true
it detected it for having the require word, you should fix that
and you should also make the detecting system more “enhanced”
like for example theres something called string patterns, you should use them
for example try to make something like “require(%d+$)”
that way it will reduce false positives, you should also use “getfenv()” instead of just getfenv
But then you have this problem:
local bypassed = getfenv
bypassed().require = "print" -- forgive me if this is wrong, i literally just forgot how to use getfenv
Though the “Requires” bug is really annoying and easily fixed by what you mentioned.
If you were wondering what I meant, this topic will explain everything How would i detect a word with a string pattern - #15 by geometricalC2123
And when I tried the code this error popped up
input:2: local ‘bypassed’ is not callable (a nil value)
And plus, I tried just using get the local getfenv,
input:1: syntax error near ‘bypassed’
Theres no reason to use “getfenv()” rather than “getfenv”. Literally increases methods to bypass my plugin.
Dont worry, I am perfectly aware and am fluent within string patterns. Gameguard V3 is going to use them, but I’ve stopped developing on Roblox so theres a very low chance I will finish V3 unless I get the option to sell plugins.
ok well u dont need to change the getfenv, its just the require is the issue
and i recommend instead of %d, make it . because they can use a loadstring module to require stuff
I will make a stupid question but most of the scripts this plugin deletes are not viruses for example the require or getfenv dont do anything in the game
I agree with everything else in your post but this. In what point in Roblox did you ever need to get the environment of a function? If you ever needed to, it’s probably for a custom Lua VM, or a way to hide direct call to a function.
The only reason to make a custom VM is for, of course, obfuscation or a custom loadstring.
The only reason you’d think about hiding a call to a function is if you’d want to do something suspicious, such as loading up a backdoor’s linker.
I agree with how the plugin picks up a ton of false positives. This is because I dont use string manipulation and patterns within it. I’m going to use string patterns in Gameguard V3.