Hello !
My English is kinda bad so bare with me
Well You Know exploiters using obfuscation to hide their code in some forums
we can at least constant dump it to get some info what are they doing and hopefully you can patch stuff
i will use Repl.it for this tutorial
let’s say we have a sample of ironbrew which is print(“Hello”)
for psu we can use a Lua Beautifier tool
after you beauty it just go and put it in repl.it and jump to break number 5
you see that l[t] = o
we will print o which is the constants which will give us some info [ note that will change ] because it’s random but i got that l[t] = o
after we put a print(o) which is in our example is o it might be a b or c in ur side
it should be like this in my example which is o
hopefully that help and sorry for my english not my main
keep in mind i didn’t make the method i just transferred knowledge here i just explained how to do it
I get your point, but even if he/she didn’t make this thread it’s good that she/he brought it to the DevForum as most developers don’t use v3rmillion as it’s known for it’s exploiters
In Lua bytecode there’s nil, bool, string, and number constants, the one shown here only dumps strings/string constants. Print shows because IB VM does