Another day, another exploit, and with new exploits, skidded exploits come with the dumbest ways to get their exploits detected by an Anti-Cheat.
Well, let me explain.
MantiWPF Init
MantiWPF has an init script on GitHub, using “print()” the easiest thing to detect with LogService. The funniest part is they steal from this exploit called “Solara” taking their “UNC” script. They also fake a “level” when you run printidentity it always returns 8 instead of checking.
The Detection
Simple enough. Use this for your Anti-Cheats.
local LogService = game:GetService("LogService")
LogService.MessageOut:Connect(function(message, messageType)
if string.find(message, "MantiWPF") or message == "Current identity is 8" then
print("Detected.")
end
end)
The funniest part is this “exploit” is a proven RAT.
Exactly. I’m cooking up a script to detect 70% of executor scripts that still use print. If these executor devs had brains, back in the Synapse era we would use a safer method to print.
Untested but most scripts use print() so maybe this will help y’all. 99% of executors don’t have hookfunction so y’all would probably be safe doing something like this.
-- unwanted logs
local UnwantedLogCount = 0
local UnwantedLogMax = 10
local WantedLogs = {
-- Normal logs you would have here
"Initalized player!",
"This user is a sigma..."
}
local FindWantedLogs = {
-- etc.
"User speed is"
}
local LogService = game:GetService("LogService")
LogService.MessageOut:Connect(function(message, messageType)
local detected = true
for i, v in pairs(WantedLogs) do
if message == v then
detected = false
end
end
for i, v in pairs(FindWantedLogs) do
if string.find(message, v) then
detected = false
end
end
if detected then
UnwantedLogCount += 1
end
if UnwantedLogCount == 10 then
warn("Risky activity!!")
end
end)
As a past exploiter (yes I admit, I used to cheat, however I don’t anymore, and not on my current account.)
This kid is like 100% skid, its hilarious, I looked at his executor, the API sucks, breaks almost 99% of the time, He has a help channel in his discord server but does nothing to help people. The entire UI is stolen and it executes as loadstring which is incredibly easy to detect, He dosen’t know a single thing about development (which is required as a exploiter), He uses basic functions and can’t figure out how to do a single thing legit, the entire thing is stolen code.
EDIT: I know you are probably asking, Who did he steal the UI from? Its a mashup of solara’s backend functions and visual studio code 22. LMAOOOO
I used to be in the exploiting industry, I will decompile his whole executor and publish it on github, then laugh in his face when nobody uses it anymore, because then all the skids realize its ratted.