Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I recently quit working for astral (not going into that). I'm not releasing this against anyone, but I'm releasing it against every whitelisted script hub gui. I hate them now.
- Depending on how smart the script devs are, you might need to be whitelisted to get to the link. If they use some sort of Yes/No on php, you can modify the return value to be whatever you want.
- What this does:
- Basic metamethod hooking.
- This works the same way as Remote spy and the loadstring hook, just some extra code to unlock the __namecall metatable.
- The script will print out the link of any call to HttpGet. This is very powerful, and I feel bad for releasing it. But it's time to stop these hubs.
- How To Use:
- 1. Execute script below vvvv
- 2. Clear
- 3. Run the script that they give you. (Most likely a loadstring, but whatever this will still work)
- 4. Check your console, it will print any link that is HttpGet(ed).
- Code:
- MetaMethods, Backup = getrawmetatable(game), {}
- for i,v in next, MetaMethods do Backup[i] = v end
- setreadonly(MetaMethods, false) -- You may need to modify this to work with your exploit. (Synapse/Elysain already)
- MetaMethods.__namecall = function(...)
- local Tabl = {...}
- if Tabl[#Tabl] == "HttpGet" then
- print(Tabl[2]) -- You can make this copy to your clipboard
- local downloadedData = Backup.__namecall(...)
- copystring(downloadedData) -- You may need to modify this to work with your exploit. (Synapse already)
- return "" -- You can modify this to return any string you want.
- else
- return Backup.__namecall(...)
- end
- end
- setreadonly(MetaMethods, true) -- Enables readonly (patched detection method) Modify the same way as the first one.
- K, have fun everyone. And do remember, other people bought the script too, so think twice when it comes to releasing sources.
- I can't wait for nebula.
Add Comment
Please, Sign In to add comment