Advertisement
Guest User

Environment Exploit Tester, Tsk Tsk. Don't worry.

a guest
Dec 14th, 2018
104
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.94 KB | None | 0 0
  1. local proxy = {}
  2. local f = function(s, ...)
  3. local found
  4. for k, v in pairs(getfenv(0)) do
  5. found = true
  6. break
  7. end
  8. if getfenv(0) ~= getfenv(1) and found then
  9. do
  10. local i = 0
  11. while true do
  12. do
  13. local env
  14. local success, result = pcall(function()
  15. env = getfenv(i)
  16. end)
  17. if env then
  18. print("Environment level", i)
  19. for k, v in pairs(env) do
  20. print("\t", "[", k, "] -", typeof(v), v)
  21. end
  22. i = i + 1
  23. else
  24. break
  25. end
  26. end
  27. end
  28. local h = Instance.new("Hint", workspace)
  29. h.Text = "Environment exploit found."
  30. end
  31. end
  32. end
  33. local wrapper_metatable = {
  34. __newindex = f,
  35. __call = f,
  36. __concat = f,
  37. __unm = f,
  38. __add = f,
  39. __sub = f,
  40. __mul = f,
  41. __div = f,
  42. __mod = f,
  43. __pow = f,
  44. __tostring = f,
  45. __metatable = {},
  46. __eq = f,
  47. __lt = f,
  48. __le = f,
  49. __gc = f,
  50. __len = f
  51. }
  52. setmetatable(proxy, wrapper_metatable)
  53. f()
  54. return proxy
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement