Guest User

proof of concept

a guest
Apr 9th, 2025
19
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Lua 1.08 KB | None | 0 0
  1. local remote = game.ReplicatedStorage.YourRemote -- the remote which will be exploited.
  2. local code = 0 -- this is where we store the code when its obtained.
  3.  
  4. local OldNC;
  5. OldNC = hookmetamethod(game, "__namecall", function(Self, ...) -- hook __namecall.
  6.     local Args = {...} -- put arguments into a usable table for later.
  7.     local method = getnamecallmethod() -- get the method for later.
  8.  
  9.     if not checkcaller() then -- prevent infinite looping and detection by game anti-cheat.
  10.         if method == "FireServer" and Self == remote then -- checking if the method is :FireServer and if it was called on the remote of which we want the security code.
  11.             code = Args[1] -- assuming code is the first entry, obviously this can be different but this is a short example script so it doesnt matter.
  12.             print("Obtained code: "..tostring(code))
  13.             return OldNC(Self, ...) -- let the original :FireServer call go through to prevent issues.
  14.         end
  15.     end
  16.     return OldNC(Self, ...) -- let the original :FireServer call go through to prevent issues.
  17. end)
  18.  
Add Comment
Please, Sign In to add comment