Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- --[[
- _____ _
- | __ \ | |
- | |__) |___ _ __ ___ ___ | |_ ___ ___ _ __ _ _
- | _ // _ \ '_ ` _ \ / _ \| __/ _ \/ __| '_ \| | | |
- | | \ \ __/ | | | | | (_) | || __/\__ \ |_) | |_| |
- |_| \_\___|_| |_| |_|\___/ \__\___||___/ .__/ \__, |
- | | __/ |
- |_| |___/
- ~@ Author: Local Communist#9156 & @Josh#7880
- All I did was modify Josh's Kick script to check if the functions are being called, and make them output the path and the function being called.
- Games can detect this script so beware.
- --]]
- if not getrawmetatable then
- getrawmetatable = debug.getmetatable
- end
- if not setreadonly then
- setreadonly = make_writeable
- end
- if not setreadonly and not getrawmetatable then
- print("This script is not compatible with this exploit.")
- return
- end
- local Meta,BackupMeta = assert(getrawmetatable)(game),{}
- setreadonly(Meta, false)
- for Index,Value in next,Meta do BackupMeta[Index] = Value end
- Meta.__namecall = function(Instance, ...)
- local Function = ({...})[select('#', ...)]
- local PackedArguments = {...}
- local Argument = {}
- for Index = 1, #PackedArguments - 1 do
- Argument[Index] = PackedArguments[Index]
- end
- if Function == "FireServer" or Function == "Fire" or Function == "InvokeServer" or Function == "Invoke" then
- warn(Function .. " was called.\nPath: " .. Instance:GetFullName() .. "\nArguments: " .. tostring(unpack(Argument)))
- return BackupMeta.__namecall(Instance, ...)
- end
- return BackupMeta.__namecall(Instance, ...)
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement