Jump to content

CmP

Contributor
  • Posts

    663
  • Joined

  • Last visited

  • Days Won

    49

Everything posted by CmP

  1. Actually, his example is fine. There is no checks for possible errors, but it works normally as shown in the video. And this example is wrong. It won't work at all. You store "content" field of the table returned by "makeRequest" function in the variable "DESTROYER", but then you check the value of non-existing variable "Content". Non-existing variables in Lua contain special value called "nil", which is evaluated to "false" when used in conditional expressions. Therefore, "not Content" will be always equal to "true". Your example will always show the alert and never execute the line with the call to "load" function. To fix this mistake, as you have already figured out (I hope), the line if not Content then needs to be replaced with if not DESTROYER then
  2. CmP

    Record script didn't work

    Example scripts for your task are present everywhere. To change the value you need to use "setValues" function. Therefore, your next action may be checking the documentation (and the examples of usage) for this function in GG help. If it will be not enough, then you can search function name in the forum, you will find even more examples. Still not enough? No problem. Check open-source scripts. Considering that tasks similar to yours are quite common, it should not be hard to find suitable example. The only question is have you even tried to do it.
  3. Review to a script: Response from script's author: (Read the image or description) Roblox Jailbreak script (#492ojibz)
  4. CmP

    GG Chatroom

    Apply same check to the password as you did with username. tmp=Menu[1] for i=1,WhiteListWord:len() do check=WhiteListWord:sub(i) check="["..check.."]" tmp=tmp:gsub(check,"") end if tmp~="" then Warnings=Warnings.."\nX Bad Username.\nOnly letters, numbers and underline can be accepted." end User can (intentionally or not) input some characters that will break the list of parameters of the request.
  5. Open the spoiler to see error screenshot.
  6. Looks like you have troubles with it. Have read first sentence of the post and ignored everything else. You would better explain why have not you tested your changes to the original tool before creating the topic instead of defending those useless "encryption" tools you have been regularly posting here. It's really funny when you write "fixed" at the top of the web-page, but it does not work at all.
  7. Everyone knows this "encryption" is absolutely useless when user is able to run the script. Moreover, your "NEW ONLINE XOR COMPILER" does not even work properly. It fails with the following error: And the cause of it is your lack of knowledge about how to write multi-line string literals in Lua.
  8. But, if I am not mistaken, something like this is already possible by modifying lib that is loaded in process memory. This way is likely more limited than modifying the file itself, but it may work.
  9. Have you tried it at least? I highly doubt that searching for 500 consecutive addresses and editing all of them to one value can noticeably slow down your script. So are you sure that it does not suffice because of performance reasons? As pointed out above, editing values one-by-one in a loop is very inefficient. This approach should be used instead, if simple one with fuzzy search does not suffice: Example of implementing it: local startAddress = 0x12340000 local count = 500 local editValue = '555444' local values = {} for i = 1, count do values[i] = {address = startAddress; flags = gg.TYPE_DWORD; value = editValue} startAddress = startAddress + 4 end gg.setValues(values)
  10. Counter-question: what do you want to achieve by uploading a script with highly-redundant encryption (28 kb), when it's source code is less than 1 kb? What is the purpose of "encryption" that can't stop anyone from obtaining the source code? Have not you learned that there can not be "undecryptable encryption" for GG script yet? This was discussed so many times here, but you still believe in fairy tales. Last but not least, do you realize that this script is useless? Why reinvent the bicycle? The only possible value for this script would be it being an example for newbies to learn something, but for this it had to be posted as source code.
  11. If it is "nothing special", then why "encrypt" the file? No reason to hide the source code in this case, IMO. Source code: local configFile = gg.EXT_CACHE_DIR .. "/" .. gg.getFile():match("[^/]+$") .. ".cfg" local data = loadfile(configFile) if data ~= nil then data = data() end local last = gg.getFile() info = gg.prompt({ "Select Script To Encrypt:" }, data, {"file"}) if info == nil then os.exit() end if info == nil then os.exit() end gg.saveVariable(info, configFile) local open = io.open local read_file = function(path) local file = open(path, "rb") if not file then return nil end local content = file:read("*a") file:close() return content end Text = read_file("" .. info[1] .. "") if Text == nil then print("The directory or file name is wrong") else print(Text) end read_text_src.lua
  12. @DESYROLLERSE, you can't blame someone for not being able/not wanting to learn by "trial and error" approach, when you are not able/don't want to do this yourself. Just remember how many times you asked me to "give you an example" (more like write the code for you)? It looked like you were not able to progress in developing your script without getting more and more "examples". When I told similar thing to you last time, you were very angry, you were definitely thinking that I had to provide you everything you need when you ask for it. So since when you've started to agree with this statement? Looks like a clear example of hipocrisy and double standards.
  13. JZ.N_28-01 (3)_src.lua
  14. That's what I was writing about, making it possible to "leech". But you probably don't need to worry about it, until there will be high demand on the code stored at the server.
  15. Yep, file extension does not matter. Show the code and contents of the file. Without this info noone will be able to help in this case.
  16. Of course not, but in this case it does not even require medium level of "skill" or something. I agree, the protection will be stronger, but.. you forgot to consider one thing. Potential "leecher" will be able to get the code received from the server by either modifying "makeRequest" function to print/save to a file returned value or by modifying "load" function to print/save to a file it's first argument. That's all, requesting info from the server is no more required, since the "leecher" got it. After this, it can be shared with anyone.
  17. This approach looks good, but it won't guarantee protection against leechers. With some knowledge a potential leecher can easily get "ID" that is generated for his device, then just share this ID and the password to someone else. After this, "someone else" will be able to use the script by modifying "makeRequest" function to perform a "valid" (with correct ID and password) request to the server. The "leecher" even won't need to be bothered by how the ID and the request is generated, because simple modification of "makeRequest" function to print received arguments will do everything for him.
  18. That's good idea, but how are you going to generate those IDs?
    Quite useful tool for inspecting libraries in process memory. Thanks for the contribution.
  19. You write some nonsense. It's also not related with the topic anyhow. Maybe my upvote to @Lenn1's comment has "hurt" you hard enough, so that you decided to mention me?
  20. Log of using the script produced by slightly modified Script compiler: Those checks are pretty useless, because all of them can be bypassed. Script that is executing another script can override any function used for limitations (such as "blocking hooks", "setting expiration time") there. For example, a script relies on "os.date" function to check expiration time, but the function surprisingly returns not the expected result, but "0" or something else that will make that check useless.
  21. CmP

    Template

    for _=1, #Menu - 0.5 do if _ % 2 == 1 then -- ... end end is identical to for _ = 1, #Menu - 0.5, 2 do -- ... end but second option is more effective and clear.
  22. Calling "load" function with some meaningless arguments in a loop, so that logging arguments of the function call to a separate file will produce many files with junk contents. In fact, this does not "block" anything. Actual code (in compiled or non-compiled form) will still be logged to a file, if script contains it.
  23. @noblack, you forgot to delete the line in function "main". Also isVisible function does not accept arguments, so that "true" in this line is redundant. Moreover, this only works because of how Lua deals with extra arguments. From the Lua 5.3 reference manual (https://www.lua.org/manual/5.3/manual.html#3.4.11) : Another thing is that value returned by "prompt" function needs to be checked (because the dialog may be cancelled, in some cases accidentally) as well as value that is stored in "Result[4]", but I suggest you to leave these improvements to be done by the author of the topic (if he needs them at all).
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.