Jump to content

Pyxe

Ascended
  • Posts

    59
  • Joined

  • Last visited

File Comments posted by Pyxe

  1. On 8/20/2018 at 7:49 AM, Hard1337 said:

    LoL the script is online an can be turn on or off by you ?!?!?! The next stupid think....you can steal the Login datas like pw gogle acc ..... and infect your device with viruses....DONT DOWNLOAD THIS SCRIPT !!!

     

    Lol where is your proof? The script is completely server sided so Thats how it loads the script. Lmao learn your facts before you type.

  2. 1 minute ago, Dj-jom2x said:

    so you admit it or nah?

    and "thats not in my code" or "thats not my code but I add it anyways?" 

     

    when u say * that's not in *.. it means you dint write that inside your Script.

     

    but it's clearly you stating it at the top of your script .. name *ExampleServerEnc.lua* 17 mins ago

    --Encryptor Made By Chikri
    print('Script Encryptor Made By Chikri')
    function encodes(key,code)

    that word *made" is strongly enough to prove it.

     

    well ? have a good day. also btw before 17 mins you uploaded the non Encrypted version .. which gets script from pastebin... then after that you uploaded an encrypted version. ? its useless then ? right? they can use any web request logger to get the script :). 4 mins before you change your idea of releasing it raw ? thats kinda cute.

    I accidently did ?, but my script is encrypted with the compiler from gg. So idk.

    _______________________________________________
    added 1 minute later

    Oh i uploaded the wrong file again?

  3. Just now, Dj-jom2x said:

    --Encryptor Made By Chikri
    print('Script Encryptor Made By Chikri')
    function encodes(key,code)

    --YIC新加密算法
    print('@yic77455')
    function Yicjm(key,code)

    if your not chikri is this stolen then?

    Thats not in my code tho, and thats just so no one steals my script...

  4. 1 hour ago, PUSHER1337 said:

    SCAM LOL I DONT ACCEPT 

     

    2 hours ago, backmountina said:

    Be careful , this script access network.  

    How do you know its a scam? It accesses network so i can turn the script on and off when i please.

  5. On 8/5/2018 at 12:44 AM, saiaapiz said:

    Nice, i know you using my shi*yy script as framework .. xD
    When i decompiled your script, i see variable, function copied from other script.

    Btw, please put proper credit next time.. 

    Oh sorry i forgot esp was yours, ill add next update, sorry for the inconvenience.

    _______________________________________________
    added 3 minutes later
    12 hours ago, Hard1337 said:

    what does it mean using with framework ? ?

    What do you mean by that?

    Script Manager

       5,371    8
    15 minutes ago, WeAre said:

    No working.

    Number 1 no saved.

    Number 2 force close

    I will fix asap, but i wanna thank you for taking your time and commenting, most people would no do that ?

  6. 3 hours ago, XxhentaixX said:

    this is hilarious. guys don`t weven pay, this guy his name is shikri, he is 11 years and is well known for making cheats with a lot of bull****.

    he never made a guns of boom script to begin with...stealing values is easy..aint it shikri>?

    btw I saw you work that you did on Forward assault...freezing aimo of every gun 1 by 1 is not a aimo hack...everyone can do that...but that's no work man...every game has 1 value for all type of guns...shotguns/assaultguns/snipers...it does not make any since to make guns 1 by 1 buddy...

    1, im not 11 and im not a boy. 2. How are my scripts bs 3. I didn't steal any "values" 4. just because i never made a guns of boom script, doesnt mean i cant make one? 5. What does this have to do with forward assault

  7. 7 hours ago, CmP said:

    No need to pay someone when the script is "protected" like this:

    
    117  [-]  GETTABUP  12 0 -56  ; 0 null "os"
      118  [-]  GETTABLE  12 12 -57  ; "date"
      119  [-]  LOADK  13 -58  ; "%A"
      120  [-]  CALL  12 2 2
      121  [-]  EQ  1 12 -59  ; - "Wednesday"
      122  [-]  JMP  25  ; to 148
      123  [-]  GETTABUP  12 0 -56  ; 0 null "os"
      124  [-]  GETTABLE  12 12 -57  ; "date"
      125  [-]  LOADK  13 -58  ; "%A"
      126  [-]  CALL  12 2 2
      127  [-]  EQ  1 12 -60  ; - "Thursday"
      128  [-]  JMP  19  ; to 148
      129  [-]  GETTABUP  12 0 -56  ; 0 null "os"
      130  [-]  GETTABLE  12 12 -57  ; "date"
      131  [-]  LOADK  13 -58  ; "%A"
      132  [-]  CALL  12 2 2
      133  [-]  EQ  1 12 -61  ; - "Friday"
      134  [-]  JMP  13  ; to 148
      135  [-]  GETTABUP  12 0 -56  ; 0 null "os"
      136  [-]  GETTABLE  12 12 -57  ; "date"
      137  [-]  LOADK  13 -58  ; "%A"
      138  [-]  CALL  12 2 2
      139  [-]  EQ  1 12 -62  ; - "Monday"
      140  [-]  JMP  7  ; to 148
      141  [-]  GETTABUP  12 0 -56  ; 0 null "os"
      142  [-]  GETTABLE  12 12 -57  ; "date"
      143  [-]  LOADK  13 -58  ; "%A"
      144  [-]  CALL  12 2 2
      145  [-]  EQ  1 12 -63  ; - "Tuesday"
      146  [-]  JMP  1  ; to 148
      147  [-]  LOADBOOL  12 0 1
      148  [-]  LOADBOOL  12 1 0
      149  [-]  EQ  0 12 -64  ; - true
      150  [-]  JMP  2  ; to 153
      151  [-]  GETTABUP  13 0 -43  ; 0 null "start"
      152  [-]  CALL  13 1 1

    You can simply change one letter of each string, that is compared with the value returned by os.date('%A') and voila:
    image.thumb.png.90a5e57928687ed90ab83819beb46cba.png

    Lmao, smart guy. But the problem is its protected in 3 different ways.

    _______________________________________________
    added 0 minutes later
    8 hours ago, Giuseppe19 said:

    Trash, says need to pay $ to a PayPal address. No proof ill get working lua

     

    10 hours ago, imBlind said:

    i dont get it ..? i cant load any cheats you could have said on here thats its $5 for the scriptz so we dont waist time downloading.

    It is like a trial, its free on the weekends, try it tommorow and if it works, please update your comment.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.