Closed paquito800 closed 3 months ago
Lost it + it was quite bad either way. In simple terms, it just gets the address where libroblox.so is mapped in memory and adds it to the function addresses obtained from ida to hook or call functions.
Pretty much how you make a hack for a game fundamentally.
Alright, And where does it load the UI?
Alright, And where does it load the UI?
It loads it by running a luau script.
oh ok, is the luau script located in the customlib.so?
oh ok, is the luau script located in the customlib.so?
Yes.
Tysm, last question, which function is used to load the UI (or whatever luau code) on libroblox.so
Tysm, last question, which function is used to load the UI (or whatever luau code) on libroblox.so
Well, this is done by obtaining a lua state from robloxs environment, then loading a lua closure with the bytecode of the ui and running that closure
can you give us an tutorial or point us to more learning materials to research, how to find these adresses? kind regards
can you give us an tutorial or point us to more learning materials to research, how to find these adresses? kind regards
well, for the most part you're gonna have to do your own reverse engineering, there's many sources in GitHub which even if they're old, there's many things that still apply, such as the Synapse 2019 source for example. Also in old v3rm some resources may have been archived.
Hi, I was wondering if you could re upload your mobileblox to github or send it to me, I really wanna learn how mobile exploits work, I know you load a lib from lib folder in ActivityNativeMain file, however I want to know what the lib contains to load code to roblox. my discord is: poncharelo, I can pay for it. Thanks