Last active
May 27, 2025 09:39
-
-
Save depthso/0f68b78a201e0bd967018971b029ac02 to your computer and use it in GitHub Desktop.
Escape the stack into the executor's ENV
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --[[ | |
| @author depso (depthso) | |
| @description Escape the stack into the executor's ENV | |
| Example usage: | |
| local Payload = require(game.ReplicatedStorage.ModuleScript) | |
| --// fireSignal escape | |
| local Remote = workspace:WaitForChild("RemoteEvent") | |
| Remote.OnClientEvent:Connect(function() | |
| Payload.Escape("Remote") | |
| end) | |
| ]] | |
| local Module = {} | |
| local function Payload(Tag) | |
| local ExecutorName = identifyexecutor() -- Executor function | |
| print(`{ExecutorName} is bozo | Type: {Tag}`) | |
| end | |
| local function IsExploitENV(ENV) | |
| local rconsoleprint = ENV.rconsoleprint | |
| return rconsoleprint and true or false | |
| end | |
| local function TestStack(Stack, Tag) | |
| local ENV = getfenv(Stack) | |
| local IsExploit = IsExploitENV(ENV) | |
| if not IsExploit then return end | |
| setfenv(Payload, ENV) | |
| xpcall(function() | |
| Payload(Tag) | |
| end, warn) | |
| return true | |
| end | |
| function Module.Escape(Tag) | |
| for Stack = 0, 20 do | |
| local Success = TestStack(Stack, Tag) | |
| if Success then return true end | |
| end | |
| end | |
| return Module |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment