Last active
March 9, 2026 17:28
-
-
Save depthso/247f5d49f411eca89ee9278a7ebe8841 to your computer and use it in GitHub Desktop.
Determines whether the executor you are using is shit. Paste this if you're gay (Lyth moment?)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --[[ | |
| @author depso (depthso) | |
| @description Shitsploit hook detection, this is so incredibily sad that this actually works, insane yield handlers | |
| Arceus forever and always detected! Shout out to mlemix | |
| ]] | |
| local Model = Instance.new("Model", workspace) | |
| Model.Name = "Pibble" | |
| task.spawn(function() | |
| local Test = Model:WaitForChild("Son", 15) | |
| if Test ~= nil then | |
| warn("Yep our executor is UD") | |
| else | |
| warn("Wow good executor saar") | |
| end | |
| end) | |
| wait(1) | |
| --// Executor part, literally nothing should change but it does.... | |
| local OldName; OldName = hookmetamethod(game, "__namecall", function(...) | |
| return OldName(...) | |
| end) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment