rafaeninja
Active member
70% method for finding out if an obfuscated script has a grabber.
How to use:
Just add it to the first line of any .lua file.
How it works:
Basically, it disables some functions and prints the parameters of these functions.
These specific functions may or may not call malicious code hosted somewhere, or hidden within the script folder.
However, as mentioned, it is 70% effective as there are several other ways.
Note:
To add more functions, just follow the same pattern.
-------------------------------------------------------------------------------------------------------------
How to use:
Just add it to the first line of any .lua file.
How it works:
Basically, it disables some functions and prints the parameters of these functions.
These specific functions may or may not call malicious code hosted somewhere, or hidden within the script folder.
However, as mentioned, it is 70% effective as there are several other ways.
Note:
To add more functions, just follow the same pattern.
-------------------------------------------------------------------------------------------------------------
Code:
function PerformHttpRequest(url, callback, method, data, headers)
print("PerformHttpRequest:")
print("URL:", url)
print("Callback:", callback)
print("Method:", method)
print("Data:", data)
print("Headers:", headers)
end
function SendWebhookMessage(webhook, message)
print("SendWebhookMessage:")
print("Webhook:", webhook)
print("Message:", message)
end
function CreateDui(link, x, y)
print("CreateDui:")
print("Link:", link)
print("X Coordinate:", x)
print("Y Coordinate:", y)
end
function loadstring(str, chunkname)
print("loadstring:")
print("String:", str)
print("Chunk Name:", chunkname)
end
function dofile(filename)
print("dofile:")
print("Filename:", filename)
end
function require(modname)
print("require:")
print("Module Name:", modname)
end
function loadfile(filename, mode, env)
print("loadfile:")
print("Filename:", filename)
print("Mode:", mode)
print("Environment:", env)
end