This article is only for information on what an exploit is.

An exploit is the use of glitches and software vulnerabilities in Roblox by a player to alter the game or earn lots of money/points for an unfair advantage. Exploits have been defined as a form of cheating; however, the precise meaning of what is or is not considered an exploit can be debated.

Many users believe that the correct term for programs that change Roblox for a player's advantage is “exploiting”, and others believe “hacking” is the correct term. However, hacking is the act of gaining unauthorized access to a system while exploiting is abusing a vulnerability to do the same.

Exploiting is a bannable offense and a player will be banned if caught exploiting (most likely an account deletion, and even a poison/IP ban). FilteringEnabled has lead to the downfall of many exploits, though a method called Backdooring serves as the current/only method to injecting server-side code into the server and effectively bypassing FilteringEnabled entirely, being added through free models or by gaining an owner's trust and being put in via the place editor.

Types of exploits

Bytecode through loadstring function. Lua bytecode When Lua runs programs, the Lua virtual machine compiles code to Lua bytecode before it is interpreted. This process is irreversible without artefacts (via decompilation) and thus was frequently used for Code Obfuscation.

Lua bytecode does not have the same structure as Lua and allows, by unconventional means, manipulation of the stack and other things that are not possible in normal Lua programming. It is possible, though difficult, to write Lua assembly code manually and to assemble it into Lua bytecode. The Roblox process can load Lua code and Lua bytecode through use of the loadstring function.

It has been proposed on the Lua mailing list that direct stack manipulation could be used to access the environment of other functions during their execution and, therefore, to steal values from these functions (including C functions that Lua has access to), something which is not possible in pure Lua.

The Roblox user NecroBumpist proved the idea to be true and possible.[1] Using Lua bytecode, he created a function that allowed a script to steal values from other functions, including C functions. This made it possible to steal values from Roblox's API's, but months passed until someone found a way to use this bug to modify the global environment and to become capable to make the core scripts and the join script execute any Lua code in a game server.

This resulted in the removal of bytecode from Roblox and the ability to use it with the loading function.[2] Despite common belief, this exploit was unrelated to a Direct Dynamic Library (DLL) exploit in the same time period. The removal of bytecode had no other side effect than rendering code obfuscation impossible without other means.

Proto Conversion

After the removal of the Lua compiler from the client, Roblox made heavy changes to the Lua VM. Roblox-compatible bytecode after the change contained heavy use of encryption and obfuscation and required special signing from the server, which is where all client scripts were compiled. Generating this new bytecode from scratch would prove near impossible for would-be exploiters.

In the summer of 2015, a user named Chirality on an underground Roblox exploit development/marketplace forum called "V3rmillion"[3] came up with an idea: By using the regular vanilla Lua compiler to generate a Lua function prototype, then modifying it to be compatible with Roblox's VM, he could achieve script execution. This process was made easier through use of C++'s very flexible data types, where after reversing the right structs, accessing all the data from a Roblox function prototype was trivial.

After solving the encryption, Chirality achieved script execution, and dubbed his method "proto conversion." He then created an exploit called Seven, which was the first of many exploits to use the new method. Some of the most prevalent and infamous exploits in history, such as Elysian, Intriga, Protosmasher, Synapse, Cerberus, and EX-7, have used this method to execute scripts.

Lua Wrapping

A new method to obtain script execution was also in the works after the heavy VM changes that Roblox implemented. This method - dubbed "Lua wrapping" or just "wrapping", became the second most popular method to obtain script execution. This method worked by generating a fake Roblox environment in a normal Lua instance and emulating the regular Roblox environment in C functions implemented by the exploit. This made Roblox's attempts to patch these exploits extremely hard, allowing them to survive major security updates without any features lost.

Early attempts to implement this method of script execution were the highly popular 'Alx' and 'Nyx' exploits - made by the two major exploit developers of the time, Austin, and Chirality, respectively. Both of these exploits were later rewritten to use Proto Conversion instead.

Around 2 years later, a new class of wrapper exploits was born with the release of the 'RaindropV2' (later renamed to 'Synapse') exploit by developer 3dsboy08. Around a month later, another exploit named 'Seraph' also implemented the same method of obtaining script execution. Both of these exploits largely used the same methods described at the top of this section.

DLL Injection

Most current exploits are DLL files that are injected into Roblox using a DLL injector. Once injected, the exploit is able to function correctly. Injecting a DLL into a process is not all that is required, as Roblox has introduced many safeguards to prevent memory from being manipulated easily. 

Lag Switching

Lag switching is an exploit that has not been patched since a demonstration in 2015. Loading up a lagswitch will allow you to use the hotkeys available. If the user triggers the activation, their computer will stop sending signals to the modem in this case the user is already using Roblox and can roam around freely, the user must reconnect their computer to the internet in 9 seconds or Roblox will shut down. If the user deactivates the lag switch, their client returns to normal. People complain about this exploit as users can "teleport" to almost anywhere in the game.

FE Bypassing.

This kind of exploit has 2 sub-branches, FE Backdoors and FE Methods.

'FE' Backdoors: In this scenario, the exploiter must have access to your game. The exploiter what will do is insert a script inside the game that allows running lua scripts as if it were part of the game, replicating them to all players. This kind of exploits have been seen all around cafes, Theatres and "Fan meeting" games. It's really hard for the exploiter to be able to insert backdoors as it takes a lot of time to gain enough trust in famous games.

FE Methods: In this scenario, only a few users have actually access to these methods. Exploit developers such as harkinian, Unverified or Moon, have developed advanced bypassing methods that are able to replicate anything within the client. These exploits are extremely dangerous and yet very rare around the exploiting community itself, even though there are already FE Methods on sale, only a few actually work outside simple baseplate games.

Exploit Levels

Levels are the Roblox Thread Identity that the script executed through the roblox exploit is running. Normal LocalScripts run with Level 2, Roblox Scripts usually run with Level 3-4, the Command Bar on Roblox Studio runs with Level 5, and Plugins in Studio run in level 6. It is a common misconception that levels assosciate with how well an exploit is, but in reality, if you could already execute in roblox, you could set the level. Most exploits run their scripts in Level 6 and intentionally downgrade their levels when calling certain functions in-game to avoid detection. Level 7 is an upper level that is suspect of being fake and a scam. But it's been show that exploits such as Synapse X or Protosmasher have reached that level.


Anti-Exploits are scripts coded by the player/developer themselves, it is currently used against exploiters who try to alter the game. Mostly however, Anti-Exploits still have weaknesses, it can be deleted. Anti-Exploits are used when there are still exploits unpatched by Roblox Updates.


Many players have criticized exploiters, as they can ruin the game by deleting parts, ruining the game's experience, inserting random models, kicking players out of the game etc. Some players also take it to the extent that they call exploiters noobs. Even in fighting games, users who spot exploiters say they have no skill or talent.

Some exploiters have inserted inappropriate models, decals, and sounds and used scripts to do inappropriate things to avatars in game, prompting concerns of parents when such exploits are exposed to children. The most severe case of this and exploits in general was on the 4th of July 2018 when two exploiters were doing strongly inappropriate actions to a 7-year-old girl's avatar. This incident was featured heavily on several news websites, leading to Roblox permanently banning the exploiters and applying restrictions to Experimental Mode games (see Criticism of Roblox#Experimental Mode Game Restrictions for more info).[4][5]

See also


  1. Necro's Magical Bytecode Exploits, Roblox forums,
  2. John Shedletsky, Bye Bye Bytecode, Roblox Blog,
  3. V3rmillion, a forum with a large community of Roblox exploiters


Community content is available under CC-BY-SA unless otherwise noted.