Étape 1: 1ère version : version du fichier Batch
Vous allez avoir besoin d’un éditeur de texte et vous devrez copier et coller le code ci-dessous, puis enregistrez-le sous forme de fichier « .bat » (lot)
Voici le code pour la version de fichier de lot (défiler vers le bas pour savoir que certaines avancées à la recherche de pièces. Le texte non gras est le code) :
<strong><br></strong><p> off<br>color 0A title Roblox H4x0r echo Please type the username of the user to perform tix and robux hack on. The user will recieve 1000000000000 robux and 1000000000000000000000000 tix (Limited to these numbers) set /p person= echo Running hacks on selected user: %person% ... (1) ping 192.0.2.2 -n 1 -w 2000 > nul cls echo Scanning if user %person% exists... (2) ping 192.0.2.2 -n 1 -w 5000 > nul cls echo Finding injection script... (3) mkdir Injector echo InjectorWeb-ScanSite-ROBLOX.com:FINDusr:%person%nextINJECT(286389485)ROBUX1000000000000TIX1000000000000000000000000 >Injector\Injector.inj ping 192.0.2.2 -n 1 -w 3000 > nul cls echo Running anti-ban script... (4) ping 192.0.2.2 -n 1 -w 3000 > nul cls echo Preparing injection script... (5) ping 192.0.2.2 -n 1 -w 2000 > nul cls echo Checking for any online moderators... (6) ping 192.0.2.2 -n 1 -w 5000 > nul cls echo Success loading and preparing files! Press any key to go to the next step: Injecting the Robux/Tix echo ALSO: A directory has been created in the location of this file, but it will be deleted after the injector completes. pause :Injector echo ------------- echo INJECTOR echo ------------- echo. echo Press any key to begin injecting... pause echo Accessing ROBLOX... (1) ping 192.0.2.2 -n 1 -w 5000 > nul cls echo Relocating username... USERNAME-%person% (2) ping 192.0.2.2 -n 1 -w 3000 > nul cls echo Running ticket injector... (3) ping 192.0.2.2 -n 1 -w 4000 > nul cls echo Running Robux injector... (4) ping 192.0.2.2 -n 1 -w 4000 > nul cls echo Deleting robuxTixInjector... (5) del /s /q \Injector\* rmdir /s /q "Injector" ping 192.0.2.2 -n 1 -w 2000 > nul cls echo Process Complete! This program is in ALPHA. 1 more step: Encrypting the robux/tix to look like they came from a valid source. (This may take a while) pause echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul echo %random%%random%%random%%random%%random%%random% ping 192.0.2.2 -n 1 -w 60 > nul</p><p>pause echo msgbox "Completed on user: %person%! Thank you for using Robux and Tix hack!" > %tmp%\tmp.vbs cscript /nologo %tmp%\tmp.vbs del %tmp%\tmp.vbs exit</p>
INFOS :
Tout en bas où il est dit « echo msgbox... », c’est à la fin du processus de « piratage », il va apparaître une boîte avec ce texte entre les guillemets.
Toutes les pièces « ping... » sont tout simplement des pauses. Vous pouvez modifier leur temps, mais je suggère de chercher comment il fonctionne avant de changer cela.
Les pièces « aléatoire % » près du bas sont où les nombres aléatoires sont vers le haut pour que c’est « crypter le robux/tix »