Introduction: ROBLOX Hacking Tool Prank

This will make a very legit looking ROBLOX hacking tool that supposedly "gives you 10000000000 robux and 10000000000000000000 tix" (Or some numbers like that)

NOTE: This is not real, and don't try this on advanced users (They most likely won't fall for it)

-----COOL FEATURES-----

- It creates a folder where this file is, so if someone is advanced with computers they might even fall for it when they look in the folder

- It creates a file inside the folder called "Injector.inj"

- The file is automatically deleted if you go through the whole process

---------------------------------------------------------------------------------

INFO

- We will be using batch, so save the file as a '.bat' file

- It will be made in batch as I said above, but alternatively you can download the .exe version from this tutorial

Have fun pranking your friends!

Also this is my first instructable.

----------------------------------------------------------------------------------

REQUIREMENTS

- A text editor

- A person to use it on

Step 1: 1st Version: Batch File Version

You're going to need a text editor and you'll have to copy and paste the code below, then save it as a '.bat' (Batch) file

Here is the code for the batch file version (Scroll to the bottom to know what some advanced looking parts do. The non-bold text is the code):

<strong><br></strong><p>@echo off<br>color 0A
title Roblox H4x0r
echo Please type the username of the user to perform tix and robux hack on. The user will recieve 1000000000000 robux and 1000000000000000000000000 tix (Limited to these numbers)
set /p person=
echo Running hacks on selected user: %person% ... (1)
ping 192.0.2.2 -n 1 -w 2000 > nul
cls
echo  Scanning if user %person% exists... (2)
ping 192.0.2.2 -n 1 -w 5000 > nul
cls
echo  Finding injection script... (3)
mkdir Injector
echo InjectorWeb-ScanSite-ROBLOX.com:FINDusr:%person%nextINJECT(286389485)ROBUX1000000000000TIX1000000000000000000000000 >Injector\Injector.inj
ping 192.0.2.2 -n 1 -w 3000 > nul
cls
echo  Running anti-ban script... (4)
ping 192.0.2.2 -n 1 -w 3000 > nul
cls
echo  Preparing injection script... (5)
ping 192.0.2.2 -n 1 -w 2000 > nul
cls
echo  Checking for any online moderators... (6)
ping 192.0.2.2 -n 1 -w 5000 > nul
cls
echo Success loading and preparing files! Press any key to go to the next step: Injecting the Robux/Tix
echo ALSO: A directory has been created in the location of this file, but it will be deleted after the injector completes.
pause
:Injector
echo -------------
echo   INJECTOR   
echo -------------
echo.
echo Press any key to begin injecting...
pause
echo  Accessing ROBLOX... (1)
ping 192.0.2.2 -n 1 -w 5000 > nul
cls
echo  Relocating username... USERNAME-%person% (2)
ping 192.0.2.2 -n 1 -w 3000 > nul
cls
echo  Running ticket injector... (3)
ping 192.0.2.2 -n 1 -w 4000 > nul
cls
echo  Running Robux injector... (4)
ping 192.0.2.2 -n 1 -w 4000 > nul
cls
echo  Deleting robuxTixInjector... (5)
del /s /q \Injector\*
rmdir /s /q "Injector"
ping 192.0.2.2 -n 1 -w 2000 > nul
cls
echo Process Complete! This program is in ALPHA. 1 more step: Encrypting the robux/tix to look like they came from a valid source. (This may take a while)
pause
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul
echo %random%%random%%random%%random%%random%%random%
ping 192.0.2.2 -n 1 -w 60 > nul</p><p>pause
echo msgbox "Completed on user: %person%! Thank you for using Robux and Tix hack!" > %tmp%\tmp.vbs
cscript /nologo %tmp%\tmp.vbs
del %tmp%\tmp.vbs
exit</p>

INFO:

At the very bottom where it says "echo msgbox..." that is at the end of the "hacking" process, it'll pop up a box with that text in the quotes.

All of the "ping..." parts are simply pauses. You can change their times, but I suggest looking up how it works before changing that.

The "%random%" parts near the bottom are where the random numbers come up so it is "encrypting the robux/tix"

Step 2: Version 2: EXE Version

For this part, there isn't really anything to code, so I just converted it with a converter and you can download it here. For the image, it has a roblox symbol with the words "Hacking tool" but you can't really read that part.

Step 3: Done!

Thanks for checking out my first Instructable!

I hope you can prank some people with this!

Comments

author
roobinhood933 made it!(author)2017-04-29

Nice

author
FriendlyH1 made it!(author)2016-02-09
author
Camilo543 made it!(author)2015-02-19

You should post a virus scan of your .exe. It's probably just a converted batch file, but people should still be cautious.

author
jackrabbit898 made it!(author)2015-02-20

It's just a converted batch file. Smart people have virus scanners installed and they can just auto-scan it, but I'll try and get a virus scan in.

About This Instructable

3,661views

18favorites

License:

Bio: I am a programmer, and I can program in Python, HTML, batch, Visual Basic, XML (Although that's not really a programming language), and VBScript.
More by jackrabbit898:Batch file that only runs certain code upon first useROBLOX hacking tool prank
Add instructable to: