A powerful Discord bot that deobfuscates multiple types of Lua obfuscators including Moonsec V3, IronBrew, Luarmor, WeAreDevs, and Veil.
- Import this repository - Go to Replit and click "Import from GitHub"
- Paste the repository URL - Use the GitHub URL of this project
- Add Bot Credentials - Go to the "Secrets" tab and add:
DISCORD_TOKEN= Your Discord bot tokenCLIENT_ID= Your Discord application client ID
- Click Run - The bot will start automatically!
-
Clone the repository ```bash git clone https://github.com/yourusername/lua-deobfuscator-bot.git cd lua-deobfuscator-bot ```
-
Install dependencies ```bash npm install ```
-
Set up environment variables
- Copy
.env.exampleto.env - Add your Discord bot credentials: ```env DISCORD_TOKEN=your_bot_token_here CLIENT_ID=your_bot_client_id_here ```
- Copy
-
Start the bot ```bash npm start ```
- Click the deploy button above
- Set the required environment variables in Heroku
- Deploy and your bot will be online!
```bash docker build -t lua-deobfuscator-bot . docker run -e DISCORD_TOKEN=your_token -e CLIENT_ID=your_client_id lua-deobfuscator-bot ```
- Moonsec V3 - String tables, variable obfuscation
- IronBrew - Hex encoding, getfenv/setfenv patterns
- Luarmor - Uppercase variables, bit32 operations
- WeAreDevs - Base64 decoding
- Veil - Escape sequence decoding
- Generic - Fallback for unknown obfuscators
Deobfuscate code directly by pasting it into the command.
Fetch and deobfuscate code from any URL (Pastebin, GitHub, etc.).
Upload a .lua, .txt, .luau, or .luac file to deobfuscate.
- 🔍 Automatic Detection - Identifies obfuscator type automatically
- 📊 Detailed Statistics - Shows variables renamed, strings replaced, etc.
- 📁 File Output - Always returns results as downloadable
.txtfiles - 🛡️ Error Handling - User-friendly error messages and validation
- 📱 Multiple Input Methods - Code, URLs, and file uploads
- 🎯 Smart Processing - Handles files up to 10MB and 500KB of code
- Go to Discord Developer Portal
- Click "New Application" and give it a name
- Go to the "Bot" section and click "Add Bot"
- Copy the token and add it to Replit Secrets or your
.envfile asDISCORD_TOKEN - Copy the Application ID from "General Information" and add as
CLIENT_ID - Invite the bot to your server with the "bot" and "applications.commands" scopes
``` /deobf code local a = {"Hello", "World"}; print(a[1] .. " " .. a[2]) ```
The bot will automatically detect the obfuscation type, process the code, and return a clean, readable version as a downloadable file.
- Send Messages
- Use Slash Commands
- Attach Files
- Embed Links
- Import from GitHub to Replit
- Add tokens to Secrets tab
- Click Run - that's it!
- Perfect for beginners
- Use the deploy button above
- Set environment variables in Heroku dashboard
- Uses the included
Procfile
- Connect your GitHub repository
- Set environment variables
- Auto-deploys on push
- Build with the included
Dockerfile - Run with environment variables
- Perfect for VPS deployment
- Clone and run with
npm start - Great for testing and development
- Fork the repository
- Create a feature branch
- Make your changes
- Test thoroughly
- Submit a pull request
This project is licensed under the MIT License - see the LICENSE file for details.
If you encounter any issues:
- Check the Issues page
- Create a new issue with detailed information
- Include error logs and steps to reproduce