ROXGUARD ENGINE

The only Lua obfuscator
you'll ever need.

Free RoxGuard exports use a 30 minute watermark window after 5 guided Roxerion steps. Clean exports stay notification-free, but each one needs its own completed Roxerion task.

5 Roxerion steps · 30 minute free watermark window · clean = 1 task each
<100ms
Average speed
15+
Security layers
5
Unlock steps
30m
Access window
PROTECTION LAYERS

Enterprise-grade protection.
Ready when you are.

15+ independent security layers in every build. From VM encryption to anti-tamper, RoxGuard delivers the full protection stack.

Register-Based VM

Your code runs inside a custom virtual machine with a proprietary instruction set. Every build generates a unique architecture. No two outputs share the same bytecode format.

Per-build unique Custom opcodes

Multi-Layer String Encryption

Strings pass through RC4 with key fragmentation, Drop-768 key discard, and constant array shuffling. Per-build keys mean static analysis yields nothing.

RC4 + XOR Key fragmentation

Control Flow Flattening

Program logic is shattered into shuffled state-machine blocks with encrypted transitions. The original execution order is mathematically unrecoverable.

State machine dispatch Encrypted transitions

Anti-Tamper & Anti-Hook

Multiple integrity checks, environment fingerprinting, and metamethod traps. Any modification to the output triggers non-reversible self-corruption.

Integrity validation Self-destruct

Per-Build Polymorphism

Every obfuscation produces structurally different output. Different variable names, dispatch patterns, wrapper styles, dead code. Reversing one build teaches nothing about the next.

4 wrapper variants 15 predicate types

Sandbox Detection

Detects deobfuscation sandboxes by neutralizing debug.getinfo, debug.sethook, debug.getlocal, and environment inspection. Attackers get corrupted output.

Environment lockdown Anti-debug
UNDER THE HOOD

What RoxGuard does to your code

15+ independent security transforms applied to every build. Custom transform engine, bytecode compiler, and VM generator built from scratch.

VM Execution

Code compiles to custom bytecode and runs inside a unique virtual machine per build.

Multi-Layer Bytecode Cipher

Multiple chained stream ciphers protect the instruction stream. Each build uses unique seeds and key schedules.

String Encryption (RC4 + Drop)

Every string is encrypted with RC4, key-fragmented via XOR, and decoded at runtime only. Zero cleartext survives.

Control Flow Flattening

Logic is shattered into shuffled blocks with encrypted state transitions. Original flow is unrecoverable.

Anti-Tamper & Integrity Checks

Multiple validation points detect modifications. Tampering triggers non-reversible corruption.

Zero Cleartext Builtins

No standard library names appear in output. All builtins are resolved indirectly through the constant array at runtime.

Dead Code & Opaque Predicates

15 runtime-dependent predicate types and structurally valid dead code paths make static analysis impossible.

Opcode Fusion (Super-Operators)

Multiple instructions are fused into single super-operators, reducing pattern surface and increasing analysis cost exponentially.

ARCHITECTURE

Custom pipeline, no third-party code

Most obfuscators wrap the standard Lua compiler output. RoxGuard has its own transform engine, bytecode compiler, and VM generator. The protection pipeline is built from scratch.

Frontend

Parses Lua and Luau source into a full AST with position tracking for precise transforms.

Parser & AST

Builds a complete abstract syntax tree, handling all Lua and Luau syntax including edge cases.

AST Transforms

String encryption, proxy functions, dead code injection, control flow flattening, all applied at AST level.

Bytecode Compiler

Emits proprietary bytecode with randomized instruction encoding and fused super-operators.

VM Generator

Produces a unique virtual machine interpreter for each build with different dispatch and handler structure.

1 Source Code Your Lua script
2 Lexer
3 Parser
4 AST Transforms 8 passes
5 Bytecode Compiler
6 VM Generator
7 Protected Output Ready to deploy
COMPARISON

How RoxGuard compares

A transparent look at how our protection stacks up against the industry.

Feature RoxGuard Luraph MoonSec IronBrew
Register-Based VM
Opcode Fusion (Super-Operators)
Per-Build Polymorphism
Multi-Layer String Encryption
Multi-Layer Bytecode Encryption
Control Flow Flattening
Anti-Tamper / Integrity Checks
Anti-Hook / Anti-Dump
Zero Cleartext Builtins
Sandbox Detection
Custom Compiler Pipeline
Dead Code + Opaque Predicates
No Known Public Deobfuscator
Access Model 5 Roxerion steps Hosted panel Hosted panel Manual setup
Session Window 30 min unlock Varies Varies Self-managed

Free watermark window.
Clean pass when needed.

RoxGuard access is unlocked inside the dashboard by completing 5 internal Roxerion steps. Free exports open a 30 minute watermark window, while clean exports use one fresh pass per successful build.

5 guided Roxerion steps
10s minimum per step
30 minute free watermark window
One clean export per Roxerion pass
Open unlock flow
ACCESS FLOW

Use free watermark windows or one-task clean exports

Complete the Roxerion flow once for a free watermark window, or run it again whenever you need a clean export pass.

Step 1
Open
the dashboard
Sign in to Roxerion
Paste your Lua script
Launch the unlock flow
Go to Dashboard
Step 3
Free + Clean
pick the export path
Free exports stay unlocked for 30 minutes
Clean exports consume one pass only after success
Both paths use the same RoxGuard protection stack
Unlock Obfuscator

Frequently asked questions

What is RoxGuard?

RoxGuard is a multi-layer Lua obfuscation engine built from scratch. It uses a custom AST transform engine, bytecode compiler, and VM generator to protect Roblox scripts from reverse engineering, with 15+ independent security layers applied to every build.

How do I unlock RoxGuard?

Open the dashboard, start the Roxerion unlock flow, and complete 5 guided steps. Each finished unlock keeps the editor active for 30 minutes.

How does RoxGuard compare to other obfuscators?

RoxGuard still ships the same opcode fusion, sandbox detection, zero-cleartext builtins, and multi-layer VM pipeline on every unlock. The difference is only how access is activated: Roxerion now uses a guided internal flow instead of multiple separate unlock routes.

What does the in-game notification look like?

It's a small, non-intrusive toast notification that appears briefly when the script runs. It shows "Protected by RoxGuard" and fades out after a few seconds. It does not affect script functionality.

Can obfuscated scripts be deobfuscated?

There are currently no known public deobfuscators for RoxGuard. The combination of per-build polymorphism, multi-layer encryption, and anti-tamper makes automated deobfuscation impractical. Every build produces structurally different output.

How long does access last?

Each completed unlock grants 30 minutes of RoxGuard dashboard access. If you already have an active unlock, the dashboard shows your remaining minutes and the exact expiry time.

Need help? Join us

Get obfuscation support, request features, or share your protected scripts. Our Discord community is always ready to help.

Obfuscation Help Script Sharing Updates
Game Connected
Roxerion Sync
Offline
Offline
You can now control your Roblox game from the browser! Execute scripts, view game data, and more.