The only Lua obfuscator
you'll ever need.
Free RoxGuard exports use a 30 minute watermark window after 5 guided Roxerion steps. Clean exports stay notification-free, but each one needs its own completed Roxerion task.
Enterprise-grade protection.
Ready when you are.
15+ independent security layers in every build. From VM encryption to anti-tamper, RoxGuard delivers the full protection stack.
Register-Based VM
Your code runs inside a custom virtual machine with a proprietary instruction set. Every build generates a unique architecture. No two outputs share the same bytecode format.
Multi-Layer String Encryption
Strings pass through RC4 with key fragmentation, Drop-768 key discard, and constant array shuffling. Per-build keys mean static analysis yields nothing.
Control Flow Flattening
Program logic is shattered into shuffled state-machine blocks with encrypted transitions. The original execution order is mathematically unrecoverable.
Anti-Tamper & Anti-Hook
Multiple integrity checks, environment fingerprinting, and metamethod traps. Any modification to the output triggers non-reversible self-corruption.
Per-Build Polymorphism
Every obfuscation produces structurally different output. Different variable names, dispatch patterns, wrapper styles, dead code. Reversing one build teaches nothing about the next.
Sandbox Detection
Detects deobfuscation sandboxes by neutralizing debug.getinfo, debug.sethook, debug.getlocal, and environment inspection. Attackers get corrupted output.
What RoxGuard does to your code
15+ independent security transforms applied to every build. Custom transform engine, bytecode compiler, and VM generator built from scratch.
VM Execution
Code compiles to custom bytecode and runs inside a unique virtual machine per build.
Multi-Layer Bytecode Cipher
Multiple chained stream ciphers protect the instruction stream. Each build uses unique seeds and key schedules.
String Encryption (RC4 + Drop)
Every string is encrypted with RC4, key-fragmented via XOR, and decoded at runtime only. Zero cleartext survives.
Control Flow Flattening
Logic is shattered into shuffled blocks with encrypted state transitions. Original flow is unrecoverable.
Anti-Tamper & Integrity Checks
Multiple validation points detect modifications. Tampering triggers non-reversible corruption.
Zero Cleartext Builtins
No standard library names appear in output. All builtins are resolved indirectly through the constant array at runtime.
Dead Code & Opaque Predicates
15 runtime-dependent predicate types and structurally valid dead code paths make static analysis impossible.
Opcode Fusion (Super-Operators)
Multiple instructions are fused into single super-operators, reducing pattern surface and increasing analysis cost exponentially.
Custom pipeline, no third-party code
Most obfuscators wrap the standard Lua compiler output. RoxGuard has its own transform engine, bytecode compiler, and VM generator. The protection pipeline is built from scratch.
Frontend
Parses Lua and Luau source into a full AST with position tracking for precise transforms.
Parser & AST
Builds a complete abstract syntax tree, handling all Lua and Luau syntax including edge cases.
AST Transforms
String encryption, proxy functions, dead code injection, control flow flattening, all applied at AST level.
Bytecode Compiler
Emits proprietary bytecode with randomized instruction encoding and fused super-operators.
VM Generator
Produces a unique virtual machine interpreter for each build with different dispatch and handler structure.
How RoxGuard compares
A transparent look at how our protection stacks up against the industry.
| Feature | RoxGuard | Luraph | MoonSec | IronBrew |
|---|---|---|---|---|
| Register-Based VM | ||||
| Opcode Fusion (Super-Operators) | ||||
| Per-Build Polymorphism | ||||
| Multi-Layer String Encryption | ||||
| Multi-Layer Bytecode Encryption | ||||
| Control Flow Flattening | ||||
| Anti-Tamper / Integrity Checks | ||||
| Anti-Hook / Anti-Dump | ||||
| Zero Cleartext Builtins | ||||
| Sandbox Detection | ||||
| Custom Compiler Pipeline | ||||
| Dead Code + Opaque Predicates | ||||
| No Known Public Deobfuscator | ||||
| Access Model | 5 Roxerion steps | Hosted panel | Hosted panel | Manual setup |
| Session Window | 30 min unlock | Varies | Varies | Self-managed |
Use free watermark windows or one-task clean exports
Complete the Roxerion flow once for a free watermark window, or run it again whenever you need a clean export pass.
Frequently asked questions
What is RoxGuard?
RoxGuard is a multi-layer Lua obfuscation engine built from scratch. It uses a custom AST transform engine, bytecode compiler, and VM generator to protect Roblox scripts from reverse engineering, with 15+ independent security layers applied to every build.
How do I unlock RoxGuard?
Open the dashboard, start the Roxerion unlock flow, and complete 5 guided steps. Each finished unlock keeps the editor active for 30 minutes.
How does RoxGuard compare to other obfuscators?
RoxGuard still ships the same opcode fusion, sandbox detection, zero-cleartext builtins, and multi-layer VM pipeline on every unlock. The difference is only how access is activated: Roxerion now uses a guided internal flow instead of multiple separate unlock routes.
What does the in-game notification look like?
It's a small, non-intrusive toast notification that appears briefly when the script runs. It shows "Protected by RoxGuard" and fades out after a few seconds. It does not affect script functionality.
Can obfuscated scripts be deobfuscated?
There are currently no known public deobfuscators for RoxGuard. The combination of per-build polymorphism, multi-layer encryption, and anti-tamper makes automated deobfuscation impractical. Every build produces structurally different output.
How long does access last?
Each completed unlock grants 30 minutes of RoxGuard dashboard access. If you already have an active unlock, the dashboard shows your remaining minutes and the exact expiry time.
Need help? Join us
Get obfuscation support, request features, or share your protected scripts. Our Discord community is always ready to help.