A hardware ID spoofer designed to bypass Roblox's Hyperion alt detection system.
This software is provided for educational purposes only. Using this software may violate Roblox's Terms of Service and could result in account bans or other penalties. Use at your own risk.
Roblox's Hyperion alt detection system collects hardware identifiers to detect and link alternate accounts. This tool spoofs those identifiers to reduce the likelihood of detection. This project demonstrates how hardware identifiers can be modified and the techniques used for hardware fingerprinting.
This HWID spoofer targets four specific hardware identifiers that Hyperion uses:
- System UUID - Spoofs the SMBIOS System UUID by modifying the registry to provide a fake UUID
- Memory Device Information - Creates fake memory device serial numbers to prevent device matching
- Monitor EDID Data - Modifies the EDID (Extended Display Identification Data) for connected monitors
- Special SystemReg Registry Value - Handles the Roblox-specific registry value with null terminator
- Windows 10/11
- Administrator privileges (required for registry modification)
- Rust programming environment (for building from source)
- Download the latest release from the Releases page
- Run the executable as Administrator
- Clone this repository
git clone https://github.com/24rr/roblox-hwid.git
cd roblox-hwid
- Build the project
cargo build --release
- Run the executable as Administrator
.\target\release\roblox-hwid-spoofer.exe
- System UUID
- Memory Devices
- Monitor EDID
- SystemReg
- Run the application as Administrator
- Select one of the following options:
- Spoof All Hardware IDs (recommended)
- Spoof System UUID only
- Spoof Memory Devices only
- Spoof Monitor EDID only
- Spoof SystemReg only
- The application will modify the necessary registry keys and create configuration for spoofing
- Launch Roblox after spoofing is complete
Generates a random UUID and creates registry keys to intercept SMBIOS UUID queries.
Creates fake memory device information with randomized serial numbers and stores them in the registry to be provided during WMI queries.
Modifies the EDID data stored in the registry for each connected monitor, focusing on the serial number portion while maintaining valid checksum values.
Handles the special registry value with null terminator that Roblox uses as part of its fingerprinting system.
The spoofer works by creating registry keys that intercept Hyperion's attempts to query hardware information. It sets up:
- Registry redirection for hardware identifiers
- Interception configurations to handle WMI queries
- Special handling for null-terminated registry values
- Proper checksum calculation for data structures like EDID
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License - see the LICENSE file for details.