Garry's Mod Leaks

<1.000 Addons> [MEGA PACK] [LEAK]

Submitted by LeakCity, , Thread ID: 282311

RE: <1.000 Addons> [MEGA PACK] [LEAK]

This post was last modified: 01-05-2024, 03:54 AM by darkisanerd
#203
I've found backdoors in almost all of the addons that I tested. They all fetch code from kvcdoor.ovh. It's pretty much always located in sh_entity.lua and can be removed without affecting any of the addons at all. So if you guys are going to use any of these, make sure you look around for a sh_entity.lua and comment out or remove the http.Fetch.

Scripts I've checked and found it in:

- zeros_trashman (zeros_trashman/lua/autorun/sh_entity.lua)
- zeros_methlab02 (zeros_methlab02/lua/autorun/sh_entity.lua)
- Xenin-TheXenin-Framework (/Xenin-The-Xenin-Framework/lua/autorun/sh_entity.lua)
- Xenin jobcreator (xenin_jobcreator/lua/autorun/sh_entity.lua)
- xenin-inventory (xenin-inventory/lua/autorun/sh_entity.lua)
- xenin-f4menu (xenin_f4menu/lua/autorun/sh_entity.lua)
- Xenin-coinflip (xenin-coinflip/lua/autorun/sh_entity.lua)
- xenin-battlepass (xenin-battlepass/lua/autorun/sh_entity.lua)
- lithium_printers_2 (lithium_printers_2/lua/autorun/sh_entity.lua)
- ch_bitminers (ch_bitminers/lua/autorun/sh_entity.lua)

From what I can see, the code isn't actually doing anything. The post request gets a script that simply returns error code 429. But that could be because I am getting blocked, or the backdoor sucks and doesn't work. Either way, I would remove it.

Edit: I checked the backdoor is contained in 99% of the addons.

Users browsing this thread: 33 Guest(s)