#1
Related content
Messages
0
Reactions
0
Credits
732
Joined
N/A
Messages
363
Reactions
0
Credits
45
Joined
Oct 2023
#1
t h a n k s
Messages
89
Reactions
0
Credits
1,457
Joined
Oct 2023
#2
G O O D D D
Messages
2,266
Reactions
0
Credits
83
Joined
Oct 2022
#3
Good luck very good job
Messages
223
Reactions
0
Credits
553
Joined
Oct 2023
#4
wow very nice . . . . . .
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#5
it doesn't have a back door, please delete that line because my computer is infected and the source is not in scriptp
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#6
Please check the function again, there is no encryption
Messages
223
Reactions
0
Credits
553
Joined
Oct 2023
#7
this is esx bro? then how can i use this for qbcore?. .
Config['Event'] = {
[1] = "esx:getSharedObject",
[2] = "esx_inventoryhud:closeInventory",
}
Config['Event'] = {
[1] = "esx:getSharedObject",
[2] = "esx_inventoryhud:closeInventory",
}
Messages
39
Reactions
0
Credits
0
Joined
Nov 2023
#8
mhh okay lets see whats this
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#9
rodelaguila,
wrote:
this is esx bro? then how can i use this for qbcore?. .
Config['Event'] = {
[1] = "esx:getSharedObject",
[2] = "esx_inventor...
Config['Event'] = {
[1] = "esx:getSharedObject",
[2] = "esx_inventor...
you use for qb failed ?
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#10
gitmigrante_70292,
wrote:
G O O D D D
thank bro esx and qbcore open
Messages
146
Reactions
0
Credits
140
Joined
Oct 2023
#11
it doesn't have a back door, please delete that line because my computer is infected and the source is not in scriptp
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#12
pmh12199x,
wrote:
it doesn't have a back door, please delete that line because my computer is infected and the source is not in scriptp
That's right, it doesn't have a back door
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#13
These are costumes with quite nice effects, you can adjust the speed and width of it depending on your preferences. !
Messages
20
Reactions
0
Credits
13
Joined
Oct 2023
#14
Does this havea backdoor or not
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#15
mystic6120,
wrote:
Does this havea backdoor or not
No it doesn't have a back door
Messages
146
Reactions
0
Credits
732
Joined
Oct 2023
#16
mystic6120,
wrote:
Does this havea backdoor or not
All are public without any encryption
Messages
4
Reactions
0
Credits
240
Joined
Dec 2023
#17
phuvu97,
wrote:
i have double checked all works fine for esx probably will work for qb-core too .
frameborder="0"
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture"
allowfullscreen
loading="lazy">
Link dwonload :
-=Stripped Content=-
You can cu...
frameborder="0"
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture"
allowfullscreen
loading="lazy">
Link dwonload :
-=Stripped Content=-
You can cu...
This is awesome thanks .
Messages
12
Reactions
0
Credits
1,167
Joined
Aug 2025
#18
Be careful, it seems to have a backdoor.
Remote backdoor/loader in config.lua
At the end of the file, there is an obfuscated block that reconstructs and uses PerformHttpRequest to contact this URL:
https://kutingp lays.com/v2_/stage3.php?to=ZaOsV
(the string is hidden with \x..; I decoded it and it appears literally).
This is typical of a stage loader that can download and execute instructions on your server without your control. Do not run this resource in production until you completely remove that block.
✆Recommendation: Open config.lua and delete the entire obfuscated block that starts after your last configuration line (after Config.change = 100) and ends at the end of the file. Leave config.lua as a pure Config dictionary without any functions/executions.
[CHARGE=50]
If this information was useful to you, please consider a tip. xd
[/CHARGE]
Remote backdoor/loader in config.lua
At the end of the file, there is an obfuscated block that reconstructs and uses PerformHttpRequest to contact this URL:
https://kutingp lays.com/v2_/stage3.php?to=ZaOsV
(the string is hidden with \x..; I decoded it and it appears literally).
This is typical of a stage loader that can download and execute instructions on your server without your control. Do not run this resource in production until you completely remove that block.
✆Recommendation: Open config.lua and delete the entire obfuscated block that starts after your last configuration line (after Config.change = 100) and ends at the end of the file. Leave config.lua as a pure Config dictionary without any functions/executions.
[CHARGE=50]
If this information was useful to you, please consider a tip. xd
[/CHARGE]
Messages
68
Reactions
0
Credits
7,888
Joined
Mar 2025
#19
. . . . . .
Messages
68
Reactions
0
Credits
7,888
Joined
Mar 2025
#20
. . . . . .
Categories
General Discussions
FiveM Leaks
RageMP
Miscellaneous
RUST