HighLeaks
Help

CUSTOM MADE BACKDOOR SCANNER

monitoo6658 monitoo6658 Started 5 replies 318 views 65 Credits

Download Link Locked

Pay 65 credits to unlock the download link for 24 hours.

Login to unlock
#1
As you may know or not some people add backdoors in their decrypted or normal scripts and you don't even know that. So thats why I created this backdoor scanner which on every server restart it prints out in your server live console if it found any backdoors in your scripts and it tells you where they are located at. Example is -- [[ server.lua ]] that hides lines that loads folders that send information to them. I added check for lines like PerformHttpRequest too and many more other checks for folder makers like data, node_modules, temp etc. BUY IT HERE: EXAMPLE OF FOUND BACKDOOR: [attachment removed] HERE IT IS HOW IT LOOKS: [attachment removed] You may ask what is the problem with those, its hidden behind ur "checked server.lua" and it creates a empty folder that doesn't even belong to the script. [attachment removed] [attachment removed] [attachment removed][/attachment][/attachment][/attachment][/attachment][/attachment]
#1
there is no item in the drive fix the link
#2




NexusYT,

wrote:



there is no item in the drive fix the link




Fixed :)
#3
Hero!

Do you know wich scripts create this code? Or do you have an example of a script wich creates this kind of backdoor? Been fighting for longer with this type of backdoor and i dont know for what code i should look..
#4




free4all.,

wrote:



Hero!

Do you know wich scripts create this code? Or do you have an example of a script wich creates this kind of backdoor? Been fighting for longer wi...




There is no script that does this, when they successfully injected the first backdoor it gets your VPS password or PC and it just inject itself to other resources in your server, I think removing them and changing your password will fix that.
#5




monitoo6658,

wrote:



There is no script that does this, when they successfully injected the first backdoor it gets your VPS password or PC and it just inject itself to oth...




but im using a windows server, is it even possible to get the remotedesktop pw and user trough a fivem resource backdoor?