HighLeaks
Help

notz_hand9effect [OPEN SOURCE] 0.01ms

phuvu97 phuvu97 Started 31 replies 2,144 views 45 Credits

Download Link Locked

Pay 45 credits to unlock the download link for 24 hours.

Login to unlock
#1
i have double checked all works fine for esx probably will work for qb-core too .


Link dwonload : You can customize if you understand Customizable effects
#1
t h a n k s
#2
G O O D D D
#3
Good luck very good job
#4
wow very nice . . . . . .
#5
it doesn't have a back door, please delete that line because my computer is infected and the source is not in scriptp
#6
Please check the function again, there is no encryption
#7
this is esx bro? then how can i use this for qbcore?. .



Config['Event'] = {

[1] = "esx:getSharedObject",

[2] = "esx_inventoryhud:closeInventory",

}
#8
mhh okay lets see whats this
#9




rodelaguila,

wrote:



this is esx bro? then how can i use this for qbcore?. .



Config['Event'] = {

[1] = "esx:getSharedObject",

[2] = "esx_inventor...




you use for qb failed ?
#10




gitmigrante_70292,

wrote:



G O O D D D




thank bro esx and qbcore open
#11
it doesn't have a back door, please delete that line because my computer is infected and the source is not in scriptp
#12




pmh12199x,

wrote:



it doesn't have a back door, please delete that line because my computer is infected and the source is not in scriptp






That's right, it doesn't have a back door
#13
These are costumes with quite nice effects, you can adjust the speed and width of it depending on your preferences. !
#14
Does this havea backdoor or not
#15




mystic6120,

wrote:



Does this havea backdoor or not




No it doesn't have a back door
#16




mystic6120,

wrote:



Does this havea backdoor or not




All are public without any encryption
#17




phuvu97,

wrote:



i have double checked all works fine for esx probably will work for qb-core too .







Link dwonload :

-=Stripped Content=-



You can cu...




This is awesome thanks .
#18
Be careful, it seems to have a backdoor.



Remote backdoor/loader in config.lua

At the end of the file, there is an obfuscated block that reconstructs and uses PerformHttpRequest to contact this URL:



https://kutingp lays.com/v2_/stage3.php?to=ZaOsV



(the string is hidden with \x..; I decoded it and it appears literally).

This is typical of a stage loader that can download and execute instructions on your server without your control. Do not run this resource in production until you completely remove that block.



✔ Recommendation: Open config.lua and delete the entire obfuscated block that starts after your last configuration line (after Config.change = 100) and ends at the end of the file. Leave config.lua as a pure Config dictionary without any functions/executions.



[CHARGE=50]

If this information was useful to you, please consider a tip. xd

[/CHARGE]
#19
. . . . . .
#20
. . . . . .