HighLeaks
Help

A must have if you are using leaked scripts!

milanwillet milanwillet Started 23 replies 2,403 views
#1
[size=7][color=rgb(184,]MALWARE SCANNER AND NETWORK BLOCKER![/color][/size]

[color=rgb(184,]Here is a scanner that will check any/all assets for PerformHTTP request and local ={'\ shit code[/color]

[color=rgb(184,]some will be false positives as some script providers use it to get updates for script from github etc but if you see it directing somewhere funny looking DELETE the performhttp line before you use the script![/color]

[color=rgb(184,]the programme will show you what files to look in for this[/color]

[color=rgb(184,]step 1 if wanting to check a leaked script just place the malscanner in the root of that folder and run as administator and press enter if its clean you are good to go! if it finds anything just go into them folders and delete anything that looks[/color]
[color=#b8312f]suspicious,

step 2 if you want to check your whole server, put it in the resources folder and scan

step 3 if local hosting or vps hosting run the networkblock and it will block any connection they try to make to there panels they use to access your server



here is an example of how it looks when it finds something [attachment removed]
[/color]

here is example of what to delete [attachment removed]
this is what i meant by suspicious perform request
[attachment removed]


[color=rgb(184,]you can also open your whole resources folder with visual studio and search the term {"\ or PerformHTTPRequest[/color]

[color=rgb(184,]but my scanners are near on 100 percent perfect at finding it all[/color]



[color=rgb(184,]stay safe[/color]



[color=rgb(184,]Milan Willet <3[/color]



[color=rgb(184,]EXTRA LAYER OF SECURITY ADDED THANKS TO LEAKS4EVER[/color]
[/attachment][/attachment][/attachment]
#1
nice, thank you for help..
#2




Padang

wrote:



nice, thank you for help..




you are welcome <3 please leave a like so we can keep this active :)
#3
I modified it and made it even better :D
#4




milanwillet,

wrote:



[size=7][color=rgb(184,]MALWARE SCANNER AND NETWORK BLOCKER![/color][/size]


[color=rgb(184,]Here is a scanner that will check any/all assets for PerformHTTP request and local ={'\ shit code[/color]


[color=rgb(184,]some will be false positives as some script providers use it to get updates for script from github etc but if you see it directing somewhere funny looking DELETE the performhttp line before you use the script![/color]


[color=rgb(184,]the programme will show you what files to look in for this[/color]


[color=rgb(184,]step 1 if wanting to check a leaked script just place the malscanner in the root of that folder and run as administator and press enter if its clean you are good to go! if it finds anything just go into them folders and delete anything that looks[/color]
[color=#b8312f]suspicious,


step 2 if you want to check your whole server, put it in the resources folder and scan


step 3 if local hosting or vps hosting run the networkblock and it will block any connection they try to make to there panels they use to access your server





here is an example of how it looks when it finds something [attachment removed]
[/color]


here is example of what to delete [attachment removed]

this is what i meant by suspicious perform request

[attachment removed]



thank u for this i hope it works[/attachment][/attachment][/attachment]
#5
Very nice work and very nice job
#6
link doesnt work pls fix
#7




Valentine18,

wrote:



link doesnt work pls fix




it should, its been directly uploaded to highleaks
#8
wow, thank you for help broh
#9
Hmmm , when you delete them and start server you get minimum 2 new ones , where is problem then ? :D





milanwillet,

wrote:



[size=7][color=rgb(184,]MALWARE SCANNER AND NETWORK BLOCKER![/color][/size]


[color=rgb(184,]Here is a scanner that will check any/all assets for PerformHTTP request and local ={'\ shit code[/color]


[color=rgb(184,]some will be false positives as some script providers use it to get updates for script from github etc but if you see it directing somewhere funny looking DELETE the performhttp line before you use the script![/color]


[color=rgb(184,]the programme will show you what files to look in for this[/color]


[color=rgb(184,]step 1 if wanting to check a leaked script just place the malscanner in the root of that folder and run as administator and press enter if its clean you are good to go! if it finds anything just go into them folders and delete anything that looks[/color]
[color=#b8312f]suspicious,


step 2 if you want to check your whole server, put it in the resources folder and scan


step 3 if local hosting or vps hosting run the networkblock and it will block any connection they try to make to there panels they use to access your server





here is an example of how it looks when it finds something [attachment removed]
[/color]


here is example of what to delete [attachment removed]

this is what i meant by suspicious perform request

[attachment removed]



Hmmm , when you delete them and start server you get minimum 2 new ones , where is problem then ? :D[/attachment][/attachment][/attachment]
#10
nice thingy imma use this in scripts
#11
thanks for this. this should help!
#12




milanwillet,

wrote:



[size=7][color=rgb(184,]MALWARE SCANNER AND NETWORK BLOCKER![/color][/size]


[color=rgb(184,]Here is a scanner that will check any/all assets for PerformHTTP request and local ={'\ shit code[/color]


[color=rgb(184,]some will be false positives as some script providers use it to get updates for script from github etc but if you see it directing somewhere funny looking DELETE the performhttp line before you use the script![/color]


[color=rgb(184,]the programme will show you what files to look in for this[/color]


[color=rgb(184,]step 1 if wanting to check a leaked script just place the malscanner in the root of that folder and run as administator and press enter if its clean you are good to go! if it finds anything just go into them folders and delete anything that looks[/color]
[color=#b8312f]suspicious,


step 2 if you want to check your whole server, put it in the resources folder and scan


step 3 if local hosting or vps hosting run the networkblock and it will block any connection they try to make to there panels they use to access your server





here is an example of how it looks when it finds something [attachment removed]
[/color]


here is example of what to delete [attachment removed]

this is what i meant by suspicious perform request

[attachment removed]





Hello! thank you very much, it works fine. Do you have a version that works on the linux command line?[/attachment][/attachment][/attachment]
#13
Thank you so much for sharing
#14
Nice thank you so much for sharing
#15
thanks ! like it so much thanks
#16




Zero1982,

wrote:



Hmmm , when you delete them and start server you get minimum 2 new ones , where is problem then ? :D



Hmmm , when you delete them and start server yo...




if you only deleted local shit, then you must have a performhttp request somewhere else, search you whole resources for PerformHTTPRequest
#17




milanwillet,

wrote:



if you only deleted local shit, then you must have a performhttp request somewhere else, search you whole resources for PerformHTTPRequest




Belive me or not , i did search whole server files not only resources for PerformHTTPRequest or local shit, nothing exept cfx default false positive one , but when i start server it put at least 2 new local shit lanes in my resources...
#18
nice script bro sheesh la
#19




Zero1982,

wrote:



Belive me or not , i did search whole server files not only resources for PerformHTTPRequest or local shit, nothing exept cfx default false positive o...




so, some time ago i founded a cfx thread that was talking about it and they were saying that u need to reinstall some script, i am not remembering very well but i think that is webpack, screenshot-basic, yarn and one other... but test with this
#20




igorMendes,

wrote:



so, some time ago i founded a cfx thread that was talking about it and they were saying that u need to reinstall some script, i am not remembering ver...




I made it , it was an old method via RCON - cfx-default ones to replace and gg ;) .