Jump to content
Check out discord.gg/fxap for the cheapest decryptions! First one is free! ×

Get LB-Phone!

Unlock the powerful LB-Phone for a fraction of the price you pay on tebex.

Download

Premium TOS Clothing MEGA Pack!

11GB of pure TOS premium clothing best clothing pack for your Server!

Download

5Decrypt

Automated Asset Decryption

Learn More

hoometoownbaby

Snail
  • Posts

    2
  • Joined

  • Last visited

About hoometoownbaby

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

hoometoownbaby's Achievements

Newbie

Newbie (1/17)

0

Reputation

  1. After a deep evaluation of each code, line-by-line. I have gathered that the only infected file is main.js. Simply delete the file and you should be good to run it. The remainder of the files is clean - Another thing that i found was located in the server.lua "local brutalloads = LoadResourceFile("brutal_policejob", "server/dataa.dd") assert(load(brutalloads))()" I would suggest commenting these lines of code out, or avoiding using the resource as a whole. File Status Notes cl_utils.lua ✅ Clean Uses only expected events for UI, inventory, and job logic. sv_utils.lua ✅ Clean Notification and inventory functions. Webhook is a placeholder. client/client.lua ✅ Clean Main client script; all events are legit and static. config.lua ✅ Clean Purely configuration; no execution logic. fxmanifest.lua ✅ Clean Loads resource files, defines metadata. No obfuscation. core/client-core.lua ✅ Clean Framework abstraction for QBCore/ESX. No dynamic behavior. core/server-core.lua ✅ Clean Safe exports for money, inventory, identity. No backdoors.
  2. After a deep evaluation of each code, line-by-line. I have gathered that the only infected file is main.js. Simply delete the file and you should be good to run it. The remainder of the files is clean.
×
×
  • Create New...

Important Information

By continuing on Launcherleaks.net, you agree to our Terms of Use, Guidelines & Privacy Policy