Advertisement
ChanServ

GvacDoor RunHASHOb SDATA deobfuscator

Sep 21st, 2019
315
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Lua 0.72 KB | None | 0 0
  1. --[[
  2.     Ever seen a backdoor in a script that looks like the following?
  3.         RunString([==[
  4.         enccodetbl = {...}
  5.         function RunHASHOb()
  6.         ...
  7.         end
  8.         pcall(RunHASHOb)
  9.         ]==],"SDATA")
  10.     Here's a deobfuscator for that. Just feed it the enccodetbl.
  11.     NEW: Now also includes an obfuscator to turn a string into an enccodetbl.
  12.     Please don't abuse for your shitty backdoors.
  13. ]]
  14. local function RunHASHOb(enccodetbl)
  15.     local pdata = ""
  16.     for i=1, #enccodetbl do
  17.         pdata = pdata..string.char(bit.bxor(enccodetbl[i], 108))
  18.     end
  19.     return pdata
  20. end
  21. local function MakeHASHOb(pdata)
  22.     local enccodetbl = {}
  23.     for i=1, #pdata do
  24.         enccodetbl[i] = bit.bxor(string.byte(pdata[i]), 108)
  25.     end
  26.     return "{"..table.concat(enccodetbl, ",").."}"
  27. end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement