ADITYAZ

update bypass

Sep 30th, 2018
918
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.44 KB | None | 0 0
  1. function BP()
  2. gg.clearResults()
  3. gg.toast("NOTE :: Use When Logo Tencent")
  4. gg.searchNumber("1.2F;1.8F:9::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  5. gg.searchNumber("1.1F;1.4F:3::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  6. gg.searchNumber("1.1D;1.4D:2::10", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  7. gg.clearResults()
  8. gg.searchNumber("5001;1.1;1F::10", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  9. gg.getResults(100)
  10. gg.searchNumber("1.2F;1.8F:9::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  11. gg.searchNumber("1.1F;1.4F:3::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  12. gg.searchNumber("1.1D;1.4D:2::10", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  13. gg.clearResults(850)
  14. gg.searchNumber("1.2F;1.8F:9::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  15. gg.searchNumber("1.1F;1.4F:3::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  16. gg.searchNumber("1.1D;1.4D:2::10", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  17. gg.clearResults()
  18. gg.searchNumber("5001;1.1;1F::10", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  19. gg.getResults(100)
  20. gg.searchNumber("1.2F;1.8F:9::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  21. gg.searchNumber("1.1F;1.4F:3::1", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  22. gg.searchNumber("1.1D;1.4D:2::10", gg.TYPE_DOUBLE, false, gg.SIGN_EQUAL, 0, -1)
  23. gg.clearResults(850)
  24. gg.toast("BYPASS 💯% SUCCESS")
  25. gg.alert(os.date("Today: %Y/%m/%d Time: %H:%M:%S\nYou Can Now Use Scripts. Good Luck"))
  26. end
  27.  
  28. function bypassHelp()
  29. bypassHelpAlert = gg.alert("TO BYPASS SECURITY ", "[Exit Script]", "[Back to Selection]")
  30. if bypassHelpAlert == 1 then gg.processKill() os.exit() end
  31. if bypassHelpAlert == 2 then startBypass() end
  32. end
  33.  
  34. function startBypass()
  35. gg.setVisible(false)
  36. bypassAlert = gg.alert(" 7WORLDSMODS \n\n Active Bypass (Tencent Logo)", "What is Use Of Bypass?", "[NO]", "[YES]")
  37. if bypassAlert == 3 then BP() end
  38. if bypassAlert == 2 then end
  39. if bypassAlert == 1 then bypassHelp() end
  40. end
  41.  
  42. startBypass()
  43.  
  44.  
  45. HOME=1
  46.  
  47.  
  48. login = "https://7worldsaz.000webhostapp.com/login.php"
  49. local user = gg.prompt({'Username', 'Password'},
  50. {},
  51. {[1]='text',[2]='text'}
  52. )
  53. if user[1] == '' or user[2] == '' then
  54. gg.alert ("Username Or password is Wrong")
  55. else
  56. data = assert(load(gg.makeRequest(login ,nil,'username='..user[1]..'&password='..user[2]).content))
  57. return data()
  58. end
  59. if data == '0' then
  60. print ("Login failed, please try again.")
  61. os.exit();
  62. end
Add Comment
Please, Sign In to add comment