FiveM Anti-Backdoor & Anti-Cipher Panel

:star2: Greetings, FiveM Community! :star2:

:rotating_light: A Crucial Security Alert! :rotating_light:
Recently, a surge in malicious code attacks, particularly involving ‘cipher’, has been observed. These nefarious codes have a tendency to extract your server’s rcon password, transmitting it externally, putting your server’s integrity at significant risk.

:shield: Introducing Your Guardian File! :shield:
I’m thrilled to present a unique file tailored for your protection on the FiveM platform. It’s features?

  • Comprehensive Anti-Cipher Protection
  • Security against function overwrites like GetConvar, print via the function override feature.
  • Control code lines with the json.encode method.

:lock: Your Shield Against Rcon Breaches :lock:
With this, malicious files attempting to extract rcon passwords or server names via GetConvar are thwarted. For your convenience, webhook notifications are enabled for swift threat alerts!

In essence, consider this file a pivotal fortress safeguarding your server. Dive in, review, and bolster your defenses!

Remember:
:white_check_mark: Prioritize initiating this script before other files.
:white_check_mark: Starting it later also works, but sequence is paramount for smooth operations

:link: Links & Resources:

EyeStore Logo

Join Us on Discord
Watch on YouTube
Shop on Tebex
GitHub

Function Override

Found World:

10 Likes

Good one

2 Likes

Soon, I will make an update that will block access to your information by obscure files encrypted and licensed with obfuscator. Except for Escrow, I do not support such applications and I am working on this issue.

3 Likes

Hold on, so your way of protecting a server is printing which script uses print(), GetConvar() and such?

3 Likes

No, GetConvar… with natives (server_hostname, rcon and so on) is an abbreviation for data, I’m just scanning files and allowing you to capture data fields except for necessary things like monitor

interesting. hope it works.

1 Like

Nice Release.

1 Like

UPDATE!

By pulling your ip address from sites like PerformHttpRequest, you can also detect files that use licenses, and now I have allowed you to see completely inside that line of code, I hope your servers will not be damaged thanks to these processes.

Must add the fact that also blocks this Panel : PerformHttpRequest("https://fivem.kvac.cz
thank you

1 Like

Hello my friend, the word https:// is already in the filter, so you can see everything that sends requests, these are usually either licenses or addresses used by attackers. or PerformHttpRequest

Hi. I am using your modification to detect antibackdoor and apparently it found something in my server. Can you please explain how to understand this message? Or what path it found this crap on.

how does this script work, I’ve gotten heaps of Found Word:

this is super helpful thank you for the great release!

@EyesStore any update on 2024 ? is it up date?

You saved my ass!!

kiss goes out <3

script works perfect for ESX Legacy NEWEST Version