-
Notifications
You must be signed in to change notification settings - Fork 10
/
obfuscryption.txt
64 lines (53 loc) · 1.57 KB
/
obfuscryption.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
@name obfuscryption
@inputs
@outputs
@persist E:entity
@trigger
@persist K:array L
#[]#
#[ I don't care if you take this library
#[ It's public anyway, lol
#[]#
#[]# #include "asyncfileslib"
#[]#
function second(){} # function prototype
if( first() ){
# this is all you're getting
# good luck!
runOnTick(1)
function onLoad(Data:string,Name:string){
print("expression decrypted, hope you had the key!")
K = vonDecode(Data)
L = 1
second()
}
fileLoadASync("private_key.txt","onLoad")
}
function second(){ # equivalent to first() but for the protected code
E = K[1,string](K[2,string],K[4,string](K[3,string]()[entity])[vector]+K[5,string](0,0,30)[vector],0)[entity]
K[6,string](1)
}
if( L ){ # everything else goes in here
K[7,string](E,(K[4,string](K[3,string]()[entity])[vector]+K[5,string](0,0,30)[vector]-K[4,string](E)[vector])*(K[8,string](E)[number]*10)-K[9,string](E)[vector]*K[8,string](E)[number]*0.1)
}
# This should roughly explain how to craft private keys for this system.
# Just take the function names and put them in here, then obsfucate the actual functions in the e2.
# If you wanted to you could even do multiple layers of private keys to obsfucate the name of the real private key.
# Have fun! -Fast
#[
if(first()){
Keys = array(
"propSpawn",
"models/dav0r/hoverball.mdl",
"entity",
"pos",
"vec",
"runOnTick",
"applyForce",
"mass",
"vel"
)
fileWriteASync("private_key.txt",vonEncode(Keys))
runOnTick(1)
}
]#