What a sad script. There's no danger here in regards to ULX- this script just pretends to "hack" it. Here's the relevant de-obfuscated code:
local function a5()
if ulx then
MsgC(Color(0, 255, 0, 255), "...ATTEMPTING TO BRUTEFORCE ULX\n")
timer.Simple(2, function()
MsgC(Color(0, 255, 0, 255), "...CALCULATING BRUTEFORCE ALGORITHM\n")
end)
timer.Simple(4, function()
MsgC(Color(0, 255, 0, 255), "...BYPASSING SECURITY PROTOCOLS\n")
end)
timer.Simple(6, function()
MsgC(Color(0, 255, 0, 255), "...HACKING THE MAINFRAME")
end)
timer.Simple(8, function()
MsgC(Color(0, 255, 0, 255), "...\n")
end)
timer.Simple(10, function()
MsgC(Color(0, 255, 0, 255), "...SUCCESS!\n")
end)
timer.Simple(10.5, function()
chat.AddText( Color(0, 0, 0, 255), "(Console) ",
Color(160, 200, 200, 255), "added ",
Color(80, 0, 120, 255), "You ",
Color(160, 200, 200, 255), "to group ",
Color(0, 255, 0, 255), "superadmin")
end)
else
MsgC(Color(0, 255, 0, 255), "SERVER DOESN'T HAVE ULX INSTALLED DICK HEAD\n")
end
end
concommand.Add("ms_forceulxsuper", a5)