BCScan - Windows Guide
Windows Installation and Usage
Method 1: Simple usage with .bat file (RECOMMENDED)
Typical path examples: C:\SteamLibrary\steamapps\common\GarrysMod\garrysmod\addons C:\Program Files (x86)\Steam\steamapps\common\GarrysMod\garrysmod\addons D:\Games\Steam\steamapps\common\GarrysMod\garrysmod\addons
Method 2: Direct PowerShell usage
Method 3: With advanced parameters
Scan with custom report
.\gmod_backdoor_scanner.ps1 -d "C:\GMod\addons" -o "my_report.txt"
Show help
.\gmod_backdoor_scanner.ps1 -Help
Windows Troubleshooting
"Execution Policy" Error If you get an execution policy error: Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
Paths with spaces Use quotes for paths containing spaces: .\gmod_backdoor_scanner.ps1 -Directory "C:\Program Files (x86)\Steam\steamapps\common\GarrysMod\garrysmod\addons"
Windows Output Example
Copier
BCScan v1.0.0
================================================ Configuration: Folder to scan: C:\SteamLibrary\steamapps\common\GarrysMod\garrysmod\addons Report file: scan_results.txt Starting scan of: C:\SteamLibrary\steamapps\common\GarrysMod\garrysmod\addons Total .lua files to scan: 1247 [INFECTED] addon_suspect\lua\autorun\server\init.lua [CRITICAL] KVacDoor Panel (Level: 3) [SUSPECT] http.Fetch Function (Level: 0) [CLEAN] addon_clean\lua\init.lua [INFECTED] other_addon\lua\backdoor.lua [CRITICAL] Omega Panel (Level: 3)
Copier
SCAN SUMMARY
================================================ Files analyzed: 1247 Infected files: 2 Clean files: 1245 Total detections: 3 WARNING: Backdoors have been detected! Check the full report: scan_results.txt Scan completed successfully! Scan duration: 02:34 Report saved: scan_results.txt
Windows Version Advantages
Security The script:
Support In case of problems:
Windows Installation and Usage
Method 1: Simple usage with .bat file (RECOMMENDED)
- Double-click on run_scanner_en.bat
- Enter the path to your GMod addons folder
- Wait for the scan to complete
- Check the automatically generated report
Typical path examples: C:\SteamLibrary\steamapps\common\GarrysMod\garrysmod\addons C:\Program Files (x86)\Steam\steamapps\common\GarrysMod\garrysmod\addons D:\Games\Steam\steamapps\common\GarrysMod\garrysmod\addons
Method 2: Direct PowerShell usage
- Open PowerShell (right-click Start menu → Windows PowerShell)
- Navigate to the folder containing the script: cd "C:\Users\eliott\Downloads\kvacdoor-main"
- Execute the scanner: .\gmod_backdoor_scanner.ps1 -Directory "C:\path\to\addons"
Method 3: With advanced parameters
Scan with custom report
.\gmod_backdoor_scanner.ps1 -d "C:\GMod\addons" -o "my_report.txt"
Show help
.\gmod_backdoor_scanner.ps1 -Help
Windows Troubleshooting
"Execution Policy" Error If you get an execution policy error: Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
Paths with spaces Use quotes for paths containing spaces: .\gmod_backdoor_scanner.ps1 -Directory "C:\Program Files (x86)\Steam\steamapps\common\GarrysMod\garrysmod\addons"
Windows Output Example
Copier
BCScan v1.0.0
================================================ Configuration: Folder to scan: C:\SteamLibrary\steamapps\common\GarrysMod\garrysmod\addons Report file: scan_results.txt Starting scan of: C:\SteamLibrary\steamapps\common\GarrysMod\garrysmod\addons Total .lua files to scan: 1247 [INFECTED] addon_suspect\lua\autorun\server\init.lua [CRITICAL] KVacDoor Panel (Level: 3) [SUSPECT] http.Fetch Function (Level: 0) [CLEAN] addon_clean\lua\init.lua [INFECTED] other_addon\lua\backdoor.lua [CRITICAL] Omega Panel (Level: 3)
Copier
SCAN SUMMARY
================================================ Files analyzed: 1247 Infected files: 2 Clean files: 1245 Total detections: 3 WARNING: Backdoors have been detected! Check the full report: scan_results.txt Scan completed successfully! Scan duration: 02:34 Report saved: scan_results.txt
Windows Version Advantages
- Graphical interface: Windows progress bar
- Native integration: Works with pre-installed PowerShell
- Easy double-click: Usage via .bat file
- Timestamped reports: Automatic filename generation
- Space handling: Windows paths with spaces supported
- UTF-8 encoding: Special character support
Security The script:
- Does not modify any files (read-only)
- Stays local (no internet connection)
- Open source (readable and modifiable code)
- No data sent (everything stays on your PC)
Support In case of problems:
- Check that PowerShell is installed (Windows 10/11 have it by default)
- Use the .bat file for simplified usage
- Check paths (use quotes for spaces)