Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Question #6

Open
JarzaClay opened this issue Dec 4, 2022 · 1 comment
Open

Question #6

JarzaClay opened this issue Dec 4, 2022 · 1 comment

Comments

@JarzaClay
Copy link

I'm new to JavaScript, but it seems like the code that is executed is obfuscated, would you mind deobfuscating so I can make a few edits? (That is the point of Github)

@xlak
Copy link
Owner

xlak commented Dec 5, 2022

The code is obfuscated mainly to protect it from being stolen / rebranded without crediting the original author (which I have seen done with exploits like this before). It's also obfuscated to protect the address of the external server that it uses from being blacklisted.

Stay tuned - I'm going to make a new repo with the full unobfuscated source code soon, with the server address and debug protection removed. It will also include a guide on how to run your own external server to make a fully functioning exploit.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants