I will encrypt your pages/letters so can they last longer without browser blacklist

В этой теме можно использовать автоматический гарант!

Пожалуйста, обратите внимание, что пользователь заблокирован
Service still up

Beware of Imposters. Always make sure to confirm through PM
 
this is just standard data URI .

there is no encryption here at all, just basic unicode encoding . all you're doing is converting hexadecimal escape sequences back to html using javascript's unescape() func.

here's a guide explaining it for free :

if you want to save your money and do this on your own in 2 minutes, just paste your HTML here:
https://onlinestringtools.com/url-encode-string (make sure to click ' Encode Non-Special Characters ' first)... then have your entire page be:

JavaScript:
<script>
document.write(unescape('PASTE_HERE'));
</script>

furthermore, i would also recommend you display images inline using base64 instead of hosting them, and obfuscate the js code . lastly, add an eventListener to prevent common keys being pressed to easily check source code, save page, open dev tools, etc. obviously it's easy to get around, but wide-net phishing is meant to catch the common man.

so you know, this doesn't prevent detection as those measures are both detected via browser-side/sandboxed code and using a global database of reported URLs.
 
Последнее редактирование:
this is just standard data URI .

there is no encryption here at all, just basic unicode encoding . all you're doing is converting hexadecimal escape sequences back to html using javascript's unescape() func.

here's a guide explaining it for free :

if you want to save your money and do this on your own in 2 minutes, just paste your HTML here:
https://onlinestringtools.com/url-encode-string (make sure to click ' Encode Non-Special Characters ' first)... then have your entire page be:

JavaScript:
<script>
document.write(unescape('PASTE_HERE'));
</script>

furthermore, i would also recommend you display images inline using base64 instead of hosting them, and obfuscate the js code . lastly, add an eventListener to prevent common keys being pressed to easily check source code, save page, open dev tools, etc. obviously it's easy to get around, but wide-net phishing is meant to catch the common man.

so you know, this doesn't prevent detection as those measures are both detected via browser-side/sandboxed code and using a global database of reported URLs.

no disrespect, but the quote stated above is what this service is. there is no encryption, only encoding.

i am willing to answer PMs for free if you have issues following the instructions i have written.
 


Напишите ответ...
Верх