- Автор темы
- Добавить закладку
- #21
Пожалуйста, обратите внимание, что пользователь заблокирован
Service still up
Beware of Imposters. Always make sure to confirm through PM
Beware of Imposters. Always make sure to confirm through PM
<script>
document.write(unescape('PASTE_HERE'));
</script>


this is just standard data URI .
there is no encryption here at all, just basic unicode encoding . all you're doing is converting hexadecimal escape sequences back to html using javascript's unescape() func.
here's a guide explaining it for free :
![]()
Shhh we're hunting Phishers... %50%68%69%73%68%69%6E%67 or UGhpc2hpbmc=
So the HexNinja has been spending a lot of time going Phishing. Well more correctly examining phishing emails and watching them evolve and d...www.thehexninja.com
if you want to save your money and do this on your own in 2 minutes, just paste your HTML here:
https://onlinestringtools.com/url-encode-string (make sure to click ' Encode Non-Special Characters ' first)... then have your entire page be:
JavaScript:<script> document.write(unescape('PASTE_HERE')); </script>
furthermore, i would also recommend you display images inline using base64 instead of hosting them, and obfuscate the js code . lastly, add an eventListener to prevent common keys being pressed to easily check source code, save page, open dev tools, etc. obviously it's easy to get around, but wide-net phishing is meant to catch the common man.
so you know, this doesn't prevent detection as those measures are both detected via browser-side/sandboxed code and using a global database of reported URLs.