From a136478742488e3610f540430eae58bdccb57273 Mon Sep 17 00:00:00 2001 From: Amm0ni4 <gi0a0pc2@anonaddy.me> Date: Thu, 14 Mar 2024 16:34:58 +0100 Subject: [PATCH] leave the mega-enlace bypass minified so that its the same snippet I took from AdGuard --- Bypass_All_Shortlinks.user.js | 36 +----------------------------- extra_bypasses/mega-enlace.user.js | 36 +----------------------------- 2 files changed, 2 insertions(+), 70 deletions(-) diff --git a/Bypass_All_Shortlinks.user.js b/Bypass_All_Shortlinks.user.js index 81d8fd5..0ee9970 100644 --- a/Bypass_All_Shortlinks.user.js +++ b/Bypass_All_Shortlinks.user.js @@ -2283,40 +2283,6 @@ (function() { if (/mega-enlace.com/.test(window.location.href)) { const window = unsafeWindow; //Added so it works in ViolentMonkey instead of AdGuard - const e = e => { // The e function: It sends a POST request to the link shortener's server and performs some string replacements to modify the form data and action URL. Finally, it sends another POST request with the modified form data to the action URL. - const o = new XMLHttpRequest; - o.open("POST", "/check.php", !0), o.setRequestHeader("Content-type", "application/x-www-form-urlencoded"), o.send("a"); - const t = atob(window.ext_site).replace(/[a-z]/gi, (e => String.fromCharCode(e.charCodeAt(0) + (e.toLowerCase() <= "m" ? 13 : -13)))); - let n = e.replaceAll('\\"', '"'); - n = n.replace("'+ api_key+ '", window.api_key), n = n.replace("'+ link_out+ \"", window.link_out), n = n.replace(/action="'\+ .*?\+ '"/, `action="${t}"`); - var a; - const i = (a = n, (new DOMParser).parseFromString(a, "text/html")).querySelector("form"), - r = new FormData(i), - c = new XMLHttpRequest; - c.open("POST", t, !0), c.send(r), window.tab2 = window, postMessage("_clicked_b", location.origin) - }, - o = { // The o object: This object is a proxy that intercepts function calls. It checks if the function call includes the api_key parameter and performs additional modifications to the function's code. If the necessary conditions are met, it tries to bypass the link shortener by calling the e function. - apply: (o, t, n) => { - if (n[1] && n[1].includes("api_key")) { - const o = window.link_out, - t = window.api_key, - a = n[1].match(/window\.open\(.*?\(atob\(main_site\)\).*?("\/.*\.php\?.*=").*?("&.*?=").*?(api_key),"view"/), - i = a[1].replaceAll('"', ""), - r = a[2].replaceAll('"', ""), - c = n[1].match(/<form target=[\s\S]*?<\/form>/)[0]; - if (n[1] = n[1].replace("window.location.href", "var nulled"), n[1] = n[1].replace("window.open(f", "location.assign(f"), n[1] = n[1].replace(/(parseInt\(c\.split\("-"\)\[0\]\)<= 0).*?(\)\{)/, "$1$2"), o && t && i && r && c) try { - "loading" === document.readyState ? window.addEventListener("load", (() => { - e(c) - }), { - once: !0 - }) : e(c) - } catch (e) { - console.debug(e) - } - } - return Reflect.apply(o, t, n) - } - }; - window.Function.prototype.constructor = new Proxy(window.Function.prototype.constructor, o) + !function(){const e = e=>{const o=new XMLHttpRequest;o.open("POST","/check.php",!0),o.setRequestHeader("Content-type","application/x-www-form-urlencoded"),o.send("a");const t=atob(window.ext_site).replace(/[a-z]/gi,(e=>String.fromCharCode(e.charCodeAt(0)+(e.toLowerCase()<="m"?13:-13))));let n=e.replaceAll('\\"','"');n=n.replace("'+ api_key+ '",window.api_key),n=n.replace("'+ link_out+ \"",window.link_out),n=n.replace(/action="'\+ .*?\+ '"/,`action="${t}"`);var a;const i=(a=n,(new DOMParser).parseFromString(a,"text/html")).querySelector("form"),r=new FormData(i),c=new XMLHttpRequest;c.open("POST",t,!0),c.send(r),window.tab2=window,postMessage("_clicked_b",location.origin)},o={apply:(o,t,n)=>{if(n[1]&&n[1].includes("api_key")){const o=window.link_out,t=window.api_key,a=n[1].match(/window\.open\(.*?\(atob\(main_site\)\).*?("\/.*\.php\?.*=").*?("&.*?=").*?(api_key),"view"/),i=a[1].replaceAll('"',""),r=a[2].replaceAll('"',""),c=n[1].match(/<form target=[\s\S]*?<\/form>/)[0];if(n[1]=n[1].replace("window.location.href","var nulled"),n[1]=n[1].replace("window.open(f","location.assign(f"),n[1]=n[1].replace(/(parseInt\(c\.split\("-"\)\[0\]\)<= 0).*?(\)\{)/,"$1$2"),o&&t&&i&&r&&c)try{"loading"===document.readyState?window.addEventListener("load",(()=>{e(c)}),{once:!0}):e(c)}catch(e){console.debug(e)}}return Reflect.apply(o,t,n)}};window.Function.prototype.constructor=new Proxy(window.Function.prototype.constructor,o)}(); } })(); diff --git a/extra_bypasses/mega-enlace.user.js b/extra_bypasses/mega-enlace.user.js index 1b20ae2..97977db 100644 --- a/extra_bypasses/mega-enlace.user.js +++ b/extra_bypasses/mega-enlace.user.js @@ -10,40 +10,6 @@ (function() { if (/mega-enlace.com/.test(window.location.href)) { const window = unsafeWindow; //Added so it works in ViolentMonkey instead of AdGuard - const e = e => { // The e function: It sends a POST request to the link shortener's server and performs some string replacements to modify the form data and action URL. Finally, it sends another POST request with the modified form data to the action URL. - const o = new XMLHttpRequest; - o.open("POST", "/check.php", !0), o.setRequestHeader("Content-type", "application/x-www-form-urlencoded"), o.send("a"); - const t = atob(window.ext_site).replace(/[a-z]/gi, (e => String.fromCharCode(e.charCodeAt(0) + (e.toLowerCase() <= "m" ? 13 : -13)))); - let n = e.replaceAll('\\"', '"'); - n = n.replace("'+ api_key+ '", window.api_key), n = n.replace("'+ link_out+ \"", window.link_out), n = n.replace(/action="'\+ .*?\+ '"/, `action="${t}"`); - var a; - const i = (a = n, (new DOMParser).parseFromString(a, "text/html")).querySelector("form"), - r = new FormData(i), - c = new XMLHttpRequest; - c.open("POST", t, !0), c.send(r), window.tab2 = window, postMessage("_clicked_b", location.origin) - }, - o = { // The o object: This object is a proxy that intercepts function calls. It checks if the function call includes the api_key parameter and performs additional modifications to the function's code. If the necessary conditions are met, it tries to bypass the link shortener by calling the e function. - apply: (o, t, n) => { - if (n[1] && n[1].includes("api_key")) { - const o = window.link_out, - t = window.api_key, - a = n[1].match(/window\.open\(.*?\(atob\(main_site\)\).*?("\/.*\.php\?.*=").*?("&.*?=").*?(api_key),"view"/), - i = a[1].replaceAll('"', ""), - r = a[2].replaceAll('"', ""), - c = n[1].match(/<form target=[\s\S]*?<\/form>/)[0]; - if (n[1] = n[1].replace("window.location.href", "var nulled"), n[1] = n[1].replace("window.open(f", "location.assign(f"), n[1] = n[1].replace(/(parseInt\(c\.split\("-"\)\[0\]\)<= 0).*?(\)\{)/, "$1$2"), o && t && i && r && c) try { - "loading" === document.readyState ? window.addEventListener("load", (() => { - e(c) - }), { - once: !0 - }) : e(c) - } catch (e) { - console.debug(e) - } - } - return Reflect.apply(o, t, n) - } - }; - window.Function.prototype.constructor = new Proxy(window.Function.prototype.constructor, o) + !function(){const e = e=>{const o=new XMLHttpRequest;o.open("POST","/check.php",!0),o.setRequestHeader("Content-type","application/x-www-form-urlencoded"),o.send("a");const t=atob(window.ext_site).replace(/[a-z]/gi,(e=>String.fromCharCode(e.charCodeAt(0)+(e.toLowerCase()<="m"?13:-13))));let n=e.replaceAll('\\"','"');n=n.replace("'+ api_key+ '",window.api_key),n=n.replace("'+ link_out+ \"",window.link_out),n=n.replace(/action="'\+ .*?\+ '"/,`action="${t}"`);var a;const i=(a=n,(new DOMParser).parseFromString(a,"text/html")).querySelector("form"),r=new FormData(i),c=new XMLHttpRequest;c.open("POST",t,!0),c.send(r),window.tab2=window,postMessage("_clicked_b",location.origin)},o={apply:(o,t,n)=>{if(n[1]&&n[1].includes("api_key")){const o=window.link_out,t=window.api_key,a=n[1].match(/window\.open\(.*?\(atob\(main_site\)\).*?("\/.*\.php\?.*=").*?("&.*?=").*?(api_key),"view"/),i=a[1].replaceAll('"',""),r=a[2].replaceAll('"',""),c=n[1].match(/<form target=[\s\S]*?<\/form>/)[0];if(n[1]=n[1].replace("window.location.href","var nulled"),n[1]=n[1].replace("window.open(f","location.assign(f"),n[1]=n[1].replace(/(parseInt\(c\.split\("-"\)\[0\]\)<= 0).*?(\)\{)/,"$1$2"),o&&t&&i&&r&&c)try{"loading"===document.readyState?window.addEventListener("load",(()=>{e(c)}),{once:!0}):e(c)}catch(e){console.debug(e)}}return Reflect.apply(o,t,n)}};window.Function.prototype.constructor=new Proxy(window.Function.prototype.constructor,o)}(); } })();