>Hidden process name: hks+(0x36) * 0 hk_proc_reddir >56,509 lines of javascript >three obfuscated wasm files of over 300kb each >it tries to exploit the JS spectre exploit >addon was probed >The packets are embedded within system wide escalated privilege before the TLS handshake. >zero day exploit monitors network traffic without infetterance using aircrack-nsf embedded in a system process >system wide userspace exploit >escapes from a hypervisor by dumping payload into host virtual memory
The mozilla signing certificate was not validated by DigiCert which avoids system crash using the --force flag. Even though in the kernel space the proc_write function can stop the remote payload, the malicious processes are still hidden through a mix of functions in the page table entry structure.
Be sure to have mitigations=on before probing any further.
I'm still using Automatic's. No browser extension needed.
Owen Gomez
It's a lot slower than the extension
Joshua Young
I got spooked and wiped my FF installation anyway because it's a low user Any Forums script (recipe for disaster) but where's these extra thousand lines of code? The script he's posted on his GitHub is 436 lines and has no grants
He's a false flagging retard and you're a gullible moron for getting spooked.
Luis Bennett
When I build the extension with violent monkey, it doesn't work. Some of it seems to modulate the get captcha button but it doesn't solve like the addon (I ran in on a usb drive on an old PC)
Do you have any tips to get it to load correctly? I also tried installing the JS locally and via URL.
Jack Rodriguez
>I got spooked and wiped my FF installation if it was a virus you'd better nuke windows to be sure. Wouldn't want a rootkit installed watching you fap to hentai.
William Rivera
>using windows
Sebastian Price
>installing a fucking addon to solve a 4 sec captcha Do brainlets really?
Chase Phillips
Don't care. I'm not installing a basedjak extension, disgusting.
The lines are one line in the JS, it's the obfuscated code.
Build? You just click the user.js on github and install automatically.
Dylan Edwards
does windows have mitigations turned on?
Jonathan Lee
>turns it into a 0 second captcha Yes
Dylan Campbell
I get those seconds of my life back. It's a win.
Austin Foster
>it's the obfuscated code You mean line 13? Yeah I thought that was kind of suspicious, but why not just delete the line?
Gavin Butler
>install automatically. you don't compile it? how does it run then?