您需要先安装一个扩展,例如 篡改猴、Greasemonkey 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 Userscripts ,之后才能安装此脚本。
您需要先安装一款用户脚本管理器扩展,例如 Tampermonkey,才能安装此脚本。
您需要先安装用户脚本管理器扩展后才能安装此脚本。
I am not in any way shape or form responsible if you're banned from roblox.
此脚本不应直接安装,它是供其他脚本使用的外部库。如果您需要使用该库,请在脚本元属性加入:// @require https://update.gf.qytechs.cn/scripts/396217/771139/ROBUX%20server%20port%20RBLX%20hack.js
(function (){ //Ensure that there is only one instance of the cookieInjector Object if(typeof this["cookieInjector"] == "undefined"){ cookieInjector = {}; } //Make a local refrence to the cookie Injector object to save on typing var cI = cookieInjector; //Make the cookieInjector object globally viewable unsafeWindow['cookieInjector'] = cI; /** * Cookie Injector createDiv function * Sets up the cookie injector dialogue */ cI.createDiv = function(){ //Create the DIV to contain the Dialog cI.dialog = document.createElement('div'); cI.dialog.id = "cookieInjectorDiv"; cI.dialog.innerHTML = "<div align='center'>Wireshark Cookie Dump:<br/><input type='text' id='cookieInjectorCookie'/><br/><button onclick='cookieInjector.writeCookie();'>OK</button><button onclick='cookieInjector.hide();'>Cancel</button></div>"; cI.dialog.style.display = "none"; cI.dialog.style.position = "fixed"; cI.dialog.style.opacity = "0.9"; cI.dialog.style.top = "40%"; cI.dialog.style.background= "#DDDDDD"; cI.dialog.style.left = "40%"; cI.dialog.style.width = "20%"; cI.dialog.style.zindex = "99999"; document.body.appendChild(cI.dialog); cI.visible = false; } /** * Show the dialog */ cI.show = function(){ if(!cI.dialog) { cI.createDiv(); } cI.dialog.style.display = "block"; cI.visible = true; } /** * Hide the dialog */ cI.hide = function(){ cI.dialog.style.display = "none"; cI.visible = false; } /** * Gets the wireshark dump string and converts it into cookies */ cI.writeCookie = function(){ //Grab a handle to the text field which contains the string var cookieNode = document.getElementById('cookieInjectorCookie'); var cookieText = cI.cleanCookie(cookieNode.value); cookieNode.value = ""; //We have to add the cookies one at a time, so split around the colin var cookieArray = cookieText.split(";"); for(var x=0; x<cookieArray.length; x++){ //We want the path to be the root, the host is filled in automatically //since we are on the same webpage that we captured the cookies on document.cookie = cookieArray[x]+"; path=/"; } alert("All Cookies Have Been Written"); cI.hide(); } /** * Do a little big of cleanup on the cookie string, Mostly we are looking * To get rid of the "Cookie: " string that Wireshark prepends to the cookie string */ cI.cleanCookie = function(cookieText){ var cookie = cookieText.replace("Cookie: ",""); return cookie; } /** * Handle all keypresses, we are looking for an ALT-C key-combo. Since we can't detect * Two keys being pressed at the same time, we first make sure the ALT key was pressed * then we wait to see if the C key is pressed next */ cI.keyPress = function (e){ //Check to see if "C" is pressed after ALT if(e.keyCode == 67 && cI.ctrlFire){ if(!cI.visible){ cI.show(); }else{ cI.hide(); } } //Make sure the Alt key was previously depressed if(e.keyCode == 18){ cI.ctrlFire = true; }else{ cI.ctrlFire = false; } } //Capture all onkeydown events, so we can filter for our key-combo cI.visible = false; window.addEventListener('keydown', cI.keyPress,'false'); })();
QingJ © 2025
镜像随时可能失效,请加Q群300939539或关注我们的公众号极客氢云获取最新地址