Toolss.net Bypass

Decode the value of the input field named "newwpsafelink" and redirect to the decoded URL after "safelink_redirect="

目前为 2024-12-06 提交的版本。查看 最新版本

  1. // ==UserScript==
  2. // @name Toolss.net Bypass
  3. // @namespace http://tampermonkey.net/
  4. // @version 0.1
  5. // @description Decode the value of the input field named "newwpsafelink" and redirect to the decoded URL after "safelink_redirect="
  6. // @author You
  7. // @match toolss.net
  8. // @grant none
  9. // @license MIT
  10. // ==/UserScript==
  11.  
  12. (function() {
  13. 'use strict';
  14.  
  15. // Function to decode the base64 value and extract the URL after "safelink_redirect="
  16. function decodeAndRedirect() {
  17. // Get the input element with name "newwpsafelink"
  18. var inputElement = document.querySelector('input[name="newwpsafelink"]');
  19. if (inputElement) {
  20. var base64Value = inputElement.value;
  21. // Decode the base64 value
  22. var decodedValue = atob(base64Value);
  23. // Find the index of "safelink_redirect="
  24. var index = decodedValue.indexOf("safelink_redirect=");
  25. if (index !== -1) {
  26. // Extract the URL after "safelink_redirect="
  27. var urlStartIndex = index + "safelink_redirect=".length;
  28. var redirectUrl = decodedValue.substring(urlStartIndex).split('"')[0];
  29. // Redirect to the decoded URL
  30. window.location.href = "https://toolss.net?safelink_redirect=" + redirectUrl;
  31. }
  32. }
  33. }
  34.  
  35. // Call the decodeAndRedirect function when the page loads
  36. window.addEventListener('load', decodeAndRedirect);
  37.  
  38. })();