SOURCE CODE FREE skimmer web in js
by F4AR - Sunday February 1, 2026 at 02:26 PM
#1
This code is an advanced, heavily obfuscated web-based credit card skimmer (Magecart-style) designed to steal payment card details (and much more) from visitors on a compromised e-commerce or checkout page.
Main capabilities:
  • Multi-layer obfuscation of the exfiltration endpoint (usually a Discord webhook):
    • Custom alternating ±13 letter shift (not standard ROT13)
    • Double base64 + double URI encoding
    • String reversal
    • Webhook can be hidden in a data-* attribute on the script tag or hardcoded
  • Massive data harvesting:
    • Grabs every form field value (input, textarea, select, contenteditable)
    • Actively parses for payment data using regex:
      • Visa (^4[0-9]{12}(?:[0-9]{3})?),Mastercard(5[1−5][0−9]14 ), Mastercard (^5[1-5][0-9]{14} ),Mastercard(5[1−5][0−9]14), Amex (^3[47][0-9]{13}$)
      • CVV/CVC (3–4 digits)
      • Expiry dates (MM/YY or MMYY)
    • Also steals: cookies, localStorage, sessionStorage, full URL, User-Agent, timestamp
  • Global keylogger:
    • Records every keystroke on the page
    • Sends buffer on Enter key or when > 50 characters accumulated
  • Crude screenshot attempt:
    • Clones document body, tries to redraw visible text + basic colors on canvas
    • Converts to base64 PNG and attaches it to the Discord message
  • Exfiltration (usually to Discord):
    • Nicely formatted Discord embed
    • Green for initialization, orange for stolen data
    • Fake randomized X-Forwarded-For header + modified User-Agent
    • 3 retry attempts on failure with 2-second delay
  • Persistence & dynamic monitoring:
    • Listens to form submit events
    • Listens to real-time input events
    • Uses MutationObserver to detect newly added forms (very effective against SPAs, React/Vue/Angular sites)
  • Activation:
    • Triggers on window ‘load’ event
    • Immediately sends an “Skimmer initialized successfully” message to prove infection
This is a modern, quite sophisticated skimmer (typical of 2024–2026 campaigns), commonly injected via unpatched Magento, WordPress, Shopify vulnerabilities, supply-chain attacks on third-party JS libraries, or admin panel compromise


Hidden Content
You must register or login to view this content.


This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#2
will check for the effort and time
Reply
#3
(Feb 01, 2026, 02:37 PM)Aimbot Wrote: will check for the effort and time


You'll tell me what you think.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#4
thank u so much for u sharing

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#5
(Feb 01, 2026, 02:44 PM)wergwfe Wrote: thank u so much for u sharing

No problem, thank you.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#6
A big hug for you man.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#7
thanks mate i appreciate it

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#8
Thank you I will check this out
Reply
#9
(Feb 01, 2026, 06:06 PM)shabanaiqbal420 Wrote: A big hug for you man.

ahahah thank u so much

(Feb 01, 2026, 07:37 PM)leozim2024 Wrote: Thank you I will check this out

tell me again what you think

(Feb 01, 2026, 06:21 PM)n0trace Wrote: thanks mate i appreciate it

no problem thank u

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply
#10
interesting stuff

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Contact Administration.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  ? [TAIWAN] Confidential Cyber Security Department Documents Leaked ? jrintel 5 511 2 hours ago
Last Post: Iw3Pq4YIJS
  [Gathered] Indonesia ministry & president DATA LordZeroDay 12 2,147 2 hours ago
Last Post: Iw3Pq4YIJS
  COLLECTION 14M Facebook.com ULP rennn 14 974 6 hours ago
Last Post: AlexDoe
  DOCUMENTS SANS Institute - SEC670 Red Teaming Tools - Developing Custom Tools for Windows Tamarisk 28 3,676 7 hours ago
Last Post: hexaagent00
  DOCUMENTS [USA] CONFIDENTIAL Lockheed Martin / US ARMY RFID/WIRELESS CONNECTION MANUALS jrintel 41 4,383 7 hours ago
Last Post: hexaagent00

Forum Jump:


 Users browsing this forum: 1 Guest(s)