Skip to content

Commit aaf5e44

Browse files
authored
Refactor pobfusStart function and remove comments
1 parent d4e7d8e commit aaf5e44

1 file changed

Lines changed: 61 additions & 94 deletions

File tree

script.js

Lines changed: 61 additions & 94 deletions
Original file line numberDiff line numberDiff line change
@@ -1,109 +1,76 @@
1-
/**
2-
* Pobfus 0.8 Beta - CamBuscate Engine
3-
* Lead Developer: tenringsofdoom1x
4-
*/
1+
async function pobfusStart() {
2+
const _in = document.getElementById('inputCode').value;
3+
const _btn = document.getElementById('protectBtn');
4+
5+
if (!_in) return _0xErr("Buffer Empty.");
56

6-
const ASCII_LOGO = String.raw`
7-
ooooooooo. .o8 .o88o.
8-
` + "`" + `888 ` + "`" + `Y88. "888 888 ` + "`" + `"
9-
888 .d88' .ooooo. 888oooo. o888oo oooo oooo .oooo.o
10-
888ooo88P' d88' ` + "`" + `88b d88' ` + "`" + `88b 888 ` + "`" + `888 ` + "`" + `888 d88( "8
11-
888 888 888 888 888 888 888 888 ` + "`" + `"Y88b.
12-
888 888 888 888 888 888 888 888 o. )88b
13-
o888o ` + "`" + `Y8bod8P' ` + "`" + `Y8bod8P' o888o ` + "`" + `V88V"V8P' 8""888P'`;
7+
_btn.disabled = true;
8+
_btn.innerText = "🏗️ Constructing Hell...";
149

15-
const VERSION_TAG = "\n [ ENGINE: CAMBUSCATE 0.1 | V0.8 BETA ]";
10+
await new Promise(r => setTimeout(r, 800));
1611

17-
// Initialization
18-
document.addEventListener('DOMContentLoaded', () => {
19-
const logoDisplay = document.getElementById('logoDisplay');
20-
if (logoDisplay) {
21-
logoDisplay.innerText = ASCII_LOGO + VERSION_TAG;
22-
}
23-
// Anti-Inspect Protection
24-
document.addEventListener('contextmenu', e => e.preventDefault());
25-
});
12+
try {
13+
const _sig = SYNC_HEADER.length % 255;
14+
const _seed = 0x6C;
15+
const _key = _seed ^ _sig;
2616

27-
/**
28-
* Generates a unique, high-entropy ID for filenames
29-
*/
30-
function generateId(length) {
31-
const chars = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789!#@';
32-
let result = '';
33-
for (let i = 0; i < length; i++) {
34-
result += chars.charAt(Math.floor(Math.random() * chars.length));
35-
}
36-
return result;
37-
}
17+
// The "Brick Wall" string
18+
const _wall = _in.split('').map(c => {
19+
const h = (c.charCodeAt(0) ^ _key).toString(16).padStart(2, '0');
20+
const j = Math.random().toString(36).substring(2, 6);
21+
return h + j;
22+
}).join('').toUpperCase();
3823

39-
/**
40-
* Main Obfuscation Engine
41-
*/
42-
function pobfusStart() {
43-
const input = document.getElementById('inputCode').value;
44-
if (!input) {
45-
alert("System Error: No source code detected in buffer.");
46-
return;
47-
}
24+
// New: "Nice Try" Watermark injection
25+
const watermark = "--- NICE TRY SKID | PROTECTED BY TENRINGSOFDOOM1X ---";
26+
const v_data = "_0x" + Math.random().toString(36).substring(7);
27+
const v_vm = "_0x" + Math.random().toString(36).substring(7);
28+
29+
// Randomly picked roasts
30+
const roasts = [
31+
"Nice try, stay mad.",
32+
"tenringsofdoom1x owns you.",
33+
"Grok failed, you will too.",
34+
"Is your Ctrl+C broken yet?",
35+
"Imagine thinking this is readable."
36+
];
37+
const r1 = roasts[Math.floor(Math.random() * roasts.length)];
4838

49-
// CamBuscate 0.1 Integrity Logic
50-
// This links the decryption key to the exact byte length of the logo
51-
const logoSig = (ASCII_LOGO + VERSION_TAG).length % 255;
52-
const internalSeed = 0x4B;
53-
const finalKey = internalSeed ^ logoSig;
54-
55-
// XOR Virtualization
56-
const bytes = input.split('').map(c => c.charCodeAt(0) ^ finalKey);
57-
const vmName = "_0x" + Math.random().toString(36).substring(7);
58-
59-
const outputVM = `--[[
60-
${ASCII_LOGO}
61-
${VERSION_TAG}
39+
const _out = `--[[
40+
${SYNC_HEADER}
6241
]]
63-
local ${vmName} = function()
64-
local _data = {${bytes.join(',')}}
65-
local _sig = #debug.getinfo(1).source % 255
66-
local _k = ${internalSeed} ~ _sig
67-
local _res = ""
68-
for i=1, #_data do _res = _res .. string.char(_data[i] ~ _k) end
42+
-- ${watermark}
43+
local _0xNICETRY = "${watermark}"
44+
local ${v_data} = "${_wall}"
45+
46+
local ${v_vm} = function()
47+
local _s = #debug.getinfo(1).source % 255
48+
local _k = ${_seed} ~ _s
49+
-- Integrity verification of the 'Nice Try' anchor
50+
if _0xNICETRY ~= "${watermark}" or not _0xNICETRY:find("TENRINGSOFDOOM1X") then
51+
while true do end
52+
end
53+
local _r = ""
54+
for i = 1, #${v_data}, 6 do
55+
local _b = tonumber(${v_data}:sub(i, i+1), 16)
56+
if _b then _r = _r .. string.char(_b ~ _k) end
57+
end
6958
local _f = loadstring or load
70-
local _ok, _exec = pcall(_f(_res))
59+
local _ok, _e = pcall(_f(_r))
7160
if not _ok then
72-
warn("POBFUS V0.8: TAMPER DETECTED")
61+
print("${r1}")
62+
warn("POBFUS: FATAL_TAMPER_DETECTED")
7363
while true do end
7464
end
7565
end
76-
pcall(${vmName})`;
7766
78-
document.getElementById('outputCode').value = outputVM;
79-
console.log(`[POBFUS] Build successful. Entropy Key: ${finalKey}`);
80-
}
67+
pcall(${v_vm})`;
8168

82-
/**
83-
* Clipboard & File Handling
84-
*/
85-
function copyToClipboard() {
86-
const el = document.getElementById('outputCode');
87-
if (!el.value) return;
88-
89-
navigator.clipboard.writeText(el.value).then(() => {
90-
// Optional: Trigger a GitHub-style tooltip or toast here
91-
alert("Successfully copied to clipboard.");
92-
});
69+
document.getElementById('outputCode').value = _out;
70+
_btn.innerText = "Deploy CamBuscate 0.1.1";
71+
} catch (err) {
72+
_0xErr("Engine Fault.");
73+
} finally {
74+
_btn.disabled = false;
75+
}
9376
}
94-
95-
function downloadFile() {
96-
const content = document.getElementById('outputCode').value;
97-
if (!content) return;
98-
99-
const uniqueId = generateId(16);
100-
const fileName = `pobfus-${uniqueId}.lua`;
101-
102-
const blob = new Blob([content], { type: 'text/plain' });
103-
const link = document.createElement('a');
104-
link.href = URL.createObjectURL(blob);
105-
link.download = fileName;
106-
link.click();
107-
108-
console.log(`[FS] File Exported: ${fileName}`);
109-
}

0 commit comments

Comments
 (0)