Bookmarklet Executor
Ashton Davies

GitHub GitHub Discussion

(Hosted by AdGuard | Non-dedicated)

(The server can be linked with one IP address at a time)

This exploit executes bookmarklets on webpages by spoofing an executor.

Connecting to the DNS Name Server

    Instructions

  1. Navigate to the configuration page for your internet network.
  2. In the Network dropdown, select Custom name servers.
  3. Set the first input field to the DNS name server address.
  4. Refresh your network connection.

Executing with the Side Panel

    Unavailable

    This feature is theoretical and it is not available at this time. It requires a manually-hosted web server or a hosting service compatible with DNS name server spoofing. The page directory should also match that of an online page that can be accessed from the side panel such as Google Lens. To access Google Lens in the side panel, open the context menu and select Search images with Google. Bookmarklets can supposedly be executed by clicking a link in the side panel, however, it may be blocked by Chrome itself.

Executing on the Chrome Web Store

Supports the LTBEEF exploit and Extension Installer.

    Instructions

  1. Navigate to tiny.cc/bookmarkletexec.
  2. If you are visiting that page for the first time, a Kproxy error message may appear. If that screen shows, just click the OK button.
  3. If you followed the previous step, after the page redirects to the Kproxy home page, Navigate to tiny.cc/bookmarkletexec again.

    DNS Name Server Information

    Provider AdGuard Free Plan
    Request TTL 2000 seconds
    Request Limit 300K/Month
Contributing with a deployment to execute scripts on other sites with the side panel would be greatly appreciated. Contact Ashton Davies