Bookmarklet Executor
Ashton Davies
(Hosted by AdGuard | Non-dedicated)
(The server can be linked with one IP address at a time)
This exploit executes bookmarklets on webpages by spoofing an executor.
Connecting to the DNS Name Server
- Navigate to the configuration page for your internet network.
- In the Network dropdown, select Custom name servers.
- Set the first input field to the DNS name server address.
- Refresh your network connection.
Instructions
Executing with the Side Panel
Unavailable
This feature is theoretical and it is not available at this time. It requires a manually-hosted web server or a hosting service compatible with DNS name server spoofing. The page directory should also match that of an online page that can be accessed from the side panel such as Google Lens. To access Google Lens in the side panel, open the context menu and select Search images with Google. Bookmarklets can supposedly be executed by clicking a link in the side panel, however, it may be blocked by Chrome itself.Executing on the Chrome Web Store
Supports the LTBEEF exploit and Extension Installer.- Navigate to tiny.cc/bookmarkletexec.
- If you are visiting that page for the first time, a Kproxy error message may appear. If that screen shows, just click the OK button.
- If you followed the previous step, after the page redirects to the Kproxy home page, Navigate to tiny.cc/bookmarkletexec again.
Instructions
DNS Name Server Information
Provider | AdGuard Free Plan |
Request TTL | 2000 seconds |
Request Limit | 300K/Month |