Skip to content

Meta API's security headers/body reversed. (__dyn, __csr, ccg, etc.)

Notifications You must be signed in to change notification settings

Hartman5/Meta-API-Security-Reversed

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Meta's Security Reversed

This repository will continue to grow, until every single Meta security header / parameter is reversed. All files are ready to be implemented into any automation / scraper, for custom work: contact on Telegram @reversewasm

Majority of the files in this repository are very straight foward, and easy to use. I'll explain the setup for more complicated configurations below.

New Header/Parameter Reversed Every Ten Stars.

Configuring __Dyn

  1. Inject our own JS into Meta's client. The following code will be injected:
        var bitarray = [];

        for(var x in this.$1) {
            if(this.$1[x]==1) bitarray.push(parseInt(x));
        };

        console.log(bitarray);
  • This code will be injected into the toCompressedString() function inside Meta's source.

image

2. Analyze the Local Values, you will notice an object called "bitarray," copy this object.

image

image

3. Paste this object into ./dyn.js, at line two, inside of the array.

image

4. Run node dyn.js - There is your __dyn value for the request. Every module list is different for every request.

Contact

Contact me on Telegram - @reversewasm