123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146 |
- All of these are WTFPL, I think. Given the goal here is to use specific code as APIs ...not really sure what to do about these tbh, copyright-wise. They are used to *not* agree to copyright-restricted code.
- This is a list of a bunch of javascript & instructions to bypass restrictions on websites to use their service.
- Usually you execute by going into the console on your web browser, and just pasting the following in and hitting
- 'enter'
- The goal here is that you shouldn't have to agree to a legal contract to enjoy the world wide web,
- and its resources: these javascript snippets do NOT constitute consent, but they might constitute something like
- trespass.
- Freshii:
-
- var _request = new XMLHttpRequest();
- var url = 'https://n63.network-auth.com/WiFi/hi/I2Zcpb_/grant?continue_url=CONTINUE_URL_PLACEHOLDER';
- _request.open('HEAD', window.location, true);
- _request.setRequestHeader('X-Requested-With', 'XMLHttpRequest');
- _request.onreadystatechange = function() {
- if (_request.readyState === 4) {
- var continue_url = _request.getResponseHeader('Continue-Url');
- window.location.href = url.replace('CONTINUE_URL_PLACEHOLDER', continue_url);
- };
- };
- _request.send(null);
- Super8:
- 1)
- showerror= function showerror(){
- var tmpStr;
- var ind_eq;
- var urlStr = "";
- if(document.terms.accept.checked == false){
- document.terms.accept.checked=1;
- }
- tmpStr = document.terms.redirecturl.value;
- if(tmpStr=="") {
- tmpStr = parent.document.URL.toString();
- ind_eq = tmpStr.indexOf("=");
- if(ind_eq > 0) {
- document.terms.redirecturl.value=tmpStr.substring(ind_eq+1);
- }
- }
- document.terms.action="/cgi-bin/login";
- document.terms.submit();
- }
- 2) put password in
- 3) click enter.
- tim hortons:
- revealLanding()
- or
- go to http://timhortonswifi.com/cp/tdl4/Connecting_en.asp?ValidConnection=Y
- or
- function validate(state) {
- return true;
- }
- $(".switcher").click(function () {
- console.log("Tac is Checked");
- $("p").remove("#my-error-message-container");
- $(".content1").fadeOut();
- $(".content3").delay(450).fadeIn();
- return true;
- });
- tbpl library:
- $('input.requires-tou').enable(); document.getElementById('connect').click();
- thunder bay public wifi:
- no javascript per se: just go to
- "https://n119.network-auth.com/Free-Tbaytel-WiF/hi/zMsg6dl/grant?continue_url=http://www.tbaytel.com"
- (the zMsg6dl may be generated on the page)
- greyhound:
- 1) anonConnect=function(){return true};
- 2) then hit connect
- 3) anonConnect=function(){return true};
- 4) enter in fake email address (spartacus@anonymous.com)
- 5) then hit connect
- AT&T (at least greyhound)
- document.getElementById('account_submit').click();
- McDonalds:
- document.mcdconnect.submit();
- A&W
- ((optional)
- 1) javascript:
- toggle_visibility('agreementBtn');
- )
-
- 2) goto
- https://n61.network-auth.com/splash/grant?continue_url=http%3A%2F%2Fwww.aw.ca
- https://n231.network-auth.com/splash/grant?continue_url=http%3A%2F%2Fwww.aw.ca
- maybe nNNN is needed?
-
- Regina RQHR
- submitAction();
- Safeway:
- document.getElementById("ctl00_ContentPlaceHolder1_Button1").click()
- SaskTel myWifi:
- freethewifipls / 8letters
- boston pizza, fort francis:
- showerror= function showerror(){
- var tmpStr;
- var ind_eq;
- var urlStr = "";
- if(document.terms.accept.checked == false){
- document.terms.accept.checked=true;
- }
- tmpStr = document.terms.redirecturl.value;
- if(tmpStr=="") {
- tmpStr = parent.document.URL.toString();
- ind_eq = tmpStr.indexOf("=");
- if(ind_eq > 0) {
- document.terms.redirecturl.value=tmpStr.substring(ind_eq+1);
- }
- }
- document.terms.action="/cgi-bin/login";
- document.terms.submit();
- }
|