Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
@support We already have http sniffer, is it possible to intercept and modify a request before sending to server ?
@andy231 No, but it's in development.
How exactly do you see the number of requests? And what requests exactly are we talking about? Please write a report according to this instruction: https://community.bablosoft.com/topic/30993
@fox said in how to put all image formats (*.jpg *.png..) in one "disable request" block?:
@qaisbsharat said in how to put all image formats (*.jpg *.png..) in one "disable request" block?: Lastly, how can I make my execute code dark like what I see in the picture? https://community.bablosoft.com/topic/7365/темная-тема-bas
@qaisbsharat said in how to put all image formats (*.jpg *.png..) in one "disable request" block?:
Lastly, how can I make my execute code dark like what I see in the picture?
https://community.bablosoft.com/topic/7365/темная-тема-bas
Thanks ;)
@Allister , thanks for your help . Seems that i missed important data in wiki even after reading many times . Now its resolved.
@saltypotato Fixed in 16.8.0 version, thanks for report. None of exploits on that page leaks in BAS. https://github.com/cure53/HTTPLeaks/blob/master/leak.html