There is a website, which does POST, and I want to know, where parameters are stored. I need it to hack them, edit before posting. Scripts are huge and obfuscated, so I can't find the Objects I need just by reading the source code.
I've tried to serialize the window
with JSON.prune from this answer. The keyword, which I use to find, where the string I need is stored, was found near 40 times in 28 megabytes of text. And it is not very readable even after I found substrings. So maybe it is not the way to go.
I need something which would tell me:
- this substr has been detected in:
-- the Stringwindow.bla_bla_bla.deepobject.bla[5].blabla.msg_to_post
-- the Stringwindow.bla_bla_bla.deepobject.bla[3].and_here
-- the Stringwindow.and_even_here
-- etc.