Advertisement
Guest User

Untitled

a guest
Jul 23rd, 2016
126
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 4.08 KB | None | 0 0
  1. rom selenium import webdriver
  2. from selenium.webdriver.common.proxy import *
  3. from selenium.common.exceptions import *
  4. from selenium.webdriver.common.by import By
  5. from selenium.webdriver.support.ui import WebDriverWait # available since 2.4.0
  6. from selenium.webdriver.support import expected_conditions as EC
  7. import time
  8. import string
  9.  
  10.  
  11.  
  12. TOR_PROXY_IP="107.191.61.167"
  13. TOR_PROXY_PORT=81
  14. TOR_PROXY_IP2="58.27.217.75"
  15. TOR_PROXY_PORT2=3128
  16.  
  17. proxy_counter=0
  18. proxreader=webdriver.Firefox()
  19. while(1):
  20.     try:
  21.         page=proxreader.get("https://incloak.com/proxy-list/?start="+str(proxy_counter))
  22.     except:
  23.         break
  24.     #print proxreader.page_source
  25.     prxtable=proxreader.find_element_by_class_name("proxy__t")
  26.     table_strip=prxtable.find_element_by_tag_name("tbody")
  27.     table_rows=table_strip.find_elements_by_tag_name("tr")
  28.  
  29.     for proxy_data in table_rows:
  30.         proxy_elements=proxy_data.find_elements_by_tag_name("td")
  31.         print proxy_elements
  32.         if(proxy_elements[4].text.find("HTTPS")<0):
  33.             pass
  34.         elif(proxy_elements[5].text.find("High")<0):
  35.             pass
  36.         else:
  37.             TOR_PROXY_IP2=proxy_elements[0].text
  38.             TOR_PROXY_PORT2=proxy_elements[1].text
  39.             print TOR_PROXY_IP2+":"+TOR_PROXY_PORT2
  40.  
  41.  
  42.             profile=webdriver.FirefoxProfile()
  43.  
  44. #profile.add_extension("noscript_security_suite-2.6.8.12-fn+sm+fx.xpi")
  45.  
  46.             profile.set_preference('noscript.firstRunRedirection', False)
  47.  
  48.             profile.set_preference("network.proxy.type", 1);
  49.             profile.set_preference("network.proxy.http", TOR_PROXY_IP);
  50.             profile.set_preference("network.proxy.http_port", TOR_PROXY_PORT);
  51.             profile.set_preference("network.proxy.ssl", TOR_PROXY_IP2);
  52.             profile.set_preference("network.proxy.ssl_port", TOR_PROXY_PORT2);
  53.  
  54. # Lie about which browser we are
  55.  
  56. #profile.set_preference("general.useragent.override","Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20100101 Firefox/17.0")
  57. #profile.set_preference("general.useragent.override","Mozilla/5.0 (Windows NT 6.1; WOW64; rv:22.0) Gecko/20100101 Firefox/22.0")
  58. #profile.set_preference("general.useragent.override","Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0")
  59.  
  60.             profile.set_preference("general.useragent.override","Mozilla/5.0 (X11; Linux i586; rv:31.0) Gecko/20100101 Firefox/31.0")
  61.  
  62. #spammer=webdriver.Firefox(profile)
  63.             proxy = Proxy({
  64.                    'proxyType': 'MANUAL',
  65.                    'httpProxy': TOR_PROXY_IP+":"+str(TOR_PROXY_PORT),
  66.                    'ftpProxy': TOR_PROXY_IP,
  67.                    'sslProxy': TOR_PROXY_IP2+":"+str(TOR_PROXY_PORT2),
  68.                    'noProxy': '' # set this value as desired
  69.                 })
  70.             spammer=webdriver.Firefox(proxy=proxy)
  71.             page=spammer.get('https://qchat.rizon.net')
  72.             try:
  73.                 username=spammer.find_element_by_xpath("/html/body/div/div[4]/table/tbody/tr/td/table/tbody/tr/td/form/table/tbody/tr[1]/td[2]/input")
  74.             except NoSuchElementException:
  75.                 spammer.close()
  76.                 continue
  77.             username.send_keys("Rectum")
  78.             channel=spammer.find_element_by_xpath("/html/body/div/div[4]/table/tbody/tr/td/table/tbody/tr/td/form/table/tbody/tr[2]/td[2]/input")
  79.             channel.send_keys("\b\b\b\b\b\b#anarcho")
  80.     #spammer.execute_script("arguments[0].setAttribute('value','#anarcho');",channel)
  81.             time.sleep(1)
  82.             connect_button=spammer.find_element_by_xpath("/html/body/div/div[4]/table/tbody/tr/td/table/tbody/tr[2]/td/form/table/tbody/tr[5]/td[2]/input")
  83.             connect_button.click()
  84.             time.sleep(20)
  85.             connection_string=str(spammer.execute_script("return document.getElementsByTagName('html')[0].innerHTML;"))
  86.             if(connection_string.find("Signed on!")<0) :
  87.                 print "Not connected"
  88.                 spammer.close()
  89.             else:
  90.                 while(spammer):
  91.                     pass
  92.     proxy_counter=proxy_counter+64
  93.            
  94. print "Pass complete"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement