Advertisement
Guest User

Fuck Runescape Phishers

a guest
Jan 29th, 2019
627
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.61 KB | None | 0 0
  1. #!/usr/bin/env python2.7
  2.  
  3. from faker import Faker
  4. import random, requests, threading, time
  5.  
  6. #To update to the new url he's phishing with update this url below
  7. #It should be the same request data since he's a moron and doesnt change his site at all
  8. #between reuploads of his phishing site.
  9. #to increase the amount of fake details sent change the line "for x in range(25)" to any number of threads you want..
  10. #25 is a small amount.. most computers can handle up to a few hundred threads.. but you network might not like it.
  11.  
  12. #url = "https://secure.runescape.com-ao.cz/m=weblogina/loginform851,968,289,38242934,1023"
  13. #url = "https://secure.runescape.com-ios.ru/m=weblogin/loginform.ws851,968,289,38242934,1"
  14. url = "https://secure.runescape.ca-in.cz/m=weblogin/loginform.ws851,968,289,38242934,1"
  15.  
  16. fake = Faker()
  17.  
  18. class spam(threading.Thread):
  19.     def run(self):
  20.         while(True):
  21.             email = '{}{}@{}'.format(fake.user_name(), random.randint(100, 1000), fake.free_email_domain())
  22.             password = fake.password(length = random.randint(8, 10), special_chars = False)
  23.             payload = "username="+email+"&password="+password+"&login=submit&mod=www&ssl=3bd82c92306cc685cb095d617a5aeabf&dest=community&page_referral=&token=c09595fac9332f08eb6ebadbed20a637"
  24.             headers = {
  25.                 'origin': "https://secure.runescape.com-ao.cz",
  26.                 'upgrade-insecure-requests': "1",
  27.                 'dnt': "1",
  28.                 'content-type': "application/x-www-form-urlencoded",
  29.                 'user-agent': "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.80 Safari/537.36",
  30.                 'accept': "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
  31.                 'referer': "https://secure.runescape.com-ao.cz/m=weblogina/loginform851,968,289,38242934,1023",
  32.                 'accept-encoding': "gzip, deflate, br",
  33.                 'accept-language': "en-US,en;q=0.9",
  34.                 'cookie': "PHPSESSID=pblq26q2luuqpo1vcim7d6hr20",
  35.                 'cache-control': "no-cache",
  36.                 }
  37.  
  38.             response = requests.request("POST", url, data=payload, headers=headers)
  39.             print("Sent Amt:" + str(counter.increment()))
  40.  
  41. class AtomicCounter:
  42.     def __init__(self, initial=0):
  43.         """Initialize a new atomic counter to given initial value (default 0)."""
  44.         self.value = initial
  45.         self._lock = threading.Lock()
  46.  
  47.     def increment(self, num=1):
  48.         """Atomically increment the counter by num (default 1) and return the
  49.        new value.
  50.        """
  51.         with self._lock:
  52.             self.value += num
  53.             return self.value
  54.  
  55. if __name__ == '__main__':
  56.     counter = AtomicCounter()
  57.     for x in range(25):
  58.         mythread = spam().start()
  59.         time.sleep(.1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement