Advertisement
opencard

Anti-Fake WarFace

Jan 6th, 2018
1,032
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.92 KB | None | 0 0
  1. import socks, socket
  2. import urllib.parse, urllib.request
  3. from random import choice
  4. from random import randint as i
  5. from time import sleep as wait_flood
  6.  
  7. socks.setdefaultproxy(socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9050)
  8. socket.socket = socks.socksocket
  9.  
  10. def r(N, pwd = 1):
  11.     stack = ""
  12.     for n in range(N): stack += choice("abcdefghijklmnopqrstuvwxyz")
  13.     if pwd: stack += choice(["@mail.ru", "@bk.ru", "@list.ru", "@inbox.ru"])
  14.     return stack
  15.  
  16. t, f, = 0, 0
  17. while True:
  18.     try:
  19.         data = urllib.parse.urlencode({'login': r(i(1,15)), 'password': r(i(8,30), 0)}).encode('ascii')
  20.         urllib.request.urlopen("http://war-donate.ru/index.php", data).read()
  21.         t += 1
  22.     except:
  23.         print("[!]\tTimeout 30 sec", end = "", flush = True)
  24.         for i in range(30): print(".", end = "", flush = True); wait_flood(1)
  25.         print(""); f += 1
  26.     print("[*]\tSuccessfully - Error:\t%s" % (t - f))
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement