Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- def login(user, password, sess):
- sess = requests.Session()
- sess.headers.update({"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefaox/52.0"})
- username = user #input("Username >>") #"Username"
- API_KEY = key.api #input ("KEY >>") #'KEY'
- password = password #input("Password >>")
- site_key = key.login
- url = 'http://legacy.hackerexperience.com/'
- sess.get(url)
- url = 'http://legacy.hackerexperience.com/'
- captcha_id = s.post("http://2captcha.com/in.php?key={}&method=userrecaptcha&googlekey={}&pageurl={}".format(API_KEY, site_key, url)).text.split('|')[1]
- if(captcha_id == 'ERROR_ZERO_BALANCE'):
- print("No balance")
- recaptcha_answer = sess.get("http://2captcha.com/res.php?key={}&action=get&id={}".format(API_KEY, captcha_id)).text
- start = time.time()
- print("Solving Captcha...")
- while 'CAPCHA_NOT_READY' in recaptcha_answer:
- time.sleep(5)
- recaptcha_answer = sess.get("http://2captcha.com/res.php?key={}&action=get&id={}".format(API_KEY, captcha_id)).text
- if(recaptcha_answer == 'ERROR_CAPTCHA_UNSOLVABLE'):
- print("Captcha failed")
- else:
- end = time.time()
- print("Time Elapsed: ",end - start)
- recaptcha_answer = recaptcha_answer.split('|')[1]
- #password = input("Password >>") #'Lemons22'
- payload = {
- 'action':'login',
- 'username':username,
- 'password':password,
- 'g-recaptcha-response':recaptcha_answer,
- 'terms':1
- }
- url = 'https://legacy.hackerexperience.com/login'
- complete = sess.post(url,payload)
- NEW MODULE:
- import requests
- import sys
- import time
- import helib
- IP1 = helib.ip.Snowman
- IP2 = helib.ip.Genie
- helib.login(helib.user.Genie, helib.password.Dzd, "s")
- s = requests.Session()
- s.headers.update({"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefaox/52.0"})
- helib.login(helib.user.Snowman, helib.password.Dzd, "f")
- f = requests.Session()
- s.headers.update({"User-Agent": "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefaox/52.0"})
- while True:
- ddos = s.post("https://legacy.hackerexperience.com/DDoS", data = {'ip':IP}, headers=headers) # SEND POST REQUEST
- print ("Launching DDoS...")
- if "Hacker Experience is a browser-based hacking simulation game" in ddos.text: # CHECK IF THE SESSION IS VALID
- print ("Error: Invalid PHPSESSID")
- sys.exit()
- elif "Launch DDoS attack" in ddos.text: # CHECK IF THERE WAS AN ERROR
- print ("Error: There was an issue launching the DDoS Attack, please make sure the IP is valid and alive")
- sys.exit()
- else:
- print ("DDoS Attack Launched Against {} | Waiting 5 minutes...".format(IP1))
- print ("-------------------------------------")
- time.sleep(10)
- ddos = f.post("https://legacy.hackerexperience.com/DDoS", data = {'ip':IP2}, headers=headers) # SEND POST REQUEST
- print ("Launching DDoS...")
- if "Hacker Experience is a browser-based hacking simulation game" in ddos.text: # CHECK IF THE SESSION IS VALID
- print ("Error: Invalid PHPSESSID")
- sys.exit()
- elif "Launch DDoS attack" in ddos.text: # CHECK IF THERE WAS AN ERROR
- print ("Error: There was an issue launching the DDoS Attack, please make sure the IP is valid and alive")
- sys.exit()
- else:
- print ("DDoS Attack Launched Against {} | Waiting 5 minutes...".format(IP2))
- time.sleep(300)
- completeddos = f.get("https://legacy.hackerexperience.com/list?action=ddos", headers=headers)
- completeddos = s.get("https://legacy.hackerexperience.com/list?action=ddos", headers=headers)
- print ("-------------------------------------")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement