Advertisement
vl_accurxte

Waifu Pinger Pro (My Most Advanced Pinger)

Oct 6th, 2020 (edited)
2,345
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @echo off
  2. color 5                                                      
  3. title Waifu Pinger
  4.  
  5. :pingerstart
  6. echo  __      __                   ___          
  7. echo /\ \  __/\ \            __  /'___\          
  8. echo \ \ \/\ \ \ \     __   /\_\/\ \__/  __  __  
  9. echo  \ \ \ \ \ \ \  /'__`\ \/\ \ \ ,__\/\ \/\ \
  10. echo   \ \ \_/ \_\ \/\ \L\.\_\ \ \ \ \_/\ \ \_\ \
  11. echo    \ `\___x___/\ \__/.\_\\ \_\ \_\  \ \____/
  12. echo     '\/__//__/  \/__/\/_/ \/_/\/_/   \/___/                                                                                    
  13. echo  ____                                        
  14. echo /\  _`\   __                                
  15. echo \ \ \L\ \/\_\    ___      __      __   _ __  
  16. echo  \ \ ,__/\/\ \ /' _ `\  /'_ `\  /'__`\/\`'__\
  17. echo   \ \ \/  \ \ \/\ \/\ \/\ \L\ \/\  __/\ \ \/
  18. echo    \ \_\   \ \_\ \_\ \_\ \____ \ \____\\ \_\
  19. echo     \/_/    \/_/\/_/\/_/\/___L\ \/____/ \/_/
  20. echo                           /\____/            
  21. echo                           \_/__/            
  22. echo ================================================
  23. echo - Controls:     Press Ctrl+C To Stop           -
  24. echo ================================================
  25. echo - Credit:       Made by WeebGang               -
  26. echo ================================================
  27. echo - Misc: Type "ChooChoo" In Pinger For Ip Tools -
  28. echo ================================================
  29. :hub
  30. set /p IP=Enter Target to Ping:
  31. if %IP%==ChooChoo goto iplook
  32. :top
  33. PING -n 1 %IP% | FIND "TTL="
  34. title -- Currently Pinging %IP% --
  35. IF ERRORLEVEL 1 (echo Target Downed)
  36. set /a num=(%Random%%%9)+1
  37. color %num%
  38. ping -t 1 0 10 127.0.0.1 >nul
  39. Goto top
  40.  
  41. title Waifu Pinger
  42.  
  43.  
  44.  
  45.  
  46.  
  47.  
  48.  
  49.  
  50.  
  51.  
  52. :iplook
  53.  
  54. title Waifu Tools
  55. color 05
  56. setlocal ENABLEDELAYEDEXPANSION
  57. set webclient=webclient
  58. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  59. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  60.  
  61.  
  62.  
  63.  
  64.  
  65.  
  66.  
  67.  
  68. :menu
  69. cls
  70. echo Discontinued. . .
  71. echo [Press 1 To Read Current Ip]
  72. echo [Press 2 To LookUp An Ip]
  73. echo [Press 3 To Return To Pinger]
  74. echo [Press 4 To TraceRoute]
  75. echo [Press 5 To PortScan]
  76. echo [Press 6 To Find A Websites Ip]
  77. echo [Press 7 To Run WhoIs LookUp]
  78. echo [Press 8 To Run NSLookUP]
  79. echo [Press 9 To View Response Text]
  80. goto action
  81.  
  82.  
  83.  
  84. :input
  85. echo.
  86. echo Please Select One
  87. echo.
  88.  
  89. :action
  90. echo.
  91. set /p action=Pick A Tool:
  92. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5" >> %temp%\%webclient%.vbs & goto apirequest
  93. if '%action%'=='2' goto iplookup
  94. if '%action%'=='3' cls
  95. if '%action%'=='3' goto pingerstart
  96. if '%action%'=='4' goto traceroute
  97. if '%action%'=='5' goto portscan
  98. if '%action%'=='6' goto cfresolver
  99. if '%action%'=='7' goto whois
  100. if '%action%'=='8' goto nslookup
  101. if '%action%'=='9' goto opentext
  102. goto input
  103.  
  104.  
  105.  
  106.  
  107.  
  108.  
  109.  
  110.  
  111. :iplookup
  112. cls
  113. echo.
  114. echo Enter The Ip To LookUp
  115. echo.
  116. set /p ip=Ip:
  117. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  118. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&ip=%ip%" >> %temp%\%webclient%.vbs
  119. goto apirequest
  120. :parseiplookup
  121. cls
  122. echo.
  123. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  124.     set data=%%i
  125.     echo !data!
  126. )
  127. echo.
  128. pause
  129. goto menu
  130.  
  131.  
  132.  
  133.  
  134.  
  135.  
  136.  
  137. :apirequest
  138. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  139. if %action% NEQ update (
  140. set rqst_type=POST
  141. cls
  142. echo.
  143. echo  Please Wait While It Loads. . .
  144. )
  145. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  146. echo oHTTP.open "%rqst_type%", sUrl,false >> %temp%\%webclient%.vbs
  147. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  148. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  149. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  150. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  151. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  152. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  153. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  154. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  155. echo objFile.Close >> %temp%\%webclient%.vbs
  156. echo Wscript.Quit >> %temp%\%webclient%.vbs
  157. start %temp%\%webclient%.vbs
  158. set /a requests=0
  159. :checkresponseexists
  160. set /a requests=%requests% + 1
  161. if %requests% gtr 10 goto failed
  162. IF EXIST "%temp%\response.txt" (
  163. goto response_exist
  164. ) ELSE (
  165. ping 127.0.0.1 -n 2 -w 1000 >nul
  166. goto checkresponseexists
  167. )
  168. :failed
  169. tasklist | find "wscript.exe" >nul
  170. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  171. del "%temp%\%webclient%.vbs" /f /q /s >nul
  172. echo.
  173. echo  Did not receive a response from the API.
  174. echo.
  175. pause
  176. goto menu
  177. :response_exist
  178. del "%temp%\%webclient%.vbs" /f /q /s >nul
  179. if %action% EQU update if '%dlupdate%'=='y' goto update
  180. find "error code: 1006" %temp%\response.txt >nul
  181. if %errorlevel% EQU 0 goto banned
  182. find "One more step" %temp%\response.txt >nul
  183. if %errorlevel% EQU 0 goto cbanned
  184. find "Web server is down" %temp%\response.txt >nul
  185. if %errorlevel% EQU 0 goto offline
  186. find "Connection timed out" %temp%\response.txt >nul
  187. if %errorlevel% EQU 0 goto offline
  188. find "404 Not Found" %temp%\response.txt >nul
  189. if %errorlevel% EQU 0 goto offline
  190. goto verified
  191.  
  192.  
  193.  
  194. :banned
  195. cls
  196. echo.
  197. echo  Error: You have been banned for abuse.
  198. ping 127.0.0.1 -n 4 -w 1000 >nul
  199. del "%temp%\response.txt" /f /q /s >nul
  200. exit
  201. :cbanned
  202. cls
  203. echo.
  204. echo  Error: Your IP has been blocked for security purposes.
  205. echo  Contact @DDoS_Filter on instagram for help.
  206. echo  Sorry for any inconvinience.
  207. echo  If you are using a VPN and have received this error message,
  208. echo  turn off the VPN, and try again.
  209. ping 127.0.0.1 -n 8 -w 1000 >nul
  210. del "%temp%\response.txt" /f /q /s >nul
  211. exit
  212. :offline
  213. cls
  214. echo.
  215. echo  Error: The API Is Offline.
  216. ping 127.0.0.1 -n 4 -w 1000 >nul
  217. del "%temp%\response.txt" /f /q /s >nul
  218. goto menu
  219. :verified
  220. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  221. for /f %%i in ('!data!') do set lines=%%i
  222. if %lines% LSS 10 (
  223. set /a lines=20
  224. ) else (
  225. set /a lines=%lines% + 3
  226. )
  227. if '%action%'=='update' goto checkversion
  228. if '%action%'=='1' goto parseiplookup
  229. if '%action%'=='2' goto parseiplookup
  230. if '%action%'=='5' goto parsepscan
  231. if '%action%'=='6' goto parsecfresolver
  232. if '%action%'=='7' goto parsewhois
  233. goto menu
  234. :iplookup
  235. cls
  236. echo.
  237. echo Type An IP To Lookup
  238. echo.
  239. set /p ip=IP:
  240. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  241. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&ip=%ip%" >> %temp%\%webclient%.vbs
  242. goto apirequest
  243. :parseiplookup
  244. cls
  245. echo.
  246. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  247.     set data=%%i
  248.     echo !data!
  249. )
  250. echo.
  251. pause
  252. goto menu
  253. :traceroute
  254. cls
  255. echo.
  256. echo Type An IP Or URL To Trace Route
  257. echo.
  258. set /p ip=Host:
  259. tracert %ip%
  260. echo.
  261. pause
  262. goto menu
  263. :portscan
  264. cls
  265. echo.
  266. echo Type A Host To Port Scan
  267. echo.
  268. set /p ip=Host:
  269. echo Currently Disabled Sorry
  270. goto apirequest
  271. :parsepscan
  272. cls
  273. echo.
  274. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  275.     set data=%%i
  276.     echo !data!
  277. )
  278. echo.
  279. pause
  280. goto menu
  281. :cfresolver
  282. cls
  283. echo.
  284. echo Type A Domain To Resolve
  285. echo.
  286. set /p ip=Domain:
  287. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
  288. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&host=%ip%" >> %temp%\%webclient%.vbs
  289. goto apirequest
  290. :parsecfresolver
  291. cls
  292. echo.
  293. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  294.     set data=%%i
  295.     echo !data!
  296. )
  297. echo.
  298. pause
  299. goto menu
  300. :whois
  301. cls
  302. echo.
  303. echo Type A Host To WhoIs Lookup
  304. echo.
  305. set /p ip=Host:
  306. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  307. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&host=%ip%" >> %temp%\%webclient%.vbs
  308. goto apirequest
  309. :parsewhois
  310. cls
  311. echo.
  312. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  313.     set data=%%i
  314.     echo !data!
  315. )
  316. echo.
  317. pause
  318. goto menu
  319. :nslookup
  320. cls
  321. echo.
  322. echo Type An IP Or Domain To NSLookup
  323. echo.
  324. set /p ip=Host:
  325. cls
  326. echo.
  327. echo Name Server Look Up Using Cloudflare DNS. . .
  328. echo.
  329. nslookup %ip% 1.1.1.1
  330. echo.
  331. pause
  332. goto menu
  333. :opentext
  334. if exist "%temp%\response.txt" start %temp%/response.txt
  335. goto menu
  336. Rem http://ddosfilter.net/
  337. Rem https://pastebin.com/WbgYDjGS
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement