Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- @echo off
- color 5
- title Waifu Pinger
- :pingerstart
- echo __ __ ___
- echo /\ \ __/\ \ __ /'___\
- echo \ \ \/\ \ \ \ __ /\_\/\ \__/ __ __
- echo \ \ \ \ \ \ \ /'__`\ \/\ \ \ ,__\/\ \/\ \
- echo \ \ \_/ \_\ \/\ \L\.\_\ \ \ \ \_/\ \ \_\ \
- echo \ `\___x___/\ \__/.\_\\ \_\ \_\ \ \____/
- echo '\/__//__/ \/__/\/_/ \/_/\/_/ \/___/
- echo ____
- echo /\ _`\ __
- echo \ \ \L\ \/\_\ ___ __ __ _ __
- echo \ \ ,__/\/\ \ /' _ `\ /'_ `\ /'__`\/\`'__\
- echo \ \ \/ \ \ \/\ \/\ \/\ \L\ \/\ __/\ \ \/
- echo \ \_\ \ \_\ \_\ \_\ \____ \ \____\\ \_\
- echo \/_/ \/_/\/_/\/_/\/___L\ \/____/ \/_/
- echo /\____/
- echo \_/__/
- echo ================================================
- echo - Controls: Press Ctrl+C To Stop -
- echo ================================================
- echo - Credit: Made by WeebGang -
- echo ================================================
- echo - Misc: Type "ChooChoo" In Pinger For Ip Tools -
- echo ================================================
- :hub
- set /p IP=Enter Target to Ping:
- if %IP%==ChooChoo goto iplook
- :top
- PING -n 1 %IP% | FIND "TTL="
- title -- Currently Pinging %IP% --
- IF ERRORLEVEL 1 (echo Target Downed)
- set /a num=(%Random%%%9)+1
- color %num%
- ping -t 1 0 10 127.0.0.1 >nul
- Goto top
- title Waifu Pinger
- :iplook
- title Waifu Tools
- color 05
- setlocal ENABLEDELAYEDEXPANSION
- set webclient=webclient
- if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
- if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
- :menu
- cls
- echo Discontinued. . .
- echo [Press 1 To Read Current Ip]
- echo [Press 2 To LookUp An Ip]
- echo [Press 3 To Return To Pinger]
- echo [Press 4 To TraceRoute]
- echo [Press 5 To PortScan]
- echo [Press 6 To Find A Websites Ip]
- echo [Press 7 To Run WhoIs LookUp]
- echo [Press 8 To Run NSLookUP]
- echo [Press 9 To View Response Text]
- goto action
- :input
- echo.
- echo Please Select One
- echo.
- :action
- echo.
- set /p action=Pick A Tool:
- if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5" >> %temp%\%webclient%.vbs & goto apirequest
- if '%action%'=='2' goto iplookup
- if '%action%'=='3' cls
- if '%action%'=='3' goto pingerstart
- if '%action%'=='4' goto traceroute
- if '%action%'=='5' goto portscan
- if '%action%'=='6' goto cfresolver
- if '%action%'=='7' goto whois
- if '%action%'=='8' goto nslookup
- if '%action%'=='9' goto opentext
- goto input
- :iplookup
- cls
- echo.
- echo Enter The Ip To LookUp
- echo.
- set /p ip=Ip:
- echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
- echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&ip=%ip%" >> %temp%\%webclient%.vbs
- goto apirequest
- :parseiplookup
- cls
- echo.
- for /f "delims= " %%i in ('findstr /i ":" %temp%\response.txt') do (
- set data=%%i
- echo !data!
- )
- echo.
- pause
- goto menu
- :apirequest
- if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
- if %action% NEQ update (
- set rqst_type=POST
- cls
- echo.
- echo Please Wait While It Loads. . .
- )
- echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
- echo oHTTP.open "%rqst_type%", sUrl,false >> %temp%\%webclient%.vbs
- echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
- echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
- echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
- echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
- echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
- echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
- echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
- echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
- echo objFile.Close >> %temp%\%webclient%.vbs
- echo Wscript.Quit >> %temp%\%webclient%.vbs
- start %temp%\%webclient%.vbs
- set /a requests=0
- :checkresponseexists
- set /a requests=%requests% + 1
- if %requests% gtr 10 goto failed
- IF EXIST "%temp%\response.txt" (
- goto response_exist
- ) ELSE (
- ping 127.0.0.1 -n 2 -w 1000 >nul
- goto checkresponseexists
- )
- :failed
- tasklist | find "wscript.exe" >nul
- if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
- del "%temp%\%webclient%.vbs" /f /q /s >nul
- echo.
- echo Did not receive a response from the API.
- echo.
- pause
- goto menu
- :response_exist
- del "%temp%\%webclient%.vbs" /f /q /s >nul
- if %action% EQU update if '%dlupdate%'=='y' goto update
- find "error code: 1006" %temp%\response.txt >nul
- if %errorlevel% EQU 0 goto banned
- find "One more step" %temp%\response.txt >nul
- if %errorlevel% EQU 0 goto cbanned
- find "Web server is down" %temp%\response.txt >nul
- if %errorlevel% EQU 0 goto offline
- find "Connection timed out" %temp%\response.txt >nul
- if %errorlevel% EQU 0 goto offline
- find "404 Not Found" %temp%\response.txt >nul
- if %errorlevel% EQU 0 goto offline
- goto verified
- :banned
- cls
- echo.
- echo Error: You have been banned for abuse.
- ping 127.0.0.1 -n 4 -w 1000 >nul
- del "%temp%\response.txt" /f /q /s >nul
- exit
- :cbanned
- cls
- echo.
- echo Error: Your IP has been blocked for security purposes.
- echo Contact @DDoS_Filter on instagram for help.
- echo Sorry for any inconvinience.
- echo If you are using a VPN and have received this error message,
- echo turn off the VPN, and try again.
- ping 127.0.0.1 -n 8 -w 1000 >nul
- del "%temp%\response.txt" /f /q /s >nul
- exit
- :offline
- cls
- echo.
- echo Error: The API Is Offline.
- ping 127.0.0.1 -n 4 -w 1000 >nul
- del "%temp%\response.txt" /f /q /s >nul
- goto menu
- :verified
- set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
- for /f %%i in ('!data!') do set lines=%%i
- if %lines% LSS 10 (
- set /a lines=20
- ) else (
- set /a lines=%lines% + 3
- )
- if '%action%'=='update' goto checkversion
- if '%action%'=='1' goto parseiplookup
- if '%action%'=='2' goto parseiplookup
- if '%action%'=='5' goto parsepscan
- if '%action%'=='6' goto parsecfresolver
- if '%action%'=='7' goto parsewhois
- goto menu
- :iplookup
- cls
- echo.
- echo Type An IP To Lookup
- echo.
- set /p ip=IP:
- echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
- echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&ip=%ip%" >> %temp%\%webclient%.vbs
- goto apirequest
- :parseiplookup
- cls
- echo.
- for /f "delims= " %%i in ('findstr /i ":" %temp%\response.txt') do (
- set data=%%i
- echo !data!
- )
- echo.
- pause
- goto menu
- :traceroute
- cls
- echo.
- echo Type An IP Or URL To Trace Route
- echo.
- set /p ip=Host:
- tracert %ip%
- echo.
- pause
- goto menu
- :portscan
- cls
- echo.
- echo Type A Host To Port Scan
- echo.
- set /p ip=Host:
- echo Currently Disabled Sorry
- goto apirequest
- :parsepscan
- cls
- echo.
- for /f "delims= " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
- set data=%%i
- echo !data!
- )
- echo.
- pause
- goto menu
- :cfresolver
- cls
- echo.
- echo Type A Domain To Resolve
- echo.
- set /p ip=Domain:
- echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
- echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&host=%ip%" >> %temp%\%webclient%.vbs
- goto apirequest
- :parsecfresolver
- cls
- echo.
- for /f "delims= " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
- set data=%%i
- echo !data!
- )
- echo.
- pause
- goto menu
- :whois
- cls
- echo.
- echo Type A Host To WhoIs Lookup
- echo.
- set /p ip=Host:
- echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
- echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&host=%ip%" >> %temp%\%webclient%.vbs
- goto apirequest
- :parsewhois
- cls
- echo.
- for /f "delims= " %%i in ('findstr /i ":" %temp%\response.txt') do (
- set data=%%i
- echo !data!
- )
- echo.
- pause
- goto menu
- :nslookup
- cls
- echo.
- echo Type An IP Or Domain To NSLookup
- echo.
- set /p ip=Host:
- cls
- echo.
- echo Name Server Look Up Using Cloudflare DNS. . .
- echo.
- nslookup %ip% 1.1.1.1
- echo.
- pause
- goto menu
- :opentext
- if exist "%temp%\response.txt" start %temp%/response.txt
- goto menu
- Rem http://ddosfilter.net/
- Rem https://pastebin.com/WbgYDjGS
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement