JamesBops

Untitled

Nov 7th, 2020
72
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.24 KB | None | 0 0
  1.  
  2. import sys, os, re, socket, binascii, time, json, random, threading, queue, pprint, smtplib, telnetlib, os.path, hashlib, string, urllib, glob, sqlite3, urllib, argparse, marshal, base64, colorama, requests
  3. from colorama import *
  4. from urllib.parse import urlparse
  5.  
  6. from random import choice
  7. from colorama import Fore, Back, init
  8. from email.mime.multipart import MIMEMultipart
  9. from email.mime.text import MIMEText
  10. from platform import system
  11. from queue import Queue
  12. from time import strftime
  13. from urllib.parse import urlparse
  14. #from urllib import urlopen
  15. from multiprocessing.dummy import Pool
  16. import platform
  17. try:
  18. if platform.system() == 'Linux':
  19. os.system('clear')
  20. else:
  21. os.system('cls')
  22. except:
  23. pass
  24.  
  25. colorama.init()
  26. CLEAR_SCREEN = '\x1b[2J'
  27. RED = '\x1b[31m'
  28. RESET = '\x1b[0m'
  29. BLUE = '\x1b[34m'
  30. CYAN = '\x1b[36m'
  31. GREEN = '\x1b[32m'
  32. RESET = '\x1b[0m'
  33. BOLD = '\x1b[m'
  34. REVERSE = '\x1b[m'
  35.  
  36. def logo():
  37. clear = '\x1b[0m'
  38. colors = [36, 32, 34, 35, 31, 37]
  39. x = """
  40. O O
  41. dO Ob
  42. dOO OOO LazyRev Premium Cracked
  43. dOOO oOOO [email protected]
  44. dOOOO oOOO
  45. OOOOO OOOOO
  46. OOOOO OOOOO
  47. OOOOO OOOOO
  48. YOOOO OOOOO
  49. YOOO OOOP
  50. oOOOOOOOOOOOOb
  51. oOOOOOOOOOOOOOOOb
  52. oOOOb dOOOOOOOOOOO
  53. OOOOOOOOOOOOOOOOOOO
  54. OOOOOOOOOOOOOOOOOOP
  55. OOOOOOOOOOOOOOOOOP
  56. YOOOOOOOOOOOOOOP
  57. YOOOOOOOOOOOP
  58. %%%%%%%%%%%%%%
  59. %%%%%%OOOjgsOOO
  60. """
  61. print(x)
  62.  
  63. logo()
  64.  
  65. def rev(ips):
  66. ip = ips.strip()
  67. print (BLUE + '[!] ' + (ip) + ' starting')
  68. state = ['us1', 'us2', 'us3', 'us4', 'us5', 'us6', 'us7', 'us8', 'us9', 'us10', 'us11', 'us12', 'us13', 'us14', 'us15', 'eu1', 'eu2', 'eu3', 'eu4', 'eu5', 'eu6', 'eu7', 'eu8', 'eu9', 'eu10']
  69. proxy = random.choice(state)
  70. head = {'Origin': 'https://' + proxy + '.proxysite.com',
  71. 'Upgrade-Insecure-Requests': '1',
  72. 'Referer': 'https://' + proxy + '.proxysite.com/process.php?d=kvGHR4ClqCRA%2FMz%2FGaZVmBPOKSBP1qSyl2Lss3SAXA4BGkgKuOjFgwq95CfpWeUIqKhs&b=1&f=norefer',
  73. 'Content-Type': 'application/x-www-form-urlencoded',
  74. 'Content-Type': 'application/x-www-form-urlencoded',
  75. 'User-Agent': 'Mozilla/5.0 (Linux; Android 9; ASUS_X00TD) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.111 Mobile Safari/537.36',
  76. 'Cookie': '_ga=GA1.2.315370923.1583173700; _gid=GA1.2.1736315481.1583173700; __gads=ID=0dc9d6f3fdabfdf9:T=1583141282:S=ALNI_Maet_bm_T86L4coEeaa0ckGWhSi8Q; c[viewdns.com][/][__cfduid]=d90086b4834bddb92decad4c3bb33364b1583141285; c[viewdns.com][/][PHPSESSID]=qeouhieom4acl9hlg5nl0mpdor'}
  77. data = {'allowCookies': 'on',
  78. 'd': 'https://api.hackertarget.com/reverseiplookup/?q=' + str(ip)}
  79. s = requests.Session()
  80. req = s.post('https://' + proxy + '.proxysite.com/includes/process.php?action=update', data=data, headers=head, timeout=15)
  81. res = req.content.decode('utf-8')
  82. rex = re.findall('<div class="col col-30" data-label="Domain name"><a href="(.*?)">(.*?)</a></div>', res)
  83. if 'error check your search parameter' in res:
  84. print(res)
  85. elif 'API count exceeded' in res:
  86. print(res)
  87. elif '<html>' in res:
  88. print('{} --> Error ' .format(ip))
  89. else:
  90. resp = res.split('\n')
  91. for x in resp:
  92. with open('udah_nih.txt', 'a') as (w):
  93. w.write('http://' + x + '\n')
  94.  
  95. print (GREEN + '[*] ' + (ip) + ' > Success!')
  96.  
  97.  
  98. def getIP(sites):
  99. try:
  100. site = sites.strip()
  101. url = site.replace('http://', '').replace('https://', '').replace('/', '')
  102. ips = socket.gethostbyname(url)
  103. ip = ips + '\n'
  104. open('ips.txt', 'a')
  105. if ip not in open('ips.txt', 'r'):
  106. open('ips.txt', 'a').write(ip + '\n')
  107. rev(ip)
  108. else:
  109. print (RED + '[!] same IP Found, try to Skip . . .')
  110. except Exception as e:
  111. print(RED + '[ ! ] IP ERROR, try to skip . . . ')
  112.  
  113.  
  114.  
  115. try:
  116. nam = input('TARGET : ' )
  117. th = input('THREAD : ' )
  118. print ('[+] Starting . . . . .\n\n')
  119. time.sleep(3)
  120. liss = [ i.strip() for i in open(nam, 'r').readlines() ]
  121. zm = Pool(int(th))
  122. zm.map(getIP, liss)
  123. except Exception as e:
  124. print('goblok')
  125.  
  126.  
  127.  
Add Comment
Please, Sign In to add comment