Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import sys, os, re, socket, binascii, time, json, random, threading, queue, pprint, smtplib, telnetlib, os.path, hashlib, string, urllib, glob, sqlite3, urllib, argparse, marshal, base64, colorama, requests
- from colorama import *
- from urllib.parse import urlparse
- from random import choice
- from colorama import Fore, Back, init
- from email.mime.multipart import MIMEMultipart
- from email.mime.text import MIMEText
- from platform import system
- from queue import Queue
- from time import strftime
- from urllib.parse import urlparse
- #from urllib import urlopen
- from multiprocessing.dummy import Pool
- import platform
- try:
- if platform.system() == 'Linux':
- os.system('clear')
- else:
- os.system('cls')
- except:
- pass
- colorama.init()
- CLEAR_SCREEN = '\x1b[2J'
- RED = '\x1b[31m'
- RESET = '\x1b[0m'
- BLUE = '\x1b[34m'
- CYAN = '\x1b[36m'
- GREEN = '\x1b[32m'
- RESET = '\x1b[0m'
- BOLD = '\x1b[m'
- REVERSE = '\x1b[m'
- def logo():
- clear = '\x1b[0m'
- colors = [36, 32, 34, 35, 31, 37]
- x = """
- O O
- dO Ob
- dOO OOO LazyRev Premium Cracked
- dOOO oOOO [email protected]
- dOOOO oOOO
- OOOOO OOOOO
- OOOOO OOOOO
- OOOOO OOOOO
- YOOOO OOOOO
- YOOO OOOP
- oOOOOOOOOOOOOb
- oOOOOOOOOOOOOOOOb
- oOOOb dOOOOOOOOOOO
- OOOOOOOOOOOOOOOOOOO
- OOOOOOOOOOOOOOOOOOP
- OOOOOOOOOOOOOOOOOP
- YOOOOOOOOOOOOOOP
- YOOOOOOOOOOOP
- %%%%%%%%%%%%%%
- %%%%%%OOOjgsOOO
- """
- print(x)
- logo()
- def rev(ips):
- ip = ips.strip()
- print (BLUE + '[!] ' + (ip) + ' starting')
- state = ['us1', 'us2', 'us3', 'us4', 'us5', 'us6', 'us7', 'us8', 'us9', 'us10', 'us11', 'us12', 'us13', 'us14', 'us15', 'eu1', 'eu2', 'eu3', 'eu4', 'eu5', 'eu6', 'eu7', 'eu8', 'eu9', 'eu10']
- proxy = random.choice(state)
- head = {'Origin': 'https://' + proxy + '.proxysite.com',
- 'Upgrade-Insecure-Requests': '1',
- 'Referer': 'https://' + proxy + '.proxysite.com/process.php?d=kvGHR4ClqCRA%2FMz%2FGaZVmBPOKSBP1qSyl2Lss3SAXA4BGkgKuOjFgwq95CfpWeUIqKhs&b=1&f=norefer',
- 'Content-Type': 'application/x-www-form-urlencoded',
- 'Content-Type': 'application/x-www-form-urlencoded',
- 'User-Agent': 'Mozilla/5.0 (Linux; Android 9; ASUS_X00TD) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.111 Mobile Safari/537.36',
- 'Cookie': '_ga=GA1.2.315370923.1583173700; _gid=GA1.2.1736315481.1583173700; __gads=ID=0dc9d6f3fdabfdf9:T=1583141282:S=ALNI_Maet_bm_T86L4coEeaa0ckGWhSi8Q; c[viewdns.com][/][__cfduid]=d90086b4834bddb92decad4c3bb33364b1583141285; c[viewdns.com][/][PHPSESSID]=qeouhieom4acl9hlg5nl0mpdor'}
- data = {'allowCookies': 'on',
- 'd': 'https://api.hackertarget.com/reverseiplookup/?q=' + str(ip)}
- s = requests.Session()
- req = s.post('https://' + proxy + '.proxysite.com/includes/process.php?action=update', data=data, headers=head, timeout=15)
- res = req.content.decode('utf-8')
- rex = re.findall('<div class="col col-30" data-label="Domain name"><a href="(.*?)">(.*?)</a></div>', res)
- if 'error check your search parameter' in res:
- print(res)
- elif 'API count exceeded' in res:
- print(res)
- elif '<html>' in res:
- print('{} --> Error ' .format(ip))
- else:
- resp = res.split('\n')
- for x in resp:
- with open('udah_nih.txt', 'a') as (w):
- w.write('http://' + x + '\n')
- print (GREEN + '[*] ' + (ip) + ' > Success!')
- def getIP(sites):
- try:
- site = sites.strip()
- url = site.replace('http://', '').replace('https://', '').replace('/', '')
- ips = socket.gethostbyname(url)
- ip = ips + '\n'
- open('ips.txt', 'a')
- if ip not in open('ips.txt', 'r'):
- open('ips.txt', 'a').write(ip + '\n')
- rev(ip)
- else:
- print (RED + '[!] same IP Found, try to Skip . . .')
- except Exception as e:
- print(RED + '[ ! ] IP ERROR, try to skip . . . ')
- try:
- nam = input('TARGET : ' )
- th = input('THREAD : ' )
- print ('[+] Starting . . . . .\n\n')
- time.sleep(3)
- liss = [ i.strip() for i in open(nam, 'r').readlines() ]
- zm = Pool(int(th))
- zm.map(getIP, liss)
- except Exception as e:
- print('goblok')
Add Comment
Please, Sign In to add comment