wasdpro
May 26th, 2024
1
0
Never
This is comment for paste eeeeeeee
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. import os
  2. from pathlib import Path
  3. import subprocess
  4. from tkinter import *
  5. from pathlib import Path
  6. from tkinter import Tk, Canvas, END, Text, Button, PhotoImage
  7. import hashlib
  8. import tkinter as tk
  9. from PIL import Image, ImageTk
  10. from tkinter import messagebox
  11. from secrets import token_hex
  12. import subprocess , tempfile,os
  13. from itertools import count, cycle
  14. import json
  15. import base64
  16. from psutil import NoSuchProcess, AccessDenied, ZombieProcess, process_iter
  17. from threading import Thread
  18. from multiprocessing import cpu_count
  19. from ctypes import windll
  20. import urllib3
  21. mypcname = os.getlogin()
  22. OUTPUT_PATH = Path(__file__).parent
  23. ASSETS_PATH = OUTPUT_PATH / Path(r"img")
  24. def relative_to_assets(path: str) -> Path:
  25. return ASSETS_PATH / Path(path)
  26. def generate_hwid():
  27. uuid = subprocess.check_output('wmic csproduct get uuid', shell=False).decode().strip()
  28. hashed_hwid = hashlib.sha256(uuid.encode()).hexdigest()
  29. return hashed_hwid
  30. def gethwid():
  31. blist = []
  32. uuid = subprocess.check_output('wmic csproduct get uuid', shell=False).decode()
  33. uuid = uuid.strip().split('\r\n')
  34. blist.append(uuid[1])
  35. blist = json.dumps(blist, ensure_ascii=False).encode('utf-8')
  36. blist = b'897187482960019477' + base64.b64encode(blist)
  37. return blist.decode('UTF-8')
  38. def datahwid() -> str:
  39. http = urllib3.PoolManager()
  40. response = http.request('GET', 'https://pastebin.com/XXXXXX')
  41. return response.data.decode()
  42. new_hwid = generate_hwid()[:16]
  43. hw = gethwid()[:15]
  44. mypcname = os.getlogin()
  45. hwid = f'''{mypcname}-{hw}{new_hwid}'''
  46.  
  47.  
  48. ############################################################################### อย่าไปยู๊ง ###############################################################################
  49.  
  50.  
  51.  
  52. #############################################################################################################################################################################################################################################
  53.  
  54. def BOTTLE():
  55. subprocess.call('@echo off', shell=True)
  56. subprocess.call('timeout 000000.1 >nu1', shell=True)
  57. subprocess.call('color 0f', shell=True)
  58. subprocess.call('ping localhost -n 3 >nul', shell=True)
  59. subprocess.call('cls', shell=True)
  60. subprocess.call('color 0f', shell=True)
  61. subprocess.call('cls', shell=True)
  62. subprocess.call('ipconfig /release', shell=True)
  63. subprocess.call('ipconfig /renew', shell=True)
  64. subprocess.call('ipconfig /flushdns', shell=True)
  65. subprocess.call('cls', shell=True)
  66. subprocess.call('color 0f', shell=True)
  67. subprocess.call('cls', shell=True)
  68. subprocess.call('ping localhost -n 3 >nul', shell=True)
  69. subprocess.call('cls', shell=True)
  70. subprocess.call('color 0f', shell=True)
  71. subprocess.call('cls', shell=True)
  72. subprocess.call('netsh int ip reset', shell=True)
  73. subprocess.call('netsh winsock reset catalog', shell=True)
  74. subprocess.call('netsh branchcache reset', shell=True)
  75. subprocess.call('netsh int ip reset c:resetlog.txt', shell=True)
  76. subprocess.call('netsh int ip reset C: cplog.txt', shell=True)
  77. subprocess.call('netsh winsock reset', shell=True)
  78. subprocess.call('netsh int ip reset all', shell=True)
  79. subprocess.call('nbtstat -R', shell=True)
  80. subprocess.call('nbtstat -RR', shell=True)
  81. subprocess.call('netsh int ipv4 reset', shell=True)
  82. subprocess.call('netsh int ipv6 reset', shell=True)
  83. subprocess.call('cls', shell=True)
  84. subprocess.call('color 0f', shell=True)
  85. subprocess.call('cls', shell=True)
  86. subprocess.call('netsh interface ipv4 set subinterface "Ethernet" mtu=500000000 store=persistent', shell=True)
  87. subprocess.call('netsh int tcp set global congestionprovider=none', shell=True)
  88. subprocess.call('netsh int tcp set global autotuninglevel=high', shell=True)
  89. subprocess.call('netsh int tcp set global chimney=disabled', shell=True)
  90. subprocess.call('netsh int tcp set global dca=enable', shell=True)
  91. subprocess.call('netsh int tcp set global netdma=enable', shell=True)
  92. subprocess.call('netsh int tcp set heuristics enable', shell=True)
  93. subprocess.call('netsh int tcp set global rss=enabled', shell=True)
  94. subprocess.call('netsh int tcp set global timestamps=enable', shell=True)
  95. subprocess.call('for /f "usebackq" %%i in (`reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces`) do (', shell=True)
  96. subprocess.call('Reg.exe add %%i /v "TcpAckFrequency" /d "0,8" /t REG_DWORD /f', shell=True)
  97. subprocess.call('Reg.exe add %%i /v "TCPNoDelay" /d "0,8" /t REG_DWORD /f', shell=True)
  98. subprocess.call('Reg.exe add %%i /v "TCPDelAckTicks" /d "0,8" /t REG_DWORD /f', shell=True)
  99. subprocess.call('Reg.exe add %%i /v "MTU" /d "3000" /t REG_DWORD /f', shell=True)
  100. subprocess.call('Reg.exe add %%i /v "MSS" /d "1920" /t REG_DWORD /f', shell=True)
  101. subprocess.call('cls', shell=True)
  102. subprocess.call('color 0f', shell=True)
  103. subprocess.call('cd %temp%', shell=True)
  104. subprocess.call('ECHO > SG_Vista_TcpIp_Patch.reg Windows Registry Editor Version 5.00 ', shell=True)
  105. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg [HKEY_CURRENT_USER\Control Panel\Mouse]', shell=True)
  106. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "ActiveWindowTracking"=dword:000fffff', shell=True)
  107. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "DoubleClickWidth"="8"', shell=True)
  108. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseSpeed"="0" ', shell=True)
  109. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseThreshold1"="0,8"', shell=True)
  110. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseThreshold2"="0,8"', shell=True)
  111. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SmoothMouseXCurve"=hex:00,00,00,00,00,00,00,00,c0,cc,0c,00,00,00,00,00,80,99, 19,00,00,00,00,00,40,66,26,00,00,00,00,00,00,33,33,00,00,00,00,00', shell=True)
  112. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SmoothMouseYCurve"=hex:00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,0b,f0, 0a,00,00,00,00,00,00,00,00,00,00,00,00,00,5f,01,5e,01,00,00,00,00', shell=True)
  113. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SnapToDefaultButton"="0,8" ', shell=True)
  114. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SwapMouseButtons"="0,8"', shell=True)
  115. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseTrails"="0"', shell=True)
  116. subprocess.call('regedit /s SG_Vista_TcpIp_Patch.reg', shell=True)
  117. subprocess.call('del SG_Vista_TcpIp_Patch.reg', shell=True)
  118. subprocess.call('CLS', shell=True)
  119. subprocess.call('goto:exit', shell=True)
  120. messagebox.showwarning("WAY G", "RUNโปรเเกรม\n\n ไช้งานได้เลย")
  121.  
  122.  
  123. class ImageLabel(tk.Label):
  124. """
  125. A Label that displays images, and plays them if they are gifs
  126. :im: A PIL Image instance or a string filename
  127. """
  128. def load(self, im):
  129. if isinstance(im, str):
  130. im = Image.open(im)
  131. frames = []
  132. try:
  133. for i in count(1):
  134. frames.append(ImageTk.PhotoImage(im.copy()))
  135. im.seek(i)
  136. except EOFError:
  137. pass
  138. self.frames = cycle(frames)
  139. try:
  140. self.delay = im.info['duration']
  141. except:
  142. self.delay = 100
  143. if len(frames) == 1:
  144. self.config(image=next(self.frames))
  145. else:
  146. self.next_frame()
  147. def unload(self):
  148. self.config(image=None)
  149. self.frames = None
  150. def next_frame(self):
  151. if self.frames:
  152. self.config(image=next(self.frames))
  153. self.after(self.delay, self.next_frame)
  154.  
  155. def bex():
  156. window_2.destroy()
  157.  
  158. #demo :
  159. window_2 = Tk()
  160. window_2.overrideredirect(1)
  161. window_2.title("Weapon rum config")
  162. window_2.geometry("961x547+440+165")
  163. window_2.configure(bg = "#FFFFFF")
  164. window_2.resizable(False, False)
  165. window_2.attributes('-topmost',)
  166.  
  167. lbl = ImageLabel(window_2)
  168. lbl.pack()
  169. lbl.load('UI.gif')
  170.  
  171. button_image_1= PhotoImage(
  172. file=relative_to_assets("RUN.gif"))
  173. button_1 = Button(
  174. image=button_image_1,
  175. borderwidth=0,
  176. highlightthickness=0,
  177. command=lambda: BOTTLE(),
  178. relief="flat"
  179. )
  180. button_1.place(
  181. x=673.9,
  182. y=439,
  183. width=287.1,
  184. height=70.1
  185. )
  186.  
  187. button_image_4= PhotoImage(
  188. file=relative_to_assets("X.gif"))
  189. button_4 = Button(
  190. image=button_image_4,
  191. borderwidth=0,
  192. highlightthickness=0,
  193. command=lambda: bex(),
  194. relief="flat"
  195. )
  196. button_4.place(
  197. x=858.5,
  198. y=5,
  199. width=56.4,
  200. height=21.7
  201. )
  202.  
  203. window_2.mainloop()
  204.  
Add Comment
Please, Sign In to add comment