Advertisement
wasdpro

eeeeeeee

May 26th, 2024
30
0
Never
4
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.03 KB | None | 0 0
  1. Lenovo-897187482960019892a244ac8591
Advertisement
Comments
  • wasdpro
    253 days
    Comment was deleted
  • wasdpro
    253 days
    # text 8.58 KB | 0 0
    1. import os
    2. from pathlib import Path
    3. import subprocess
    4. from tkinter import *
    5. from pathlib import Path
    6. from tkinter import Tk, Canvas, END, Text, Button, PhotoImage
    7. import hashlib
    8. import tkinter as tk
    9. from PIL import Image, ImageTk
    10. from tkinter import messagebox
    11. from secrets import token_hex
    12. import subprocess , tempfile,os
    13. from itertools import count, cycle
    14. import json
    15. import base64
    16. from psutil import NoSuchProcess, AccessDenied, ZombieProcess, process_iter
    17. from threading import Thread
    18. from multiprocessing import cpu_count
    19. from ctypes import windll
    20. import urllib3
    21. mypcname = os.getlogin()
    22. OUTPUT_PATH = Path(__file__).parent
    23. ASSETS_PATH = OUTPUT_PATH / Path(r"img")
    24. def relative_to_assets(path: str) -> Path:
    25. return ASSETS_PATH / Path(path)
    26. def generate_hwid():
    27. uuid = subprocess.check_output('wmic csproduct get uuid', shell=False).decode().strip()
    28. hashed_hwid = hashlib.sha256(uuid.encode()).hexdigest()
    29. return hashed_hwid
    30. def gethwid():
    31. blist = []
    32. uuid = subprocess.check_output('wmic csproduct get uuid', shell=False).decode()
    33. uuid = uuid.strip().split('\r\n')
    34. blist.append(uuid[1])
    35. blist = json.dumps(blist, ensure_ascii=False).encode('utf-8')
    36. blist = b'897187482960019477' + base64.b64encode(blist)
    37. return blist.decode('UTF-8')
    38. def datahwid() -> str:
    39. http = urllib3.PoolManager()
    40. response = http.request('GET', 'https://pastebin.com/XXXXXX')
    41. return response.data.decode()
    42. new_hwid = generate_hwid()[:16]
    43. hw = gethwid()[:15]
    44. mypcname = os.getlogin()
    45. hwid = f'''{mypcname}-{hw}{new_hwid}'''
    46.  
    47.  
    48. ############################################################################### อย่าไปยู๊ง ###############################################################################
    49.  
    50.  
    51.  
    52. #############################################################################################################################################################################################################################################
    53.  
    54. def BOTTLE():
    55. subprocess.call('@echo off', shell=True)
    56. subprocess.call('timeout 000000.1 >nu1', shell=True)
    57. subprocess.call('color 0f', shell=True)
    58. subprocess.call('ping localhost -n 3 >nul', shell=True)
    59. subprocess.call('cls', shell=True)
    60. subprocess.call('color 0f', shell=True)
    61. subprocess.call('cls', shell=True)
    62. subprocess.call('ipconfig /release', shell=True)
    63. subprocess.call('ipconfig /renew', shell=True)
    64. subprocess.call('ipconfig /flushdns', shell=True)
    65. subprocess.call('cls', shell=True)
    66. subprocess.call('color 0f', shell=True)
    67. subprocess.call('cls', shell=True)
    68. subprocess.call('ping localhost -n 3 >nul', shell=True)
    69. subprocess.call('cls', shell=True)
    70. subprocess.call('color 0f', shell=True)
    71. subprocess.call('cls', shell=True)
    72. subprocess.call('netsh int ip reset', shell=True)
    73. subprocess.call('netsh winsock reset catalog', shell=True)
    74. subprocess.call('netsh branchcache reset', shell=True)
    75. subprocess.call('netsh int ip reset c:resetlog.txt', shell=True)
    76. subprocess.call('netsh int ip reset C: cplog.txt', shell=True)
    77. subprocess.call('netsh winsock reset', shell=True)
    78. subprocess.call('netsh int ip reset all', shell=True)
    79. subprocess.call('nbtstat -R', shell=True)
    80. subprocess.call('nbtstat -RR', shell=True)
    81. subprocess.call('netsh int ipv4 reset', shell=True)
    82. subprocess.call('netsh int ipv6 reset', shell=True)
    83. subprocess.call('cls', shell=True)
    84. subprocess.call('color 0f', shell=True)
    85. subprocess.call('cls', shell=True)
    86. subprocess.call('netsh interface ipv4 set subinterface "Ethernet" mtu=500000000 store=persistent', shell=True)
    87. subprocess.call('netsh int tcp set global congestionprovider=none', shell=True)
    88. subprocess.call('netsh int tcp set global autotuninglevel=high', shell=True)
    89. subprocess.call('netsh int tcp set global chimney=disabled', shell=True)
    90. subprocess.call('netsh int tcp set global dca=enable', shell=True)
    91. subprocess.call('netsh int tcp set global netdma=enable', shell=True)
    92. subprocess.call('netsh int tcp set heuristics enable', shell=True)
    93. subprocess.call('netsh int tcp set global rss=enabled', shell=True)
    94. subprocess.call('netsh int tcp set global timestamps=enable', shell=True)
    95. subprocess.call('for /f "usebackq" %%i in (`reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces`) do (', shell=True)
    96. subprocess.call('Reg.exe add %%i /v "TcpAckFrequency" /d "0,8" /t REG_DWORD /f', shell=True)
    97. subprocess.call('Reg.exe add %%i /v "TCPNoDelay" /d "0,8" /t REG_DWORD /f', shell=True)
    98. subprocess.call('Reg.exe add %%i /v "TCPDelAckTicks" /d "0,8" /t REG_DWORD /f', shell=True)
    99. subprocess.call('Reg.exe add %%i /v "MTU" /d "3000" /t REG_DWORD /f', shell=True)
    100. subprocess.call('Reg.exe add %%i /v "MSS" /d "1920" /t REG_DWORD /f', shell=True)
    101. subprocess.call('cls', shell=True)
    102. subprocess.call('color 0f', shell=True)
    103. subprocess.call('cd %temp%', shell=True)
    104. subprocess.call('ECHO > SG_Vista_TcpIp_Patch.reg Windows Registry Editor Version 5.00 ', shell=True)
    105. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg [HKEY_CURRENT_USER\Control Panel\Mouse]', shell=True)
    106. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "ActiveWindowTracking"=dword:000fffff', shell=True)
    107. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "DoubleClickWidth"="8"', shell=True)
    108. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseSpeed"="0" ', shell=True)
    109. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseThreshold1"="0,8"', shell=True)
    110. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseThreshold2"="0,8"', shell=True)
    111. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SmoothMouseXCurve"=hex:00,00,00,00,00,00,00,00,c0,cc,0c,00,00,00,00,00,80,99, 19,00,00,00,00,00,40,66,26,00,00,00,00,00,00,33,33,00,00,00,00,00', shell=True)
    112. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SmoothMouseYCurve"=hex:00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,0b,f0, 0a,00,00,00,00,00,00,00,00,00,00,00,00,00,5f,01,5e,01,00,00,00,00', shell=True)
    113. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SnapToDefaultButton"="0,8" ', shell=True)
    114. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "SwapMouseButtons"="0,8"', shell=True)
    115. subprocess.call('ECHO >> SG_Vista_TcpIp_Patch.reg "MouseTrails"="0"', shell=True)
    116. subprocess.call('regedit /s SG_Vista_TcpIp_Patch.reg', shell=True)
    117. subprocess.call('del SG_Vista_TcpIp_Patch.reg', shell=True)
    118. subprocess.call('CLS', shell=True)
    119. subprocess.call('goto:exit', shell=True)
    120. messagebox.showwarning("WAY G", "RUNโปรเเกรม\n\n ไช้งานได้เลย")
    121.  
    122.  
    123. class ImageLabel(tk.Label):
    124. """
    125. A Label that displays images, and plays them if they are gifs
    126. :im: A PIL Image instance or a string filename
    127. """
    128. def load(self, im):
    129. if isinstance(im, str):
    130. im = Image.open(im)
    131. frames = []
    132. try:
    133. for i in count(1):
    134. frames.append(ImageTk.PhotoImage(im.copy()))
    135. im.seek(i)
    136. except EOFError:
    137. pass
    138. self.frames = cycle(frames)
    139. try:
    140. self.delay = im.info['duration']
    141. except:
    142. self.delay = 100
    143. if len(frames) == 1:
    144. self.config(image=next(self.frames))
    145. else:
    146. self.next_frame()
    147. def unload(self):
    148. self.config(image=None)
    149. self.frames = None
    150. def next_frame(self):
    151. if self.frames:
    152. self.config(image=next(self.frames))
    153. self.after(self.delay, self.next_frame)
    154.  
    155. def bex():
    156. window_2.destroy()
    157.  
    158. #demo :
    159. window_2 = Tk()
    160. window_2.overrideredirect(1)
    161. window_2.title("Weapon rum config")
    162. window_2.geometry("961x547+440+165")
    163. window_2.configure(bg = "#FFFFFF")
    164. window_2.resizable(False, False)
    165. window_2.attributes('-topmost',)
    166.  
    167. lbl = ImageLabel(window_2)
    168. lbl.pack()
    169. lbl.load('UI.gif')
    170.  
    171. button_image_1= PhotoImage(
    172. file=relative_to_assets("RUN.gif"))
    173. button_1 = Button(
    174. image=button_image_1,
    175. borderwidth=0,
    176. highlightthickness=0,
    177. command=lambda: BOTTLE(),
    178. relief="flat"
    179. )
    180. button_1.place(
    181. x=673.9,
    182. y=439,
    183. width=287.1,
    184. height=70.1
    185. )
    186.  
    187. button_image_4= PhotoImage(
    188. file=relative_to_assets("X.gif"))
    189. button_4 = Button(
    190. image=button_image_4,
    191. borderwidth=0,
    192. highlightthickness=0,
    193. command=lambda: bex(),
    194. relief="flat"
    195. )
    196. button_4.place(
    197. x=858.5,
    198. y=5,
    199. width=56.4,
    200. height=21.7
    201. )
    202.  
    203. window_2.mainloop()
    204.  
  • wasdpro
    134 days
    # text 0.00 KB | 0 0
    1. ADAD
  • wasdpro
    134 days
    # text 0.04 KB | 0 0
    1. 4A57975E-F741-11EA-80E7-5405DB63CB4B
Add Comment
Please, Sign In to add comment
Advertisement