IpVanish_Proxs@feyzo.py

decoded code
 avatar
unknown
python
4 years ago
8.0 kB
194
Indexable
import os,pip
import datetime,os
import socket,hashlib
import json,random,sys, time,re
try:
	import androidhelper as sl4a
	ad = sl4a.Android()
except:pass
import subprocess
import pathlib
subprocess.run(["clear", ""])
try:
	import requests
except:
	print("requests modulu yüklü değil \n requests modulü yükleniyor \n")
	pip.main(['install', 'requests'])
import requests

try:
	import timedelta
except:
	print("datetime modulu yüklü değil \n timedelta modulü yükleniyor \n")
	pip.main(['install', 'timedelta'])
import timedelta





import logging
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS="TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-256-GCM-SHA384:ECDHE:!COMP:TLS13-AES-256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:ECDH+AESGCM:ECDH+CHACHA20:DH+AESGCM:DH+CHACHA20:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+HIGH:DH+HIGH:RSA+AESGCM:RSA+AES:RSA+HIGH:!aNULL:!eNULL:!MD5:!3DES"
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
ses= requests.Session()
logging.captureWarnings(True)


subprocess.run(["clear", ""])
feyzo=("""
\33[1;30m▰▰▰▰ᴘʏᴛʜᴏɴ 🅵🅴🆈🆉🅾️ ▰▰▰▰▰▰▰       \33[1;30m            
     
╔══════════════════════════════════        
║████  ████ ██ ░░ ██ ██████ ░ ████ ░░░         
║██ ░░ ██ ░░ ██  ██ ░░░░ ██ ░██ ░ ██ ░░        
║████  ████ ░ ████ ░░░ ██ ░ ██ ░░░ ██ ░     
║██ ░░ ██ ░░░░ ██ ░░ ██ ░░░░ ██ ░ ██ ░░      
║██ ░░ ████ ░░ ██ ░░ ██████ ░ ████ ░░░        
╚══════════════════════════════════     )
              
\33[1;30m▰▰▰▰ \33[0;1;41m IpVanish  Proxy \33[40m  🅵🅴🆈🆉🅾️     \33[1;30m ▰▰▰▰             \33[0;1m

""")
try:
	import androidhelper
	dr=androidhelper.Android()
	dr.view('https://youtu.be/NFQOYauZzko')
except:pass
print(feyzo) 
combo="1"#input("""
#	Tarama türünü seçiniz..!
#1= #Combolu
#2 = Otomatik Combosuz

# Cevap=""" )
#subprocess.run(["clear", ""])
#print(feyzo) 
use=input("""
𝗜𝗽𝗩𝗮𝗻𝗶𝘀𝗵 𝗵𝗲𝘀𝗮𝗯𝗶 𝗺𝗮𝗶𝗹:𝗽𝗮𝘀𝘀 𝘆𝗮𝘇𝗶𝗻𝗶𝘇...

İpVanish Mail:Pass=""")
user=use.split(':')[0]
pas=use.split(':')[1]

print("Username:"+user)
print("Password:"+pas)
#pas=input("""

#"IpVanish Password=""")
now = datetime.datetime.now()
#trh=(now.strftime("%D"))
Dosya="/sdcard/IpVanish_Proxsy" +str(now.strftime("%D")).replace('/','-')+"@Feyzo.txt"
def Kaydet(hits):
    dosya=open(Dosya,'a+') 
    dosya.write(hits)
    dosya.close()    
#totLen="000000"
#if combo=="1":
# 	say=0
# 	dsy=""
# 	dir='/sdcard/combo/'
# 	for files in os.listdir (dir):
# 		say=say+1
# 		dsy=dsy+"	"+str(say)+"-) "+files+'\n'
# 	print ("""Aşağıdaki listeden combonuzu seçin!!!
#"""+dsy+"""
#\33[33mCombo klasörünüzde """ +str(say)+""" adet dosya bulundu !
#	""")
# 	dsyno=str(input(" \33[31mCombo No =\33[0m"))
# 	say=0
# 	for files in os.listdir (dir):
# 			say=say+1
# 			if dsyno==str(say):
# 				dosyaa=(dir+files)
# 	say=0
# 	print(dosyaa) 
 #	c=open(dosyaa, 'r')
# 	
# 	totLen=c.readlines()
link="https://tivimate.b4a.io/login" 
Headers={
 "X-Parse-Application-Id":"D9FkEvZLiVTXvYzQjAFpLqApaGwFne1ZRULTWlOr",
"X-Parse-App-Build-Version":"3151",
"X-Parse-App-Display-Version":"3.1.5",
"X-Parse-OS-Version":"5.1.1",
"User-Agent":"Parse Android SDK API Level 22",
"X-Parse-Installation-Id":"1d1c5f55-b70c-4bdc-985a-f07547d01a26",
"X-Parse-Client-Key":"FWKnOMn5YsusvMoG21wC5FSJsNUaO96tqw8ys7Zp",
"Content-Type":"application/json",
"Host":"tivimate.b4a.io",
"Connection":"Keep-Alive",
"Accept-Encoding":"gzip",
}

while True:
#if 1==1:
#for mp in open(dosyaa, 'r'):
	
	#mp=mp.replace("\n","")
#	user=mp.split(':')[0]
#	pas=mp.split(':')[1]

	
	url1 ="https://account.ipvanish.com/login/validate"
	Headers={
"origin":"https://account.ipvanish.com",
"referer":"https://account.ipvanish.com/login",
"sec-fetch-dest":"document",
"sec-fetch-mode":"navigate",
"sec-fetch-site":"same-origin",
"sec-fetch-user":"?1",
"upgrade-insecure-requests":"1",
"user-agent":"Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
"accept":"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
"accept-encoding":"gzip, deflate, br",
"accept-language":"en-US,en;q=0.9",
"cache-control":"max-age=0",
"content-length":"124",
}
	while True:
		try:
			res = ses.get(url1, timeout=15, verify=False)
			veri=str(res.text)
			clientToken=""
		except:pass
		if 'id="clientToken' in veri:
			clientToken=veri.split('id="clientToken" value="')[1].split('"')[0]
			break
	print(clientToken)
#	quit()
#	clientToken=""
	url2="https://account.ipvanish.com/login/validate"
	#CONTENT) "clientToken=<TOO>&username=<USER>&password=<PASS>" 
	
	data={"clientToken": clientToken,'username':user, 'password':pas}
	Headers={
"origin":"https://account.ipvanish.com",
"referer":"https://account.ipvanish.com/login",
"user-agent":"Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
    }
	res = ses.post(url2, headers=Headers, data=(data),timeout=15, verify=False)
	verid=str(res.text)
	#print(veri)
	#print("")
	if 'Active' in verid:
		url3="https://account.ipvanish.com/index.php?t=SOCKS5%20Proxy"
		Headers={
"origin":"https://account.ipvanish.com",
"referer":"https://account.ipvanish.com/login",
"sec-fetch-dest":"document",
"sec-fetch-mode":"navigate",
"sec-fetch-site":"same-origin",
"sec-fetch-user":"?1",
"upgrade-insecure-requests":"1",
"user-agent":"Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
"accept":"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
"accept-encoding":"gzip, deflate, br",
"accept-language":"en-US,en;q=0.9",
"cache-control":"max-age=0",
}
	    
	    
		res = ses.get(url3, headers=Headers,timeout=15, verify=False)
		veri=str(res.text)
		userp=veri.split('Username:</b>')[1].split('<')[0]
		pasp=veri.split('Password:</b>')[1].split('<')[0]
		portp=str(str(veri.split('<b>Port:</b>')[1]).split('<')[0])
		 
		userp=userp.replace(' ','')
		pasp=pasp.replace(' ','')
		portp=portp.replace(' ','')
		print(userp+'****'+pasp+':'+portp)
		
		
		url3="https://account.ipvanish.com/index.php?t=Server%20List"
		res = ses.get(url3, headers=Headers,timeout=15, verify=False)
		veri=str(res.text)
		for sr in veri.split('"StatTDLabel">'):
			if '.' in sr.split('<')[0]:
				ser=sr.split('<')[0]+':'+portp+':'+userp+':'+pasp
				print(ser)
				Kaydet(ser)
				
		print("\n\nDosyanız dahili hafızaya kaydedildi\n" +Dosya)
			
		
		
		
		
		
		#print(veri)
		quit()
	    #<p><b>Username:</b>
	    
	       
	    
		
		#print(i)
		#data={'username':user, 'password':pas,'_method':'GET'}
	#	res = ses.post(link, headers=Headers, data=json.dumps(data),timeout=15, verify=False)
	#	veri=str(res.text)
	#	print(veri)
		
		#CONTENT "{\"username\":\"<USER>\",\"password\":\"<PASS>\",\"_method\":\"GET\"}" 
	#  CONTENTTYPE "application/json" 
		
		
		quit()
	else:#	else:
		if 'g-recaptcha' in verid:
			print("""
			\33[1;31;47m
Vpn ülke değişimi yapınız...!			
""")
		
Editor is loading...