Jump to content

Fake Hacking Python 3

Spoiled_Kitten

Hi all!

Wish to share the python 3 code i made that makes it appear as if u are hacking in case anyone needs it!

I have two made, One with 100% chance of success and one with a 95% chance of success

100% chance of success code: https://github.com/Blake-McCullough/FakeHackingPython3

95% chance of success code: https://github.com/Blake-McCullough/FakeHackingWithChanceOfFailPython3 

I also have attached the code if u wish to download it.

Thanks,

Blake

Fake hacking with chance of fail.py Fake Hacking.py

Blake has arrived!!

Just your local tech geek!

Love to help!

Link to comment
Share on other sites

Link to post
Share on other sites

Too lazy to look at or run the code, what do you mean by fake hacking? Does it just have lines of code scrolling by really fast then say "I'm in!" or "I hacked the mainframe!" or something?

Link to comment
Share on other sites

Link to post
Share on other sites

9 minutes ago, The_russian said:

Too lazy to look at or run the code, what do you mean by fake hacking? Does it just have lines of code scrolling by really fast then say "I'm in!" or "I hacked the mainframe!" or something?

yeah lol, thats basically it. except i have it so itdoes, hacking. then hacking.. then hacking... then restarts and those lines are deleted after running

Blake has arrived!!

Just your local tech geek!

Love to help!

Link to comment
Share on other sites

Link to post
Share on other sites

after all they say that the bark is worse than the bite

PC specs:

Ryzen 9 3900X overclocked to 4.3-4.4 GHz

Corsair H100i platinum

32 GB Trident Z RGB 3200 MHz 14-14-14-34

RTX 2060

MSI MPG X570 Gaming Edge wifi

NZXT H510

Samsung 860 EVO 500GB

2 TB WD hard drive

Corsair RM 750 Watt

ASUS ROG PG248Q 

Razer Ornata Chroma

Razer Firefly 

Razer Deathadder 2013

Logitech G935 Wireless

Link to comment
Share on other sites

Link to post
Share on other sites

23 hours ago, James Evens said:

This is worse then hollywood.

ouch ok

 

On 10/15/2020 at 10:02 AM, Sakuriru said:

This is still more fun than actually hacking for me.

lol, nice

Blake has arrived!!

Just your local tech geek!

Love to help!

Link to comment
Share on other sites

Link to post
Share on other sites

had a tiny bit of free time so had a go for fun.

 

import socket
from random import random, randint, sample, choice
from time import sleep
from typing import List


def detect_host(host: str) -> str:
    print(f'[*] finding IP for {host}')
    sleep(randint(1, 3))
    ip = socket.gethostbyname(host)
    print(f'[+] {host} is {ip}')
    print(f'[*] scanning for OS')
    for i in range(randint(5, 20)):
        sleep(randint(0, 1))
    print(f'[+] unix type system found, searching to cves')
    return ip


def generate_cve() -> str:
    return f'CVE-2020-{str(random())[2:6]}'


def generate_cves() -> List[str]:
    cves = []
    for i in range(randint(2, 5)):
        sleep(randint(0, 1))
        cve = generate_cve()
        print(f'[+] Found potential cve {cve}')
        cves.append(cve)
    return cves


def check_cves(cves: List[str]) -> List[str]:
    for cve in cves:
        print(f'[*] Checking to exploit {cve}')
        sleep(randint(1, 2))

    return sample(cves, randint(1, len(cves)))


def crack(cves: List[str]) -> None:
    successful = choice(cves)
    for cve in cves:
        print(f'[*] attempting {cve}')
        sleep(randint(1, 5))
        if cve == successful:
            print(f'[+] successfully exploited {cve}')
            break
        else:
            print(f'[!] {cve} failed')


def shell(host: str):
    while True:
        command = input(f'root@{host}:/ # ')
        print(f'{command} not found')


def main() -> None:
    host = input('Enter a host to crack: ')
    ip = detect_host(host)

    cves = generate_cves()
    found = check_cves(cves)
    print(f'[+] host vulnerable to {found}')
    crack(found)
    shell(ip)


if __name__ == '__main__':
    main()

 

Enter a host to crack: google.co.uk
[*] finding IP for google.co.uk
[+] google.co.uk is 216.58.204.3
[*] scanning for OS
[+] unix type system found, searching to cves
[+] Found potential cve CVE-2020-1431
[+] Found potential cve CVE-2020-0280
[*] Checking to exploit CVE-2020-1431
[*] Checking to exploit CVE-2020-0280
[+] host vulnerable to ['CVE-2020-1431', 'CVE-2020-0280']
[*] attempting CVE-2020-1431
[!] CVE-2020-1431 failed
[*] attempting CVE-2020-0280
[+] successfully exploited CVE-2020-0280
root@216.58.204.3:/ # 

You can add commands to the shell function to make it even more believable  but i don't have the time.

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, vorticalbox said:

had a tiny bit of free time so had a go for fun.

 


import socket
from random import random, randint, sample, choice
from time import sleep
from typing import List


def detect_host(host: str) -> str:
    print(f'[*] finding IP for {host}')
    sleep(randint(1, 3))
    ip = socket.gethostbyname(host)
    print(f'[+] {host} is {ip}')
    print(f'[*] scanning for OS')
    for i in range(randint(5, 20)):
        sleep(randint(0, 1))
    print(f'[+] unix type system found, searching to cves')
    return ip


def generate_cve() -> str:
    return f'CVE-2020-{str(random())[2:6]}'


def generate_cves() -> List[str]:
    cves = []
    for i in range(randint(2, 5)):
        sleep(randint(0, 1))
        cve = generate_cve()
        print(f'[+] Found potential cve {cve}')
        cves.append(cve)
    return cves


def check_cves(cves: List[str]) -> List[str]:
    for cve in cves:
        print(f'[*] Checking to exploit {cve}')
        sleep(randint(1, 2))

    return sample(cves, randint(1, len(cves)))


def crack(cves: List[str]) -> None:
    successful = choice(cves)
    for cve in cves:
        print(f'[*] attempting {cve}')
        sleep(randint(1, 5))
        if cve == successful:
            print(f'[+] successfully exploited {cve}')
            break
        else:
            print(f'[!] {cve} failed')


def shell(host: str):
    while True:
        command = input(f'root@{host}:/ # ')
        print(f'{command} not found')


def main() -> None:
    host = input('Enter a host to crack: ')
    ip = detect_host(host)

    cves = generate_cves()
    found = check_cves(cves)
    print(f'[+] host vulnerable to {found}')
    crack(found)
    shell(ip)


if __name__ == '__main__':
    main()

 


Enter a host to crack: google.co.uk
[*] finding IP for google.co.uk
[+] google.co.uk is 216.58.204.3
[*] scanning for OS
[+] unix type system found, searching to cves
[+] Found potential cve CVE-2020-1431
[+] Found potential cve CVE-2020-0280
[*] Checking to exploit CVE-2020-1431
[*] Checking to exploit CVE-2020-0280
[+] host vulnerable to ['CVE-2020-1431', 'CVE-2020-0280']
[*] attempting CVE-2020-1431
[!] CVE-2020-1431 failed
[*] attempting CVE-2020-0280
[+] successfully exploited CVE-2020-0280
root@216.58.204.3:/ # 

You can add commands to the shell function to make it even more believable  but i don't have the time.

Doesn't work when trying t run, looks good though.

Blake has arrived!!

Just your local tech geek!

Love to help!

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, Spoiled_Kitten said:

Doesn't work when trying t run, looks good though.

I only tested on Linux so if you're on Windows it might not work.

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

On 10/22/2020 at 4:03 PM, vorticalbox said:

I only tested on Linux so if you're on Windows it might not work.

ah ok, that makes sense, i was using an online emulator.

Blake has arrived!!

Just your local tech geek!

Love to help!

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, Spoiled_Kitten said:

ah ok, that makes sense, i was using an online emulator.

 

Live demo

 

 

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

19 hours ago, vorticalbox said:

 

Live demo

 

 

Just ran it, Looks awesome! Congradulations on making it!

Blake has arrived!!

Just your local tech geek!

Love to help!

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×