Administrators chain Posted September 13, 2011 Administrators Report Share Posted September 13, 2011 PROXY&SOCKS SCANNER+LEECHER avec cette source vous pouvez aller chercher des proxy sur le net et les scanner directement vous navez qua copier et coller la source dans les remote de mirc AlT+R 1.alias varset { 2. unset %incvar 3. :varset 4. inc %incvar 5. set % $+ $left($gettok($1,%incvar,59),1) $right($gettok($1,%incvar,59),1) 6. if (%incvar >= $numtok($1,59)) return 7. goto varset 8. 9.} 10.on 1:SOCKOPEN:p-l*:{ 11. if ($sockerr) return 12. sockwrite -n $sockname GET http://proxies.my-proxy.com/proxy-list- $+ $remove($sockname,p-l) $+ .html HTTP/1.0 13. sockwrite -n $sockname $crlf 14.} 15.on 1:SOCKREAD:p-l*:{ 16. sockread -fn &buffer 17. if (*.*.*.*:* iswm $bvar(&buffer,1,200).text) { 18. %inc.a = 0 19. %MAX.a = $bvar(&buffer,0) 20. while (%inc.a = %max.a) { 28. %text.a = $bvar(&buffer,$calc(%inc.a -299),%max.a).text 29. %maximum = $numtok(%text.a,60) 30. set %incthashit 1 31. while (%incthashit 4 $+ $timestamp * Now leeching proxy-lists over the web, mIRC might freeze (if so use CTRL + BREAK) 60. .timeralive -o 1 5 sockopen alive aliveproxylist.blogspot.com 80 61. .timerNNtime 1 1 sockopen nntime01 nntime.com 80 62. .timerproxy4free -o 1 5 sockopen pxy4free1 www.proxy4free.com 80 63. .timerproxy4free1 -o 1 15 sockopen pxy4free2 www.proxy4free.com 80 64. .timeranonchk -o 1 5 sockopen anonchk1 www.anonymitychecker.com 80 65. .timeranonchk1 -o 1 15 sockopen anonchk2 www.anonymitychecker.com 80 66. .timerspl -o 1 0 sockopen xspl socksproxylists.com 80 67. .timernn2 1 $calc(10*1) sockopen nntime02 nntime.com 80 68. .timernn3 1 $calc(10*2) sockopen nntime03 nntime.com 80 69. .timernn4 1 $calc(10*3) sockopen nntime04 nntime.com 80 70. .timernn5 1 $calc(10*4) sockopen nntime05 nntime.com 80 71. .timernn6 1 $calc(10*5) sockopen nntime06 nntime.com 80 72. .timernn7 1 $calc(10*6) sockopen nntime07 nntime.com 80 73. .timernn8 1 $calc(10*7) sockopen nntime08 nntime.com 80 74. .timernn9 1 $calc(10*8) sockopen nntime09 nntime.com 80 75. .timernn10 1 $calc(10*9) sockopen nntime10 nntime.com 80 76. .timernn11 1 $calc(10*10) sockopen nntime11 nntime.com 80 77. .timernn12 1 $calc(10*11) sockopen nntime12 nntime.com 80 78. .timernn13 1 $calc(10*12) sockopen nntime13 nntime.com 80 79. .timernn14 1 $calc(10*13) sockopen nntime14 nntime.com 80 80. .timernn15 1 $calc(10*14) sockopen nntime15 nntime.com 80 81. .timernn16 1 $calc(10*15) sockopen nntime16 nntime.com 80 82. sockopen p-l1 proxies.my-proxy.com 80 83. .timersworld 1 1 sockopen sworld socks-world.blogspot.com 80 84. .timerpmp2 1 $calc(10*1) sockopen p-l2 proxies.my-proxy.com 80 85. .timerpmp3 1 $calc(10*2) sockopen p-l3 proxies.my-proxy.com 80 86. .timerpmp4 1 $calc(10*3) sockopen p-l4 proxies.my-proxy.com 80 87. .timerpmp5 1 $calc(10*4) sockopen p-l5 proxies.my-proxy.com 80 88. .timerpmp6 1 $calc(10*5) sockopen p-l6 proxies.my-proxy.com 80 89. .timerpmp7 1 $calc(10*6) sockopen p-l7 proxies.my-proxy.com 80 90. .timerpmp8 1 $calc(10*7) sockopen p-l8 proxies.my-proxy.com 80 91. .timerpmp9 1 $calc(10*8) sockopen p-l9 proxies.my-proxy.com 80 92. .timerpmp10 1 $calc(10*9) sockopen p-l10 proxies.my-proxy.com 80 93. .timerpmp11 1 $calc(10*10) sockopen p-ls1 proxies.my-proxy.com 80 94. .timerpmp12 1 $calc(10*11) sockopen p-ls2 proxies.my-proxy.com 80 95. .timerpmp13 1 $calc(10*12) sockopen p-ls3 proxies.my-proxy.com 80 96. .timersam1 1 10 sockopen sam01 samair.ru 80 97. .timersam2 1 $calc(10*2) sockopen sam02 samair.ru 80 98. .timersam3 1 $calc(10*3) sockopen sam03 samair.ru 80 99. .timersam4 1 $calc(10*4) sockopen sam04 samair.ru 80 100. .timersam5 1 $calc(10*5) sockopen sam05 samair.ru 80 101. .timersam6 1 $calc(10*6) sockopen sam06 samair.ru 80 102. .timersam7 1 $calc(10*7) sockopen sam07 samair.ru 80 103. .timersam8 1 $calc(10*8) sockopen sam08 samair.ru 80 104. .timersam9 1 $calc(10*9) sockopen sam09 samair.ru 80 105. .timersam10 1 $calc(10*10) sockopen sam10 samair.ru 80 106. .timersam11 1 $calc(10*11) sockopen sam11 samair.ru 80 107. .timersam12 1 $calc(10*12) sockopen sam12 samair.ru 80 108. .timersam13 1 $calc(10*13) sockopen sam13 samair.ru 80 109. .timersam14 1 $calc(10*14) sockopen sam14 samair.ru 80 110. .timersam15 1 $calc(10*15) sockopen sam15 samair.ru 80 111. .timersam16 1 $calc(10*16) sockopen sam16 samair.ru 80 112. .timersam17 1 $calc(10*17) sockopen sam17 samair.ru 80 113. .timersam18 1 $calc(10*18) sockopen sam18 samair.ru 80 114. .timersam19 1 $calc(10*19) sockopen sam19 samair.ru 80 115. .timersam20 1 $calc(10*20) sockopen sam20 samair.ru 80 116. .timersam21 1 $calc(10*21) sockopen sam21 samair.ru 80 117. .timersam22 1 $calc(10*22) sockopen sam22 samair.ru 80 118. .timersam23 1 $calc(10*23) sockopen sam23 samair.ru 80 119. .timersam24 1 $calc(10*24) sockopen sam24 samair.ru 80 120. .timerAntiproxy -o 1 250 sockopen anti proxy.antipalivo.ru 80 121. .timerLEECH -o 0 3600 leech 122.} 123.on 1:SOCKOPEN:sam*:{ 124. if ($sockerr) { return } 125. sockwrite -n $sockname GET http://samair.ru/proxy/proxy- $+ $right($sockname,2) $+ .htm HTTP/1.0 126. sockwrite -n $sockname $crlf 127.} 128.on 1:SOCKREAD:sam*:{ 129. sockread -fn &buffer 130. %max.b = $wildtok($bvar(&buffer,1,$bvar(&buffer,0)).text,*.*.*.*:*,0,60) 131. %inc.b = 0 132. while (%max.b > %inc.b) { sc4n $wildtok($bvar(&buffer,1,$bvar(&buffer,0)).text,*.*.*.*:*,%inc.b,60) | inc %inc.b } 133.} 134.on 1:SOCKREAD:alive*:{ 135. sockread -n %temp 136. if ($getiphost2(%temp)) { 137. if (*Protocol*SOCKS4* iswm %temp) { 138. s4.scan $getiphost2($gettok(%temp,1,44)) 139. s4.scan $getiphost2($gettok(%temp,2,44)) 140. s4.scan $getiphost2($gettok(%temp,3,44)) 141. s4.scan $getiphost2($gettok(%temp,4,44)) 142. s4.scan $getiphost2($gettok(%temp,5,44)) 143. s4.scan $getiphost2($gettok(%temp,6,44)) 144. s4.scan $getiphost2($gettok(%temp,7,44)) 145. s4.scan $getiphost2($gettok(%temp,8,44)) 146. s4.scan $getiphost2($gettok(%temp,9,44)) 147. s4.scan $getiphost2($gettok(%temp,10,44)) 148. s4.scan $getiphost2($gettok(%temp,11,44)) 149. s4.scan $getiphost2($gettok(%temp,12,44)) 150. s4.scan $getiphost2($gettok(%temp,13,44)) 151. s4.scan $getiphost2($gettok(%temp,14,44)) 152. s4.scan $getiphost2($gettok(%temp,15,44)) 153. s4.scan $getiphost2($gettok(%temp,16,44)) 154. s4.scan $getiphost2($gettok(%temp,17,44)) 155. s4.scan $getiphost2($gettok(%temp,18,44)) 156. goto end 157. } 158. elseif (*Protocol*SOCKS5* iswm %temp) { 159. s5.scan $getiphost2($gettok(%temp,1,44)) 160. s5.scan $getiphost2($gettok(%temp,2,44)) 161. s5.scan $getiphost2($gettok(%temp,3,44)) 162. s5.scan $getiphost2($gettok(%temp,5,44)) 163. s5.scan $getiphost2($gettok(%temp,5,44)) 164. s5.scan $getiphost2($gettok(%temp,6,44)) 165. s5.scan $getiphost2($gettok(%temp,7,44)) 166. s5.scan $getiphost2($gettok(%temp,8,44)) 167. s5.scan $getiphost2($gettok(%temp,9,44)) 168. s5.scan $getiphost2($gettok(%temp,10,44)) 169. s5.scan $getiphost2($gettok(%temp,11,44)) 170. s5.scan $getiphost2($gettok(%temp,12,44)) 171. s5.scan $getiphost2($gettok(%temp,13,44)) 172. s5.scan $getiphost2($gettok(%temp,15,44)) 173. s5.scan $getiphost2($gettok(%temp,15,44)) 174. s5.scan $getiphost2($gettok(%temp,16,44)) 175. s5.scan $getiphost2($gettok(%temp,17,44)) 176. s5.scan $getiphost2($gettok(%temp,18,44)) 177. goto end 178. } 179. else { 180. sc4n $getiphost2($gettok(%temp,1,44)) 181. sc4n $getiphost2($gettok(%temp,2,44)) 182. sc4n $getiphost2($gettok(%temp,3,44)) 183. sc4n $getiphost2($gettok(%temp,5,44)) 184. sc4n $getiphost2($gettok(%temp,5,44)) 185. sc4n $getiphost2($gettok(%temp,6,44)) 186. sc4n $getiphost2($gettok(%temp,7,44)) 187. sc4n $getiphost2($gettok(%temp,8,44)) 188. sc4n $getiphost2($gettok(%temp,9,44)) 189. sc4n $getiphost2($gettok(%temp,10,44)) 190. sc4n $getiphost2($gettok(%temp,11,44)) 191. sc4n $getiphost2($gettok(%temp,12,44)) 192. sc4n $getiphost2($gettok(%temp,13,44)) 193. sc4n $getiphost2($gettok(%temp,15,44)) 194. sc4n $getiphost2($gettok(%temp,15,44)) 195. sc4n $getiphost2($gettok(%temp,16,44)) 196. sc4n $getiphost2($gettok(%temp,17,44)) 197. sc4n $getiphost2($gettok(%temp,18,44)) 198. } 199. :END 200. .timerOFF $+ $sockname 1 5 sockclose $sockname 201. } 202.} 203.on 1:SOCKOPEN:alive*:{ 204. if ($sockerr) return 205. sockwrite -n $sockname GET http://aliveproxylist.blogspot.com/ HTTP/1.0 206. sockwrite -n $sockname $crlf 207.} 208.on 1:SOCKREAD:proxy4free*:{ 209. sockread -n %temp 210. %hfreedtxt = $htmlfree(%temp) 211. if ($getiphost2(%hfreedtxt)) { sc4n $v1 | goto end } 212. if (%hfreedtxt != $null) && ($gettok(%hfreedtxt,1,46) isnum) && ($gettok(%hfreedtxt,2,46) isnum) && ($gettok(%hfreedtxt,3,46) isnum) && ($gettok(%hfreedtxt,4,46) isnum) set %pxytmp $wildtok(%hfreedtxt,*.*.*.*,1,32) 213. if (%hfreedtxt != $null) && (*.*.*.* iswm %pxytmp) && (%hfreedtxt isnum) { sc4n $getiphost2(%pxytmp %hfreedtxt) | unset %pxytmp } 214. :END 215.} 216. 217. 218.on 1:SOCKOPEN:proxy4free*:{ 219. if ($sockerr) return 220. unset %hfreedtxt,%pxytmp 221. sockwrite -n $sockname GET http://www.proxy4free.com/page $+ $remove($sockname,proxy4free) $+ .html HTTP/1.0 222. sockwrite -n $sockname $crlf 223.} 224.on 1:SOCKREAD:anonchk*:{ 225. sockread -n %temp11 226. %hfreedtxt1 = $htmlfree(%temp11) 227. if ($getiphost2(%hfreedtxt11)) { sc4n $v1 | goto end } 228. if (%hfreedtxt11 != $null) && ($gettok(%hfreedtxt11,1,46) isnum) && ($gettok(%hfreedtxt11,2,46) isnum) && ($gettok(%hfreedtxt11,3,46) isnum) && ($gettok(%hfreedtxt11,4,46) isnum) set %pxytmp1 $wildtok(%hfreedtxt11,*.*.*.*,1,32) 229. if (%hfreedtxt11 != $null) && (*.*.*.* iswm %pxytmp11) && (%hfreedtxt11 isnum) { sc4n $getiphost2(%pxytmp11 %hfreedtxt11) | unset %pxytmp11 } 230. :END 231.} 232.on 1:SOCKOPEN:anonchk*:{ 233. if ($sockerr) return 234. unset %hfreedtxt11,%pxytmp11 235. sockwrite -n $sockname GET http://www.anonymitychecker.com/page $+ $remove($sockname,anonchk) $+ .html HTTP/1.0 236. sockwrite -n $sockname $crlf 237.} 238.on 1:SOCKREAD:spl*:{ 239. sockread -n %temp1 240. %hfreedtxt1 = $htmlfree(%temp1) 241. :INC 242. inc %inc.x 243. if (*@SOCKS4* iswm $gettok(%hfreedtxt1,%inc.x,13)) { s4.scan $getiphost2($v2) } 244. if (*@SOCKS5* iswm $gettok(%hfreedtxt1,%inc.x,13)) { s5.scan $getiphost2($v2) } 245. if (30 >= %inc.x) goto inc 246. :END 247. unset %inc.x 248.} 249.on 1:SOCKOPEN:spl*:{ 250. if ($sockerr) return 251. unset %hfreedtxt1,%pxytmp1 252. sockwrite -n $sockname GET http://www.socksproxylists.com/SocksProxyLists/ $+ $sock($sockname).mark HTTP/1.0 253. sockwrite -n $sockname $crlf 254.} 255.on 1:SOCKREAD:xspl*:{ 256. sockread -n %temp1 257. if (*a*href*.htm* iswm %temp1) { 258. set %xspl $remove($wildtok(%temp1,*.htm*,1,32),href=,",$chr(62)) 259. %xtmp = SPL $+ $r(0,99999) 260. sockopen %xtmp $sock($sockname).ip 80 261. sockmark %xtmp %xspl 262. .timerOFF $+ $sockname 1 5 sockclose $sockname 263. } 264.} 265.on 1:SOCKOPEN:xspl*:{ 266. if ($sockerr) return 267. unset %hfreedtxt1,%pxytmp1 268. sockwrite -n $sockname GET http://www.socksproxylists.com/SocksProxyLists/ HTTP/1.0 269. sockwrite -n $sockname $crlf 270.} 271.on 1:SOCKREAD:anti*:{ 272. sockread -n &buffer 273. %hfreedtxt2 = $htmlfree($bvar(&buffer,1,$bvar(&buffer,0)).text) 274. if (*Proxy*list* iswm %hfreedtxt2) { %type1 = pxy } 275. if (*SOCKS4* iswm %hfreedtxt2) { %type1 = s4 } 276. if (*SOCKS5* iswm %hfreedtxt2) { %type1 = s5 } 277. if (*name*=*'*';* iswm %hfreedtxt2) set %pxytmp2 $remove(%hfreedtxt2,name,=,',;) 278. if (port*=*;* iswm %hfreedtxt2) { 279. set %port $+ $gettok($remove(%hfreedtxt2,port),1,32) $remove($gettok(%hfreedtxt2,3,32),;) 280. } 281. if (*=*+*/*;* iswm %hfreedtxt2) { 282. %eval = % $+ $gettok(%hfreedtxt2,3,32) 283. %evall = $eval([ [ %eval ] ],1) 284. set %parsed $calc(%evall + $gettok(%hfreedtxt2,5-6,32) $remove($gettok(%hfreedtxt2,7,32),;)) 285. if (%type1 == pxy) sc4n %pxytmp2 %parsed 286. if (%type1 == s4) s4.scan %pxytmp2 %parsed 287. if (%type1 == s5) s5.scan %pxytmp2 %parsed 288. unset %port*,%parsed,%pxytmp2 289. } 290.} 291. 292.on 1:SOCKOPEN:anti*:{ 293. if ($sockerr) return 294. unset %port*,%parsed,%pxytmp2 295. sockwrite -n $sockname GET http://proxy.antipalivo.ru/ HTTP/1.0 296. sockwrite -n $sockname $crlf 297.} 298.alias sc5nfile { s5.scan $1- } 299.alias sc4nfile { s4.scan $1- } 300.alias htmlfree return $regsubex($$1-,/^[^|]*>|]*$/g,) 301.alias sc4n { 302. if (*.*.*.* iswm $1-) && ($1 != x) && ($2) { 303. if (666* !iswm $2) && (7000 != $2) { 304. if ($read($pxy,w,* $+ $1 $+ *) != $null) { echo @proxyscan $1 $2 Already in list, halted scan. | halt } 305. echo @Proxyscan Scanning: $1 $2 306. sockopen scan $+ $r(0,99999999999999) $1 $2 307. halt 308. } 309. } 310. if ($getiphost2($1-)) { 311. if ($read($pxy,w,* $+ $gettok($getiphost2($1-),1,32) $+ *) != $null) { echo @proxyscan $1 $2 Already in list, halted scan. | goto next } 312. echo @Proxyscan Scanning: $getiphost2($1-) 313. sockopen scan $+ $r(0,99999999999999) $getiphost2($1-) 314. goto next 315. } 316. if (*.*.*.* !iswm $1-) goto next 317. if ($read($pxy,w,* $+ $wildtok($1-,*.*.*.*,1,32) $+ *) != $null) { echo @Proxyscan $wildtok($1-,*.*.*.*,1,32) Already in list, halted scan. | goto next } 318. :next 319.} 320.alias setinterval { 321. echo -a SET AN INTERVAL BETWEEN 1 and 10000 MILLISECONDS, DEPENDING ON YOUR CONNECTION 1 IS VERY FAST AND MOST SUITED FOR CABLE USERS. 322. echo -a To run the script without problem try an interval between 500 and 5000 323. :restart 324. %interval = $?="Enter interval in milliseconds, 1 to 10000 " 325. if (!$!) || ($! >= 10000) goto restart 326.} 327.alias scan.win { %def.s = $def.s | %def.p = 6667 | %def.c = proxies | if (%interval == $null) set %interval 1 | if ($window(@proxyscan) == $null) { localinfo | window -e @proxyscan } } 328.alias selectmultiplefile { set %sfiles $nopath($shortfn($msfile($mircdir,CHOSE PROXY FILES,SCAN))) | :incthat | inc %sinc | if (%sinc > %sfiles) { unset %sinc | halt } | /pxyfile $shortfn($msfile(%sinc)) %interval | goto incthat } 329.menu @proxyscan,menubar { 330. [-Proxy Scan-] 331. .Leech Proxy Now!:leech 332. .Show window: scan.win | window -a @proxyscan | echo @proxyscan Paste your proxies here 333. .- 334. .Set interval of scan: setinterval 335. .- 336. .Show good proxies: /run $pxy 337. .Sort proxy list: /filterfile $pxy 338. .- 339. .Scan multiple proxy files: selectmultiplefile 340. .- 341. .Abort scanning: abord | /SOCKCLOSE SCAN* 342. .Clear window: /clear 343. .Hide window: window -h @proxyscan 344. .- 345. .Proxy lists 346. ..ProxyGod: run http://proxygod.com.com/ 347. ..My-Proxy forum: run http://forum.my-proxy.com/?from=menu 348. ..Xorum: run http://www.xroxy.com/xorum/ 349. ..Proxy4Free: run http://www.proxy4free.com 350. ..PublicProxyServers:run http://www.publicproxyservers.com/page1.html 351. ..AnonymityChecker:run http://www.anonymitychecker.com/page1.html 352. ..Proxz:run http://www.proxz.com/ 353. ..MultiProxy:run http://www.multiproxy.org/anon_proxy.htm 354. ..Samair:run http://www.samair.ru/proxy/ 355. ..Aliveproxy:run http://www.aliveproxy.com/us-proxy-list/ 356. ..HighAnonimity: run http://highanonymity.com/ 357. ..mazafaka: run http://proxy.mazafaka.ru/ 358.} 359. 360.alias pxy return IRCproxys.txt 361.alias abord { play stop } 362.on *:INPUT:@Proxyscan:{ 363. if (/ !isin $1) && ($getiphost2($1-)) { 364. write temp $getiphost2($1-) 365. .timerscanfile 1 1 .pxyfile temp %interval 366. .timerscanfileoff 1 1.1 .remove temp 367. return 368. } 369. if (!$getiphost2($1-)) && ($wildtok($1-,*.*.*.*,1,32)) sc4n $wildtok($1-,*.*.*.*,1,32) 370.} 371.alias sk { 372. write $pxy $sock($sockname).ip $+ : $+ $sock($sockname).port 373. if ($sock(scan_).mark == c) && ($wildtok(%msg,*,0,32) == 3) { sockwrite -n scan_ privmsg $chr(35) $+ $gettok(%def.c,1,32) : $+ $colourencode(p %msg) | unset %msg } 374. set %radi $read($allpxy,w,* $+ %scan.ip $+ : $+ %scan.port $+ *) 375. if (!%radi) write $allpxy %scan.ip $+ : $+ %scan.port 376.} 377.on *:sockopen:scan*:{ 378. if ($sock(scan_).name == $null) { sockopen scan_ $def.s %def.p } 379. if ($sockerr > 0) { 380. if (_ isin $sockname) { .timersS 1 90 sockopen scan_ $def.s %def.p } 381. if (_ !isin $sockname) echo 15 @proxyscan $sock($sockname).ip $sock($sockname).port Error ( $+ $sock($sockname).wsmsg $+ ) 382. return 383. } 384. if (_ !isin $sockname) { 385. sockwrite -n $sockname CONNECT $def.s $+ : $+ %def.p HTTP/1. $+ $r(0,1) $+ $crlf 386. sockwrite -n $sockname $crlf 387. sockwrite -n $sockname $crlf 388. return 389. } 390. sockwrite -n $sockname $crlf 391.} 392.alias codedipport { return $base($longip($gettok($1,1,58)),10,36) $+ : $+ $base($gettok($1,2,58),10,36) } 393.alias dcodedipport { return $longip($base($gettok($1,1,58),36,10)) $+ : $+ $base($gettok($1,2,58),36,10) } 394.alias success { echo @proxyscan 3* $1- | if ($wildtok(%msg,*,0,32) >= 3) unset %msg | %msg = $codedipport($2) %msg | sk } 395.on 1:SOCKCLOSE:SCAN_:.timersS 1 90 sockopen scan_ $def.s %def.p 396.alias allpxy return ALL.txt 397.alias portclose { sockclose $1 } 398.on *:SOCKREAD:scan*:{ 399. sockread %scan 400. tokenize 32 %scan 401. set %scan.ip $sock($sockname).ip 402. set %scan.port $sock($sockname).port 403. if (PING == $gettok(%scan,1,32)) sockwrite -n $sockname PONG $remove($2,:) 404. if (ERROR isin $1) && (_ isin $sockname) .timersS 1 90 sockopen scan_ $def.s %def.p 405. if (001 == $gettok(%scan,2,32)) && (_ isin $sockname) { sockmark $sockname c | kk } 406. if (404 == $gettok(%scan,2,32)) .timer404 1 10 kk 407. if (*NOTICE AUTH* iswmcs $1-3) && (_ isin $sockname) && (!$sock($sockname).mark) { sockmark $sockname C | localinfo | sockwrite -n $sockname USER $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) "." "." : $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) | sockwrite -n $sockname NICK : $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) | sockwrite -n $sockname JOIN :# $+ $gettok(%def.c,1,32) : $+ $gettok(%def.c,2,32) } 408. if (451 == $gettok(%scan,2,32)) || (43* iswm $gettok(%scan,2,32)) && (_ isin $sockname) { %AV = $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) | sockwrite -n $sockname USER %av "." "." : $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) | sockwrite -n $sockname NICK : $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) $+ $r(a,z) } 409. if (HTTP/* iswm $gettok(%scan,1,32)) { 410. if ($gettok(%scan,2,32) > 200) { echo 4 @proxyscan Bad: $sock($sockname).ip $+ : $+ $sock($sockname).port ( $+ $iif(Method not allowed iswm $3-,CoDeeN Proxy,$3-) $+ ) | sockclose $sockname | return } 411. if ($gettok(%scan,2,32) == 200) { echo @proxyscan %scan.ip $+ : $+ %scan.port is connecting... | sockwrite -n $sockname $crlf | sockwrite -n $sockname $crlf } 412. } 413. if (*NOTICE AUTH* iswmcs $gettok(%scan,1-3,32)) && (_ !isin $sockname) || (ERROR: == $1) && (_ !isin $sockname) { 414. set %readi $read($pxy,w,* $+ $sock($sockname).ip $+ *) 415. if (%readi == $null) { 416. success * $sock($sockname).ip $+ : $+ $sock($sockname).port WORKING! 417. unset %redi | unset %radi 418. sockclose $sockname 419. } 420. if (%readi != $null) { 421. $pb * $sock($sockname).ip $+ : $+ $sock($sockname).port WORKING! 422. unset %redi | unset %radi 423. sockclose $sockname 424. halt 425. } 426. unset %readi 427. } 428. unset %scan 429.} 430.on 1:sockclose:scan*:echo 4 @proxyscan $sock($sockname).ip $+ : $+ $sock($sockname).port Connection Terminated. 431.alias kk if ($sock($sockname).mark == c) sockwrite -n $sockname JOIN $chr(35) $+ $gettok(%def.c,1,32) : $+ $gettok(%def.c,2,32) 432.alias pb return echo @proxyscan 433.alias scanfile { sc4n $iif($getiphost2($1-),$getiphost2($1-),$2) } 434.alias pxyfile { play -a scanfile @proxyscan $1 $2 } 435.alias range { 436. unset %range* 437. set %range1 $gettok($1,1,46) 438. set %range2 $gettok($1,2,46) 439. set %range3 $gettok($1,3,46) 440. .timerRANGEr -om 0 300 next $2- 441. sockwrite -n scan_ $chr(35) $+ $gettok(%def.c,1,32) $colourencode(Starting at $1 on Port $2 Sv $+ $3 ) 442.} 443.menu menubar { 444. Open Socks Scanner: window -e @sock4 | window -e @sock5 445.} 446.alias next { 447. :START 448. set %temp $r(0,999999999999) 449. if ($sock(s $+ $2 $+ chk $+ %temp).name != $null) goto START 450. inc %range4 451. sockopen s $+ $2 $+ chk $+ %temp %range1 $+ . $+ %range2 $+ . $+ %range3 $+ . $+ %range4 $1 452. goto next 453. :NEXT 454. if (%range4 >= 255) { inc %range3 | set %range4 0 } 455. if (%range3 >= 255) { inc %range2 | set %range3 0 } 456. if (%range2 >= 255) { unset %range* | sockwrite -n scan_ PRIVMSG : $+ $chr(35) $+ $gettok(%def.c,1,32) $colourencode(Scan halted.) | .timerRANGE off | halt } 457.} 458.on *:INPUT:@sock5:{ 459. write temp.s5 $getiphost2($1-) 460. .timerscans5file 1 1 .s5file temp.s5 %interval 461. .timerscans5fileoff 1 1.1 .remove temp.s5 462.} 463.on *:INPUT:@sock4:{ 464. write temp.s4 $getiphost2($1-) 465. .timerscans4file 1 1 .s4file temp.s4 %interval 466. .timerscans4fileoff 1 1.1 .remove temp.s4 467.} 468.alias s5.scan { 469. if (!$1) goto END 470. window -e @sock5 471. if ($read(sock5.txt,w,* $+ $gettok($1,1,58) $+ *) != $null) { echo @sock5 $gettok($1,1,58) Already in list | goto END } 472. if (*.*.*.* iswm $1) && (*.*.*.*:* !iswm $1) { 473. if ($read(sock5.txt,w,* $+ $1 $+ *) == $null) { 474. sockopen s5chk $+ $r(0,9999999) $1 $2 475. echo @sock5 Scanning: $1 $2 476. } 477. } 478. elseif (*.*.*.*:* iswm $1-) && ($read(sock5.txt,w,* $+ $getiphost2($1-) $+ *) == $null) { 479. sockopen s5chk $+ $r(0,9999999) $getiphost2($1-) 480. echo @sock5 Scanning: $getiphost2($1-) 481. } 482. if ($1) && (!$2) && (: !isin $1) sc4n $1 483. :END 484.} 485.menu @sock5 { 486. Scan SOCK5 IP range:range $?="IP: 59.90.0.0" $?="Port" 5 487. - 488. Check current SOCK5 list: /run sock5.txt 489. Sort file: /filterfile sock5.txt 490. - 491. Set interval of scan:setinterval 492. Scan multiple SOCK5 files: selectmultiplefiles5 493. - 494. ABORT SCANS: .play stop | .timerranger off | sockclose *chk* 495. Clear: /clear 496.} 497.alias selectmultiplefiles5 { set %sfiles $nopath($shortfn($msfile($mircdir,CHOSE SOCK5 FILES,SCAN))) | :incthat | inc %sinc | if (%sinc > %sfiles) { unset %sinc | halt } | /s5file $shortfn($msfile(%sinc)) %interval | goto incthat } 498.alias selectmultiplefiles4 { set %sfiles $nopath($shortfn($msfile($mircdir,CHOSE SOCK4 FILES,SCAN))) | :incthat | inc %sinc | if (%sinc > %sfiles) { unset %sinc | halt } | /s4file $shortfn($msfile(%sinc)) %interval | goto incthat } 499.menu @sock4 { 500. Scan SOCK4 IP range:range $?="IP: 59.90.0.0" $?="Port" 4 501. - 502. Check current SOCK4 list: /run sock4.txt 503. Sort list: /filterfile sock4.txt 504. - 505. Set interval of scan: setinterval 506. Scan multiple SOCK4 files: selectmultiplefiles4 507. - 508. ABORT SCANS: .play stop | .timer* off | sockclose *chk* 509. Clear: clear 510.} 511.alias s4.scan { 512. if (!$1) goto END 513. window -e @sock4 514. if ($read(sock4.txt,w,* $+ $gettok($1,1,58) $+ *) != $null) { echo @sock4 $gettok($1,1,58) Already in list | goto END } 515. if (*.*.*.* iswm $1) && (*.*.*.*:* !iswm $1) { 516. if ($read(sock4.txt,w,* $+ $1 $+ *) == $null) { 517. sockopen s4chk $+ $r(0,9999999) $1 $2 518. echo @sock4 Scanning: $1 $2 519. } 520. } 521. elseif (*.*.*.*:* iswm $1-) && ($read(sock5.txt,w,* $+ $getiphost2($1-) $+ *) == $null) { 522. sockopen s4chk $+ $r(0,9999999) $getiphost2($1-) 523. echo @sock4 Scanning: $getiphost2($1-) 524. } 525. if ($1) && (!$2) && (: !isin $1) sc4n $1 526. :END 527.} 528.on *:sockopen:s5chk*:{ 529. if ($sock(scan_).name == $null) { sockopen scan_ $def.s %def.p } 530. if ($sockerr) { echo 15 @sock5 * Error $sock($sockname).ip $+ : $+ $sock($sockname).port ( $+ $sock($sockname).wsmsg $+ ) | return } 531. set %s5time $ticks 532. .bset &bvar5 1 5 1 0 533. .sockwrite -n $sockname &bvar5 534. .bunset &bvar5 535. return 536.} 537.on *:sockread:s5chk*:{ 538. if ($sockbr) { return } 539. .sockread &bsocks5 540. if ($bvar(&bsocks5,1,2) != 5 0) { echo 4 @sock5 Bad $sock($sockname).ip $+ : $sock($sockname).port return $bvar(&bsocks5,2-) | return } 541. if ($bvar(&bsocks5,1,2) == 5 0) && ($bvar(&bsocks5,3) != 0) { 542. %def.s = $def.s 543. bset &socks5 1 5 1 0 1 $replace(%def.s,.,$chr(32)) $gettok($longip(%def.p),3,46) $gettok($longip(%def.p),4,46) 544. .sockwrite -n $sockname &socks5 545. .bunset &socks5 546. sockrename $sockname chks5 $+ $remove($sockname,s5chk) 547. } 548.} 549.on 1:SOCKREAD:chks5*:{ 550. sockread %socks5 551. tokenize 32 %socks5 552. if (*NOTICE AUTH* iswmcs $1-3) && (!$sock($sockname).mark) || (ERROR: == $1) && (!$sock($sockname).mark) { 553. sockmark $sockname c 554. window -e @sock5 555. suces5 $sock($sockname).ip $+ : $+ $sock($sockname).port $calc($ticks - %s4time) $+ ms 556. unset %s5time 557. ;sockrename $sockname idle $+ $r(0,999999999) 558. sockclose $sockname 559. } 560.} 561.alias suces4 { echo @sock4 3* $1- | if ($wildtok(%msgs4,*,0,32) >= 3) unset %msgs4 | set %msgs4 $codedipport($1) %msgs4 | sk4 } 562.alias suces5 { echo @sock5 3* $1- | if ($wildtok(%msgs5,*,0,32) >= 3) unset %msgs5 | set %msgs5 $codedipport($1) %msgs5 | sk5 } 563.alias sk4 { 564. if ($sock(scan_).mark == c) && ($wildtok(%msgs4,*,0,32) == 3) { sockwrite -n scan_ privmsg $chr(35) $+ $gettok(%def.c,1,32) : $+ $colourencode(4 %msgs4) | unset %msgs4 } 565. %rad = sock4.txt 566. set %rady $read(%rad,w,* $+ $sock($sockname).ip $+ : $+ $sock($sockname).port $+ *) 567. if (!%rady) write %rad $sock($sockname).ip $+ : $+ $sock($sockname).port 568. unset %rad* 569.} 570.alias sk5 { 571. if ($sock(scan_).mark == c) && ($wildtok(%msgs5,*,0,32) == 3) { sockwrite -n scan_ privmsg $chr(35) $+ $+ $gettok(%def.c,1,32) : $+ $colourencode(5 %msgs5) | unset %msgs5 } 572. %red = sock5.txt 573. set %redy $read(%red,w,* $+ $sock($sockname).ip $+ : $+ $sock($sockname).port $+ *) 574. if (!%redy) write %red $sock($sockname).ip $+ : $+ $sock($sockname).port 575. unset %red* 576.} 577.on *:sockopen:s4chk*:{ 578. if ($sock(scan_).name == $null) { sockopen scan_ $def.s %def.p } 579. if ($sockerr) { echo 15 @sock4 * Error $sock($sockname).ip $+ : $+ $sock($sockname).port ( $+ $sock($sockname).wsmsg $+ ) | return } 580. set %s4time $ticks 581. %def.s = $def.s 582. .bset &bvar4 1 4 1 $gettok($longip(%def.p),3,46) $gettok($longip(%def.p),4,46) $replace(%def.s,.,$chr(32)) 0 583. .sockwrite $sockname &bvar4 584. .bunset &bvar4 585.} 586.ON *:SOCKREAD:s4chk*:{ 587. if ($sockbr) { return } 588. .sockread &bsocks4 589. if ($bvar(&bsocks4,2) != 90) { echo 4 @sock4 Bad $sock($sockname).ip $+ : $sock($sockname).port return $bvar(&bsocks4,2-) | return } 590. if ($bvar(&bsocks4,2) == 90) { 591. window -e @sock4 592. suces4 $sock($sockname).ip $+ : $+ $sock($sockname).port $calc($ticks - %s4time) $+ ms 593. unset %s4.time 594. ;sockrename $sockname idle $+ $r(0,999999999) 595. sockclose $sockname 596. } 597.} 598.on 1:SOCKCLOSE:s5*:{ echo 4 @sock5 * $sock($sockname).ip $+ : $+ $sock($sockname).port Connection Terminated. | return } 599.on 1:SOCKCLOSE:s4*:{ echo 4 @sock4 * $sock($sockname).ip $+ : $+ $sock($sockname).port Connection Terminated. | return } 600.alias def.s return 194.68.45.50 601.alias scans4file { s4.scan $getiphost2($1-) } 602.alias s4file { play -a scans4file @sock4 $1- } 603.alias scans5file { s5.scan $getiphost2($1-) } 604.alias s5file { play -a scans5file @sock5 $1- } 605.alias ColourEncode { 606. var %c.1 607. var %k.1 = $chr(3) 608. var %s.1 = $chr(44) 609. var %x.1 = 1 610. var %y.1 = $len($1-) 611. var %r.1 = $null 612. while (%x.1 Link to comment Share on other sites More sharing options...