Annoying crypto scammers with python

Поділитися
Вставка
  • Опубліковано 22 кві 2024
  • Python - www.python.org/
    Github script - github.com/seabee33/screw-sca...
    VS Code (optional) - code.visualstudio.com/
    Tweeter - / the5dwrench

КОМЕНТАРІ • 80

  • @whetfaartz6685
    @whetfaartz6685 15 днів тому +62

    You can add a rotating proxies functionality so they don't filter out your requests from IP and just ignore them all, you could also probably put those words_array into a file and read the file instead of having it in your text editor like that or use an API or use webscraping.. whatever floats your boat.

    • @kezif
      @kezif 15 днів тому

      rotating proxies cost money :(

    • @If0n702
      @If0n702 15 днів тому

      You can get free proxy list lmfao @@kezif

    • @whetfaartz6685
      @whetfaartz6685 15 днів тому

      @@kezif No they don't, look up free proxies or free socks4/5 proxies, free http proxies, free https proxies... there's forums that have like 5000+ proxies just freely available, just look around and you'll see 'em.

    • @dec1lent448
      @dec1lent448 15 днів тому +3

      ​@@kezif
      The bandwidth is minimal with requests,
      if the scammer doesnt block free proxies. Just have a function call, to check if the proxies are working, add those that where working (within a given time,) to another list. Then iterate over said list.

    • @distortions
      @distortions 15 днів тому

      @@kezif theres a lot of free proxies on the internet

  • @__Brandon__
    @__Brandon__ 15 днів тому +46

    And then they will write a quick script to throw away all the seed phrases that don't pass the checksum which 1 in 2048 won't. And with the remaining ones they will automatically scan for a balance and withdrawal any funds that have a balance. Anyone who knows what they are doing won't even save the seed to a database unless the seed generates an address that has funds on it. This is a decent denial of service as it's wasting their resources more than it's wasting your resources, but it's definitely not going to put a stop to them. If anything they w do a simple IP ban after getting more than 5 submissions from the same ip within a couple minutes which will completely negate this entire denial of service

    • @bubby1595
      @bubby1595 15 днів тому

      remember, these guys are braindead and are only after money.

    • @ibrahimdevx
      @ibrahimdevx 14 днів тому +23

      However most scammers r just Indian/African script kiddies using public phishing code and making a website like this who dont have much technical knowledge to do allat, so it would slow them down

    • @OmikronClient
      @OmikronClient 14 днів тому +1

      @@ibrahimdevx ye

    • @ManWhoLostTheWar
      @ManWhoLostTheWar 14 днів тому +2

      well what about using multi threading and using proxies?

    • @whetfaartz6685
      @whetfaartz6685 14 днів тому +1

      This is true, do you have an alternative option to fucking with scammers? (also I heavily agree with @ibrahimdevx)

  • @DerMarkus1982
    @DerMarkus1982 15 днів тому +3

    "Welcome to ScammerJam 2024. How many of 'em can YOU jam?" came to mind...

  • @DigitalWealth4Everyone
    @DigitalWealth4Everyone 14 днів тому +2

    Nice video. Done the exact same concept but on scammers using fake shops and stealing debit/credit card info. made a similar script but randomly created 16 digits an checked if it was accepted by the Luhn algorithm. Sent hundreds of thousands until there website was rate limited and shutdown.

  • @afadeevz
    @afadeevz 15 днів тому +3

    Don't forget to place input vars in same order. Scammers will be able to detect your requests

  • @virxs
    @virxs 14 днів тому

    i love how you actually teach us python along the way! Much love g

  • @feiks420
    @feiks420 14 днів тому

    in post_data, you could most likely optimise it with a cheeky for loop to make the code ever cleaner

  • @enderagent
    @enderagent 14 днів тому +2

    The website database probably stores the IP or user agent (python requests user agent) per request so they will just be able to drop all records that match an IP or the user agent for python requests. Nice idea though

    • @YouLolNotLolYou
      @YouLolNotLolYou 13 днів тому +1

      Yeah, you can edit the code and use proxy list and random user agent :) Eazy

    • @enderagent
      @enderagent 13 днів тому

      @@YouLolNotLolYou The website owner could just audit the logs. All the proxy IPs that made more than one request in a certain period of time can just be removed

    • @YouLolNotLolYou
      @YouLolNotLolYou 13 днів тому

      @@enderagent you can buy pool of 20k ips for few bucks :)

    • @enderagent
      @enderagent 13 днів тому

      @@YouLolNotLolYou Which the person in the video did not do, so my original message stands

    • @YouLolNotLolYou
      @YouLolNotLolYou 13 днів тому

      Yeah

  • @cool_6042
    @cool_6042 15 днів тому +1

    That's genius!!!
    After watching I created a similar program, but it generates credit cards (that pass the luhn check) and spams those.

  • @ClifffSVK
    @ClifffSVK 14 днів тому

    Now imagine if your script randomly generated someone's actual seed phrase 😬

  • @Zetornator
    @Zetornator 15 днів тому +1

    I wanted to do a similar thing with bank scams though i was worried the scammers would iust save the ip and remove all answers from the same ip

    • @mxrtoe
      @mxrtoe 15 днів тому

      they do that

  • @LoloisKali
    @LoloisKali 14 днів тому

    Bro ty for the idea and honestly im gonna do this.
    I love this its ez concept :)

  • @herofahad777
    @herofahad777 13 днів тому

    but that might also generate a live wallet?

    • @1slyzz1
      @1slyzz1 13 днів тому +1

      yea but the chance is likee winning a jackpot and thee scammers can generatee random walllets themselves

    • @herofahad777
      @herofahad777 13 днів тому

      @@1slyzz1 oh ok

  • @al-ft1ng
    @al-ft1ng 15 днів тому +1

    Anyone with a brain would automatically check for an address with balance whenever their server is hit with a seed, and then only make it notify them if balance is found, and they would also place a rate limit. Using proxies and separating the requests time would be wiser. But then again you're wasting money to do little to no damage to their operations.

    • @the5dollarwrench
      @the5dollarwrench  13 днів тому

      This would imply seed phrase scammers have a brain

  • @zrizzy6958
    @zrizzy6958 15 днів тому

    It's a really nice idea, though I'm not sure if they are just using the last wallet you sent... They might get only one

    • @the5dollarwrench
      @the5dollarwrench  15 днів тому +1

      it prints out the wallet sent and its a new one each time

  • @hygienicturtle
    @hygienicturtle 14 днів тому

    What if you left this running for long enough that it generated someones actual combination

    • @the5dollarwrench
      @the5dollarwrench  14 днів тому +2

      You would have to wait many many many many many many many many many many many many many many many many many many many many many many many many many many many thousands of years

  • @kihok8688
    @kihok8688 15 днів тому

    Scammer will filter out all your entries by IP when you send that many..

  • @jan_harald
    @jan_harald 15 днів тому

    at least with firefox, a way easier and nicer approach would be just right-click in the network tab, and copy POST values, and using that, directly, in the script
    it seems to include a lot more than just the post data, which is useful, e.g. you would definitely want to fake a real browser user-agent, else it's TRIVIAL for them to just throw out every input submitted by a certain user-agent, but if you use your real user-agent, then they'd have to ban everyone with that browser, and if you upgrade browser, it'd change too
    tho downside, the format will change depending on the actual format, e.g. whether it's form-endoced, or json-encoded, but it'd still be easy enough, I think

  • @shadowplay56
    @shadowplay56 15 днів тому

    When I tried to use it, it didn't work with IDLE, so I used it with VSC, where it then worked. If it doesn't work with IDLE, and you have requests installed, use VSC

  • @LoloisKali
    @LoloisKali 14 днів тому

    Also subbed

  • @quickmoment12221
    @quickmoment12221 12 днів тому

    How dont you get 429?

  • @LinguisticMirage
    @LinguisticMirage 15 днів тому

    Scammer gets scammed

  • @HaeImAlan
    @HaeImAlan 15 днів тому

    What are the odds of you accidentally guessing someone’s seed phrase

    • @m4chb00m5
      @m4chb00m5 15 днів тому

      I approximated that there are 1962 words, 109 columns with 18 in a row, with some simple math we can estimate that the chance is : 1 in 9.19×10⁷⁸. Even if he will send 1 trilion requests the probability, is similar to guessing a specific atom across the universe.

    • @the5dollarwrench
      @the5dollarwrench  15 днів тому +1

      You would have a better chance of winning the lottery 100 times in a row

    • @HaeImAlan
      @HaeImAlan 15 днів тому

      @@the5dollarwrench damn that’s low

  • @cameramaker
    @cameramaker 15 днів тому

    The poor granny who's address you guessed right :D

  • @VoltVentures
    @VoltVentures 15 днів тому +2

    suboptimal development

  • @uropig
    @uropig 15 днів тому

    lol

  • @ckpioo
    @ckpioo 15 днів тому +4

    this is why people need to stop using python, see that code at the beginning?

    • @lxcyfxr5119
      @lxcyfxr5119 15 днів тому +1

      Yeah, it's HTML 😂

    • @ckpioo
      @ckpioo 15 днів тому

      ​@@lxcyfxr5119 0:12 you're pretty dumb to be laughing

    • @tastyham
      @tastyham 15 днів тому +6

      what, the array that you can store in a file to make it cleaner but it wasn't the purpose of the video?

    • @the5dollarwrench
      @the5dollarwrench  15 днів тому +10

      Hell yeah, pretty trash code innit 😎, but the point of the video was to make something that works, not something that the google coding team would approve of

    • @FurqanHun
      @FurqanHun 15 днів тому

      ik improving it will make it a bit better to read and faster to execute but that doesn't matter for the current task

  • @expl0siveR3x
    @expl0siveR3x 13 днів тому

    This is pretty badly coded ngl and a simple ip block and algorithm check of the words will filter out 99% of the fakes. You could use a proxy for the ip blocking but the othwr problem still exists, also it (most likely) wont be them putting in the data manually it will be automated making it alot faster to sort through and find real ones. Also if you wanted it faster use threading

  • @sweetshit4931
    @sweetshit4931 15 днів тому

    You need to use threading or async for request.

  • @cozmoticskillissue
    @cozmoticskillissue 15 днів тому +1

    my ethernet & i9-13900kf is doing some work..
    Im going to do 1,000x at 32 threads and starting a stopwatch... (10:59.99 for 32k)

  • @user-yd8ys4fe2h
    @user-yd8ys4fe2h 13 днів тому

    What happens when you actually send a seed phrase with millions of dollars