Scraping
Cracking pack:
https://mega.nz/#!2EtX3JDQ
Decryption key: !BQxZWP2RiM0We8xUvpbtFlTrgwVlzHUus1S8OR1npCY
Sentry LoL Configs:
https://mega.nz/#!zU1iSQbA
Decryption key: !kVwei4Mp5SRDIT4Jnx30TtDKxzlc-zoIm94cYB9flmk
Updated Configs (July 2017):
https://www.sendspace.com/file/ev4bxg
Updated Configs (August 2017):
PBE: https://pastebin.com/69ENLT3S
EUW: https://pastebin.com/JqV9nwRA
NA: https://pastebin.com/tsSnQhjn
EUNE: https://pastebin.com/pwbD6kHe
LAS: https://pastebin.com/3JQ0CWqL
LAN: https://pastebin.com/fHRbyMK8
RU: https://pastebin.com/qH7wAZ4y
KR: https://pastebin.com/GLxjSd88
JP: https://pastebin.com/eZqccLHq
BR: https://pastebin.com/AQN5Pwuz
OCE: https://pastebin.com/qgSJzZwp
LoL Checker - August 2017:
1) Open League Scrapper.exe. Enter a Summoner name (open a game in your match history and choose a random name) , choose a region, then click start. When it's done, press save.
2) Open up SentryMBA and select the config you want.
If it's the first time you use SentryMBA: After loading the config with "load settings from snapshot" press "save settings to snapshot".
3) Grab some fresh proxies and add them to Sentry.
Proxyfire Public Proxies - http://www.proxyfire.net/forum/SSL Proxies - http://sslproxies24.blogspot.com/Google Proxies - http://googleproxies24.blogspot.com/VIP Socks - http://vip-socks24.blogspot.com/Socks Proxy List - http://socksproxylist24.blogspot.com/Live Socks - http://www.live-socks.net/Proxy List: http://proxyserverlist-24.blogspot.gr
4) Merge the combo lists (3 files found in LoLScraper's folder, server -> summoner name you entered) with TXTCollector. Load the combined file into Sentry.
5) Press Start, then Start the Bruteforcer Engine! Wait until it's done.
Notice: The more bots you use, the faster the proxies will get banned.
6) Check the accounts by hand or get a tool like LoL Account Checker (download links).
Use a vpn when logging into cracked accounts, like OpenVPN, Tunnelbear etc (optional).
Scraping [Password List]
Botop Combo Creator:
https://mega.nz/#!zdkTRSSZ / Decryption key: !Ej_kca1szkymYyV-yHOkBbweExm30MB4a-pSAEKHkV4
Some Password Lists (you can make your own):
https://mega.nz/#!6QNS3LpJ / Decryption key: I5V1gslyuX7AlTNv3t6RWku0gcdukTVQOhxYx9PuHR8
1) Paste the combo list to the first column and highlight it.
2) Grab the usernames: Data > Split text into columns > Select : as a custom seperator > Press Enter
3) Copy one of the two columns and paste it to a text file.
4) Load the usernames, the password list and click start.
SQL Injection Method [Quick Tutorial]
URL Scraping
Download link: https://mega.nz/#!qUtknJxQ
Decryption key: !_LJ4MHtPLuJf3chxObfOr6j7wCHs8OuWvqV0lA80ox8
1) Get some keywords with keyword.io or any similar site/tool and save them to a text file.
2) Launch URL Scraper (alternative: Scrapebox), load the keyword file, some proxies, select the engine of your choice and click start. It supports all types of proxies.
I have included the key in the folder.
3) Collected URLs can be found in Results folder.
Dorks
Download link: https://mega.nz/#!yEcFGaIK
Decryption key: !u_iBrL4BmMRzLVKnf1gEuQSsGbSAm-PRpKY__0WHMRs
1) Open the Work with Dorks tool and clear the boxes.
2) Click the Grabber tab and load the URLs.
3) Switch back to the Generator tab. Names of pages, page types and page types p.2 are pasted there automatically.
Remove all names of pages by clicking Delete - D and enter some small keywords. Look for something a bit more unusual ; )
All page types should be ".page_type?". Everything else must be removed.
All page types p.2 should be "page_type_p2=. Everything else must be removed.
Avoid using page types like: rra02yw= returnoldversion&gclsrc= .pdf? .txt? .xml? .com? .p? .cox?
To requests enter something random, it will be removed in the next steps.
Click start to generate the dorks. They are saved in the tool's folder.
4) Shuffle the dorks with TextMechanic - http://textmechanic....ort-text-lines/ and remove the requests with Notepad.
SQLi Dumper
SQLi Dumper v8.2 Download link: https://mega.nz/#!GNcEHKJL
Decryption key: !wVXEEvilKZuHShTeEHMpIi7lGNT9aj8oGjbSJtUcaaM
Decryption key:
1) Scrap SOCKS proxies and remove the black-listed ones. Copy all the white-listed to clipboard.
2) Activate SQLi Dumper v8.2 with the Keygen.
Paste proxies from GatherProxy to the layout for SOCKS5. After you test them, enable SOCKS5 protocol. (Tools & Settings > Proxy)
3) Online Scanner > URL's Queue
Paste the dorks and start the scanner.
4) When you collect enough URLS ~ 10k, stop it and go to the Exploitables tab. DIsable proxies, by clicking the text at the bottom left.
Start the Exploiter and wait until it finishes.
5) Go to the Injectables tab and start the Analyzer. Wait until it finishes.
6) Select all links and click Search/Start. Make sure email, pass(word), user(name) are checked.
7) Find a database that has the same number of rows for username-password, select it and Go To Dumper > New Dumper Instance.
A few examples:
8) Look for the columns that contain the usernames and passwords of the site. Check them and click dump data.
If you think it runs slow, increase number of threads up to 50.
When you collect all of them, click Export Data to save them to a txt file - username:password.
9) *optional*
Save trash URLs to a text file to use them for dork making.
SentryMBA
Check the combo lists you gathered with SentryMBA. I have included a tutorial in the first part of the guide.
Load config => Load combo list => Load proxies => Start Bruteforcer
How to update LoLAccountChecker
LoL Checker - August 2017:
https://www.sendspace.com/file/puk7ww
How to update LoLAccountChecker:
New Client:
Old Client:
How to get better proxies
https://mega.nz/#!7EkGkDbb
Decryption key: !AHi16Ilk0EKjVwO-W1HohY2Wmgav2HIU25Lk2G8fNuY
Before you start, increase Number proxies display in list view to a high number like 50,000 (Advance tab).
1) Open Gather Proxy by double clicking the .exe file.
2) Check Start proxy checker after gathering completed and increase the number of threads in Gather Proxy and Proxy Checker. That depends on how fast your CPU is.
3) Go back to the Gather Proxy tab and press start, as shown in the pic.
4) Select all proxies and then right click - Copy to clipboard.
How to unhash/decrypt hashed combo lists
It's not hard to learn, therefore I will not explain in detail. You can find some tutorials on youtube etc.
You need a tool like HashCat or PasswordsPro and a lot of wordslists (a lot of GBs).
To recognize the hashtype: http://md5decrypt.net/en/HashFinder/ or this python script https://pastebin.com/80dJeTur
Run all the tools in a Virtual Machine.
Edited by DarkAvenger, 14 August 2017 - 10:37 .