# HG changeset patch # User d3v11 # Date 1325074706 0 # Node ID 8841c2ea97a94c3bdfc1dab85979f842f559f7db # Parent 1dcc647991ca4d47c8facfe294639c72744131a0 updates to splicex diff -r 1dcc647991ca -r 8841c2ea97a9 contrib/splicex/tools/im-steal/README --- a/contrib/splicex/tools/im-steal/README Sun Dec 25 04:57:46 2011 +0000 +++ b/contrib/splicex/tools/im-steal/README Wed Dec 28 12:18:26 2011 +0000 @@ -10,6 +10,13 @@ splicex --command='im-steal PASSWORD' -- --test='Account Connected' +PROXY: + --command='torify im-steal PASSWORD' + + --command='usewithtor im-steal PASSWORD' + + --command='proxychains im-steal PASSWORD' + DEPENDS: libpurple-dev, libpurple diff -r 1dcc647991ca -r 8841c2ea97a9 contrib/splicex/tools/nicksrv/nicksrv --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/contrib/splicex/tools/nicksrv/nicksrv Wed Dec 28 12:18:26 2011 +0000 @@ -0,0 +1,16 @@ +#!/usr/bin/env python + +''' + This currently does nothing + When its finished you will + be able to brute force IRC + nicksrv. + ''' + +from time import sleep +from socket import * +import sys +s=socket(AF_INET,SOCK_STREAM) +s.connect((sys.argv[1],int(sys.argv[2]))) +s.send('NICK '+sys.argv[3]+'\r\n') +sleep(5)