💣 Bomb Crypto Bot 💣

Overview

Bomb Crypto Banner

💣 Bomb Crypto Bot 💣

⚠️ Warning

I am not responsible for any penalties incurred by those who use the bot, use it at your own risk.

📄 Documentation

- Language
Portuguese Portuguese

📌 Glossary

📋 About

This bot contains code from other developers, this bot was just refactored, to facilitate new implementations and maintenance.

Developers (Base code):

This bot is free and open source.

Features:

  • Refactored code
  • Add 3 captchas
  • Themes
  • Multi account with many windows side-by-side or many windows maximized
  • Run the Bot, without interrupting errors in the code
  • Console colorful
  • Bot speed, gain a few seconds on the move
  • Update the configuration file required
  • Auto-update files (requires Git installed)
  • Bcoins report after finalizing the map
  • New map estimation added
  • Telegram new commands (workall, restall, refresh, stop)

🎁 Donation

BCOIN/BNB: 0x318863E8f42F4471C1c3FEc59DF2Dd9447F39241 PIX: 46fad16d-a076-4bd0-8b84-00c508332d75

🤖 Robot - Preview

Screenshot - Preview

🪟 Installation

Python

🖥️ Computer/Laptop High or Medium Profile
🐍 Install the Python 3.9.9

🖥️ Computer/Laptop Low Profile or Low Profile with Windows 7 Pro
🐍 Install the Python 3.8.10

🔗 https://www.python.org/downloads/

⚠️ It is important to check the option to add python to PATH

Git (To use auto-update)

Windows: https://gitforwindows.org/
Linux (Ubuntu): sudo apt -y update && sudo apt -y install git

⚠️ Open a new terminal and type the command to verify that it was installed correctly

git version

Commands

Install the dependencies by running the command below into the project folder:

pip install -r requirements.txt

Ready! Now just start the bot with the command, inside the project folder

python index.py
commands OS description
./cmd/update_files.sh Linux Updates all project files except config.yaml and telegram.yaml and Python requirements.txt
./cmd/update.sh Linux Updates only the Python requirements.txt
.\cmd\update_files.bat Windows Updates all project files except config.yaml and telegram.yaml and Python requirements.txt
.\cmd\update.bat Windows Updates only the Python requirements.txt

How to works?

The bot doesn't change any of the game's source code, it just takes a screenshot of the game's screen to find the buttons and simulates mouse movements.

⚠️ Some settings can be changed in the /config/config.yaml file, don't forget to restart the bot if you change the settings, some changes in the /config/config.yaml file may cause the bot to stop, such as activating the telegram when the bot is running.

🧪 Tests

Desktop Medium Profile
Intel i5-3570k @ 3.4Ghz, 24GB RAM
Windows 11, [email protected]
Python 3.9.9

Laptop Low Profile
Laptop Samsumg RV411, Pentium P6200 @ 2.13Ghz, 2GB RAM
Windows 7, [email protected]
Python 3.8.10

🎨 Themes

theme toolbar image preview
default Lunar New Year
lunar_newyear Lunar New Year

⚒️ Configs

code type description
app - -
theme string Current game theme, to recognize bug titles and hero list. Values in the Themes table
verify_version bollean - true/false Check app version every 1h, recommended to keep up to date
emoji bollean - true/false Enable/Disable show emoji in console messages
terminal_colorful bollean - true/false Enable/Disable show colored messages on terminal
run_time_app int Bot loop execution time
monitor_to_use int Monitor that the bot uses as a reference
captcha bollean - true/false Enable/Disable in-game captcha recognition
speed string - normal/fast Two bot speed modes, fast mode is between 1~3 minutes faster
multi_account - -
enable bollean - true/false Enable/Disable Multi Account functionality
window_title string Window title, for identification of the active game by the bot
window_fullscreen bollean - true/false Enable/Disable Fullscreen mode, recommended for small monitors
time_intervals - -
send_heroes_for_work array - [int, int] Start and end time for bot to search for heroes to work
refresh_heroes_positions array - [int, int] Start and end interval for bot to update map
chests - -
values - -
chest_01 decimal Brown chest reward value
chest_02 decimal Purple chest reward value
chest_03 decimal Golden chest reward value
chest_04 decimal Blue chest reward value
threshold - -
default decimal Confidence default value
error_message decimal Confidence Value of Error Window Title
back_button decimal Confidence value of map back button
heroes_green_bar decimal Hero's partial energy bar confidence value
heroes_full_bar decimal Hero's full energy bar confidence value
heroes_send_all decimal Trust value of the send all button to work
chest decimal Confidence value of the chests to calculate the total BCOINS of the map
jail decimal Confidence value of the chests to calculate the total jail of the map
heroes - -
mode string - all, green, full How to send heroes to work.
all - Sends all heroes without criteria.
green - Sends heroes with partially green energy
full - Sends heroes with full energy
list - -
scroll_attempts int Total scroll the bot will make in the hero list
offsets - -
work_button_green array - [int, int] Offset for mouse click on WORK button
work_button_full array - [int, int] Offset for mouse click on WORK button
metamask - -
enable_login_metamask bollean - true/false Enable/Disable Metamask Auto Login
password string Password to unlock Metamask to login to the game
services - -
telegram bollean - true/false Enable/Disable the message sending service for Telegram
log
save_to_file bollean - true/false Enable/Disable save console log to logger.log file
debug bollean - true/false Enable/Disable debugging of some bot information

⚠️ Adjusting the bot

Why some adjustments might be necessary?

The bot uses image recognition to make decisions and move the mouse and click in the right places.
It accomplishes this by comparing an example image with a screenshot of the computer/laptop screen.
This method is subject to inconsistencies due to differences in your screen resolution and how the game is rendered on your computer.
It's likely that the bot doesn't work 100% on the first run, and you need to make some adjustments to the config file.

What are the problems?

  • False negative - The bot was supposed to recognize an image, for example the push to work button, but it didn't recognize the image in the screenshot.

  • False Positive - The bot thinks it has recognized the image it is looking for in a place where this image does not appear.

To solve these problems there are two possibilities, adjusting the "threshold" parameter in the config.yaml file or replacing the example image in the "targets" folder with one taken on your own computer:

Threshold in config file

The "threshold" parameter regulates how confident the bot needs to be to consider that it has found the image it is looking for.
This value is from 0 to 1 (0% to 100%).
Ex:

A threshold of 0.1 is too low, it will assume that it has found the image it is looking for in places it is not showing (false positive). The most common behavior for this problem is the bot clicking random places around the screen.

A threshold of 0.99 or 1 is too high, it won't find the image it's looking for, even when it's showing up on the screen. The most common behavior is that it simply doesn't move the cursor anywhere, or crashes in the middle of a process such as login.

Image Replacement

The example images are stored in the "images/themes/default" folder. These images were taken on my computer with a resolution of 1920x1080. To replace some image that is not being recognized properly, simply find the corresponding image in the folder "images/themes/default", take a screenshot of the same area and replace the previous image. It is important that the replacement has the same name, including the .png extension.

Some behaviors that may indicate a false positive or negative

False positive:

  • Repeatedly sending a hero who is already working to work on a infinite loop.

    • False positive on "work_button.png" image, bot thinks it sees the dark button on a hero with the light button.
  • Clicking random places (usually white) on the screen

    • False positive on image "metamask_sign_button.png"

False negative:

  • Not doing anything

    • Maybe the bot is having problems with its resolution and is not recognizing any of the images, try changing the browser setting to 100%.
  • Not sending the heroes to work

    • It may be a false negative on the image "bar_green_stamina.png" if the option "heroes.mode" is set to "green".

👍 Did you like it? :)

BCOIN: 0x4847C29561B6682154E25c334E12d156e19F613a

PIX: 08912d17-47a6-411e-b7ec-ef793203f836

Owner
Matheus Benites
Full stack Software Engineer with experience in design. In continuous improvement!
Matheus Benites
HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP

赛欧思网络安全研究实验室 365 Nov 30, 2022
Auerswald COMpact 8.0B Backdoors exploit

CVE-2021-40859 Auerswald COMpact 8.0B Backdoors exploit About Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow a

Ashish Kunwar 1 Nov 24, 2022
MTBLLS Ethical Hacking Tool Announcement of v2.0

MTBLLS Ethical Hacking Tool Announcement of v2.0 MTBLLS is a Free and Open-Source Ethical Hacking Tool developed by GhostTD (SkyWtkh) The tool can onl

Ghost 2 Mar 19, 2022
Program that mathematically generates and validates CPF numbers

✔️ Gerador e Validador de CPF Programa que gera e valida números de CPF Requisitos • Como usar • Capturas de Tela Requisitos Antes de começar, você va

João Victor Vilela dos Santos 1 Nov 07, 2021
CVE-2022-22965 : about spring core rce

CVE-2022-22965: Spring-Core-Rce EXP 特性: 漏洞探测(不写入 webshell,简单字符串输出) 自定义写入 webshell 文件名称及路径 不会追加写入到同一文件中,每次检测写入到不同名称 webshell 文件 支持写入 冰蝎 webshell 代理支持,可

东方有鱼名为咸 53 Nov 09, 2022
Dependency Combobulator is an Open-Source, modular and extensible framework to detect and prevent dependency confusion leakage and potential attacks.

Dependency Combobulator Dependency Combobulator is an Open-Source, modular and extensible framework to detect and prevent dependency confusion leakage

Apiiro 84 Dec 23, 2022
A burp-suite plugin that extract all parameter names from in-scope requests

ParamsExtractor A burp-suite plugin that extract all parameters name from in-scope requests. You can run the plugin while you are working on the targe

29 Nov 09, 2022
💣 Bomb Crypto Bot 💣

💣 Bomb Crypto Bot 💣 ⚠️ Warning I am not responsible for any penalties incurred by those who use the bot, use it at your own risk. 📄 Documentation -

Matheus Benites 4 Apr 27, 2022
It's a simple tool for test vulnerability Apache Path Traversal

SimplesApachePathTraversal Simples Apache Path Traversal It's a simple tool for test vulnerability Apache Path Traversal https://blog.mrcl0wn.com/2021

Mr. Cl0wn - H4ck1ng C0d3r 56 Dec 27, 2022
This is a partial and quick and dirty proof of concept implementation of the following specifications to configure a tor client to use trusted exit relays only.

This is a partial and quick and dirty proof of concept implementation of the following specifications to configure a tor client to use trusted exit re

22 Nov 09, 2022
Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.

Log4jHorizon Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more. BLOG COMING SOON Code and README.md this time around are

96 Dec 14, 2022
PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests.

PyPasser is a Python library for bypassing reCaptchaV3 only by sending 2 requests. In 1st request, gets token of captcha and in 2nd request,

253 Jan 05, 2023
Metal Gear Online 2 (MGO2) stage files decryption

Metal Gear Online 2 decryption tool Metal Gear Online 2 (MGO2) has an additional layer of encryption for stage files. I was not able to find info abou

4 Sep 02, 2022
GDID (Google Dorks for Information Disclosure)

GDID (Google Dorks for Information Disclosure) Script made for your recon automation in Bug Bounty or Pentest. It will help you to find Information Di

Nischacid 5 Mar 10, 2022
Python script that sends CVE-2021-44228 log4j payload requests to url list

scan4log4j Python script that sends CVE-2021-44228 log4j payload requests to url list [VERY BETA] using Supply your url list to urls.txt Put your payl

elyesa 5 Nov 09, 2022
Hashpic - Hashpic creates an image from a MD5 or SHA512 hash

Hashpic Hashpic creates an image from the MD5 hash of your input. Since v0.2.0 i

0xflotus 15 Nov 23, 2022
Brute Force Guess the password for Instgram accounts with python

Brute-Force-instagram Guess the password for Instgram accounts Tool features : It has two modes: 1- Combo system from you 2- Automatic (random) system

45 Dec 11, 2022
Shell hunter for AF

AF-ShellHunter AF-ShellHunter: Auto shell lookup AF-ShellHunter its a script designed to automate the search of WebShell's in AF Team How to pip3 ins

Eduardo 34 May 13, 2022
A black hole for Internet advertisements

Network-wide ad blocking via your own Linux hardware The Pi-hole® is a DNS sinkhole that protects your devices from unwanted content, without installi

Pi-hole 40.3k Jan 09, 2023
BurpSuite Extension: Log4j2 RCE Scanner

Log4j2 RCE Scanner 作者:[email protected]元亨实验室 声明:由于传播、利用本项目所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,项目作者不为此承担任何责

ᴋᴇʏ 87 Dec 29, 2021