Trafficbot Save

This script generates traffic for websites using a Tor Proxy Pool or any proxy server for which you desire

Project README

VENENO TRAFFIC BOT (With a simple rotating Tor Proxy Server)

This script generates traffic for websites using a Tor Proxy Pool or any proxy server for which you desire

Prerequisites

  • Ubuntu 18.04+ 64-bit operating system
  • A user account with sudo privileges
  • Command line / terminal (CTRL-ALT-T or Applications menu > Accessories > Terminal)
  • Xvfb
  • NodeJS
  • unzip
  • libxi6
  • libgtk-3-0
  • libxss1
  • libgconf-2-4
  • libasound2
  • libxtst6
  • libnss3
  • libcanberra-gtk-module
  • libcanberra-gtk3-module
  • Docker software repositories (optional)

Step 1: Update software repositories

As usual, it’s a good idea to update the local database of software to make sure you’ve got access to the latest revisions.

Therefore, open a terminal window and type:

sudo apt-get update

Allow the operation to complete.

Step 2: Install requirements for Electron and Xvfb

sudo apt install -y unzip libxi6 libgtk-3-0 libxss1 libgconf-2-4 libasound2 libxtst6 libnss3 libcanberra-gtk-module libcanberra-gtk3-module

Step 3: Install Xvfb

Here Xvfb (X virtual framebuffer) is an in-memory display server for a UNIX-like operating system (e.g., Linux). It implements the X11 display server protocol without any display. This is helpful for CLI applications like CI service.

sudo apt-get install -y xvfb

Step 4: Install NodeJS or NPM

sudo apt-get install nodejs
sudo apt-get install npm

Step 5: Install Docker

To install Docker on Ubuntu, in the terminal window enter the command:

snap docker install

or

apt install docker.io

Step 6: Run the Proxy Server

So now we gonna create a proxy server

# build docker container
docker build -t zeta0/alpine-tor:latest .

# ... or pull docker container
docker pull zeta0/alpine-tor:latest

# start docker container
docker run -d -p 5566:5566 -p 2090:2090 -e tors=25 zeta0/alpine-tor

# start docker with privoxy enabled and exposed
docker run -d -p 8118:8118 -p 2090:2090 -e tors=25 -e privoxy=1 zeta0/alpine-tor

# test with ...
curl --socks5 localhost:5566 http://httpbin.org/ip

# or if privoxy enabled ...
curl --proxy localhost:8118 http://httpbin.org/ip

# or to run chromium with your new found proxy
chromium --proxy-server="http://localhost:8118" \
    --host-resolver-rules="MAP * 0.0.0.0 , EXCLUDE localhost"

# monitor
# auth login:admin
# auth pass:admin
http://localhost:2090 or http://admin:admin@localhost:2090

# start docket container with new auth
docker run -d -p 5566:5566 -p 2090:2090 -e haproxy_login=MySecureLogin \
    -e haproxy_pass=MySecurePassword zeta0/alpine-tor

Step 7: Usage Of Veneno Traffic Bot

Environment variables

  • url - URL for navigation. (Default: https://ppplayer.com/)
  • referrals - The referrals params thus sending traffic to you (Default: no).
  • proxy - The proxy server IP or address that acts as an intermediary for requests. (Example: 127.0.0.1 - Default: '')
  • port - Integer, port for proxy. (Example: 8080)
  • user and pass - Basic auth config for the proxy server. (Default: `` in both variables)
  • windows - Integer, number of bot instances to run. (Default: 1)
  • time - Integer or string (--time random), max session time parameter value in seconds. (Default: 3 seconds per page and 5 Pages to run through, the random mode value in seconds is betwen 60 and 300 secs)

Basic usage with Xvfb enabled and proxy disabled (IP of the server)

# Run the traffic bot
xvfb-run --auto-servernum --server-num=1 --server-args="-screen 0 1024x768x24" node --harmony index.js --url https://ppplayer.com/ --windows 1 --time 2

Normal usage with environment variables and Xvfb enabled

# Run the traffic bot
xvfb-run --auto-servernum --server-num=1 --server-args="-screen 0 1024x768x24" node --harmony index.js --url https://ppplayer.com/ --proxy 127.0.0.1 --port 8080 --user lucas --pass veneno --windows 1 --time 2

Normal usage with environment variables and without Xvfb (Graphic Card Needed)

# Run the traffic bot
node index.js --url https://ppplayer.com --proxy 127.0.0.1 --port 8080 --user lucas --pass veneno --windows 1 --time 2

Normal usage (Random time mode and referrals to url enable) with environment variables and without Xvfb (Graphic Card Needed)

# Run the traffic bot
node index.js --url https://ppplayer.com --proxy 127.0.0.1 --port 8080 --user lucas --pass veneno --windows 1 --time random --referrals yes

Normal usage without Xvfb (Graphic Card Needed) and proxy option with 3 minute session and only one window

# Run the traffic bot
node index.js --url https://ppplayer.com/ --windows 1 --time 3 

Debug usage Without Xvfb (Graphic Card Needed)

#  Run the traffic bot with Debug enabled
DEBUG=nightmare*,electron* node index.js --url https://ppplayer.com --windows 1 --time 4 3>log.txt
#  Run the traffic bot with Proxy and Debug enabled
DEBUG=nightmare*,electron* node index.js --url https://ppplayer.com --proxy 127.0.0.1 --port 19011 --user lucas --pass veneno --windows 1 --time 4 3>log.txt

Crontab at every minute

* * * * * xvfb-run --auto-servernum --server-num=1 --server-args="-screen 0 1024x768x24" node --harmony /var/www/trafficbot/index.js --url https://ppplayer.com --windows 1 --time 3 

Further readings

License

Veneno Traffic Bot is an open source project released under the permissive MIT license.

Veneno Traffic Bot is standing on the shoulders of giants. Building something like Veneno Traffic Bot probably wouldn't be possible if not for the excellent open source projects that it builds on top of. In particular, it uses Nightmare for its fast architecture.

Open Source Agenda is not affiliated with "Trafficbot" Project. README Source: lucasveneno/trafficbot

Open Source Agenda Badge

Open Source Agenda Rating