This script generates traffic for websites using a Tor Proxy Pool or any proxy server for which you desire
- Ubuntu 18.04 64-bit operating system
- A user account with sudo privileges
- Command line / terminal (CTRL-ALT-T or Applications menu > Accessories > Terminal)
- Xvfb
- NodeJS
- unzip
- libxi6
- libgtk-3-0
- libxss1
- libgconf-2-4
- libasound2
- libxtst6
- libnss3
- libcanberra-gtk-module
- libcanberra-gtk3-module
- Docker software repositories (optional)
As usual, it’s a good idea to update the local database of software to make sure you’ve got access to the latest revisions.
Therefore, open a terminal window and type:
sudo apt-get update
Allow the operation to complete.
sudo apt install -y unzip libxi6 libgtk-3-0 libxss1 libgconf-2-4 libasound2 libxtst6 libnss3 libcanberra-gtk-module libcanberra-gtk3-module
Here Xvfb (X virtual framebuffer) is an in-memory display server for a UNIX-like operating system (e.g., Linux). It implements the X11 display server protocol without any display. This is helpful for CLI applications like CI service.
sudo apt-get install -y xvfb
sudo apt-get install nodejs
sudo apt-get install npm
To install Docker on Ubuntu, in the terminal window enter the command:
snap docker install
or
apt install docker.io
So now we gonna create a proxy server
# build docker container
docker build -t zeta0/alpine-tor:latest .
# ... or pull docker container
docker pull zeta0/alpine-tor:latest
# start docker container
docker run -d -p 5566:5566 -p 2090:2090 -e tors=25 zeta0/alpine-tor
# start docker with privoxy enabled and exposed
docker run -d -p 8118:8118 -p 2090:2090 -e tors=25 -e privoxy=1 zeta0/alpine-tor
# test with ...
curl --socks5 localhost:5566 http://httpbin.org/ip
# or if privoxy enabled ...
curl --proxy localhost:8118 http://httpbin.org/ip
# or to run chromium with your new found proxy
chromium --proxy-server="http://localhost:8118" \
--host-resolver-rules="MAP * 0.0.0.0 , EXCLUDE localhost"
# monitor
# auth login:admin
# auth pass:admin
http://localhost:2090 or http://admin:admin@localhost:2090
# start docket container with new auth
docker run -d -p 5566:5566 -p 2090:2090 -e haproxy_login=MySecureLogin \
-e haproxy_pass=MySecurePassword zeta0/alpine-tor
url
- URL for navigation. (Default: https://ppplayer.com/)referrals
- The referrals params thus sending traffic to you (Default: no).proxy
- The proxy server IP or address that acts as an intermediary for requests. (Example: 127.0.0.1 - Default: '')port
- Integer, port for proxy. (Example: 8080)user
andpass
- Basic auth config for the proxy server. (Default: `` in both variables)windows
- Integer, number of bot instances to run. (Default: 1)time
- Integer or string (--time random), max session time parameter value in seconds. (Default: 3 seconds per page and 5 Pages to run through, the random mode value in seconds is betwen 60 and 300 secs)
# Run the traffic bot
xvfb-run --auto-servernum --server-num=1 --server-args="-screen 0 1024x768x24" node --harmony index.js --url https://ppplayer.com/ --windows 1 --time 2
# Run the traffic bot
xvfb-run --auto-servernum --server-num=1 --server-args="-screen 0 1024x768x24" node --harmony index.js --url https://ppplayer.com/ --proxy 127.0.0.1 --port 8080 --user lucas --pass veneno --windows 1 --time 2
# Run the traffic bot
node index.js --url https://ppplayer.com --proxy 127.0.0.1 --port 8080 --user lucas --pass veneno --windows 1 --time 2
Normal usage (Random time mode and referrals to url enable) with environment variables and without Xvfb (Graphic Card Needed)
# Run the traffic bot
node index.js --url https://ppplayer.com --proxy 127.0.0.1 --port 8080 --user lucas --pass veneno --windows 1 --time random --referrals yes
Normal usage without Xvfb (Graphic Card Needed) and proxy option with 3 minute session and only one window
# Run the traffic bot
node index.js --url https://ppplayer.com/ --windows 1 --time 3
# Run the traffic bot with Debug enabled
DEBUG=nightmare*,electron* node index.js --url https://ppplayer.com --windows 1 --time 4 3>log.txt
# Run the traffic bot with Proxy and Debug enabled
DEBUG=nightmare*,electron* node index.js --url https://ppplayer.com --proxy 127.0.0.1 --port 19011 --user lucas --pass veneno --windows 1 --time 4 3>log.txt
* * * * * xvfb-run --auto-servernum --server-num=1 --server-args="-screen 0 1024x768x24" node --harmony /var/www/trafficbot/index.js --url https://ppplayer.com --windows 1 --time 3
Veneno Traffic Bot is an open source project released under the permissive MIT license.
For an enhanced experience, explore the paid version at Auto Cursor - Advanced Traffic Bot
Veneno Traffic Bot is standing on the shoulders of giants. Building something like Veneno Traffic Bot probably wouldn't be possible if not for the excellent open source projects that it builds on top of. In particular, it uses Nightmare for its fast architecture.