Advertisement
xGHOSTSECx

EyeSeeYou (Bitch)

Dec 24th, 2023
1,205
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 10.22 KB | None | 0 0
  1. # EyeSeeYou (Bitch)
  2. # Author: GhostSec Hackers
  3. # Date: September 20, 2023
  4. import sys
  5. import os
  6. import time
  7. import random
  8. import threading
  9. import requests
  10. from colorama import init, Fore
  11. from datetime import date
  12. import re
  13. from googlesearch import search
  14. from core.leaked import leaked
  15. from terminaltables import SingleTable
  16. import json
  17. init()
  18. # Initialize colorama for colored text
  19. warning = "[" + Fore.RED + "!" + Fore.RESET + "]"
  20. found = "[" + Fore.GREEN + "+" + Fore.RESET + "]"
  21. wait = "[" + Fore.MAGENTA + "*" + Fore.RESET + "]"
  22. class GhostDoxxer:
  23.     def __init__(self, data):
  24.         self.data = data
  25.         self.email = None
  26.         self.telephone = None
  27.         self.urls = None
  28.         self.ipv4 = None
  29.         self.ipv6 = None
  30.     def extract_info(self):
  31.         self.extract_email()
  32.         self.extract_telephone()
  33.         self.extract_urls()
  34.         self.extract_ipv4()
  35.         self.extract_ipv6()
  36.     def extract_email(self):
  37.         self.email = re.findall(r'[a-zA-Z0-9+_\-\.]+@[0-9a-zA-Z][.-0-9a-zA-Z]*.[a-zA-Z]+', self.data)
  38.     def extract_telephone(self):
  39.         self.telephone = re.findall(r"(0|\\+33|0033)[1-9][0-9]{8}", self.data)
  40.     def extract_urls(self):
  41.         self.urls = re.findall(
  42.             'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\\(\\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+', self.data)
  43.     def extract_ipv4(self):
  44.         self.ipv4 = re.findall(
  45.             r"^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$", self.data)
  46.     def extract_ipv6(self):
  47.         self.ipv6 = re.findall(
  48.             r"^(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|"
  49.             r"([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|"
  50.             r"([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|"
  51.             r"([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|"
  52.             r"([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|"
  53.             r"([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|"
  54.             r"[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|"
  55.             r":((:[0-9a-fA-F]{1,4}){1,7}|:)|"
  56.             r"fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|"
  57.             r"::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|"
  58.             r"(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|"
  59.             r"(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|"
  60.             r"([0-9a-fA-F]{1,4}:){1,4}:"
  61.             r"((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|"
  62.             r"(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))$", self.data)
  63.     def google_search(self, query):
  64.         print("\n"+Fore.BLUE+"[I]"+Fore.RESET+" Performing Google search...\n")
  65.         try:
  66.             results = search(query, num=20, stop=20, pause=2)
  67.             for i, result in enumerate(results, start=1):
  68.                 print(f"{Fore.GREEN}[+]{Fore.RESET} Result {i}: {result}")
  69.         except Exception as e:
  70.             print(f"{Fore.RED}[!]{Fore.RESET} An error occurred during the Google search: {e}")
  71.     def search_email(self):
  72.         email = input(" Email: ")
  73.         print("\n"+wait+" Searching information for '%s'..." % (email))
  74.         lkd = leaked()
  75.         leak = lkd.email(email)
  76.         if leak:
  77.             TABLE_DATA = [('Title', 'Domain', 'Date'), ]
  78.             for lk in leak:
  79.                 name = lk['Title']
  80.                 domain = lk['Domain']
  81.                 date = lk['Date']
  82.                 tuples = (name, domain, date)
  83.                 TABLE_DATA.append(tuples)
  84.             table = SingleTable(TABLE_DATA, " Leaked Site ")
  85.             print(table.table)
  86.             print("\n"+wait+" Searching for Passwords...")
  87.         table_dump = [('Email', 'Password'), ]
  88.         url = "https://www.google.fr/search?num=100&q=\\intext:\"%s\"\\"
  89.         content = requests.get(url % (email)).text
  90.         urls = re.findall('url\\?q=(.*?)&', content)
  91.         count = len(urls)
  92.         if count == 0:
  93.             print(warning+" No results found.")
  94.         else:
  95.             print(wait+" Scanning %s link(s)..." % (str(count)))
  96.             count_password = 0
  97.             for url in urls:
  98.                 if not "googleusercontent" in url:
  99.                     if not "/settings/ads" in url:
  100.                         if not "webcache.googleusercontent.com/" in url:
  101.                             if not "/policies/faq" in url:
  102.                                 try:
  103.                                     texte = requests.get(url).text
  104.                                     combo = re.search(email+r":([a-zA-Z0-9_ & * $ - ! / ; , ? + =  | \. ]+)", texte).group()
  105.                                     if combo:
  106.                                         passw = combo.split(":")[1]
  107.                                         tuples = (email, passw)
  108.                                         count_password += 1
  109.                                         table_dump.append(tuples)
  110.                                 except:
  111.                                     pass
  112.             if count_password > 0:
  113.                 table = SingleTable(table_dump, " Dump ")
  114.                 print("\n"+table.table)
  115.             else:
  116.                 print(warning+" No data found for '%s'" % (email))
  117.     def ip_finder(self):
  118.         ip = input(" IP Address: ")
  119.         print("\n"+wait+" Locating '%s'..." % (ip))
  120.         TABLE_DATA = []
  121.         url = "http://ip-api.com/json/"
  122.         data = requests.get(url+ip).content.decode('utf-8')
  123.         values = json.loads(data)
  124.         status = values['status']
  125.         if status != "success":
  126.             print(warning+" Invalid IP Address.")
  127.         else:
  128.             infos = ("IP", ip)
  129.             TABLE_DATA.append(infos)
  130.             infos = ("ISP", values['isp'])
  131.             TABLE_DATA.append(infos)
  132.             infos = ("Organisation", values['org'])
  133.             TABLE_DATA.append(infos)
  134.             infos = ("Country", values['country'])
  135.             TABLE_DATA.append(infos)
  136.             infos = ("Region", values['regionName'])
  137.             TABLE_DATA.append(infos)
  138.             infos = ("City", values['city'])
  139.             TABLE_DATA.append(infos)
  140.             infos = ("Zip Code", values['zip'])
  141.             TABLE_DATA.append(infos)
  142.             localisation = str(values['lat'])+', '+str(values['lon'])
  143.             infos = ("Location", localisation)
  144.             TABLE_DATA.append(infos)
  145.             infos = ("Maps", "https://www.google.fr/maps?q="+localisation)
  146.             TABLE_DATA.append(infos)
  147.             table = SingleTable(TABLE_DATA, ip)
  148.             print("\n"+table.table)
  149.     def run_tool(self):
  150.         print("\nGhostDoxxer - Comprehensive Information Gathering Tool\n")
  151.         while True:
  152.             print("1. Extract Information from Text")
  153.             print("2. Search Google for Email Address")
  154.             print("3. Search Email Address for Leaks")
  155.             print("4. Find Information by IP Address")
  156.             print("5. Exit")
  157.             choice = input("\nEnter your choice: ")
  158.             if choice == "1":
  159.                 self.extract_info()
  160.                 print("\n"+Fore.BLUE+"[I]"+Fore.RESET+" Information Extraction Complete:")
  161.                 if self.email:
  162.                     print(f"Email Addresses: {', '.join(self.email)}")
  163.                 if self.telephone:
  164.                     print(f"Phone Numbers: {', '.join(self.telephone)}")
  165.                 if self.urls:
  166.                     print(f"URLs: {', '.join(self.urls)}")
  167.                 if self.ipv4:
  168.                     print(f"IPv4 Addresses: {', '.join(self.ipv4)}")
  169.                 if self.ipv6:
  170.                     print(f"IPv6 Addresses: {', '.join(self.ipv6)}")
  171.             elif choice == "2":
  172.                 query = input("Enter query for Google search: ")
  173.                 self.google_search(query)
  174.             elif choice == "3":
  175.                 self.search_email()
  176.             elif choice == "4":
  177.                 self.ip_finder()
  178.             elif choice == "5":
  179.                 print("Exiting GhostDoxxer...")
  180.                 break
  181.             else:
  182.                 print(warning+" Invalid choice. Please select a valid option.")
  183. class FacebookSearchTool(GhostDoxxer):
  184.     def __init__(self):
  185.         super().__init__(data=None)
  186.     def search_facebook(self, name):
  187.         # Function to search Facebook profiles by name
  188.         # ...
  189.     def run_tool(self):
  190.         print("\nFacebookSearchTool - Comprehensive Facebook Information Gathering Tool\n")
  191.         while True:
  192.             print("1. Search Facebook by Name")
  193.             print("2. Extract Information from Text")
  194.             print("3. Search Google for Email Address")
  195.             print("4. Search Email Address for Leaks")
  196.             print("5. Find Information by IP Address")
  197.             print("6. Exit")
  198.             choice = input("\nEnter your choice: ")
  199.             if choice == "1":
  200.                 name = input("Enter the name to search on Facebook: ")
  201.                 self.search_facebook(name)
  202.             elif choice == "2":
  203.                 data = input("Enter the text or data for analysis: ")
  204.                 self.data = data
  205.                 self.extract_info()
  206.                 print("\n"+Fore.BLUE+"[I]"+Fore.RESET+" Information Extraction Complete:")
  207.                 if self.email:
  208.                     print(f"Email Addresses: {', '.join(self.email)}")
  209.                 if self.telephone:
  210.                     print(f"Phone Numbers: {', '.join(self.telephone)}")
  211.                 if self.urls:
  212.                     print(f"URLs: {', '.join(self.urls)}")
  213.                 if self.ipv4:
  214.                     print(f"IPv4 Addresses: {', '.join(self.ipv4)}")
  215.                 if self.ipv6:
  216.                     print(f"IPv6 Addresses: {', '.join(self.ipv6)}")
  217.             elif choice == "3":
  218.                 query = input("Enter query for Google search: ")
  219.                 self.google_search(query)
  220.             elif choice == "4":
  221.                 self.search_email()
  222.             elif choice == "5":
  223.                 self.ip_finder()
  224.             elif choice == "6":
  225.                 print("Exiting FacebookSearchTool...")
  226.                 break
  227.             else:
  228.                 print(warning+" Invalid choice. Please select a valid option.")
  229. if __name__ == "__main__":
  230.     print("\nWelcome to the FacebookSearchTool - Comprehensive Facebook Information Gathering Tool")
  231.     facebook_tool = FacebookSearchTool()
  232.     facebook_tool.run_tool()
  233.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement