s4vitar / spoofMe

Programa ideal para el Spoofing de llamadas y mensajería instantánea (SMS) desde terminal.
147 stars 34 forks source link

he pasado el codigo a phyton3 #2

Open vanhoteen opened 1 year ago

vanhoteen commented 1 year ago

!/usr/bin/python

coding: utf-8

Autor: Marcelo Vázquez (aka s4vitar)

import re, shutil, tempfile, signal import requests import sys import ssl ssl._create_default_https_context = ssl._create_unverified_context import os

from time import sleep

class bcolors: HEADER = '\033[95m' OKBLUE = '\033[94m' OKGREEN = '\033[92m' WARNING = '\033[93m' FAIL = '\033[91m' ENDC = '\033[0m' BOLD = '\033[1m' UNDERLINE = '\033[4m'

if len(sys.argv) != 4: print("\n" + bcolors.OKGREEN + "[" + bcolors.ENDC + bcolors.OKBLUE + "*" + bcolors.OKGREEN + "] Usage: python " + sys.argv[0] + " \n" + bcolors.ENDC) sys.exit(0)

def signal_handler(key, frame): print("\n\n[*] Exiting...\n") sys.exit(1)

signal.signal(signal.SIGINT, signal_handler)

area_code = sys.argv[1] phone_number = "+" + area_code + sys.argv[2] login_pin = sys.argv[3]

url = 'https://www.spoofcard.com/login' url_account = 'https://www.spoofcard.com/account' url_settings = 'https://www.spoofcard.com/account/settings' url_call_spoof = 'https://www.spoofcard.com/account/calls/create' url_sms_spoof = 'https://www.spoofcard.com/account/two-way-sms/create'

def sed_inplace(filename, pattern, repl):

pattern_compiled = re.compile(pattern)

with tempfile.NamedTemporaryFile(mode='w', delete=False) as tmp_file:
    with open(filename) as src_file:
        for line in src_file:
            tmp_file.write(pattern_compiled.sub(repl, line))

shutil.copystat(filename, tmp_file.name)
shutil.move(tmp_file.name.encode(), filename.encode())

def sms_spoofing(): destination_number = input('\nDestination Number [+34XXXXXXXXX]: ') display_number = input('\nDisplay Number [+34XXXXXXXXX]: ') message = input('\nEnter message to display: ')

sms_spoofing_data = {'body': message, 'destination_address': destination_number, 'source_address': display_number, 't