mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-14 19:55:19 +00:00
commit
0bf9f1fe37
2
.github/workflows/lint_python.yml
vendored
2
.github/workflows/lint_python.yml
vendored
@ -22,7 +22,7 @@ jobs:
|
||||
--statistics --target-version=py37 . | grep "\[\*\]"
|
||||
- run: pip install black codespell mypy pytest safety
|
||||
- run: black --check . || true
|
||||
- run: codespell # --ignore-words-list="" --skip="*.css,*.js,*.lock"
|
||||
- run: codespell
|
||||
- run: pip install -r requirements.txt || pip install --editable . || pip install . || true
|
||||
- run: mkdir --parents --verbose .mypy_cache
|
||||
- run: mypy --ignore-missing-imports --install-types --non-interactive . || true
|
||||
|
@ -11,14 +11,11 @@ WORKDIR /root/hackingtool
|
||||
COPY . .
|
||||
|
||||
RUN true && \
|
||||
pip3 install -r requirements.txt;
|
||||
|
||||
RUN true && \
|
||||
pip3 install lolcat boxes flask requests;
|
||||
pip3 install boxes flask lolcat requests -r requirements.txt;
|
||||
|
||||
RUN true && \
|
||||
echo "/root/hackingtool/" > /home/hackingtoolpath.txt;
|
||||
|
||||
EXPOSE 1-65535
|
||||
|
||||
ENTRYPOINT ["python3", "/root/hackingtool/hackingtool.py"]
|
||||
ENTRYPOINT ["python3", "/root/hackingtool/hackingtool.py"]
|
||||
|
17
core.py
17
core.py
@ -1,4 +1,3 @@
|
||||
# coding=utf-8
|
||||
import os
|
||||
import sys
|
||||
import webbrowser
|
||||
@ -69,13 +68,13 @@ class HackingTool(object):
|
||||
if self.PROJECT_URL:
|
||||
print(f"[{98}] Open project page")
|
||||
print(f"[{99}] Back to {parent.TITLE if parent is not None else 'Exit'}")
|
||||
option_index = input("Select an option : ")
|
||||
option_index = input("Select an option : ").strip()
|
||||
try:
|
||||
option_index = int(option_index)
|
||||
if option_index - 1 in range(len(self.OPTIONS)):
|
||||
ret_code = self.OPTIONS[option_index - 1][1]()
|
||||
if ret_code != 99:
|
||||
input("\n\nPress ENTER to continue:")
|
||||
input("\n\nPress ENTER to continue:").strip()
|
||||
elif option_index == 98:
|
||||
self.show_project_page()
|
||||
elif option_index == 99:
|
||||
@ -84,10 +83,10 @@ class HackingTool(object):
|
||||
return 99
|
||||
except (TypeError, ValueError):
|
||||
print("Please enter a valid option")
|
||||
input("\n\nPress ENTER to continue:")
|
||||
input("\n\nPress ENTER to continue:").strip()
|
||||
except Exception:
|
||||
print_exc()
|
||||
input("\n\nPress ENTER to continue:")
|
||||
input("\n\nPress ENTER to continue:").strip()
|
||||
return self.show_options(parent = parent)
|
||||
|
||||
def before_install(self):
|
||||
@ -157,21 +156,21 @@ class HackingToolsCollection(object):
|
||||
for index, tool in enumerate(self.TOOLS):
|
||||
print(f"[{index} {tool.TITLE}")
|
||||
print(f"[{99}] Back to {parent.TITLE if parent is not None else 'Exit'}")
|
||||
tool_index = input("Choose a tool to proceed: ")
|
||||
tool_index = input("Choose a tool to proceed: ").strip()
|
||||
try:
|
||||
tool_index = int(tool_index)
|
||||
if tool_index in range(len(self.TOOLS)):
|
||||
ret_code = self.TOOLS[tool_index].show_options(parent = self)
|
||||
if ret_code != 99:
|
||||
input("\n\nPress ENTER to continue:")
|
||||
input("\n\nPress ENTER to continue:").strip()
|
||||
elif tool_index == 99:
|
||||
if parent is None:
|
||||
sys.exit()
|
||||
return 99
|
||||
except (TypeError, ValueError):
|
||||
print("Please enter a valid option")
|
||||
input("\n\nPress ENTER to continue:")
|
||||
input("\n\nPress ENTER to continue:").strip()
|
||||
except Exception:
|
||||
print_exc()
|
||||
input("\n\nPress ENTER to continue:")
|
||||
input("\n\nPress ENTER to continue:").strip()
|
||||
return self.show_options(parent = parent)
|
||||
|
@ -1,4 +1,3 @@
|
||||
# coding=utf-8
|
||||
import re
|
||||
|
||||
from core import HackingTool
|
||||
|
@ -1,7 +1,7 @@
|
||||
##!/usr/bin/env python3
|
||||
# -*- coding: UTF-8 -*-
|
||||
#!/usr/bin/env python3
|
||||
# Version 1.1.0
|
||||
import os
|
||||
import sys
|
||||
import webbrowser
|
||||
from platform import system
|
||||
from time import sleep
|
||||
@ -83,10 +83,10 @@ if __name__ == "__main__":
|
||||
[1] Manual
|
||||
[2] Default
|
||||
""")
|
||||
choice = input("Z4nzu =>> ")
|
||||
choice = input("Z4nzu =>> ").strip()
|
||||
|
||||
if choice == "1":
|
||||
inpath = input("Enter Path (with Directory Name) >> ")
|
||||
inpath = input("Enter Path (with Directory Name) >> ").strip()
|
||||
with open(fpath, "w") as f:
|
||||
f.write(inpath)
|
||||
print("Successfully Set Path to: {}".format(inpath))
|
||||
@ -98,7 +98,7 @@ if __name__ == "__main__":
|
||||
sleep(3)
|
||||
else:
|
||||
print("Try Again..!!")
|
||||
exit(0)
|
||||
sys.exit(0)
|
||||
|
||||
with open(fpath) as f:
|
||||
archive = f.readline()
|
||||
|
11
install.sh
Normal file → Executable file
11
install.sh
Normal file → Executable file
@ -71,7 +71,7 @@ if [[ $choice =~ ^[1-2]+$ ]]; then
|
||||
sudo apt-get install -y git python3-pip figlet boxes php curl xdotool wget -y ;
|
||||
elif [[ $choice == 2 ]]; then
|
||||
sudo pacman -Suy -y
|
||||
sudo pacman -S python-pip-19.1.1-1 yay -y
|
||||
sudo pacman -S python-pip -y
|
||||
else
|
||||
exit
|
||||
fi
|
||||
@ -93,7 +93,11 @@ if [[ $choice =~ ^[1-2]+$ ]]; then
|
||||
if sudo git clone https://github.com/Z4nzu/hackingtool.git $install_dir; then
|
||||
# Install virtual environment
|
||||
echo -e "${YELLOW}[*] Installing Virtual Environment...${NC}"
|
||||
sudo apt install python3-venv -y
|
||||
if [[ $choice == 1 ]]; then
|
||||
sudo apt install python3-venv -y
|
||||
elif [[ $choice == 2 ]]; then
|
||||
echo "Python 3.3+ comes with a module called venv.";
|
||||
fi
|
||||
echo "";
|
||||
# Create a virtual environment for the tool
|
||||
echo -e "${YELLOW}[*] Creating virtual environment..."
|
||||
@ -108,7 +112,8 @@ if [[ $choice =~ ^[1-2]+$ ]]; then
|
||||
sudo apt install figlet -y
|
||||
elif [[ $choice == 2 ]]; then
|
||||
pip3 install -r $install_dir/requirements.txt
|
||||
yay -S boxes --noconfirm
|
||||
sudo -u $SUDO_USER git clone https://aur.archlinux.org/boxes.git && cd boxes
|
||||
sudo -u $SUDO_USER makepkg -si
|
||||
sudo pacman -S figlet -y
|
||||
fi
|
||||
# Create a shell script to launch the tool
|
||||
|
@ -1,4 +1,3 @@
|
||||
# coding=utf-8
|
||||
import os
|
||||
|
||||
from core import HackingTool
|
||||
@ -49,7 +48,7 @@ class Brutal(HackingTool):
|
||||
>> Arduino Software (I used v1.6.7)
|
||||
>> TeensyDuino
|
||||
>> Linux udev rules
|
||||
>> Copy and paste the PaensyLib folder inside your Arduino\libraries
|
||||
>> Copy and paste the PaensyLib folder inside your Arduino libraries
|
||||
|
||||
[!] Kindly Visit below link for Installation for Arduino
|
||||
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
|
||||
|
@ -195,6 +195,12 @@ class BlackPhish(HackingTool):
|
||||
def update(self):
|
||||
os.system("cd BlackPhish;sudo bash update.sh")
|
||||
|
||||
class dnstwist(HackingTool):
|
||||
Title='dnstwist'
|
||||
Install_commands=['sudo git clone https://github.com/elceef/dnstwist.git','cd dnstwist']
|
||||
Run_commands=['cd dnstwist;sudo python3 dnstwist.py']
|
||||
project_url='https://github.com/elceef/dnstwist'
|
||||
|
||||
|
||||
class PhishingAttackTools(HackingToolsCollection):
|
||||
TITLE = "Phishing attack tools"
|
||||
|
Loading…
Reference in New Issue
Block a user