mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-14 19:55:19 +00:00
Update Whole File
Finally Update
This commit is contained in:
parent
791aa854bb
commit
13173d4bab
131
hackingtool.py
131
hackingtool.py
@ -187,7 +187,7 @@ def ansurf():
|
|||||||
elif anc == 3:
|
elif anc == 3:
|
||||||
os.system("sudo anonsurf stop")
|
os.system("sudo anonsurf stop")
|
||||||
elif anc == 99:
|
elif anc == 99:
|
||||||
menu()
|
anonsurf()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -199,18 +199,18 @@ def multitor():
|
|||||||
elif userchoice == 2:
|
elif userchoice == 2:
|
||||||
os.system("cd multitor && bash multitor.sh")
|
os.system("cd multitor && bash multitor.sh")
|
||||||
elif userchoice == 99:
|
elif userchoice == 99:
|
||||||
menu()
|
anonsurf()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def info():
|
def info():
|
||||||
print("""
|
print("""
|
||||||
[1] Nmap
|
[1] Nmap
|
||||||
[2] Dracnmap
|
[2] Dracnmap
|
||||||
[3] Port Scanning
|
[3] Port Scanning
|
||||||
[4] Host To IP
|
[4] Host To IP
|
||||||
[5] Xerosploit
|
[5] Xerosploit
|
||||||
[6] Advanced XSS Detection Suite
|
[6] Advanced XSS Detection Suite
|
||||||
[99] Back To Main Menu
|
[99] Back To Main Menu
|
||||||
""")
|
""")
|
||||||
choice2 = input("Z4nzu =>> ")
|
choice2 = input("Z4nzu =>> ")
|
||||||
@ -218,7 +218,7 @@ def info():
|
|||||||
nmap()
|
nmap()
|
||||||
if choice2 == 2:
|
if choice2 == 2:
|
||||||
clearScr()
|
clearScr()
|
||||||
dracmap()
|
Dracnmap()
|
||||||
if choice2 == 3:
|
if choice2 == 3:
|
||||||
clearScr()
|
clearScr()
|
||||||
ports()
|
ports()
|
||||||
@ -279,7 +279,7 @@ def ports():
|
|||||||
sys.exit()
|
sys.exit()
|
||||||
|
|
||||||
def XSStrike():
|
def XSStrike():
|
||||||
os.system("echo \"SStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy")
|
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy")
|
||||||
xc=input("[1]Install [2]Run [99]BAck >>")
|
xc=input("[1]Install [2]Run [99]BAck >>")
|
||||||
if xc == 1:
|
if xc == 1:
|
||||||
os.system("sudo rm -rf XSStrike")
|
os.system("sudo rm -rf XSStrike")
|
||||||
@ -330,7 +330,7 @@ def passwd():
|
|||||||
if passchoice == "1" or passchoice == "01":
|
if passchoice == "1" or passchoice == "01":
|
||||||
clearScr()
|
clearScr()
|
||||||
cupp()
|
cupp()
|
||||||
elif choice3 == "2" or passchoice == "02":
|
elif passchoice == "2" or passchoice == "02":
|
||||||
clearScr()
|
clearScr()
|
||||||
wlcreator()
|
wlcreator()
|
||||||
elif passchoice == "99":
|
elif passchoice == "99":
|
||||||
@ -343,7 +343,7 @@ def passwd():
|
|||||||
|
|
||||||
def cupp():
|
def cupp():
|
||||||
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
|
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
|
||||||
cc=raw_input("[1]Install [2]Run [99]Back")
|
cc=input("[1]Install [2]Run [99]Back")
|
||||||
if cc == 1:
|
if cc == 1:
|
||||||
os.system("git clone https://github.com/Mebus/cupp.git")
|
os.system("git clone https://github.com/Mebus/cupp.git")
|
||||||
print("Download Successfully..!!!")
|
print("Download Successfully..!!!")
|
||||||
@ -352,7 +352,7 @@ def cupp():
|
|||||||
elif cc == 99 :
|
elif cc == 99 :
|
||||||
passwd()
|
passwd()
|
||||||
else :
|
else :
|
||||||
main()
|
menu()
|
||||||
|
|
||||||
def wlcreator():
|
def wlcreator():
|
||||||
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
|
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
|
||||||
@ -367,7 +367,8 @@ def wlcreator():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def wire():
|
def wire():
|
||||||
print(""" [1] WiFi-Pumpkin
|
print("""
|
||||||
|
[1] WiFi-Pumpkin
|
||||||
[2] pixiewps
|
[2] pixiewps
|
||||||
[3] Bluetooth Honeypot GUI Framework
|
[3] Bluetooth Honeypot GUI Framework
|
||||||
[4] Fluxion
|
[4] Fluxion
|
||||||
@ -394,7 +395,7 @@ def wire():
|
|||||||
elif choice4 == 6:
|
elif choice4 == 6:
|
||||||
clearScr()
|
clearScr()
|
||||||
wifite()
|
wifite()
|
||||||
elif choice == 7:
|
elif choice4 == 7:
|
||||||
clearScr()
|
clearScr()
|
||||||
eviltwin()
|
eviltwin()
|
||||||
elif choice4 == 99:
|
elif choice4 == 99:
|
||||||
@ -447,7 +448,7 @@ def bluepot():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def fluxion():
|
def fluxion():
|
||||||
print("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy")
|
os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy")
|
||||||
choice = input("[1]Install [2]Run [99]Back >>")
|
choice = input("[1]Install [2]Run [99]Back >>")
|
||||||
if choice == 1:
|
if choice == 1:
|
||||||
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
|
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
|
||||||
@ -533,7 +534,7 @@ def instashell():
|
|||||||
os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy")
|
os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy")
|
||||||
instachoice=input("[1]install [2]Run [99]Back >> ")
|
instachoice=input("[1]install [2]Run [99]Back >> ")
|
||||||
if instachoice == 1:
|
if instachoice == 1:
|
||||||
os.system("sudoo git clone https://github.com/thelinuxchoice/instashell && chmod +x install.sh && sudo ./install.sh")
|
os.system("sudo git clone https://github.com/thelinuxchoice/instashell && chmod +x install.sh && sudo ./install.sh")
|
||||||
elif instachoice == 2:
|
elif instachoice == 2:
|
||||||
os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh")
|
os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh")
|
||||||
elif instachoice == 99:
|
elif instachoice == 99:
|
||||||
@ -543,7 +544,7 @@ def instashell():
|
|||||||
|
|
||||||
def tweetshell():
|
def tweetshell():
|
||||||
os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy")
|
os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy")
|
||||||
choice = input ("[1]Install [2]Run [99] >> ")
|
choice = input ("[1]Install [2]Run [99]Back >> ")
|
||||||
if choice == 1:
|
if choice == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell")
|
os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell")
|
||||||
os.system("cd tweetshell && sudo ./install.sh")
|
os.system("cd tweetshell && sudo ./install.sh")
|
||||||
@ -556,7 +557,7 @@ def tweetshell():
|
|||||||
|
|
||||||
def faceshell():
|
def faceshell():
|
||||||
os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy")
|
os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy")
|
||||||
choice = input ("[1]Install [2]Run [99] >> ")
|
choice = input ("[1]Install [2]Run [99]Back >> ")
|
||||||
if choice == 1:
|
if choice == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash")
|
os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash")
|
||||||
os.system("cd facebash && sudo ./install.sh")
|
os.system("cd facebash && sudo ./install.sh")
|
||||||
@ -596,15 +597,12 @@ def phishattack():
|
|||||||
setoolkit()
|
setoolkit()
|
||||||
if choice == 2:
|
if choice == 2:
|
||||||
clearScr()
|
clearScr()
|
||||||
print("This Tool is Devloped By UndeadSec ")
|
|
||||||
socialfish()
|
socialfish()
|
||||||
if choice == 3:
|
if choice == 3:
|
||||||
clearScr()
|
clearScr()
|
||||||
print("This Tool is Developed By thelinuxchoice")
|
|
||||||
shellphish()
|
shellphish()
|
||||||
if choice == 4:
|
if choice == 4:
|
||||||
clearScr()
|
clearScr()
|
||||||
print("This Tool is Developed By thelinuxchoice")
|
|
||||||
blackeye()
|
blackeye()
|
||||||
elif choice == 5:
|
elif choice == 5:
|
||||||
clearScr()
|
clearScr()
|
||||||
@ -624,37 +622,37 @@ def phishattack():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def socialfish():
|
def socialfish():
|
||||||
sfc=input("[1]install [2]Run [3]BAck >> ")
|
sfc=input("[1]install [2]Run [99]BAck >> ")
|
||||||
if sfc == 1:
|
if sfc == 1:
|
||||||
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
|
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
|
||||||
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
|
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
|
||||||
elif sfc ==2:
|
elif sfc ==2:
|
||||||
os.system("cd SocialFish && python3 SocialFish.py root pass")
|
os.system("cd SocialFish && python3 SocialFish.py root pass")
|
||||||
elif sfc ==3:
|
elif sfc ==99:
|
||||||
phishattack()
|
phishattack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def shellphish():
|
def shellphish():
|
||||||
spc=input("[1]install [2]Run [3]BAck >> ")
|
spc=input("[1]install [2]Run [99]BAck >> ")
|
||||||
if spc == 1:
|
if spc == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/shellphish")
|
os.system("sudo git clone https://github.com/thelinuxchoice/shellphish")
|
||||||
print("Downloaded Successfully...!! ")
|
print("Downloaded Successfully...!! ")
|
||||||
elif spc ==2:
|
elif spc ==2:
|
||||||
os.system("cd shellphish && sudo bash shellphish.sh")
|
os.system("cd shellphish && sudo bash shellphish.sh")
|
||||||
elif spc ==3:
|
elif spc ==99:
|
||||||
phishattack()
|
phishattack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def blackeye():
|
def blackeye():
|
||||||
spc=input("[1]install [2]Run [3]BAck >> ")
|
spc=input("[1]install [2]Run [99]BAck >> ")
|
||||||
if spc == 1:
|
if spc == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/blackeye")
|
os.system("sudo git clone https://github.com/thelinuxchoice/blackeye")
|
||||||
print("Downloaded Successfully...!! ")
|
print("Downloaded Successfully...!! ")
|
||||||
elif spc ==2:
|
elif spc ==2:
|
||||||
os.system("cd blackeye && sudo bash blackeye.sh")
|
os.system("cd blackeye && sudo bash blackeye.sh")
|
||||||
elif spc ==3:
|
elif spc ==99:
|
||||||
phishattack()
|
phishattack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
@ -682,7 +680,7 @@ def saycheese():
|
|||||||
elif userchoice == 2:
|
elif userchoice == 2:
|
||||||
os.system("cd saycheese && bash saycheese.sh")
|
os.system("cd saycheese && bash saycheese.sh")
|
||||||
elif userchoice == 99:
|
elif userchoice == 99:
|
||||||
socialfinder()
|
phishattack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -717,6 +715,7 @@ def socialfinder():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def facialfind():
|
def facialfind():
|
||||||
|
print(Logo)
|
||||||
ffc=input("[1]Install [2]Run [99]Back >>")
|
ffc=input("[1]Install [2]Run [99]Back >>")
|
||||||
if ffc == 1:
|
if ffc == 1:
|
||||||
print("Firefox is Required So updating.....")
|
print("Firefox is Required So updating.....")
|
||||||
@ -742,7 +741,8 @@ def facialfind():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def userrecon():
|
def userrecon():
|
||||||
userchoice = input("[1]Install [2]Run [99]Back")
|
print(Logo)
|
||||||
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||||||
if userchoice == 1:
|
if userchoice == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git")
|
os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git")
|
||||||
elif userchoice == 2:
|
elif userchoice == 2:
|
||||||
@ -782,6 +782,7 @@ def bulkextractor():
|
|||||||
[2]CLI Mode
|
[2]CLI Mode
|
||||||
""")
|
""")
|
||||||
if bc == 1:
|
if bc == 1:
|
||||||
|
print(Logo)
|
||||||
os.system("git clone https://github.com/simsong/bulk_extractor.git")
|
os.system("git clone https://github.com/simsong/bulk_extractor.git")
|
||||||
print(os.getcwd())
|
print(os.getcwd())
|
||||||
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
|
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
|
||||||
@ -795,10 +796,16 @@ def bulkextractor():
|
|||||||
main()
|
main()
|
||||||
|
|
||||||
def guymager():
|
def guymager():
|
||||||
os.system("apt install guymager")
|
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||||
clearScr()
|
if choice == 1:
|
||||||
os.system("guymager")
|
os.system("apt install guymager")
|
||||||
|
elif choice == 2:
|
||||||
|
clearScr()
|
||||||
|
os.system("guymager")
|
||||||
|
elif choice == 99:
|
||||||
|
forensic()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
def autopsy():
|
def autopsy():
|
||||||
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy ")
|
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy ")
|
||||||
print("""
|
print("""
|
||||||
@ -810,10 +817,7 @@ def autopsy():
|
|||||||
if ac == 1:
|
if ac == 1:
|
||||||
os.system("sudo autopsy")
|
os.system("sudo autopsy")
|
||||||
if ac == 2:
|
if ac == 2:
|
||||||
wc=input("""
|
wc=input(""" [1]64-Bit [2]32-Bit [99]Back >> """)
|
||||||
[1]64-Bit
|
|
||||||
[2]32-Bit
|
|
||||||
""")
|
|
||||||
if wc == 1:
|
if wc == 1:
|
||||||
url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi'
|
url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi'
|
||||||
import requests
|
import requests
|
||||||
@ -830,6 +834,8 @@ def autopsy():
|
|||||||
code.write(r.content)
|
code.write(r.content)
|
||||||
urllib.urlretrieve(url, "autopsy.zip")
|
urllib.urlretrieve(url, "autopsy.zip")
|
||||||
print("Downloaded Successfully..!!")
|
print("Downloaded Successfully..!!")
|
||||||
|
elif wc == 99:
|
||||||
|
forensic()
|
||||||
elif ac ==99:
|
elif ac ==99:
|
||||||
forensic()
|
forensic()
|
||||||
else :
|
else :
|
||||||
@ -910,7 +916,7 @@ def fastssh():
|
|||||||
elif userchoice == 2:
|
elif userchoice == 2:
|
||||||
os.system("cd fastssh && ./fastssh.sh")
|
os.system("cd fastssh && ./fastssh.sh")
|
||||||
elif userchoice == 99:
|
elif userchoice == 99:
|
||||||
routersploit()
|
routexp()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -938,19 +944,34 @@ def webAttack():
|
|||||||
|
|
||||||
def slowloris():
|
def slowloris():
|
||||||
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
|
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
|
||||||
os.system("sudo pip install slowloris")
|
choice = ("[1]install [2]Run [99]Back >> ")
|
||||||
ts=raw_input("Enter Target Site :-")
|
if choice == 1:
|
||||||
os.system("slowloris %s"%ts)
|
os.system("sudo pip install slowloris")
|
||||||
|
elif choice == 2:
|
||||||
|
print(Logo)
|
||||||
|
ts=raw_input("Enter Target Site :-")
|
||||||
|
os.system("slowloris %s"%ts)
|
||||||
|
elif choice == 99:
|
||||||
|
webAttack()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
def skipfish():
|
def skipfish():
|
||||||
os.system("sudo skipfish -h")
|
userchoice = input("[1]Run [99]Back >> ")
|
||||||
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline")
|
if userchoice == 1:
|
||||||
|
os.system("sudo skipfish -h")
|
||||||
|
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline")
|
||||||
|
elif userchoice == 99:
|
||||||
|
webAttack()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
def subdomain():
|
def subdomain():
|
||||||
|
print(Logo)
|
||||||
sdc=input("[1]install [2]Run [99]BAck >> ")
|
sdc=input("[1]install [2]Run [99]BAck >> ")
|
||||||
if sdc == 1:
|
if sdc == 1:
|
||||||
os.system("sudo pip install requests argparse dnspython")
|
os.system("sudo pip install requests argparse dnspython")
|
||||||
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && cd Sublist3r && sudo pip install -r requirements.txt")
|
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && chmod -R 755 Sublist3r && cd Sublist3r && sudo pip install -r requirements.txt")
|
||||||
menu()
|
menu()
|
||||||
elif sdc == 2:
|
elif sdc == 2:
|
||||||
print("Go to Sublist3r and run ./sublist3r")
|
print("Go to Sublist3r and run ./sublist3r")
|
||||||
@ -1003,7 +1024,7 @@ def androidhack():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def keydroid():
|
def keydroid():
|
||||||
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy")
|
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy")
|
||||||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||||||
if userchoice == 1:
|
if userchoice == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ")
|
os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ")
|
||||||
@ -1083,20 +1104,20 @@ def whatshack():
|
|||||||
os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
|
os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
|
||||||
os.system("cd whatshack/ && bash whatshack.sh")
|
os.system("cd whatshack/ && bash whatshack.sh")
|
||||||
elif userchoice == 99:
|
elif userchoice == 99:
|
||||||
socialattack()
|
androidhack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def droidcam():
|
def droidcam():
|
||||||
os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy")
|
os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy")
|
||||||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||||||
if userchoice == 1:
|
if userchoice == 1:
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ")
|
os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ")
|
||||||
os.system("cd droidcam && sudo bash install.sh")
|
os.system("cd droidcam && sudo bash install.sh")
|
||||||
elif userchoice == 2:
|
elif userchoice == 2:
|
||||||
os.system("cd droidcam && bash droidcam.sh")
|
os.system("cd droidcam && bash droidcam.sh")
|
||||||
elif userchoice == 99:
|
elif userchoice == 99:
|
||||||
socialattack()
|
androidhack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -1108,7 +1129,7 @@ def evilapp():
|
|||||||
elif userchoice == 2:
|
elif userchoice == 2:
|
||||||
os.system("cd evilapp && bash evilapp.sh")
|
os.system("cd evilapp && bash evilapp.sh")
|
||||||
elif userchoice == 99:
|
elif userchoice == 99:
|
||||||
socialfinder()
|
androidhack()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -1160,7 +1181,7 @@ def thefatrat():
|
|||||||
elif fatratchoice == 3:
|
elif fatratchoice == 3:
|
||||||
os.system("cd TheFatRat && ./update && chmod +x setup.sh && ./setup.sh")
|
os.system("cd TheFatRat && ./update && chmod +x setup.sh && ./setup.sh")
|
||||||
elif fatratchoice == 99:
|
elif fatratchoice == 99:
|
||||||
menu()
|
payloads()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -1200,6 +1221,7 @@ def stitch():
|
|||||||
menu()
|
menu()
|
||||||
|
|
||||||
def MSFvenom():
|
def MSFvenom():
|
||||||
|
print(Logo)
|
||||||
MSFvenom= input("[1]Install [2]Run [99]Back >> ")
|
MSFvenom= input("[1]Install [2]Run [99]Back >> ")
|
||||||
if MSFvenom == 1:
|
if MSFvenom == 1:
|
||||||
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh")
|
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh")
|
||||||
@ -1224,7 +1246,7 @@ def venom():
|
|||||||
elif venomchoice == 2:
|
elif venomchoice == 2:
|
||||||
os.system("cd venom && sudo ./venom.sh")
|
os.system("cd venom && sudo ./venom.sh")
|
||||||
elif venomchoice == 99:
|
elif venomchoice == 99:
|
||||||
menu()
|
payloads()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
@ -1257,7 +1279,8 @@ def wifijamming():
|
|||||||
|
|
||||||
def airmon():
|
def airmon():
|
||||||
# os.system("echo \" \" | boxes -d boy")
|
# os.system("echo \" \" | boxes -d boy")
|
||||||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
print(Logo)
|
||||||
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||||||
if userchoice == 1:
|
if userchoice == 1:
|
||||||
print("In Working")
|
print("In Working")
|
||||||
time.sleep(5)
|
time.sleep(5)
|
||||||
@ -1286,7 +1309,7 @@ def airmon():
|
|||||||
|
|
||||||
def portforwading():
|
def portforwading():
|
||||||
print("In Working ......")
|
print("In Working ......")
|
||||||
time.sleep(3)
|
time.sleep(1)
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def sqltool():
|
def sqltool():
|
||||||
|
Loading…
Reference in New Issue
Block a user