Update Whole File

Finally Update
This commit is contained in:
Mr.Z4nzu 2020-04-11 20:01:31 +05:30 committed by GitHub
parent 791aa854bb
commit 13173d4bab
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -187,7 +187,7 @@ def ansurf():
elif anc == 3: elif anc == 3:
os.system("sudo anonsurf stop") os.system("sudo anonsurf stop")
elif anc == 99: elif anc == 99:
menu() anonsurf()
else : else :
menu() menu()
@ -199,18 +199,18 @@ def multitor():
elif userchoice == 2: elif userchoice == 2:
os.system("cd multitor && bash multitor.sh") os.system("cd multitor && bash multitor.sh")
elif userchoice == 99: elif userchoice == 99:
menu() anonsurf()
else : else :
menu() menu()
def info(): def info():
print(""" print("""
[1] Nmap [1] Nmap
[2] Dracnmap [2] Dracnmap
[3] Port Scanning [3] Port Scanning
[4] Host To IP [4] Host To IP
[5] Xerosploit [5] Xerosploit
[6] Advanced XSS Detection Suite [6] Advanced XSS Detection Suite
[99] Back To Main Menu [99] Back To Main Menu
""") """)
choice2 = input("Z4nzu =>> ") choice2 = input("Z4nzu =>> ")
@ -218,7 +218,7 @@ def info():
nmap() nmap()
if choice2 == 2: if choice2 == 2:
clearScr() clearScr()
dracmap() Dracnmap()
if choice2 == 3: if choice2 == 3:
clearScr() clearScr()
ports() ports()
@ -279,7 +279,7 @@ def ports():
sys.exit() sys.exit()
def XSStrike(): def XSStrike():
os.system("echo \"SStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy") os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy")
xc=input("[1]Install [2]Run [99]BAck >>") xc=input("[1]Install [2]Run [99]BAck >>")
if xc == 1: if xc == 1:
os.system("sudo rm -rf XSStrike") os.system("sudo rm -rf XSStrike")
@ -330,7 +330,7 @@ def passwd():
if passchoice == "1" or passchoice == "01": if passchoice == "1" or passchoice == "01":
clearScr() clearScr()
cupp() cupp()
elif choice3 == "2" or passchoice == "02": elif passchoice == "2" or passchoice == "02":
clearScr() clearScr()
wlcreator() wlcreator()
elif passchoice == "99": elif passchoice == "99":
@ -343,7 +343,7 @@ def passwd():
def cupp(): def cupp():
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy") os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
cc=raw_input("[1]Install [2]Run [99]Back") cc=input("[1]Install [2]Run [99]Back")
if cc == 1: if cc == 1:
os.system("git clone https://github.com/Mebus/cupp.git") os.system("git clone https://github.com/Mebus/cupp.git")
print("Download Successfully..!!!") print("Download Successfully..!!!")
@ -352,7 +352,7 @@ def cupp():
elif cc == 99 : elif cc == 99 :
passwd() passwd()
else : else :
main() menu()
def wlcreator(): def wlcreator():
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy") os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
@ -367,7 +367,8 @@ def wlcreator():
menu() menu()
def wire(): def wire():
print(""" [1] WiFi-Pumpkin print("""
[1] WiFi-Pumpkin
[2] pixiewps [2] pixiewps
[3] Bluetooth Honeypot GUI Framework [3] Bluetooth Honeypot GUI Framework
[4] Fluxion [4] Fluxion
@ -394,7 +395,7 @@ def wire():
elif choice4 == 6: elif choice4 == 6:
clearScr() clearScr()
wifite() wifite()
elif choice == 7: elif choice4 == 7:
clearScr() clearScr()
eviltwin() eviltwin()
elif choice4 == 99: elif choice4 == 99:
@ -447,7 +448,7 @@ def bluepot():
menu() menu()
def fluxion(): def fluxion():
print("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy") os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy")
choice = input("[1]Install [2]Run [99]Back >>") choice = input("[1]Install [2]Run [99]Back >>")
if choice == 1: if choice == 1:
os.system("git clone https://github.com/thehackingsage/Fluxion.git") os.system("git clone https://github.com/thehackingsage/Fluxion.git")
@ -533,7 +534,7 @@ def instashell():
os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy") os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy")
instachoice=input("[1]install [2]Run [99]Back >> ") instachoice=input("[1]install [2]Run [99]Back >> ")
if instachoice == 1: if instachoice == 1:
os.system("sudoo git clone https://github.com/thelinuxchoice/instashell && chmod +x install.sh && sudo ./install.sh") os.system("sudo git clone https://github.com/thelinuxchoice/instashell && chmod +x install.sh && sudo ./install.sh")
elif instachoice == 2: elif instachoice == 2:
os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh") os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh")
elif instachoice == 99: elif instachoice == 99:
@ -543,7 +544,7 @@ def instashell():
def tweetshell(): def tweetshell():
os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy") os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy")
choice = input ("[1]Install [2]Run [99] >> ") choice = input ("[1]Install [2]Run [99]Back >> ")
if choice == 1: if choice == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell") os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell")
os.system("cd tweetshell && sudo ./install.sh") os.system("cd tweetshell && sudo ./install.sh")
@ -556,7 +557,7 @@ def tweetshell():
def faceshell(): def faceshell():
os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy") os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy")
choice = input ("[1]Install [2]Run [99] >> ") choice = input ("[1]Install [2]Run [99]Back >> ")
if choice == 1: if choice == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash") os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash")
os.system("cd facebash && sudo ./install.sh") os.system("cd facebash && sudo ./install.sh")
@ -596,15 +597,12 @@ def phishattack():
setoolkit() setoolkit()
if choice == 2: if choice == 2:
clearScr() clearScr()
print("This Tool is Devloped By UndeadSec ")
socialfish() socialfish()
if choice == 3: if choice == 3:
clearScr() clearScr()
print("This Tool is Developed By thelinuxchoice")
shellphish() shellphish()
if choice == 4: if choice == 4:
clearScr() clearScr()
print("This Tool is Developed By thelinuxchoice")
blackeye() blackeye()
elif choice == 5: elif choice == 5:
clearScr() clearScr()
@ -624,37 +622,37 @@ def phishattack():
menu() menu()
def socialfish(): def socialfish():
sfc=input("[1]install [2]Run [3]BAck >> ") sfc=input("[1]install [2]Run [99]BAck >> ")
if sfc == 1: if sfc == 1:
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y") os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt") os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
elif sfc ==2: elif sfc ==2:
os.system("cd SocialFish && python3 SocialFish.py root pass") os.system("cd SocialFish && python3 SocialFish.py root pass")
elif sfc ==3: elif sfc ==99:
phishattack() phishattack()
else : else :
menu() menu()
def shellphish(): def shellphish():
spc=input("[1]install [2]Run [3]BAck >> ") spc=input("[1]install [2]Run [99]BAck >> ")
if spc == 1: if spc == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/shellphish") os.system("sudo git clone https://github.com/thelinuxchoice/shellphish")
print("Downloaded Successfully...!! ") print("Downloaded Successfully...!! ")
elif spc ==2: elif spc ==2:
os.system("cd shellphish && sudo bash shellphish.sh") os.system("cd shellphish && sudo bash shellphish.sh")
elif spc ==3: elif spc ==99:
phishattack() phishattack()
else : else :
menu() menu()
def blackeye(): def blackeye():
spc=input("[1]install [2]Run [3]BAck >> ") spc=input("[1]install [2]Run [99]BAck >> ")
if spc == 1: if spc == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/blackeye") os.system("sudo git clone https://github.com/thelinuxchoice/blackeye")
print("Downloaded Successfully...!! ") print("Downloaded Successfully...!! ")
elif spc ==2: elif spc ==2:
os.system("cd blackeye && sudo bash blackeye.sh") os.system("cd blackeye && sudo bash blackeye.sh")
elif spc ==3: elif spc ==99:
phishattack() phishattack()
else : else :
menu() menu()
@ -682,7 +680,7 @@ def saycheese():
elif userchoice == 2: elif userchoice == 2:
os.system("cd saycheese && bash saycheese.sh") os.system("cd saycheese && bash saycheese.sh")
elif userchoice == 99: elif userchoice == 99:
socialfinder() phishattack()
else : else :
menu() menu()
@ -717,6 +715,7 @@ def socialfinder():
menu() menu()
def facialfind(): def facialfind():
print(Logo)
ffc=input("[1]Install [2]Run [99]Back >>") ffc=input("[1]Install [2]Run [99]Back >>")
if ffc == 1: if ffc == 1:
print("Firefox is Required So updating.....") print("Firefox is Required So updating.....")
@ -742,7 +741,8 @@ def facialfind():
menu() menu()
def userrecon(): def userrecon():
userchoice = input("[1]Install [2]Run [99]Back") print(Logo)
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == 1: if userchoice == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git") os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git")
elif userchoice == 2: elif userchoice == 2:
@ -782,6 +782,7 @@ def bulkextractor():
[2]CLI Mode [2]CLI Mode
""") """)
if bc == 1: if bc == 1:
print(Logo)
os.system("git clone https://github.com/simsong/bulk_extractor.git") os.system("git clone https://github.com/simsong/bulk_extractor.git")
print(os.getcwd()) print(os.getcwd())
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer") os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
@ -795,10 +796,16 @@ def bulkextractor():
main() main()
def guymager(): def guymager():
os.system("apt install guymager") choice = input("[1]Install [2]Run [99]Back >> ")
clearScr() if choice == 1:
os.system("guymager") os.system("apt install guymager")
elif choice == 2:
clearScr()
os.system("guymager")
elif choice == 99:
forensic()
else :
menu()
def autopsy(): def autopsy():
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy ") os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy ")
print(""" print("""
@ -810,10 +817,7 @@ def autopsy():
if ac == 1: if ac == 1:
os.system("sudo autopsy") os.system("sudo autopsy")
if ac == 2: if ac == 2:
wc=input(""" wc=input(""" [1]64-Bit [2]32-Bit [99]Back >> """)
[1]64-Bit
[2]32-Bit
""")
if wc == 1: if wc == 1:
url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi' url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi'
import requests import requests
@ -830,6 +834,8 @@ def autopsy():
code.write(r.content) code.write(r.content)
urllib.urlretrieve(url, "autopsy.zip") urllib.urlretrieve(url, "autopsy.zip")
print("Downloaded Successfully..!!") print("Downloaded Successfully..!!")
elif wc == 99:
forensic()
elif ac ==99: elif ac ==99:
forensic() forensic()
else : else :
@ -910,7 +916,7 @@ def fastssh():
elif userchoice == 2: elif userchoice == 2:
os.system("cd fastssh && ./fastssh.sh") os.system("cd fastssh && ./fastssh.sh")
elif userchoice == 99: elif userchoice == 99:
routersploit() routexp()
else : else :
menu() menu()
@ -938,19 +944,34 @@ def webAttack():
def slowloris(): def slowloris():
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ") os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
os.system("sudo pip install slowloris") choice = ("[1]install [2]Run [99]Back >> ")
ts=raw_input("Enter Target Site :-") if choice == 1:
os.system("slowloris %s"%ts) os.system("sudo pip install slowloris")
elif choice == 2:
print(Logo)
ts=raw_input("Enter Target Site :-")
os.system("slowloris %s"%ts)
elif choice == 99:
webAttack()
else :
menu()
def skipfish(): def skipfish():
os.system("sudo skipfish -h") userchoice = input("[1]Run [99]Back >> ")
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline") if userchoice == 1:
os.system("sudo skipfish -h")
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline")
elif userchoice == 99:
webAttack()
else :
menu()
def subdomain(): def subdomain():
print(Logo)
sdc=input("[1]install [2]Run [99]BAck >> ") sdc=input("[1]install [2]Run [99]BAck >> ")
if sdc == 1: if sdc == 1:
os.system("sudo pip install requests argparse dnspython") os.system("sudo pip install requests argparse dnspython")
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && cd Sublist3r && sudo pip install -r requirements.txt") os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && chmod -R 755 Sublist3r && cd Sublist3r && sudo pip install -r requirements.txt")
menu() menu()
elif sdc == 2: elif sdc == 2:
print("Go to Sublist3r and run ./sublist3r") print("Go to Sublist3r and run ./sublist3r")
@ -1003,7 +1024,7 @@ def androidhack():
menu() menu()
def keydroid(): def keydroid():
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy") os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == 1: if userchoice == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ") os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ")
@ -1083,20 +1104,20 @@ def whatshack():
os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell") os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
os.system("cd whatshack/ && bash whatshack.sh") os.system("cd whatshack/ && bash whatshack.sh")
elif userchoice == 99: elif userchoice == 99:
socialattack() androidhack()
else : else :
menu() menu()
def droidcam(): def droidcam():
os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy") os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == 1: if userchoice == 1:
os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ") os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ")
os.system("cd droidcam && sudo bash install.sh") os.system("cd droidcam && sudo bash install.sh")
elif userchoice == 2: elif userchoice == 2:
os.system("cd droidcam && bash droidcam.sh") os.system("cd droidcam && bash droidcam.sh")
elif userchoice == 99: elif userchoice == 99:
socialattack() androidhack()
else : else :
menu() menu()
@ -1108,7 +1129,7 @@ def evilapp():
elif userchoice == 2: elif userchoice == 2:
os.system("cd evilapp && bash evilapp.sh") os.system("cd evilapp && bash evilapp.sh")
elif userchoice == 99: elif userchoice == 99:
socialfinder() androidhack()
else : else :
menu() menu()
@ -1160,7 +1181,7 @@ def thefatrat():
elif fatratchoice == 3: elif fatratchoice == 3:
os.system("cd TheFatRat && ./update && chmod +x setup.sh && ./setup.sh") os.system("cd TheFatRat && ./update && chmod +x setup.sh && ./setup.sh")
elif fatratchoice == 99: elif fatratchoice == 99:
menu() payloads()
else : else :
menu() menu()
@ -1200,6 +1221,7 @@ def stitch():
menu() menu()
def MSFvenom(): def MSFvenom():
print(Logo)
MSFvenom= input("[1]Install [2]Run [99]Back >> ") MSFvenom= input("[1]Install [2]Run [99]Back >> ")
if MSFvenom == 1: if MSFvenom == 1:
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh") os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh")
@ -1224,7 +1246,7 @@ def venom():
elif venomchoice == 2: elif venomchoice == 2:
os.system("cd venom && sudo ./venom.sh") os.system("cd venom && sudo ./venom.sh")
elif venomchoice == 99: elif venomchoice == 99:
menu() payloads()
else : else :
menu() menu()
@ -1257,7 +1279,8 @@ def wifijamming():
def airmon(): def airmon():
# os.system("echo \" \" | boxes -d boy") # os.system("echo \" \" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>") print(Logo)
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == 1: if userchoice == 1:
print("In Working") print("In Working")
time.sleep(5) time.sleep(5)
@ -1286,7 +1309,7 @@ def airmon():
def portforwading(): def portforwading():
print("In Working ......") print("In Working ......")
time.sleep(3) time.sleep(1)
menu() menu()
def sqltool(): def sqltool():