Fixing Error

This commit is contained in:
Mr.Z4nzu 2020-04-15 21:15:46 +05:30 committed by GitHub
parent e85ae98a2c
commit 366dbcd453
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -8,24 +8,26 @@ import webbrowser
import requests import requests
import time import time
import http.client import http.client
import urllib.request
import sys import sys
import json import json
import telnetlib import telnetlib
import glob import glob
import urllib.request # import urllib2
import socket import socket
import base64 import base64
from getpass import getpass from getpass import getpass
from commands import * # from command import *
import subprocess
from sys import argv from sys import argv
import random import random
import Queue import queue
import subprocess import subprocess
import re import re
import getpass import getpass
from os import path from os import path
from platform import system from platform import system
from urlparse import urlparse from urllib.parse import urlparse
from xml.dom import minidom from xml.dom import minidom
from optparse import OptionParser from optparse import OptionParser
from time import sleep from time import sleep
@ -70,7 +72,7 @@ def menu():
[99]Exit [99]Exit
""") """)
choice = raw_input("Z4nzu =>> ") choice = input("Z4nzu =>> ")
if choice == "0" or choice == "00": if choice == "0" or choice == "00":
clearScr() clearScr()
print(Logo) print(Logo)
@ -160,13 +162,13 @@ def anonsurf():
[99] Back [99] Back
""") """)
choice = input("Z4nzu =>>") choice = input("Z4nzu =>>")
if choice == 1: if choice == "1":
clearScr() clearScr()
ansurf() ansurf()
elif choice == 2: elif choice == "2":
clearScr() clearScr()
multitor() multitor()
elif choice == 99: elif choice == "99":
menu() menu()
else : else :
menu() menu()
@ -174,15 +176,15 @@ def anonsurf():
def ansurf(): def ansurf():
os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo cHange Ip\" |boxes -d boy") os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo cHange Ip\" |boxes -d boy")
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ") anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
if anc == 1: if anc == "1":
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git") os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf") os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf")
print("Successfully Installed ...!!") print("Successfully Installed ...!!")
elif anc==2: elif anc=="2":
os.system("sudo anonsurf start") os.system("sudo anonsurf start")
elif anc == 3: elif anc == "3":
os.system("sudo anonsurf stop") os.system("sudo anonsurf stop")
elif anc == 99: elif anc == "99":
anonsurf() anonsurf()
else : else :
menu() menu()
@ -190,11 +192,11 @@ def ansurf():
def multitor(): def multitor():
os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy") os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == 1: if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git") os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git")
elif userchoice == 2: elif userchoice == "2":
os.system("cd multitor && bash multitor.sh") os.system("cd multitor && bash multitor.sh")
elif userchoice == 99: elif userchoice == "99":
anonsurf() anonsurf()
else : else :
menu() menu()
@ -211,31 +213,29 @@ def info():
[99] Back To Main Menu [99] Back To Main Menu
""") """)
choice2 = input("Z4nzu =>> ") choice2 = input("Z4nzu =>> ")
if choice2 == 1: if choice2 == "1":
nmap() nmap()
if choice2 == 2: if choice2 == "2":
clearScr() clearScr()
Dracnmap() Dracnmap()
if choice2 == 3: if choice2 == "3":
clearScr() clearScr()
ports() ports()
if choice2 == 4: if choice2 == "4":
clearScr() clearScr()
h2ip() h2ip()
if choice2 == 5: if choice2 == "5":
clearScr() clearScr()
xerosploit() xerosploit()
if choice2 == 6: if choice2 == "6":
clearScr() clearScr()
XSStrike() XSStrike()
elif choice2 == 7: elif choice2 == "7":
clearScr() clearScr()
reconspider() reconspider()
elif choice2 == 99: elif choice2 == "99":
clearScr() clearScr()
menu() menu()
if choice2 == 9:
clearScr()
elif choice2 == "": elif choice2 == "":
menu() menu()
else: else:
@ -243,14 +243,14 @@ def info():
def nmap(): def nmap():
nmapchoice = input("[1]Install [2]Run [99]BAck >> ") nmapchoice = input("[1]Install [2]Run [99]BAck >> ")
if nmapchoice == 1 : if nmapchoice == "1" :
time.sleep(1) time.sleep(1)
print("Start Downloading....!!") print("Start Downloading....!!")
os.system("sudo git clone https://github.com/nmap/nmap.git") os.system("sudo git clone https://github.com/nmap/nmap.git")
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install") os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
elif nmapchoice == 2: elif nmapchoice == "2":
os.system("sudo nmap") os.system("sudo nmap")
elif nmapchoice == 99: elif nmapchoice == "99":
info() info()
else: else:
menu() menu()
@ -258,36 +258,36 @@ def nmap():
def Dracnmap(): def Dracnmap():
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy ") os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy ")
dracnap = input("[1]Install [2]Run [99]Back >> ") dracnap = input("[1]Install [2]Run [99]Back >> ")
if dracnap == 1: if dracnap == "1":
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git && cd Dracnmap && chmod +x Dracnmap.sh") os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git && cd Dracnmap && chmod +x Dracnmap.sh")
elif dracnap == 2: elif dracnap == "2":
os.system("cd Dracnmap && sudo ./Dracnmap.sh") os.system("cd Dracnmap && sudo ./Dracnmap.sh")
elif dracnap == 99: elif dracnap == "99":
info() info()
else : else :
menu() menu()
def h2ip(): def h2ip():
host = raw_input("Enter host name :- ") host = input("Enter host name(www.google.com) :- ")
ips = socket.gethostbyname(host) ips = socket.gethostbyname(host)
print(ips) print(ips)
def ports(): def ports():
clearScr() clearScr()
target = raw_input('Select a Target IP : ') target = input('Select a Target IP : ')
os.system("sudo nmap -O -Pn %s" % target) os.system("sudo nmap -O -Pn %s" % target)
sys.exit() sys.exit()
def XSStrike(): def XSStrike():
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy") os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy")
xc=input("[1]Install [2]Run [99]BAck >>") xc=input("[1]Install [2]Run [99]BAck >>")
if xc == 1: if xc == "1":
os.system("sudo rm -rf XSStrike") os.system("sudo rm -rf XSStrike")
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt") os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
elif xc == 2 : elif xc == "2" :
clearScr() clearScr()
os.system("cd XSStrike && python xsstrike") os.system("cd XSStrike && python xsstrike")
elif xc == 99: elif xc == "99":
info() info()
else : else :
info() info()
@ -295,12 +295,12 @@ def XSStrike():
def xerosploit(): def xerosploit():
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy") os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy")
xeros=input("[1]Install [2]Run [99]Back >>") xeros=input("[1]Install [2]Run [99]Back >>")
if xeros == 1: if xeros == "1":
os.system("git clone https://github.com/LionSec/xerosploit") os.system("git clone https://github.com/LionSec/xerosploit")
os.system("cd xerosploit && sudo python install.py") os.system("cd xerosploit && sudo python install.py")
elif xeros == 2: elif xeros == "2":
os.system("sudo xerosploit") os.system("sudo xerosploit")
elif xeros == 99: elif xeros == "99":
info() info()
else : else :
menu() menu()
@ -341,7 +341,7 @@ def passwd():
[04]Credential reuse attacks [04]Credential reuse attacks
[99]Back To Main Menu [99]Back To Main Menu
""") """)
passchoice = raw_input("Z4nzu ==>> ") passchoice = input("Z4nzu ==>> ")
if passchoice == "1" or passchoice == "01": if passchoice == "1" or passchoice == "01":
clearScr() clearScr()
cupp() cupp()
@ -364,7 +364,7 @@ def passwd():
def cupp(): def cupp():
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy") os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
cc=raw_input("[1]Install [2]Run [99]Back >> ") cc=input("[1]Install [2]Run [99]Back >> ")
if cc == "1": if cc == "1":
os.system("git clone https://github.com/Mebus/cupp.git") os.system("git clone https://github.com/Mebus/cupp.git")
print("Download Successfully..!!!") print("Download Successfully..!!!")
@ -377,7 +377,7 @@ def cupp():
def wlcreator(): def wlcreator():
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy") os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
userchoice = raw_input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1": if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator") os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator")
elif userchoice == "2": elif userchoice == "2":
@ -389,7 +389,7 @@ def wlcreator():
def goblinword(): def goblinword():
os.system("echo \" GoblinWordGenerator \" | boxes -d boy") os.system("echo \" GoblinWordGenerator \" | boxes -d boy")
userchoice = raw_input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1": if userchoice == "1":
os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git") os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git")
elif userchoice == "2": elif userchoice == "2":
@ -401,7 +401,7 @@ def goblinword():
def credentialattack(): def credentialattack():
os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy") os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy")
userchoice = raw_input("[1]Install [2]Run [99]Back >> ") userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1": if userchoice == "1":
os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git") os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git")
os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt") os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt")
@ -1019,7 +1019,7 @@ def slowloris():
os.system("sudo pip install slowloris") os.system("sudo pip install slowloris")
elif choice == 2: elif choice == 2:
print(Logo) print(Logo)
ts=raw_input("Enter Target Site :-") ts=input("Enter Target Site :-")
os.system("slowloris %s"%ts) os.system("slowloris %s"%ts)
elif choice == 99: elif choice == 99:
webAttack() webAttack()
@ -1427,11 +1427,11 @@ def steganohide():
elif choice == 2: elif choice == 2:
choice1=input("[1]Hide [2]Extract >> ") choice1=input("[1]Hide [2]Extract >> ")
if choice1 ==1: if choice1 ==1:
filehide=raw_input("Enter Filename you want to Embed(1.txt) :- ") filehide=input("Enter Filename you want to Embed(1.txt) :- ")
filetobehide=raw_input("Enter Cover Filename(test.jpeg) :- ") filetobehide=input("Enter Cover Filename(test.jpeg) :- ")
os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide)) os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide))
elif choice1 ==2: elif choice1 ==2:
fromfile=raw_input("Enter Filename From Extract Data :- ") fromfile=input("Enter Filename From Extract Data :- ")
os.system("steghide extract -sf {0}".format(fromfile)) os.system("steghide extract -sf {0}".format(fromfile))
elif choice == 99: elif choice == 99:
steganography() steganography()
@ -1444,8 +1444,8 @@ def stegnocracker():
if choice == 1: if choice == 1:
os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall") os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall")
elif choice ==2: elif choice ==2:
file1=raw_input("Enter Filename :- ") file1=input("Enter Filename :- ")
passfile=raw_input("Enter Wordlist Filename :- ") passfile=input("Enter Wordlist Filename :- ")
os.system("stegcracker {0} {1} ".format(file1,passfile)) os.system("stegcracker {0} {1} ".format(file1,passfile))
elif choice == 99: elif choice == 99:
steganography() steganography()