From d9bb166397ff3150296cfd4225bd4e0368add88f Mon Sep 17 00:00:00 2001 From: ellandor <66072698+ellandor@users.noreply.github.com> Date: Sat, 18 Jul 2020 15:28:01 -0300 Subject: [PATCH] Update hackingtool.py --- hackingtool.py | 5206 ++++++++++++++++++++++++++---------------------- 1 file changed, 2771 insertions(+), 2435 deletions(-) diff --git a/hackingtool.py b/hackingtool.py index f016c81..c896d77 100644 --- a/hackingtool.py +++ b/hackingtool.py @@ -3,14 +3,11 @@ import os import sys import webbrowser -import time import socket -import requests -from getpass import getpass -from os import path +from time import sleep from platform import system -Logo="""\033[33m +logo = """\033[33m ▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█ ███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███ @@ -20,2507 +17,2846 @@ Logo="""\033[33m ███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄ ███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██ ▀ ▀ - \033[97m[!] https://github.com/Z4nzu/hackingtool \n \033[91m[X] Please Don't Use For illegal Activity [X] \033[97m """ -def menu(): - print(Logo + """\033[0m - \033[97m - [00]AnonSurf - [01]Information Gathering - [02]Wordlist Generator - [03]Wireless Attack - [04]SQL Injection Tools - [05]Phishing Attack - [06]Web Attack Tool - [07]Post exploitation - [08]Forensic Tools - [09]Payload Creator - [10]Exploit Frameworks - [11]Wifi Jamming - [12]Ddos Attack Tools - [13]SocialMedia Finder - [14]XSS Attack Tools - [15]Steganography - [16]More Tools - [17]Update or Uninstall | Hackingtool - [99]Exit - """) - - choice = input("Z4nzu =>> ") - if choice == "0" or choice == "00": - clearScr() - anonsurf() - elif choice == "1" or choice == "01": - clearScr() - info() - elif choice == "2" or choice == "02": - clearScr() - passwd() - elif choice == "3" or choice == "03": - clearScr() - wire() - elif choice == "4" or choice == "04": - clearScr() - sqltool() - elif choice == "5" or choice == "05": - clearScr() - phishattack() - elif choice == "6" or choice == "06": - clearScr() - webAttack() - elif choice == "7" or choice == "07": - clearScr() - postexp() - elif choice == "8" or choice == "08" : - clearScr() - forensic() - elif choice == "9" or choice == "09" : - clearScr() - payloads() - elif choice == "10": - clearScr() - routexp() - elif choice == "11" : - clearScr() - wifijamming() - elif choice == "12" : - clearScr() - Ddos() - elif choice == "13" : - clearScr() - socialfinder() - elif choice == "14": - clearScr() - xsstools() - elif choice == "15": - clearScr() - steganography() - elif choice == "16": - clearScr() - print(Logo) - others() - elif choice == "17": - clearScr() - print(Logo) - update() - elif choice == "99" : + +class Main: + def __init__(self): + self.logo = logo + + def check_input(self, word, function, keys): + if word == "": + self.clear_scr() + function() + + if not word in keys: + print('\033[91mUnknown Value') + sleep(1) + self.clear_scr() + function() + + def menu(self): + self.clear_scr() + print(self.logo + """\033[0m + \033[97m + [00] AnonSurf + [01] Information Gathering + [02] Wordlist Generator + [03] Wireless Attack + [04] SQL Injection Tools + [05] Phishing Attack + [06] Web Attack Tool + [07] Post exploitation + [08] Forensic Tools + [09] Payload Creator + [10] Exploit Frameworks + [11] Wifi Jamming + [12] Ddos Attack Tools + [13] SocialMedia Finder + [14] XSS Attack Tools + [15] Steganography + [16] More Tools + [17] Update or Uninstall | Hackingtool + [99] Exit + """) + + functions_menu = { + '00':self.anonsurf, + '01':self.info, + '02':self.passwd, + '03':self.wire, + '04':self.sqltool, + '05':self.phishattack, + '06':self.webAttack, + '07':self.postexp, + '08':self.forensic, + '09':self.payloads, + '10':self.routexp, + '11':self.wifijamming, + '12':self.ddos, + '13':self.socialfinder, + '14':self.xsstools, + '15':self.steganography, + '16':self.others, + '17':self.update, + '99':self.exit_app + } + + choice = input("Z4nzu =>> ") + + if len(choice) == 1: + choice = '0' + choice + + self.check_input(choice, self.menu, functions_menu.keys()) + + functions_menu[choice]() + + def clear_scr(self): + if system() == 'Linux': + os.system('clear') + if system() == 'Windows': + os.system('cls') + + def exit_app(self): print("Happy Hacking...") - time.sleep(1) - clearScr() + sleep(1) + self.clear_scr() sys.exit() - elif choice == "": - menu() - else: - print("\n ERROR: Wrong Input") - time.sleep(2) - menu() -def anonsurf(): - os.system("figlet -f standard -c Anonmously Hiding Tool | lolcat") - print(""" - [1] Anonmously Surf - [2] Multitor - [99] Back - """) - choice = input("Z4nzu =>>") - if choice == "1": - clearScr() - ansurf() - elif choice == "2": - clearScr() - multitor() - elif choice == "99": - menu() - else : - menu() + def anonsurf(self): + self.clear_scr() + os.system("figlet -f standard -c Anonmously Hiding Tool | lolcat") -def ansurf(): - os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo change Ip. \" |boxes -d boy | lolcat") - anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ") - if anc == "1": - os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git") - os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf") - anonsurf() - elif anc=="2": - os.system("sudo anonsurf start") - elif anc == "3": - os.system("sudo anonsurf stop") - elif anc == "99": - anonsurf() - else : - menu() - -def multitor(): - os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git") - anonsurf() - elif userchoice == "2": - os.system("cd multitor && bash multitor.sh") - elif userchoice == "99": - anonsurf() - else : - menu() - -def info(): - clearScr() - os.system("figlet -f standard -c Information Gathering Tools | lolcat") - print(""" - [1] Nmap - [2] Dracnmap - [3] Port Scanning - [4] Host To IP - [5] Xerosploit - [6] RED HAWK (All In One Scanning) - [7] ReconSpider(For All Scaning) - [8] IsItDown (Check Website Down/Up) - [9] Infoga - Email OSINT - [10] ReconDog - [11] Striker - [12] SecretFinder (like API & etc) - [13] Find Info Using Shodan - [14] Port Scanner - [15] Breacher - [99] Back To Main Menu - """) - choice2 = input("Z4nzu =>> ") - if choice2 == "1": - nmap() - if choice2 == "2": - clearScr() - Dracnmap() - if choice2 == "3": - clearScr() - ports() - if choice2 == "4": - clearScr() - h2ip() - if choice2 == "5": - clearScr() - xerosploit() - if choice2 == "6": - clearScr() - redhawk() - elif choice2 == "7": - clearScr() - reconspider() - elif choice2 == "8": - clearScr() - isitdown() - elif choice2 == "9": - clearScr() - infogaemail() - elif choice2 == "99": - clearScr() - menu() - elif choice2 == "10": - clearScr() - recondog() - elif choice2 == "11": - clearScr() - striker() - elif choice2 == "12": - clearScr() - secretfinder() - elif choice2 == "13": - clearScr() - shodantool() - elif choice2 == "14": - clearScr() - portscanner() - elif choice2 == "15": - clearScr() - breacher() - elif choice2 == "": - menu() - else: - menu() - -def breacher(): - os.system("echo \"An advanced multithreaded admin panel finder written in python.\n Usage : python breacher -u example.com \n\t [!]https://github.com/s0md3v/Breacher \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/s0md3v/Breacher.git") - info() - elif choice == "99": - info() - else : - menu() - - -def portscanner(): - os.system("echo \"rang3r is a python script which scans in multi thread\n all alive hosts within your range that you specify.\n\t [!]https://github.com/floriankunushevci/rang3r \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/floriankunushevci/rang3r;sudo pip install termcolor") - elif choice == "2": - ipinput=input("Enter Ip >> ") - os.system("cd rang3r;sudo python rang3r.py --ip {0}".format(ipinput)) - elif choice == "99": - info() - else : - menu() - -def shodantool(): - os.system("echo \"Get ports,vulnerabilities,informations,banners,..etc \n for any IP with Shodan (no apikey! no rate limit!)\n[X]Don't use this tool because your ip will be blocked by Shodan![X] \n\t [!]https://github.com/m4ll0k/Shodanfy.py \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/m4ll0k/Shodanfy.py.git") - info() - elif choice == "99": - info() - else : - menu() - -def isitdown(): - os.system("echo \"Check Website Is Online or Not \"|boxes -d boy | lolcat") - choice = input("[1]Open [99]Back >> ") - if choice == "1": - webbrowser.open_new_tab("https://www.isitdownrightnow.com/") - elif choice == "99": - info() - else : - menu() - -def secretfinder(): - os.system("echo \"SecretFinder - A python script for find sensitive data \nlike apikeys, accesstoken, authorizations, jwt,..etc \n and search anything on javascript files.\n\n Usage: python SecretFinder.py -h \n\t [*]https://github.com/m4ll0k/SecretFinder \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/m4ll0k/SecretFinder.git secretfinder") - os.system("cd secretfinder; sudo pip3 install -r requirements.txt") - info() - elif choice == "99": - info() - else : - menu() - - -def nmap(): - nmapchoice = input("[1]Install [99]BAck >> ") - if nmapchoice == "1" : - os.system("sudo git clone https://github.com/nmap/nmap.git") - os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install") - info() - elif nmapchoice == "99": - info() - else: - menu() - -def striker(): - os.system("echo \"Recon & Vulnerability Scanning Suite [!]https://github.com/s0md3v/Striker \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/s0md3v/Striker.git") - os.system("cd Striker && pip3 install -r requirements.txt") - info() - elif choice == "2": - tsite= input("Enter Site Name (example.com) >> ") - os.system("cd Striker && sudo python3 striker.py {0}".format(tsite)) - elif choice == "99": - info() - else : - menu() - - -def redhawk(): - os.system("echo \"All in one tool for Information Gathering and Vulnerability Scanning. \n [!]https://github.com/Tuhinshubhra/RED_HAWK \n\n [!]Please Use command [FIX] After Running Tool first time \" | boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK") - info() - elif choice == "2": - os.system("cd RED_HAWK;php rhawk.php") - elif choice == "99": - info() - else : - menu() - -def infogaemail(): - os.system("echo \"Infoga is a tool gathering email accounts informations\n(ip,hostname,country,...) from different public source \n[!]https://github.com/m4ll0k/Infoga \"| boxes -d boy |lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/m4ll0k/Infoga.git") - os.system("cd infoga;sudo python setup.py install") - info() - elif choice == "2": - os.system("cd infoga;python infoga.py") - elif choice == "99": - info() - else : - menu() - -def recondog(): - os.system("echo \"ReconDog Information Gathering Suite \n[!]https://github.com/s0md3v/ReconDog \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/s0md3v/ReconDog.git ") - info() - elif choice == "2": - os.system("cd ReconDog;sudo python dog") - elif choice == "99": - info() - else : - menu() - -def Dracnmap(): - os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help \n [!]https://github.com/Screetsec/Dracnmap \" | boxes -d boy | lolcat") - dracnap = input("[1]Install [99]Back >> ") - if dracnap == "1": - os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ") - os.system("cd Dracnmap && chmod +x Dracnmap.sh") - info() - elif dracnap == "99": - info() - else : - menu() - -def h2ip(): - host = input("Enter host name(www.google.com) :- ") - ips = socket.gethostbyname(host) - print(ips) - -def ports(): - clearScr() - target = input('Select a Target IP : ') - os.system("sudo nmap -O -Pn %s" % target) - sys.exit() - -def xerosploit(): - os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat") - xeros=input("[1]Install [2]Run [99]Back >>") - if xeros == "1": - os.system("git clone https://github.com/LionSec/xerosploit") - os.system("cd xerosploit && sudo python install.py") - info() - elif xeros == "2": - os.system("sudo xerosploit") - elif xeros == "99": - info() - else : - menu() - -def reconspider(): - os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\n :~python3 reconspider.py \n\t [!]https://github.com/bhavsec/reconspider \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/bhavsec/reconspider.git") - os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install") - info() - # elif userchoice == "2": - # os.system("cd reconspider && python3 reconspider.py") - elif userchoice == "99": - info() - else : - menu() - -def setoolkit(): - os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy | lolcat") - choiceset = input("[1]Install [2]Run [99]BAck >>") - if choiceset == "1": - os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git") - os.system("python social-engineer-toolkit/setup.py") - phishattack() - if choiceset == "2": - clearScr() - os.system("sudo setoolkit") - elif choiceset == "99": - phishattack() - else: - menu() - -def passwd(): - clearScr() - os.system("figlet -f standard -c Wordlist Generator | lolcat") - print(""" - [01]Cupp - [02]WordlistCreator - [03]Goblin WordGenerator - [04]Credential reuse attacks - [05]Password list((1.4 Billion Clear Text Password)) - [99]Back To Main Menu - """) - passchoice = input("Z4nzu ==>> ") - if passchoice == "1" or passchoice == "01": - clearScr() - cupp() - elif passchoice == "2" or passchoice == "02": - clearScr() - wlcreator() - elif passchoice == "3" or passchoice == "03": - clearScr() - goblinword() - elif passchoice == "4" or passchoice == "04": - clearScr() - credentialattack() - elif passchoice == "5" or passchoice == "05": - clearScr() - showme() - elif passchoice == "99": - clearScr() - menu() - elif passchoice == "": - menu() - else: - menu() - -def cupp(): - os.system("echo \"Common User Password Generator..!!\"| boxes -d boy | lolcat ") - cc=input("[1]Install [99]Back >> ") - if cc == "1": - os.system("git clone https://github.com/Mebus/cupp.git") - passwd() - elif cc == "2": - # os.system("cd cupp && ./cupp.py -h") - pass - elif cc == "99" : - passwd() - else : - menu() - -def wlcreator(): - os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/Z4nzu/wlcreator") - passwd() - elif userchoice == "2": - os.system("cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5") - elif userchoice == "99": - passwd() - else : - menu() - -def goblinword(): - os.system("echo \" GoblinWordGenerator \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git") - passwd() - elif userchoice == "2": - os.system("cd GoblinWordGenerator && python3 goblin.py") - elif userchoice == "99": - passwd() - else : - menu() - -def credentialattack(): - os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git") - os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt") - passwd() - elif userchoice == "2" : - os.system("cd Cr3dOv3r && sudo python3 Cr3d0v3r.py -h") - elif userchoice == "99": - passwd() - else : - menu() - -def wire(): - clearScr() - os.system("figlet -f standard -c Wireless Attack Tools | lolcat") - print(""" - [1] WiFi-Pumpkin - [2] pixiewps - [3] Bluetooth Honeypot GUI Framework - [4] Fluxion - [5] Wifiphisher - [6] Wifite - [7] EvilTwin - [8] Howmanypeople - [99]Back To The Main Menu """) - choice4 = input("Z4nzu ==>> ") - if choice4 == "1": - clearScr() - wifipumkin() - if choice4 == "2": - clearScr() - pixiewps() - if choice4 == "3": - clearScr() - bluepot() - if choice4 == "4": - clearScr() - fluxion() - if choice4 == "5": - clearScr() - wifiphisher() - elif choice4 == "6": - clearScr() - wifite() - elif choice4 == "7": - clearScr() - eviltwin() - elif choice4== "8": - clearScr() - howmanypeople() - elif choice4 == "99": - menu() - elif choice4 == "": - menu() - else: - menu() - -def howmanypeople(): - os.system("echo \"Count the number of people around you by monitoring wifi signals.\n[@]WIFI ADAPTER REQUIRED* \n[*]It may be illegal to monitor networks for MAC addresses, \nespecially on networks that you do not own. Please check your country's laws\n\t [!]https://github.com/An0nUD4Y/howmanypeoplearearound \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo apt-get install tshark;sudo pip install howmanypeoplearearound") - wire() - elif choice == "2": - os.system("sudo howmanypeoplearearound") - elif choice == "99": - wire() - else : - menu() - - -def wifipumkin(): - os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy | lolcat") - wp=input("[1]Install [2]Run [99]Back >>") - if wp == "1": - os.system("sudo apt install libssl-dev libffi-dev build-essential") - os.system("sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git") - os.system("chmod -R 755 wifipumpkin3 && cd wifipumpkin3") - os.system("sudo apt install python3-pyqt5 ") - os.system("sudo python3 setup.py install") - wire() - elif wp == "2": - clearScr() - os.system("sudo wifipumpkin3") - elif wp == "99": - wire() - else : - menu() - -def pixiewps(): - os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy | lolcat") - choicewps = input("[1]Install [2]Run [99]Back >> ") - if choicewps == "1": - os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential") - os.system("cd pixiewps*/ && make ") - os.system("cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh") - if choicewps == "2": - os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy") - print("You Have To Run Manually By USing >>pixiewps -h ") - pass - elif choicewps == "99": - wire() - else: - menu() - -def bluepot(): - os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar") - time.sleep(3) - wire() - elif choice == "2": - os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar") - elif choice == "99": - wire() - else: - menu() - -def fluxion(): - os.system("echo \"Fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >>") - if choice == "1": - os.system("git clone https://github.com/thehackingsage/Fluxion.git") - os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh") - os.system("cd .. ; sudo chmod +x fluxion.sh") - time.sleep(2) - wire() - elif choice == "2": - os.system("cd Fluxion;sudo bash fluxion.sh") - elif choice == "99" : - wire() - else: - menu() - -def wifiphisher(): - print(""" - Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. - Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing - targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the - connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the - victim stations with malware.. - """) - print("For More Details Visit >> https://github.com/wifiphisher/wifiphisher") - wchoice=input("[1]Install [2]Run [99]Back >> ") - if wchoice == "1": - os.system("git clone https://github.com/wifiphisher/wifiphisher.git") - os.system("cd wifiphisher && sudo python3 setup.py install") - wire() - if wchoice == "2": - os.system("cd wifiphisher && sudo wifiphisher") - elif wchoice == "99" : - wire() - else : - menu() - -def wifite(): - os.system("echo \"[!]https://github.com/derv82/wifite2 \"|boxes -d boy | lolcat") - wc=input("[1]Install [2]Run [99]Back >> ") - if wc == "1": - os.system("sudo git clone https://github.com/derv82/wifite2.git") - os.system("cd wifite2 && sudo python3 setup.py install ; sudo pip3 install -r requirements.txt") - time.sleep(3) - wire() - elif wc =="2": - os.system("cd wifite2 && sudo wifite") - elif wc == "99": - wire() - else : - menu() - -def eviltwin(): - os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/Z4nzu/fakeap") - wire() - elif userchoice == "2": - os.system("cd fakeap && sudo bash fakeap.sh") - elif userchoice == "99": - wire() - else : - menu() - -def socialattack(): - clearScr() - os.system("figlet -f standard SocialMedia Attack | lolcat") - print(""" - [1] Instagram Attack - [2] AllinOne SocialMedia Attack - [3] Facebook Attack - [4] Application Checker - [99]Back To Menu - """) - choice=input("Z4nzu >> ") - if choice == "1": - clearScr() - instabrute() - elif choice == "2": - clearScr() - bruteforce() - elif choice == "3": - clearScr() - faceshell() - elif choice == "4" : - clearScr() - appcheck() - elif choice == "99" : - others() - else : - menu() - -def instabrute(): - os.system("echo \"Brute force attack against Instagram \n\t [!]https://github.com/chinoogawa/instaBrute \"| boxes -d boy | lolcat") - instachoice=input("[1]install [2]Run [99]Back >> ") - if instachoice == "1": - os.system("sudo git clone https://github.com/chinoogawa/instaBrute.git ") - os.system("cd instaBrute;sudo pip install -r requirements.txt") - socialattack() - elif instachoice == "2": - uname = input("Enter Username >> ") - passinput=input("Enter wordword list >> ") - os.system("cd instaBrute;sudo python instaBrute.py -u {0} -d {1}".format(uname,passinput)) - elif instachoice == "99": - socialattack() - else : - menu() - -def bruteforce(): - os.system("echo \"Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n[!]python3 Brute_Force.py -g -l \n\t[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat") - choice = input ("[1]Install [2]Run [99]BAck >> ") - if choice == "1": - os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git") - os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize") - socialattack() - elif choice == "2": - os.system("cd Brute_Force;python3 Brute_Force.py -h") - elif choice == "99": - socialattack() - else : - menu() - -def faceshell(): - os.system("echo \" Facebook BruteForcer[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat") - choice = input ("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git") - os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize") - socialattack() - elif choice == "2": - uname=input("Enter Username >> ") - passinput=input("Enter Wordlist >> ") - os.system("cd Brute_Force;python3 Brute_Force.py -f {0} -l {1}".format(uname,passinput)) - elif choice == "99": - socialattack() - else : - menu() - -def appcheck(): - os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/jakuta-tech/underhanded") - os.system("cd underhanded && sudo chmod +x underhanded.sh") - socialattack() - elif userchoice == "2": - os.system("cd underhanded ; sudo bash underhanded.sh") - elif userchoice == "99": - socialattack() - else : - menu() - -def phishattack(): - clearScr() - os.system("figlet -f standard -c Phishing Attack Tools | lolcat") - print(""" - [1] Setoolkit - [2] SocialFish - [3] HiddenEye - [4] Evilginx2 - [5] I-See_You(Get Location using phishing attack) - [6] SayCheese (Grab target's Webcam Shots) - [7] QR Code Jacking - [8] ShellPhish - [99]Back To Main Menu - """) - choice = input("Z4nzu ==>> ") - if choice == "1": - clearScr() - setoolkit() - if choice == "2": - clearScr() - socialfish() - if choice == "3": - clearScr() - hiddeneye() - if choice == "4": - clearScr() - evilginx() - elif choice == "5": - clearScr() - iseeyou() - elif choice == "6": - clearScr() - saycheese() - elif choice == "7": - clearScr() - qrjacking() - elif choice == "8": - clearScr() - shellphish() - elif choice == "99": - clearScr() - menu() - elif choice == "": - menu() - else: - menu() - -def socialfish(): - os.system("echo \"Automated Phishing Tool & Information Collector \n\t[!]https://github.com/UndeadSec/SocialFish \"|boxes -d boy | lolcat") - choice=input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y") - os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt") - time.sleep(2) - phishattack() - elif choice =="2": - os.system("cd SocialFish && sudo python3 SocialFish.py root pass") - elif choice =="99": - phishattack() - else : - menu() - -def hiddeneye(): - os.system("echo \"Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services \n\t [!]https://github.com/DarkSecDevelopers/HiddenEye \"|boxes -d boy | lolcat ") - choice=input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye") - os.system("cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok") - phishattack() - elif choice =="2": - os.system("cd HiddenEye;sudo python3 HiddenEye.py") - elif choice =="99": - phishattack() - else : - menu() - -def evilginx(): - os.system("echo \"evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies,\nwhich in turn allows to bypass 2-factor authentication protection.\n\n\t [+]Make sure you have installed GO of version at least 1.14.0 \n[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t [+]export GOPATH=$HOME/go \n [+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n[+]Then load it with source ~/.profiles.\n [*]https://github.com/An0nUD4Y/evilginx2 \"|boxes -d boy | lolcat") - choice=input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2") - os.system("cd $GOPATH/src/github.com/kgretzky/evilginx2;make") - os.system("sudo make install;sudo evilginx") - time.sleep(2) - phishattack() - elif choice =="2": - os.system("sudo evilginx") - elif choice =="99": - phishattack() - else : - menu() - -def shellphish(): - os.system("echo \"Phishing Tool for 18 social media \n [!]https://github.com/An0nUD4Y/shellphish \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/An0nUD4Y/shellphish") - elif choice == "2": - os.system("cd shellphish;sudo bash shellphish.sh") - elif choice == "99": - phishattack() - else : - menu() - - -def iseeyou(): - os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git") - os.system("cd I-See-You && sudo chmod u+x ISeeYou.sh") - phishattack() - elif userchoice == "2": - os.system("cd I-See-You && sudo bash ISeeYou.sh") - elif userchoice == "99": - phishattack() - else : - menu() - -def saycheese(): - os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/hangetzzu/saycheese") - phishattack() - elif userchoice == "2": - os.system("cd saycheese && sudo bash saycheese.sh") - elif userchoice == "99": - phishattack() - else : - menu() - -def qrjacking(): - os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/cryptedwolf/ohmyqr && sudo apt-get install scrot") - phishattack() - elif userchoice == "2": - os.system("cd ohmyqr && sudo bash ohmyqr.sh") - elif userchoice == "99": - phishattack() - else : - menu() - -def socialfinder(): - clearScr() - os.system("figlet -f standard SocialMedia Finder | lolcat") - print(""" - [1]Find SocialMedia By Facial Recognation System - [2]Find SocialMedia By UserName - [3]Sherlock - [4]SocialScan | Username or Email - [99]Back To Main Menu - """) - choice =input("Z4nzu =>>") - if choice == "1": - clearScr() - facialfind() - elif choice == "2": - clearScr() - finduser() - elif choice == "3": - clearScr() - sherlock() - elif choice == "4": - clearScr() - socialscan() - elif choice == "99": - menu() - else : - menu() - -def socialscan(): - os.system("echo \"Check email address and username availability on online platforms with 100% accuracy \n\t[*]https://github.com/iojw/socialscan \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo pip install socialscan") - elif choice == "2": - uname =input("Enter Username or Emailid (if both then please space between email & username) >>") - os.system("sudo socialscan {0}".format(uname)) - elif choice == "99": - socialfinder() - else : - menu() - - -def sherlock(): - os.system("echo \"Hunt down social media accounts by username across social networks \n For More Usege \n\t >>python3 sherlock --help \n [!]https://github.com/sherlock-project/sherlock \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/sherlock-project/sherlock.git") - os.system("cd sherlock ;sudo python3 -m pip install -r requirements.txt") - elif choice == "2": - uname= input("Enter Username >> ") - os.system("cd sherlock ;sudo python3 sherlock {0}".format(uname)) - elif choice == "99": - socialfinder() - else : - menu() - -def facialfind(): - os.system("echo \"A Social Media Mapping Tool that correlates profiles\n via facial recognition across different sites. \n\t[!]https://github.com/Greenwolf/social_mapper \"|boxes -d boy | lolcat") - choice=input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade") - os.system("sudo git clone https://github.com/Greenwolf/social_mapper.git") - os.system("cd social_mapper/setup") - os.system("sudo python3 -m pip install --no-cache-dir -r requirements.txt") - os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes | lolcat") - elif choice == "2": - os.system("cd social_mapper/setup") - os.system("sudo python social_mapper.py -h") - print("""\033[95m - You have to set Username and password of your AC Or Any Fack Account - [#]Type in Terminal nano social_mapper.py - """) - os.system("echo \"python social_mapper.py -f [] -i [] -m fast [] -fb -tw\"| boxes | lolcat") - elif choice == "99" : - socialfinder() - else : - menu() - -def finduser(): - os.system("echo \"Find usernames across over 75 social networks \n [!]https://github.com/xHak9x/finduser \"|boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/xHak9x/finduser.git") - os.system("cd finduser && sudo chmod +x finduser.sh") - time.sleep(3) - socialfinder() - elif userchoice == "2": - os.system("cd finduser && sudo bash finduser.sh") - elif userchoice == "99": - socialfinder() - else : - menu() - -def forensic(): - clearScr() - os.system("figlet -f standard Forensic Tools | lolcat ") - print(""" - [1] Autopsy - [2] Wireshark - [3] Bulk_extractor - [4] Disk Clone and ISO Image Aquire - [5] Toolsley - [99]Back to Menu - """) - choice = input("Z4nzu ==>>") - if choice == "3" : - bulkextractor() - elif choice == "4": - clearScr() - guymager() - elif choice == "1": - clearScr() - autopsy() - elif choice == "2": - clearScr() - wireshark() - elif choice == "5": - clearScr() - toolsley() - elif choice == "99": - menu() - elif choice == "": - menu() - else : - menu() - -def bulkextractor(): - print(""" - [1]GUI Mode(Download required) - [2]CLI Mode - [99]BAck - """) - choice = input("Z4nzu >> ") - if choice == "1": - os.system("sudo git clone https://github.com/simsong/bulk_extractor.git") - os.system("ls src/ && cd .. && cd java_gui && ./BEViewer") - print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer") - print("Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor ") - elif choice =="2": - os.system("sudo apt-get install bulk_extractor") - print("bulk_extractor and options") - os.system("bulk_extractor") - os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline | lolcat") - elif choice == "99": - forensic() - elif choice =="": - forensic() - else : - menu() - -def guymager(): - os.system("echo \"Guymager is a free forensic imager for media acquisition.\n [!]https://guymager.sourceforge.io/ \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo apt install guymager") - forensic() - elif choice == "2": - clearScr() - os.system("sudo guymager") - elif choice == "99": - forensic() - elif choice == "": - forensic() - else : - menu() - -def autopsy(): - os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy | lolcat") - choice=input(" [1]Run [99]Back >> ") - if choice == "1": - os.system("sudo autopsy") - if choice == "": - forensic() - elif choice =="99": - forensic() - else : - menu() - -def wireshark(): - os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat") - choice = input("[1]Run [99]Back >> ") - if choice == "1": - os.system("sudo wireshark") - elif choice == "99": - forensic() - elif choice == "": - forensic() - else : - menu() - -def toolsley(): - os.system("echo \" Toolsley got more than ten useful tools for investigation.\n[+]File signature verifier\n[+]File identifier \n[+]Hash & Validate \n[+]Binary inspector \n [+]Encode text \n[+]Data URI generator \n[+]Password generator \" | boxes -d boy | lolcat") - userchoice = input("[1]Open [99]Back >> ") - if userchoice == "1": - print("Trying to open WebBrowser ") - time.sleep(3) - webbrowser.open_new_tab('https://www.toolsley.com/') - elif userchoice == "99": - forensic() - elif userchoice == "": - forensic() - else : - menu() - -def postexp(): - clearScr() - os.system("figlet -f standard post explotations | lolcat") - print(""" - [1] Vegile - Ghost In The Shell - [2] Chrome Keylogger - [99]Back - """) - expchoice = input("Z4nzu =>> ") - if expchoice == "1": - clearScr() - vegile() - if expchoice == "2": - clearScr() - chromekeylogger() - elif expchoice == "99": - menu() - elif expchoice == "": - postexp() - else : - menu() - -def vegile(): - os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy | lolcat") - vegilechoice = input("[1]Install [2]Run [99]Back >> ") - if vegilechoice == "1": - os.system("sudo git clone https://github.com/Screetsec/Vegile.git") - os.system("cd Vegile && sudo chmod +x Vegile") - postexp() - elif vegilechoice == "2": - os.system("echo \"You can Use Command : \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment") - os.system("cd Vegile && sudo bash Vegile ") - pass - elif vegilechoice == "99": - postexp() - else : - menu() - -def chromekeylogger(): - os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git") - os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ") - postexp() - elif userchoice == "2": - os.system("cd HeraKeylogger && sudo python3 hera.py ") - elif userchoice == "99": - postexp() - else : - menu() - -def routexp(): - clearScr() - os.system("figlet -f standard Exploit Framework | lolcat ") - print(""" - [1] RouterSploit - [2] WebSploit - [3] Commix - [4] Web2Attack - [5] Fastssh - [99]Back to menu - """) - choice=input("Z4nzu =>> ") - if choice == "1": - clearScr() - routersploit() - elif choice=="99": - menu() - elif choice=="5": - clearScr() - fastssh() - elif choice == "3": - clearScr() - commix() - elif choice == "4": - clearScr() - web2attack() - elif choice == "2": - clearScr() - websploit() - elif choice== "": - routexp() - else : - print("Error Wrong Input..") - routexp() - -def commix(): - os.system("echo \"Automated All-in-One OS command injection and exploitation tool.\nCommix can be used from web developers, penetration testers or even security researchers\n in order to test web-based applications with the view to find bugs,\n errors or vulnerabilities related to command injection attacks.\n Usage: python commix.py [option(s)] \n\n\t[!]https://github.com/commixproject/commix \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/commixproject/commix.git commix") - elif choice == "99": - routexp() - else : - menu() - -def websploit(): - os.system("echo \"Websploit is an advanced MITM framework.\n\t [!]https://github.com/The404Hacking/websploit \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("https://github.com/The404Hacking/websploit.git") - elif choice == "2": - os.system("cd websploit;python3 websploit.py") - elif choice == "99": - routexp() - else : - menu() - -def routersploit(): - os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy | lolcat") - choice=input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://www.github.com/threat9/routersploit") - os.system("cd routersploit && sudo python3 -m pip install -r requirements.txt") - routexp() - elif choice == "2": - os.system("cd routersploit && sudo python3 rsf.py") - elif choice == "99": - routexp() - elif choice == "": - routexp() - else : - menu() - -def fastssh(): - os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/Z4nzu/fastssh && cd fastssh && sudo chmod +x fastssh.sh") - os.system("sudo apt-get install -y sshpass netcat") - elif userchoice == "2": - os.system("cd fastssh && sudo bash fastssh.sh --scan") - elif userchoice == "99": - routexp() - else : - menu() - -def webAttack(): - clearScr() - os.system("figlet 'Web Attack Tools' -f standard -c | lolcat") - print(""" - [1] Web2Attack - [2] Skipfish - [3] SubDomain Finder - [4] CheckURL - [5] Blazy(Also Find ClickJacking) - [6] Sub-Domain TakeOver - [99]Back To Menu - """) - choice = input("Z4nzu >> ") - if choice == "1": - web2attack() - elif choice == "2": - skipfish() - elif choice == "3": - subdomain() - elif choice == "4": - clearScr() - checkurl() - elif choice == "5": - clearScr() - blazy() - elif choice == "6": - clearScr() - subdomaintakeover() - elif choice == "99": - menu() - else : - print("Wrong Input..") - webAttack() - -def subdomaintakeover(): - os.system("echo \"Sub-domain takeover vulnerability occur when a sub-domain \n (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..)\nthat has been removed or deleted.\nUsage :python3 takeover.py -d www.domain.com -v \n\t[!]https://github.com/m4ll0k/takeover \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/m4ll0k/takeover.git") - os.system("cd takeover;sudo python3 setup.py install") - webAttack() - elif choice == "99": - webAttack() - else : - menu() - -def web2attack(): - os.system("echo \"Web hacking framework with tools, exploits by python \n[!]https://github.com/santatic/web2attack \"| boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/santatic/web2attack.git") - menu() - elif userchoice == "2": - os.system("cd web2attack && sudo bash w2aconsole") - elif userchoice == "99": - webAttack() - else : - menu() - -def skipfish(): - os.system("echo \"Skipfish – Fully automated, active web application security reconnaissance tool \n Usage : skipfish -o [FolderName] targetip/site \n[!]https://tools.kali.org/web-applications/skipfish \"|boxes -d headline | lolcat") - userchoice = input("[1]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo skipfish -h") - os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline | lolcat") - elif userchoice == "99": - webAttack() - else : - menu() - -def subdomain(): - os.system("echo \"Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT \n Usage:\n\t[1]python sublist3r.py -d example.com \n[2]python sublist3r.py -d example.com -p 80,443\"| boxes -d boy | lolcat") - choice=input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo pip install requests argparse dnspython") - os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ") - os.system("cd Sublist3r && sudo pip install -r requirements.txt") - webAttack() - elif choice == "2": - os.system("cd Sublist3r && python sublist3r.py -h") - elif choice == "99" : - webAttack() - else : - menu() - -def checkurl(): - os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/UndeadSec/checkURL.git") - webAttack() - elif userchoice == "2": - os.system("cd checkURL && python3 checkURL.py --help") - elif userchoice == "99": - webAttack() - else : - menu() - -def blazy(): - os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/UltimateHackers/Blazy") - os.system("cd Blazy && sudo pip install -r requirements.txt") - webAttack() - elif userchoice == "2": - os.system("cd Blazy && sudo python blazy.py") - elif userchoice == "99": - webAttack() - else : - menu() - -def androidhack(): - clearScr() - os.system("figlet -f standard -c Android Hacking Tools | lolcat") - print(""" - [1] Keydroid - [2] MySMS - [3] Lockphish (Grab target LOCK PIN) - [4] DroidCam (Capture Image) - [5] EvilApp (Hijack Session) - [99]Main Menu - """) - choice = input("Z4nzu =>>") - if choice == "1": - clearScr() - keydroid() - elif choice == "2": - clearScr() - mysms() - # elif choice == "3": - # print("Sorry This Tool Not Available") - # time.sleep(1) - # androidhack() - # # getdroid() - elif choice == "3": - clearScr() - lock() - # elif choice == "4": - # print("Sorry This Tool Not Available") - # time.sleep(1) - # androidhack() - # # droidfile() - # elif choice == "6": - # clearScr() - # whatshack() - elif choice == "4": - clearScr() - droidcam() - elif choice == "5": - clearScr() - evilapp() - elif choice == "99": - others() - else : - menu() - -def keydroid(): - os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n [+]https://github.com/F4dl0/keydroid \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/F4dl0/keydroid") - androidhack() - elif userchoice == "2": - os.system("cd keydroid && bash keydroid.sh") - elif userchoice == "99": - androidhack() - else : - menu() - -def mysms(): - os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/papusingh2sms/mysms \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/papusingh2sms/mysms") - androidhack() - elif userchoice == "2": - os.system("cd mysms && bash mysms.sh") - elif userchoice == "99": - androidhack() - else : - menu() - -# def getdroid(): -# os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy | lolcat") -# userchoice = input("[1]Install [2]Run [99]Back >>") -# if userchoice == "1": -# os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y") -# androidhack() -# elif userchoice == "2": -# os.system("cd getdroid && bash getdroid.sh") -# elif userchoice == "99": -# androidhack() -# else : -# menu() - -def lock(): - os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone git clone https://github.com/JasonJerry/lockphish") - androidhack() - elif userchoice == "2": - os.system("cd lockphish && bash lockphish.sh") - elif userchoice == "99": - androidhack() - else : - menu() - -# def droidfile(): -# os.system("echo \"Get files from Android directories\"|boxes -d boy | lolcat") -# userchoice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >>") -# if userchoice == "1": -# os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles") -# elif userchoice == "2": -# os.system("cd droidfiles && bash droidfiles.sh") -# elif userchoice == "3": -# os.system("apt-get install default-jdk apksigner") -# os.system("apt-get install libc6-dev-i386 lib32z1") -# os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk") -# os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1") -# elif userchoice == "99": -# androidhack() -# else : -# menu() - -# def whatshack(): -# os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell | lolcat") -# userchoice = input("[1]Install [2]Run [99]Back >>") -# if userchoice == "1": -# os.system("sudo git clone https://github.com/thelinuxchoice/whatshack") -# time.sleep(5) -# print("Installing Required Packges..!! It Take More Time ") -# time.sleep(3) -# os.system("apt-get install openjdk-8-jdk && apt-get install gradle") -# os.system("update-alternatives --list java") -# os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java") -# time.sleep(2) -# androidhack() -# elif userchoice == "2": -# os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell") -# os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell") -# os.system("cd whatshack/ && bash whatshack.sh") -# elif userchoice == "99": -# androidhack() -# elif userchoice=="": -# androidhack() -# else : -# menu() - -def droidcam(): - os.system("echo \"Powerful Tool For Grab Front Camera Snap Using A Link \n[+]https://github.com/kinghacker0/WishFish \"| boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/kinghacker0/WishFish; sudo apt install php wget openssh") - androidhack() - elif userchoice == "2": - os.system("cd wishfish && sudo bash wishfish.sh") - elif userchoice == "99": - androidhack() - else : - menu() - -def evilapp(): - os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies.\n [!]https://github.com/crypticterminal/EvilApp \" | boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/crypticterminal/EvilApp") - androidhack() - elif userchoice == "2": - os.system("cd evilapp && bash evilapp.sh") - elif userchoice == "99": - androidhack() - else : - menu() - -def payloads(): - clearScr() - os.system("figlet -f standard -c Payloads | lolcat") - print(""" - [1] The FatRat* - [2] Brutal - [3] Stitch - [4] MSFvenom Payload Creator - [5] Venom Shellcode Generator - [6] Spycam - [7] Mob-Droid - [99]Back - """) - choice =input("Z4nzu >> ") - if choice == "1": - clearScr() - thefatrat() - elif choice == "2": - clearScr() - Brutal() - elif choice == "7": - clearScr() - mobdroid() - elif choice == "3": - clearScr() - stitch() - elif choice == "4": - clearScr() - MSFvenom() - elif choice == "5": - clearScr() - venom() - elif choice == "6": - clearScr() - spycam() - elif choice == "99": - menu() - elif choice == "": - payloads() - else : - menu() - -def mobdroid(): - os.system("echo \"Mob-Droid helps you to generate metasploit payloads in easy way\n without typing long commands and save your time.\n[!]https://github.com/kinghacker0/Mob-Droid \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/kinghacker0/mob-droid") - elif choice == "2": - os.system("cd Mob-Droid;sudo python mob-droid.py") - elif choice == "99": - payloads() - else : - menu() - - -def thefatrat(): - os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy | lolcat") - choice = input("[1]Install [2] Run [3]Update [4]TroubleShoot(if not run) [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git") - os.system("cd TheFatRat && sudo chmod +x setup.sh") - payloads() - elif choice == "2": - os.system("cd TheFatRat && sudo bash setup.sh") - elif choice == "3": - os.system("cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh") - elif choice == "4": - os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools") - time.sleep(2) - payloads() - elif choice == "99": - payloads() - else : - menu() - -def Brutal(): - os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy | lolcat") - print(""" - [!]Requirement - >>Arduino Software ( I used v1.6.7 ) - >>TeensyDuino - >>Linux udev rules - >>Copy and paste the PaensyLib folder inside your Arduino\libraries - [!]Kindly Visit below link for Installation for Arduino - >> https://github.com/Screetsec/Brutal/wiki/Install-Requirements - """) - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/Screetsec/Brutal.git") - os.system("cd Brutal && sudo chmod +x Brutal.sh ") - payloads() - elif choice == "2": - os.system("cd Brutal && sudo bash Brutal.sh") - elif choice == "99": - payloads() - else : - menu() - -def stitch(): - os.system("echo \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >>" ) - if choice == "1": - os.system("sudo git clone https://github.com/nathanlopez/Stitch.git") - os.system("cd Stitch && sudo pip install -r lnx_requirements.txt") - payloads() - elif choice == "2": - os.system("cd Stitch && sudo python main.py") - elif choice == "99": - payloads() - else : - menu() - -def MSFvenom(): - os.system("echo \"MSFvenom Payload Creator (MSFPC) is a wrapper to generate \nmultiple types of payloads, based on users choice.\nThe idea is to be as simple as possible (only requiring one input) \nto produce their payload. [!]https://github.com/g0tmi1k/msfpc \" |boxes -d boy | lolcat ") - choice= input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git") - os.system("cd msfpc;sudo chmod +x msfpc.sh") - payloads() - elif choice == "2": - os.system("cd msfpc;sudo bash msfpc.sh -h -v") - elif choice == "99": - payloads() - elif choice == "": - payloads() - else : - menu() - -def venom(): - os.system("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy| lolcat") - choice =input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git") - os.system("sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh") - os.system("sudo ./venom.sh -u") - payloads() - elif choice == "2": - os.system("cd venom && sudo ./venom.sh") - elif choice == "99": - payloads() - else : - menu() - -def spycam(): - os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy | lolcat") - userchoice = input("[1]Install [2]Run [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone https://github.com/thelinuxchoice/spycam ") - os.system("cd spycam && bash install.sh && chmod +x spycam") - payloads() - elif userchoice == "2": - os.system("cd spycam && ./spycam") - elif userchoice == "99": - payloads() - elif userchoice == "": - payloads() - else : - menu() - -def wifijamming(): - clearScr() - os.system("figlet -f standard -c Wifi Deautheticate | lolcat") - print(""" - [1]WifiJammer-NG - [2] Using Airmon - [99]Back - """) - choice = input("Z4nzu =>> ") - if choice == "1": - clearScr() - wifijammingng() - elif choice == "2": - clearScr() - airmon() - elif choice == "99": - menu() - else : - menu() - -def wifijammingng(): - os.system("echo \"Continuously jam all wifi clients and access points within range.\n\t [!]https://github.com/MisterBianco/wifijammer-ng \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/MisterBianco/wifijammer-ng.git") - os.system("cd wifijammer-ng;sudo pip3 install -r requirements.txt") - elif choice == "2": - os.system("echo \"python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]\"| boxes | lolcat") - os.system("cd wifijammer-ng;sudo python3 wifijammer.py") - elif choice == "99": - wifijamming() - else : - menu() - - -def airmon(): - print(Logo) - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - print("In Working") - time.sleep(5) - menu() - elif userchoice == "2": print(""" - ########################################################################### - # [!] Follow Below steps for Jamming [!] # - # [1]iwconfig # - # [2]airmon-ng # - # [3]airmon-ng start InterfaceName # - # [4]airodump-ng InterfaceName # - # [5]airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName # - # [6]aireply-ng -0 0 -a [mac address] InterfaceName # - # [+]After Complete monitor mode return your interface in normal mode # - # [7]airmon-ng stop InterfaceName # - ########################################################################### + [1] Anonmously Surf + [2] Multitor + [99] Back """) - os.system("sudo airmon-ng") - elif userchoice == "99": - wifijamming() - elif userchoice == "": - wifijamming() - else : - menu() -def steganography(): - clearScr() - os.system("figlet -f standard -c SteganoGraphy | lolcat") - print(""" - [1] SteganoHide - [2] StegnoCracker - [3] WhiteSpace - [99]Back - """) - choice = input("Z4nz =>> ") - if choice == "1": - steganohide() - elif choice == "2": - clearScr() - stegnocracker() - elif choice == "3": - clearScr() - whitespace() - elif choice == "99": - menu() - else : - menu() + functions_anonsurf = { + '1':self.ansurf, + '2':self.multitor, + '99':self.menu + } -def steganohide(): - choice = input("[1]Install [2]Run [99] >> ") - if choice == "1": - os.system("sudo apt-get install steghide -y ") - steganography() - elif choice == "2": - choice1=input("[1]Hide [2]Extract >> ") - if choice1 =="1": - filehide=input("Enter Filename you want to Embed(1.txt) >> ") - filetobehide=input("Enter Cover Filename(test.jpeg) >> ") - os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide)) - elif choice1 =="2": - fromfile=input("Enter Filename From Extract Data >> ") - os.system("steghide extract -sf {0}".format(fromfile)) - elif choice == "99": - steganography() - else : - menu() + choice = input("Z4nzu =>> ") + self.check_input(choice, self.anonsurf, functions_anonsurf.keys()) -def stegnocracker(): - os.system("echo \"SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy| lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall") - steganography() - elif choice =="2": - file1=input("Enter Filename :- ") - passfile=input("Enter Wordlist Filename :- ") - os.system("stegcracker {0} {1} ".format(file1,passfile)) - elif choice == "99": - steganography() - else : - menu() + functions_anonsurf[choice]() -def whitespace(): - os.system("echo \"Use whitespace and unicode chars for steganography \n\t [!]https://github.com/beardog108/snow10 \"|boxes -d boy | lolcat") - choice =input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/beardog108/snow10.git ") - os.system("sudo chmod -R 755 snow10") - steganography() - elif choice == "2": - os.system("cd snow10 && firefox index.html") - elif choice == "99": - steganography() - else : - menu() + def ansurf(self): + self.clear_scr() + os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo change Ip. \" |boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [3]Stop [99]Main Menu >> ") -def sqltool(): - clearScr() - os.system("figlet -f standard -c Sql Tools | lolcat") - print(""" - [1] Sqlmap tool - [2] NoSqlMap - [3] Damn Small SQLi Scanner - [4] Explo - [5] Blisqy - Exploit Time-based blind-SQL injection - [6] Leviathan - Wide Range Mass Audit Toolkit - [7] SQLScan - [99]Back - """) - choice =input("\033[96m Z4nzu =>> ") - if choice == "1": - clearScr() - sqlmap() - elif choice == "2": - clearScr() - nosqlmap() - elif choice == "3": - clearScr() - sqliscanner() - elif choice == "4": - clearScr() - explo() - elif choice == "5": - clearScr() - blisqy() - elif choice == "6": - clearScr() - leviathan() - elif choice == "7": - clearScr() - sqlscan() - elif choice == "99": - menu() - else : - menu() + self.check_input(choice, self.ansurf, ['1', '2', '3', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git") + os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf") + self.ansurf() -def leviathan(): - os.system("echo \"Leviathan is a mass audit toolkit which has wide range service discovery,\nbrute force, SQL injection detection and running custom exploit capabilities. \n [*]It Requires API Keys \n More Usage [!]https://github.com/utkusen/leviathan/wiki \"|boxes -d boy | lolcat ") - choice = input("[1]Install [2]Run [99]BAck >> ") - if choice == "1": - os.system("git clone https://github.com/leviathan-framework/leviathan.git") - os.system("cd leviathan;sudo pip install -r requirements.txt") - sqltool() - elif choice == "2": - os.system("cd leviathan;python leviathan.py") - elif choice == "99": - sqltool() - else : - menu() + if choice == '2': + os.system("sudo anonsurf start") + self.ansurf() -def sqlscan(): - os.system("echo \"sqlscan is quick web scanner for find an sql inject point. not for educational, this is for hacking. \n [!]https://github.com/Cvar1984/sqlscan \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo apt install php php-bz2 php-curl php-mbstring curl") - os.system("sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan") - os.system("chmod +x /usr/local/bin/sqlscan") - sqltool() - elif choice == "2": - os.system("sudo sqlscan") - elif choice == "99": - sqltool() - else : - menu() + if choice == '3': + os.system("sudo anonsurf stop") + self.ansurf() + if choice == "99": + self.menu() -def blisqy(): - os.system("echo \"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection \n on HTTP Headers and also exploitation of the same vulnerability.\n For Usage >> [!]https://github.com/JohnTroony/Blisqy \"|boxes -d boy | lolcat") - choice =input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/JohnTroony/Blisqy.git ") - sqltool() - elif choice == "99": - sqltool() - else : - menu() + def multitor(self): + self.clear_scr() + os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") -def explo(): - os.system("echo \"explo is a simple tool to describe web security issues in a human and machine readable format.\n Usage :- \n [1]explo [--verbose|-v] testcase.yaml \n [2]explo [--verbose|-v] examples/*.yaml \n[*]https://github.com/dtag-dev-sec/explo \"|boxes -d boy | lolcat") - choice =input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/dtag-dev-sec/explo ") - os.system("cd explo ;sudo python setup.py install") - sqltool() - elif choice == "99": - sqltool() - else : - menu() + self.check_input(choice, self.multitor, ['1', '2', '99']) -def sqliscanner(): - os.system("echo \"Damn Small SQLi Scanner (DSSS) is a fully functional SQL injection\nvulnerability scanner also supporting GET and POST parameters.\n[*]python3 dsss.py -h[help] | -u[URL] \n\tMore Info [!]https://github.com/stamparm/DSSS \"|boxes -d boy | lolcat") - choice =input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/stamparm/DSSS.git") - sqltool() - elif choice == "99": - sqltool() - else : - menu() + if choice == "1": + os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git") + self.multitor() + if choice == "2": + os.system("cd multitor && bash multitor.sh") + self.multitor() -def sqlmap(): - os.system("echo \"sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers \n [!]python sqlmap.py -u [] --batch --banner \n More Usage [!]https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy | lolcat") - userchoice = input("[1]Install [99]Back >> ") - if userchoice == "1": - os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev") - print("Downloaded Successfully..!!") - sqltool() - elif userchoice == "99": - sqltool() - else : - menu() + if choice == "99": + self.anonsurf() -def nosqlmap(): - os.system("echo \"NoSQLMap is an open source Python tool designed to \n audit for as well as automate injection attacks and exploit.\n \033[91m [*]Please Install MongoDB \n More Info[!]https://github.com/codingo/NoSQLMap \"|boxes -d boy | lolcat") - choice =input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/codingo/NoSQLMap.git") - os.system("sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install ") - sqltool() - elif choice == "2": - os.system("python NoSQLMap") - elif choice =="99": - sqltool() - else : - menu() + def info(self): + self.clear_scr() + os.system("figlet -f standard -c Information Gathering Tools | lolcat") -def others(): - clearScr() - print(Logo + """ - [1] SocialMedia Attack - [2] Android Hack - [3] HatCloud(Bypass CloudFlare for IP) - [4] IDN Homograph Attack Tools - [5] Email Verifier - [6] Hash Cracking Tools - [99]Main Menu - """) - choice = input("Z4nzu =>>") - if choice == "1": - clearScr() - socialattack() - elif choice == "2": - clearScr() - androidhack() - elif choice == "3": - clearScr() - hatcloud() - elif choice == "4": - clearScr() - homograph() - elif choice == "5": - clearScr() - emailverify() - elif choice == "6": - clearScr() - hashcracktool() - elif choice == "99": - menu() - elif choice == "": - others() - else : - menu() - -def showme(): - print(""" - - [*] This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. - It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation - leak This database makes finding passwords faster and easier than ever before. + print(""" + [1] Nmap + [2] Dracnmap + [3] Port Scanning + [4] Host To IP + [5] Xerosploit + [6] RED HAWK (All In One Scanning) + [7] ReconSpider(For All Scaning) + [8] IsItDown (Check Website Down/Up) + [9] Infoga - Email OSINT + [10] ReconDog + [11] Striker + [12] SecretFinder (like API & etc) + [13] Find Info Using Shodan + [14] Port Scanner + [15] Breacher + [99] Back To Main Menu """) - userchoice = input("[1]Install [2]Run [99]Back >>") - if userchoice == "1": - os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git") - os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ") - passwd() - elif userchoice == "2": - os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py") - elif userchoice == "99": - passwd() - else : - menu() -def hatcloud(): - os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/HatBashBR/HatCloud.git") - others() - elif choice == "2": - tsite=input("Enter Site >>") - os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite)) - elif choice =="99": - others() - else : - others() + functions_info = { + '1':self.nmap, + '2':self.dracnmap, + '3':self.ports, + '4':self.h2ip, + '5':self.xerosploit, + '6':self.redhawk, + '7':self.reconspider, + '8':self.isitdown, + '9':self.infogaemail, + '10':self.recondog, + '11':self.striker, + '12':self.secretfinder, + '13':self.shodantool, + '14':self.portscanner, + '15':self.breacher, + '99':self.menu + } -def emailverify(): - clearScr() - os.system("figlet -f standard -c Email Verify tools | lolcat") - print(""" - [1] KnockMail - [99] Back - """) - choice =input("Z4nzu >>") - if choice == "1": - clearScr() - knockmail() - elif choice == "99": - others() - else : - others() + choice = input("Z4nzu =>> ") + self.check_input(choice, self.info, functions_info.keys()) -def knockmail(): - os.system("echo \"KnockMail Tool Verify If Email Exists [!]https://github.com/4w4k3/KnockMail \"|boxes -d boy | lolcat") - choice = input("[1]Install [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/4w4k3/KnockMail.git") - os.system("cd KnockMail;sudo pip install -r requeriments.txt") - emailverify() - elif choice == "2": - os.system("cd KnockMail;python knock.py") - elif choice == "99": - emailverify() - else : - menu() + functions_info[choice]() + def nmap(self): + self.clear_scr() + choice = input("[1]Install [99]Back >> ") + self.check_input(choice, self.nmap, ['1', '99']) -def homograph(): - clearScr() - os.system("figlet -f standard -c IDN Homograph Attack tools | lolcat") - print(""" - [1] EvilURL - [99] Back - """) - choice =input("Z4nzu >>") - if choice == "1": - clearScr() - evilurl() - elif choice == "99": - others() - else : - others() + if choice == "1": + os.system("sudo git clone https://github.com/nmap/nmap.git") + os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install") + self.nmap() -def evilurl(): - os.system("echo \"Generate unicode evil domains for IDN Homograph Attack and detect them. \n [!]https://github.com/UndeadSec/EvilURL \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/UndeadSec/EvilURL.git") - homograph() - elif choice == "2": - os.system("cd EvilURL;python3 evilurl.py") - elif choice == "99": - homograph() - else : - menu() + if choice == "99": + self.info() -def hashcracktool(): - clearScr() - os.system("figlet -f standard -c Hash Cracking Tools | lolcat") - print(""" - [1] Hash Buster - [99]Back - """) - choice = input("Z4nzu >> ") - if choice == "1": - clearScr() - hashbuster() - elif choice == "99": - others() - elif choice == "": - others() - else : - menu() + def dracnmap(self): + self.clear_scr() + os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help \n [!]https://github.com/Screetsec/Dracnmap \" | boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") -def hashbuster(): - os.system("echo \"Features : \n Automatic hash type identification \n Supports MD5, SHA1, SHA256, SHA384, SHA512 \n [!]https://github.com/s0md3v/Hash-Buster \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/s0md3v/Hash-Buster.git") - os.system("cd Hash-Buster;make install") - time.sleep(2) - hashcracktool() - elif choice == "2": - os.system("buster -h") - elif choice == "99": - hashcracktool() - else : - menu() + self.check_input(choice, self.dracnmap, ['1', '99']) + if choice == "1": + os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ") + os.system("cd Dracnmap && chmod +x Dracnmap.sh") + self.dracnmap() -def Ddos(): - clearScr() - os.system("figlet -f standard -c DDOS Attack Tools | lolcat") - print(""" - [1]SlowLoris - [2]aSYNcrone | Multifunction SYN Flood DDoS Weapon - [3]UFOnet - [4]GoldenEye - [99]Back - """) - choice =input("Z4nzu >> ") - if choice == "1": - clearScr() - slowloris() - elif choice == "2": - clearScr() - asyncrone() - elif choice == "3": - clearScr() - ufonet() - elif choice == "4": - clearScr() - goldeneye() - elif choice == "99": - menu() - else : - print("Invalid ...") - menu() + if choice == "99": + self.info() -def slowloris(): - os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat") - choice = input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo pip install slowloris") - Ddos() - elif choice == "2": - ts=input("Enter Target Site :-") - os.system("slowloris %s"%ts) - elif choice == "99": - Ddos() - else : - menu() + def ports(self): + self.clear_scr() + target = input('Select a Target IP: ') + os.system(f"sudo nmap -O -Pn {target}") + input('\nPress Enter to back...') + self.info() -def asyncrone(): - os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat") - choice = input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/fatih4842/aSYNcrone.git") - os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread") - Ddos() - elif choice == "2": - sport=input("Enter Source Port >> ") - tip=input("Enter Target IP >> ") - tport=input("Enter Target port >> ") - os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport)) - elif choice == "99": - Ddos() - else : - menu() + def h2ip(self): + self.clear_scr() + host = input("Enter host name (www.google.com):- ") + ips = socket.gethostbyname(host) + print(ips) + input('\nPress Enter to back...') + self.info() + + def xerosploit(self): + self.clear_scr() + os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") -def ufonet(): - os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat") - choice = input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/epsylon/ufonet.git") - os.system("cd ufonet;sudo python setup.py install") - Ddos() - elif choice == "2": - os.system("sudo ./ufonet --gui") - elif choice == "99": - Ddos() - else : - menu() - -def goldeneye(): - os.system("echo \"GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\nGoldenEye is a HTTP DoS Test Tool. \n\t [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat") - choice = input("[1]install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye") - Ddos() - elif choice == "2": - os.system("cd GoldenEye ;sudo ./goldeneye.py") - print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py [OPTIONS] ") - elif choice == "99": - Ddos() - else : - menu() + self.check_input(choice, self.xerosploit, ['1', '2', '99']) + if choice == "1": + os.system("git clone https://github.com/LionSec/xerosploit") + os.system("cd xerosploit && sudo python install.py") + self.xerosploit() -def xsstools(): - clearScr() - os.system("figlet -f standard -c XSS Attack Tools | lolcat") - print(""" - [1] DalFox(Finder of XSS) - [2] XSS Payload Generator - [3] Extended XSS Searcher and Finder - [4] XSS-Freak - [5] XSpear - [6] XSSCon - [7] XanXSS - [8] Advanced XSS Detection Suite - [99]BAck - """) - choice = input("Z4nzu >> ") - if choice == "1": - clearScr() - dalfox() - elif choice =="2": - clearScr() - xsspayload() - elif choice == "99": - menu() - elif choice == "3": - clearScr() - xssfinder() - elif choice == "4": - clearScr() - xssfreak() - elif choice == "5": - clearScr() - xspear() - elif choice == "6": - clearScr() - xsscon() - elif choice == "7": - clearScr() - xanxss() - elif choice == "8": - clearScr() - XSStrike() - elif choice == "": - menu() - else : - menu() + if choice == "2": + os.system("sudo xerosploit") + self.xerosploit() -def XSStrike(): - os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat") - xc=input("[1]Install [99]Back >>") - if xc == "1": - os.system("sudo rm -rf XSStrike") - os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt") - xsstools() - elif xc == "99": - xsstools() - else : - xsstools() + if choice == "99": + self.info() -def dalfox(): - os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("sudo apt-get install golang") - os.system("sudo git clone https://github.com/hahwul/dalfox ") - os.system("cd dalfox;go install") - xsstools() - elif choice == "2": - os.system("~/go/bin/dalfox") - print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ") - elif choice =="99": - xsstools() - else : - others() + def redhawk(self): + self.clear_scr() + os.system("echo \"All in one tool for Information Gathering and Vulnerability Scanning. \n [!]https://github.com/Tuhinshubhra/RED_HAWK \n\n [!]Please Use command [FIX] After Running Tool first time \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") -def xsspayload(): - os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/capture0x/XSS-LOADER.git") - os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt") - xsstools() - elif choice == "2": - os.system("cd XSS-LOADER;sudo python3 payloader.py") - elif choice =="99": - xsstools() - else : - others() + self.check_input(choice, self.redhawk, ['1', '2', '99']) -def xssfinder(): - os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git glone https://github.com/Damian89/extended-xss-search.git") - print("""\033[96m - Follow This Steps After Installation :- - \033[31m [*]Go To extended-xss-search directory, - and Rename the example.app-settings.conf to app-settings.conf + if choice == "1": + os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK") + self.redhawk() + + if choice == "2": + os.system("cd RED_HAWK;php rhawk.php") + self.redhawk() + + if choice == "99": + self.info() + + def reconspider(self): + self.clear_scr() + os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\n:~python3 reconspider.py \n\t [!]https://github.com/bhavsec/reconspider \" | boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.reconspider, ['1', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/bhavsec/reconspider.git") + os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install") + self.reconspider() + + # elif choice == "2": + # os.system("cd reconspider && python3 reconspider.py") + + if choice == "99": + self.info() + + def isitdown(self): + self.clear_scr() + os.system("echo \"Check Website Is Online or Not \"|boxes -d boy | lolcat") + choice = input("[1]Open [99]Back >> ") + + self.check_input(choice, self.isitdown, ['1', '99']) + + if choice == "1": + webbrowser.open_new_tab("https://www.isitdownrightnow.com/") + self.isitdown() + + if choice == "99": + self.info() + + def infogaemail(self): + self.clear_scr() + os.system("echo \"Infoga is a tool gathering email accounts informations\n(ip, hostname, country,...) from different public source \n[!]https://github.com/m4ll0k/Infoga \"| boxes -d boy |lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.infogaemail, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/m4ll0k/Infoga.git") + os.system("cd infoga;sudo python setup.py install") + self.infogaemail() + + if choice == "2": + os.system("cd infoga;python infoga.py") + self.infogaemail() + + if choice == "99": + self.info() + + def recondog(self): + self.clear_scr() + os.system("echo \"ReconDog Information Gathering Suite \n[!]https://github.com/s0md3v/ReconDog \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.recondog, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/s0md3v/ReconDog.git ") + self.recondog() + + if choice == "2": + os.system("cd ReconDog;sudo python dog") + self.recondog() + + if choice == "99": + self.info() + + def striker(self): + self.clear_scr() + os.system("echo \"Recon & Vulnerability Scanning Suite [!]https://github.com/s0md3v/Striker \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.striker, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/s0md3v/Striker.git") + os.system("cd Striker && pip3 install -r requirements.txt") + self.striker() + + if choice == "2": + site = input("Enter Site Name (example.com) >> ") + os.system(f"cd Striker && sudo python3 striker.py {site}") + self.striker() + + if choice == "99": + self.info() + + def secretfinder(self): + self.clear_scr() + os.system("echo \"SecretFinder - A python script for find sensitive data \nlike apikeys, accesstoken, authorizations, jwt,..etc \n and search anything on javascript files.\n\n Usage: python SecretFinder.py -h \n\t [*]https://github.com/m4ll0k/SecretFinder \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.secretfinder, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/m4ll0k/SecretFinder.git secretfinder") + os.system("cd secretfinder; sudo pip3 install -r requirements.txt") + self.secretfinder() + + if choice == "99": + self.info() + + def shodantool(self): + self.clear_scr() + os.system("echo \"Get ports,vulnerabilities,informations,banners,..etc \n for any IP with Shodan (no apikey! no rate limit!)\n[X]Don't use this tool because your ip will be blocked by Shodan![X] \n\t [!]https://github.com/m4ll0k/Shodanfy.py \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.shodantool, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/m4ll0k/Shodanfy.py.git") + self.shodantool() + + if choice == "99": + self.info() + + def portscanner(self): + self.clear_scr() + os.system("echo \"rang3r is a python script which scans in multi thread\n all alive hosts within your range that you specify.\n\t [!]https://github.com/floriankunushevci/rang3r \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.portscanner, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/floriankunushevci/rang3r;sudo pip install termcolor") + self.portscanner() + + if choice == "2": + ip = input("Enter Ip >> ") + os.system(f"cd rang3r;sudo python rang3r.py --ip {ip}") + self.portscanner() + + if choice == "99": + self.info() + + def breacher(self): + self.clear_scr() + os.system("echo \"An advanced multithreaded admin panel finder written in python.\n Usage: python breacher -u example.com \n\t [!]https://github.com/s0md3v/Breacher \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.breacher, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/s0md3v/Breacher.git") + self.breacher() + + if choice == "99": + self.info() + + def passwd(self): + self.clear_scr() + os.system("figlet -f standard -c Wordlist Generator | lolcat") + + print(""" + [1] Cupp + [2] WordlistCreator + [3] Goblin WordGenerator + [4] Credential reuse attacks + [5] Password list((1.4 Billion Clear Text Password)) + [99] Back To Main Menu """) - elif choice == "2": + + functions_passwd = { + '1':self.cupp, + '2':self.wlcreator, + '3':self.goblinword, + '4':self.credentialattack, + '5':self.showme, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.passwd, functions_passwd.keys()) + + functions_passwd[choice]() + + def cupp(self): + self.clear_scr() + os.system("echo \"Common User Password Generator..!!\"| boxes -d boy | lolcat ") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.cupp, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/Mebus/cupp.git") + self.cupp() + + # if choice == "2": + # os.system("cd cupp && ./cupp.py -h") + + if choice == "99": + self.passwd() + + def wlcreator(self): + self.clear_scr() + os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.wlcreator, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Z4nzu/wlcreator") + self.wlcreator() + + if choice == "2": + os.system("cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5") + self.wlcreator() + + if choice == "99": + self.passwd() + + def goblinword(self): + self.clear_scr() + os.system("echo \" GoblinWordGenerator \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.goblinword, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git") + self.goblinword() + + if choice == "2": + os.system("cd GoblinWordGenerator && python3 goblin.py") + self.goblinword() + + if choice == "99": + self.passwd() + + def credentialattack(self): + self.clear_scr() + os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.credentialattack, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git") + os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt") + self.credentialattack() + + if choice == "2": + os.system("cd Cr3dOv3r && sudo python3 Cr3d0v3r.py -h") + self.credentialattack() + + if choice == "99": + self.passwd() + + def showme(self): + self.clear_scr() + print(""" + [*] This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. + It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation + leak This database makes finding passwords faster and easier than ever before. + """) + + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.showme, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git") + os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ") + self.showme() + + if choice == "2": + os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py") + self.showme() + + if choice == "99": + self.passwd() + + def wire(self): + self.clear_scr() + os.system("figlet -f standard -c Wireless Attack Tools | lolcat") + + print(""" + [1] WiFi-Pumpkin + [2] pixiewps + [3] Bluetooth Honeypot GUI Framework + [4] Fluxion + [5] Wifiphisher + [6] Wifite + [7] EvilTwin + [8] Howmanypeople + [99] Back To The Main Menu """) + + functions_wire = { + '1':self.wifipumkin, + '2':self.pixiewps, + '3':self.bluepot, + '4':self.fluxion, + '5':self.wifiphisher, + '6':self.wifite, + '7':self.eviltwin, + '8':self.howmanypeople, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.wire, functions_wire.keys()) + + functions_wire[choice]() + + def wifipumkin(self): + self.clear_scr() + os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.wifipumkin, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt install libssl-dev libffi-dev build-essential") + os.system("sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git") + os.system("chmod -R 755 wifipumpkin3 && cd wifipumpkin3") + os.system("sudo apt install python3-pyqt5 ") + os.system("sudo python3 setup.py install") + self.wifipumkin() + + if choice == "2": + os.system("sudo wifipumpkin3") + self.wifipumkin() + + if choice == "99": + self.wire() + + def pixiewps(self): + self.clear_scr() + os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.pixiewps, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential") + os.system("cd pixiewps*/ && make ") + os.system("cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh") + self.pixiewps() + + if choice == "2": + os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy") + print("You Have To Run Manually By USing >>pixiewps -h ") + self.pixiewps() + + if choice == "99": + self.wire() + + def bluepot(self): + self.clear_scr() + os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.bluepot, ['1', '2', '99']) + + if choice == "1": + os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar") + self.bluepot() + + if choice == "2": + os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar") + self.bluepot() + + if choice == "99": + self.wire() + + def fluxion(self): + self.clear_scr() + os.system("echo \"Fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.fluxion, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/thehackingsage/Fluxion.git") + os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh") + os.system("cd .. ; sudo chmod +x fluxion.sh") + self.fluxion() + + if choice == "2": + os.system("cd Fluxion;sudo bash fluxion.sh") + self.fluxion() + + if choice == "99": + self.wire() + + def wifiphisher(self): + self.clear_scr() + print(""" + Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. + Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing + targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the + connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the + victim stations with malware..\n + For More Details Visit >> https://github.com/wifiphisher/wifiphisher + """) + + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.wifiphisher, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/wifiphisher/wifiphisher.git") + os.system("cd wifiphisher && sudo python3 setup.py install") + self.wifiphisher() + + if choice == "2": + os.system("cd wifiphisher && sudo wifiphisher") + self.wifiphisher() + + if choice == "99": + self.wire() + + def wifite(self): + self.clear_scr() + os.system("echo \"[!]https://github.com/derv82/wifite2 \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.wifite, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/derv82/wifite2.git") + os.system("cd wifite2 && sudo python3 setup.py install ; sudo pip3 install -r requirements.txt") + self.wifite() + + if choice == "2": + os.system("cd wifite2 && sudo wifite") + self.wifite() + + if choice == "99": + self.wire() + + def eviltwin(self): + self.clear_scr() + os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.eviltwin, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Z4nzu/fakeap") + self.eviltwin() + + if choice == "2": + os.system("cd fakeap && sudo bash fakeap.sh") + self.eviltwin() + + if choice == "99": + self.wire() + + def howmanypeople(self): + self.clear_scr() + os.system("echo \"Count the number of people around you by monitoring wifi signals.\n[@]WIFI ADAPTER REQUIRED* \n[*]It may be illegal to monitor networks for MAC addresses, \nespecially on networks that you do not own. Please check your country's laws\n\t [!]https://github.com/An0nUD4Y/howmanypeoplearearound \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.howmanypeople, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt-get install tshark;sudo pip install howmanypeoplearearound") + self.howmanypeople() + + if choice == "2": + os.system("sudo howmanypeoplearearound") + self.howmanypeople() + + if choice == "99": + self.wire() + + def phishattack(self): + self.clear_scr() + os.system("figlet -f standard -c Phishing Attack Tools | lolcat") + + print(""" + [1] Setoolkit + [2] SocialFish + [3] HiddenEye + [4] Evilginx2 + [5] I-See_You(Get Location using phishing attack) + [6] SayCheese (Grab target's Webcam Shots) + [7] QR Code Jacking + [8] ShellPhish + [99] Back To Main Menu + """) + + functions_phishattack = { + '1':self.setoolkit, + '2':self.socialfish, + '3':self.hiddeneye, + '4':self.evilginx, + '5':self.iseeyou, + '6':self.saycheese, + '7':self.qrjacking, + '8':self.shellphish, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.phishattack, functions_phishattack.keys()) + + functions_phishattack[choice]() + + def setoolkit(self): + self.clear_scr() + os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.setoolkit, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git") + os.system("python social-engineer-toolkit/setup.py") + self.setoolkit() + + if choice == "2": + self.clear_scr() + os.system("sudo setoolkit") + self.setoolkit() + + if choice == "99": + self.phishattack() + + def socialfish(self): + self.clear_scr() + os.system("echo \"Automated Phishing Tool & Information Collector \n\t[!]https://github.com/UndeadSec/SocialFish \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.socialfish, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y") + os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt") + self.socialfish() + + if choice == "2": + os.system("cd SocialFish && sudo python3 SocialFish.py root pass") + self.socialfish() + + if choice == "99": + self.phishattack() + + def hiddeneye(self): + self.clear_scr() + os.system("echo \"Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services \n\t [!]https://github.com/DarkSecDevelopers/HiddenEye \"|boxes -d boy | lolcat ") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.hiddeneye, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye") + os.system("cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok") + self.hiddeneye() + + if choice == "2": + os.system("cd HiddenEye;sudo python3 HiddenEye.py") + self.hiddeneye() + + if choice == "99": + self.phishattack() + + def evilginx(self): + self.clear_scr() + os.system("echo \"evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies,\nwhich in turn allows to bypass 2-factor authentication protection.\n\n\t [+]Make sure you have installed GO of version at least 1.14.0 \n[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t [+]export GOPATH=$HOME/go \n [+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n[+]Then load it with source ~/.profiles.\n [*]https://github.com/An0nUD4Y/evilginx2 \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.evilginx, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2") + os.system("cd $GOPATH/src/github.com/kgretzky/evilginx2;make") + os.system("sudo make install;sudo evilginx") + self.evilginx() + + if choice == "2": + os.system("sudo evilginx") + self.evilginx() + + if choice == "99": + self.phishattack() + + def iseeyou(self): + self.clear_scr() + os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.iseeyou, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git") + os.system("cd I-See-You && sudo chmod u+x ISeeYou.sh") + self.iseeyou() + + if choice == "2": + os.system("cd I-See-You && sudo bash ISeeYou.sh") + self.iseeyou() + + if choice == "99": + self.phishattack() + + def saycheese(self): + self.clear_scr() + os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.saycheese, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/hangetzzu/saycheese") + self.saycheese() + + if choice == "2": + os.system("cd saycheese && sudo bash saycheese.sh") + self.saycheese() + + if choice == "99": + self.phishattack() + + def qrjacking(self): + self.clear_scr() + os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.qrjacking, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/cryptedwolf/ohmyqr && sudo apt-get install scrot") + self.qrjacking() + + if choice == "2": + os.system("cd ohmyqr && sudo bash ohmyqr.sh") + self.qrjacking() + + if choice == "99": + self.phishattack() + + def shellphish(self): + self.clear_scr() + os.system("echo \"Phishing Tool for 18 social media \n [!]https://github.com/An0nUD4Y/shellphish \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.shellphish, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/An0nUD4Y/shellphish") + self.shellphish() + + if choice == "2": + os.system("cd shellphish;sudo bash shellphish.sh") + self.shellphish() + + if choice == "99": + self.phishattack() + + def socialfinder(self): + self.clear_scr() + os.system("figlet -f standard SocialMedia Finder | lolcat") + + print(""" + [1] Find SocialMedia By Facial Recognation System + [2] Find SocialMedia By UserName + [3] Sherlock + [4] SocialScan | Username or Email + [99] Back To Main Menu + """) + + functions_socialfinder = { + '1':self.facialfind, + '2':self.finduser, + '3':self.sherlock, + '4':self.socialscan, + '99':self.menu + } + choice = input("Z4nzu =>> ") + self.check_input(choice, self.socialfinder, functions_socialfinder.keys()) + + functions_socialfinder[choice]() + + def facialfind(self): + self.clear_scr() + os.system("echo \"A Social Media Mapping Tool that correlates profiles\n via facial recognition across different sites. \n\t[!]https://github.com/Greenwolf/social_mapper \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.facialfind, ['1', '2', '99']) + + if choice == "1": + os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade") + os.system("sudo git clone https://github.com/Greenwolf/social_mapper.git") + os.system("cd social_mapper/setup") + os.system("sudo python3 -m pip install --no-cache-dir -r requirements.txt") + os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes | lolcat") + self.facialfind() + + if choice == "2": + os.system("cd social_mapper/setup") + os.system("sudo python social_mapper.py -h") + + print("""\033[95m + You have to set Username and password of your AC Or Any Fack Account + [#]Type in Terminal nano social_mapper.py + """) + + os.system("echo \"python social_mapper.py -f [] -i [] -m fast [] -fb -tw\"| boxes | lolcat") + self.facialfind() + + if choice == "99": + self.socialfinder() + + def finduser(self): + self.clear_scr() + os.system("echo \"Find usernames across over 75 social networks \n [!]https://github.com/xHak9x/finduser \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.finduser, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/xHak9x/finduser.git") + os.system("cd finduser && sudo chmod +x finduser.sh") + self.finduser() + + if choice == "2": + os.system("cd finduser && sudo bash finduser.sh") + self.finduser() + + if choice == "99": + self.socialfinder() + + def sherlock(self): + self.clear_scr() + os.system("echo \"Hunt down social media accounts by username across social networks \n For More Usege \n\t >>python3 sherlock --help \n [!]https://github.com/sherlock-project/sherlock \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.sherlock, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/sherlock-project/sherlock.git") + os.system("cd sherlock ;sudo python3 -m pip install -r requirements.txt") + self.sherlock() + + if choice == "2": + name = input("Enter Username >> ") + os.system(f"cd sherlock ;sudo python3 sherlock {name}") + self.sherlock() + + if choice == "99": + self.socialfinder() + + def socialscan(self): + self.clear_scr() + os.system("echo \"Check email address and username availability on online platforms with 100% accuracy \n\t[*]https://github.com/iojw/socialscan \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.socialscan, ['1', '2', '99']) + + if choice == "1": + os.system("sudo pip install socialscan") + self.socialscan() + + if choice == "2": + name = input("Enter Username or Emailid (if both then please space between email & username) >> ") + os.system(f"sudo socialscan {name}") + self.socialscan() + + if choice == "99": + self.socialfinder() + + def forensic(self): + self.clear_scr() + os.system("figlet -f standard Forensic Tools | lolcat ") + + print(""" + [1] Autopsy + [2] Wireshark + [3] Bulk_extractor + [4] Disk Clone and ISO Image Aquire + [5] Toolsley + [99] Back to Menu + """) + + functions_forensic = { + '1':self.autopsy, + '2':self.wireshark, + '3':self.bulkextractor, + '4':self.guymager, + '5':self.toolsley, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.forensic, functions_forensic.keys()) + + functions_forensic[choice]() + + def autopsy(self): + self.clear_scr() + os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy | lolcat") + choice = input("[1]Run [99]Back >> ") + + self.check_input(choice, self.autopsy, ['1', '99']) + + if choice == "1": + os.system("sudo autopsy") + self.autopsy() + + if choice =="99": + self.forensic() + + def wireshark(self): + self.clear_scr() + os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat") + choice = input("[1]Run [99]Back >> ") + + self.check_input(choice, self.wireshark, ['1', '99']) + + if choice == "1": + os.system("sudo wireshark") + self.wireshark() + + if choice == "99": + self.forensic() + + def bulkextractor(self): + self.clear_scr() + print(""" + [1] GUI Mode (Download required) + [2] CLI Mode + [99] Back + """) + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.bulkextractor, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/simsong/bulk_extractor.git") + os.system("ls src/ && cd .. && cd java_gui && ./BEViewer") + print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer") + print("Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor ") + self.bulkextractor() + + if choice == "2": + os.system("sudo apt-get install bulk_extractor") + print("bulk_extractor and options") + os.system("bulk_extractor") + os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline | lolcat") + self.bulkextractor() + + if choice == "99": + self.forensic() + + def guymager(self): + self.clear_scr() + os.system("echo \"Guymager is a free forensic imager for media acquisition.\n [!]https://guymager.sourceforge.io/ \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.guymager, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt install guymager") + self.guymager() + + if choice == "2": + os.system("sudo guymager") + self.guymager() + + if choice == "99": + self.forensic() + + def toolsley(self): + self.clear_scr() + os.system("echo \" Toolsley got more than ten useful tools for investigation.\n[+]File signature verifier\n[+]File identifier \n[+]Hash & Validate \n[+]Binary inspector \n [+]Encode text \n[+]Data URI generator \n[+]Password generator \" | boxes -d boy | lolcat") + choice = input("[1]Open [99]Back >> ") + + self.check_input(choice, self.toolsley, ['1', '99']) + + if choice == "1": + webbrowser.open_new_tab('https://www.toolsley.com/') + self.toolsley() + + if choice == "99": + self.forensic() + + def postexp(self): + self.clear_scr() + os.system("figlet -f standard post explotations | lolcat") + + print(""" + [1] Vegile - Ghost In The Shell + [2] Chrome Keylogger + [99] Back + """) + + functions_postexp = { + '1':self.vegile, + '2':self.chromekeylogger, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.postexp, functions_postexp.keys()) + + self.clear_scr() + functions_postexp[choice]() + + def vegile(self): + self.clear_scr() + os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.vegile, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Screetsec/Vegile.git") + os.system("cd Vegile && sudo chmod +x Vegile") + self.vegile() + + if choice == "2": + os.system("echo \"You can Use Command: \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment") + os.system("cd Vegile && sudo bash Vegile ") + self.vegile() + + if choice == "99": + self.postexp() + + def chromekeylogger(self): + self.clear_scr() + os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.chromekeylogger, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git") + os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ") + self.chromekeylogger() + + if choice == "2": + os.system("cd HeraKeylogger && sudo python3 hera.py ") + self.chromekeylogger() + + if choice == "99": + self.postexp() + + def routexp(self): + self.clear_scr() + os.system("figlet -f standard Exploit Framework | lolcat ") + + print(""" + [1] RouterSploit + [2] WebSploit + [3] Commix + [4] Web2Attack + [5] Fastssh + [99] Back to menu + """) + + functions_routexp = { + '1':self.routersploit, + '2':self.websploit, + '3':self.commix, + '4':self.web2attack, + '5':self.fastssh, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.routexp, functions_routexp.keys()) + + functions_routexp[choice]() + + def routersploit(self): + self.clear_scr() + os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.routersploit, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://www.github.com/threat9/routersploit") + os.system("cd routersploit && sudo python3 -m pip install -r requirements.txt") + self.routersploit() + + if choice == "2": + os.system("cd routersploit && sudo python3 rsf.py") + self.routersploit() + + if choice == "99": + self.routexp() + + def websploit(self): + self.clear_scr() + os.system("echo \"Websploit is an advanced MITM framework.\n\t [!]https://github.com/The404Hacking/websploit \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.websploit, ['1', '2', '99']) + + if choice == "1": + os.system("https://github.com/The404Hacking/websploit.git") + self.websploit() + + if choice == "2": + os.system("cd websploit;python3 websploit.py") + self.websploit() + + if choice == "99": + self.routexp() + + def commix(self): + self.clear_scr() + os.system("echo \"Automated All-in-One OS command injection and exploitation tool.\nCommix can be used from web developers, penetration testers or even security researchers\n in order to test web-based applications with the view to find bugs,\n errors or vulnerabilities related to command injection attacks.\n Usage: python commix.py [option(s)] \n\n\t[!]https://github.com/commixproject/commix \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.commix, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/commixproject/commix.git commix") + self.commix() + + if choice == "99": + self.routexp() + + def fastssh(self): + self.clear_scr() + os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.fastssh, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Z4nzu/fastssh && cd fastssh && sudo chmod +x fastssh.sh") + os.system("sudo apt-get install -y sshpass netcat") + self.fastssh() + + if choice == "2": + os.system("cd fastssh && sudo bash fastssh.sh --scan") + self.fastssh() + + if choice == "99": + self.routexp() + + def webAttack(self): + self.clear_scr() + os.system("figlet 'Web Attack Tools' -f standard -c | lolcat") + + print(""" + [1] Web2Attack + [2] Skipfish + [3] SubDomain Finder + [4] CheckURL + [5] Blazy(Also Find ClickJacking) + [6] Sub-Domain TakeOver + [99] Back To Menu + """) + + functions_webAttack = { + '1':self.web2attack, + '2':self.skipfish, + '3':self.subdomain, + '4':self.checkurl, + '5':self.blazy, + '6':self.subdomaintakeover, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.webAttack, functions_webAttack.keys()) + + functions_webAttack[choice]() + + def web2attack(self): + self.clear_scr() + os.system("echo \"Web hacking framework with tools, exploits by python \n[!]https://github.com/santatic/web2attack \"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.web2attack, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/santatic/web2attack.git") + self.web2attack() + + if choice == "2": + os.system("cd web2attack && sudo bash w2aconsole") + self.web2attack() + + if choice == "99": + self.webAttack() + + def skipfish(self): + self.clear_scr() + os.system("echo \"Skipfish – Fully automated, active web application security reconnaissance tool \n Usage: skipfish -o [FolderName] targetip/site \n[!]https://tools.kali.org/web-applications/skipfish \"|boxes -d headline | lolcat") + choice = input("[1]Run [99]Back >> ") + + self.check_input(choice, self.skipfish, ['1', '99']) + + if choice == "1": + os.system("sudo skipfish -h") + os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline | lolcat") + self.skipfish() + + if choice == "99": + self.webAttack() + + def subdomain(self): + self.clear_scr() + os.system("echo \"Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT \n Usage:\n\t[1]python sublist3r.py -d example.com \n[2]python sublist3r.py -d example.com -p 80,443\"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.subdomain, ['1', '2', '99']) + + if choice == "1": + os.system("sudo pip install requests argparse dnspython") + os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ") + os.system("cd Sublist3r && sudo pip install -r requirements.txt") + self.subdomain() + + if choice == "2": + os.system("cd Sublist3r && python sublist3r.py -h") + self.subdomain() + + if choice == "99": + self.webAttack() + + def checkurl(self): + self.clear_scr() + os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.checkurl, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/UndeadSec/checkURL.git") + self.checkurl() + + if choice == "2": + os.system("cd checkURL && python3 checkURL.py --help") + self.checkurl() + + if choice == "99": + self.webAttack() + + def blazy(self): + self.clear_scr() + os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.blazy, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/UltimateHackers/Blazy") + os.system("cd Blazy && sudo pip install -r requirements.txt") + self.blazy() + + if choice == "2": + os.system("cd Blazy && sudo python blazy.py") + self.blazy() + + if choice == "99": + self.webAttack() + + def subdomaintakeover(self): + self.clear_scr() + os.system("echo \"Sub-domain takeover vulnerability occur when a sub-domain \n (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..)\nthat has been removed or deleted.\nUsage:python3 takeover.py -d www.domain.com -v \n\t[!]https://github.com/m4ll0k/takeover \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.subdomaintakeover, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/m4ll0k/takeover.git") + os.system("cd takeover;sudo python3 setup.py install") + self.subdomaintakeover() + + if choice == "99": + self.webAttack() + + def payloads(self): + self.clear_scr() + os.system("figlet -f standard -c Payloads | lolcat") + + print(""" + [1] The FatRat* + [2] Brutal + [3] Stitch + [4] MSFvenom Payload Creator + [5] Venom Shellcode Generator + [6] Spycam + [7] Mob-Droid + [99] Back + """) + + functions_payloads = { + '1':self.thefatrat, + '2':self.brutal, + '3':self.stitch, + '4':self.MSFvenom, + '5':self.venom, + '6':self.spycam, + '7':self.mobdroid, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.payloads, functions_payloads.keys()) + + functions_payloads[choice]() + + def thefatrat(self): + self.clear_scr() + os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [3]Update [4]TroubleShoot (if not run) [99]Back >> ") + + self.check_input(choice, self.thefatrat, ['1', '2', '3', '4', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git") + os.system("cd TheFatRat && sudo chmod +x setup.sh") + self.thefatrat() + + if choice == "2": + os.system("cd TheFatRat && sudo bash setup.sh") + self.thefatrat() + + if choice == "3": + os.system("cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh") + self.thefatrat() + + if choice == "4": + os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools") + self.thefatrat() + + if choice == "99": + self.payloads() + + def brutal(self): + self.clear_scr() + os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy | lolcat") + + print(""" + [!]Requirement + >>Arduino Software (I used v1.6.7) + >>TeensyDuino + >>Linux udev rules + >>Copy and paste the PaensyLib folder inside your Arduino\libraries + + [!]Kindly Visit below link for Installation for Arduino + >> https://github.com/Screetsec/Brutal/wiki/Install-Requirements + """) + + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.brutal, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Screetsec/Brutal.git") + os.system("cd Brutal && sudo chmod +x Brutal.sh ") + self.brutal() + + if choice == "2": + os.system("cd Brutal && sudo bash Brutal.sh") + self.brutal() + + if choice == "99": + self.payloads() + + def stitch(self): + self.clear_scr() + os.system("echo \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> " ) + + self.check_input(choice, self.stitch, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/nathanlopez/Stitch.git") + os.system("cd Stitch && sudo pip install -r lnx_requirements.txt") + self.stitch() + + if choice == "2": + os.system("cd Stitch && sudo python main.py") + self.stitch() + + if choice == "99": + self.payloads() + + def msf_venom(self): + self.clear_scr() + os.system("echo \"MSFvenom Payload Creator (MSFPC) is a wrapper to generate \nmultiple types of payloads, based on users choice.\nThe idea is to be as simple as possible (only requiring one input) \nto produce their payload. [!]https://github.com/g0tmi1k/msfpc \" |boxes -d boy | lolcat ") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.MSFvenom, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git") + os.system("cd msfpc;sudo chmod +x msfpc.sh") + self.msf_venom() + + if choice == "2": + os.system("cd msfpc;sudo bash msfpc.sh -h -v") + self.msf_venom() + + if choice == "99": + self.payloads() + + def venom(self): + self.clear_scr() + os.system("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy| lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.venom, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git") + os.system("sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh") + os.system("sudo ./venom.sh -u") + self.venom() + + if choice == "2": + os.system("cd venom && sudo ./venom.sh") + self.venom() + + if choice == "99": + self.payloads() + + def spycam(self): + self.clear_scr() + os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.spycam, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/thelinuxchoice/spycam ") + os.system("cd spycam && bash install.sh && chmod +x spycam") + self.spycam() + + if choice == "2": + os.system("cd spycam && ./spycam") + self.spycam() + + if choice == "99": + self.payloads() + + def mobdroid(self): + self.clear_scr() + os.system("echo \"Mob-Droid helps you to generate metasploit payloads in easy way\n without typing long commands and save your \n[!]https://github.com/kinghacker0/Mob-Droid \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.mobdroid, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/kinghacker0/mob-droid") + self.spycam() + + if choice == "2": + os.system("cd Mob-Droid;sudo python mob-droid.py") + self.mobdroid() + + if choice == "99": + self.payloads() + + def wifijamming(self): + self.clear_scr() + os.system("figlet -f standard -c Wifi Deautheticate | lolcat") + + print(""" + [1] WifiJammer-NG + [2] Using Airmon + [99] Back + """) + + functions_wifijamming = { + '1':self.wifijammingng, + '2':self.airmon, + '3':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.wifijamming, functions_wifijamming.keys()) + + functions_wifijamming[choice]() + + def wifijammingng(self): + self.clear_scr() + os.system("echo \"Continuously jam all wifi clients and access points within range.\n\t [!]https://github.com/MisterBianco/wifijammer-ng \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.wifijammingng, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/MisterBianco/wifijammer-ng.git") + os.system("cd wifijammer-ng;sudo pip3 install -r requirements.txt") + self.wifijammingng() + + if choice == "2": + os.system("echo \"python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]\"| boxes | lolcat") + os.system("cd wifijammer-ng;sudo python3 wifijammer.py") + self.wifijammingng() + + if choice == "99": + self.wifijamming() + + def airmon(self): + self.clear_scr() + print(self.logo) + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.airmon, ['1', '2', '99']) + + if choice == "1": + print("In Working") + sleep(2) + self.airmon() + + if choice == "2": + print(""" + ############################################################################ + # [!] Follow Below steps for Jamming [!] # + # [1] iwconfig # + # [2] airmon-ng # + # [3] airmon-ng start InterfaceName # + # [4] airodump-ng InterfaceName # + # [5] airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName # + # [6] aireplay-ng -0 0 -a [mac address] InterfaceName # + # [+] After Complete monitor mode return your interface in normal mode # + # [7] airmon-ng stop InterfaceName # + ############################################################################ + """) + os.system("sudo airmon-ng") + self.airmon() + + if choice == "99": + self.wifijamming() + + def steganography(self): + self.clear_scr() + os.system("figlet -f standard -c SteganoGraphy | lolcat") + + print(""" + [1] SteganoHide + [2] StegnoCracker + [3] WhiteSpace + [99] Back + """) + + functions_steganography = { + '1':self.steganohide, + '2':self.stegnocracker, + '3':self.whitespace, + '99':self.menu + } + + choice = input("Z4nz =>> ") + self.check_input(choice, self.steganography, functions_steganography.keys()) + + functions_steganography[choice]() + + def steganohide(self): + self.clear_scr() + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.steganohide, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt-get install steghide -y ") + self.steganohide() + + if choice == "2": + choice_run = input("[1]Hide [2]Extract >> ") + + self.check_input(choice_run, self.self.steganohide, ['1', '2', '99']) + + if choice_run == "1": + file_hide = input("Enter Filename you want to Embed (1.txt) >> ") + file_to_be_hide = input("Enter Cover Filename(test.jpeg) >> ") + os.system(f"steghide embed -cf {file_to_be_hide} -ef {file_hide}") + self.steganohide() + + if choice_run == "2": + from_file = input("Enter Filename From Extract Data >> ") + os.system(f"steghide extract -sf {from_file}") + self.steganohide() + + if choice_run == '99': + self.steganohide() + + if choice == "99": + self.steganography() + + def stegnocracker(self): + self.clear_scr() + os.system("echo \"SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy| lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.stegnocracker, ['1', '2', '99']) + + if choice == "1": + os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall") + self.stegnocracker() + + if choice == "2": + filename = input("Enter Filename:- ") + passfile = input("Enter Wordlist Filename:- ") + os.system(f"stegcracker {filename} {passfile}") + self.stegnocracker() + + if choice == "99": + self.steganography() + + def whitespace(self): + self.clear_scr() + os.system("echo \"Use whitespace and unicode chars for steganography \n\t [!]https://github.com/beardog108/snow10 \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.whitespace, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/beardog108/snow10.git ") + os.system("sudo chmod -R 755 snow10") + self.whitespace() + + if choice == "2": + os.system("cd snow10 && firefox index.html") + self.whitespace() + + if choice == "99": + self.steganography() + + def sqltool(self): + self.clear_scr() + os.system("figlet -f standard -c Sql Tools | lolcat") + + print(""" + [1] Sqlmap tool + [2] NoSqlMap + [3] Damn Small SQLi Scanner + [4] Explo + [5] Blisqy - Exploit Time-based blind-SQL injection + [6] Leviathan - Wide Range Mass Audit Toolkit + [7] SQLScan + [99] Back + """) + + functions_sqltool = { + '1':self.sqlmap, + '2':self.nosqlmap, + '3':self.sqliscanner, + '4':self.explo, + '5':self.blisqy, + '6':self.leviathan, + '7':self.sqlscan, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.sqltool, functions_sqltool.keys()) + + functions_sqltool[choice]() + + def sqlmap(self): + self.clear_scr() + os.system("echo \"sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers \n [!]python sqlmap.py -u [] --batch --banner \n More Usage [!]https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.sqlmap, ['1', '99']) + + if choice == "1": + os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev") + print("Downloaded Successfully..!!") + self.sqlmap() + + if choice == "99": + self.sqltool() + + def nosqlmap(self): + self.clear_scr() + os.system("echo \"NoSQLMap is an open source Python tool designed to \n audit for as well as automate injection attacks and exploit.\n \033[91m [*]Please Install MongoDB \n More Info[!]https://github.com/codingo/NoSQLMap \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.nosqlmap, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/codingo/NoSQLMap.git") + os.system("sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install ") + self.nosqlmap() + + if choice == "2": + os.system("python NoSQLMap") + self.nosqlmap() + + if choice == "99": + self.sqltool() + + def sqliscanner(self): + self.clear_scr() + os.system("echo \"Damn Small SQLi Scanner (DSSS) is a fully functional SQL injection\nvulnerability scanner also supporting GET and POST parameters.\n[*]python3 dsss.py -h[help] | -u[URL] \n\tMore Info [!]https://github.com/stamparm/DSSS \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.sqliscanner, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/stamparm/DSSS.git") + self.sqliscanner() + + if choice == "99": + self.sqltool() + + def explo(self): + self.clear_scr() + os.system("echo \"Explo is a simple tool to describe web security issues in a human and machine readable format.\n Usage:- \n [1]explo [--verbose|-v] testcase.yaml \n [2]explo [--verbose|-v] examples/*.yaml \n[*]https://github.com/dtag-dev-sec/explo \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.explo, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/dtag-dev-sec/explo ") + os.system("cd explo ;sudo python setup.py install") + self.explo() + + if choice == "99": + self.sqltool() + + def blisqy(self): + self.clear_scr() + os.system("echo \"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection \n on HTTP Headers and also exploitation of the same vulnerability.\n For Usage >> [!]https://github.com/JohnTroony/Blisqy \"|boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.blisqy, ['1', '99']) + + if choice == "1": + os.system("git clone https://github.com/JohnTroony/Blisqy.git ") + self.blisqy() + + if choice == "99": + self.sqltool() + + def leviathan(self): + self.clear_scr() + os.system("echo \"Leviathan is a mass audit toolkit which has wide range service discovery,\nbrute force, SQL injection detection and running custom exploit capabilities. \n [*]It Requires API Keys \n More Usage [!]https://github.com/utkusen/leviathan/wiki \"|boxes -d boy | lolcat ") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.leviathan, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/leviathan-framework/leviathan.git") + os.system("cd leviathan;sudo pip install -r requirements.txt") + self.leviathan() + + if choice == "2": + os.system("cd leviathan;python leviathan.py") + + if choice == "99": + self.sqltool() + + def sqlscan(self): + self.clear_scr() + os.system("echo \"sqlscan is quick web scanner for find an sql inject point. not for educational, this is for hacking. \n [!]https://github.com/Cvar1984/sqlscan \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.sqlscan, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt install php php-bz2 php-curl php-mbstring curl") + os.system("sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan") + os.system("chmod +x /usr/local/bin/sqlscan") + self.sqlscan() + + if choice == "2": + os.system("sudo sqlscan") + self.sqlscan() + + if choice == "99": + self.sqltool() + + def others(self): + self.clear_scr() + print(self.logo + """ + [1] SocialMedia Attack + [2] Android Hack + [3] HatCloud(Bypass CloudFlare for IP) + [4] IDN Homograph Attack Tools + [5] Email Verifier + [6] Hash Cracking Tools + [99] Main Menu + """) + + functions_others = { + '1':self.social_attack, + '2':self.androidhack, + '3':self.hatcloud, + '4':self.homograph, + '5':self.emailverify, + '6':self.hashcracktool, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.others, functions_others.keys()) + + functions_others[choice]() + + def social_attack(self): + self.clear_scr() + os.system("figlet -f standard SocialMedia Attack | lolcat") + + print(""" + [1] Instagram Attack + [2] AllinOne SocialMedia Attack + [3] Facebook Attack + [4] Application Checker + [99] Back + """) + + functions_social_attack = { + '1':self.instabrute, + '2':self.bruteforce, + '3':self.faceshell, + '4':self.appcheck, + '99':self.others + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.social_attack, functions_social_attack.keys()) + + functions_social_attack[choice]() + + def instabrute(self): + self.clear_scr() + os.system("echo \"Brute force attack against Instagram \n\t [!]https://github.com/chinoogawa/instaBrute \"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.bruteforce, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/chinoogawa/instaBrute.git ") + os.system("cd instaBrute;sudo pip install -r requirements.txt") + self.instabrute() + + if choice == "2": + name = input("Enter Username >> ") + wordlist = input("Enter wordword list >> ") + os.system(f"cd instaBrute;sudo python instaBrute.py -u {name} -d {wordlist}") + self.instabrute() + + if choice == "99": + self.social_attack() + + def bruteforce(self): + self.clear_scr() + os.system("echo \"Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n[!]python3 Brute_Force.py -g -l \n\t[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.bruteforce, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git") + os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize") + self.bruteforce() + + if choice == "2": + os.system("cd Brute_Force;python3 Brute_Force.py -h") + self.bruteforce() + + if choice == "99": + self.social_attack() + + def faceshell(self): + self.clear_scr() + os.system("echo \" Facebook BruteForcer[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.faceshell, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git") + os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize") + self.faceshell() + + if choice == "2": + name = input("Enter Username >> ") + wordlist = input("Enter Wordlist >> ") + os.system(f"cd Brute_Force;python3 Brute_Force.py -f {name} -l {wordlist}") + self.faceshell() + + if choice == "99": + self.social_attack() + + def appcheck(self): + self.clear_scr() + os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.appcheck, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/jakuta-tech/underhanded") + os.system("cd underhanded && sudo chmod +x underhanded.sh") + self.appcheck() + + if choice == "2": + os.system("cd underhanded ; sudo bash underhanded.sh") + self.appcheck() + + if choice == "99": + self.social_attack() + + def androidhack(self): + self.clear_scr() + os.system("figlet -f standard -c Android Hacking Tools | lolcat") + + print(""" + [1] Keydroid + [2] MySMS + [3] Lockphish (Grab target LOCK PIN) + [4] DroidCam (Capture Image) + [5] EvilApp (Hijack Session) + [99] Back + """) + + functions_androidhack = { + '1':self.keydroid, + '2':self.mysms, + '3':self.lock, + '4':self.droidcam, + '5':self.evilapp, + '99':self.others + } + + # elif choice == "3": + # print("Sorry This Tool Not Available") + # sleep(1) + # androidhack() + # # getdroid() + + # elif choice == "4": + # print("Sorry This Tool Not Available") + # sleep(1) + # androidhack() + # # droidfile() + # elif choice == "6": + # self.clear_scr() + # whatshack() + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.androidhack, functions_androidhack.keys()) + + functions_androidhack[choice]() + + def keydroid(self): + self.clear_scr() + os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link:\n [+]https://github.com/F4dl0/keydroid \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.keydroid, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/F4dl0/keydroid") + self.keydroid() + + if choice == "2": + os.system("cd keydroid && bash keydroid.sh") + self.keydroid() + + if choice == "99": + self.androidhack() + + def mysms(self): + self.clear_scr() + os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link:\n\t [+]https://github.com/papusingh2sms/mysms \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.mysms, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/papusingh2sms/mysms") + self.mysms() + + if choice == "2": + os.system("cd mysms && bash mysms.sh") + self.mysms() + + if choice == "99": + self.androidhack() + + def lock(self): + self.clear_scr() + os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.lock, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone git clone https://github.com/JasonJerry/lockphish") + self.lock() + + if choice == "2": + os.system("cd lockphish && bash lockphish.sh") + self.lock() + + if choice == "99": + self.androidhack() + + # def getdroid(self): + # os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy | lolcat") + # choice = input("[1]Install [2]Run [99]Back >> ") + # if choice == "1": + # os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y") + # androidhack() + # elif choice == "2": + # os.system("cd getdroid && bash getdroid.sh") + # elif choice == "99": + # androidhack() + # else: + # menu() + + # def droidfile(self): + # os.system("echo \"Get files from Android directories\"|boxes -d boy | lolcat") + # choice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >> ") + # if choice == "1": + # os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles") + # elif choice == "2": + # os.system("cd droidfiles && bash droidfiles.sh") + # elif choice == "3": + # os.system("apt-get install default-jdk apksigner") + # os.system("apt-get install libc6-dev-i386 lib32z1") + # os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk") + # os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1") + # elif choice == "99": + # androidhack() + # else: + # menu() + + # def whatshack(self): + # os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell | lolcat") + # choice = input("[1]Install [2]Run [99]Back >> ") + # if choice == "1": + # os.system("sudo git clone https://github.com/thelinuxchoice/whatshack") + # sleep(5) + # print("Installing Required Packges..!! It Take More Time ") + # sleep(3) + # os.system("apt-get install openjdk-8-jdk && apt-get install gradle") + # os.system("update-alternatives --list java") + # os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java") + # sleep(2) + # androidhack() + # elif choice == "2": + # os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell") + # os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell") + # os.system("cd whatshack/ && bash whatshack.sh") + # elif choice == "99": + # androidhack() + # elif choice=="": + # androidhack() + # else: + # menu() + + def droidcam(self): + self.clear_scr() + os.system("echo \"Powerful Tool For Grab Front Camera Snap Using A Link \n[+]https://github.com/kinghacker0/WishFish \"| boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.droidcam, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/kinghacker0/WishFish; sudo apt install php wget openssh") + self.droidcam() + + if choice == "2": + os.system("cd wishfish && sudo bash wishfish.sh") + self.droidcam() + + if choice == "99": + self.androidhack() + + def evilapp(self): + self.clear_scr() + os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies.\n [!]https://github.com/crypticterminal/EvilApp \" | boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.evilapp, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/crypticterminal/EvilApp") + self.evilapp() + + if choice == "2": + os.system("cd evilapp && bash evilapp.sh") + self.evilapp() + + if choice == "99": + self.androidhack() + + def hatcloud(self): + self.clear_scr() + os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.hatcloud, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/HatBashBR/HatCloud.git") + self.hatcloud() + + if choice == "2": + site = input("Enter Site >> ") + os.system("cd HatCloud;sudo ruby hatcloud.rb -b {site}") + self.hatcloud() + + if choice == "99": + self.others() + + def homograph(self): + self.clear_scr() + os.system("figlet -f standard -c IDN Homograph Attack tools | lolcat") + + print(""" + [1] EvilURL + [99] Back + """) + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.homograph, ['1', '99']) + + if choice == "1": + self.evilurl() + + if choice == "99": + self.others() + + def evilurl(self): + self.clear_scr() + os.system("echo \"Generate unicode evil domains for IDN Homograph Attack and detect them. \n [!]https://github.com/UndeadSec/EvilURL \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.evilurl, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/UndeadSec/EvilURL.git") + self.evilurl() + + if choice == "2": + os.system("cd EvilURL;python3 evilurl.py") + self.evilurl() + + if choice == "99": + self.homograph() + + def emailverify(self): + self.clear_scr() + os.system("figlet -f standard -c Email Verify tools | lolcat") + + print(""" + [1] KnockMail + [99] Back + """) + + choice = input("Z4nzu =>> ") + + self.check_input(choice, self.emailverify, ['1', '99']) + + if choice == "1": + self.knockmail() + + if choice == "99": + self.others() + + def knockmail(self): + self.clear_scr() + os.system("echo \"KnockMail Tool Verify If Email Exists [!]https://github.com/4w4k3/KnockMail \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.knockmail, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/4w4k3/KnockMail.git") + os.system("cd KnockMail;sudo pip install -r requeriments.txt") + self.knockmail() + + if choice == "2": + os.system("cd KnockMail;python knock.py") + + if choice == "99": + self.emailverify() + + def hashcracktool(self): + self.clear_scr() + os.system("figlet -f standard -c Hash Cracking Tools | lolcat") + + print(""" + [1] Hash Buster + [99] Back + """) + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.hashcracktool, ['1', '99']) + + if choice == "1": + self.hashbuster() + + if choice == "99": + self.others() + + def hashbuster(self): + self.clear_scr() + os.system("echo \"Features: \n Automatic hash type identification \n Supports MD5, SHA1, SHA256, SHA384, SHA512 \n [!]https://github.com/s0md3v/Hash-Buster \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.hashbuster, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/s0md3v/Hash-Buster.git") + os.system("cd Hash-Buster;make install") + self.hashbuster() + + if choice == "2": + os.system("buster -h") + self.hashbuster() + + if choice == "99": + self.hashcracktool() + + def ddos(self): + self.clear_scr() + os.system("figlet -f standard -c DDOS Attack Tools | lolcat") + + print(""" + [1] SlowLoris + [2] Asyncrone | Multifunction SYN Flood DDoS Weapon + [3] UFOnet + [4] GoldenEye + [99] Back + """) + + functions_ddos = { + '1':self.slowloris, + '2':self.asyncrone, + '3':self.ufonet, + '4':self.goldeneye, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.ddos, functions_ddos.keys()) + + functions_ddos[choice]() + + def slowloris(self): + self.clear_scr() + os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.slowloris, ['1', '2', '99']) + + if choice == "1": + os.system("sudo pip install slowloris") + self.slowloris() + + if choice == "2": + target_site = input("Enter Target Site:- ") + os.system(f"slowloris {target_site}") + self.slowloris() + + if choice == "99": + self.ddos() + + def asyncrone(self): + self.clear_scr() + os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.asyncrone, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/fatih4842/aSYNcrone.git") + os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread") + self.asyncrone() + + if choice == "2": + source_port = input("Enter Source Port >> ") + target_ip = input("Enter Target IP >> ") + target_port = input("Enter Target port >> ") + os.system(f"cd aSYNcrone;sudo ./aSYNcrone {source_port} {target_ip} {target_port} 1000") + self.asyncrone() + + if choice == "99": + self.ddos() + + def ufonet(self): + self.clear_scr() + os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.ufonet, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/epsylon/ufonet.git") + os.system("cd ufonet;sudo python setup.py install") + self.ufonet() + + if choice == "2": + os.system("sudo ./ufonet --gui") + self.ufonet() + + if choice == "99": + self.ddos() + + def goldeneye(self): + self.clear_scr() + os.system("echo \"GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\nGoldenEye is a HTTP DoS Test Tool. \n\t [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.goldeneye, ['1', '2', '99']) + + if choice == "1": + os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye") + self.goldeneye() + + if choice == "2": + os.system("cd GoldenEye ;sudo ./goldeneye.py") + print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py [OPTIONS] ") + self.goldeneye() + + if choice == "99": + self.ddos() + + def xsstools(self): + self.clear_scr() + os.system("figlet -f standard -c XSS Attack Tools | lolcat") + + print(""" + [1] DalFox(Finder of XSS) + [2] XSS Payload Generator + [3] Extended XSS Searcher and Finder + [4] XSS-Freak + [5] XSpear + [6] XSSCon + [7] XanXSS + [8] Advanced XSS Detection Suite + [99] Back + """) + + functions_xsstools = { + '1':self.dalfox, + '2':self.xsspayload, + '3':self.xssfinder, + '4':self.xssfreak, + '5':self.xspear, + '6':self.xsscon, + '7':self.xanxss, + '8':self.xss_strike, + '99':self.menu + } + + choice = input("Z4nzu =>> ") + self.check_input(choice, self.xsstools, functions_xsstools.keys()) + + functions_xsstools[choice]() + + def dalfox(self): + self.clear_scr() + os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.dalfox, ['1', '2', '99']) + + if choice == "1": + os.system("sudo apt-get install golang") + os.system("sudo git clone https://github.com/hahwul/dalfox ") + os.system("cd dalfox;go install") + self.dalfox() + + if choice == "2": + os.system("~/go/bin/dalfox") + print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ") + self.dalfox() + + if choice == "99": + self.xsstools() + + def xsspayload(self): + self.clear_scr() + os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.xsspayload, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/capture0x/XSS-LOADER.git") + os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt") + self.xsspayload() + + if choice == "2": + os.system("cd XSS-LOADER;sudo python3 payloader.py") + self.xsspayload() + + if choice == "99": + self.xsstools() + + def xssfinder(self): + self.clear_scr() + os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.xssfinder, ['1', '2', '99']) + + if choice == "1": + os.system("git glone https://github.com/Damian89/extended-xss-search.git") + print("""\033[96m + Follow This Steps After Installation:- + \033[31m [*]Go To extended-xss-search directory, + and Rename the example.app-settings.conf to app-settings.conf + """) + input('\nPress Enter to back...') + self.xssfinder() + + if choice == "2": print("""\033[96m You have To Add Links to scan - \033[31m[!]Go to extended-xss-search + \033[31m[!]Go to extended-xss-search [*]config/urls-to-test.txt [!]python3 extended-xss-search.py + """) + input('\nPress Enter to back...') + self.xssfinder() + + if choice == "99": + self.xsstools() + + def xssfreak(self): + self.clear_scr() + os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.xssfreak), ['1', '2', '99'] + + if choice == "1": + os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git") + os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt") + self.xssfreak() + + if choice == "2": + os.system("cd XSS-Freak;sudo python3 XSS-Freak.py") + self.xssfreak() + + if choice == "99": + self.xsstools() + + def xspear(self): + self.clear_scr() + os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.xspear, ['1', '2', '99']) + + if choice == "1": + os.system("gem install XSpear") + self.xspear() + + if choice == "2": + os.system("XSpear -h") + self.xspear() + + if choice == "99": + self.xsstools() + + def xsscon(self): + self.clear_scr() + os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.xsscon, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/menkrep1337/XSSCon") + os.system("sudo chmod 755 -R XSSCon") + self.xsscon() + + if choice == "2": + website = input("Enter Website >> ") + os.system(f"cd XSSCon;python3 xsscon.py -u {website}") + self.xsscon() + + if choice == "99": + self.xsstools() + + def xanxss(self): + self.clear_scr() + os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat") + choice = input("[1]Install [2]Run [99]Back >> ") + + self.check_input(choice, self.xanxss, ['1', '2', '99']) + + if choice == "1": + os.system("git clone https://github.com/Ekultek/XanXSS.git ") + self.xanxss + + if choice == "2": + os.system("cd XanXSS ;python xanxss.py -h") + print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ") + self.xanxss() + + if choice == "99": + self.xsstools() + + def xss_strike(self): + self.clear_scr() + os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat") + choice = input("[1]Install [99]Back >> ") + + self.check_input(choice, self.xss_strike, ['1', '99']) + + if choice == "1": + os.system("sudo rm -rf XSStrike") + os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt") + self.xss_strike() + + if choice == "99": + self.xsstools() + + def update(self): + self.clear_scr() + print(""" + [1] Update Tool or System + [2] Uninstall HackingTool + [99] Back """) - elif choice =="99": - xsstools() - else : - others() -def xssfreak(): - os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git") - os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt") - xsstools() - elif choice == "2": - os.system("cd XSS-Freak;sudo python3 XSS-Freak.py") - elif choice =="99": - xsstools() - else : - others() + functions_update = { + '1':self.updatesys, + '2':self.uninstall, + '3':self.menu + } -def xspear(): - os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("gem install XSpear") - xsstools() - elif choice == "2": - os.system("XSpear -h") - elif choice =="99": - xsstools() - else : - others() + choice = input("Z4nzu =>> ") + self.check_input(choice, self.update, functions_update.keys()) + + functions_update[choice]() -def xsscon(): - os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/menkrep1337/XSSCon") - os.system("sudo chmod 755 -R XSSCon") - xsstools() - elif choice == "2": - uinput= input("Enter Website >> ") - os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput)) - elif choice =="99": - xsstools() - else : - others() + def updatesys(self): + self.clear_scr() + choice = input("[1]Update System [2]Update Hackingtool [99]Back >> ") -def xanxss(): - os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat") - choice = input("[1]Install [2]Run [99]Back >> ") - if choice == "1": - os.system("git clone https://github.com/Ekultek/XanXSS.git ") - xsstools() - elif choice == "2": - os.system("cd XanXSS ;python xanxss.py -h") - print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ") - elif choice =="99": - xsstools() - else : - others() + self.check_input(choice, self.updatesys, ['1', '2', '99']) + if choice == "1": + os.system("sudo apt update && sudo apt full-upgrade -y") + os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ") + os.system("sudo apt-get install python3-pip") + self.updatesys() -def update(): - print(""" - [1] Update Tool or System - [2] Uninstall HackingTool - [99]Back - """) - choice =input("Z4nzu >> ") - if choice == "1": - updatesys() - elif choice == "2": - uninstall() - elif choice == "99": - menu() - else : - menu() + if choice == "2": + os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;mkdir hackingtool;cd hackingtool;git clone https://github.com/Z4nzu/hackingtool.git;cd hackingtool;sudo chmod +x install.sh;./install.sh") + self.updatesys() -def updatesys(): - choice = input("[1]Update System [2]Update Hackingtool [99]Back >> ") - if choice == "1": - os.system("sudo apt update && sudo apt full-upgrade -y") - os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ") - os.system("sudo apt-get install python3-pip") - elif choice == "2": - os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;mkdir hackingtool;cd hackingtool;git clone https://github.com/Z4nzu/hackingtool.git;cd hackingtool;sudo chmod +x install.sh;./install.sh") - elif choice == "99": - menu() - else : - menu() + if choice == "99": + self.menu() -def uninstall(): - choice = input("[1]Uninstall [99]Back >> ") - if choice == "1": - print("hackingtool started to uninstall..") - time.sleep(2) - os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;") - time.sleep(3) - print("Hackingtool Successfully Uninstall..") - time.sleep(1) - print("Happy Hacking..!!") - elif choice == "99": - update() - else : - print("Wrong Input...!!") - uninstall() + def uninstall(self): + self.clear_scr() + choice = input("[1]Uninstall [99]Back >> ") -def clearScr(): - if system() == 'Linux': - os.system('clear') - if system() == 'Windows': - os.system('cls') + self.check_input(choice, self.uninstall, ['1', '99']) + + if choice == "1": + print("hackingtool started to uninstall..\n") + sleep(1) + os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;") + print("\nHackingtool Successfully Uninstall..") + print("Happy Hacking..!!") + sleep(1) + self.uninstall() + + if choice == "99": + self.update() if __name__ == "__main__": + run = Main() try: if system() == 'Linux': - fpath="/home/hackingtoolpath.txt" - if os.path.isfile(fpath): - file1 = open(fpath,"r") - f=file1.readline() - if os.path.exists("{0}".format(f)): - os.chdir(f) - file1.close() - menu() - else : - os.mkdir("{0}".format(f)) - os.chdir("{0}".format(f)) - file1.close() - menu() - else : - clearScr() - print(Logo) + fpath = "/home/hackingtoolpath.txt" + try: + with open(fpath, 'r') as f: + archive = f.readline() + + try: + os.chdir(archive) + run.menu() + + # If the directory does not exist + except FileNotFoundError: + os.mkdir(archive) + os.chdir(archive) + run.menu() + + except FileNotFoundError: + os.system('clear') + run.menu() + print(""" - [@] Set Path (All your tools will be install in that directory) - [1]Manual - [2]Default + [@] Set Path (All your tools will be install in that directory) + [1] Manual + [2] Default """) - choice = input("Z4nzu >> ") + + choice = input("Z4nzu =>> ") + if choice == "1": - inpath=input("Enter Path(with Directory Name) >> ") - file =open(fpath,"w") - file.write(inpath) - file.close() + inpath = input("Enter Path (with Directory Name) >> ") + with open(fpath, "w") as f: + f.write(inpath) + print("Successfully Path Set...!!") - elif choice == "2": - autopath="/home/hackingtool/" - file =open(fpath,"w") - file.write(autopath) - file.close() - time.sleep(1) - print("Your Default Path Is :-"+autopath) - time.sleep(3) - else : + + if choice == "2": + autopath = "/home/hackingtool/" + with open(fpath, "w") as f: + f.write(autopath) + + print(f"Your Default Path Is:- {autopath}") + sleep(3) + + else: print("Try Again..!!") - else : - fpath="/home/hackingtoolpath.txt" - if os.path.isfile(fpath): - file1 = open(fpath,"r") - f=file1.readline() - if os.path.exists("{0}".format(f)): - os.chdir(f) - file1.close() - menu() - else : - os.mkdir("{0}".format(f)) - os.chdir("{0}".format(f)) - file1.close() - menu() - else : - clearScr() - print(Logo) - print(""" - [@] Set Path (All your tools will be install in that directory) - [1]Manual - [2]Default + + # If not Linux and probably Windows + else: + fpath = "/home/hackingtoolpath.txt" + try: + with open(fpath, "r") as f: + archive = f.readline() + + try: + os.chdir(archive) + run.menu() + + # If the directory does not exist + except FileNotFoundError: + os.mkdir(archive) + os.chdir(archive) + run.menu() + + except FileNotFoundError: + print(logo + """ + [@] Set Path (All your tools will be install in that directory) + [1] Manual + [2] Default """) - choice = input("Z4nzu >> ") + + choice = input("Z4nzu =>> ") + if choice == "1": - inpath=input("Enter Path(with Directory Name) >> ") - file =open(fpath,"w") - file.write(inpath) - file.close() + inpath = input("Enter Path (with Directory Name) >> ") + with open(fpath, "w") as f: + f.write(inpath) + print("Successfully Path Set...!!") - elif choice == "2": - autopath="/home/hackingtool/" - file =open(fpath,"w") - file.write(autopath) - file.close() - time.sleep(1) - print("Your Default Path Is :-"+autopath) - time.sleep(3) - else : + + if choice == "2": + autopath = "/home/hackingtool/" + with open(fpath, "w") as f: + f.write(autopath) + + print(f"Your Default Path Is:- {autopath}") + sleep(3) + + else: print("Try Again..!!") - print("Sorry Open New Issue..!!") + except KeyboardInterrupt: - print("\n Sorry ..!!!") - time.sleep(3) + print("\nExiting ..!!!") + sleep(2)