mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-14 19:55:19 +00:00
Merge pull request #123 from Greatest125/master
minor fixes (typos, installation instructions update, etc)
This commit is contained in:
commit
87769dec56
@ -35,7 +35,10 @@ class Commix(HackingTool):
|
||||
"errors or vulnerabilities related to command injection " \
|
||||
"attacks.\n Usage: python commix.py [option(s)]"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/commixproject/commix.git commix"]
|
||||
"git clone https://github.com/commixproject/commix.git commix",
|
||||
"cd commix;sudo python setup.py install"
|
||||
]
|
||||
RUN_COMMANDS = ["sudo python commix.py --wizard"]
|
||||
PROJECT_URL = "https://github.com/commixproject/commix"
|
||||
|
||||
def __init__(self):
|
||||
|
@ -30,7 +30,7 @@ class Wireshark(HackingTool):
|
||||
|
||||
class BulkExtractor(HackingTool):
|
||||
TITLE = "Bulk extractor"
|
||||
DESCRIPTION = ""
|
||||
DESCRIPTION = "Extract useful information without parsing the file system"
|
||||
PROJECT_URL = "https://github.com/simsong/bulk_extractor"
|
||||
|
||||
def __init__(self):
|
||||
@ -49,9 +49,9 @@ class BulkExtractor(HackingTool):
|
||||
"Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
|
||||
|
||||
def cli_mode(self):
|
||||
os.system("sudo apt-get install bulk_extractor")
|
||||
os.system("sudo apt install bulk-extractor")
|
||||
print("bulk_extractor and options")
|
||||
os.system("bulk_extractor")
|
||||
os.system("bulk_extractor -h")
|
||||
os.system(
|
||||
'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')
|
||||
|
||||
|
@ -30,11 +30,11 @@ class Dracnmap(HackingTool):
|
||||
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
|
||||
"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
|
||||
]
|
||||
RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"]
|
||||
RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
|
||||
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
|
||||
|
||||
def __init__(self):
|
||||
super(Dracnmap, self).__init__(runnable = False)
|
||||
# def __init__(self):
|
||||
# super(Dracnmap, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class PortScan(HackingTool):
|
||||
@ -93,10 +93,11 @@ class ReconSpider(HackingTool):
|
||||
"sudo git clone https://github.com/bhavsec/reconspider.git",
|
||||
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
|
||||
]
|
||||
RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
|
||||
PROJECT_URL = "https://github.com/bhavsec/reconspider"
|
||||
|
||||
def __init__(self):
|
||||
super(ReconSpider, self).__init__(runnable = False)
|
||||
# def __init__(self):
|
||||
# super(ReconSpider, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class IsItDown(HackingTool):
|
||||
@ -117,9 +118,9 @@ class Infoga(HackingTool):
|
||||
"(ip, hostname, country,...) from different public source"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/m4ll0k/Infoga.git",
|
||||
"cd infoga;sudo python setup.py install"
|
||||
"cd Infoga;sudo python3 setup.py install"
|
||||
]
|
||||
RUN_COMMANDS = ["cd infoga;python infoga.py"]
|
||||
RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
|
||||
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
|
||||
|
||||
|
||||
@ -142,7 +143,7 @@ class Striker(HackingTool):
|
||||
|
||||
def run(self):
|
||||
site = input("Enter Site Name (example.com) >> ")
|
||||
os.system("cd Striker;")
|
||||
os.chdir("Striker")
|
||||
subprocess.run(["sudo", "python3", "striker.py", site])
|
||||
|
||||
|
||||
@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool):
|
||||
|
||||
def run(self):
|
||||
ip = input("Enter Ip >> ")
|
||||
os.system("cd rang3r;")
|
||||
os.chdir("rang3r")
|
||||
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
|
||||
|
||||
|
||||
@ -194,10 +195,11 @@ class Breacher(HackingTool):
|
||||
DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
|
||||
PROJECT_URL = "https://github.com/s0md3v/Breacher"
|
||||
|
||||
def __init__(self):
|
||||
super(Breacher, self).__init__(runnable = False)
|
||||
|
||||
|
||||
def run(self):
|
||||
domain = input("Enter domain (example.com) >> ")
|
||||
os.chdir("Breacher")
|
||||
subprocess.run(["python3", "breacher.py", "-u", domain])
|
||||
|
||||
class InformationGatheringTools(HackingToolsCollection):
|
||||
TITLE = "Information gathering tools"
|
||||
|
@ -25,7 +25,7 @@ class HatCloud(HackingTool):
|
||||
|
||||
def run(self):
|
||||
site = input("Enter Site >> ")
|
||||
os.system("cd HatCloud;")
|
||||
os.chdir("HatCloud")
|
||||
subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])
|
||||
|
||||
|
||||
|
@ -42,7 +42,7 @@ class Droidcam(HackingTool):
|
||||
"sudo git clone https://github.com/kinghacker0/WishFish.git;"
|
||||
"sudo apt install php wget openssh-client"
|
||||
]
|
||||
RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"]
|
||||
RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"]
|
||||
PROJECT_URL = "https://github.com/kinghacker0/WishFish"
|
||||
|
||||
|
||||
@ -52,7 +52,7 @@ class EvilApp(HackingTool):
|
||||
"hijack authenticated sessions in cookies."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/crypticterminal/EvilApp.git"]
|
||||
RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"]
|
||||
RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"]
|
||||
PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
|
||||
|
||||
|
||||
|
@ -7,13 +7,14 @@ class KnockMail(HackingTool):
|
||||
TITLE = "Knockmail"
|
||||
DESCRIPTION = "KnockMail Tool Verify If Email Exists"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/4w4k3/KnockMail.git",
|
||||
"cd KnockMail;sudo pip install -r requeriments.txt"
|
||||
"git clone https://github.com/heywoodlh/KnockMail.git",
|
||||
"cd KnockMail;sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd KnockMail;python knock.py"]
|
||||
PROJECT_URL = "https://github.com/4w4k3/KnockMail"
|
||||
RUN_COMMANDS = ["cd KnockMail;python3 knockmail.py"]
|
||||
PROJECT_URL = "https://github.com/heywoodlh/KnockMail"
|
||||
|
||||
|
||||
class EmailVerifyTools(HackingToolsCollection):
|
||||
TITLE = "Email Verify tools"
|
||||
TOOLS = [KnockMail()]
|
||||
|
||||
|
@ -11,14 +11,14 @@ class InstaBrute(HackingTool):
|
||||
DESCRIPTION = "Brute force attack against Instagram"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/chinoogawa/instaBrute.git",
|
||||
"cd instaBrute;sudo pip install -r requirements.txt"
|
||||
"cd instaBrute;sudo pip2.7 install -r requirements.txt"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
|
||||
|
||||
def run(self):
|
||||
name = input("Enter Username >> ")
|
||||
wordlist = input("Enter wordword list >> ")
|
||||
os.system("cd instaBrute;")
|
||||
os.chdir("instaBrute")
|
||||
subprocess.run(
|
||||
["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
|
||||
f"{wordlist}"])
|
||||
@ -48,7 +48,7 @@ class Faceshell(HackingTool):
|
||||
def run(self):
|
||||
name = input("Enter Username >> ")
|
||||
wordlist = input("Enter Wordlist >> ")
|
||||
os.system("cd Brute_Force;")
|
||||
os.chdir("Brute_Force")
|
||||
subprocess.run(
|
||||
["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])
|
||||
|
||||
|
@ -60,7 +60,7 @@ class Sherlock(HackingTool):
|
||||
|
||||
def run(self):
|
||||
name = input("Enter Username >> ")
|
||||
os.system("cd sherlock;")
|
||||
os.chdir('sherlock')
|
||||
subprocess.run(["sudo", "python3", "sherlock", f"{name}"])
|
||||
|
||||
|
||||
|
@ -9,16 +9,13 @@ class Sqlmap(HackingTool):
|
||||
"automates the process of \n" \
|
||||
"detecting and exploiting SQL injection flaws and taking " \
|
||||
"over of database servers \n " \
|
||||
"[!] python sqlmap.py -u [<http://example.com>] --batch --banner \n " \
|
||||
"[!] python3 sqlmap.py -u [<http://example.com>] --batch --banner \n " \
|
||||
"More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
|
||||
RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"]
|
||||
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
|
||||
|
||||
def __init__(self):
|
||||
super(Sqlmap, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class NoSqlMap(HackingTool):
|
||||
TITLE = "NoSqlMap"
|
||||
DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \
|
||||
|
@ -33,14 +33,14 @@ class SubDomainFinder(HackingTool):
|
||||
DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
|
||||
"subdomains of websites using OSINT \n " \
|
||||
"Usage:\n\t" \
|
||||
"[1] python sublist3r.py -d example.com \n" \
|
||||
"[2] python sublist3r.py -d example.com -p 80,443"
|
||||
"[1] python3 sublist3r.py -d example.com \n" \
|
||||
"[2] python3 sublist3r.py -d example.com -p 80,443"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo pip install requests argparse dnspython",
|
||||
"sudo pip3 install requests argparse dnspython",
|
||||
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
|
||||
"cd Sublist3r && sudo pip install -r requirements.txt"
|
||||
"cd Sublist3r && sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"]
|
||||
RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"]
|
||||
PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
|
||||
|
||||
|
||||
@ -59,9 +59,9 @@ class Blazy(HackingTool):
|
||||
DESCRIPTION = "Blazy is a modern login page bruteforcer"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
|
||||
"cd Blazy && sudo pip install -r requirements.txt"
|
||||
"cd Blazy && sudo pip2.7 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"]
|
||||
RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"]
|
||||
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
|
||||
|
||||
|
||||
@ -81,7 +81,6 @@ class SubDomainTakeOver(HackingTool):
|
||||
def __init__(self):
|
||||
super(SubDomainTakeOver, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class Dirb(HackingTool):
|
||||
TITLE = "Dirb"
|
||||
DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
|
||||
@ -90,7 +89,7 @@ class Dirb(HackingTool):
|
||||
"attack against \n a web server and analizing the response."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
|
||||
"cd dirb;sudo ./configure;make"
|
||||
"cd dirb;sudo bash configure;make"
|
||||
]
|
||||
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
|
||||
|
||||
|
@ -14,9 +14,9 @@ class WIFIPumpkin(HackingTool):
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo apt install libssl-dev libffi-dev build-essential",
|
||||
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
|
||||
"chmod -R 755 wifipumpkin3 && cd wifipumpkin3",
|
||||
"chmod -R 755 wifipumpkin3",
|
||||
"sudo apt install python3-pyqt5",
|
||||
"sudo python3 setup.py install"
|
||||
"cd wifipumpkin3;sudo python3 setup.py install"
|
||||
]
|
||||
RUN_COMMANDS = ["sudo wifipumpkin3"]
|
||||
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
|
||||
@ -53,10 +53,10 @@ class BluePot(HackingTool):
|
||||
"You must install/libbluetooth-dev on " \
|
||||
"Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
|
||||
INSTALL_COMMANDS = [
|
||||
"wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz "
|
||||
"&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar"
|
||||
"sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz"
|
||||
"sudo tar xfz bluepot-0.2.tar.gz;sudo rm bluepot-0.2.tar.gz"
|
||||
]
|
||||
RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"]
|
||||
RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
|
||||
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
|
||||
|
||||
|
||||
@ -91,10 +91,10 @@ class Wifiphisher(HackingTool):
|
||||
|
||||
class Wifite(HackingTool):
|
||||
TITLE = "Wifite"
|
||||
DESCRIPTION = "Wifite is an automated wireless attack tool"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/derv82/wifite2.git",
|
||||
"cd wifite2 && sudo python3 setup.py install"
|
||||
";sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd wifite2; sudo wifite"]
|
||||
PROJECT_URL = "https://github.com/derv82/wifite2"
|
||||
|
@ -8,10 +8,8 @@ class Cupp(HackingTool):
|
||||
DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
|
||||
"and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
|
||||
PROJECT_URL = "https://github.com/Mebus/cupp.git"
|
||||
|
||||
def __init__(self):
|
||||
super(Cupp, self).__init__(runnable = False)
|
||||
RUN_COMMANDS = ["python3 cupp.py -i"]
|
||||
PROJECT_URL = "https://github.com/Mebus/cupp"
|
||||
|
||||
|
||||
class WlCreator(HackingTool):
|
||||
|
Loading…
Reference in New Issue
Block a user