Merge pull request #123 from Greatest125/master

minor fixes (typos, installation instructions update, etc)
This commit is contained in:
Hardik Zinzuvadiya 2021-05-07 22:12:33 +05:30 committed by GitHub
commit 87769dec56
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
12 changed files with 52 additions and 52 deletions

View File

@ -35,7 +35,10 @@ class Commix(HackingTool):
"errors or vulnerabilities related to command injection " \
"attacks.\n Usage: python commix.py [option(s)]"
INSTALL_COMMANDS = [
"git clone https://github.com/commixproject/commix.git commix"]
"git clone https://github.com/commixproject/commix.git commix",
"cd commix;sudo python setup.py install"
]
RUN_COMMANDS = ["sudo python commix.py --wizard"]
PROJECT_URL = "https://github.com/commixproject/commix"
def __init__(self):

View File

@ -30,7 +30,7 @@ class Wireshark(HackingTool):
class BulkExtractor(HackingTool):
TITLE = "Bulk extractor"
DESCRIPTION = ""
DESCRIPTION = "Extract useful information without parsing the file system"
PROJECT_URL = "https://github.com/simsong/bulk_extractor"
def __init__(self):
@ -49,9 +49,9 @@ class BulkExtractor(HackingTool):
"Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
def cli_mode(self):
os.system("sudo apt-get install bulk_extractor")
os.system("sudo apt install bulk-extractor")
print("bulk_extractor and options")
os.system("bulk_extractor")
os.system("bulk_extractor -h")
os.system(
'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')

View File

@ -30,11 +30,11 @@ class Dracnmap(HackingTool):
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
]
RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"]
RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
def __init__(self):
super(Dracnmap, self).__init__(runnable = False)
# def __init__(self):
# super(Dracnmap, self).__init__(runnable = False)
class PortScan(HackingTool):
@ -93,10 +93,11 @@ class ReconSpider(HackingTool):
"sudo git clone https://github.com/bhavsec/reconspider.git",
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
]
RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
PROJECT_URL = "https://github.com/bhavsec/reconspider"
def __init__(self):
super(ReconSpider, self).__init__(runnable = False)
# def __init__(self):
# super(ReconSpider, self).__init__(runnable = False)
class IsItDown(HackingTool):
@ -117,9 +118,9 @@ class Infoga(HackingTool):
"(ip, hostname, country,...) from different public source"
INSTALL_COMMANDS = [
"git clone https://github.com/m4ll0k/Infoga.git",
"cd infoga;sudo python setup.py install"
"cd Infoga;sudo python3 setup.py install"
]
RUN_COMMANDS = ["cd infoga;python infoga.py"]
RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
@ -142,7 +143,7 @@ class Striker(HackingTool):
def run(self):
site = input("Enter Site Name (example.com) >> ")
os.system("cd Striker;")
os.chdir("Striker")
subprocess.run(["sudo", "python3", "striker.py", site])
@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool):
def run(self):
ip = input("Enter Ip >> ")
os.system("cd rang3r;")
os.chdir("rang3r")
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
@ -194,10 +195,11 @@ class Breacher(HackingTool):
DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
PROJECT_URL = "https://github.com/s0md3v/Breacher"
def __init__(self):
super(Breacher, self).__init__(runnable = False)
def run(self):
domain = input("Enter domain (example.com) >> ")
os.chdir("Breacher")
subprocess.run(["python3", "breacher.py", "-u", domain])
class InformationGatheringTools(HackingToolsCollection):
TITLE = "Information gathering tools"

View File

@ -25,7 +25,7 @@ class HatCloud(HackingTool):
def run(self):
site = input("Enter Site >> ")
os.system("cd HatCloud;")
os.chdir("HatCloud")
subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])

View File

@ -42,7 +42,7 @@ class Droidcam(HackingTool):
"sudo git clone https://github.com/kinghacker0/WishFish.git;"
"sudo apt install php wget openssh-client"
]
RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"]
RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"]
PROJECT_URL = "https://github.com/kinghacker0/WishFish"
@ -52,7 +52,7 @@ class EvilApp(HackingTool):
"hijack authenticated sessions in cookies."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/crypticterminal/EvilApp.git"]
RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"]
RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"]
PROJECT_URL = "https://github.com/crypticterminal/EvilApp"

View File

@ -7,13 +7,14 @@ class KnockMail(HackingTool):
TITLE = "Knockmail"
DESCRIPTION = "KnockMail Tool Verify If Email Exists"
INSTALL_COMMANDS = [
"git clone https://github.com/4w4k3/KnockMail.git",
"cd KnockMail;sudo pip install -r requeriments.txt"
"git clone https://github.com/heywoodlh/KnockMail.git",
"cd KnockMail;sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd KnockMail;python knock.py"]
PROJECT_URL = "https://github.com/4w4k3/KnockMail"
RUN_COMMANDS = ["cd KnockMail;python3 knockmail.py"]
PROJECT_URL = "https://github.com/heywoodlh/KnockMail"
class EmailVerifyTools(HackingToolsCollection):
TITLE = "Email Verify tools"
TOOLS = [KnockMail()]

View File

@ -11,14 +11,14 @@ class InstaBrute(HackingTool):
DESCRIPTION = "Brute force attack against Instagram"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/chinoogawa/instaBrute.git",
"cd instaBrute;sudo pip install -r requirements.txt"
"cd instaBrute;sudo pip2.7 install -r requirements.txt"
]
PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
def run(self):
name = input("Enter Username >> ")
wordlist = input("Enter wordword list >> ")
os.system("cd instaBrute;")
os.chdir("instaBrute")
subprocess.run(
["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
f"{wordlist}"])
@ -48,7 +48,7 @@ class Faceshell(HackingTool):
def run(self):
name = input("Enter Username >> ")
wordlist = input("Enter Wordlist >> ")
os.system("cd Brute_Force;")
os.chdir("Brute_Force")
subprocess.run(
["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])

View File

@ -60,7 +60,7 @@ class Sherlock(HackingTool):
def run(self):
name = input("Enter Username >> ")
os.system("cd sherlock;")
os.chdir('sherlock')
subprocess.run(["sudo", "python3", "sherlock", f"{name}"])

View File

@ -9,16 +9,13 @@ class Sqlmap(HackingTool):
"automates the process of \n" \
"detecting and exploiting SQL injection flaws and taking " \
"over of database servers \n " \
"[!] python sqlmap.py -u [<http://example.com>] --batch --banner \n " \
"[!] python3 sqlmap.py -u [<http://example.com>] --batch --banner \n " \
"More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
INSTALL_COMMANDS = [
"sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"]
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
def __init__(self):
super(Sqlmap, self).__init__(runnable = False)
class NoSqlMap(HackingTool):
TITLE = "NoSqlMap"
DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \

View File

@ -33,14 +33,14 @@ class SubDomainFinder(HackingTool):
DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
"subdomains of websites using OSINT \n " \
"Usage:\n\t" \
"[1] python sublist3r.py -d example.com \n" \
"[2] python sublist3r.py -d example.com -p 80,443"
"[1] python3 sublist3r.py -d example.com \n" \
"[2] python3 sublist3r.py -d example.com -p 80,443"
INSTALL_COMMANDS = [
"sudo pip install requests argparse dnspython",
"sudo pip3 install requests argparse dnspython",
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
"cd Sublist3r && sudo pip install -r requirements.txt"
"cd Sublist3r && sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"]
RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"]
PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
@ -59,9 +59,9 @@ class Blazy(HackingTool):
DESCRIPTION = "Blazy is a modern login page bruteforcer"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
"cd Blazy && sudo pip install -r requirements.txt"
"cd Blazy && sudo pip2.7 install -r requirements.txt"
]
RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"]
RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"]
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
@ -81,7 +81,6 @@ class SubDomainTakeOver(HackingTool):
def __init__(self):
super(SubDomainTakeOver, self).__init__(runnable = False)
class Dirb(HackingTool):
TITLE = "Dirb"
DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
@ -90,7 +89,7 @@ class Dirb(HackingTool):
"attack against \n a web server and analizing the response."
INSTALL_COMMANDS = [
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
"cd dirb;sudo ./configure;make"
"cd dirb;sudo bash configure;make"
]
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"

View File

@ -14,9 +14,9 @@ class WIFIPumpkin(HackingTool):
INSTALL_COMMANDS = [
"sudo apt install libssl-dev libffi-dev build-essential",
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
"chmod -R 755 wifipumpkin3 && cd wifipumpkin3",
"chmod -R 755 wifipumpkin3",
"sudo apt install python3-pyqt5",
"sudo python3 setup.py install"
"cd wifipumpkin3;sudo python3 setup.py install"
]
RUN_COMMANDS = ["sudo wifipumpkin3"]
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
@ -53,10 +53,10 @@ class BluePot(HackingTool):
"You must install/libbluetooth-dev on " \
"Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
INSTALL_COMMANDS = [
"wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz "
"&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar"
"sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz"
"sudo tar xfz bluepot-0.2.tar.gz;sudo rm bluepot-0.2.tar.gz"
]
RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"]
RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
@ -91,10 +91,10 @@ class Wifiphisher(HackingTool):
class Wifite(HackingTool):
TITLE = "Wifite"
DESCRIPTION = "Wifite is an automated wireless attack tool"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/derv82/wifite2.git",
"cd wifite2 && sudo python3 setup.py install"
";sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd wifite2; sudo wifite"]
PROJECT_URL = "https://github.com/derv82/wifite2"

View File

@ -8,10 +8,8 @@ class Cupp(HackingTool):
DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
"and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
PROJECT_URL = "https://github.com/Mebus/cupp.git"
def __init__(self):
super(Cupp, self).__init__(runnable = False)
RUN_COMMANDS = ["python3 cupp.py -i"]
PROJECT_URL = "https://github.com/Mebus/cupp"
class WlCreator(HackingTool):