Refactored the whole project

List of changes

+ Handling information about a tool has been improved a lot by providing a `HackingTool` class, which takes care of showing the options, running the selected option, executing the required commands
+ This class is designed with flexibililty and simplicity in mind, so adding a new tool is a lot easier, mention TITLE, DESCRIPTION, list of INSTALL_COMMANDS, RUN_COMMANDS and PROJECT_URL and there you go...

+ grouping all the `HackingTool`s is also made super simpler by providing a `HackingToolsCollection` class which groups the tools into their respective categories. Just add the instances of `HackingTool` classes to the TOOLS property of the `HackingToolsCollection`.

+ Refactored all the tools into separate files based on their categories.
+ Added a READM_template.md and generate_readme.py script to automatically generate Table of contents and the list of tools available automatically.
+ Now each tool in the README.md points to its project url if provided. This makes it easier to visit the project from the readme.
This commit is contained in:
naveennamani 2020-08-14 16:41:59 +05:30
parent de461ee13e
commit eaa920a7e3
33 changed files with 2595 additions and 3171 deletions

308
README.md
View File

@ -22,151 +22,179 @@
# Hackingtool Menu 🧰
- AnonSurf
- Information Gathering
- Password Attack
- Wireless Attack
- SQL Injection Tools
- Phishing Attack
- Web Attack Tool
- Post exploitation
- Forensic Tools
- Payload Creator
- Router Exploit
- Wifi Jamming
- XSS Attack Tool
- Reverse Engineering
- SocialMedia Finder
- DDos Attack Tools
- Steganography Tools
- IDN Homograph Attack
- Hash Cracking Tools
- SocialMedia Attack
- Android Hack
- RAT Tools
- Web Crawling
- Payload Injector
- Update System
- [Anonymously Hiding Tools](#anonymously-hiding-tools)
- [Information gathering tools](#information-gathering-tools)
- [Wordlist Generator](#wordlist-generator)
- [Wireless attack tools](#wireless-attack-tools)
- [SQL Injection Tools](#sql-injection-tools)
- [Phishing attack tools](#phishing-attack-tools)
- [Web Attack tools](#web-attack-tools)
- [Post exploitation tools](#post-exploitation-tools)
- [Forensic tools](#forensic-tools)
- [Payload creation tools](#payload-creation-tools)
- [Exploit framework](#exploit-framework)
- [Reverse engineering tools](#reverse-engineering-tools)
- [DDOS Attack Tools](#ddos-attack-tools)
- [Remote Administrator Tools (RAT)](#remote-administrator-tools--rat-)
- [XSS Attack Tools](#xss-attack-tools)
- [Steganograhy tools](#steganograhy-tools)
- [Other tools](#other-tools)
- [SocialMedia Bruteforce](#socialmedia-bruteforce)
- [Android Hacking tools](#android-hacking-tools)
- [IDN Homograph Attack](#idn-homograph-attack)
- [Email Verify tools](#email-verify-tools)
- [Hash cracking tools](#hash-cracking-tools)
- [Wifi Deauthenticate](#wifi-deauthenticate)
- [SocialMedia Finder](#socialmedia-finder)
- [Payload Injector](#payload-injector)
- [Web crawling](#web-crawling)
- [Mix tools](#mix-tools)
### AnonSurf
- Anonmously Surf
- Multitor
### Information Gathering
- Nmap
- Dracnmap
- Port Scanning
- Host To IP
- Xerosploit
- Infoga - Email OSINT
- ReconSpider
- RED HAWK (All In One Scanning)
- ReconDog
- Striker
- SecretFinder
- Port Scanner
- Breacher
### Password Attack
- Cupp
- WordlistCreator
- Goblin WordGenerator
- Credential reuse attacks
- Wordlist (Contain 1.4 Billion Pass)
### Wireless Attack
- WiFi-Pumpkin
- pixiewps
- Bluetooth Honeypot GUI Framework
- Fluxion
- Wifiphisher
- Wifite
- EvilTwin
### SQL Injection Tools
- sqlmap tool
- NoSqlMap
- Damn Small SQLi Scanner
- Explo
- Blisqy - Exploit Time-based blind-SQL injection
- Leviathan - Wide Range Mass Audit Toolkit
- SQLScan
### SocialMedia Attack
- Instagram Attack
- AllinOne SocialMedia Attack
- Facebook Attack
- Application Checker
### Android Attack
- Keydroid
- MySMS
- Lockphish (Grab target LOCK PIN)
- DroidCam (Capture Image)
- EvilApp (Hijack Session)
### Phishing Attack
- Setoolkit
- SocialFish
- HiddenEye
- Evilginx2
- Shellphish
- BlackEye
- I-See-You(Get Location using phishing attack)
- SayCheese (Grab target's Webcam Shots)
- QR Code Jacking
### Web Attack
- SlowLoris
### Anonymously Hiding Tools
- [Anonmously Surf](https://github.com/Und3rf10w/kali-anonsurf)
- [Multitor](https://github.com/trimstray/multitor)
### Information gathering tools
- [Network Map (nmap)](https://github.com/nmap/nmap)
- [Dracnmap](https://github.com/Screetsec/Dracnmap)
- Port scanning
- Host to IP
- [Xerosploit](https://github.com/LionSec/xerosploit)
- [RED HAWK (All In One Scanning)](https://github.com/Tuhinshubhra/RED_HAWK)
- [ReconSpider(For All Scaning)](https://github.com/bhavsec/reconspider)
- IsItDown (Check Website Down/Up)
- [Infoga - Email OSINT](https://github.com/m4ll0k/Infoga)
- [ReconDog](https://github.com/s0md3v/ReconDog)
- [Striker](https://github.com/s0md3v/Striker)
- [SecretFinder (like API & etc)](https://github.com/m4ll0k/SecretFinder)
- [Find Info Using Shodan](https://github.com/m4ll0k/Shodanfy.py)
- [Port Scanner - rang3r](https://github.com/floriankunushevci/rang3r)
- [Breacher](https://github.com/s0md3v/Breacher)
### Wordlist Generator
- [Cupp](https://github.com/Mebus/cupp.git)
- [WordlistCreator](https://github.com/Z4nzu/wlcreator)
- [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
- [Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
### Wireless attack tools
- [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3)
- [pixiewps](https://github.com/wiire/pixiewps)
- [Bluetooth Honeypot GUI Framework](https://github.com/andrewmichaelsmith/bluepot)
- [Fluxion](https://github.com/thehackingsage/Fluxion)
- [Wifiphisher](https://github.com/wifiphisher/wifiphisher)
- [Wifite](https://github.com/derv82/wifite2)
- [EvilTwin](https://github.com/Z4nzu/fakeap)
- [Fastssh](https://github.com/Z4nzu/fastssh)
- Howmanypeople
### SQL Injection Tools
- [Sqlmap tool](https://github.com/sqlmapproject/sqlmap)
- [NoSqlMap](https://github.com/codingo/NoSQLMap)
- [Damn Small SQLi Scanner](https://github.com/stamparm/DSSS)
- [Explo](https://github.com/dtag-dev-sec/explo)
- [Blisqy - Exploit Time-based blind-SQL injection](https://github.com/JohnTroony/Blisqy)
- [Leviathan - Wide Range Mass Audit Toolkit](https://github.com/leviathan-framework/leviathan)
- [SQLScan](https://github.com/Cvar1984/sqlscan)
### Phishing attack tools
- [Setoolkit](https://github.com/trustedsec/social-engineer-toolkit)
- [SocialFish](https://github.com/UndeadSec/SocialFish)
- [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye)
- [Evilginx2](https://github.com/kgretzky/evilginx2)
- [I-See_You(Get Location using phishing attack)](https://github.com/Viralmaniar/I-See-You)
- [SayCheese (Grab target's Webcam Shots)](https://github.com/hangetzzu/saycheese)
- [QR Code Jacking](https://github.com/cryptedwolf/ohmyqr)
- [ShellPhish](https://github.com/An0nUD4Y/shellphish)
- [BlackPhish](https://github.com/iinc0gnit0/BlackPhish)
### Web Attack tools
- [Web2Attack](https://github.com/santatic/web2attack)
- Skipfish
- SubDomain Finder
- CheckURL
- Blazy
- Sub-Domain TakeOver
### Post Explotation
- Vegile - Ghost In The Shell
- Chrome Keylogger
### Forensic Tool
- Bulk_extractor
- Disk Clone and ISO Image Aquire
- AutoSpy
- Toolsley
- [SubDomain Finder](https://github.com/aboul3la/Sublist3r)
- [CheckURL](https://github.com/UndeadSec/checkURL)
- [Blazy(Also Find ClickJacking)](https://github.com/UltimateHackers/Blazy)
- [Sub-Domain TakeOver](https://github.com/m4ll0k/takeover)
- [Dirb](https://gitlab.com/kalilinux/packages/dirb)
### Post exploitation tools
- [Vegile - Ghost In The Shell](https://github.com/Screetsec/Vegile)
- [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger)
### Forensic tools
- Autopsy
- Wireshark
### Payload Generator
- The FatRat*
- Brutal
- Stitch
- MSFvenom Payload Creator
- Venom Shellcode Generator
- Spycam
- Mob-Droid
### Exploit Framework
- RouterSploit
- WebSploit
- Commix
- Web2Attack
- Fastssh
### SocialMedia Finder
- Find SocialMedia By Facial Recognation System
- Find SocialMedia By UserName
- Sherlock
- SocialScan
### Steganography
- [Bulk extractor](https://github.com/simsong/bulk_extractor)
- [Disk Clone and ISO Image Aquire](https://guymager.sourceforge.io/)
- [Toolsley](https://www.toolsley.com/)
### Payload creation tools
- [The FatRat](https://github.com/Screetsec/TheFatRat)
- [Brutal](https://github.com/Screetsec/Brutal)
- [Stitch](https://nathanlopez.github.io/Stitch)
- [MSFvenom Payload Creator](https://github.com/g0tmi1k/msfpc)
- [Venom Shellcode Generator](https://github.com/r00t-3xp10it/venom)
- [Spycam](https://github.com/thelinuxchoice/spycam)
- [Mob-Droid](https://github.com/kinghacker0/Mob-Droid)
- [Enigma](https://github.com/UndeadSec/Enigma)
### Exploit framework
- [RouterSploit](https://github.com/threat9/routersploit)
- [WebSploit](https://github.com/The404Hacking/websploit )
- [Commix](https://github.com/commixproject/commix)
- [Web2Attack](https://github.com/santatic/web2attack)
### Reverse engineering tools
- [Androguard](https://github.com/androguard/androguard )
- [Apk2Gold](https://github.com/lxdvs/apk2gold )
- [JadX](https://github.com/skylot/jadx)
### DDOS Attack Tools
- SlowLoris
- [Asyncrone | Multifunction SYN Flood DDoS Weapon](https://github.com/fatihsnsy/aSYNcrone)
- [UFOnet](https://github.com/epsylon/ufonet)
- [GoldenEye](https://github.com/jseidl/GoldenEye)
### Remote Administrator Tools (RAT)
- [Stitch](https://github.com/nathanlopez/Stitch)
- [Pyshell](https://github.com/knassar702/pyshell)
### XSS Attack Tools
- [DalFox(Finder of XSS)](https://github.com/hahwul/dalfox)
- [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER.git)
- [Extended XSS Searcher and Finder](https://github.com/Damian89/extended-xss-search)
- [XSS-Freak](https://github.com/PR0PH3CY33/XSS-Freak)
- [XSpear](https://github.com/hahwul/XSpear)
- [XSSCon](https://github.com/menkrep1337/XSSCon)
- [XanXSS](https://github.com/Ekultek/XanXSS)
- [Advanced XSS Detection Suite](https://github.com/UltimateHackers/XSStrike)
- [RVuln](https://github.com/iinc0gnit0/RVuln)
### Steganograhy tools
- SteganoHide
- StegnoCracker
- Whitespace
### Ddos Attack tool
- SlowLoris
- SYN Flood DDoS Weapon
- UFOnet
- GoldenEye
### XSS Attack tool
- DalFox(Finder of XSS)
- XSS Payload Generator
- Advanced XSS Detection Suite
- Extended XSS Searcher and Finder
- XSS-Freak
- XSpear
- XSSCon
- XanXSS
### IDN Homograph
- EvilURL
### Email Verifier
- KnockMail
### Hash Cracking Tool
- Hash Buster
- [Whitespace](https://github.com/beardog108/snow10)
### Other tools
#### SocialMedia Bruteforce
- [Instagram Attack](https://github.com/chinoogawa/instaBrute)
- [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force)
- [Facebook Attack](https://github.com/Matrix07ksa/Brute_Force)
- [Application Checker](https://github.com/jakuta-tech/underhanded)
#### Android Hacking tools
- [Keydroid](https://github.com/F4dl0/keydroid)
- [MySMS](https://github.com/papusingh2sms/mysms)
- [Lockphish (Grab target LOCK PIN)](https://github.com/JasonJerry/lockphish)
- [DroidCam (Capture Image)](https://github.com/kinghacker0/WishFish)
- [EvilApp (Hijack Session)](https://github.com/crypticterminal/EvilApp)
- [HatCloud(Bypass CloudFlare for IP)](https://github.com/HatBashBR/HatCloud)
#### IDN Homograph Attack
- [EvilURL](https://github.com/UndeadSec/EvilURL)
#### Email Verify tools
- [Knockmail](https://github.com/4w4k3/KnockMail)
#### Hash cracking tools
- [Hash Buster](https://github.com/s0md3v/Hash-Buster)
#### Wifi Deauthenticate
- [WifiJammer-NG](https://github.com/MisterBianco/wifijammer-ng)
- [KawaiiDeauther](https://github.com/aryanrtm/KawaiiDeauther)
#### SocialMedia Finder
- [Find SocialMedia By Facial Recognation System](https://github.com/Greenwolf/social_mapper)
- [Find SocialMedia By UserName](https://github.com/xHak9x/finduser)
- [Sherlock](https://github.com/sherlock-project/sherlock)
- [SocialScan | Username or Email](https://github.com/iojw/socialscan)
#### Payload Injector
- [Debinject](https://github.com/UndeadSec/Debinject)
- [Pixload](https://github.com/chinarulezzz/pixload)
#### Web crawling
- [Gospider](https://github.com/jaeles-project/gospider)
#### Mix tools
- Terminal Multiplexer
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A00.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A0.png)

72
README_template.md Normal file
View File

@ -0,0 +1,72 @@
### All in One Hacking tool For Hackers🥇
![](https://img.shields.io/github/license/Z4nzu/hackingtool)
![](https://img.shields.io/github/issues/Z4nzu/hackingtool)
![](https://img.shields.io/github/issues-closed/Z4nzu/hackingtool)
![](https://img.shields.io/badge/Python-3-blue)
![](https://img.shields.io/github/forks/Z4nzu/hackingtool)
![](https://img.shields.io/github/stars/Z4nzu/hackingtool)
![](https://img.shields.io/github/last-commit/Z4nzu/hackingtool)
[![HitCount](http://hits.dwyl.com/Z4nzu/hackingtool.svg)](http://hits.dwyl.com/Z4nzu/hackingtool)
![](https://img.shields.io/badge/platform-Linux%20%7C%20KaliLinux%20%7C%20ParrotOs-blue)
#### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I)
## Update Available V1.1.0 🚀
- [x] Added New Tools
- [x] Reverse Engineering
- [x] RAT Tools
- [x] Web Crawling
- [x] Payload Injector
- [x] Multitor Tools update
- [X] Added Tool in wifijamming
# Hackingtool Menu 🧰
{{toc}}
{{tools}}
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A00.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A0.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A1.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A2.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A4.png)
## Installation For Linux <img src="https://konpa.github.io/devicon/devicon.git/icons/linux/linux-original.svg" alt="linux" width="25" height="25"/></p><p align="center">
#### This Tool Must Run As ROOT !!!
git clone https://github.com/Z4nzu/hackingtool.git
chmod -R 755 hackingtool
cd hackingtool
sudo pip3 install -r requirement.txt
bash install.sh
sudo hackingtool
After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool**
#### Thanks to original Author of the tools used in hackingtool
<img src ="https://img.shields.io/badge/Important-notice-red" />
<h4>Please Don't Use for illegal Activity</h4>
### To do
- [ ] Release Tool
- [ ] Add Tools for CTF
- [ ] Want to do automatic
## Social Media :mailbox_with_no_mail:
[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Fwww.reddit.com%2Fuser%2FFatChicken277)](https://twitter.com/_Zinzu07)
[![GitHub](https://img.shields.io/badge/-GitHub-181717?style=flat-square&logo=github&link=https://github.com/Z4nzu/)](https://github.com/Z4nzu/)
##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8)
![Z4nzu's github stats](https://github-readme-stats.vercel.app/api?username=Z4nzu&show_icons=true&title_color=fff&icon_color=79ff97&text_color=9f9f9f&bg_color=151515)
<a href="https://www.buymeacoffee.com/Zinzu" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/arial-yellow.png" alt="Buy Me A Coffee" style="height: 50px !important;width: 50px !important;"></a>
#### Don't Forgot to share with Your Friends
#### Thank you..!!

185
core.py Normal file
View File

@ -0,0 +1,185 @@
# coding=utf-8
import os
import sys
import webbrowser
from platform import system
from traceback import print_exc
from typing import Any
from typing import Callable
from typing import List
from typing import Tuple
def clear_screen():
if system() == "Linux":
os.system("clear")
if system() == "Windows":
os.system("cls")
def validate_input(ip, val_range):
try:
ip = int(ip)
if ip in val_range:
return ip
else:
return None
except:
return None
class HackingTool(object):
# About the HackingTool
TITLE: str = "" # used to show info in the menu
DESCRIPTION: str = ""
INSTALL_COMMANDS: List[str] = []
INSTALLATION_DIR: str = ""
UNINSTALL_COMMANDS: List[str] = []
RUN_COMMANDS: List[str] = []
OPTIONS: List[Tuple[str, Callable]] = []
PROJECT_URL: str = ""
def __init__(self, options = None, installable: bool = True,
runnable: bool = True):
if options is None:
options = []
if isinstance(options, list):
self.OPTIONS = []
if installable:
self.OPTIONS.append(('Install', self.install))
if runnable:
self.OPTIONS.append(('Run', self.run))
self.OPTIONS.extend(options)
else:
raise Exception(
"options must be a list of (option_name, option_fn) tuples")
def show_info(self):
desc = self.DESCRIPTION
if self.PROJECT_URL:
desc += '\n\t[*] '
desc += self.PROJECT_URL
os.system(f'echo "{desc}"|boxes -d boy | lolcat')
# print(desc)
def show_options(self, parent = None):
clear_screen()
self.show_info()
for index, option in enumerate(self.OPTIONS):
print("[{:2}] {}".format(index + 1, option[0]))
if self.PROJECT_URL:
print("[{:2}] {}".format(98, "Open project page"))
print("[{:2}] {}".format(
99, ("Back to " + parent.TITLE) if parent is not None else "Exit"))
option_index = input("Select an option : ")
try:
option_index = int(option_index)
if option_index - 1 in range(len(self.OPTIONS)):
ret_code = self.OPTIONS[option_index - 1][1]()
if ret_code != 99:
input("\n\nPress ENTER to continue:")
elif option_index == 98:
self.show_project_page()
elif option_index == 99:
if parent is None:
sys.exit()
return 99
except (TypeError, ValueError):
print("Please enter a valid option")
input("\n\nPress ENTER to continue:")
except Exception:
print_exc()
input("\n\nPress ENTER to continue:")
return self.show_options(parent = parent)
def before_install(self):
pass
def install(self):
self.before_install()
if isinstance(self.INSTALL_COMMANDS, (list, tuple)):
for INSTALL_COMMAND in self.INSTALL_COMMANDS:
os.system(INSTALL_COMMAND)
self.after_install()
def after_install(self):
print("Successfully installed!")
def before_uninstall(self) -> bool:
""" Ask for confirmation from the user and return """
return True
def uninstall(self):
if self.before_uninstall():
if isinstance(self.UNINSTALL_COMMANDS, (list, tuple)):
for UNINSTALL_COMMAND in self.UNINSTALL_COMMANDS:
os.system(UNINSTALL_COMMAND)
self.after_uninstall()
def after_uninstall(self):
pass
def before_run(self):
pass
def run(self):
self.before_run()
if isinstance(self.RUN_COMMANDS, (list, tuple)):
for RUN_COMMAND in self.RUN_COMMANDS:
os.system(RUN_COMMAND)
self.after_run()
def after_run(self):
pass
def is_installed(self, dir_to_check = None):
print("Unimplemented: DO NOT USE")
return "?"
def show_project_page(self):
webbrowser.open_new_tab(self.PROJECT_URL)
class HackingToolsCollection(object):
TITLE: str = "" # used to show info in the menu
DESCRIPTION: str = ""
TOOLS = [] # type: List[Any[HackingTool, HackingToolsCollection]]
def __init__(self):
pass
def show_info(self):
os.system("figlet -f standard -c {} | lolcat".format(self.TITLE))
# os.system(f'echo "{self.DESCRIPTION}"|boxes -d boy | lolcat')
# print(self.DESCRIPTION)
def show_options(self, parent = None):
clear_screen()
self.show_info()
for index, tool in enumerate(self.TOOLS):
print("[{:2}] {}".format(index, tool.TITLE))
print("[{:2}] {}".format(
99, ("Back to " + parent.TITLE) if parent is not None else "Exit"))
tool_index = input("Choose a tool to proceed: ")
try:
tool_index = int(tool_index)
if tool_index in range(len(self.TOOLS)):
ret_code = self.TOOLS[tool_index].show_options(parent = self)
if ret_code != 99:
input("\n\nPress ENTER to continue:")
elif tool_index == 99:
if parent is None:
sys.exit()
return 99
except (TypeError, ValueError):
print("Please enter a valid option")
input("\n\nPress ENTER to continue:")
except Exception as e:
print_exc()
input("\n\nPress ENTER to continue:")
return self.show_options(parent = parent)

52
generate_readme.py Normal file
View File

@ -0,0 +1,52 @@
# coding=utf-8
import re
from core import HackingTool
from core import HackingToolsCollection
from main import all_tools
def sanitize_anchor(s):
return re.sub(r"\W", "-", s.lower())
def get_toc(tools, indentation = ""):
md = ""
for tool in tools:
if isinstance(tool, HackingToolsCollection):
md += (indentation + "- [{}](#{})\n".format(
tool.TITLE, sanitize_anchor(tool.TITLE)))
md += get_toc(tool.TOOLS, indentation = indentation + ' ')
return md
def get_tools_toc(tools, indentation = "##"):
md = ""
for tool in tools:
if isinstance(tool, HackingToolsCollection):
md += (indentation + "# {}\n".format(tool.TITLE))
md += get_tools_toc(tool.TOOLS, indentation = indentation + '#')
elif isinstance(tool, HackingTool):
if tool.PROJECT_URL:
md += ("- [{}]({})\n".format(tool.TITLE, tool.PROJECT_URL))
else:
md += ("- {}\n".format(tool.TITLE))
return md
def generate_readme():
toc = get_toc(all_tools[:-1])
tools_desc = get_tools_toc(all_tools[:-1])
with open("README_template.md") as fh:
readme_template = fh.read()
readme_template = readme_template.replace("{{toc}}", toc)
readme_template = readme_template.replace("{{tools}}", tools_desc)
with open("README.md", "w") as fh:
fh.write(readme_template)
if __name__ == '__main__':
generate_readme()

File diff suppressed because it is too large Load Diff

45
tools/anonsurf.py Normal file
View File

@ -0,0 +1,45 @@
# coding=utf-8
import os
from core import HackingTool
from core import HackingToolsCollection
class AnonymouslySurf(HackingTool):
TITLE = "Anonmously Surf"
DESCRIPTION = "It automatically overwrites the RAM when\n" \
"the system is shutting down and also change Ip."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git",
"cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf"
]
RUN_COMMANDS = ["sudo anonsurf start"]
PROJECT_URL = "https://github.com/Und3rf10w/kali-anonsurf"
def __init__(self):
super(AnonymouslySurf, self).__init__([('Stop', self.stop)])
def stop(self):
os.system("sudo anonsurf stop")
class Multitor(HackingTool):
TITLE = "Multitor"
DESCRIPTION = "How to stay in multi places at the same time"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/trimstray/multitor.git",
"cd multitor;sudo bash setup.sh install"
]
PROJECT_URL = "https://github.com/trimstray/multitor"
def __init__(self):
super(Multitor, self).__init__(runnable = False)
class AnonSurfTools(HackingToolsCollection):
TITLE = "Anonymously Hiding Tools"
DESCRIPTION = ""
TOOLS = [
AnonymouslySurf(),
Multitor()
]

77
tools/ddos.py Normal file
View File

@ -0,0 +1,77 @@
# coding=utf-8
import os
import subprocess
from core import HackingTool
from core import HackingToolsCollection
class SlowLoris(HackingTool):
TITLE = "SlowLoris"
DESCRIPTION = "Slowloris is basically an HTTP Denial of Service attack." \
"It send lots of HTTP Request"
INSTALL_COMMANDS = ["sudo pip install slowloris"]
def run(self):
target_site = input("Enter Target Site:- ")
subprocess.run(["slowloris", target_site])
class Asyncrone(HackingTool):
TITLE = "Asyncrone | Multifunction SYN Flood DDoS Weapon"
DESCRIPTION = "aSYNcrone is a C language based, mulltifunction SYN Flood " \
"DDoS Weapon.\nDisable the destination system by sending a " \
"SYN packet intensively to the destination."
INSTALL_COMMANDS = [
"git clone https://github.com/fatih4842/aSYNcrone.git",
"cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread"
]
PROJECT_URL = "https://github.com/fatihsnsy/aSYNcrone"
def run(self):
source_port = input("Enter Source Port >> ")
target_ip = input("Enter Target IP >> ")
target_port = input("Enter Target port >> ")
os.system("cd aSYNcrone;")
subprocess.run([
"sudo", "./aSYNcrone", source_port, target_ip, target_port, 1000])
class UFONet(HackingTool):
TITLE = "UFOnet"
DESCRIPTION = "UFONet - is a free software, P2P and cryptographic " \
"-disruptive \n toolkit- that allows to perform DoS and " \
"DDoS attacks\n\b " \
"More Usage Visit"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/epsylon/ufonet.git",
"cd ufonet;sudo python setup.py install"
]
RUN_COMMANDS = ["sudo ./ufonet --gui"]
PROJECT_URL = "https://github.com/epsylon/ufonet"
class GoldenEye(HackingTool):
TITLE = "GoldenEye"
DESCRIPTION = "GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\n" \
"GoldenEye is a HTTP DoS Test Tool."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/jseidl/GoldenEye.git;"
"chmod -R 755 GoldenEye"
]
PROJECT_URL = "https://github.com/jseidl/GoldenEye"
def run(self):
os.system("cd GoldenEye ;sudo ./goldeneye.py")
print("\033[96m Go to Directory \n "
"[*] USAGE: ./goldeneye.py <url> [OPTIONS]")
class DDOSTools(HackingToolsCollection):
TITLE = "DDOS Attack Tools"
TOOLS = [
SlowLoris(),
Asyncrone(),
UFONet(),
GoldenEye()
]

View File

@ -0,0 +1,50 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
from tools.webattack import Web2Attack
class RouterSploit(HackingTool):
TITLE = "RouterSploit"
DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \
"framework dedicated to embedded devices"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/threat9/routersploit.git",
"cd routersploit && sudo python3 -m pip install -r requirements.txt"
]
RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"]
PROJECT_URL = "https://github.com/threat9/routersploit"
class WebSploit(HackingTool):
TITLE = "WebSploit"
DESCRIPTION = "Websploit is an advanced MITM framework."
INSTALL_COMMANDS = ["https://github.com/The404Hacking/websploit.git"]
RUN_COMMANDS = ["cd websploit;python3 websploit.py"]
PROJECT_URL = "https://github.com/The404Hacking/websploit "
class Commix(HackingTool):
TITLE = "Commix"
DESCRIPTION = "Automated All-in-One OS command injection and exploitation " \
"tool.\nCommix can be used from web developers, penetration " \
"testers or even security researchers\n in order to test " \
"web-based applications with the view to find bugs,\n " \
"errors or vulnerabilities related to command injection " \
"attacks.\n Usage: python commix.py [option(s)]"
INSTALL_COMMANDS = [
"git clone https://github.com/commixproject/commix.git commix"]
PROJECT_URL = "https://github.com/commixproject/commix"
def __init__(self):
super(Commix, self).__init__(runnable = False)
class ExploitFrameworkTools(HackingToolsCollection):
TITLE = "Exploit framework"
TOOLS = [
RouterSploit(),
WebSploit(),
Commix(),
Web2Attack()
]

91
tools/forensic_tools.py Normal file
View File

@ -0,0 +1,91 @@
# coding=utf-8
import os
from core import HackingTool
from core import HackingToolsCollection
class Autopsy(HackingTool):
TITLE = "Autopsy"
DESCRIPTION = "Autopsy is a platform that is used by Cyber Investigators.\n" \
"[!] Works in any Os\n" \
"[!] Recover Deleted Files from any OS & MEdia \n" \
"[!] Extract Image Metadata"
RUN_COMMANDS = "sudo autopsy"
def __init__(self):
super(Autopsy, self).__init__(installable = False)
class Wireshark(HackingTool):
TITLE = "Wireshark"
DESCRIPTION = "Wireshark is a network capture and analyzer \n" \
"tool to see whats happening in your network.\n " \
"And also investigate Network related incident"
RUN_COMMANDS = ["sudo wireshark"]
def __init__(self):
super(Wireshark, self).__init__(installable = False)
class BulkExtractor(HackingTool):
TITLE = "Bulk extractor"
DESCRIPTION = ""
PROJECT_URL = "https://github.com/simsong/bulk_extractor"
def __init__(self):
super(BulkExtractor, self).__init__([
('GUI Mode (Download required)', self.gui_mode),
('CLI Mode', self.cli_mode)
], installable = False, runnable = False)
def gui_mode(self):
os.system(
"sudo git clone https://github.com/simsong/bulk_extractor.git")
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
print(
"If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
print(
"Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
def cli_mode(self):
os.system("sudo apt-get install bulk_extractor")
print("bulk_extractor and options")
os.system("bulk_extractor")
os.system(
'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')
class Guymager(HackingTool):
TITLE = "Disk Clone and ISO Image Aquire"
DESCRIPTION = "Guymager is a free forensic imager for media acquisition."
INSTALL_COMMANDS = ["sudo apt install guymager"]
RUN_COMMANDS = ["sudo guymager"]
PROJECT_URL = "https://guymager.sourceforge.io/"
class Toolsley(HackingTool):
TITLE = "Toolsley"
DESCRIPTION = "Toolsley got more than ten useful tools for investigation.\n" \
"[+]File signature verifier\n" \
"[+]File identifier \n" \
"[+]Hash & Validate \n" \
"[+]Binary inspector \n " \
"[+]Encode text \n" \
"[+]Data URI generator \n" \
"[+]Password generator"
PROJECT_URL = "https://www.toolsley.com/"
def __init__(self):
super(Toolsley, self).__init__(installable = False, runnable = False)
class ForensicTools(HackingToolsCollection):
TITLE = "Forensic tools"
TOOLS = [
Autopsy(),
Wireshark(),
BulkExtractor(),
Guymager(),
Toolsley()
]

View File

@ -0,0 +1,219 @@
# coding=utf-8
import os
import socket
import subprocess
import webbrowser
from core import HackingTool
from core import HackingToolsCollection
from core import clear_screen
class NMAP(HackingTool):
TITLE = "Network Map (nmap)"
DESCRIPTION = "Free and open source utility for network discovery and security auditing"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/nmap/nmap.git",
"sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
]
PROJECT_URL = "https://github.com/nmap/nmap"
def __init__(self):
super(NMAP, self).__init__(runnable = False)
class Dracnmap(HackingTool):
TITLE = "Dracnmap"
DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
"exploit the network and gathering information with nmap help."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
"cd Dracnmap && chmod +x Dracnmap.sh"
]
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
def __init__(self):
super(Dracnmap, self).__init__(runnable = False)
class PortScan(HackingTool):
TITLE = "Port scanning"
def __init__(self):
super(PortScan, self).__init__(installable = False)
def run(self):
clear_screen()
target = input('Select a Target IP: ')
subprocess.run(["sudo", "nmap", "-O", "-Pn", target])
class Host2IP(HackingTool):
TITLE = "Host to IP "
def __init__(self):
super(Host2IP, self).__init__(installable = False)
def run(self):
clear_screen()
host = input("Enter host name (e.g. www.google.com):- ")
ips = socket.gethostbyname(host)
print(ips)
class XeroSploit(HackingTool):
TITLE = "Xerosploit"
DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \
"man-in-the-middle attacks for testing purposes"
INSTALL_COMMANDS = [
"git clone https://github.com/LionSec/xerosploit.git",
"cd xerosploit && sudo python install.py"
]
RUN_COMMANDS = ["sudo xerosploit"]
PROJECT_URL = "https://github.com/LionSec/xerosploit"
class RedHawk(HackingTool):
TITLE = "RED HAWK (All In One Scanning)"
DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."
INSTALL_COMMANDS = [
"git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]
RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]
PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"
class ReconSpider(HackingTool):
TITLE = "ReconSpider(For All Scaning)"
DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \
" Framework for scanning IP Address, Emails, \n" \
"Websites, Organizations and find out information from" \
" different sources.\n"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/bhavsec/reconspider.git",
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
]
PROJECT_URL = "https://github.com/bhavsec/reconspider"
def __init__(self):
super(ReconSpider, self).__init__(runnable = False)
class IsItDown(HackingTool):
TITLE = "IsItDown (Check Website Down/Up)"
DESCRIPTION = "Check Website Is Online or Not"
def __init__(self):
super(IsItDown, self).__init__(
[('Open', self.open)], installable = False, runnable = False)
def open(self):
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
class Infoga(HackingTool):
TITLE = "Infoga - Email OSINT"
DESCRIPTION = "Infoga is a tool gathering email accounts informations\n" \
"(ip, hostname, country,...) from different public source"
INSTALL_COMMANDS = [
"git clone https://github.com/m4ll0k/Infoga.git",
"cd infoga;sudo python setup.py install"
]
RUN_COMMANDS = ["cd infoga;python infoga.py"]
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
class ReconDog(HackingTool):
TITLE = "ReconDog"
DESCRIPTION = "ReconDog Information Gathering Suite"
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]
RUN_COMMANDS = ["cd ReconDog;sudo python dog"]
PROJECT_URL = "https://github.com/s0md3v/ReconDog"
class Striker(HackingTool):
TITLE = "Striker"
DESCRIPTION = "Recon & Vulnerability Scanning Suite"
INSTALL_COMMANDS = [
"git clone https://github.com/s0md3v/Striker.git",
"cd Striker && pip3 install -r requirements.txt"
]
PROJECT_URL = "https://github.com/s0md3v/Striker"
def run(self):
site = input("Enter Site Name (example.com) >> ")
os.system("cd Striker;")
subprocess.run(["sudo", "python3", "striker.py", site])
class SecretFinder(HackingTool):
TITLE = "SecretFinder (like API & etc)"
DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \
"like apikeys, accesstoken, authorizations, jwt,..etc \n " \
"and search anything on javascript files.\n\n " \
"Usage: python SecretFinder.py -h"
INSTALL_COMMANDS = [
"git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",
"cd secretfinder; sudo pip3 install -r requirements.txt"
]
PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"
def __init__(self):
super(SecretFinder, self).__init__(runnable = False)
class Shodan(HackingTool):
TITLE = "Find Info Using Shodan"
DESCRIPTION = "Get ports, vulnerabilities, informations, banners,..etc \n " \
"for any IP with Shodan (no apikey! no rate limit!)\n" \
"[X] Don't use this tool because your ip will be blocked by Shodan!"
INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]
PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"
def __init__(self):
super(Shodan, self).__init__(runnable = False)
class PortScannerRanger(HackingTool):
TITLE = "Port Scanner - rang3r"
DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \
"all alive hosts within your range that you specify."
INSTALL_COMMANDS = [
"git clone https://github.com/floriankunushevci/rang3r.git;"
"sudo pip install termcolor"]
PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
def run(self):
ip = input("Enter Ip >> ")
os.system("cd rang3r;")
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
class Breacher(HackingTool):
TITLE = "Breacher"
DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
PROJECT_URL = "https://github.com/s0md3v/Breacher"
def __init__(self):
super(Breacher, self).__init__(runnable = False)
class InformationGatheringTools(HackingToolsCollection):
TITLE = "Information gathering tools"
TOOLS = [
NMAP(),
Dracnmap(),
PortScan(),
Host2IP(),
XeroSploit(),
RedHawk(),
ReconSpider(),
IsItDown(),
Infoga(),
ReconDog(),
Striker(),
SecretFinder(),
Shodan(),
PortScannerRanger(),
Breacher()
]

46
tools/other_tools.py Normal file
View File

@ -0,0 +1,46 @@
# coding=utf-8
import os
import subprocess
from core import HackingTool
from core import HackingToolsCollection
from tools.others.android_attack import AndroidAttackTools
from tools.others.email_verifier import EmailVerifyTools
from tools.others.hash_crack import HashCrackingTools
from tools.others.homograph_attacks import IDNHomographAttackTools
from tools.others.mix_tools import MixTools
from tools.others.payload_injection import PayloadInjectorTools
from tools.others.socialmedia import SocialMediaBruteforceTools
from tools.others.socialmedia_finder import SocialMediaFinderTools
from tools.others.web_crawling import WebCrawlingTools
from tools.others.wifi_jamming import WifiJammingTools
class HatCloud(HackingTool):
TITLE = "HatCloud(Bypass CloudFlare for IP)"
DESCRIPTION = "HatCloud build in Ruby. It makes bypass in CloudFlare for " \
"discover real IP."
INSTALL_COMMANDS = ["git clone https://github.com/HatBashBR/HatCloud.git"]
PROJECT_URL = "https://github.com/HatBashBR/HatCloud"
def run(self):
site = input("Enter Site >> ")
os.system("cd HatCloud;")
subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])
class OtherTools(HackingToolsCollection):
TITLE = "Other tools"
TOOLS = [
SocialMediaBruteforceTools(),
AndroidAttackTools(),
HatCloud(),
IDNHomographAttackTools(),
EmailVerifyTools(),
HashCrackingTools(),
WifiJammingTools(),
SocialMediaFinderTools(),
PayloadInjectorTools(),
WebCrawlingTools(),
MixTools()
]

View File

@ -0,0 +1,67 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class Keydroid(HackingTool):
TITLE = "Keydroid"
DESCRIPTION = "Android Keylogger + Reverse Shell\n" \
"[!] You have to install Some Manually Refer Below Link:\n " \
"[+] https://github.com/F4dl0/keydroid"
INSTALL_COMMANDS = ["sudo git clone https://github.com/F4dl0/keydroid.git"]
RUN_COMMANDS = ["cd keydroid && bash keydroid.sh"]
PROJECT_URL = "https://github.com/F4dl0/keydroid"
class MySMS(HackingTool):
TITLE = "MySMS"
DESCRIPTION = "Script that generates an Android App to hack SMS through WAN \n" \
"[!] You have to install Some Manually Refer Below Link:\n\t " \
"[+] https://github.com/papusingh2sms/mysms"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/papusingh2sms/mysms.git"]
RUN_COMMANDS = ["cd mysms && bash mysms.sh"]
PROJECT_URL = "https://github.com/papusingh2sms/mysms"
class LockPhish(HackingTool):
TITLE = "Lockphish (Grab target LOCK PIN)"
DESCRIPTION = "Lockphish it's the first tool for phishing attacks on the " \
"lock screen, designed to\n Grab Windows credentials,Android" \
" PIN and iPhone Passcode using a https link."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/JasonJerry/lockphish.git"]
RUN_COMMANDS = ["cd lockphish && bash lockphish.sh"]
PROJECT_URL = "https://github.com/JasonJerry/lockphish"
class Droidcam(HackingTool):
TITLE = "DroidCam (Capture Image)"
DESCRIPTION = "Powerful Tool For Grab Front Camera Snap Using A Link"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/kinghacker0/WishFish.git;"
"sudo apt install php wget openssh"
]
RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"]
PROJECT_URL = "https://github.com/kinghacker0/WishFish"
class EvilApp(HackingTool):
TITLE = "EvilApp (Hijack Session)"
DESCRIPTION = "EvilApp is a script to generate Android App that can " \
"hijack authenticated sessions in cookies."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/crypticterminal/EvilApp.git"]
RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"]
PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
class AndroidAttackTools(HackingToolsCollection):
TITLE = "Android Hacking tools"
TOOLS = [
Keydroid(),
MySMS(),
LockPhish(),
Droidcam(),
EvilApp()
]

View File

@ -0,0 +1,19 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class KnockMail(HackingTool):
TITLE = "Knockmail"
DESCRIPTION = "KnockMail Tool Verify If Email Exists"
INSTALL_COMMANDS = [
"git clone https://github.com/4w4k3/KnockMail.git",
"cd KnockMail;sudo pip install -r requeriments.txt"
]
RUN_COMMANDS = ["cd KnockMail;python knock.py"]
PROJECT_URL = "https://github.com/4w4k3/KnockMail"
class EmailVerifyTools(HackingToolsCollection):
TITLE = "Email Verify tools"
TOOLS = [KnockMail()]

View File

@ -0,0 +1,21 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class HashBuster(HackingTool):
TITLE = "Hash Buster"
DESCRIPTION = "Features: \n " \
"Automatic hash type identification \n " \
"Supports MD5, SHA1, SHA256, SHA384, SHA512"
INSTALL_COMMANDS = [
"git clone https://github.com/s0md3v/Hash-Buster.git",
"cd Hash-Buster;make install"
]
RUN_COMMANDS = ["buster -h"]
PROJECT_URL = "https://github.com/s0md3v/Hash-Buster"
class HashCrackingTools(HackingToolsCollection):
TITLE = "Hash cracking tools"
TOOLS = [HashBuster()]

View File

@ -0,0 +1,17 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class EvilURL(HackingTool):
TITLE = "EvilURL"
DESCRIPTION = "Generate unicode evil domains for IDN Homograph Attack " \
"and detect them."
INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/EvilURL.git"]
RUN_COMMANDS = ["cd EvilURL;python3 evilurl.py"]
PROJECT_URL = "https://github.com/UndeadSec/EvilURL"
class IDNHomographAttackTools(HackingToolsCollection):
TITLE = "IDN Homograph Attack"
TOOLS = [EvilURL()]

19
tools/others/mix_tools.py Normal file
View File

@ -0,0 +1,19 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class TerminalMultiplexer(HackingTool):
TITLE = "Terminal Multiplexer"
DESCRIPTION = "Terminal Multiplexer is a tiling terminal emulator that " \
"allows us to open \n several terminal sessions inside one " \
"single window."
INSTALL_COMMANDS = ["sudo apt-get install tilix"]
def __init__(self):
super(TerminalMultiplexer, self).__init__(runnable = False)
class MixTools(HackingToolsCollection):
TITLE = "Mix tools"
TOOLS = [TerminalMultiplexer()]

View File

@ -0,0 +1,37 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class DebInject(HackingTool):
TITLE = "Debinject"
DESCRIPTION = "Debinject is a tool that inject malicious code into *.debs"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UndeadSec/Debinject.git"]
RUN_COMMANDS = ["cd Debinject;python debinject.py"]
PROJECT_URL = "https://github.com/UndeadSec/Debinject"
class Pixload(HackingTool):
TITLE = "Pixload"
DESCRIPTION = "Pixload -- Image Payload Creating tools \n " \
"Pixload is Set of tools for creating/injecting payload into images."
INSTALL_COMMANDS = [
"sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl",
"sudo git clone https://github.com/chinarulezzz/pixload.git"
]
PROJECT_URL = "https://github.com/chinarulezzz/pixload"
def __init__(self):
# super(Pixload, self).__init__([
# ('How To Use', self.show_project_page)
# ], runnable = False)
super(Pixload, self).__init__(runnable = False)
class PayloadInjectorTools(HackingToolsCollection):
TITLE = "Payload Injector"
TOOLS = [
DebInject(),
Pixload()
]

View File

@ -0,0 +1,74 @@
# coding=utf-8
import os
import subprocess
from core import HackingTool
from core import HackingToolsCollection
class InstaBrute(HackingTool):
TITLE = "Instagram Attack"
DESCRIPTION = "Brute force attack against Instagram"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/chinoogawa/instaBrute.git",
"cd instaBrute;sudo pip install -r requirements.txt"
]
PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
def run(self):
name = input("Enter Username >> ")
wordlist = input("Enter wordword list >> ")
os.system("cd instaBrute;")
subprocess.run(
["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
f"{wordlist}"])
class BruteForce(HackingTool):
TITLE = "AllinOne SocialMedia Attack"
DESCRIPTION = "Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n" \
"[!] python3 Brute_Force.py -g <Account@gmail.com> -l <File_list>"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
"cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
]
RUN_COMMANDS = ["cd Brute_Force;python3 Brute_Force.py -h"]
PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
class Faceshell(HackingTool):
TITLE = "Facebook Attack"
DESCRIPTION = "Facebook BruteForcer"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
"cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
]
PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
def run(self):
name = input("Enter Username >> ")
wordlist = input("Enter Wordlist >> ")
os.system("cd Brute_Force;")
subprocess.run(
["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])
class AppCheck(HackingTool):
TITLE = "Application Checker"
DESCRIPTION = "Tool to check if an app is installed on the target device through a link."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/jakuta-tech/underhanded.git",
"cd underhanded && sudo chmod +x underhanded.sh"
]
RUN_COMMANDS = ["cd underhanded;sudo bash underhanded.sh"]
PROJECT_URL = "https://github.com/jakuta-tech/underhanded"
class SocialMediaBruteforceTools(HackingToolsCollection):
TITLE = "SocialMedia Bruteforce"
TOOLS = [
InstaBrute(),
BruteForce(),
Faceshell(),
AppCheck()
]

View File

@ -0,0 +1,85 @@
# coding=utf-8
import os
import subprocess
from core import HackingTool
from core import HackingToolsCollection
class FacialFind(HackingTool):
TITLE = "Find SocialMedia By Facial Recognation System"
DESCRIPTION = "A Social Media Mapping Tool that correlates profiles\n " \
"via facial recognition across different sites."
INSTALL_COMMANDS = [
"sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade",
"sudo git clone https://github.com/Greenwolf/social_mapper.git",
"cd social_mapper/setup",
"sudo python3 -m pip install --no-cache-dir -r requirements.txt",
'echo "[!]Now You have To do some Manually\n'
'[!] Install the Geckodriver for your operating system\n'
'[!] Copy & Paste Link And Download File As System Configuration\n'
'[#] https://github.com/mozilla/geckodriver/releases\n'
'[!!] On Linux you can place it in /usr/bin "| boxes | lolcat'
]
PROJECT_URL = "https://github.com/Greenwolf/social_mapper"
def run(self):
os.system("cd social_mapper/setup")
os.system("sudo python social_mapper.py -h")
print("""\033[95m
You have to set Username and password of your AC Or Any Fack Account
[#] Type in Terminal nano social_mapper.py
""")
os.system(
'echo "python social_mapper.py -f [<imageFoldername>] -i [<imgFolderPath>] -m fast [<AcName>] -fb -tw"| boxes | lolcat')
class FindUser(HackingTool):
TITLE = "Find SocialMedia By UserName"
DESCRIPTION = "Find usernames across over 75 social networks"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/xHak9x/finduser.git",
"cd finduser && sudo chmod +x finduser.sh"
]
RUN_COMMANDS = ["cd finduser && sudo bash finduser.sh"]
PROJECT_URL = "https://github.com/xHak9x/finduser"
class Sherlock(HackingTool):
TITLE = "Sherlock"
DESCRIPTION = "Hunt down social media accounts by username across social networks \n " \
"For More Usege \n" \
"\t >>python3 sherlock --help"
INSTALL_COMMANDS = [
"git clone https://github.com/sherlock-project/sherlock.git",
"cd sherlock;sudo python3 -m pip install -r requirements.txt"
]
PROJECT_URL = "https://github.com/sherlock-project/sherlock"
def run(self):
name = input("Enter Username >> ")
os.system("cd sherlock;")
subprocess.run(["sudo", "python3", "sherlock", f"{name}"])
class SocialScan(HackingTool):
TITLE = "SocialScan | Username or Email"
DESCRIPTION = "Check email address and username availability on online " \
"platforms with 100% accuracy"
INSTALL_COMMANDS = ["sudo pip install socialscan"]
PROJECT_URL = "https://github.com/iojw/socialscan"
def run(self):
name = input(
"Enter Username or Emailid (if both then please space between email & username) >> ")
subprocess.run(["sudo", "socialscan", f"{name}"])
class SocialMediaFinderTools(HackingToolsCollection):
TITLE = "SocialMedia Finder"
TOOLS = [
FacialFind(),
FindUser(),
Sherlock(),
SocialScan()
]

View File

@ -0,0 +1,18 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class GoSpider(HackingTool):
TITLE = "Gospider"
DESCRIPTION = "Gospider - Fast web spider written in Go"
INSTALL_COMMANDS = ["sudo go get -u github.com/jaeles-project/gospider"]
PROJECT_URL = "https://github.com/jaeles-project/gospider"
def __init__(self):
super(GoSpider, self).__init__(runnable = False)
class WebCrawlingTools(HackingToolsCollection):
TITLE = "Web crawling"
TOOLS = [GoSpider()]

View File

@ -0,0 +1,37 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class WifiJammerNG(HackingTool):
TITLE = "WifiJammer-NG"
DESCRIPTION = "Continuously jam all wifi clients and access points within range."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/MisterBianco/wifijammer-ng.git",
"cd wifijammer-ng;sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = [
'echo "python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]"| boxes | lolcat',
"cd wifijammer-ng;sudo python3 wifijammer.py"
]
PROJECT_URL = "https://github.com/MisterBianco/wifijammer-ng"
class KawaiiDeauther(HackingTool):
TITLE = "KawaiiDeauther"
DESCRIPTION = "Kawaii Deauther is a pentest toolkit whose goal is to perform \n " \
"jam on WiFi clients/routers and spam many fake AP for testing purposes."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/aryanrtm/KawaiiDeauther.git",
"cd KawaiiDeauther;sudo bash install.sh"
]
RUN_COMMANDS = ["cd KawaiiDeauther;sudo KawaiiDeauther.sh"]
PROJECT_URL = "https://github.com/aryanrtm/KawaiiDeauther"
class WifiJammingTools(HackingToolsCollection):
TITLE = "Wifi Deauthenticate"
TOOLS = [
WifiJammerNG(),
KawaiiDeauther()
]

141
tools/payload_creator.py Normal file
View File

@ -0,0 +1,141 @@
# coding=utf-8
import os
from core import HackingTool
from core import HackingToolsCollection
class TheFatRat(HackingTool):
TITLE = "The FatRat"
DESCRIPTION = "TheFatRat Provides An Easy way to create Backdoors and \n" \
"Payload which can bypass most anti-virus"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Screetsec/TheFatRat.git",
"cd TheFatRat && sudo chmod +x setup.sh"
]
RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"]
PROJECT_URL = "https://github.com/Screetsec/TheFatRat"
def __init__(self):
super(TheFatRat, self).__init__([
('Update', self.update),
('Troubleshoot', self.troubleshoot)
])
def update(self):
os.system(
"cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
def troubleshoot(self):
os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
class Brutal(HackingTool):
TITLE = "Brutal"
DESCRIPTION = "Brutal is a toolkit to quickly create various payload," \
"powershell attack,\nvirus attack and launch listener for " \
"a Human Interface Device"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Screetsec/Brutal.git",
"cd Brutal && sudo chmod +x Brutal.sh"
]
RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"]
PROJECT_URL = "https://github.com/Screetsec/Brutal"
def show_info(self):
super(Brutal, self).show_info()
print("""
[!] Requirement
>> Arduino Software (I used v1.6.7)
>> TeensyDuino
>> Linux udev rules
>> Copy and paste the PaensyLib folder inside your Arduino\libraries
[!] Kindly Visit below link for Installation for Arduino
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
""")
class Stitch(HackingTool):
TITLE = "Stitch"
DESCRIPTION = "Stitch is Cross Platform Python Remote Administrator Tool\n\t" \
"[!] Refer Below Link For Wins & MAc Os"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/nathanlopez/Stitch.git",
"cd Stitch && sudo pip install -r lnx_requirements.txt"
]
RUN_COMMANDS = ["cd Stitch && sudo python main.py"]
PROJECT_URL = "https://nathanlopez.github.io/Stitch"
class MSFVenom(HackingTool):
TITLE = "MSFvenom Payload Creator"
DESCRIPTION = "MSFvenom Payload Creator (MSFPC) is a wrapper to generate \n" \
"multiple types of payloads, based on users choice.\n" \
"The idea is to be as simple as possible (only requiring " \
"one input) \nto produce their payload."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/g0tmi1k/msfpc.git",
"cd msfpc;sudo chmod +x msfpc.sh"
]
RUN_COMMANDS = ["cd msfpc;sudo bash msfpc.sh -h -v"]
PROJECT_URL = "https://github.com/g0tmi1k/msfpc"
class Venom(HackingTool):
TITLE = "Venom Shellcode Generator"
DESCRIPTION = "venom 1.0.11 (malicious_server) was build to take " \
"advantage of \n apache2 webserver to deliver payloads " \
"(LAN) using a fake webpage writen in html"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/r00t-3xp10it/venom.git",
"sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh",
"sudo ./venom.sh -u"
]
RUN_COMMANDS = ["cd venom && sudo ./venom.sh"]
PROJECT_URL = "https://github.com/r00t-3xp10it/venom"
class Spycam(HackingTool):
TITLE = "Spycam"
DESCRIPTION = "Script to generate a Win32 payload that takes the webcam " \
"image every 1 minute and send it to the attacker"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/thelinuxchoice/spycam.git",
"cd spycam && bash install.sh && chmod +x spycam"
]
RUN_COMMANDS = ["cd spycam && ./spycam"]
PROJECT_URL = "https://github.com/thelinuxchoice/spycam"
class MobDroid(HackingTool):
TITLE = "Mob-Droid"
DESCRIPTION = "Mob-Droid helps you to generate metasploit payloads in " \
"easy way\n without typing long commands and save your time"
INSTALL_COMMANDS = [
"git clone https://github.com/kinghacker0/mob-droid.git"]
RUN_COMMANDS = ["cd Mob-Droid;sudo python mob-droid.py"]
PROJECT_URL = "https://github.com/kinghacker0/Mob-Droid"
class Enigma(HackingTool):
TITLE = "Enigma"
DESCRIPTION = "Enigma is a Multiplatform payload dropper"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UndeadSec/Enigma.git"]
RUN_COMMANDS = ["cd Enigma;sudo python3 enigma3.py"]
PROJECT_URL = "https://github.com/UndeadSec/Enigma"
class PayloadCreatorTools(HackingToolsCollection):
TITLE = "Payload creation tools"
TOOLS = [
TheFatRat(),
Brutal(),
Stitch(),
MSFVenom(),
Venom(),
Spycam(),
MobDroid(),
Enigma()
]

130
tools/phising_attack.py Normal file
View File

@ -0,0 +1,130 @@
# coding=utf-8
import os
from core import HackingTool
from core import HackingToolsCollection
class Setoolkit(HackingTool):
TITLE = "Setoolkit"
DESCRIPTION = "The Social-Engineer Toolkit is an open-source penetration\n" \
"testing framework designed for social engineering"
INSTALL_COMMANDS = [
"git clone https://github.com/trustedsec/social-engineer-toolkit.git",
"sudo python social-engineer-toolkit/setup.py"
]
RUN_COMMANDS = ["sudo setoolkit"]
PROJECT_URL = "https://github.com/trustedsec/social-engineer-toolkit"
class SocialFish(HackingTool):
TITLE = "SocialFish"
DESCRIPTION = "Automated Phishing Tool & Information Collector"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y",
"cd SocialFish && sudo python3 -m pip install -r requirements.txt"
]
RUN_COMMANDS = ["cd SocialFish && sudo python3 SocialFish.py root pass"]
PROJECT_URL = "https://github.com/UndeadSec/SocialFish"
class HiddenEye(HackingTool):
TITLE = "HiddenEye"
DESCRIPTION = "Modern Phishing Tool With Advanced Functionality And " \
"Multiple Tunnelling Services \n" \
"\t [!]https://github.com/DarkSecDevelopers/HiddenEye"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye",
"cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok"
]
RUN_COMMANDS = ["cd HiddenEye;sudo python3 HiddenEye.py"]
PROJECT_URL = "https://github.com/DarkSecDevelopers/HiddenEye"
class Evilginx2(HackingTool):
TITLE = "Evilginx2"
DESCRIPTION = "evilginx2 is a man-in-the-middle attack framework used " \
"for phishing login credentials along with session cookies,\n" \
"which in turn allows to bypass 2-factor authentication protection.\n\n\t " \
"[+]Make sure you have installed GO of version at least 1.14.0 \n" \
"[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t " \
"[+]export GOPATH=$HOME/go \n " \
"[+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n" \
"[+]Then load it with source ~/.profiles."
INSTALL_COMMANDS = [
"sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2",
"cd $GOPATH/src/github.com/kgretzky/evilginx2;make",
"sudo make install;sudo evilginx"
]
RUN_COMMANDS = ["sudo evilginx"]
PROJECT_URL = "https://github.com/kgretzky/evilginx2"
class ISeeYou(HackingTool):
TITLE = "I-See_You(Get Location using phishing attack)"
DESCRIPTION = "[!] ISeeYou is a tool to find Exact Location of Victom By" \
" User SocialEngineering or Phishing Engagment..\n" \
"[!] Users can expose their local servers to the Internet " \
"and decode the location coordinates by looking at the log file"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Viralmaniar/I-See-You.git",
"cd I-See-You && sudo chmod u+x ISeeYou.sh"
]
RUN_COMMANDS = ["cd I-See-You && sudo bash ISeeYou.sh"]
PROJECT_URL = "https://github.com/Viralmaniar/I-See-You"
class SayCheese(HackingTool):
TITLE = "SayCheese (Grab target's Webcam Shots)"
DESCRIPTION = "Take webcam shots from target just sending a malicious link"
INSTALL_COMMANDS = ["sudo git clone https://github.com/hangetzzu/saycheese"]
RUN_COMMANDS = ["cd saycheese && sudo bash saycheese.sh"]
PROJECT_URL = "https://github.com/hangetzzu/saycheese"
class QRJacking(HackingTool):
TITLE = "QR Code Jacking"
DESCRIPTION = "QR Code Jacking (Any Website)"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt-get install scrot"]
RUN_COMMANDS = ["cd ohmyqr && sudo bash ohmyqr.sh"]
PROJECT_URL = "https://github.com/cryptedwolf/ohmyqr"
class ShellPhish(HackingTool):
TITLE = "ShellPhish"
DESCRIPTION = "Fhishing Tool for 18 social media"
INSTALL_COMMANDS = ["git clone https://github.com/An0nUD4Y/shellphish.git"]
RUN_COMMANDS = ["cd shellphish;sudo bash shellphish.sh"]
PROJECT_URL = "https://github.com/An0nUD4Y/shellphish"
class BlackPhish(HackingTool):
TITLE = "BlackPhish"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/iinc0gnit0/BlackPhish.git",
"cd BlackPhish;sudo bash install.sh"
]
RUN_COMMANDS = ["cd BlackPhish;sudo python3 blackphish.py"]
PROJECT_URL = "https://github.com/iinc0gnit0/BlackPhish"
def __init__(self):
super(BlackPhish, self).__init__([('Update', self.update)])
def update(self):
os.system("cd BlackPhish;sudo bash update.sh")
class PhishingAttackTools(HackingToolsCollection):
TITLE = "Phishing attack tools"
TOOLS = [
Setoolkit(),
SocialFish(),
HiddenEye(),
Evilginx2(),
ISeeYou(),
SayCheese(),
QRJacking(),
ShellPhish(),
BlackPhish()
]

View File

@ -0,0 +1,44 @@
# coding=utf-8
import os
from core import HackingTool
from core import HackingToolsCollection
class Vegile(HackingTool):
TITLE = "Vegile - Ghost In The Shell"
DESCRIPTION = "This tool will set up your backdoor/rootkits when " \
"backdoor is already setup it will be \n" \
"hidden your specific process,unlimited your session in " \
"metasploit and transparent."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Screetsec/Vegile.git",
"cd Vegile && sudo chmod +x Vegile"
]
RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
PROJECT_URL = "https://github.com/Screetsec/Vegile"
def before_run(self):
os.system('echo "You can Use Command: \n'
'[!] Vegile -i / --inject [backdoor/rootkit] \n'
'[!] Vegile -u / --unlimited [backdoor/rootkit] \n'
'[!] Vegile -h / --help"|boxes -d parchment')
class ChromeKeyLogger(HackingTool):
TITLE = "Chrome Keylogger"
DESCRIPTION = "Hera Chrome Keylogger"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UndeadSec/HeraKeylogger.git",
"cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger"
class PostExploitationTools(HackingToolsCollection):
TITLE = "Post exploitation tools"
TOOLS = [
Vegile(),
ChromeKeyLogger()
]

View File

@ -0,0 +1,36 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class Stitch(HackingTool):
TITLE = "Stitch"
DESCRIPTION = "Stitch is a cross platform python framework.\n" \
"which allows you to build custom payloads\n" \
"For Windows, Mac and Linux."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/nathanlopez/Stitch.git",
"cd Stitch;sudo pip install -r lnx_requirements.txt"
]
RUN_COMMANDS = ["cd Stitch;python main.py"]
PROJECT_URL = "https://github.com/nathanlopez/Stitch"
class Pyshell(HackingTool):
TITLE = "Pyshell"
DESCRIPTION = "Pyshell is a Rat Tool that can be able to download & upload " \
"files,\n Execute OS Command and more.."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/khalednassar702/Pyshell.git;"
"sudo pip install pyscreenshot python-nmap requests"
]
RUN_COMMANDS = ["cd Pyshell;./Pyshell"]
PROJECT_URL = "https://github.com/knassar702/pyshell"
class RemoteAdministrationTools(HackingToolsCollection):
TITLE = "Remote Administrator Tools (RAT)"
TOOLS = [
Stitch(),
Pyshell()
]

View File

@ -0,0 +1,56 @@
# coding=utf-8
import subprocess
from core import HackingTool
from core import HackingToolsCollection
class AndroGuard(HackingTool):
TITLE = "Androguard"
DESCRIPTION = "Androguard is a Reverse engineering, Malware and goodware " \
"analysis of Android applications and more"
INSTALL_COMMANDS = ["sudo pip install -U androguard"]
PROJECT_URL = "https://github.com/androguard/androguard "
def __init__(self):
super(AndroGuard, self).__init__(runnable = False)
class Apk2Gold(HackingTool):
TITLE = "Apk2Gold"
DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/lxdvs/apk2gold.git",
"cd apk2gold;sudo bash make.sh"
]
PROJECT_URL = "https://github.com/lxdvs/apk2gold "
def run(self):
uinput = input("Enter (.apk) File >> ")
subprocess.run(["sudo", "apk2gold", uinput])
class Jadx(HackingTool):
TITLE = "JadX"
DESCRIPTION = "Jadx is Dex to Java decompiler.\n" \
"[*] decompile Dalvik bytecode to java classes from APK, dex," \
" aar and zip files\n" \
"[*] decode AndroidManifest.xml and other resources from " \
"resources.arsc"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/skylot/jadx.git",
"cd jadx;./gradlew dist"
]
PROJECT_URL = "https://github.com/skylot/jadx"
def __init__(self):
super(Jadx, self).__init__(runnable = False)
class ReverseEngineeringTools(HackingToolsCollection):
TITLE = "Reverse engineering tools"
TOOLS = [
AndroGuard(),
Apk2Gold(),
Jadx()
]

117
tools/sql_tools.py Normal file
View File

@ -0,0 +1,117 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class Sqlmap(HackingTool):
TITLE = "Sqlmap tool"
DESCRIPTION = "sqlmap is an open source penetration testing tool that " \
"automates the process of \n" \
"detecting and exploiting SQL injection flaws and taking " \
"over of database servers \n " \
"[!] python sqlmap.py -u [<http://example.com>] --batch --banner \n " \
"More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
INSTALL_COMMANDS = [
"sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
def __init__(self):
super(Sqlmap, self).__init__(runnable = False)
class NoSqlMap(HackingTool):
TITLE = "NoSqlMap"
DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \
"audit for as well as automate injection attacks and exploit.\n " \
"\033[91m " \
"[*] Please Install MongoDB \n "
INSTALL_COMMANDS = [
"git clone https://github.com/codingo/NoSQLMap.git",
"sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install"
]
RUN_COMMANDS = ["python NoSQLMap"]
PROJECT_URL = "https://github.com/codingo/NoSQLMap"
class SQLiScanner(HackingTool):
TITLE = "Damn Small SQLi Scanner"
DESCRIPTION = "Damn Small SQLi Scanner (DSSS) is a fully functional SQL " \
"injection\nvulnerability scanner also supporting GET and " \
"POST parameters.\n" \
"[*]python3 dsss.py -h[help] | -u[URL]"
INSTALL_COMMANDS = ["git clone https://github.com/stamparm/DSSS.git"]
PROJECT_URL = "https://github.com/stamparm/DSSS"
def __init__(self):
super(SQLiScanner, self).__init__(runnable = False)
class Explo(HackingTool):
TITLE = "Explo"
DESCRIPTION = "Explo is a simple tool to describe web security issues " \
"in a human and machine readable format.\n " \
"Usage:- \n " \
"[1] explo [--verbose|-v] testcase.yaml \n " \
"[2] explo [--verbose|-v] examples/*.yaml"
INSTALL_COMMANDS = [
"git clone https://github.com/dtag-dev-sec/explo.git",
"cd explo;sudo python setup.py install"
]
PROJECT_URL = "https://github.com/dtag-dev-sec/explo"
def __init__(self):
super(Explo, self).__init__(runnable = False)
class Blisqy(HackingTool):
TITLE = "Blisqy - Exploit Time-based blind-SQL injection"
DESCRIPTION = "Blisqy is a tool to aid Web Security researchers to find " \
"Time-based Blind SQL injection \n on HTTP Headers and also " \
"exploitation of the same vulnerability.\n " \
"For Usage >> \n"
INSTALL_COMMANDS = ["git clone https://github.com/JohnTroony/Blisqy.git"]
PROJECT_URL = "https://github.com/JohnTroony/Blisqy"
def __init__(self):
super(Blisqy, self).__init__(runnable = False)
class Leviathan(HackingTool):
TITLE = "Leviathan - Wide Range Mass Audit Toolkit"
DESCRIPTION = "Leviathan is a mass audit toolkit which has wide range " \
"service discovery,\nbrute force, SQL injection detection " \
"and running custom exploit capabilities. \n " \
"[*] It Requires API Keys \n " \
"More Usage [!] https://github.com/utkusen/leviathan/wiki"
INSTALL_COMMANDS = [
"git clone https://github.com/leviathan-framework/leviathan.git",
"cd leviathan;sudo pip install -r requirements.txt"
]
RUN_COMMANDS = ["cd leviathan;python leviathan.py"]
PROJECT_URL = "https://github.com/leviathan-framework/leviathan"
class SQLScan(HackingTool):
TITLE = "SQLScan"
DESCRIPTION = "sqlscan is quick web scanner for find an sql inject point." \
" not for educational, this is for hacking."
INSTALL_COMMANDS = [
"sudo apt install php php-bz2 php-curl php-mbstring curl",
"sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan",
"chmod +x /usr/local/bin/sqlscan"
]
RUN_COMMANDS = ["sudo sqlscan"]
PROJECT_URL = "https://github.com/Cvar1984/sqlscan"
class SqlInjectionTools(HackingToolsCollection):
TITLE = "SQL Injection Tools"
TOOLS = [
Sqlmap(),
NoSqlMap(),
SQLiScanner(),
Explo(),
Blisqy(),
Leviathan(),
SQLScan()
]

68
tools/steganography.py Normal file
View File

@ -0,0 +1,68 @@
# coding=utf-8
import subprocess
from core import HackingTool
from core import HackingToolsCollection
from core import validate_input
class SteganoHide(HackingTool):
TITLE = "SteganoHide"
INSTALL_COMMANDS = ["sudo apt-get install steghide -y"]
def run(self):
choice_run = input(
"[1] Hide\n"
"[2] Extract\n"
"[99]Cancel\n"
">> ")
choice_run = validate_input(choice_run, [1, 2, 99])
if choice_run is None:
print("Please choose a valid input")
return self.run()
if choice_run == 99:
return
if choice_run == 1:
file_hide = input("Enter Filename you want to Embed (1.txt) >> ")
file_to_be_hide = input("Enter Cover Filename(test.jpeg) >> ")
subprocess.run(
["steghide", "embed", "-cf", file_to_be_hide, "-ef", file_hide])
elif choice_run == "2":
from_file = input("Enter Filename From Extract Data >> ")
subprocess.run(["steghide", "extract", "-sf", from_file])
class StegnoCracker(HackingTool):
TITLE = "StegnoCracker"
DESCRIPTION = "SteganoCracker is a tool that uncover hidden data inside " \
"files\n using brute-force utility"
INSTALL_COMMANDS = [
"pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall"]
def run(self):
filename = input("Enter Filename:- ")
passfile = input("Enter Wordlist Filename:- ")
subprocess.run(["stegcracker", filename, passfile])
class Whitespace(HackingTool):
TITLE = "Whitespace"
DESCRIPTION = "Use whitespace and unicode chars for steganography"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/beardog108/snow10.git",
"sudo chmod -R 755 snow10"
]
RUN_COMMANDS = ["cd snow10 && firefox index.html"]
PROJECT_URL = "https://github.com/beardog108/snow10"
class SteganographyTools(HackingToolsCollection):
TITLE = "Steganograhy tools"
TOOLS = [
SteganoHide(),
StegnoCracker(),
Whitespace()
]

66
tools/tool_manager.py Normal file
View File

@ -0,0 +1,66 @@
# coding=utf-8
import os
from time import sleep
from core import HackingTool
from core import HackingToolsCollection
class UpdateTool(HackingTool):
TITLE = "Update Tool or System"
DESCRIPTION = "Update Tool or System"
def __init__(self):
super(UpdateTool, self).__init__([
("Update System", self.update_sys),
("Update Hackingtool", self.update_ht)
], installable = False, runnable = False)
def update_sys(self):
os.system("sudo apt update && sudo apt full-upgrade -y")
os.system(
"sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl")
os.system("sudo apt-get install python3-pip")
def update_ht(self):
os.system("sudo chmod +x /etc/;"
"sudo chmod +x /usr/share/doc;"
"sudo rm -rf /usr/share/doc/hackingtool/;"
"cd /etc/;"
"sudo rm -rf /etc/hackingtool/;"
"mkdir hackingtool;"
"cd hackingtool;"
"git clone https://github.com/Z4nzu/hackingtool.git;"
"cd hackingtool;"
"sudo chmod +x install.sh;"
"./install.sh")
class UninstallTool(HackingTool):
TITLE = "Uninstall HackingTool"
DESCRIPTION = "Uninstall HackingTool"
def __init__(self):
super(UninstallTool, self).__init__([
('Uninstall', self.uninstall)
], installable = False, runnable = False)
def uninstall(self):
print("hackingtool started to uninstall..\n")
sleep(1)
os.system("sudo chmod +x /etc/;"
"sudo chmod +x /usr/share/doc;"
"sudo rm -rf /usr/share/doc/hackingtool/;"
"cd /etc/;"
"sudo rm -rf /etc/hackingtool/;")
print("\nHackingtool Successfully Uninstalled..")
print("Happy Hacking..!!")
sleep(1)
class ToolManager(HackingToolsCollection):
TITLE = "Update or Uninstall | Hackingtool"
TOOLS = [
UpdateTool(),
UninstallTool()
]

113
tools/webattack.py Normal file
View File

@ -0,0 +1,113 @@
# coding=utf-8
import subprocess
from core import HackingTool
from core import HackingToolsCollection
class Web2Attack(HackingTool):
TITLE = "Web2Attack"
DESCRIPTION = "Web hacking framework with tools, exploits by python"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/santatic/web2attack.git"]
RUN_COMMANDS = ["cd web2attack && sudo bash w2aconsole"]
PROJECT_URL = "https://github.com/santatic/web2attack"
class Skipfish(HackingTool):
TITLE = "Skipfish"
DESCRIPTION = "Skipfish Fully automated, active web application " \
"security reconnaissance tool \n " \
"Usage: skipfish -o [FolderName] targetip/site"
RUN_COMMANDS = [
"sudo skipfish -h",
'echo "skipfish -o [FolderName] targetip/site"|boxes -d headline | lolcat'
]
def __init__(self):
super(Skipfish, self).__init__(installable = False)
class SubDomainFinder(HackingTool):
TITLE = "SubDomain Finder"
DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
"subdomains of websites using OSINT \n " \
"Usage:\n\t" \
"[1] python sublist3r.py -d example.com \n" \
"[2] python sublist3r.py -d example.com -p 80,443"
INSTALL_COMMANDS = [
"sudo pip install requests argparse dnspython",
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
"cd Sublist3r && sudo pip install -r requirements.txt"
]
RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"]
PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
class CheckURL(HackingTool):
TITLE = "CheckURL"
DESCRIPTION = "Detect evil urls that uses IDN Homograph Attack.\n\t" \
"[!] python3 checkURL.py --url google.com"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UndeadSec/checkURL.git"]
RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"]
PROJECT_URL = "https://github.com/UndeadSec/checkURL"
class Blazy(HackingTool):
TITLE = "Blazy(Also Find ClickJacking)"
DESCRIPTION = "Blazy is a modern login page bruteforcer"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
"cd Blazy && sudo pip install -r requirements.txt"
]
RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"]
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
class SubDomainTakeOver(HackingTool):
TITLE = "Sub-Domain TakeOver"
DESCRIPTION = "Sub-domain takeover vulnerability occur when a sub-domain " \
"\n (subdomain.example.com) is pointing to a service " \
"(e.g: GitHub, AWS/S3,..)\n" \
"that has been removed or deleted.\n" \
"Usage:python3 takeover.py -d www.domain.com -v"
INSTALL_COMMANDS = [
"git clone https://github.com/m4ll0k/takeover.git",
"cd takeover;sudo python3 setup.py install"
]
PROJECT_URL = "https://github.com/m4ll0k/takeover"
def __init__(self):
super(SubDomainTakeOver, self).__init__(runnable = False)
class Dirb(HackingTool):
TITLE = "Dirb"
DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
"(and/or hidden) Web Objects.\n" \
"It basically works by launching a dictionary based " \
"attack against \n a web server and analizing the response."
INSTALL_COMMANDS = [
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
"cd dirb;sudo ./configure;make"
]
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
def run(self):
uinput = input("Enter Url >> ")
subprocess.run(["sudo", "dirb", uinput])
class WebAttackTools(HackingToolsCollection):
TITLE = "Web Attack tools"
DESCRIPTION = ""
TOOLS = [
Web2Attack(),
Skipfish(),
SubDomainFinder(),
CheckURL(),
Blazy(),
SubDomainTakeOver(),
Dirb()
]

View File

@ -0,0 +1,155 @@
# coding=utf-8
import os
from core import HackingTool
from core import HackingToolsCollection
class WIFIPumpkin(HackingTool):
TITLE = "WiFi-Pumpkin"
DESCRIPTION = "The WiFi-Pumpkin is a rogue AP framework to easily create " \
"these fake networks\n" \
"all while forwarding legitimate traffic to and from the " \
"unsuspecting target."
INSTALL_COMMANDS = [
"sudo apt install libssl-dev libffi-dev build-essential",
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
"chmod -R 755 wifipumpkin3 && cd wifipumpkin3",
"sudo apt install python3-pyqt5",
"sudo python3 setup.py install"
]
RUN_COMMANDS = ["sudo wifipumpkin3"]
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
class pixiewps(HackingTool):
TITLE = "pixiewps"
DESCRIPTION = "Pixiewps is a tool written in C used to bruteforce offline " \
"the WPS pin\n " \
"exploiting the low or non-existing entropy of some Access " \
"Points, the so-called pixie dust attack"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
"cd pixiewps*/ && make",
"cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh"
]
PROJECT_URL = "https://github.com/wiire/pixiewps"
def run(self):
os.system(
'echo "'
'1.> Put your interface into monitor mode using '
'\'airmon-ng start {wireless interface}\n'
'2.> wash -i {monitor-interface like mon0}\'\n'
'3.> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f"'
'| boxes -d boy')
print("You Have To Run Manually By USing >>pixiewps -h ")
class BluePot(HackingTool):
TITLE = "Bluetooth Honeypot GUI Framework"
DESCRIPTION = "You need to have at least 1 bluetooh receiver " \
"(if you have many it will work with those, too).\n" \
"You must install/libbluetooth-dev on " \
"Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
INSTALL_COMMANDS = [
"wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz "
"&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar"
]
RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"]
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
class Fluxion(HackingTool):
TITLE = "Fluxion"
DESCRIPTION = "Fluxion is a wifi key cracker using evil twin attack..\n" \
"you need a wireless adaptor for this tool"
INSTALL_COMMANDS = [
"git clone https://github.com/thehackingsage/Fluxion.git",
"cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh",
"cd .. ; sudo chmod +x fluxion.sh"
]
RUN_COMMANDS = ["cd Fluxion;sudo bash fluxion.sh"]
PROJECT_URL = "https://github.com/thehackingsage/Fluxion"
class Wifiphisher(HackingTool):
TITLE = "Wifiphisher"
DESCRIPTION = """
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
victim stations with malware..\n
For More Details Visit >> https://github.com/wifiphisher/wifiphisher
"""
INSTALL_COMMANDS = [
"git clone https://github.com/wifiphisher/wifiphisher.git",
"cd wifiphisher;sudo python3 setup.py install"
]
RUN_COMMANDS = ["cd wifiphisher;sudo wifiphisher"]
PROJECT_URL = "https://github.com/wifiphisher/wifiphisher"
class Wifite(HackingTool):
TITLE = "Wifite"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/derv82/wifite2.git",
"cd wifite2 && sudo python3 setup.py install"
";sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd wifite2; sudo wifite"]
PROJECT_URL = "https://github.com/derv82/wifite2"
class EvilTwin(HackingTool):
TITLE = "EvilTwin"
DESCRIPTION = "Fakeap is a script to perform Evil Twin Attack, by getting" \
" credentials using a Fake page and Fake Access Point"
INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"]
RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
PROJECT_URL = "https://github.com/Z4nzu/fakeap"
class Fastssh(HackingTool):
TITLE = "Fastssh"
DESCRIPTION = "Fastssh is an Shell Script to perform multi-threaded scan" \
" \n and brute force attack against SSH protocol using the " \
"most commonly credentials."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && sudo chmod +x fastssh.sh",
"sudo apt-get install -y sshpass netcat"
]
RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
PROJECT_URL = "https://github.com/Z4nzu/fastssh"
class Howmanypeople(HackingTool):
TITLE = "Howmanypeople"
DESCRIPTION = "Count the number of people around you by monitoring wifi " \
"signals.\n" \
"[@] WIFI ADAPTER REQUIRED* \n[*]" \
"It may be illegal to monitor networks for MAC addresses, \n" \
"especially on networks that you do not own. " \
"Please check your country's laws"
INSTALL_COMMANDS = [
"sudo apt-get install tshark"
";sudo pip install howmanypeoplearearound"
]
RUN_COMMANDS = ["sudo howmanypeoplearearound"]
class WirelessAttackTools(HackingToolsCollection):
TITLE = "Wireless attack tools"
DESCRIPTION = ""
TOOLS = [
WIFIPumpkin(),
pixiewps(),
BluePot(),
Fluxion(),
Wifiphisher(),
Wifite(),
EvilTwin(),
Fastssh(),
Howmanypeople()
]

View File

@ -0,0 +1,59 @@
# coding=utf-8
from core import HackingTool
from core import HackingToolsCollection
class Cupp(HackingTool):
TITLE = "Cupp"
DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
"and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
PROJECT_URL = "https://github.com/Mebus/cupp.git"
def __init__(self):
super(Cupp, self).__init__(runnable = False)
class WlCreator(HackingTool):
TITLE = "WordlistCreator"
DESCRIPTION = "WlCreator is a C program that can create all possibilities" \
" of passwords,\n and you can choose Lenght, Lowercase, " \
"Capital, Numbers and Special Chars"
INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/wlcreator.git"]
RUN_COMMANDS = [
"cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5"]
PROJECT_URL = "https://github.com/Z4nzu/wlcreator"
class GoblinWordGenerator(HackingTool):
TITLE = "Goblin WordGenerator"
DESCRIPTION = "Goblin WordGenerator"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git"]
RUN_COMMANDS = ["cd GoblinWordGenerator && python3 goblin.py"]
PROJECT_URL = "https://github.com/UndeadSec/GoblinWordGenerator.git"
class showme(HackingTool):
TITLE = "Password list (1.4 Billion Clear Text Password)"
DESCRIPTION = "This tool allows you to perform OSINT and reconnaissance on " \
"an organisation or an individual. It allows one to search " \
"1.4 Billion clear text credentials which was dumped as " \
"part of BreachCompilation leak. This database makes " \
"finding passwords faster and easier than ever before."
INSTALL_COMMANDS = [
"sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git",
"cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd SMWYG-Show-Me-What-You-Got && python SMWYG.py"]
PROJECT_URL = "https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got"
class WordlistGeneratorTools(HackingToolsCollection):
TITLE = "Wordlist Generator"
TOOLS = [
Cupp(),
WlCreator(),
GoblinWordGenerator(),
showme()
]

145
tools/xss_attack.py Normal file
View File

@ -0,0 +1,145 @@
# coding=utf-8
import os
import subprocess
from core import HackingTool
from core import HackingToolsCollection
class Dalfox(HackingTool):
TITLE = "DalFox(Finder of XSS)"
DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
INSTALL_COMMANDS = [
"sudo apt-get install golang",
"sudo git clone https://github.com/hahwul/dalfox",
"cd dalfox;go install"
]
RUN_COMMANDS = [
"~/go/bin/dalfox",
'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"'
]
PROJECT_URL = "https://github.com/hahwul/dalfox"
class XSSPayloadGenerator(HackingTool):
TITLE = "XSS Payload Generator"
DESCRIPTION = "XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER"
INSTALL_COMMANDS = [
"git clone https://github.com/capture0x/XSS-LOADER.git",
"cd XSS-LOADER;sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd XSS-LOADER;sudo python3 payloader.py"]
PROJECT_URL = "https://github.com/capture0x/XSS-LOADER.git"
class XSSFinder(HackingTool):
TITLE = "Extended XSS Searcher and Finder"
DESCRIPTION = "Extended XSS Searcher and Finder"
INSTALL_COMMANDS = [
"git glone https://github.com/Damian89/extended-xss-search.git"]
PROJECT_URL = "https://github.com/Damian89/extended-xss-search"
def after_install(self):
print("""\033[96m
Follow This Steps After Installation:-
\033[31m [*] Go To extended-xss-search directory,
and Rename the example.app-settings.conf to app-settings.conf
""")
input("Press ENTER to continue")
def run(self):
print("""\033[96m
You have To Add Links to scan
\033[31m[!] Go to extended-xss-search
[*] config/urls-to-test.txt
[!] python3 extended-xss-search.py
""")
class XSSFreak(HackingTool):
TITLE = "XSS-Freak"
DESCRIPTION = "XSS-Freak is an XSS scanner fully written in python3 from scratch"
INSTALL_COMMANDS = [
"git clone https://github.com/PR0PH3CY33/XSS-Freak.git",
"cd XSS-Freak;sudo pip3 install -r requirements.txt"
]
RUN_COMMANDS = ["cd XSS-Freak;sudo python3 XSS-Freak.py"]
PROJECT_URL = "https://github.com/PR0PH3CY33/XSS-Freak"
class XSpear(HackingTool):
TITLE = "XSpear"
DESCRIPTION = "XSpear is XSS Scanner on ruby gems"
INSTALL_COMMANDS = ["gem install XSpear"]
RUN_COMMANDS = ["XSpear -h"]
PROJECT_URL = "https://github.com/hahwul/XSpear"
class XSSCon(HackingTool):
TITLE = "XSSCon"
INSTALL_COMMANDS = [
"git clone https://github.com/menkrep1337/XSSCon.git",
"sudo chmod 755 -R XSSCon"
]
PROJECT_URL = "https://github.com/menkrep1337/XSSCon"
def run(self):
website = input("Enter Website >> ")
os.system("cd XSSCon;")
subprocess.run(["python3", "xsscon.py", "-u", website])
class XanXSS(HackingTool):
TITLE = "XanXSS"
DESCRIPTION = "XanXSS is a reflected XSS searching tool\n " \
"that creates payloads based from templates"
INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"]
PROJECT_URL = "https://github.com/Ekultek/XanXSS"
def run(self):
os.system("cd XanXSS ;python xanxss.py -h")
print("\033[96m You Have to run it manually By Using\n"
" [!]python xanxss.py [Options]")
class XSSStrike(HackingTool):
TITLE = "Advanced XSS Detection Suite"
DESCRIPTION = "XSStrike is a python script designed to detect and exploit XSS vulnerabilites."
INSTALL_COMMANDS = [
"sudo rm -rf XSStrike",
"git clone https://github.com/UltimateHackers/XSStrike.git "
"&& cd XSStrike && pip install -r requirements.txt"
]
PROJECT_URL = "https://github.com/UltimateHackers/XSStrike"
def __init__(self):
super(XSSStrike, self).__init__(runnable = False)
class RVuln(HackingTool):
TITLE = "RVuln"
DESCRIPTION = "RVuln is multi-threaded and Automated Web Vulnerability " \
"Scanner written in Rust"
INSTALL_COMMANDS = [
"sudo git clone https://github.com/iinc0gnit0/RVuln.git;"
"curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
"source $HOME/.cargo/env",
"sudo apt install openssl-dev;sudo cp -r RVuln/ /usr/bin"
]
RUN_COMMANDS = ["RVuln"]
PROJECT_URL = "https://github.com/iinc0gnit0/RVuln"
class XSSAttackTools(HackingToolsCollection):
TITLE = "XSS Attack Tools"
TOOLS = [
Dalfox(),
XSSPayloadGenerator(),
XSSFinder(),
XSSFreak(),
XSpear(),
XSSCon(),
XanXSS(),
XSSStrike(),
RVuln()
]