mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-15 04:05:29 +00:00
2527 lines
92 KiB
Python
2527 lines
92 KiB
Python
##!/usr/bin/env python3
|
||
# -*- coding: UTF-8 -*-
|
||
import os
|
||
import sys
|
||
import webbrowser
|
||
import time
|
||
import socket
|
||
import requests
|
||
from getpass import getpass
|
||
from os import path
|
||
from platform import system
|
||
Logo="""\033[33m
|
||
|
||
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
|
||
███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███
|
||
███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███
|
||
▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███
|
||
▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███
|
||
███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███
|
||
███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄
|
||
███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██
|
||
▀ ▀
|
||
|
||
\033[97m[!] https://github.com/Z4nzu/hackingtool \n
|
||
\033[91m[X] Please Don't Use For illegal Activity [X]
|
||
\033[97m """
|
||
def menu():
|
||
print(Logo + """\033[0m
|
||
\033[97m
|
||
[00]AnonSurf
|
||
[01]Information Gathering
|
||
[02]Wordlist Generator
|
||
[03]Wireless Attack
|
||
[04]SQL Injection Tools
|
||
[05]Phishing Attack
|
||
[06]Web Attack Tool
|
||
[07]Post exploitation
|
||
[08]Forensic Tools
|
||
[09]Payload Creator
|
||
[10]Exploit Frameworks
|
||
[11]Wifi Jamming
|
||
[12]Ddos Attack Tools
|
||
[13]SocialMedia Finder
|
||
[14]XSS Attack Tools
|
||
[15]Steganography
|
||
[16]More Tools
|
||
[17]Update or Uninstall | Hackingtool
|
||
[99]Exit
|
||
""")
|
||
|
||
choice = input("Z4nzu =>> ")
|
||
if choice == "0" or choice == "00":
|
||
clearScr()
|
||
anonsurf()
|
||
elif choice == "1" or choice == "01":
|
||
clearScr()
|
||
info()
|
||
elif choice == "2" or choice == "02":
|
||
clearScr()
|
||
passwd()
|
||
elif choice == "3" or choice == "03":
|
||
clearScr()
|
||
wire()
|
||
elif choice == "4" or choice == "04":
|
||
clearScr()
|
||
sqltool()
|
||
elif choice == "5" or choice == "05":
|
||
clearScr()
|
||
phishattack()
|
||
elif choice == "6" or choice == "06":
|
||
clearScr()
|
||
webAttack()
|
||
elif choice == "7" or choice == "07":
|
||
clearScr()
|
||
postexp()
|
||
elif choice == "8" or choice == "08" :
|
||
clearScr()
|
||
forensic()
|
||
elif choice == "9" or choice == "09" :
|
||
clearScr()
|
||
payloads()
|
||
elif choice == "10":
|
||
clearScr()
|
||
routexp()
|
||
elif choice == "11" :
|
||
clearScr()
|
||
wifijamming()
|
||
elif choice == "12" :
|
||
clearScr()
|
||
Ddos()
|
||
elif choice == "13" :
|
||
clearScr()
|
||
socialfinder()
|
||
elif choice == "14":
|
||
clearScr()
|
||
xsstools()
|
||
elif choice == "15":
|
||
clearScr()
|
||
steganography()
|
||
elif choice == "16":
|
||
clearScr()
|
||
print(Logo)
|
||
others()
|
||
elif choice == "17":
|
||
clearScr()
|
||
print(Logo)
|
||
update()
|
||
elif choice == "99" :
|
||
print("Happy Hacking...")
|
||
time.sleep(1)
|
||
clearScr()
|
||
sys.exit()
|
||
elif choice == "":
|
||
menu()
|
||
else:
|
||
print("\n ERROR: Wrong Input")
|
||
time.sleep(2)
|
||
menu()
|
||
|
||
def anonsurf():
|
||
os.system("figlet -f standard -c Anonmously Hiding Tool | lolcat")
|
||
print("""
|
||
[1] Anonmously Surf
|
||
[2] Multitor
|
||
[99] Back
|
||
""")
|
||
choice = input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
ansurf()
|
||
elif choice == "2":
|
||
clearScr()
|
||
multitor()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def ansurf():
|
||
os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo change Ip. \" |boxes -d boy | lolcat")
|
||
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
|
||
if anc == "1":
|
||
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
|
||
os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf")
|
||
anonsurf()
|
||
elif anc=="2":
|
||
os.system("sudo anonsurf start")
|
||
elif anc == "3":
|
||
os.system("sudo anonsurf stop")
|
||
elif anc == "99":
|
||
anonsurf()
|
||
else :
|
||
menu()
|
||
|
||
def multitor():
|
||
os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git")
|
||
anonsurf()
|
||
elif userchoice == "2":
|
||
os.system("cd multitor && bash multitor.sh")
|
||
elif userchoice == "99":
|
||
anonsurf()
|
||
else :
|
||
menu()
|
||
|
||
def info():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Information Gathering Tools | lolcat")
|
||
print("""
|
||
[1] Nmap
|
||
[2] Dracnmap
|
||
[3] Port Scanning
|
||
[4] Host To IP
|
||
[5] Xerosploit
|
||
[6] RED HAWK (All In One Scanning)
|
||
[7] ReconSpider(For All Scaning)
|
||
[8] IsItDown (Check Website Down/Up)
|
||
[9] Infoga - Email OSINT
|
||
[10] ReconDog
|
||
[11] Striker
|
||
[12] SecretFinder (like API & etc)
|
||
[13] Find Info Using Shodan
|
||
[14] Port Scanner
|
||
[15] Breacher
|
||
[99] Back To Main Menu
|
||
""")
|
||
choice2 = input("Z4nzu =>> ")
|
||
if choice2 == "1":
|
||
nmap()
|
||
if choice2 == "2":
|
||
clearScr()
|
||
Dracnmap()
|
||
if choice2 == "3":
|
||
clearScr()
|
||
ports()
|
||
if choice2 == "4":
|
||
clearScr()
|
||
h2ip()
|
||
if choice2 == "5":
|
||
clearScr()
|
||
xerosploit()
|
||
if choice2 == "6":
|
||
clearScr()
|
||
redhawk()
|
||
elif choice2 == "7":
|
||
clearScr()
|
||
reconspider()
|
||
elif choice2 == "8":
|
||
clearScr()
|
||
isitdown()
|
||
elif choice2 == "9":
|
||
clearScr()
|
||
infogaemail()
|
||
elif choice2 == "99":
|
||
clearScr()
|
||
menu()
|
||
elif choice2 == "10":
|
||
clearScr()
|
||
recondog()
|
||
elif choice2 == "11":
|
||
clearScr()
|
||
striker()
|
||
elif choice2 == "12":
|
||
clearScr()
|
||
secretfinder()
|
||
elif choice2 == "13":
|
||
clearScr()
|
||
shodantool()
|
||
elif choice2 == "14":
|
||
clearScr()
|
||
portscanner()
|
||
elif choice2 == "15":
|
||
clearScr()
|
||
breacher()
|
||
elif choice2 == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def breacher():
|
||
os.system("echo \"An advanced multithreaded admin panel finder written in python.\n Usage : python breacher -u example.com \n\t [!]https://github.com/s0md3v/Breacher \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/s0md3v/Breacher.git")
|
||
info()
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def portscanner():
|
||
os.system("echo \"rang3r is a python script which scans in multi thread\n all alive hosts within your range that you specify.\n\t [!]https://github.com/floriankunushevci/rang3r \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/floriankunushevci/rang3r;sudo pip install termcolor")
|
||
elif choice == "2":
|
||
ipinput=input("Enter Ip >> ")
|
||
os.system("cd rang3r;sudo python rang3r.py --ip {0}".format(ipinput))
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def shodantool():
|
||
os.system("echo \"Get ports,vulnerabilities,informations,banners,..etc \n for any IP with Shodan (no apikey! no rate limit!)\n[X]Don't use this tool because your ip will be blocked by Shodan![X] \n\t [!]https://github.com/m4ll0k/Shodanfy.py \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/m4ll0k/Shodanfy.py.git")
|
||
info()
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def isitdown():
|
||
os.system("echo \"Check Website Is Online or Not \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Open [99]Back >> ")
|
||
if choice == "1":
|
||
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def secretfinder():
|
||
os.system("echo \"SecretFinder - A python script for find sensitive data \nlike apikeys, accesstoken, authorizations, jwt,..etc \n and search anything on javascript files.\n\n Usage: python SecretFinder.py -h \n\t [*]https://github.com/m4ll0k/SecretFinder \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/m4ll0k/SecretFinder.git secretfinder")
|
||
os.system("cd secretfinder; sudo pip3 install -r requirements.txt")
|
||
info()
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def nmap():
|
||
nmapchoice = input("[1]Install [99]BAck >> ")
|
||
if nmapchoice == "1" :
|
||
os.system("sudo git clone https://github.com/nmap/nmap.git")
|
||
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
|
||
info()
|
||
elif nmapchoice == "99":
|
||
info()
|
||
else:
|
||
menu()
|
||
|
||
def striker():
|
||
os.system("echo \"Recon & Vulnerability Scanning Suite [!]https://github.com/s0md3v/Striker \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/s0md3v/Striker.git")
|
||
os.system("cd Striker && pip3 install -r requirements.txt")
|
||
info()
|
||
elif choice == "2":
|
||
tsite= input("Enter Site Name (example.com) >> ")
|
||
os.system("cd Striker && sudo python3 striker.py {0}".format(tsite))
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def redhawk():
|
||
os.system("echo \"All in one tool for Information Gathering and Vulnerability Scanning. \n [!]https://github.com/Tuhinshubhra/RED_HAWK \n\n [!]Please Use command [FIX] After Running Tool first time \" | boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK")
|
||
info()
|
||
elif choice == "2":
|
||
os.system("cd RED_HAWK;php rhawk.php")
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def infogaemail():
|
||
os.system("echo \"Infoga is a tool gathering email accounts informations\n(ip,hostname,country,...) from different public source \n[!]https://github.com/m4ll0k/Infoga \"| boxes -d boy |lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/m4ll0k/Infoga.git")
|
||
os.system("cd infoga;sudo python setup.py install")
|
||
info()
|
||
elif choice == "2":
|
||
os.system("cd infoga;python infoga.py")
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def recondog():
|
||
os.system("echo \"ReconDog Information Gathering Suite \n[!]https://github.com/s0md3v/ReconDog \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/s0md3v/ReconDog.git ")
|
||
info()
|
||
elif choice == "2":
|
||
os.system("cd ReconDog;sudo python dog")
|
||
elif choice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def Dracnmap():
|
||
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help \n [!]https://github.com/Screetsec/Dracnmap \" | boxes -d boy | lolcat")
|
||
dracnap = input("[1]Install [99]Back >> ")
|
||
if dracnap == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ")
|
||
os.system("cd Dracnmap && chmod +x Dracnmap.sh")
|
||
info()
|
||
elif dracnap == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def h2ip():
|
||
host = input("Enter host name(www.google.com) :- ")
|
||
ips = socket.gethostbyname(host)
|
||
print(ips)
|
||
|
||
def ports():
|
||
clearScr()
|
||
target = input('Select a Target IP : ')
|
||
os.system("sudo nmap -O -Pn %s" % target)
|
||
sys.exit()
|
||
|
||
def xerosploit():
|
||
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat")
|
||
xeros=input("[1]Install [2]Run [99]Back >>")
|
||
if xeros == "1":
|
||
os.system("git clone https://github.com/LionSec/xerosploit")
|
||
os.system("cd xerosploit && sudo python install.py")
|
||
info()
|
||
elif xeros == "2":
|
||
os.system("sudo xerosploit")
|
||
elif xeros == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def reconspider():
|
||
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\n :~python3 reconspider.py \n\t [!]https://github.com/bhavsec/reconspider \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
|
||
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
|
||
info()
|
||
# elif userchoice == "2":
|
||
# os.system("cd reconspider && python3 reconspider.py")
|
||
elif userchoice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def setoolkit():
|
||
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy | lolcat")
|
||
choiceset = input("[1]Install [2]Run [99]BAck >>")
|
||
if choiceset == "1":
|
||
os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git")
|
||
os.system("python social-engineer-toolkit/setup.py")
|
||
phishattack()
|
||
if choiceset == "2":
|
||
clearScr()
|
||
os.system("sudo setoolkit")
|
||
elif choiceset == "99":
|
||
phishattack()
|
||
else:
|
||
menu()
|
||
|
||
def passwd():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Wordlist Generator | lolcat")
|
||
print("""
|
||
[01]Cupp
|
||
[02]WordlistCreator
|
||
[03]Goblin WordGenerator
|
||
[04]Credential reuse attacks
|
||
[05]Password list((1.4 Billion Clear Text Password))
|
||
[99]Back To Main Menu
|
||
""")
|
||
passchoice = input("Z4nzu ==>> ")
|
||
if passchoice == "1" or passchoice == "01":
|
||
clearScr()
|
||
cupp()
|
||
elif passchoice == "2" or passchoice == "02":
|
||
clearScr()
|
||
wlcreator()
|
||
elif passchoice == "3" or passchoice == "03":
|
||
clearScr()
|
||
goblinword()
|
||
elif passchoice == "4" or passchoice == "04":
|
||
clearScr()
|
||
credentialattack()
|
||
elif passchoice == "5" or passchoice == "05":
|
||
clearScr()
|
||
showme()
|
||
elif passchoice == "99":
|
||
clearScr()
|
||
menu()
|
||
elif passchoice == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def cupp():
|
||
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy | lolcat ")
|
||
cc=input("[1]Install [99]Back >> ")
|
||
if cc == "1":
|
||
os.system("git clone https://github.com/Mebus/cupp.git")
|
||
passwd()
|
||
elif cc == "2":
|
||
# os.system("cd cupp && ./cupp.py -h")
|
||
pass
|
||
elif cc == "99" :
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def wlcreator():
|
||
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Z4nzu/wlcreator")
|
||
passwd()
|
||
elif userchoice == "2":
|
||
os.system("cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def goblinword():
|
||
os.system("echo \" GoblinWordGenerator \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git")
|
||
passwd()
|
||
elif userchoice == "2":
|
||
os.system("cd GoblinWordGenerator && python3 goblin.py")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def credentialattack():
|
||
os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git")
|
||
os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt")
|
||
passwd()
|
||
elif userchoice == "2" :
|
||
os.system("cd Cr3dOv3r && sudo python3 Cr3d0v3r.py -h")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def wire():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Wireless Attack Tools | lolcat")
|
||
print("""
|
||
[1] WiFi-Pumpkin
|
||
[2] pixiewps
|
||
[3] Bluetooth Honeypot GUI Framework
|
||
[4] Fluxion
|
||
[5] Wifiphisher
|
||
[6] Wifite
|
||
[7] EvilTwin
|
||
[8] Howmanypeople
|
||
[99]Back To The Main Menu """)
|
||
choice4 = input("Z4nzu ==>> ")
|
||
if choice4 == "1":
|
||
clearScr()
|
||
wifipumkin()
|
||
if choice4 == "2":
|
||
clearScr()
|
||
pixiewps()
|
||
if choice4 == "3":
|
||
clearScr()
|
||
bluepot()
|
||
if choice4 == "4":
|
||
clearScr()
|
||
fluxion()
|
||
if choice4 == "5":
|
||
clearScr()
|
||
wifiphisher()
|
||
elif choice4 == "6":
|
||
clearScr()
|
||
wifite()
|
||
elif choice4 == "7":
|
||
clearScr()
|
||
eviltwin()
|
||
elif choice4== "8":
|
||
clearScr()
|
||
howmanypeople()
|
||
elif choice4 == "99":
|
||
menu()
|
||
elif choice4 == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def howmanypeople():
|
||
os.system("echo \"Count the number of people around you by monitoring wifi signals.\n[@]WIFI ADAPTER REQUIRED* \n[*]It may be illegal to monitor networks for MAC addresses, \nespecially on networks that you do not own. Please check your country's laws\n\t [!]https://github.com/An0nUD4Y/howmanypeoplearearound \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt-get install tshark;sudo pip install howmanypeoplearearound")
|
||
wire()
|
||
elif choice == "2":
|
||
os.system("sudo howmanypeoplearearound")
|
||
elif choice == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def wifipumkin():
|
||
os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy | lolcat")
|
||
wp=input("[1]Install [2]Run [99]Back >>")
|
||
if wp == "1":
|
||
os.system("sudo apt install libssl-dev libffi-dev build-essential")
|
||
os.system("sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git")
|
||
os.system("chmod -R 755 wifipumpkin3 && cd wifipumpkin3")
|
||
os.system("sudo apt install python3-pyqt5 ")
|
||
os.system("sudo python3 setup.py install")
|
||
wire()
|
||
elif wp == "2":
|
||
clearScr()
|
||
os.system("sudo wifipumpkin3")
|
||
elif wp == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def pixiewps():
|
||
os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy | lolcat")
|
||
choicewps = input("[1]Install [2]Run [99]Back >> ")
|
||
if choicewps == "1":
|
||
os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential")
|
||
os.system("cd pixiewps*/ && make ")
|
||
os.system("cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh")
|
||
if choicewps == "2":
|
||
os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy")
|
||
print("You Have To Run Manually By USing >>pixiewps -h ")
|
||
pass
|
||
elif choicewps == "99":
|
||
wire()
|
||
else:
|
||
menu()
|
||
|
||
def bluepot():
|
||
os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar")
|
||
time.sleep(3)
|
||
wire()
|
||
elif choice == "2":
|
||
os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar")
|
||
elif choice == "99":
|
||
wire()
|
||
else:
|
||
menu()
|
||
|
||
def fluxion():
|
||
os.system("echo \"Fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >>")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
|
||
os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh")
|
||
os.system("cd .. ; sudo chmod +x fluxion.sh")
|
||
time.sleep(2)
|
||
wire()
|
||
elif choice == "2":
|
||
os.system("cd Fluxion;sudo bash fluxion.sh")
|
||
elif choice == "99" :
|
||
wire()
|
||
else:
|
||
menu()
|
||
|
||
def wifiphisher():
|
||
print("""
|
||
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
|
||
Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
|
||
targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
|
||
connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
|
||
victim stations with malware..
|
||
""")
|
||
print("For More Details Visit >> https://github.com/wifiphisher/wifiphisher")
|
||
wchoice=input("[1]Install [2]Run [99]Back >> ")
|
||
if wchoice == "1":
|
||
os.system("git clone https://github.com/wifiphisher/wifiphisher.git")
|
||
os.system("cd wifiphisher && sudo python3 setup.py install")
|
||
wire()
|
||
if wchoice == "2":
|
||
os.system("cd wifiphisher && sudo wifiphisher")
|
||
elif wchoice == "99" :
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def wifite():
|
||
os.system("echo \"[!]https://github.com/derv82/wifite2 \"|boxes -d boy | lolcat")
|
||
wc=input("[1]Install [2]Run [99]Back >> ")
|
||
if wc == "1":
|
||
os.system("sudo git clone https://github.com/derv82/wifite2.git")
|
||
os.system("cd wifite2 && sudo python3 setup.py install ; sudo pip3 install -r requirements.txt")
|
||
time.sleep(3)
|
||
wire()
|
||
elif wc =="2":
|
||
os.system("cd wifite2 && sudo wifite")
|
||
elif wc == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def eviltwin():
|
||
os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Z4nzu/fakeap")
|
||
wire()
|
||
elif userchoice == "2":
|
||
os.system("cd fakeap && sudo bash fakeap.sh")
|
||
elif userchoice == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def socialattack():
|
||
clearScr()
|
||
os.system("figlet -f standard SocialMedia Attack | lolcat")
|
||
print("""
|
||
[1] Instagram Attack
|
||
[2] AllinOne SocialMedia Attack
|
||
[3] Facebook Attack
|
||
[4] Application Checker
|
||
[99]Back To Menu
|
||
""")
|
||
choice=input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
instabrute()
|
||
elif choice == "2":
|
||
clearScr()
|
||
bruteforce()
|
||
elif choice == "3":
|
||
clearScr()
|
||
faceshell()
|
||
elif choice == "4" :
|
||
clearScr()
|
||
appcheck()
|
||
elif choice == "99" :
|
||
others()
|
||
else :
|
||
menu()
|
||
|
||
def instabrute():
|
||
os.system("echo \"Brute force attack against Instagram \n\t [!]https://github.com/chinoogawa/instaBrute \"| boxes -d boy | lolcat")
|
||
instachoice=input("[1]install [2]Run [99]Back >> ")
|
||
if instachoice == "1":
|
||
os.system("sudo git clone https://github.com/chinoogawa/instaBrute.git ")
|
||
os.system("cd instaBrute;sudo pip install -r requirements.txt")
|
||
socialattack()
|
||
elif instachoice == "2":
|
||
uname = input("Enter Username >> ")
|
||
passinput=input("Enter wordword list >> ")
|
||
os.system("cd instaBrute;sudo python instaBrute.py -u {0} -d {1}".format(uname,passinput))
|
||
elif instachoice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def bruteforce():
|
||
os.system("echo \"Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n[!]python3 Brute_Force.py -g <Account@gmail.com> -l <File_list> \n\t[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat")
|
||
choice = input ("[1]Install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git")
|
||
os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize")
|
||
socialattack()
|
||
elif choice == "2":
|
||
os.system("cd Brute_Force;python3 Brute_Force.py -h")
|
||
elif choice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def faceshell():
|
||
os.system("echo \" Facebook BruteForcer[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat")
|
||
choice = input ("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git")
|
||
os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize")
|
||
socialattack()
|
||
elif choice == "2":
|
||
uname=input("Enter Username >> ")
|
||
passinput=input("Enter Wordlist >> ")
|
||
os.system("cd Brute_Force;python3 Brute_Force.py -f {0} -l {1}".format(uname,passinput))
|
||
elif choice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def appcheck():
|
||
os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/jakuta-tech/underhanded")
|
||
os.system("cd underhanded && sudo chmod +x underhanded.sh")
|
||
socialattack()
|
||
elif userchoice == "2":
|
||
os.system("cd underhanded ; sudo bash underhanded.sh")
|
||
elif userchoice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def phishattack():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Phishing Attack Tools | lolcat")
|
||
print("""
|
||
[1] Setoolkit
|
||
[2] SocialFish
|
||
[3] HiddenEye
|
||
[4] Evilginx2
|
||
[5] I-See_You(Get Location using phishing attack)
|
||
[6] SayCheese (Grab target's Webcam Shots)
|
||
[7] QR Code Jacking
|
||
[8] ShellPhish
|
||
[99]Back To Main Menu
|
||
""")
|
||
choice = input("Z4nzu ==>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
setoolkit()
|
||
if choice == "2":
|
||
clearScr()
|
||
socialfish()
|
||
if choice == "3":
|
||
clearScr()
|
||
hiddeneye()
|
||
if choice == "4":
|
||
clearScr()
|
||
evilginx()
|
||
elif choice == "5":
|
||
clearScr()
|
||
iseeyou()
|
||
elif choice == "6":
|
||
clearScr()
|
||
saycheese()
|
||
elif choice == "7":
|
||
clearScr()
|
||
qrjacking()
|
||
elif choice == "8":
|
||
clearScr()
|
||
shellphish()
|
||
elif choice == "99":
|
||
clearScr()
|
||
menu()
|
||
elif choice == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def socialfish():
|
||
os.system("echo \"Automated Phishing Tool & Information Collector \n\t[!]https://github.com/UndeadSec/SocialFish \"|boxes -d boy | lolcat")
|
||
choice=input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
|
||
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
|
||
time.sleep(2)
|
||
phishattack()
|
||
elif choice =="2":
|
||
os.system("cd SocialFish && sudo python3 SocialFish.py root pass")
|
||
elif choice =="99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def hiddeneye():
|
||
os.system("echo \"Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services \n\t [!]https://github.com/DarkSecDevelopers/HiddenEye \"|boxes -d boy | lolcat ")
|
||
choice=input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye")
|
||
os.system("cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok")
|
||
phishattack()
|
||
elif choice =="2":
|
||
os.system("cd HiddenEye;sudo python3 HiddenEye.py")
|
||
elif choice =="99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def evilginx():
|
||
os.system("echo \"evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies,\nwhich in turn allows to bypass 2-factor authentication protection.\n\n\t [+]Make sure you have installed GO of version at least 1.14.0 \n[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t [+]export GOPATH=$HOME/go \n [+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n[+]Then load it with source ~/.profiles.\n [*]https://github.com/An0nUD4Y/evilginx2 \"|boxes -d boy | lolcat")
|
||
choice=input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2")
|
||
os.system("cd $GOPATH/src/github.com/kgretzky/evilginx2;make")
|
||
os.system("sudo make install;sudo evilginx")
|
||
time.sleep(2)
|
||
phishattack()
|
||
elif choice =="2":
|
||
os.system("sudo evilginx")
|
||
elif choice =="99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def shellphish():
|
||
os.system("echo \"Phishing Tool for 18 social media \n [!]https://github.com/An0nUD4Y/shellphish \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/An0nUD4Y/shellphish")
|
||
elif choice == "2":
|
||
os.system("cd shellphish;sudo bash shellphish.sh")
|
||
elif choice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def iseeyou():
|
||
os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git")
|
||
os.system("cd I-See-You && sudo chmod u+x ISeeYou.sh")
|
||
phishattack()
|
||
elif userchoice == "2":
|
||
os.system("cd I-See-You && sudo bash ISeeYou.sh")
|
||
elif userchoice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def saycheese():
|
||
os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/hangetzzu/saycheese")
|
||
phishattack()
|
||
elif userchoice == "2":
|
||
os.system("cd saycheese && sudo bash saycheese.sh")
|
||
elif userchoice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def qrjacking():
|
||
os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/cryptedwolf/ohmyqr && sudo apt-get install scrot")
|
||
phishattack()
|
||
elif userchoice == "2":
|
||
os.system("cd ohmyqr && sudo bash ohmyqr.sh")
|
||
elif userchoice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def socialfinder():
|
||
clearScr()
|
||
os.system("figlet -f standard SocialMedia Finder | lolcat")
|
||
print("""
|
||
[1]Find SocialMedia By Facial Recognation System
|
||
[2]Find SocialMedia By UserName
|
||
[3]Sherlock
|
||
[4]SocialScan | Username or Email
|
||
[99]Back To Main Menu
|
||
""")
|
||
choice =input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
facialfind()
|
||
elif choice == "2":
|
||
clearScr()
|
||
finduser()
|
||
elif choice == "3":
|
||
clearScr()
|
||
sherlock()
|
||
elif choice == "4":
|
||
clearScr()
|
||
socialscan()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def socialscan():
|
||
os.system("echo \"Check email address and username availability on online platforms with 100% accuracy \n\t[*]https://github.com/iojw/socialscan \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo pip install socialscan")
|
||
elif choice == "2":
|
||
uname =input("Enter Username or Emailid (if both then please space between email & username) >>")
|
||
os.system("sudo socialscan {0}".format(uname))
|
||
elif choice == "99":
|
||
socialfinder()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def sherlock():
|
||
os.system("echo \"Hunt down social media accounts by username across social networks \n For More Usege \n\t >>python3 sherlock --help \n [!]https://github.com/sherlock-project/sherlock \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/sherlock-project/sherlock.git")
|
||
os.system("cd sherlock ;sudo python3 -m pip install -r requirements.txt")
|
||
elif choice == "2":
|
||
uname= input("Enter Username >> ")
|
||
os.system("cd sherlock ;sudo python3 sherlock {0}".format(uname))
|
||
elif choice == "99":
|
||
socialfinder()
|
||
else :
|
||
menu()
|
||
|
||
def facialfind():
|
||
os.system("echo \"A Social Media Mapping Tool that correlates profiles\n via facial recognition across different sites. \n\t[!]https://github.com/Greenwolf/social_mapper \"|boxes -d boy | lolcat")
|
||
choice=input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade")
|
||
os.system("sudo git clone https://github.com/Greenwolf/social_mapper.git")
|
||
os.system("cd social_mapper/setup")
|
||
os.system("sudo python3 -m pip install --no-cache-dir -r requirements.txt")
|
||
os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes | lolcat")
|
||
elif choice == "2":
|
||
os.system("cd social_mapper/setup")
|
||
os.system("sudo python social_mapper.py -h")
|
||
print("""\033[95m
|
||
You have to set Username and password of your AC Or Any Fack Account
|
||
[#]Type in Terminal nano social_mapper.py
|
||
""")
|
||
os.system("echo \"python social_mapper.py -f [<imageFoldername>] -i [<imgFolderPath>] -m fast [<AcName>] -fb -tw\"| boxes | lolcat")
|
||
elif choice == "99" :
|
||
socialfinder()
|
||
else :
|
||
menu()
|
||
|
||
def finduser():
|
||
os.system("echo \"Find usernames across over 75 social networks \n [!]https://github.com/xHak9x/finduser \"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/xHak9x/finduser.git")
|
||
os.system("cd finduser && sudo chmod +x finduser.sh")
|
||
time.sleep(3)
|
||
socialfinder()
|
||
elif userchoice == "2":
|
||
os.system("cd finduser && sudo bash finduser.sh")
|
||
elif userchoice == "99":
|
||
socialfinder()
|
||
else :
|
||
menu()
|
||
|
||
def forensic():
|
||
clearScr()
|
||
os.system("figlet -f standard Forensic Tools | lolcat ")
|
||
print("""
|
||
[1] Autopsy
|
||
[2] Wireshark
|
||
[3] Bulk_extractor
|
||
[4] Disk Clone and ISO Image Aquire
|
||
[5] Toolsley
|
||
[99]Back to Menu
|
||
""")
|
||
choice = input("Z4nzu ==>>")
|
||
if choice == "3" :
|
||
bulkextractor()
|
||
elif choice == "4":
|
||
clearScr()
|
||
guymager()
|
||
elif choice == "1":
|
||
clearScr()
|
||
autopsy()
|
||
elif choice == "2":
|
||
clearScr()
|
||
wireshark()
|
||
elif choice == "5":
|
||
clearScr()
|
||
toolsley()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def bulkextractor():
|
||
print("""
|
||
[1]GUI Mode(Download required)
|
||
[2]CLI Mode
|
||
[99]BAck
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/simsong/bulk_extractor.git")
|
||
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
|
||
print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
|
||
print("Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor ")
|
||
elif choice =="2":
|
||
os.system("sudo apt-get install bulk_extractor")
|
||
print("bulk_extractor and options")
|
||
os.system("bulk_extractor")
|
||
os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline | lolcat")
|
||
elif choice == "99":
|
||
forensic()
|
||
elif choice =="":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def guymager():
|
||
os.system("echo \"Guymager is a free forensic imager for media acquisition.\n [!]https://guymager.sourceforge.io/ \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt install guymager")
|
||
forensic()
|
||
elif choice == "2":
|
||
clearScr()
|
||
os.system("sudo guymager")
|
||
elif choice == "99":
|
||
forensic()
|
||
elif choice == "":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def autopsy():
|
||
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy | lolcat")
|
||
choice=input(" [1]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo autopsy")
|
||
if choice == "":
|
||
forensic()
|
||
elif choice =="99":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def wireshark():
|
||
os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
|
||
choice = input("[1]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo wireshark")
|
||
elif choice == "99":
|
||
forensic()
|
||
elif choice == "":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def toolsley():
|
||
os.system("echo \" Toolsley got more than ten useful tools for investigation.\n[+]File signature verifier\n[+]File identifier \n[+]Hash & Validate \n[+]Binary inspector \n [+]Encode text \n[+]Data URI generator \n[+]Password generator \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Open [99]Back >> ")
|
||
if userchoice == "1":
|
||
print("Trying to open WebBrowser ")
|
||
time.sleep(3)
|
||
webbrowser.open_new_tab('https://www.toolsley.com/')
|
||
elif userchoice == "99":
|
||
forensic()
|
||
elif userchoice == "":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def postexp():
|
||
clearScr()
|
||
os.system("figlet -f standard post explotations | lolcat")
|
||
print("""
|
||
[1] Vegile - Ghost In The Shell
|
||
[2] Chrome Keylogger
|
||
[99]Back
|
||
""")
|
||
expchoice = input("Z4nzu =>> ")
|
||
if expchoice == "1":
|
||
clearScr()
|
||
vegile()
|
||
if expchoice == "2":
|
||
clearScr()
|
||
chromekeylogger()
|
||
elif expchoice == "99":
|
||
menu()
|
||
elif expchoice == "":
|
||
postexp()
|
||
else :
|
||
menu()
|
||
|
||
def vegile():
|
||
os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy | lolcat")
|
||
vegilechoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if vegilechoice == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/Vegile.git")
|
||
os.system("cd Vegile && sudo chmod +x Vegile")
|
||
postexp()
|
||
elif vegilechoice == "2":
|
||
os.system("echo \"You can Use Command : \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment")
|
||
os.system("cd Vegile && sudo bash Vegile ")
|
||
pass
|
||
elif vegilechoice == "99":
|
||
postexp()
|
||
else :
|
||
menu()
|
||
|
||
def chromekeylogger():
|
||
os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git")
|
||
os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ")
|
||
postexp()
|
||
elif userchoice == "2":
|
||
os.system("cd HeraKeylogger && sudo python3 hera.py ")
|
||
elif userchoice == "99":
|
||
postexp()
|
||
else :
|
||
menu()
|
||
|
||
def routexp():
|
||
clearScr()
|
||
os.system("figlet -f standard Exploit Framework | lolcat ")
|
||
print("""
|
||
[1] RouterSploit
|
||
[2] WebSploit
|
||
[3] Commix
|
||
[4] Web2Attack
|
||
[5] Fastssh
|
||
[99]Back to menu
|
||
""")
|
||
choice=input("Z4nzu =>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
routersploit()
|
||
elif choice=="99":
|
||
menu()
|
||
elif choice=="5":
|
||
clearScr()
|
||
fastssh()
|
||
elif choice == "3":
|
||
clearScr()
|
||
commix()
|
||
elif choice == "4":
|
||
clearScr()
|
||
web2attack()
|
||
elif choice == "2":
|
||
clearScr()
|
||
websploit()
|
||
elif choice== "":
|
||
routexp()
|
||
else :
|
||
print("Error Wrong Input..")
|
||
routexp()
|
||
|
||
def commix():
|
||
os.system("echo \"Automated All-in-One OS command injection and exploitation tool.\nCommix can be used from web developers, penetration testers or even security researchers\n in order to test web-based applications with the view to find bugs,\n errors or vulnerabilities related to command injection attacks.\n Usage: python commix.py [option(s)] \n\n\t[!]https://github.com/commixproject/commix \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/commixproject/commix.git commix")
|
||
elif choice == "99":
|
||
routexp()
|
||
else :
|
||
menu()
|
||
|
||
def websploit():
|
||
os.system("echo \"Websploit is an advanced MITM framework.\n\t [!]https://github.com/The404Hacking/websploit \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("https://github.com/The404Hacking/websploit.git")
|
||
elif choice == "2":
|
||
os.system("cd websploit;python3 websploit.py")
|
||
elif choice == "99":
|
||
routexp()
|
||
else :
|
||
menu()
|
||
|
||
def routersploit():
|
||
os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy | lolcat")
|
||
choice=input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://www.github.com/threat9/routersploit")
|
||
os.system("cd routersploit && sudo python3 -m pip install -r requirements.txt")
|
||
routexp()
|
||
elif choice == "2":
|
||
os.system("cd routersploit && sudo python3 rsf.py")
|
||
elif choice == "99":
|
||
routexp()
|
||
elif choice == "":
|
||
routexp()
|
||
else :
|
||
menu()
|
||
|
||
def fastssh():
|
||
os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Z4nzu/fastssh && cd fastssh && sudo chmod +x fastssh.sh")
|
||
os.system("sudo apt-get install -y sshpass netcat")
|
||
elif userchoice == "2":
|
||
os.system("cd fastssh && sudo bash fastssh.sh --scan")
|
||
elif userchoice == "99":
|
||
routexp()
|
||
else :
|
||
menu()
|
||
|
||
def webAttack():
|
||
clearScr()
|
||
os.system("figlet 'Web Attack Tools' -f standard -c | lolcat")
|
||
print("""
|
||
[1] Web2Attack
|
||
[2] Skipfish
|
||
[3] SubDomain Finder
|
||
[4] CheckURL
|
||
[5] Blazy(Also Find ClickJacking)
|
||
[6] Sub-Domain TakeOver
|
||
[99]Back To Menu
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
web2attack()
|
||
elif choice == "2":
|
||
skipfish()
|
||
elif choice == "3":
|
||
subdomain()
|
||
elif choice == "4":
|
||
clearScr()
|
||
checkurl()
|
||
elif choice == "5":
|
||
clearScr()
|
||
blazy()
|
||
elif choice == "6":
|
||
clearScr()
|
||
subdomaintakeover()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
print("Wrong Input..")
|
||
webAttack()
|
||
|
||
def subdomaintakeover():
|
||
os.system("echo \"Sub-domain takeover vulnerability occur when a sub-domain \n (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..)\nthat has been removed or deleted.\nUsage :python3 takeover.py -d www.domain.com -v \n\t[!]https://github.com/m4ll0k/takeover \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/m4ll0k/takeover.git")
|
||
os.system("cd takeover;sudo python3 setup.py install")
|
||
webAttack()
|
||
elif choice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def web2attack():
|
||
os.system("echo \"Web hacking framework with tools, exploits by python \n[!]https://github.com/santatic/web2attack \"| boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/santatic/web2attack.git")
|
||
menu()
|
||
elif userchoice == "2":
|
||
os.system("cd web2attack && sudo bash w2aconsole")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def skipfish():
|
||
os.system("echo \"Skipfish – Fully automated, active web application security reconnaissance tool \n Usage : skipfish -o [FolderName] targetip/site \n[!]https://tools.kali.org/web-applications/skipfish \"|boxes -d headline | lolcat")
|
||
userchoice = input("[1]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo skipfish -h")
|
||
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline | lolcat")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def subdomain():
|
||
os.system("echo \"Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT \n Usage:\n\t[1]python sublist3r.py -d example.com \n[2]python sublist3r.py -d example.com -p 80,443\"| boxes -d boy | lolcat")
|
||
choice=input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo pip install requests argparse dnspython")
|
||
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ")
|
||
os.system("cd Sublist3r && sudo pip install -r requirements.txt")
|
||
webAttack()
|
||
elif choice == "2":
|
||
os.system("cd Sublist3r && python sublist3r.py -h")
|
||
elif choice == "99" :
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def checkurl():
|
||
os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/checkURL.git")
|
||
webAttack()
|
||
elif userchoice == "2":
|
||
os.system("cd checkURL && python3 checkURL.py --help")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def blazy():
|
||
os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UltimateHackers/Blazy")
|
||
os.system("cd Blazy && sudo pip install -r requirements.txt")
|
||
webAttack()
|
||
elif userchoice == "2":
|
||
os.system("cd Blazy && sudo python blazy.py")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def androidhack():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Android Hacking Tools | lolcat")
|
||
print("""
|
||
[1] Keydroid
|
||
[2] MySMS
|
||
[3] Lockphish (Grab target LOCK PIN)
|
||
[4] DroidCam (Capture Image)
|
||
[5] EvilApp (Hijack Session)
|
||
[99]Main Menu
|
||
""")
|
||
choice = input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
keydroid()
|
||
elif choice == "2":
|
||
clearScr()
|
||
mysms()
|
||
# elif choice == "3":
|
||
# print("Sorry This Tool Not Available")
|
||
# time.sleep(1)
|
||
# androidhack()
|
||
# # getdroid()
|
||
elif choice == "3":
|
||
clearScr()
|
||
lock()
|
||
# elif choice == "4":
|
||
# print("Sorry This Tool Not Available")
|
||
# time.sleep(1)
|
||
# androidhack()
|
||
# # droidfile()
|
||
# elif choice == "6":
|
||
# clearScr()
|
||
# whatshack()
|
||
elif choice == "4":
|
||
clearScr()
|
||
droidcam()
|
||
elif choice == "5":
|
||
clearScr()
|
||
evilapp()
|
||
elif choice == "99":
|
||
others()
|
||
else :
|
||
menu()
|
||
|
||
def keydroid():
|
||
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n [+]https://github.com/F4dl0/keydroid \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/F4dl0/keydroid")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd keydroid && bash keydroid.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def mysms():
|
||
os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/papusingh2sms/mysms \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/papusingh2sms/mysms")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd mysms && bash mysms.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
# def getdroid():
|
||
# os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy | lolcat")
|
||
# userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
# if userchoice == "1":
|
||
# os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y")
|
||
# androidhack()
|
||
# elif userchoice == "2":
|
||
# os.system("cd getdroid && bash getdroid.sh")
|
||
# elif userchoice == "99":
|
||
# androidhack()
|
||
# else :
|
||
# menu()
|
||
|
||
def lock():
|
||
os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone git clone https://github.com/JasonJerry/lockphish")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd lockphish && bash lockphish.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
# def droidfile():
|
||
# os.system("echo \"Get files from Android directories\"|boxes -d boy | lolcat")
|
||
# userchoice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >>")
|
||
# if userchoice == "1":
|
||
# os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles")
|
||
# elif userchoice == "2":
|
||
# os.system("cd droidfiles && bash droidfiles.sh")
|
||
# elif userchoice == "3":
|
||
# os.system("apt-get install default-jdk apksigner")
|
||
# os.system("apt-get install libc6-dev-i386 lib32z1")
|
||
# os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk")
|
||
# os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1")
|
||
# elif userchoice == "99":
|
||
# androidhack()
|
||
# else :
|
||
# menu()
|
||
|
||
# def whatshack():
|
||
# os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell | lolcat")
|
||
# userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
# if userchoice == "1":
|
||
# os.system("sudo git clone https://github.com/thelinuxchoice/whatshack")
|
||
# time.sleep(5)
|
||
# print("Installing Required Packges..!! It Take More Time ")
|
||
# time.sleep(3)
|
||
# os.system("apt-get install openjdk-8-jdk && apt-get install gradle")
|
||
# os.system("update-alternatives --list java")
|
||
# os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java")
|
||
# time.sleep(2)
|
||
# androidhack()
|
||
# elif userchoice == "2":
|
||
# os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell")
|
||
# os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
|
||
# os.system("cd whatshack/ && bash whatshack.sh")
|
||
# elif userchoice == "99":
|
||
# androidhack()
|
||
# elif userchoice=="":
|
||
# androidhack()
|
||
# else :
|
||
# menu()
|
||
|
||
def droidcam():
|
||
os.system("echo \"Powerful Tool For Grab Front Camera Snap Using A Link \n[+]https://github.com/kinghacker0/WishFish \"| boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/kinghacker0/WishFish; sudo apt install php wget openssh")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd wishfish && sudo bash wishfish.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def evilapp():
|
||
os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies.\n [!]https://github.com/crypticterminal/EvilApp \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/crypticterminal/EvilApp")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd evilapp && bash evilapp.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def payloads():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Payloads | lolcat")
|
||
print("""
|
||
[1] The FatRat*
|
||
[2] Brutal
|
||
[3] Stitch
|
||
[4] MSFvenom Payload Creator
|
||
[5] Venom Shellcode Generator
|
||
[6] Spycam
|
||
[7] Mob-Droid
|
||
[99]Back
|
||
""")
|
||
choice =input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
thefatrat()
|
||
elif choice == "2":
|
||
clearScr()
|
||
Brutal()
|
||
elif choice == "7":
|
||
clearScr()
|
||
mobdroid()
|
||
elif choice == "3":
|
||
clearScr()
|
||
stitch()
|
||
elif choice == "4":
|
||
clearScr()
|
||
MSFvenom()
|
||
elif choice == "5":
|
||
clearScr()
|
||
venom()
|
||
elif choice == "6":
|
||
clearScr()
|
||
spycam()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def mobdroid():
|
||
os.system("echo \"Mob-Droid helps you to generate metasploit payloads in easy way\n without typing long commands and save your time.\n[!]https://github.com/kinghacker0/Mob-Droid \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/kinghacker0/mob-droid")
|
||
elif choice == "2":
|
||
os.system("cd Mob-Droid;sudo python mob-droid.py")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def thefatrat():
|
||
os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2] Run [3]Update [4]TroubleShoot(if not run) [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git")
|
||
os.system("cd TheFatRat && sudo chmod +x setup.sh")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd TheFatRat && sudo bash setup.sh")
|
||
elif choice == "3":
|
||
os.system("cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
|
||
elif choice == "4":
|
||
os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
|
||
time.sleep(2)
|
||
payloads()
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def Brutal():
|
||
os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy | lolcat")
|
||
print("""
|
||
[!]Requirement
|
||
>>Arduino Software ( I used v1.6.7 )
|
||
>>TeensyDuino
|
||
>>Linux udev rules
|
||
>>Copy and paste the PaensyLib folder inside your Arduino\libraries
|
||
[!]Kindly Visit below link for Installation for Arduino
|
||
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
|
||
""")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/Brutal.git")
|
||
os.system("cd Brutal && sudo chmod +x Brutal.sh ")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd Brutal && sudo bash Brutal.sh")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def stitch():
|
||
os.system("echo \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >>" )
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/nathanlopez/Stitch.git")
|
||
os.system("cd Stitch && sudo pip install -r lnx_requirements.txt")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd Stitch && sudo python main.py")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def MSFvenom():
|
||
os.system("echo \"MSFvenom Payload Creator (MSFPC) is a wrapper to generate \nmultiple types of payloads, based on users choice.\nThe idea is to be as simple as possible (only requiring one input) \nto produce their payload. [!]https://github.com/g0tmi1k/msfpc \" |boxes -d boy | lolcat ")
|
||
choice= input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git")
|
||
os.system("cd msfpc;sudo chmod +x msfpc.sh")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd msfpc;sudo bash msfpc.sh -h -v")
|
||
elif choice == "99":
|
||
payloads()
|
||
elif choice == "":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def venom():
|
||
os.system("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy| lolcat")
|
||
choice =input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git")
|
||
os.system("sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh")
|
||
os.system("sudo ./venom.sh -u")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd venom && sudo ./venom.sh")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def spycam():
|
||
os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/spycam ")
|
||
os.system("cd spycam && bash install.sh && chmod +x spycam")
|
||
payloads()
|
||
elif userchoice == "2":
|
||
os.system("cd spycam && ./spycam")
|
||
elif userchoice == "99":
|
||
payloads()
|
||
elif userchoice == "":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def wifijamming():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Wifi Deautheticate | lolcat")
|
||
print("""
|
||
[1]WifiJammer-NG
|
||
[2] Using Airmon
|
||
[99]Back
|
||
""")
|
||
choice = input("Z4nzu =>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
wifijammingng()
|
||
elif choice == "2":
|
||
clearScr()
|
||
airmon()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def wifijammingng():
|
||
os.system("echo \"Continuously jam all wifi clients and access points within range.\n\t [!]https://github.com/MisterBianco/wifijammer-ng \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/MisterBianco/wifijammer-ng.git")
|
||
os.system("cd wifijammer-ng;sudo pip3 install -r requirements.txt")
|
||
elif choice == "2":
|
||
os.system("echo \"python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]\"| boxes | lolcat")
|
||
os.system("cd wifijammer-ng;sudo python3 wifijammer.py")
|
||
elif choice == "99":
|
||
wifijamming()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def airmon():
|
||
print(Logo)
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
print("In Working")
|
||
time.sleep(5)
|
||
menu()
|
||
elif userchoice == "2":
|
||
print("""
|
||
###########################################################################
|
||
# [!] Follow Below steps for Jamming [!] #
|
||
# [1]iwconfig #
|
||
# [2]airmon-ng #
|
||
# [3]airmon-ng start InterfaceName #
|
||
# [4]airodump-ng InterfaceName #
|
||
# [5]airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName #
|
||
# [6]aireply-ng -0 0 -a [mac address] InterfaceName #
|
||
# [+]After Complete monitor mode return your interface in normal mode #
|
||
# [7]airmon-ng stop InterfaceName #
|
||
###########################################################################
|
||
""")
|
||
os.system("sudo airmon-ng")
|
||
elif userchoice == "99":
|
||
wifijamming()
|
||
elif userchoice == "":
|
||
wifijamming()
|
||
else :
|
||
menu()
|
||
|
||
def steganography():
|
||
clearScr()
|
||
os.system("figlet -f standard -c SteganoGraphy | lolcat")
|
||
print("""
|
||
[1] SteganoHide
|
||
[2] StegnoCracker
|
||
[3] WhiteSpace
|
||
[99]Back
|
||
""")
|
||
choice = input("Z4nz =>> ")
|
||
if choice == "1":
|
||
steganohide()
|
||
elif choice == "2":
|
||
clearScr()
|
||
stegnocracker()
|
||
elif choice == "3":
|
||
clearScr()
|
||
whitespace()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def steganohide():
|
||
choice = input("[1]Install [2]Run [99] >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt-get install steghide -y ")
|
||
steganography()
|
||
elif choice == "2":
|
||
choice1=input("[1]Hide [2]Extract >> ")
|
||
if choice1 =="1":
|
||
filehide=input("Enter Filename you want to Embed(1.txt) >> ")
|
||
filetobehide=input("Enter Cover Filename(test.jpeg) >> ")
|
||
os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide))
|
||
elif choice1 =="2":
|
||
fromfile=input("Enter Filename From Extract Data >> ")
|
||
os.system("steghide extract -sf {0}".format(fromfile))
|
||
elif choice == "99":
|
||
steganography()
|
||
else :
|
||
menu()
|
||
|
||
def stegnocracker():
|
||
os.system("echo \"SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy| lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall")
|
||
steganography()
|
||
elif choice =="2":
|
||
file1=input("Enter Filename :- ")
|
||
passfile=input("Enter Wordlist Filename :- ")
|
||
os.system("stegcracker {0} {1} ".format(file1,passfile))
|
||
elif choice == "99":
|
||
steganography()
|
||
else :
|
||
menu()
|
||
|
||
def whitespace():
|
||
os.system("echo \"Use whitespace and unicode chars for steganography \n\t [!]https://github.com/beardog108/snow10 \"|boxes -d boy | lolcat")
|
||
choice =input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/beardog108/snow10.git ")
|
||
os.system("sudo chmod -R 755 snow10")
|
||
steganography()
|
||
elif choice == "2":
|
||
os.system("cd snow10 && firefox index.html")
|
||
elif choice == "99":
|
||
steganography()
|
||
else :
|
||
menu()
|
||
|
||
def sqltool():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Sql Tools | lolcat")
|
||
print("""
|
||
[1] Sqlmap tool
|
||
[2] NoSqlMap
|
||
[3] Damn Small SQLi Scanner
|
||
[4] Explo
|
||
[5] Blisqy - Exploit Time-based blind-SQL injection
|
||
[6] Leviathan - Wide Range Mass Audit Toolkit
|
||
[7] SQLScan
|
||
[99]Back
|
||
""")
|
||
choice =input("\033[96m Z4nzu =>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
sqlmap()
|
||
elif choice == "2":
|
||
clearScr()
|
||
nosqlmap()
|
||
elif choice == "3":
|
||
clearScr()
|
||
sqliscanner()
|
||
elif choice == "4":
|
||
clearScr()
|
||
explo()
|
||
elif choice == "5":
|
||
clearScr()
|
||
blisqy()
|
||
elif choice == "6":
|
||
clearScr()
|
||
leviathan()
|
||
elif choice == "7":
|
||
clearScr()
|
||
sqlscan()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def leviathan():
|
||
os.system("echo \"Leviathan is a mass audit toolkit which has wide range service discovery,\nbrute force, SQL injection detection and running custom exploit capabilities. \n [*]It Requires API Keys \n More Usage [!]https://github.com/utkusen/leviathan/wiki \"|boxes -d boy | lolcat ")
|
||
choice = input("[1]Install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/leviathan-framework/leviathan.git")
|
||
os.system("cd leviathan;sudo pip install -r requirements.txt")
|
||
sqltool()
|
||
elif choice == "2":
|
||
os.system("cd leviathan;python leviathan.py")
|
||
elif choice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
def sqlscan():
|
||
os.system("echo \"sqlscan is quick web scanner for find an sql inject point. not for educational, this is for hacking. \n [!]https://github.com/Cvar1984/sqlscan \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt install php php-bz2 php-curl php-mbstring curl")
|
||
os.system("sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan")
|
||
os.system("chmod +x /usr/local/bin/sqlscan")
|
||
sqltool()
|
||
elif choice == "2":
|
||
os.system("sudo sqlscan")
|
||
elif choice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def blisqy():
|
||
os.system("echo \"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection \n on HTTP Headers and also exploitation of the same vulnerability.\n For Usage >> [!]https://github.com/JohnTroony/Blisqy \"|boxes -d boy | lolcat")
|
||
choice =input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/JohnTroony/Blisqy.git ")
|
||
sqltool()
|
||
elif choice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
def explo():
|
||
os.system("echo \"explo is a simple tool to describe web security issues in a human and machine readable format.\n Usage :- \n [1]explo [--verbose|-v] testcase.yaml \n [2]explo [--verbose|-v] examples/*.yaml \n[*]https://github.com/dtag-dev-sec/explo \"|boxes -d boy | lolcat")
|
||
choice =input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/dtag-dev-sec/explo ")
|
||
os.system("cd explo ;sudo python setup.py install")
|
||
sqltool()
|
||
elif choice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
def sqliscanner():
|
||
os.system("echo \"Damn Small SQLi Scanner (DSSS) is a fully functional SQL injection\nvulnerability scanner also supporting GET and POST parameters.\n[*]python3 dsss.py -h[help] | -u[URL] \n\tMore Info [!]https://github.com/stamparm/DSSS \"|boxes -d boy | lolcat")
|
||
choice =input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/stamparm/DSSS.git")
|
||
sqltool()
|
||
elif choice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def sqlmap():
|
||
os.system("echo \"sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers \n [!]python sqlmap.py -u [<http://example.com>] --batch --banner \n More Usage [!]https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
|
||
print("Downloaded Successfully..!!")
|
||
sqltool()
|
||
elif userchoice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
def nosqlmap():
|
||
os.system("echo \"NoSQLMap is an open source Python tool designed to \n audit for as well as automate injection attacks and exploit.\n \033[91m [*]Please Install MongoDB \n More Info[!]https://github.com/codingo/NoSQLMap \"|boxes -d boy | lolcat")
|
||
choice =input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/codingo/NoSQLMap.git")
|
||
os.system("sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install ")
|
||
sqltool()
|
||
elif choice == "2":
|
||
os.system("python NoSQLMap")
|
||
elif choice =="99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
def others():
|
||
clearScr()
|
||
print(Logo + """
|
||
[1] SocialMedia Attack
|
||
[2] Android Hack
|
||
[3] HatCloud(Bypass CloudFlare for IP)
|
||
[4] IDN Homograph Attack Tools
|
||
[5] Email Verifier
|
||
[6] Hash Cracking Tools
|
||
[99]Main Menu
|
||
""")
|
||
choice = input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
socialattack()
|
||
elif choice == "2":
|
||
clearScr()
|
||
androidhack()
|
||
elif choice == "3":
|
||
clearScr()
|
||
hatcloud()
|
||
elif choice == "4":
|
||
clearScr()
|
||
homograph()
|
||
elif choice == "5":
|
||
clearScr()
|
||
emailverify()
|
||
elif choice == "6":
|
||
clearScr()
|
||
hashcracktool()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "":
|
||
others()
|
||
else :
|
||
menu()
|
||
|
||
def showme():
|
||
print("""
|
||
|
||
[*] This tool allows you to perform OSINT and reconnaissance on an organisation or an individual.
|
||
It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation
|
||
leak This database makes finding passwords faster and easier than ever before.
|
||
""")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git")
|
||
os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ")
|
||
passwd()
|
||
elif userchoice == "2":
|
||
os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def hatcloud():
|
||
os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/HatBashBR/HatCloud.git")
|
||
others()
|
||
elif choice == "2":
|
||
tsite=input("Enter Site >>")
|
||
os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite))
|
||
elif choice =="99":
|
||
others()
|
||
else :
|
||
others()
|
||
|
||
def emailverify():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Email Verify tools | lolcat")
|
||
print("""
|
||
[1] KnockMail
|
||
[99] Back
|
||
""")
|
||
choice =input("Z4nzu >>")
|
||
if choice == "1":
|
||
clearScr()
|
||
knockmail()
|
||
elif choice == "99":
|
||
others()
|
||
else :
|
||
others()
|
||
|
||
def knockmail():
|
||
os.system("echo \"KnockMail Tool Verify If Email Exists [!]https://github.com/4w4k3/KnockMail \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/4w4k3/KnockMail.git")
|
||
os.system("cd KnockMail;sudo pip install -r requeriments.txt")
|
||
emailverify()
|
||
elif choice == "2":
|
||
os.system("cd KnockMail;python knock.py")
|
||
elif choice == "99":
|
||
emailverify()
|
||
else :
|
||
menu()
|
||
|
||
|
||
|
||
def homograph():
|
||
clearScr()
|
||
os.system("figlet -f standard -c IDN Homograph Attack tools | lolcat")
|
||
print("""
|
||
[1] EvilURL
|
||
[99] Back
|
||
""")
|
||
choice =input("Z4nzu >>")
|
||
if choice == "1":
|
||
clearScr()
|
||
evilurl()
|
||
elif choice == "99":
|
||
others()
|
||
else :
|
||
others()
|
||
|
||
def evilurl():
|
||
os.system("echo \"Generate unicode evil domains for IDN Homograph Attack and detect them. \n [!]https://github.com/UndeadSec/EvilURL \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/UndeadSec/EvilURL.git")
|
||
homograph()
|
||
elif choice == "2":
|
||
os.system("cd EvilURL;python3 evilurl.py")
|
||
elif choice == "99":
|
||
homograph()
|
||
else :
|
||
menu()
|
||
|
||
def hashcracktool():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Hash Cracking Tools | lolcat")
|
||
print("""
|
||
[1] Hash Buster
|
||
[99]Back
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
hashbuster()
|
||
elif choice == "99":
|
||
others()
|
||
elif choice == "":
|
||
others()
|
||
else :
|
||
menu()
|
||
|
||
def hashbuster():
|
||
os.system("echo \"Features : \n Automatic hash type identification \n Supports MD5, SHA1, SHA256, SHA384, SHA512 \n [!]https://github.com/s0md3v/Hash-Buster \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/s0md3v/Hash-Buster.git")
|
||
os.system("cd Hash-Buster;make install")
|
||
time.sleep(2)
|
||
hashcracktool()
|
||
elif choice == "2":
|
||
os.system("buster -h")
|
||
elif choice == "99":
|
||
hashcracktool()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def Ddos():
|
||
clearScr()
|
||
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
|
||
print("""
|
||
[1]SlowLoris
|
||
[2]aSYNcrone | Multifunction SYN Flood DDoS Weapon
|
||
[3]UFOnet
|
||
[4]GoldenEye
|
||
[99]Back
|
||
""")
|
||
choice =input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
slowloris()
|
||
elif choice == "2":
|
||
clearScr()
|
||
asyncrone()
|
||
elif choice == "3":
|
||
clearScr()
|
||
ufonet()
|
||
elif choice == "4":
|
||
clearScr()
|
||
goldeneye()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
print("Invalid ...")
|
||
menu()
|
||
|
||
def slowloris():
|
||
os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo pip install slowloris")
|
||
Ddos()
|
||
elif choice == "2":
|
||
ts=input("Enter Target Site :-")
|
||
os.system("slowloris %s"%ts)
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
def asyncrone():
|
||
os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/fatih4842/aSYNcrone.git")
|
||
os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread")
|
||
Ddos()
|
||
elif choice == "2":
|
||
sport=input("Enter Source Port >> ")
|
||
tip=input("Enter Target IP >> ")
|
||
tport=input("Enter Target port >> ")
|
||
os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport))
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
def ufonet():
|
||
os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/epsylon/ufonet.git")
|
||
os.system("cd ufonet;sudo python setup.py install")
|
||
Ddos()
|
||
elif choice == "2":
|
||
os.system("sudo ./ufonet --gui")
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
def goldeneye():
|
||
os.system("echo \"GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\nGoldenEye is a HTTP DoS Test Tool. \n\t [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye")
|
||
Ddos()
|
||
elif choice == "2":
|
||
os.system("cd GoldenEye ;sudo ./goldeneye.py")
|
||
print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py <url> [OPTIONS] ")
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def xsstools():
|
||
clearScr()
|
||
os.system("figlet -f standard -c XSS Attack Tools | lolcat")
|
||
print("""
|
||
[1] DalFox(Finder of XSS)
|
||
[2] XSS Payload Generator
|
||
[3] Extended XSS Searcher and Finder
|
||
[4] XSS-Freak
|
||
[5] XSpear
|
||
[6] XSSCon
|
||
[7] XanXSS
|
||
[8] Advanced XSS Detection Suite
|
||
[99]BAck
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
dalfox()
|
||
elif choice =="2":
|
||
clearScr()
|
||
xsspayload()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "3":
|
||
clearScr()
|
||
xssfinder()
|
||
elif choice == "4":
|
||
clearScr()
|
||
xssfreak()
|
||
elif choice == "5":
|
||
clearScr()
|
||
xspear()
|
||
elif choice == "6":
|
||
clearScr()
|
||
xsscon()
|
||
elif choice == "7":
|
||
clearScr()
|
||
xanxss()
|
||
elif choice == "8":
|
||
clearScr()
|
||
XSStrike()
|
||
elif choice == "":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def XSStrike():
|
||
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
|
||
xc=input("[1]Install [99]Back >>")
|
||
if xc == "1":
|
||
os.system("sudo rm -rf XSStrike")
|
||
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
|
||
xsstools()
|
||
elif xc == "99":
|
||
xsstools()
|
||
else :
|
||
xsstools()
|
||
|
||
def dalfox():
|
||
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt-get install golang")
|
||
os.system("sudo git clone https://github.com/hahwul/dalfox ")
|
||
os.system("cd dalfox;go install")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("~/go/bin/dalfox")
|
||
print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xsspayload():
|
||
os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/capture0x/XSS-LOADER.git")
|
||
os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("cd XSS-LOADER;sudo python3 payloader.py")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xssfinder():
|
||
os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git glone https://github.com/Damian89/extended-xss-search.git")
|
||
print("""\033[96m
|
||
Follow This Steps After Installation :-
|
||
\033[31m [*]Go To extended-xss-search directory,
|
||
and Rename the example.app-settings.conf to app-settings.conf
|
||
""")
|
||
elif choice == "2":
|
||
print("""\033[96m
|
||
You have To Add Links to scan
|
||
\033[31m[!]Go to extended-xss-search
|
||
[*]config/urls-to-test.txt
|
||
[!]python3 extended-xss-search.py
|
||
""")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xssfreak():
|
||
os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git")
|
||
os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("cd XSS-Freak;sudo python3 XSS-Freak.py")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xspear():
|
||
os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("gem install XSpear")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("XSpear -h")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xsscon():
|
||
os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/menkrep1337/XSSCon")
|
||
os.system("sudo chmod 755 -R XSSCon")
|
||
xsstools()
|
||
elif choice == "2":
|
||
uinput= input("Enter Website >> ")
|
||
os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput))
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xanxss():
|
||
os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/Ekultek/XanXSS.git ")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("cd XanXSS ;python xanxss.py -h")
|
||
print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
|
||
def update():
|
||
print("""
|
||
[1] Update Tool or System
|
||
[2] Uninstall HackingTool
|
||
[99]Back
|
||
""")
|
||
choice =input("Z4nzu >> ")
|
||
if choice == "1":
|
||
updatesys()
|
||
elif choice == "2":
|
||
uninstall()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def updatesys():
|
||
choice = input("[1]Update System [2]Update Hackingtool [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt update && sudo apt full-upgrade -y")
|
||
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
|
||
os.system("sudo apt-get install python3-pip")
|
||
elif choice == "2":
|
||
os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;mkdir hackingtool;cd hackingtool;git clone https://github.com/Z4nzu/hackingtool.git;cd hackingtool;sudo chmod +x install.sh;./install.sh")
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def uninstall():
|
||
choice = input("[1]Uninstall [99]Back >> ")
|
||
if choice == "1":
|
||
print("hackingtool started to uninstall..")
|
||
time.sleep(2)
|
||
os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;")
|
||
time.sleep(3)
|
||
print("Hackingtool Successfully Uninstall..")
|
||
time.sleep(1)
|
||
print("Happy Hacking..!!")
|
||
elif choice == "99":
|
||
update()
|
||
else :
|
||
print("Wrong Input...!!")
|
||
uninstall()
|
||
|
||
def clearScr():
|
||
if system() == 'Linux':
|
||
os.system('clear')
|
||
if system() == 'Windows':
|
||
os.system('cls')
|
||
|
||
if __name__ == "__main__":
|
||
try:
|
||
if system() == 'Linux':
|
||
fpath="/home/hackingtoolpath.txt"
|
||
if os.path.isfile(fpath):
|
||
file1 = open(fpath,"r")
|
||
f=file1.readline()
|
||
if os.path.exists("{0}".format(f)):
|
||
os.chdir(f)
|
||
file1.close()
|
||
menu()
|
||
else :
|
||
os.mkdir("{0}".format(f))
|
||
os.chdir("{0}".format(f))
|
||
file1.close()
|
||
menu()
|
||
else :
|
||
clearScr()
|
||
print(Logo)
|
||
print("""
|
||
[@] Set Path (All your tools will be install in that directory)
|
||
[1]Manual
|
||
[2]Default
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
inpath=input("Enter Path(with Directory Name) >> ")
|
||
file =open(fpath,"w")
|
||
file.write(inpath)
|
||
file.close()
|
||
print("Successfully Path Set...!!")
|
||
elif choice == "2":
|
||
autopath="/home/hackingtool/"
|
||
file =open(fpath,"w")
|
||
file.write(autopath)
|
||
file.close()
|
||
time.sleep(1)
|
||
print("Your Default Path Is :-"+autopath)
|
||
time.sleep(3)
|
||
else :
|
||
print("Try Again..!!")
|
||
else :
|
||
fpath="/home/hackingtoolpath.txt"
|
||
if os.path.isfile(fpath):
|
||
file1 = open(fpath,"r")
|
||
f=file1.readline()
|
||
if os.path.exists("{0}".format(f)):
|
||
os.chdir(f)
|
||
file1.close()
|
||
menu()
|
||
else :
|
||
os.mkdir("{0}".format(f))
|
||
os.chdir("{0}".format(f))
|
||
file1.close()
|
||
menu()
|
||
else :
|
||
clearScr()
|
||
print(Logo)
|
||
print("""
|
||
[@] Set Path (All your tools will be install in that directory)
|
||
[1]Manual
|
||
[2]Default
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
inpath=input("Enter Path(with Directory Name) >> ")
|
||
file =open(fpath,"w")
|
||
file.write(inpath)
|
||
file.close()
|
||
print("Successfully Path Set...!!")
|
||
elif choice == "2":
|
||
autopath="/home/hackingtool/"
|
||
file =open(fpath,"w")
|
||
file.write(autopath)
|
||
file.close()
|
||
time.sleep(1)
|
||
print("Your Default Path Is :-"+autopath)
|
||
time.sleep(3)
|
||
else :
|
||
print("Try Again..!!")
|
||
print("Sorry Open New Issue..!!")
|
||
except KeyboardInterrupt:
|
||
print("\n Sorry ..!!!")
|
||
time.sleep(3)
|