mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-14 19:55:19 +00:00
1372 lines
48 KiB
Python
1372 lines
48 KiB
Python
##!/usr/bin/env python3
|
|
# -*- coding: iso-8859-15 -*-
|
|
import os
|
|
import sys
|
|
import argparse
|
|
import threading
|
|
import webbrowser
|
|
import requests
|
|
import urllib
|
|
import time
|
|
import httplib
|
|
import urllib
|
|
import sys
|
|
import json
|
|
import telnetlib
|
|
import glob
|
|
import urllib2
|
|
import socket
|
|
import base64
|
|
from getpass import getpass
|
|
from commands import *
|
|
from sys import argv
|
|
import random
|
|
import Queue
|
|
import subprocess
|
|
import re
|
|
from platform import system
|
|
from urlparse import urlparse
|
|
from xml.dom import minidom
|
|
from optparse import OptionParser
|
|
from time import sleep
|
|
from platform import system
|
|
|
|
Logo="""\033[33m
|
|
|
|
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
|
|
███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███
|
|
███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███
|
|
▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███
|
|
▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███
|
|
███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███
|
|
███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄
|
|
███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██
|
|
▀ ▀
|
|
【T】【h】【i】【s】 【T】【o】【o】【l】 【C】【r】【e】【a】【t】【e】【d】 【B】【y】 【Z】【4】【n】【z】【u】
|
|
|
|
\033[97m[!] https://github.com/Z4nzu
|
|
\033[91m[!] This Tool is Only For Educational Purpose Please Don\'t use for Any illegal Activity [!]
|
|
\033[97m """
|
|
|
|
|
|
def menu():
|
|
clearScr()
|
|
print(Logo + """\033[0m
|
|
\033[91m[!] This Tool Must Run as a Root..[!]] \033[97m
|
|
[00]AnonSurf
|
|
[01]Information Gathering
|
|
[02]Password Attack
|
|
[03]Wireless Attack
|
|
[04]SQL Injection Tools
|
|
[05]Phishing Attack
|
|
[06]Web Attack Tool
|
|
[07]Post exploitation
|
|
[08]Forensic Tools
|
|
[09]Payload Creator
|
|
[10]Router Exploit
|
|
[11]Wifi Jamming
|
|
[12]SocialMedia Attack
|
|
[13]SocialMedia Finder
|
|
[14]Android Hack
|
|
[15]Port Forwading
|
|
[16]Other Tools
|
|
[17]Update System
|
|
[99]Exit
|
|
""")
|
|
|
|
choice = input("Z4nzu =>> ")
|
|
if choice == 0 or choice == 00:
|
|
clearScr()
|
|
print(Logo)
|
|
anonsurf()
|
|
elif choice == 1 or choice == "01":
|
|
clearScr()
|
|
print(Logo)
|
|
info()
|
|
elif choice == 2 or choice == 02:
|
|
clearScr()
|
|
print(Logo)
|
|
passwd()
|
|
elif choice == 3 or choice == 03:
|
|
clearScr()
|
|
print(Logo)
|
|
wire()
|
|
elif choice == 4 or choice == 04:
|
|
clearScr()
|
|
print(Logo)
|
|
sqltool()
|
|
elif choice == 5 or choice == 05:
|
|
clearScr()
|
|
print(Logo)
|
|
phishattack()
|
|
elif choice == 6 or choice == 06:
|
|
clearScr()
|
|
print(Logo)
|
|
webAttack()
|
|
elif choice == 7 or choice == 07:
|
|
clearScr()
|
|
print(Logo)
|
|
postexp()
|
|
elif choice == 8 :
|
|
clearScr()
|
|
print(Logo)
|
|
forensic()
|
|
elif choice == 9 :
|
|
clearScr()
|
|
print(Logo)
|
|
payloads()
|
|
elif choice == 10:
|
|
clearScr()
|
|
print(Logo)
|
|
routexp()
|
|
elif choice == 11:
|
|
clearScr()
|
|
print(Logo)
|
|
wifijamming()
|
|
elif choice == 12:
|
|
clearScr()
|
|
print(Logo)
|
|
socialattack()
|
|
elif choice == 13:
|
|
clearScr()
|
|
print(Logo)
|
|
socialfinder()
|
|
elif choice == 14:
|
|
clearScr()
|
|
print(Logo)
|
|
androidhack()
|
|
elif choice == 15:
|
|
clearScr()
|
|
print(Logo)
|
|
portforwading()
|
|
elif choice == 16:
|
|
clearScr()
|
|
print(Logo)
|
|
others()
|
|
elif choice == 17:
|
|
clearScr()
|
|
print(Logo)
|
|
updatesys()
|
|
elif choice == 99:
|
|
clearScr(), sys.exit()
|
|
exit()
|
|
elif choice == "":
|
|
menu()
|
|
else:
|
|
print("Wrong Input...!!")
|
|
time.Sleep(3)
|
|
menu()
|
|
|
|
def anonsurf():
|
|
print("""
|
|
[1] Anonmously Surf
|
|
[2] Multitor
|
|
[99]Back
|
|
""")
|
|
choice = input("Z4nzu =>>")
|
|
if choice == 1:
|
|
clearScr()
|
|
ansurf()
|
|
elif choice == 2:
|
|
clearScr()
|
|
multitor()
|
|
elif choice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def ansurf():
|
|
os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo cHange Ip\" |boxes -d boy")
|
|
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
|
|
if anc == 1:
|
|
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
|
|
os.system("cd kali-anonsurf && sudo ./installer.sh")
|
|
print("Successfully Installed ...!!")
|
|
elif anc==2:
|
|
os.system("sudo anonsurf start")
|
|
elif anc == 3:
|
|
os.system("sudo anonsurf stop")
|
|
elif anc == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def multitor():
|
|
os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git")
|
|
elif userchoice == 2:
|
|
os.system("cd multitor && bash multitor.sh")
|
|
elif userchoice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def info():
|
|
print("""
|
|
[1] Nmap
|
|
[2] Dracnmap
|
|
[3] Port Scanning
|
|
[4] Host To IP
|
|
[5] Xerosploit
|
|
[6] Advanced XSS Detection Suite
|
|
[99] Back To Main Menu
|
|
""")
|
|
choice2 = input("Z4nzu =>> ")
|
|
if choice2 == 1:
|
|
nmap()
|
|
if choice2 == 2:
|
|
clearScr()
|
|
dracmap()
|
|
if choice2 == 3:
|
|
clearScr()
|
|
ports()
|
|
if choice2 == 4:
|
|
clearScr()
|
|
h2ip()
|
|
if choice2 == 5:
|
|
clearScr()
|
|
xerosploit()
|
|
if choice2 == 6:
|
|
clearScr()
|
|
XSStrike()
|
|
elif choice2 == 99:
|
|
clearScr()
|
|
menu()
|
|
if choice2 == 9:
|
|
clearScr()
|
|
elif choice2 == "":
|
|
menu()
|
|
else:
|
|
menu()
|
|
|
|
def nmap():
|
|
nmapchoice = input("[1]Install [2]Run [99]BAck >> ")
|
|
if nmapchoice == 1 :
|
|
time.sleep(1)
|
|
print("Start Downloading....!!")
|
|
os.system("sudo git clone https://github.com/nmap/nmap.git")
|
|
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
|
|
elif nmapchoice == 2:
|
|
os.system("sudo nmap")
|
|
elif nmapchoice == 99:
|
|
info()
|
|
else:
|
|
menu()
|
|
|
|
def Dracnmap():
|
|
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy ")
|
|
dracnap = input("[1]Install [2]Run [99]Back >> ")
|
|
if dracnap == 1:
|
|
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git && cd Dracnmap && chmod +x Dracnmap.sh")
|
|
elif dracnap == 2:
|
|
os.system("cd Dracnmap && sudo ./Dracnmap.sh")
|
|
elif dracnap == 99:
|
|
info()
|
|
else :
|
|
menu()
|
|
|
|
def h2ip():
|
|
host = raw_input("Enter host name :- ")
|
|
ips = socket.gethostbyname(host)
|
|
print(ips)
|
|
|
|
def ports():
|
|
clearScr()
|
|
target = raw_input('Select a Target IP : ')
|
|
os.system("sudo nmap -O -Pn %s" % target)
|
|
sys.exit()
|
|
|
|
def XSStrike():
|
|
os.system("echo \"SStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy")
|
|
xc=input("[1]Install [2]Run [99]BAck >>")
|
|
if xc == 1:
|
|
os.system("sudo rm -rf XSStrike")
|
|
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
|
|
elif xc == 2 :
|
|
clearScr()
|
|
os.system("cd XSStrike && python xsstrike")
|
|
elif xc == 99:
|
|
info()
|
|
else :
|
|
info()
|
|
|
|
def xerosploit():
|
|
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy")
|
|
xeros=input("[1]Install [2]Run [99]Back >>")
|
|
if xeros == 1:
|
|
os.system("git clone https://github.com/LionSec/xerosploit")
|
|
os.system("cd xerosploit && sudo python install.py")
|
|
elif xeros == 2:
|
|
os.system("sudo xerosploit")
|
|
elif xeros == 99:
|
|
info()
|
|
else :
|
|
main()
|
|
|
|
def setoolkit():
|
|
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy")
|
|
choiceset = input("[1]Install [2]Run [99]BAck >>")
|
|
if choiceset == 1:
|
|
os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git")
|
|
os.system("python social-engineer-toolkit/setup.py")
|
|
menu()
|
|
if choiceset == 2:
|
|
clearScr()
|
|
os.system("sudo setoolkit")
|
|
elif choiceset == 99:
|
|
phishattack()
|
|
else:
|
|
menu()
|
|
|
|
def passwd():
|
|
print("""
|
|
[01]Cupp
|
|
[02]WordlistCreator
|
|
[99]Back To Main Menu
|
|
""")
|
|
passchoice = raw_input("Z4nzu ==>> ")
|
|
if passchoice == "1" or passchoice == "01":
|
|
clearScr()
|
|
cupp()
|
|
elif choice3 == "2" or passchoice == "02":
|
|
clearScr()
|
|
wlcreator()
|
|
elif passchoice == "99":
|
|
clearScr()
|
|
menu()
|
|
elif passchoice == "":
|
|
menu()
|
|
else:
|
|
menu()
|
|
|
|
def cupp():
|
|
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
|
|
cc=raw_input("[1]Install [2]Run [99]Back")
|
|
if cc == 1:
|
|
os.system("git clone https://github.com/Mebus/cupp.git")
|
|
print("Download Successfully..!!!")
|
|
elif cc == 2:
|
|
os.system("cd cupp && ./cupp.py -h")
|
|
elif cc == 99 :
|
|
passwd()
|
|
else :
|
|
main()
|
|
|
|
def wlcreator():
|
|
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator")
|
|
elif userchoice == 2:
|
|
os.system("cd wlcreator && gcc -o wlcreator wlcreator.c && ./wlcreator 5")
|
|
elif userchoice == 99:
|
|
passwd()
|
|
else :
|
|
menu()
|
|
|
|
def wire():
|
|
print(""" [1] WiFi-Pumpkin
|
|
[2] pixiewps
|
|
[3] Bluetooth Honeypot GUI Framework
|
|
[4] Fluxion
|
|
[5] Wifiphisher
|
|
[6] Wifite
|
|
[7] EvilTwin
|
|
[99]Back To The Main Menu """)
|
|
choice4 = input("Z4nzu ==>> ")
|
|
if choice4 == 1:
|
|
clearScr()
|
|
wifipumkin()
|
|
if choice4 == 2:
|
|
clearScr()
|
|
pixiewps()
|
|
if choice4 == 3:
|
|
clearScr()
|
|
bluepot()
|
|
if choice4 == 4:
|
|
clearScr()
|
|
fluxion()
|
|
if choice4 == 5:
|
|
clearScr()
|
|
wifiphisher()
|
|
elif choice4 == 6:
|
|
clearScr()
|
|
wifite()
|
|
elif choice == 7:
|
|
clearScr()
|
|
eviltwin()
|
|
elif choice4 == 99:
|
|
menu()
|
|
elif choice4 == "":
|
|
menu()
|
|
else:
|
|
menu()
|
|
|
|
def wifipumkin():
|
|
os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy")
|
|
wp=input("[1]Install [2]Run [99]Back >>")
|
|
if wp == 1:
|
|
os.system("sudo git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git")
|
|
os.system("chmod -R 755 WiFi-Pumpkin && cd WiFi-Pumpkin")
|
|
os.system("sudo pip install -r requirements.txt &&sudo ./installer.sh --install")
|
|
elif wp == 2:
|
|
clearScr()
|
|
os.system("cd WiFi=Pumpkin && python wifi-pumpkin.py")
|
|
elif wp == 99:
|
|
wire()
|
|
else :
|
|
menu()
|
|
|
|
def pixiewps():
|
|
os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy")
|
|
choicewps = input("[1]Install [2]Run [99]Back >> ")
|
|
if choicewps == 1:
|
|
os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential")
|
|
os.system("cd pixiewps & make ")
|
|
os.system("sudo make install")
|
|
os.system("wget https://pastebin.com/y9Dk1Wjh")
|
|
if choicewps == 2:
|
|
os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy")
|
|
elif choicewps == 99:
|
|
wire()
|
|
else:
|
|
menu()
|
|
|
|
def bluepot():
|
|
os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy ")
|
|
choice = input("[1]Install [2]Run [99]Back >> ")
|
|
if choice == 1:
|
|
os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar")
|
|
elif choice == 2:
|
|
os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar")
|
|
elif choice == 99:
|
|
wire()
|
|
else:
|
|
menu()
|
|
|
|
def fluxion():
|
|
print("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy")
|
|
choice = input("[1]Install [2]Run [99]Back >>")
|
|
if choice == 1:
|
|
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
|
|
os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo ./install.sh")
|
|
os.system("cd .. && sudo chmod +x fluxion.sh")
|
|
elif choice == 2:
|
|
os.system("cd Fluxion && sudo ./fluxion.sh")
|
|
elif choice == 99 :
|
|
wire()
|
|
else:
|
|
menu()
|
|
|
|
def wifiphisher():
|
|
print("""
|
|
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
|
|
Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
|
|
targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
|
|
connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
|
|
victim stations with malware..
|
|
""")
|
|
wchoice=input("[1]Install [2]Run [99]Back >> ")
|
|
if wchoice == 1:
|
|
os.system("git clone https://github.com/wifiphisher/wifiphisher.git")
|
|
os.system("cd wifiphisher && sudo python3 setup.py install")
|
|
if wchoice == 2:
|
|
os.system("cd wifiphisher && sudo wifiphiser")
|
|
elif wchoice == 99 :
|
|
wire()
|
|
else :
|
|
menu()
|
|
|
|
def wifite():
|
|
wc=input("[1]Install [2]Run [99]BAck >> ")
|
|
if wc == 1:
|
|
os.system("sudo git clone https://github.com/kimocoder/wifite2.git")
|
|
os.system("cd wifite2 && sudo python3 setup.py install")
|
|
elif wc ==2:
|
|
os.system("cd wifite2 && sudo wifite")
|
|
elif wc == 99:
|
|
wire()
|
|
else :
|
|
menu()
|
|
|
|
def eviltwin():
|
|
os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/fakeap ")
|
|
elif userchoice == 2:
|
|
os.system("cd fakeap && bash fakeap.sh")
|
|
elif userchoice == 99:
|
|
wire()
|
|
else :
|
|
menu()
|
|
|
|
def socialattack():
|
|
print("""
|
|
[1] Instagram Attack
|
|
[2] Tweeter Attack
|
|
[3] Facebook Attack
|
|
[4] Application Checker
|
|
[99]Back To Menu
|
|
""")
|
|
sac=input("Z4nzu >> ")
|
|
if sac == 1:
|
|
clearScr()
|
|
instashell()
|
|
elif sac == 2:
|
|
clearScr()
|
|
tweetshell()
|
|
elif sac == 3:
|
|
clearScr()
|
|
faceshell()
|
|
elif sac == 4 :
|
|
clearScr()
|
|
appcheck()
|
|
elif sac == 99 :
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def instashell():
|
|
os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy")
|
|
instachoice=input("[1]install [2]Run [99]Back >> ")
|
|
if instachoice == 1:
|
|
os.system("sudoo git clone https://github.com/thelinuxchoice/instashell && chmod +x install.sh && sudo ./install.sh")
|
|
elif instachoice == 2:
|
|
os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh")
|
|
elif instachoice == 99:
|
|
socialattack()
|
|
else :
|
|
menu()
|
|
|
|
def tweetshell():
|
|
os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy")
|
|
choice = input ("[1]Install [2]Run [99] >> ")
|
|
if choice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell")
|
|
os.system("cd tweetshell && sudo ./install.sh")
|
|
elif choice == 2:
|
|
os.system("cd tweetshell && service tor start && sudo ./tweetshell.sh")
|
|
elif choice == 99:
|
|
socialattack()
|
|
else :
|
|
menu()
|
|
|
|
def faceshell():
|
|
os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy")
|
|
choice = input ("[1]Install [2]Run [99] >> ")
|
|
if choice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash")
|
|
os.system("cd facebash && sudo ./install.sh")
|
|
elif choice == 2:
|
|
os.system("cd facebash && service tor start && sudo ./facebash.sh")
|
|
elif choice == 99:
|
|
socialattack()
|
|
else :
|
|
menu()
|
|
|
|
def appcheck():
|
|
os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/underhanded")
|
|
elif userchoice == 2:
|
|
os.system("cd underhanded && bash underhanded.sh")
|
|
elif userchoice == 99:
|
|
socialattack()
|
|
else :
|
|
menu()
|
|
|
|
def phishattack():
|
|
print("""
|
|
[1] Setoolkit
|
|
[2] SocialFish
|
|
[3] Shellphish
|
|
[4] BlackEye
|
|
[5] I-See_You(Get Location using phishing attack)
|
|
[6] SayCheese (Grab target's Webcam Shots)
|
|
[7] QR Code Jacking
|
|
[99]Back To Main Menu
|
|
""")
|
|
choice = input("Z4nzu ==>> ")
|
|
if choice == 1:
|
|
clearScr()
|
|
setoolkit()
|
|
if choice == 2:
|
|
clearScr()
|
|
print("This Tool is Devloped By UndeadSec ")
|
|
socialfish()
|
|
if choice == 3:
|
|
clearScr()
|
|
print("This Tool is Developed By thelinuxchoice")
|
|
shellphish()
|
|
if choice == 4:
|
|
clearScr()
|
|
print("This Tool is Developed By thelinuxchoice")
|
|
blackeye()
|
|
elif choice == 5:
|
|
clearScr()
|
|
iseeyou()
|
|
elif choice == 6:
|
|
clearScr()
|
|
saycheese()
|
|
elif choice == 7:
|
|
clearScr()
|
|
qrjacking()
|
|
if choice == 99:
|
|
clearScr()
|
|
menu()
|
|
elif choice == "":
|
|
menu()
|
|
else:
|
|
menu()
|
|
|
|
def socialfish():
|
|
sfc=input("[1]install [2]Run [3]BAck >> ")
|
|
if sfc == 1:
|
|
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
|
|
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
|
|
elif sfc ==2:
|
|
os.system("cd SocialFish && python3 SocialFish.py root pass")
|
|
elif sfc ==3:
|
|
phishattack()
|
|
else :
|
|
menu()
|
|
|
|
def shellphish():
|
|
spc=input("[1]install [2]Run [3]BAck >> ")
|
|
if spc == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/shellphish")
|
|
print("Downloaded Successfully...!! ")
|
|
elif spc ==2:
|
|
os.system("cd shellphish && sudo bash shellphish.sh")
|
|
elif spc ==3:
|
|
phishattack()
|
|
else :
|
|
menu()
|
|
|
|
def blackeye():
|
|
spc=input("[1]install [2]Run [3]BAck >> ")
|
|
if spc == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/blackeye")
|
|
print("Downloaded Successfully...!! ")
|
|
elif spc ==2:
|
|
os.system("cd blackeye && sudo bash blackeye.sh")
|
|
elif spc ==3:
|
|
phishattack()
|
|
else :
|
|
menu()
|
|
|
|
def iseeyou():
|
|
os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git")
|
|
os.system("cd I-See-You && chmod u+x ISeeYou.sh")
|
|
menu()
|
|
elif userchoice == 2:
|
|
os.system("cd I-See_You && sudo ./ISeeYou.sh")
|
|
elif userchoice == 99:
|
|
phishattack()
|
|
else :
|
|
menu()
|
|
|
|
def saycheese():
|
|
os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/saycheese")
|
|
print("Downloaded Successfully ..!!!")
|
|
elif userchoice == 2:
|
|
os.system("cd saycheese && bash saycheese.sh")
|
|
elif userchoice == 99:
|
|
socialfinder()
|
|
else :
|
|
menu()
|
|
|
|
def qrjacking():
|
|
os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/ohmyqr")
|
|
elif userchoice == 2:
|
|
os.system("cd ohmyqr && bash ohmyqr.sh")
|
|
elif userchoice == 99:
|
|
phishattack()
|
|
else :
|
|
menu()
|
|
|
|
def socialfinder():
|
|
print("""
|
|
[1]Find SocialMedia By Facial Recognation System
|
|
[2]Find SocialMedia By UserName
|
|
[99]Back To Main Menu
|
|
""")
|
|
sfc =input("Z4nzu =>>")
|
|
if sfc == 1:
|
|
clearScr()
|
|
facialfind()
|
|
elif sfc == 2:
|
|
clearScr()
|
|
userrecon()
|
|
elif sfc == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def facialfind():
|
|
ffc=input("[1]Install [2]Run [99]Back >>")
|
|
if ffc == 1:
|
|
print("Firefox is Required So updating.....")
|
|
os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade")
|
|
os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes -d boy")
|
|
time.sleep(5)
|
|
os.system("sudo git clone https://github.com/Greenwolf/social_mapper")
|
|
os.system("cd social_mapper/setup")
|
|
os.system("python3 -m pip install --no-cache-dir -r requirements.txt")
|
|
print("Successfully Installed...!!!")
|
|
menu()
|
|
elif ffc == 2:
|
|
os.system("cd social_mapper/setup")
|
|
os.system("python social_mapper.py -h")
|
|
print("""\033[95m
|
|
You have to set Username and password of your AC Or Any Fack Account
|
|
{0}Type in Terminal nano social_mapper.py
|
|
\n ]""")
|
|
os.system("echo \"python social_mapper.py -f [<imageFoldername>] -i [<imgFolderPath>] -m fast [<AcName>] -fb -tw\"| boxes -d headline ")
|
|
elif ffc == 99 :
|
|
socialfinder()
|
|
else :
|
|
menu()
|
|
|
|
def userrecon():
|
|
userchoice = input("[1]Install [2]Run [99]Back")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git")
|
|
elif userchoice == 2:
|
|
os.system("cd userrecon && chmod +x userrecon.sh && sudo ./userrecon.sh")
|
|
elif userchoice == 99:
|
|
socialfinder()
|
|
else :
|
|
menu()
|
|
|
|
def forensic():
|
|
print("""
|
|
[1] Bulk_extractor
|
|
[2] Disk Clone and ISO Image Aquire
|
|
[3] AutoSpy
|
|
[99]Back to Menu
|
|
""")
|
|
fc = input("Z4nzu ==>>")
|
|
if fc == 1 :
|
|
clearScr()
|
|
bulkextractor()
|
|
elif fc == 2:
|
|
clearScr()
|
|
guymager()
|
|
elif fc == 3:
|
|
clearScr()
|
|
autopsy()
|
|
elif fc == 99:
|
|
main()
|
|
elif fc == "":
|
|
main()
|
|
else :
|
|
main()
|
|
|
|
def bulkextractor():
|
|
bc=input("""
|
|
[1]GUI Mode(Download required)
|
|
[2]CLI Mode
|
|
""")
|
|
if bc == 1:
|
|
os.system("git clone https://github.com/simsong/bulk_extractor.git")
|
|
print(os.getcwd())
|
|
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
|
|
print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
|
|
elif bc ==2:
|
|
os.system("sudo apt-get install bulk_extractor")
|
|
print("bulk_extractor and options")
|
|
os.system("bulk_extractor")
|
|
os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline ")
|
|
else :
|
|
main()
|
|
|
|
def guymager():
|
|
os.system("apt install guymager")
|
|
clearScr()
|
|
os.system("guymager")
|
|
|
|
def autopsy():
|
|
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy ")
|
|
print("""
|
|
[1]Linux Os
|
|
[2]Windows Os(Download Required)
|
|
[99]Back To Menu
|
|
""")
|
|
ac=input("Z4nzu >> ")
|
|
if ac == 1:
|
|
os.system("sudo autopsy")
|
|
if ac == 2:
|
|
wc=input("""
|
|
[1]64-Bit
|
|
[2]32-Bit
|
|
""")
|
|
if wc == 1:
|
|
url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi'
|
|
import requests
|
|
r = requests.get(url)
|
|
with open("autppsy.zip", "wb") as code:
|
|
code.write(r.content)
|
|
urllib.urlretrieve(url, "autopsyzip")
|
|
print("Downloaded Successfully..!!")
|
|
elif wc == 2:
|
|
url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-32bit.msi'
|
|
import requests
|
|
r = requests.get(url)
|
|
with open("autospy.zip", "wb") as code:
|
|
code.write(r.content)
|
|
urllib.urlretrieve(url, "autopsy.zip")
|
|
print("Downloaded Successfully..!!")
|
|
elif ac ==99:
|
|
forensic()
|
|
else :
|
|
menu()
|
|
|
|
|
|
|
|
def postexp():
|
|
print("""
|
|
[1]Vegile - Ghost In The Shell
|
|
[99]Back
|
|
""")
|
|
expchoice = input("Z4nzu =>> ")
|
|
if expchoice == 1:
|
|
clearScr()
|
|
vegile()
|
|
elif expchoice == 99:
|
|
menu()
|
|
elif expchoice == "":
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def vegile():
|
|
os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy")
|
|
vegilechoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if vegilechoice == 1:
|
|
os.system("sudo git clone https://github.com/Screetsec/Vegile.git")
|
|
os.system("cd Vegile && chmod +x Vegile")
|
|
menu()
|
|
elif vegilechoice == 2:
|
|
os.system("echo \You can Use Command : \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment")
|
|
os.system("cd Vegila && sudo ./Vegila -h")
|
|
elif vegilechoice == 99:
|
|
postexp()
|
|
else :
|
|
menu()
|
|
|
|
def routexp():
|
|
print("""
|
|
[1] RouterSploit
|
|
[2] Fastssh
|
|
[99]Back to menu
|
|
""")
|
|
routerchoice=int(input("Z4nzu =>> "))
|
|
if routerchoice == 1:
|
|
clearScr()
|
|
routersploit()
|
|
elif routerchoice==99:
|
|
menu()
|
|
elif routerchoice==2:
|
|
clearScr()
|
|
fastssh()
|
|
else :
|
|
print("You Entered wrong Choice :")
|
|
routexp()
|
|
|
|
def routersploit():
|
|
os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy ")
|
|
ch=input("[1]Install [2]Run [99]Back :")
|
|
if ch == 1:
|
|
os.system("git clone https://www.github.com/threat9/routersploit")
|
|
os.system("cd routersploit && python3 -m pip install -r requirements.txt")
|
|
os.system("python3 rsf.py")
|
|
elif ch == 2:
|
|
os.system("cd routersploit && python3 rsf.py")
|
|
elif ch== 99:
|
|
routexp()
|
|
else :
|
|
menu()
|
|
|
|
def fastssh():
|
|
os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/fastssh && cd fastssh && chmod +x fastssh.sh")
|
|
os.system("apt-get install -y sshpass netcat")
|
|
elif userchoice == 2:
|
|
os.system("cd fastssh && ./fastssh.sh")
|
|
elif userchoice == 99:
|
|
routersploit()
|
|
else :
|
|
menu()
|
|
|
|
def webAttack():
|
|
print("""
|
|
[1] SlowLoris
|
|
[2] Skipfish
|
|
[3] SubDomain Finder
|
|
[99]Back To Menu
|
|
""")
|
|
wc = input("Z4nzu >> ")
|
|
if wc == 1:
|
|
clearScr()
|
|
slowloris()
|
|
elif wc == 2:
|
|
clearScr()
|
|
skipfish()
|
|
elif wc == 3:
|
|
clearScr()
|
|
subdomain()
|
|
elif wc == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def slowloris():
|
|
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
|
|
os.system("sudo pip install slowloris")
|
|
ts=raw_input("Enter Target Site :-")
|
|
os.system("slowloris %s"%ts)
|
|
|
|
def skipfish():
|
|
os.system("sudo skipfish -h")
|
|
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline")
|
|
|
|
def subdomain():
|
|
sdc=input("[1]install [2]Run [99]BAck >> ")
|
|
if sdc == 1:
|
|
os.system("sudo pip install requests argparse dnspython")
|
|
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && cd Sublist3r && sudo pip install -r requirements.txt")
|
|
menu()
|
|
elif sdc == 2:
|
|
print("Go to Sublist3r and run ./sublist3r")
|
|
os.system("cd Sublist3r && ./sublist3r")
|
|
elif sdc == 99 :
|
|
webAttack()
|
|
else :
|
|
main()
|
|
|
|
def androidhack():
|
|
print("""
|
|
[1] Keydroid
|
|
[2] MySMS
|
|
[3] Getdroid
|
|
[4] DroidFiles (Get files from Android Directories)
|
|
[5] Lockphish (Grab target LOCK PIN)
|
|
[6] Whatsapp Attack
|
|
[7] DroidCam (Capture Image)
|
|
[8] EvilApp (Hijack Session)
|
|
[99]Main Menu
|
|
""")
|
|
choice = input("Z4nzu =>>")
|
|
if choice == 1:
|
|
clearScr()
|
|
keydroid()
|
|
elif choice == 2:
|
|
clearScr()
|
|
mysms()
|
|
elif choice == 3:
|
|
clearScr()
|
|
getdroid()
|
|
elif choice == 5:
|
|
clearScr()
|
|
lock()
|
|
elif choice == 4:
|
|
clearScr()
|
|
droidfile()
|
|
elif choice == 6:
|
|
clearScr()
|
|
whatshack()
|
|
elif choice == 7:
|
|
clearScr()
|
|
droidcam()
|
|
elif choice == 8:
|
|
clearScr()
|
|
evilapp()
|
|
elif choice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def keydroid():
|
|
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ")
|
|
elif userchoice == 2:
|
|
os.system("cd keydroid && bash keydroid.sh")
|
|
elif userchoice == 99:
|
|
androidhack()
|
|
else :
|
|
menu()
|
|
|
|
def mysms():
|
|
os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/mysms \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/mysms")
|
|
elif userchoice == 2:
|
|
os.system("cd mysms && bash mysms.sh")
|
|
elif userchoice == 99:
|
|
androidhack()
|
|
else :
|
|
menu()
|
|
|
|
def getdroid():
|
|
os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y")
|
|
elif userchoice == 2:
|
|
os.system("cd getdroid && bash getdroid.sh")
|
|
elif userchoice == 99:
|
|
androidhack()
|
|
else :
|
|
menu()
|
|
|
|
def lock():
|
|
os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/lockphish")
|
|
elif userchoice == 2:
|
|
os.system("cd lockphish && bash lockphish.sh")
|
|
elif userchoice == 99:
|
|
androidhack()
|
|
else :
|
|
menu()
|
|
|
|
def droidfile():
|
|
os.system("echo \"Get files from Android directories\"|boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles")
|
|
elif userchoice == 2:
|
|
os.system("cd droidfiles && bash droidfiles.sh")
|
|
elif userchoice == 3:
|
|
os.system("apt-get install default-jdk apksigner")
|
|
os.system("apt-get install libc6-dev-i386 lib32z1")
|
|
os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk")
|
|
os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1")
|
|
elif userchoice == 99:
|
|
androidhack()
|
|
else :
|
|
menu()
|
|
|
|
def whatshack():
|
|
os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/whatshack")
|
|
time.sleep(5)
|
|
print("Installing Required Packges..!! It Take More Time ")
|
|
time.sleep(3)
|
|
os.system("apt-get install openjdk-8-jdk && apt-get install gradle")
|
|
os.system("update-alternatives --list java")
|
|
os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java")
|
|
elif userchoice == 2:
|
|
os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell")
|
|
os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
|
|
os.system("cd whatshack/ && bash whatshack.sh")
|
|
elif userchoice == 99:
|
|
socialattack()
|
|
else :
|
|
menu()
|
|
|
|
def droidcam():
|
|
os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ")
|
|
os.system("cd droidcam && sudo bash install.sh")
|
|
elif userchoice == 2:
|
|
os.system("cd droidcam && bash droidcam.sh")
|
|
elif userchoice == 99:
|
|
socialattack()
|
|
else :
|
|
menu()
|
|
|
|
def evilapp():
|
|
os.system("echo \"EvilApp is a script to generate Android App that can hijack autenticated sessions in cookies\"")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/evilapp")
|
|
elif userchoice == 2:
|
|
os.system("cd evilapp && bash evilapp.sh")
|
|
elif userchoice == 99:
|
|
socialfinder()
|
|
else :
|
|
menu()
|
|
|
|
def payloads():
|
|
print("""
|
|
[1] The FatRat*
|
|
[2] Brutal
|
|
[3] Stitch
|
|
[4] MSFvenom Payload Creator
|
|
[5] Venom Shellcode Generator
|
|
[6] Spycam
|
|
[99]Back
|
|
""")
|
|
payloadchoice =input("Z4nzu >> ")
|
|
if payloadchoice == 1:
|
|
clearScr()
|
|
thefatrat()
|
|
elif payloadchoice == 2:
|
|
clearScr()
|
|
Brutal()
|
|
elif payloadchoice == 3:
|
|
clearScr()
|
|
stitch()
|
|
elif payloadchoice == 4:
|
|
clearScr()
|
|
MSFvenom()
|
|
elif payloadchoice == 5:
|
|
clearScr()
|
|
venom()
|
|
elif payloadchoice == 6:
|
|
clearScr()
|
|
spycam()
|
|
elif payloadchoice == 99:
|
|
menu()
|
|
elif payloadchoice == "":
|
|
payloads()
|
|
else :
|
|
menu()
|
|
|
|
def thefatrat():
|
|
os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy")
|
|
fatratchoice = input("[1]Install [2] Run [3]Update [99]Back >> ")
|
|
if fatratchoice == 1:
|
|
os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git")
|
|
os.system("cd TheFatRat && chmod +x setup.sh")
|
|
menu()
|
|
elif fatratchoice == 2:
|
|
os.system("cd TheFatRat && ./setup.sh")
|
|
elif fatratchoice == 3:
|
|
os.system("cd TheFatRat && ./update && chmod +x setup.sh && ./setup.sh")
|
|
elif fatratchoice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def Brutal():
|
|
os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy")
|
|
print("""
|
|
[!]Requirement
|
|
>>Arduino Software ( I used v1.6.7 )
|
|
>>TeensyDuino
|
|
>>Linux udev rules
|
|
>>Copy and paste the PaensyLib folder inside your Arduino\libraries
|
|
[!]More Information
|
|
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
|
|
""")
|
|
brutalchoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if brutalchoice == 1:
|
|
os.system("sudo git clone https://github.com/Screetsec/Brutal.git")
|
|
os.system("cd Brutal && chmod +x Brutal.sh ")
|
|
elif brutalchoice == 2:
|
|
os.system("cd Brutal && sudo ./Brutal.sh")
|
|
elif brutalchoice == 99:
|
|
payloads()
|
|
else :
|
|
menu()
|
|
|
|
def stitch():
|
|
os.system("echo -e \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat")
|
|
stitchchoice = input("[1]Install [2]Run [99]Back >>" )
|
|
if stitchchoice == 1:
|
|
os.system("sudo git clone https://github.com/nathanlopez/Stitch.git")
|
|
os.system("cd Stitch && pip install -r lnx_requirements.txt")
|
|
elif stitchchoice == 2:
|
|
os.system("cd Stitch && python main.py")
|
|
elif stitchchoice == 99:
|
|
payloads()
|
|
else :
|
|
menu()
|
|
|
|
def MSFvenom():
|
|
MSFvenom= input("[1]Install [2]Run [99]Back >> ")
|
|
if MSFvenom == 1:
|
|
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh")
|
|
menu()
|
|
elif MSFvenom == 2:
|
|
os.system("cd msfpc && sudo bash msfpc.sh -h -v")
|
|
elif MSFvenom == 99:
|
|
payloads()
|
|
else :
|
|
menu()
|
|
|
|
def venom():
|
|
print("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy")
|
|
venomchoice =input("[1]Install [2]Run [99]Back >> ")
|
|
if venomchoice == 1:
|
|
os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git")
|
|
os.system("chmod -R 775 venom-main && cd venom-main && cd aux && sudo ./setup.sh")
|
|
os.system("sudo ./venom.sh -u")
|
|
print("Download Successfully...!!!")
|
|
#sudo find ./ -name "*.sh" -exec chmod +x {} \; sudo find ./ -name "*.py" -exec chmod +x {} \;
|
|
print("Give Permission to .sh & .py Files")
|
|
elif venomchoice == 2:
|
|
os.system("cd venom && sudo ./venom.sh")
|
|
elif venomchoice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def spycam():
|
|
os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/thelinuxchoice/spycam ")
|
|
os.system("cd spycam && bash install.sh && chmod +x spycam")
|
|
elif userchoice == 2:
|
|
os.system("cd spycam && ./spycam")
|
|
elif userchoice == 99:
|
|
payloads()
|
|
else :
|
|
menu()
|
|
|
|
def wifijamming():
|
|
print("""
|
|
[1] Using Airmon
|
|
[99]Back
|
|
""")
|
|
choice = input("Z4nzu =>> ")
|
|
if choice == 1:
|
|
clearScr()
|
|
airmon()
|
|
elif choice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def airmon():
|
|
# os.system("echo \" \" | boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
print("In Working")
|
|
time.sleep(5)
|
|
menu()
|
|
elif userchoice == 2:
|
|
print("""
|
|
###########################################################################
|
|
# [!] Follow Below steps for Jamming [!] #
|
|
# [1]iwconfig #
|
|
# [2]airmon-ng #
|
|
# [3]airmon-ng start InterfaceName #
|
|
# [4]airodump-ng InterfaceName #
|
|
# [5]airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName #
|
|
# [6]aireply-ng -0 0 -a [mac address] InterfaceName #
|
|
# [+]After Complete monitor mode return your interface in normal mode #
|
|
# [7]airmon-ng stop InterfaceName #
|
|
###########################################################################
|
|
""")
|
|
os.system("sudo airmon-ng")
|
|
elif userchoice == 99:
|
|
wifijamming()
|
|
else :
|
|
menu()
|
|
# z=raw_input("Enter Your wifi Interface Name :- ")
|
|
# os.system("airmon-ng && airmon-ng start %s"%z)
|
|
|
|
def portforwading():
|
|
print("In Working ......")
|
|
time.sleep(3)
|
|
menu()
|
|
|
|
def sqltool():
|
|
print("""
|
|
[1]sqlmap tool
|
|
[99]Back
|
|
""")
|
|
choice =input("Z4nzu =>> ")
|
|
if choice == 1:
|
|
clearScr()
|
|
sqlmap()
|
|
elif choice == 99:
|
|
menu()
|
|
else :
|
|
menu()
|
|
|
|
def sqlmap():
|
|
os.system("echo \"[!]sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers\"|boxes -d boy")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
|
|
print("Downloaded Successfully..!!")
|
|
menu()
|
|
elif userchoice == 2:
|
|
os.system("cd sqlmap && python sqlmap.py -h")
|
|
print("echo \"[!]python sqlmap.py -u [<http://example.com>] --batch --banner \n[!]For More Usage : https://github.com/sqlmapproject/sqlmap/wiki/Usage\"|boxes -d boy")
|
|
elif userchoice == 99:
|
|
sqltool()
|
|
else :
|
|
menu()
|
|
|
|
def others():
|
|
print("""
|
|
[1]SMWYG-Show-Me-What-You-Got (1.4 Billion Clear Text Password)
|
|
[99]BAck
|
|
""")
|
|
choice = input("Z4nzu =>>")
|
|
if choice == 1:
|
|
clearScr()
|
|
showme()
|
|
elif choice == 99:
|
|
menu()
|
|
elif choice == "":
|
|
others()
|
|
else :
|
|
menu()
|
|
|
|
def showme():
|
|
print("""This tool allows you to perform OSINT and reconnaissance on an organisation or an individual.
|
|
It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation
|
|
leak This database makes finding passwords faster and easier than ever before.
|
|
""")
|
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
|
if userchoice == 1:
|
|
os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git")
|
|
os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ")
|
|
menu()
|
|
elif userchoice == 2:
|
|
os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py")
|
|
elif userchoice == 99:
|
|
others()
|
|
else :
|
|
menu()
|
|
|
|
def updatesys():
|
|
os.system("sudo apt update && sudo apt full-upgrade -y")
|
|
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
|
|
os.system("sudo apt-get install python3-pip")
|
|
menu()
|
|
|
|
def clearScr():
|
|
if system() == 'Linux':
|
|
os.system('clear')
|
|
if system() == 'Windows':
|
|
os.system('cls')
|
|
|
|
if __name__ == "__main__":
|
|
try:
|
|
menu()
|
|
except KeyboardInterrupt:
|
|
print(" Sorry ..!!!")
|
|
time.sleep(3)
|