mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-15 04:05:29 +00:00
1972 lines
70 KiB
Python
1972 lines
70 KiB
Python
##!/usr/bin/env python3
|
||
# -*- coding: UTF-8 -*-
|
||
import os
|
||
import sys
|
||
import argparse
|
||
import threading
|
||
import webbrowser
|
||
import requests
|
||
import time
|
||
import http.client
|
||
import urllib.request
|
||
import json
|
||
import telnetlib
|
||
import glob
|
||
import getpass
|
||
import socket
|
||
import base64
|
||
from getpass import getpass
|
||
import subprocess
|
||
from sys import argv
|
||
import random
|
||
import queue
|
||
import subprocess
|
||
import re
|
||
import getpass
|
||
from os import path
|
||
from platform import system
|
||
from urllib.parse import urlparse
|
||
from xml.dom import minidom
|
||
from optparse import OptionParser
|
||
from time import sleep
|
||
Logo="""\033[33m
|
||
|
||
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
|
||
███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███
|
||
███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███
|
||
▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███
|
||
▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███
|
||
███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███
|
||
███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄
|
||
███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██
|
||
▀ ▀
|
||
|
||
\033[97m[!] https://github.com/Z4nzu/hackingtool
|
||
\033[97m """
|
||
def menu():
|
||
print(Logo + """\033[0m
|
||
\033[91m[!] This Tool Must Run as a Root..[!] \033[97m
|
||
[00]AnonSurf
|
||
[01]Information Gathering
|
||
[02]Password Attack && Wordlist Generator
|
||
[03]Wireless Attack
|
||
[04]SQL Injection Tools
|
||
[05]Phishing Attack
|
||
[06]Web Attack Tool
|
||
[07]Post exploitation
|
||
[08]Forensic Tools
|
||
[09]Payload Creator
|
||
[10]Router Exploit
|
||
[11]Wifi Jamming
|
||
[12]SocialMedia Attack
|
||
[13]SocialMedia Finder
|
||
[14]Android Hack
|
||
[15]Steganography
|
||
[16]More Tools
|
||
[17]Update System
|
||
[99]Exit
|
||
""")
|
||
|
||
choice = input("Z4nzu =>> ")
|
||
if choice == "0" or choice == "00":
|
||
clearScr()
|
||
anonsurf()
|
||
elif choice == "1" or choice == "01":
|
||
clearScr()
|
||
info()
|
||
elif choice == "2" or choice == "02":
|
||
clearScr()
|
||
passwd()
|
||
elif choice == "3" or choice == "03":
|
||
clearScr()
|
||
wire()
|
||
elif choice == "4" or choice == "04":
|
||
clearScr()
|
||
sqltool()
|
||
elif choice == "5" or choice == "05":
|
||
clearScr()
|
||
phishattack()
|
||
elif choice == "6" or choice == "06":
|
||
clearScr()
|
||
webAttack()
|
||
elif choice == "7" or choice == "07":
|
||
clearScr()
|
||
postexp()
|
||
elif choice == "8" or choice == "08" :
|
||
clearScr()
|
||
forensic()
|
||
elif choice == "9" or choice == "09" :
|
||
clearScr()
|
||
payloads()
|
||
elif choice == "10":
|
||
clearScr()
|
||
routexp()
|
||
elif choice == "11" :
|
||
clearScr()
|
||
wifijamming()
|
||
elif choice == "12" :
|
||
clearScr()
|
||
socialattack()
|
||
elif choice == "13" :
|
||
clearScr()
|
||
socialfinder()
|
||
elif choice == "14":
|
||
clearScr()
|
||
androidhack()
|
||
elif choice == "15":
|
||
clearScr()
|
||
steganography()
|
||
elif choice == "16":
|
||
clearScr()
|
||
print(Logo)
|
||
others()
|
||
elif choice == "17":
|
||
clearScr()
|
||
print(Logo)
|
||
updatesys()
|
||
elif choice == "99" :
|
||
clearScr(), sys.exit()
|
||
exit()
|
||
elif choice == "":
|
||
menu()
|
||
else:
|
||
print("Wrong Input...!!")
|
||
time.sleep(3)
|
||
menu()
|
||
|
||
def anonsurf():
|
||
os.system("figlet -f standard -c Anonmously Hiding Tool | lolcat")
|
||
print("""
|
||
[1] Anonmously Surf
|
||
[2] Multitor
|
||
[99] Back
|
||
""")
|
||
choice = input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
ansurf()
|
||
elif choice == "2":
|
||
clearScr()
|
||
multitor()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def ansurf():
|
||
os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo cHange Ip\" |boxes -d boy | lolcat")
|
||
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
|
||
if anc == "1":
|
||
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
|
||
os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf")
|
||
anonsurf()
|
||
elif anc=="2":
|
||
os.system("sudo anonsurf start")
|
||
elif anc == "3":
|
||
os.system("sudo anonsurf stop")
|
||
elif anc == "99":
|
||
anonsurf()
|
||
else :
|
||
menu()
|
||
|
||
def multitor():
|
||
os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git")
|
||
anonsurf()
|
||
elif userchoice == "2":
|
||
os.system("cd multitor && bash multitor.sh")
|
||
elif userchoice == "99":
|
||
anonsurf()
|
||
else :
|
||
menu()
|
||
|
||
def info():
|
||
os.system("figlet -f standard -c Information Gathering Tools | lolcat")
|
||
print("""
|
||
[1] Nmap
|
||
[2] Dracnmap
|
||
[3] Port Scanning
|
||
[4] Host To IP
|
||
[5] Xerosploit
|
||
[6] Advanced XSS Detection Suite
|
||
[7] ReconSpider(For All Scaning)
|
||
[8] IsItDown (Check Website Down/Up)
|
||
[99] Back To Main Menu
|
||
""")
|
||
choice2 = input("Z4nzu =>> ")
|
||
if choice2 == "1":
|
||
nmap()
|
||
if choice2 == "2":
|
||
clearScr()
|
||
Dracnmap()
|
||
if choice2 == "3":
|
||
clearScr()
|
||
ports()
|
||
if choice2 == "4":
|
||
clearScr()
|
||
h2ip()
|
||
if choice2 == "5":
|
||
clearScr()
|
||
xerosploit()
|
||
if choice2 == "6":
|
||
clearScr()
|
||
XSStrike()
|
||
elif choice2 == "7":
|
||
clearScr()
|
||
reconspider()
|
||
elif choice2 == "8":
|
||
clearScr()
|
||
isitdown()
|
||
elif choice2 == "99":
|
||
clearScr()
|
||
menu()
|
||
elif choice2 == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def nmap():
|
||
nmapchoice = input("[1]Install [99]BAck >> ")
|
||
if nmapchoice == "1" :
|
||
os.system("sudo git clone https://github.com/nmap/nmap.git")
|
||
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
|
||
# elif nmapchoice == "2":
|
||
# os.system("sudo nmap")
|
||
elif nmapchoice == "99":
|
||
info()
|
||
else:
|
||
menu()
|
||
|
||
def Dracnmap():
|
||
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy | lolcat")
|
||
dracnap = input("[1]Install [2]Run [99]Back >> ")
|
||
if dracnap == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ")
|
||
os.system("cd Dracnmap && chmod +x Dracnmap.sh")
|
||
time.sleep(2)
|
||
info()
|
||
elif dracnap == "2":
|
||
print("Sorry You Have to Run This tool manually By Changing Path...!!")
|
||
print("use ./Dracnmap.sh ")
|
||
exit()
|
||
elif dracnap == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def h2ip():
|
||
host = input("Enter host name(www.google.com) :- ")
|
||
ips = socket.gethostbyname(host)
|
||
print(ips)
|
||
|
||
def ports():
|
||
clearScr()
|
||
target = input('Select a Target IP : ')
|
||
os.system("sudo nmap -O -Pn %s" % target)
|
||
sys.exit()
|
||
|
||
def XSStrike():
|
||
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
|
||
xc=input("[1]Install [99]BAck >>")
|
||
if xc == "1":
|
||
os.system("sudo rm -rf XSStrike")
|
||
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
|
||
info()
|
||
# elif xc == "2" :
|
||
# clearScr()
|
||
# os.system("echo \"YOu have to Run XSStrike as per your Requirment\n By using python3 xsstrike.py [Options]\"|boxes -d boy")
|
||
# os.system("cd XSStrike && python3 xsstrike.py")
|
||
elif xc == "99":
|
||
info()
|
||
else :
|
||
info()
|
||
|
||
def xerosploit():
|
||
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat")
|
||
xeros=input("[1]Install [2]Run [99]Back >>")
|
||
if xeros == "1":
|
||
os.system("git clone https://github.com/LionSec/xerosploit")
|
||
os.system("cd xerosploit && sudo python install.py")
|
||
info()
|
||
elif xeros == "2":
|
||
os.system("sudo xerosploit")
|
||
elif xeros == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def reconspider():
|
||
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
|
||
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
|
||
info()
|
||
# elif userchoice == "2":
|
||
# os.system("cd reconspider && python3 reconspider.py")
|
||
elif userchoice == "99":
|
||
info()
|
||
else :
|
||
menu()
|
||
|
||
def setoolkit():
|
||
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy | lolcat")
|
||
choiceset = input("[1]Install [2]Run [99]BAck >>")
|
||
if choiceset == "1":
|
||
os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git")
|
||
os.system("python social-engineer-toolkit/setup.py")
|
||
phishattack()
|
||
if choiceset == "2":
|
||
clearScr()
|
||
os.system("sudo setoolkit")
|
||
elif choiceset == "99":
|
||
phishattack()
|
||
else:
|
||
menu()
|
||
|
||
def passwd():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Wordlist Generator | lolcat")
|
||
print("""
|
||
[01]Cupp
|
||
[02]WordlistCreator
|
||
[03]Goblin WordGenerator
|
||
[04]Credential reuse attacks
|
||
[05]Password list((1.4 Billion Clear Text Password))
|
||
[99]Back To Main Menu
|
||
""")
|
||
passchoice = input("Z4nzu ==>> ")
|
||
if passchoice == "1" or passchoice == "01":
|
||
clearScr()
|
||
cupp()
|
||
elif passchoice == "2" or passchoice == "02":
|
||
clearScr()
|
||
wlcreator()
|
||
elif passchoice == "3" or passchoice == "03":
|
||
clearScr()
|
||
goblinword()
|
||
elif passchoice == "4" or passchoice == "04":
|
||
clearScr()
|
||
credentialattack()
|
||
elif passchoice == "5" or passchoice == "05":
|
||
clearScr()
|
||
showme()
|
||
elif passchoice == "99":
|
||
clearScr()
|
||
menu()
|
||
elif passchoice == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def cupp():
|
||
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy | lolcat ")
|
||
cc=input("[1]Install [99]Back >> ")
|
||
if cc == "1":
|
||
os.system("git clone https://github.com/Mebus/cupp.git")
|
||
passwd()
|
||
elif cc == "2":
|
||
# os.system("cd cupp && ./cupp.py -h")
|
||
pass
|
||
elif cc == "99" :
|
||
passwd()
|
||
else :
|
||
main()
|
||
|
||
def wlcreator():
|
||
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator")
|
||
passwd()
|
||
elif userchoice == "2":
|
||
os.system("cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def goblinword():
|
||
os.system("echo \" GoblinWordGenerator \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git")
|
||
passwd()
|
||
elif userchoice == "2":
|
||
os.system("cd GoblinWordGenerator && python3 goblin.py")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def credentialattack():
|
||
os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git")
|
||
os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt")
|
||
passwd()
|
||
elif userchoice == "2" :
|
||
os.system("cd Cr3dOv3r && sudo python3 Cr3d0v3r.py -h")
|
||
elif userchoice == "99":
|
||
passwd()
|
||
else :
|
||
menu()
|
||
|
||
def wire():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Wireless Attack Tools | lolcat")
|
||
print("""
|
||
[1] WiFi-Pumpkin
|
||
[2] pixiewps
|
||
[3] Bluetooth Honeypot GUI Framework
|
||
[4] Fluxion
|
||
[5] Wifiphisher
|
||
[6] Wifite
|
||
[7] EvilTwin
|
||
[99]Back To The Main Menu """)
|
||
choice4 = input("Z4nzu ==>> ")
|
||
if choice4 == "1":
|
||
clearScr()
|
||
wifipumkin()
|
||
if choice4 == "2":
|
||
clearScr()
|
||
pixiewps()
|
||
if choice4 == "3":
|
||
clearScr()
|
||
bluepot()
|
||
if choice4 == "4":
|
||
clearScr()
|
||
fluxion()
|
||
if choice4 == "5":
|
||
clearScr()
|
||
wifiphisher()
|
||
elif choice4 == "6":
|
||
clearScr()
|
||
wifite()
|
||
elif choice4 == "7":
|
||
clearScr()
|
||
eviltwin()
|
||
elif choice4 == "99":
|
||
menu()
|
||
elif choice4 == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def wifipumkin():
|
||
os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy | lolcat")
|
||
wp=input("[1]Install [2]Run [99]Back >>")
|
||
if wp == "1":
|
||
os.system("sudo apt install libssl-dev libffi-dev build-essential")
|
||
os.system("sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git")
|
||
os.system("chmod -R 755 wifipumpkin3 && cd wifipumpkin3")
|
||
os.system("sudo apt install python3-pyqt5 ")
|
||
os.system("sudo python3 setup.py install")
|
||
wire()
|
||
elif wp == "2":
|
||
clearScr()
|
||
os.system("sudo wifipumpkin3")
|
||
elif wp == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def pixiewps():
|
||
os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy | lolcat")
|
||
choicewps = input("[1]Install [2]Run [99]Back >> ")
|
||
if choicewps == "1":
|
||
os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential")
|
||
os.system("cd pixiewps*/ && make ")
|
||
os.system("cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh")
|
||
if choicewps == "2":
|
||
os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy")
|
||
print("You Have To Run Manually By USing >>pixiewps -h ")
|
||
pass
|
||
elif choicewps == "99":
|
||
wire()
|
||
else:
|
||
menu()
|
||
|
||
def bluepot():
|
||
os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar")
|
||
time.sleep(3)
|
||
wire()
|
||
elif choice == "2":
|
||
os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar")
|
||
elif choice == "99":
|
||
wire()
|
||
else:
|
||
menu()
|
||
|
||
def fluxion():
|
||
os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcAT")
|
||
choice = input("[1]Install [2]Run [99]Back >>")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
|
||
os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh")
|
||
os.system("cd .. && sudo chmod +x fluxion.sh")
|
||
time.sleep(2)
|
||
wire()
|
||
elif choice == "2":
|
||
os.system("cd Fluxion && sudo bash fluxion.sh")
|
||
elif choice == "99" :
|
||
wire()
|
||
else:
|
||
menu()
|
||
|
||
def wifiphisher():
|
||
print("""
|
||
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
|
||
Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
|
||
targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
|
||
connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
|
||
victim stations with malware..
|
||
""")
|
||
print("For More Details Visit >> https://github.com/wifiphisher/wifiphisher")
|
||
wchoice=input("[1]Install [2]Run [99]Back >> ")
|
||
if wchoice == "1":
|
||
os.system("git clone https://github.com/wifiphisher/wifiphisher.git")
|
||
os.system("cd wifiphisher && sudo python3 setup.py install")
|
||
wire()
|
||
if wchoice == "2":
|
||
os.system("cd wifiphisher && sudo wifiphisher")
|
||
elif wchoice == "99" :
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def wifite():
|
||
wc=input("[1]Install [2]Run [99]BAck >> ")
|
||
if wc == "1":
|
||
os.system("sudo git clone https://github.com/kimocoder/wifite2.git")
|
||
os.system("cd wifite2 && sudo python3 setup.py install && sudo pip3 install -r requirements.txt")
|
||
time.sleep(3)
|
||
wire()
|
||
elif wc =="2":
|
||
os.system("cd wifite2 && sudo wifite")
|
||
elif wc == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def eviltwin():
|
||
os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/fakeap ")
|
||
wire()
|
||
elif userchoice == "2":
|
||
os.system("cd fakeap && sudo bash fakeap.sh")
|
||
elif userchoice == "99":
|
||
wire()
|
||
else :
|
||
menu()
|
||
|
||
def socialattack():
|
||
clearScr()
|
||
os.system("figlet -f standard SocialMedia Attack | lolcat")
|
||
print("""
|
||
[1] Instagram Attack
|
||
[2] Tweeter Attack
|
||
[3] Facebook Attack
|
||
[4] Application Checker
|
||
[99]Back To Menu
|
||
""")
|
||
choice=input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
instashell()
|
||
socialattack()
|
||
elif choice == "2":
|
||
clearScr()
|
||
tweetshell()
|
||
socialattack()
|
||
elif choice == "3":
|
||
clearScr()
|
||
faceshell()
|
||
socialattack()
|
||
elif choice == "4" :
|
||
clearScr()
|
||
appcheck()
|
||
socialattack()
|
||
elif choice == "99" :
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def instashell():
|
||
os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy | lolcat")
|
||
instachoice=input("[1]install [2]Run [99]Back >> ")
|
||
if instachoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/instashell ")
|
||
os.system("cd instashell && sudo chmod +x install.sh && sudo ./install.sh")
|
||
socialattack()
|
||
elif instachoice == "2":
|
||
os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh")
|
||
elif instachoice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def tweetshell():
|
||
os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy | lolcat")
|
||
choice = input ("[1]Install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell")
|
||
os.system("cd tweetshell && sudo ./install.sh")
|
||
socialattack()
|
||
elif choice == "2":
|
||
os.system("cd tweetshell && service tor start && sudo ./tweetshell.sh")
|
||
elif choice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def faceshell():
|
||
os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy | lolcat")
|
||
choice = input ("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash")
|
||
os.system("cd facebash && sudo ./install.sh")
|
||
socialattack()
|
||
elif choice == "2":
|
||
os.system("cd facebash && service tor start && sudo ./facebash.sh")
|
||
elif choice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def appcheck():
|
||
os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/underhanded")
|
||
socialattack()
|
||
elif userchoice == "2":
|
||
os.system("cd underhanded && sudo chmod +x underhanded.sh && sudo bash underhanded.sh")
|
||
elif userchoice == "99":
|
||
socialattack()
|
||
else :
|
||
menu()
|
||
|
||
def phishattack():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Phishing Attack Tools | lolcat")
|
||
print("""
|
||
[1] Setoolkit
|
||
[2] SocialFish
|
||
[3] Shellphish
|
||
[4] BlackEye
|
||
[5] I-See_You(Get Location using phishing attack)
|
||
[6] SayCheese (Grab target's Webcam Shots)
|
||
[7] QR Code Jacking
|
||
[99]Back To Main Menu
|
||
""")
|
||
choice = input("Z4nzu ==>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
setoolkit()
|
||
if choice == "2":
|
||
clearScr()
|
||
socialfish()
|
||
if choice == "3":
|
||
clearScr()
|
||
shellphish()
|
||
if choice == "4":
|
||
clearScr()
|
||
blackeye()
|
||
elif choice == "5":
|
||
clearScr()
|
||
iseeyou()
|
||
elif choice == "6":
|
||
clearScr()
|
||
saycheese()
|
||
elif choice == "7":
|
||
clearScr()
|
||
qrjacking()
|
||
if choice == "99":
|
||
clearScr()
|
||
menu()
|
||
elif choice == "":
|
||
menu()
|
||
else:
|
||
menu()
|
||
|
||
def socialfish():
|
||
choice=input("[1]install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
|
||
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
|
||
time.sleep(2)
|
||
phishattack()
|
||
elif choice =="2":
|
||
os.system("cd SocialFish && sudo python3 SocialFish.py root pass")
|
||
elif choice =="99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def shellphish():
|
||
choice=input("[1]install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/shellphish")
|
||
phishattack()
|
||
elif choice =="2":
|
||
os.system("cd shellphish && sudo bash shellphish.sh")
|
||
elif choice =="99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def blackeye():
|
||
choice=input("[1]install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/blackeye")
|
||
time.sleep(2)
|
||
phishattack()
|
||
elif choice =="2":
|
||
os.system("cd blackeye && sudo bash blackeye.sh")
|
||
elif choice =="99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def iseeyou():
|
||
os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git")
|
||
os.system("cd I-See-You && sudo chmod u+x ISeeYou.sh")
|
||
phishattack()
|
||
elif userchoice == "2":
|
||
os.system("cd I-See-You && sudo bash ISeeYou.sh")
|
||
elif userchoice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def saycheese():
|
||
os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/saycheese")
|
||
phishattack()
|
||
elif userchoice == "2":
|
||
os.system("cd saycheese && sudo bash saycheese.sh")
|
||
elif userchoice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def qrjacking():
|
||
os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/ohmyqr && sudo apt-get install scrot")
|
||
phishattack()
|
||
elif userchoice == "2":
|
||
os.system("cd ohmyqr && sudo bash ohmyqr.sh")
|
||
elif userchoice == "99":
|
||
phishattack()
|
||
else :
|
||
menu()
|
||
|
||
def socialfinder():
|
||
clearScr()
|
||
os.system("figlet -f standard SocialMedia Finder | lolcat")
|
||
print("""
|
||
[1]Find SocialMedia By Facial Recognation System
|
||
[2]Find SocialMedia By UserName
|
||
[99]Back To Main Menu
|
||
""")
|
||
choice =input("Z4nzu =>>")
|
||
if choice == "1":
|
||
facialfind()
|
||
elif choice == "2":
|
||
userrecon()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def facialfind():
|
||
choice=input("[1]Install [2]Run [99]Back >>")
|
||
if choice == "1":
|
||
os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade")
|
||
os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes -d boy")
|
||
time.sleep(5)
|
||
os.system("sudo git clone https://github.com/Greenwolf/social_mapper.git")
|
||
os.system("cd social_mapper/setup")
|
||
os.system("sudo python3 -m pip install --no-cache-dir -r requirements.txt")
|
||
socialfinder()
|
||
elif choice == "2":
|
||
os.system("cd social_mapper/setup")
|
||
os.system("sudo python social_mapper.py -h")
|
||
print("""\033[95m
|
||
You have to set Username and password of your AC Or Any Fack Account
|
||
{0}Type in Terminal nano social_mapper.py
|
||
\n ]""")
|
||
os.system("echo \"python social_mapper.py -f [<imageFoldername>] -i [<imgFolderPath>] -m fast [<AcName>] -fb -tw\"| boxes -d headline | lolcat")
|
||
elif choice == "99" :
|
||
socialfinder()
|
||
else :
|
||
menu()
|
||
|
||
def userrecon():
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git")
|
||
os.system("cd userrecon && sudo chmod +x userrecon.sh ")
|
||
time.sleep(3)
|
||
socialfinder()
|
||
elif userchoice == "2":
|
||
os.system("cd userrecon && sudo ./userrecon.sh")
|
||
elif userchoice == "99":
|
||
socialfinder()
|
||
else :
|
||
menu()
|
||
|
||
def forensic():
|
||
clearScr()
|
||
os.system("figlet -f standard Forensic Tools | lolcat ")
|
||
print("""
|
||
[1] Autopsy
|
||
[2] Wireshark
|
||
[3] Bulk_extractor
|
||
[4] Disk Clone and ISO Image Aquire
|
||
[5] Toolsley
|
||
[99]Back to Menu
|
||
""")
|
||
choice = input("Z4nzu ==>>")
|
||
if choice == "3" :
|
||
clearScr()
|
||
bulkextractor()
|
||
elif choice == "4":
|
||
clearScr()
|
||
guymager()
|
||
elif choice == "1":
|
||
clearScr()
|
||
autopsy()
|
||
elif choice == "2":
|
||
clearScr()
|
||
wireshark()
|
||
elif choice == "5":
|
||
clearScr()
|
||
toolsley()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def bulkextractor():
|
||
print("""
|
||
[1]GUI Mode(Download required)
|
||
[2]CLI Mode
|
||
[99]BAck
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/simsong/bulk_extractor.git")
|
||
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
|
||
print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
|
||
print("Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor ")
|
||
elif choice =="2":
|
||
os.system("sudo apt-get install bulk_extractor")
|
||
print("bulk_extractor and options")
|
||
os.system("bulk_extractor")
|
||
os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline | lolcat")
|
||
elif choice == "99":
|
||
forensic()
|
||
elif choice =="":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def guymager():
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt install guymager")
|
||
forensic()
|
||
elif choice == "2":
|
||
clearScr()
|
||
os.system("sudo guymager")
|
||
elif choice == "99":
|
||
forensic()
|
||
elif choice == "":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def autopsy():
|
||
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy | lolcat")
|
||
print("""
|
||
[1]Run [99]Back
|
||
""")
|
||
choice=input("Z4nzu >> ")
|
||
if choice == "1":
|
||
os.system("sudo autopsy")
|
||
if choice == "":
|
||
forensic()
|
||
elif choice =="99":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def wireshark():
|
||
os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
|
||
choice = input("[1]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo wireshark")
|
||
elif choice == "99":
|
||
forensic()
|
||
elif choice == "":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def toolsley():
|
||
os.system("echo \" Toolsley got more than ten useful tools for investigation.\n\b File signature verifier\n\b File identifier \n\b Hash & Validate \n\b Binary inspector \n\bEncode text \n\b Data URI generator \n\b Password generator \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Open [99]Back >> ")
|
||
if userchoice == "1":
|
||
print("Trying to open WebBrowser ")
|
||
time.sleep(3)
|
||
webbrowser.open_new_tab('https://www.toolsley.com/')
|
||
elif userchoice == "99":
|
||
forensic()
|
||
elif userchoice == "":
|
||
forensic()
|
||
else :
|
||
menu()
|
||
|
||
def postexp():
|
||
clearScr()
|
||
os.system("figlet -f standard post explotations | lolcat")
|
||
print("""
|
||
[1] Vegile - Ghost In The Shell
|
||
[2] Chrome Keylogger
|
||
[99]Back
|
||
""")
|
||
expchoice = input("Z4nzu =>> ")
|
||
if expchoice == "1":
|
||
clearScr()
|
||
vegile()
|
||
if expchoice == "2":
|
||
clearScr()
|
||
chromekeylogger()
|
||
elif expchoice == "99":
|
||
menu()
|
||
elif expchoice == "":
|
||
postexp()
|
||
else :
|
||
menu()
|
||
|
||
def vegile():
|
||
os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy | lolcat")
|
||
vegilechoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if vegilechoice == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/Vegile.git")
|
||
os.system("cd Vegile && sudo chmod +x Vegile")
|
||
postexp()
|
||
elif vegilechoice == "2":
|
||
os.system("echo \"You can Use Command : \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment")
|
||
os.system("cd Vegile && sudo bash Vegile ")
|
||
pass
|
||
elif vegilechoice == "99":
|
||
postexp()
|
||
else :
|
||
menu()
|
||
|
||
def chromekeylogger():
|
||
os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git")
|
||
os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ")
|
||
postexp()
|
||
elif userchoice == "2":
|
||
os.system("cd HeraKeylogger && sudo python3 hera.py ")
|
||
elif userchoice == "99":
|
||
postexp()
|
||
else :
|
||
menu()
|
||
|
||
def routexp():
|
||
clearScr()
|
||
os.system("figlet -f standard Router Exploit | lolcat ")
|
||
print("""
|
||
[1] RouterSploit
|
||
[2] Fastssh
|
||
[99]Back to menu
|
||
""")
|
||
choice=input("Z4nzu =>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
routersploit()
|
||
elif choice=="99":
|
||
menu()
|
||
elif choice=="2":
|
||
clearScr()
|
||
fastssh()
|
||
elif choice== "":
|
||
routexp()
|
||
else :
|
||
print("You Entered wrong Choice :")
|
||
routexp()
|
||
|
||
def routersploit():
|
||
os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy | lolcat")
|
||
choice=input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://www.github.com/threat9/routersploit")
|
||
os.system("cd routersploit && sudo python3 -m pip install -r requirements.txt")
|
||
routexp()
|
||
elif choice == "2":
|
||
os.system("cd routersploit && sudo python3 rsf.py")
|
||
elif choice == "99":
|
||
routexp()
|
||
elif choice == "":
|
||
routexp()
|
||
else :
|
||
menu()
|
||
|
||
def fastssh():
|
||
os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/fastssh && cd fastssh && sudo chmod +x fastssh.sh")
|
||
os.system("sudo apt-get install -y sshpass netcat")
|
||
elif userchoice == "2":
|
||
os.system("cd fastssh && sudo bash fastssh.sh --scan")
|
||
elif userchoice == "99":
|
||
routexp()
|
||
else :
|
||
menu()
|
||
|
||
def webAttack():
|
||
clearScr()
|
||
os.system("figlet 'Web Attack Tools' -f standard -c | lolcat")
|
||
print("""
|
||
[1] Web2Attack
|
||
[2] Skipfish
|
||
[3] SubDomain Finder
|
||
[4] CheckURL
|
||
[5] Blazy(Also Find ClickJacking)
|
||
[99]Back To Menu
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
web2attack()
|
||
elif choice == "2":
|
||
skipfish()
|
||
elif choice == "3":
|
||
subdomain()
|
||
elif choice == "4":
|
||
clearScr()
|
||
checkurl()
|
||
elif choice == "5":
|
||
|
||
blazy()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def web2attack():
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/santatic/web2attack.git")
|
||
webAttack()
|
||
elif userchoice == "2":
|
||
os.system("cd web2attack && ./w2aconsole")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def skipfish():
|
||
userchoice = input("[1]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo skipfish -h")
|
||
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline | lolcat")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def subdomain():
|
||
choice=input("[1]install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("sudo pip install requests argparse dnspython")
|
||
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ")
|
||
os.system("cd Sublist3r && sudo pip install -r requirements.txt")
|
||
webAttack()
|
||
elif choice == "2":
|
||
print("Go to Sublist3r and run ./sublist3r")
|
||
os.system("echo \" python sublist3r.py -d example.com \npython sublist3r.py -d example.com -p 80,443\"| boxes -d boy | lolcat")
|
||
os.system("cd Sublist3r && python sublist3r.py -h")
|
||
elif choice == "99" :
|
||
webAttack()
|
||
else :
|
||
main()
|
||
|
||
def checkurl():
|
||
os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UndeadSec/checkURL.git")
|
||
webAttack()
|
||
elif userchoice == "2":
|
||
os.system("cd checkURL && python3 checkURL.py --help")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def blazy():
|
||
os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/UltimateHackers/Blazy")
|
||
os.system("cd Blazy && sudo pip install -r requirements.txt")
|
||
webAttack()
|
||
elif userchoice == "2":
|
||
os.system("cd Blazy && sudo python blazy.py")
|
||
elif userchoice == "99":
|
||
webAttack()
|
||
else :
|
||
menu()
|
||
|
||
def androidhack():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Android Hacking Tools | lolcat")
|
||
print("""
|
||
[1] Keydroid
|
||
[2] MySMS
|
||
[3] Getdroid
|
||
[4] DroidFiles (Get files from Android Directories)
|
||
[5] Lockphish (Grab target LOCK PIN)
|
||
[6] Whatsapp Attack
|
||
[7] DroidCam (Capture Image)
|
||
[8] EvilApp (Hijack Session)
|
||
[99]Main Menu
|
||
""")
|
||
choice = input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
keydroid()
|
||
elif choice == "2":
|
||
clearScr()
|
||
mysms()
|
||
elif choice == "3":
|
||
clearScr()
|
||
getdroid()
|
||
elif choice == "5":
|
||
clearScr()
|
||
lock()
|
||
elif choice == "4":
|
||
clearScr()
|
||
droidfile()
|
||
elif choice == "6":
|
||
clearScr()
|
||
whatshack()
|
||
elif choice == "7":
|
||
clearScr()
|
||
droidcam()
|
||
elif choice == "8":
|
||
clearScr()
|
||
evilapp()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def keydroid():
|
||
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd keydroid && bash keydroid.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def mysms():
|
||
os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/mysms \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/mysms")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd mysms && bash mysms.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def getdroid():
|
||
os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd getdroid && bash getdroid.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def lock():
|
||
os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/lockphish")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd lockphish && bash lockphish.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def droidfile():
|
||
os.system("echo \"Get files from Android directories\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles")
|
||
elif userchoice == "2":
|
||
os.system("cd droidfiles && bash droidfiles.sh")
|
||
elif userchoice == "3":
|
||
os.system("apt-get install default-jdk apksigner")
|
||
os.system("apt-get install libc6-dev-i386 lib32z1")
|
||
os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk")
|
||
os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def whatshack():
|
||
os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/whatshack")
|
||
time.sleep(5)
|
||
print("Installing Required Packges..!! It Take More Time ")
|
||
time.sleep(3)
|
||
os.system("apt-get install openjdk-8-jdk && apt-get install gradle")
|
||
os.system("update-alternatives --list java")
|
||
os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java")
|
||
time.sleep(2)
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell")
|
||
os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
|
||
os.system("cd whatshack/ && bash whatshack.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
elif userchoice=="":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def droidcam():
|
||
os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ")
|
||
os.system("cd droidcam && sudo bash install.sh")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd droidcam && bash droidcam.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def evilapp():
|
||
os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies\"boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/evilapp")
|
||
androidhack()
|
||
elif userchoice == "2":
|
||
os.system("cd evilapp && bash evilapp.sh")
|
||
elif userchoice == "99":
|
||
androidhack()
|
||
else :
|
||
menu()
|
||
|
||
def payloads():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Payloads | lolcat")
|
||
print("""
|
||
[1] The FatRat*
|
||
[2] Brutal
|
||
[3] Stitch
|
||
[4] MSFvenom Payload Creator
|
||
[5] Venom Shellcode Generator
|
||
[6] Spycam
|
||
[99]Back
|
||
""")
|
||
choice =input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
thefatrat()
|
||
elif choice == "2":
|
||
clearScr()
|
||
Brutal()
|
||
elif choice == "3":
|
||
clearScr()
|
||
stitch()
|
||
elif choice == "4":
|
||
clearScr()
|
||
MSFvenom()
|
||
elif choice == "5":
|
||
clearScr()
|
||
venom()
|
||
elif choice == "6":
|
||
clearScr()
|
||
spycam()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def thefatrat():
|
||
os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2] Run [3]Update [4]TroubleShoot(if not run) [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git")
|
||
os.system("cd TheFatRat && sudo chmod +x setup.sh")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd TheFatRat && sudo bash setup.sh")
|
||
elif choice == "3":
|
||
os.system("cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
|
||
elif choice == "4":
|
||
os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
|
||
time.sleep(2)
|
||
payloads()
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def Brutal():
|
||
os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy | lolcat")
|
||
print("""
|
||
[!]Requirement
|
||
>>Arduino Software ( I used v1.6.7 )
|
||
>>TeensyDuino
|
||
>>Linux udev rules
|
||
>>Copy and paste the PaensyLib folder inside your Arduino\libraries
|
||
[!]Kindly Visit below link for Installation for Arduino
|
||
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
|
||
""")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/Screetsec/Brutal.git")
|
||
os.system("cd Brutal && sudo chmod +x Brutal.sh ")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd Brutal && sudo bash Brutal.sh")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def stitch():
|
||
os.system("echo \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >>" )
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/nathanlopez/Stitch.git")
|
||
os.system("cd Stitch && sudo pip install -r lnx_requirements.txt")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd Stitch && sudo python main.py")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def MSFvenom():
|
||
choice= input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh")
|
||
payloads()
|
||
elif choice == "2":
|
||
os.system("cd msfpc && sudo bash msfpc.sh -h -v")
|
||
elif choice == "99":
|
||
payloads()
|
||
elif choice == "":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def venom():
|
||
os.system("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy| lolcat")
|
||
choice =input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git")
|
||
os.system("sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh")
|
||
os.system("sudo ./venom.sh -u")
|
||
print("Download Successfully...!!!")
|
||
payloads()
|
||
#sudo find ./ -name "*.sh" -exec chmod +x {} \; sudo find ./ -name "*.py" -exec chmod +x {} \;
|
||
# print("Give Permission to .sh & .py Files")
|
||
elif choice == "2":
|
||
os.system("cd venom && sudo ./venom.sh")
|
||
elif choice == "99":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def spycam():
|
||
os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/thelinuxchoice/spycam ")
|
||
os.system("cd spycam && bash install.sh && chmod +x spycam")
|
||
payloads()
|
||
elif userchoice == "2":
|
||
os.system("cd spycam && ./spycam")
|
||
elif userchoice == "99":
|
||
payloads()
|
||
elif userchoice == "":
|
||
payloads()
|
||
else :
|
||
menu()
|
||
|
||
def wifijamming():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Wifi Deautheticate | lolcat")
|
||
print("""
|
||
[1] Using Airmon
|
||
[99]Back
|
||
""")
|
||
choice = input("Z4nzu =>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
# airmon()
|
||
pass
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def airmon():
|
||
# os.system("echo \" \" | boxes -d boy")
|
||
print(Logo)
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
print("In Working")
|
||
time.sleep(5)
|
||
menu()
|
||
elif userchoice == "2":
|
||
print("""
|
||
###########################################################################
|
||
# [!] Follow Below steps for Jamming [!] #
|
||
# [1]iwconfig #
|
||
# [2]airmon-ng #
|
||
# [3]airmon-ng start InterfaceName #
|
||
# [4]airodump-ng InterfaceName #
|
||
# [5]airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName #
|
||
# [6]aireply-ng -0 0 -a [mac address] InterfaceName #
|
||
# [+]After Complete monitor mode return your interface in normal mode #
|
||
# [7]airmon-ng stop InterfaceName #
|
||
###########################################################################
|
||
""")
|
||
os.system("sudo airmon-ng")
|
||
elif userchoice == "99":
|
||
wifijamming()
|
||
elif userchoice == "":
|
||
wifijamming()
|
||
else :
|
||
menu()
|
||
# z=raw_input("Enter Your wifi Interface Name :- ")
|
||
# os.system("airmon-ng && airmon-ng start %s"%z)
|
||
|
||
def steganography():
|
||
clearScr()
|
||
os.system("figlet -f standard -c SteganoGraphy | lolcat")
|
||
print("""
|
||
[1] SteganoHide
|
||
[2] StegnoCracker
|
||
[3] WhiteSpace
|
||
[99]Back
|
||
""")
|
||
choice = input("Z4nz =>> ")
|
||
if choice == "1":
|
||
steganohide()
|
||
elif choice == "2":
|
||
stegnocracker()
|
||
elif choice == "3":
|
||
whitespace()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def steganohide():
|
||
choice = input("[1]Install [2]Run [99] >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt-get install steghide -y ")
|
||
steganography()
|
||
elif choice == "2":
|
||
choice1=input("[1]Hide [2]Extract >> ")
|
||
if choice1 =="1":
|
||
filehide=input("Enter Filename you want to Embed(1.txt) :- ")
|
||
filetobehide=input("Enter Cover Filename(test.jpeg) :- ")
|
||
os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide))
|
||
elif choice1 =="2":
|
||
fromfile=input("Enter Filename From Extract Data :- ")
|
||
os.system("steghide extract -sf {0}".format(fromfile))
|
||
elif choice == "99":
|
||
steganography()
|
||
else :
|
||
menu()
|
||
|
||
def stegnocracker():
|
||
os.system("echo \" SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy| lolcat")
|
||
choice = ("[1]Install [2]Run [99]BAck >> ")
|
||
if choice == "1":
|
||
os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall")
|
||
steganography()
|
||
elif choice =="2":
|
||
file1=input("Enter Filename :- ")
|
||
passfile=input("Enter Wordlist Filename :- ")
|
||
os.system("stegcracker {0} {1} ".format(file1,passfile))
|
||
elif choice == "99":
|
||
steganography()
|
||
else :
|
||
menu()
|
||
|
||
def whitespace():
|
||
choice =input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/beardog108/snow10.git ")
|
||
os.system("sudo chmod -R 755 snow10")
|
||
steganography()
|
||
elif choice == "2":
|
||
os.system("cd snow10 && firefox index.html")
|
||
elif choice == "99":
|
||
steganography()
|
||
else :
|
||
menu()
|
||
|
||
def sqltool():
|
||
clearScr()
|
||
os.system("figlet -f standard -c Sql Tools | lolcat")
|
||
print("""
|
||
[1] sqlmap tool
|
||
[99] Back
|
||
""")
|
||
choice =input("Z4nzu =>> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
sqlmap()
|
||
elif choice == "99":
|
||
menu()
|
||
else :
|
||
menu()
|
||
|
||
def sqlmap():
|
||
os.system("echo \"[!]sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers\"|boxes -d boy | lolcat")
|
||
userchoice = input("[1]Install [2]Run [99]Back >> ")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
|
||
print("Downloaded Successfully..!!")
|
||
sqltool()
|
||
elif userchoice == "2":
|
||
os.system("cd sqlmap-dev && python sqlmap.py -h")
|
||
os.system("echo \"[!]python sqlmap.py -u [<http://example.com>] --batch --banner \n[!]For More Usage : https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy")
|
||
elif userchoice == "99":
|
||
sqltool()
|
||
else :
|
||
menu()
|
||
|
||
def others():
|
||
clearScr()
|
||
print(Logo + """
|
||
[1]Ddos Attack Tools
|
||
[2]XSS Attack Tools
|
||
[3]HatCloud(Bypass CloudFlare for IP)
|
||
[99]BAck
|
||
""")
|
||
choice = input("Z4nzu =>>")
|
||
if choice == "1":
|
||
clearScr()
|
||
Ddos()
|
||
elif choice == "2":
|
||
clearScr()
|
||
xsstools()
|
||
elif choice == "3":
|
||
clearScr()
|
||
hatcloud()
|
||
elif choice == "99":
|
||
menu()
|
||
elif choice == "":
|
||
others()
|
||
else :
|
||
menu()
|
||
|
||
def showme():
|
||
print("""This tool allows you to perform OSINT and reconnaissance on an organisation or an individual.
|
||
It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation
|
||
leak This database makes finding passwords faster and easier than ever before.
|
||
""")
|
||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||
if userchoice == "1":
|
||
os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git")
|
||
os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ")
|
||
others()
|
||
elif userchoice == "2":
|
||
os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py")
|
||
elif userchoice == "99":
|
||
others()
|
||
else :
|
||
menu()
|
||
|
||
def hatcloud():
|
||
os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/HatBashBR/HatCloud.git")
|
||
others()
|
||
elif choice == "2":
|
||
tsite=input("Enter Site >>")
|
||
os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite))
|
||
elif choice =="99":
|
||
others()
|
||
else :
|
||
others()
|
||
|
||
def Ddos():
|
||
clearScr()
|
||
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
|
||
print("""
|
||
[1]SlowLoris
|
||
[2]aSYNcrone | Multifunction SYN Flood DDoS Weapon
|
||
[3]UFOnet
|
||
[4]GoldenEye
|
||
[99]Back
|
||
""")
|
||
choice =input("Z4nzu >> ")
|
||
if choice == "1":
|
||
clearScr()
|
||
slowloris()
|
||
elif choice == "2":
|
||
asyncrone()
|
||
elif choice == "3":
|
||
ufonet()
|
||
elif choice == "4":
|
||
goldeneye()
|
||
elif choice == "99":
|
||
others()
|
||
else :
|
||
print("Invalid ...")
|
||
menu()
|
||
|
||
def slowloris():
|
||
os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo pip install slowloris")
|
||
Ddos()
|
||
elif choice == "2":
|
||
ts=input("Enter Target Site :-")
|
||
os.system("slowloris %s"%ts)
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
def asyncrone():
|
||
os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/fatih4842/aSYNcrone.git")
|
||
os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread")
|
||
Ddos()
|
||
elif choice == "2":
|
||
sport=input("Enter Source Port >> ")
|
||
tip=input("Enter Target IP >> ")
|
||
tport=input("Enter Target port >> ")
|
||
os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport))
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
def ufonet():
|
||
os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/epsylon/ufonet.git")
|
||
os.system("cd ufonet;sudo python setup.py install")
|
||
Ddos()
|
||
elif choice == "2":
|
||
os.system("sudo ./ufonet --gui")
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
def goldeneye():
|
||
os.system("echo \"More Info [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat")
|
||
choice = input("[1]install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye")
|
||
Ddos()
|
||
elif choice == "2":
|
||
os.system("cd GoldenEye ;sudo ./goldeneye.py")
|
||
print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py <url> [OPTIONS] ")
|
||
elif choice == "99":
|
||
Ddos()
|
||
else :
|
||
menu()
|
||
|
||
|
||
def xsstools():
|
||
clearScr()
|
||
os.system("figlet -f standard -c XSS Attack Tools | lolcat")
|
||
print("""
|
||
[1] DalFox(Finder of XSS)
|
||
[2] XSS Payload Generator
|
||
[3] Extended XSS Searcher and Finder
|
||
[4] XSS-Freak
|
||
[5] XSpear
|
||
[6] XSSCon
|
||
[7] XanXSS
|
||
[99]BAck
|
||
""")
|
||
choice = input("Z4nzu >> ")
|
||
if choice == "1":
|
||
dalfox()
|
||
elif choice =="2":
|
||
xsspayload()
|
||
elif choice == "99":
|
||
others()
|
||
elif choice == "3":
|
||
xssfinder()
|
||
elif choice == "4":
|
||
xssfreak()
|
||
elif choice == "5":
|
||
xspear()
|
||
elif choice == "6":
|
||
xsscon()
|
||
elif choice == "7":
|
||
xanxss()
|
||
elif choice == "":
|
||
others()
|
||
else :
|
||
others()
|
||
|
||
def dalfox():
|
||
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("sudo apt-get install golang")
|
||
os.system("sudo git clone https://github.com/hahwul/dalfox ")
|
||
os.system("cd dalfox;go install")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("~/go/bin/dalfox")
|
||
print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xsspayload():
|
||
os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/capture0x/XSS-LOADER.git")
|
||
os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("cd XSS-LOADER;sudo python3 payloader.py")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xssfinder():
|
||
os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git glone https://github.com/Damian89/extended-xss-search.git")
|
||
print("""\033[96m
|
||
Follow This Steps After Installation :-
|
||
\033[31m [*]Go To extended-xss-search directory,
|
||
and Rename the example.app-settings.conf to app-settings.conf
|
||
""")
|
||
elif choice == "2":
|
||
print("""\033[96m
|
||
You have To Add Links to scan
|
||
\033[31m[!]Go to extended-xss-search
|
||
[*]config/urls-to-test.txt
|
||
[!]python3 extended-xss-search.py
|
||
""")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xssfreak():
|
||
os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git")
|
||
os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("cd XSS-Freak;sudo python3 XSS-Freak.py")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xspear():
|
||
os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("gem install XSpear")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("XSpear -h")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xsscon():
|
||
os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/menkrep1337/XSSCon")
|
||
os.system("sudo chmod 755 -R XSSCon")
|
||
xsstools()
|
||
elif choice == "2":
|
||
uinput= input("Enter Website >> ")
|
||
os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput))
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
def xanxss():
|
||
os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")
|
||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||
if choice == "1":
|
||
os.system("git clone https://github.com/Ekultek/XanXSS.git ")
|
||
xsstools()
|
||
elif choice == "2":
|
||
os.system("cd XanXSS ;python xanxss.py -h")
|
||
print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ")
|
||
elif choice =="99":
|
||
xsstools()
|
||
else :
|
||
others()
|
||
|
||
|
||
def updatesys():
|
||
os.system("sudo apt update && sudo apt full-upgrade -y")
|
||
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
|
||
os.system("sudo apt-get install python3-pip")
|
||
menu()
|
||
|
||
def clearScr():
|
||
if system() == 'Linux':
|
||
os.system('clear')
|
||
if system() == 'Windows':
|
||
os.system('cls')
|
||
|
||
if __name__ == "__main__":
|
||
notuser =getpass.getuser()
|
||
user=os.getenv("SUDO_UID")
|
||
uname=os.getenv("SUDO_USER")
|
||
try:
|
||
if system() == 'Linux':
|
||
# if path.exists("/home/{0}/Desktop/".format(user)):
|
||
# os.chdir("/home/{0}/Desktop/".format(user))
|
||
# if os.path.isdir('hackingtool'):
|
||
# os.chdir("/home/{0}/Desktop/hackingtool/".format(user))
|
||
# menu()
|
||
# else :
|
||
# os.system("mkdir hackingtool")
|
||
# os.chdir("/home/{0}/Desktop/hackingtool/".format(user))
|
||
# menu()
|
||
if os.geteuid() != 0:
|
||
os.chdir("/home/{0}/Desktop/".format(notuser))
|
||
if os.path.isdir('hackingtool'):
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
else:
|
||
os.system("mkdir hackingtool")
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
elif os.geteuid() == 0:
|
||
if path.exists("home/{0}/Desktop/".format(notuser)):
|
||
os.chdir("/home/{0}/Desktop/".format(notuser))
|
||
if os.path.isdir('hackingtool'):
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
else:
|
||
os.system("mkdir hackingtool")
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
elif uname == 'None':
|
||
os.chdir("/home/{0}/Desktop/".format(notuser))
|
||
if os.path.isdir('hackingtool'):
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
else:
|
||
os.system("mkdir hackingtool")
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
else :
|
||
if path.exists("/home/{0}/Desktop/".format(uname)):
|
||
os.chdir("/home/{0}/Desktop/".format(uname))
|
||
if os.path.isdir('hackingtool'):
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(uname))
|
||
menu()
|
||
else:
|
||
os.system("mkdir hackingtool")
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(uname))
|
||
menu()
|
||
elif uname == 'None':
|
||
os.chdir("/home/{0}/Desktop/".format(notuser))
|
||
if os.path.isdir('hackingtool'):
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
else:
|
||
os.system("mkdir hackingtool")
|
||
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
|
||
menu()
|
||
else :
|
||
print("Sorry ...!!")
|
||
else :
|
||
print("Sorry Open New Issue..!!")
|
||
except KeyboardInterrupt:
|
||
|
||
print("\n Sorry ..!!!")
|
||
time.sleep(3)
|