mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-15 04:05:29 +00:00
eaa920a7e3
List of changes + Handling information about a tool has been improved a lot by providing a `HackingTool` class, which takes care of showing the options, running the selected option, executing the required commands + This class is designed with flexibililty and simplicity in mind, so adding a new tool is a lot easier, mention TITLE, DESCRIPTION, list of INSTALL_COMMANDS, RUN_COMMANDS and PROJECT_URL and there you go... + grouping all the `HackingTool`s is also made super simpler by providing a `HackingToolsCollection` class which groups the tools into their respective categories. Just add the instances of `HackingTool` classes to the TOOLS property of the `HackingToolsCollection`. + Refactored all the tools into separate files based on their categories. + Added a READM_template.md and generate_readme.py script to automatically generate Table of contents and the list of tools available automatically. + Now each tool in the README.md points to its project url if provided. This makes it easier to visit the project from the readme.
220 lines
7.2 KiB
Python
220 lines
7.2 KiB
Python
# coding=utf-8
|
|
import os
|
|
import socket
|
|
import subprocess
|
|
import webbrowser
|
|
|
|
from core import HackingTool
|
|
from core import HackingToolsCollection
|
|
from core import clear_screen
|
|
|
|
|
|
class NMAP(HackingTool):
|
|
TITLE = "Network Map (nmap)"
|
|
DESCRIPTION = "Free and open source utility for network discovery and security auditing"
|
|
INSTALL_COMMANDS = [
|
|
"sudo git clone https://github.com/nmap/nmap.git",
|
|
"sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
|
|
]
|
|
PROJECT_URL = "https://github.com/nmap/nmap"
|
|
|
|
def __init__(self):
|
|
super(NMAP, self).__init__(runnable = False)
|
|
|
|
|
|
class Dracnmap(HackingTool):
|
|
TITLE = "Dracnmap"
|
|
DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
|
|
"exploit the network and gathering information with nmap help."
|
|
INSTALL_COMMANDS = [
|
|
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
|
|
"cd Dracnmap && chmod +x Dracnmap.sh"
|
|
]
|
|
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
|
|
|
|
def __init__(self):
|
|
super(Dracnmap, self).__init__(runnable = False)
|
|
|
|
|
|
class PortScan(HackingTool):
|
|
TITLE = "Port scanning"
|
|
|
|
def __init__(self):
|
|
super(PortScan, self).__init__(installable = False)
|
|
|
|
def run(self):
|
|
clear_screen()
|
|
target = input('Select a Target IP: ')
|
|
subprocess.run(["sudo", "nmap", "-O", "-Pn", target])
|
|
|
|
|
|
class Host2IP(HackingTool):
|
|
TITLE = "Host to IP "
|
|
|
|
def __init__(self):
|
|
super(Host2IP, self).__init__(installable = False)
|
|
|
|
def run(self):
|
|
clear_screen()
|
|
host = input("Enter host name (e.g. www.google.com):- ")
|
|
ips = socket.gethostbyname(host)
|
|
print(ips)
|
|
|
|
|
|
class XeroSploit(HackingTool):
|
|
TITLE = "Xerosploit"
|
|
DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \
|
|
"man-in-the-middle attacks for testing purposes"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/LionSec/xerosploit.git",
|
|
"cd xerosploit && sudo python install.py"
|
|
]
|
|
RUN_COMMANDS = ["sudo xerosploit"]
|
|
PROJECT_URL = "https://github.com/LionSec/xerosploit"
|
|
|
|
|
|
class RedHawk(HackingTool):
|
|
TITLE = "RED HAWK (All In One Scanning)"
|
|
DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]
|
|
RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]
|
|
PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"
|
|
|
|
|
|
class ReconSpider(HackingTool):
|
|
TITLE = "ReconSpider(For All Scaning)"
|
|
DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \
|
|
" Framework for scanning IP Address, Emails, \n" \
|
|
"Websites, Organizations and find out information from" \
|
|
" different sources.\n"
|
|
INSTALL_COMMANDS = [
|
|
"sudo git clone https://github.com/bhavsec/reconspider.git",
|
|
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
|
|
]
|
|
PROJECT_URL = "https://github.com/bhavsec/reconspider"
|
|
|
|
def __init__(self):
|
|
super(ReconSpider, self).__init__(runnable = False)
|
|
|
|
|
|
class IsItDown(HackingTool):
|
|
TITLE = "IsItDown (Check Website Down/Up)"
|
|
DESCRIPTION = "Check Website Is Online or Not"
|
|
|
|
def __init__(self):
|
|
super(IsItDown, self).__init__(
|
|
[('Open', self.open)], installable = False, runnable = False)
|
|
|
|
def open(self):
|
|
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
|
|
|
|
|
|
class Infoga(HackingTool):
|
|
TITLE = "Infoga - Email OSINT"
|
|
DESCRIPTION = "Infoga is a tool gathering email accounts informations\n" \
|
|
"(ip, hostname, country,...) from different public source"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/m4ll0k/Infoga.git",
|
|
"cd infoga;sudo python setup.py install"
|
|
]
|
|
RUN_COMMANDS = ["cd infoga;python infoga.py"]
|
|
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
|
|
|
|
|
|
class ReconDog(HackingTool):
|
|
TITLE = "ReconDog"
|
|
DESCRIPTION = "ReconDog Information Gathering Suite"
|
|
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]
|
|
RUN_COMMANDS = ["cd ReconDog;sudo python dog"]
|
|
PROJECT_URL = "https://github.com/s0md3v/ReconDog"
|
|
|
|
|
|
class Striker(HackingTool):
|
|
TITLE = "Striker"
|
|
DESCRIPTION = "Recon & Vulnerability Scanning Suite"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/s0md3v/Striker.git",
|
|
"cd Striker && pip3 install -r requirements.txt"
|
|
]
|
|
PROJECT_URL = "https://github.com/s0md3v/Striker"
|
|
|
|
def run(self):
|
|
site = input("Enter Site Name (example.com) >> ")
|
|
os.system("cd Striker;")
|
|
subprocess.run(["sudo", "python3", "striker.py", site])
|
|
|
|
|
|
class SecretFinder(HackingTool):
|
|
TITLE = "SecretFinder (like API & etc)"
|
|
DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \
|
|
"like apikeys, accesstoken, authorizations, jwt,..etc \n " \
|
|
"and search anything on javascript files.\n\n " \
|
|
"Usage: python SecretFinder.py -h"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",
|
|
"cd secretfinder; sudo pip3 install -r requirements.txt"
|
|
]
|
|
PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"
|
|
|
|
def __init__(self):
|
|
super(SecretFinder, self).__init__(runnable = False)
|
|
|
|
|
|
class Shodan(HackingTool):
|
|
TITLE = "Find Info Using Shodan"
|
|
DESCRIPTION = "Get ports, vulnerabilities, informations, banners,..etc \n " \
|
|
"for any IP with Shodan (no apikey! no rate limit!)\n" \
|
|
"[X] Don't use this tool because your ip will be blocked by Shodan!"
|
|
INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]
|
|
PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"
|
|
|
|
def __init__(self):
|
|
super(Shodan, self).__init__(runnable = False)
|
|
|
|
|
|
class PortScannerRanger(HackingTool):
|
|
TITLE = "Port Scanner - rang3r"
|
|
DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \
|
|
"all alive hosts within your range that you specify."
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/floriankunushevci/rang3r.git;"
|
|
"sudo pip install termcolor"]
|
|
PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
|
|
|
|
def run(self):
|
|
ip = input("Enter Ip >> ")
|
|
os.system("cd rang3r;")
|
|
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
|
|
|
|
|
|
class Breacher(HackingTool):
|
|
TITLE = "Breacher"
|
|
DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
|
|
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
|
|
PROJECT_URL = "https://github.com/s0md3v/Breacher"
|
|
|
|
def __init__(self):
|
|
super(Breacher, self).__init__(runnable = False)
|
|
|
|
|
|
class InformationGatheringTools(HackingToolsCollection):
|
|
TITLE = "Information gathering tools"
|
|
TOOLS = [
|
|
NMAP(),
|
|
Dracnmap(),
|
|
PortScan(),
|
|
Host2IP(),
|
|
XeroSploit(),
|
|
RedHawk(),
|
|
ReconSpider(),
|
|
IsItDown(),
|
|
Infoga(),
|
|
ReconDog(),
|
|
Striker(),
|
|
SecretFinder(),
|
|
Shodan(),
|
|
PortScannerRanger(),
|
|
Breacher()
|
|
]
|