1
0
mirror of https://github.com/Z4nzu/hackingtool.git synced 2025-06-20 06:15:54 +02:00
Files
hackingtool/hackingtool.py

2527 lines
92 KiB
Python
Raw Normal View History

2020-06-27 11:35:51 +05:30
##!/usr/bin/env python3
# -*- coding: UTF-8 -*-
import os
import sys
import webbrowser
import time
import socket
2020-07-11 15:41:58 +05:30
import requests
2020-06-27 11:35:51 +05:30
from getpass import getpass
from os import path
from platform import system
Logo="""\033[33m
2020-04-11 20:05:52 +05:30
2020-06-27 11:35:51 +05:30
2020-07-11 15:41:58 +05:30
\033[97m[!] https://github.com/Z4nzu/hackingtool \n
\033[91m[X] Please Don't Use For illegal Activity [X]
2020-06-27 11:35:51 +05:30
\033[97m """
def menu():
print(Logo + """\033[0m
2020-07-11 15:41:58 +05:30
\033[97m
2020-06-27 11:35:51 +05:30
[00]AnonSurf
[01]Information Gathering
2020-07-11 15:41:58 +05:30
[02]Wordlist Generator
2020-06-27 11:35:51 +05:30
[03]Wireless Attack
[04]SQL Injection Tools
[05]Phishing Attack
[06]Web Attack Tool
[07]Post exploitation
[08]Forensic Tools
[09]Payload Creator
2020-07-11 15:41:58 +05:30
[10]Exploit Frameworks
2020-06-27 11:35:51 +05:30
[11]Wifi Jamming
2020-07-07 13:13:11 +05:30
[12]Ddos Attack Tools
2020-06-27 11:35:51 +05:30
[13]SocialMedia Finder
2020-07-07 13:13:11 +05:30
[14]XSS Attack Tools
2020-06-27 11:35:51 +05:30
[15]Steganography
[16]More Tools
2020-07-11 15:41:58 +05:30
[17]Update or Uninstall | Hackingtool
2020-06-27 11:35:51 +05:30
[99]Exit
""")
choice = input("Z4nzu =>> ")
if choice == "0" or choice == "00":
clearScr()
anonsurf()
elif choice == "1" or choice == "01":
clearScr()
info()
elif choice == "2" or choice == "02":
clearScr()
passwd()
elif choice == "3" or choice == "03":
clearScr()
wire()
elif choice == "4" or choice == "04":
clearScr()
sqltool()
elif choice == "5" or choice == "05":
clearScr()
phishattack()
elif choice == "6" or choice == "06":
clearScr()
webAttack()
elif choice == "7" or choice == "07":
clearScr()
postexp()
elif choice == "8" or choice == "08" :
clearScr()
forensic()
elif choice == "9" or choice == "09" :
clearScr()
payloads()
elif choice == "10":
clearScr()
routexp()
elif choice == "11" :
clearScr()
wifijamming()
elif choice == "12" :
clearScr()
2020-07-07 13:13:11 +05:30
Ddos()
2020-06-27 11:35:51 +05:30
elif choice == "13" :
clearScr()
socialfinder()
elif choice == "14":
clearScr()
2020-07-07 13:13:11 +05:30
xsstools()
2020-06-27 11:35:51 +05:30
elif choice == "15":
clearScr()
steganography()
elif choice == "16":
clearScr()
print(Logo)
others()
elif choice == "17":
clearScr()
print(Logo)
2020-07-11 15:41:58 +05:30
update()
2020-06-27 11:35:51 +05:30
elif choice == "99" :
2020-07-11 15:41:58 +05:30
print("Happy Hacking...")
time.sleep(1)
clearScr()
sys.exit()
2020-06-27 11:35:51 +05:30
elif choice == "":
menu()
else:
2020-07-11 15:41:58 +05:30
print("\n ERROR: Wrong Input")
time.sleep(2)
2020-06-27 11:35:51 +05:30
menu()
def anonsurf():
os.system("figlet -f standard -c Anonmously Hiding Tool | lolcat")
print("""
[1] Anonmously Surf
[2] Multitor
[99] Back
""")
choice = input("Z4nzu =>>")
if choice == "1":
clearScr()
ansurf()
elif choice == "2":
clearScr()
multitor()
elif choice == "99":
menu()
else :
menu()
def ansurf():
2020-07-11 15:41:58 +05:30
os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo change Ip. \" |boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
if anc == "1":
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf")
anonsurf()
elif anc=="2":
os.system("sudo anonsurf start")
elif anc == "3":
os.system("sudo anonsurf stop")
elif anc == "99":
anonsurf()
else :
menu()
def multitor():
os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git")
anonsurf()
elif userchoice == "2":
os.system("cd multitor && bash multitor.sh")
elif userchoice == "99":
anonsurf()
else :
menu()
def info():
2020-07-07 13:13:11 +05:30
clearScr()
2020-06-27 11:35:51 +05:30
os.system("figlet -f standard -c Information Gathering Tools | lolcat")
print("""
[1] Nmap
[2] Dracnmap
[3] Port Scanning
[4] Host To IP
[5] Xerosploit
2020-07-07 13:13:11 +05:30
[6] RED HAWK (All In One Scanning)
2020-06-27 11:35:51 +05:30
[7] ReconSpider(For All Scaning)
[8] IsItDown (Check Website Down/Up)
2020-07-07 13:13:11 +05:30
[9] Infoga - Email OSINT
[10] ReconDog
[11] Striker
2020-07-11 15:41:58 +05:30
[12] SecretFinder (like API & etc)
[13] Find Info Using Shodan
[14] Port Scanner
[15] Breacher
2020-06-27 11:35:51 +05:30
[99] Back To Main Menu
""")
choice2 = input("Z4nzu =>> ")
if choice2 == "1":
nmap()
if choice2 == "2":
clearScr()
Dracnmap()
if choice2 == "3":
clearScr()
ports()
if choice2 == "4":
clearScr()
h2ip()
if choice2 == "5":
clearScr()
xerosploit()
if choice2 == "6":
clearScr()
2020-07-07 13:13:11 +05:30
redhawk()
2020-06-27 11:35:51 +05:30
elif choice2 == "7":
clearScr()
reconspider()
elif choice2 == "8":
2020-07-11 15:41:58 +05:30
clearScr()
2020-06-27 11:35:51 +05:30
isitdown()
2020-07-07 13:13:11 +05:30
elif choice2 == "9":
clearScr()
infogaemail()
2020-06-27 11:35:51 +05:30
elif choice2 == "99":
clearScr()
menu()
2020-07-07 13:13:11 +05:30
elif choice2 == "10":
clearScr()
recondog()
elif choice2 == "11":
clearScr()
striker()
2020-07-11 15:41:58 +05:30
elif choice2 == "12":
clearScr()
secretfinder()
elif choice2 == "13":
clearScr()
shodantool()
elif choice2 == "14":
clearScr()
portscanner()
elif choice2 == "15":
clearScr()
breacher()
2020-06-27 11:35:51 +05:30
elif choice2 == "":
menu()
else:
menu()
2020-07-11 15:41:58 +05:30
def breacher():
os.system("echo \"An advanced multithreaded admin panel finder written in python.\n Usage : python breacher -u example.com \n\t [!]https://github.com/s0md3v/Breacher \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Breacher.git")
info()
elif choice == "99":
info()
else :
menu()
def portscanner():
os.system("echo \"rang3r is a python script which scans in multi thread\n all alive hosts within your range that you specify.\n\t [!]https://github.com/floriankunushevci/rang3r \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/floriankunushevci/rang3r;sudo pip install termcolor")
elif choice == "2":
ipinput=input("Enter Ip >> ")
os.system("cd rang3r;sudo python rang3r.py --ip {0}".format(ipinput))
elif choice == "99":
info()
else :
menu()
def shodantool():
os.system("echo \"Get ports,vulnerabilities,informations,banners,..etc \n for any IP with Shodan (no apikey! no rate limit!)\n[X]Don't use this tool because your ip will be blocked by Shodan![X] \n\t [!]https://github.com/m4ll0k/Shodanfy.py \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/m4ll0k/Shodanfy.py.git")
info()
elif choice == "99":
info()
else :
menu()
2020-07-07 13:13:11 +05:30
def isitdown():
os.system("echo \"Check Website Is Online or Not \"|boxes -d boy | lolcat")
choice = input("[1]Open [99]Back >> ")
if choice == "1":
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
elif choice == "99":
info()
else :
menu()
2020-07-11 15:41:58 +05:30
def secretfinder():
os.system("echo \"SecretFinder - A python script for find sensitive data \nlike apikeys, accesstoken, authorizations, jwt,..etc \n and search anything on javascript files.\n\n Usage: python SecretFinder.py -h \n\t [*]https://github.com/m4ll0k/SecretFinder \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/m4ll0k/SecretFinder.git secretfinder")
os.system("cd secretfinder; sudo pip3 install -r requirements.txt")
info()
elif choice == "99":
info()
else :
menu()
2020-07-07 13:13:11 +05:30
2020-06-27 11:35:51 +05:30
def nmap():
nmapchoice = input("[1]Install [99]BAck >> ")
if nmapchoice == "1" :
os.system("sudo git clone https://github.com/nmap/nmap.git")
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
2020-07-07 13:13:11 +05:30
info()
2020-06-27 11:35:51 +05:30
elif nmapchoice == "99":
info()
else:
menu()
2020-07-07 13:13:11 +05:30
def striker():
os.system("echo \"Recon & Vulnerability Scanning Suite [!]https://github.com/s0md3v/Striker \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Striker.git")
os.system("cd Striker && pip3 install -r requirements.txt")
info()
elif choice == "2":
tsite= input("Enter Site Name (example.com) >> ")
os.system("cd Striker && sudo python3 striker.py {0}".format(tsite))
elif choice == "99":
info()
else :
menu()
def redhawk():
os.system("echo \"All in one tool for Information Gathering and Vulnerability Scanning. \n [!]https://github.com/Tuhinshubhra/RED_HAWK \n\n [!]Please Use command [FIX] After Running Tool first time \" | boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK")
info()
elif choice == "2":
os.system("cd RED_HAWK;php rhawk.php")
elif choice == "99":
info()
else :
menu()
def infogaemail():
os.system("echo \"Infoga is a tool gathering email accounts informations\n(ip,hostname,country,...) from different public source \n[!]https://github.com/m4ll0k/Infoga \"| boxes -d boy |lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/m4ll0k/Infoga.git")
os.system("cd infoga;sudo python setup.py install")
info()
elif choice == "2":
os.system("cd infoga;python infoga.py")
elif choice == "99":
info()
else :
menu()
def recondog():
os.system("echo \"ReconDog Information Gathering Suite \n[!]https://github.com/s0md3v/ReconDog \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/ReconDog.git ")
info()
elif choice == "2":
os.system("cd ReconDog;sudo python dog")
elif choice == "99":
info()
else :
menu()
2020-06-27 11:35:51 +05:30
def Dracnmap():
2020-07-07 13:13:11 +05:30
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help \n [!]https://github.com/Screetsec/Dracnmap \" | boxes -d boy | lolcat")
dracnap = input("[1]Install [99]Back >> ")
2020-06-27 11:35:51 +05:30
if dracnap == "1":
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ")
os.system("cd Dracnmap && chmod +x Dracnmap.sh")
info()
elif dracnap == "99":
info()
else :
menu()
def h2ip():
host = input("Enter host name(www.google.com) :- ")
ips = socket.gethostbyname(host)
print(ips)
def ports():
clearScr()
target = input('Select a Target IP : ')
os.system("sudo nmap -O -Pn %s" % target)
sys.exit()
def xerosploit():
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat")
xeros=input("[1]Install [2]Run [99]Back >>")
if xeros == "1":
os.system("git clone https://github.com/LionSec/xerosploit")
os.system("cd xerosploit && sudo python install.py")
info()
elif xeros == "2":
os.system("sudo xerosploit")
elif xeros == "99":
info()
else :
menu()
def reconspider():
2020-07-11 15:41:58 +05:30
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\n :~python3 reconspider.py \n\t [!]https://github.com/bhavsec/reconspider \" | boxes -d boy | lolcat")
2020-07-07 13:13:11 +05:30
userchoice = input("[1]Install [99]Back >> ")
2020-06-27 11:35:51 +05:30
if userchoice == "1":
os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
info()
# elif userchoice == "2":
# os.system("cd reconspider && python3 reconspider.py")
elif userchoice == "99":
info()
else :
menu()
def setoolkit():
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy | lolcat")
choiceset = input("[1]Install [2]Run [99]BAck >>")
if choiceset == "1":
os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git")
os.system("python social-engineer-toolkit/setup.py")
phishattack()
if choiceset == "2":
clearScr()
os.system("sudo setoolkit")
elif choiceset == "99":
phishattack()
else:
menu()
def passwd():
clearScr()
os.system("figlet -f standard -c Wordlist Generator | lolcat")
print("""
[01]Cupp
[02]WordlistCreator
[03]Goblin WordGenerator
[04]Credential reuse attacks
2020-07-05 17:52:39 +05:30
[05]Password list((1.4 Billion Clear Text Password))
2020-06-27 11:35:51 +05:30
[99]Back To Main Menu
""")
passchoice = input("Z4nzu ==>> ")
if passchoice == "1" or passchoice == "01":
clearScr()
cupp()
elif passchoice == "2" or passchoice == "02":
clearScr()
wlcreator()
elif passchoice == "3" or passchoice == "03":
clearScr()
goblinword()
elif passchoice == "4" or passchoice == "04":
clearScr()
credentialattack()
2020-07-05 17:52:39 +05:30
elif passchoice == "5" or passchoice == "05":
clearScr()
showme()
2020-06-27 11:35:51 +05:30
elif passchoice == "99":
clearScr()
menu()
elif passchoice == "":
menu()
else:
menu()
def cupp():
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy | lolcat ")
cc=input("[1]Install [99]Back >> ")
if cc == "1":
os.system("git clone https://github.com/Mebus/cupp.git")
passwd()
elif cc == "2":
# os.system("cd cupp && ./cupp.py -h")
pass
elif cc == "99" :
passwd()
else :
2020-07-11 15:41:58 +05:30
menu()
2020-06-27 11:35:51 +05:30
def wlcreator():
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/Z4nzu/wlcreator")
2020-06-27 11:35:51 +05:30
passwd()
elif userchoice == "2":
os.system("cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5")
elif userchoice == "99":
passwd()
else :
menu()
def goblinword():
os.system("echo \" GoblinWordGenerator \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git")
passwd()
elif userchoice == "2":
os.system("cd GoblinWordGenerator && python3 goblin.py")
elif userchoice == "99":
passwd()
else :
menu()
def credentialattack():
os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git")
os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt")
passwd()
elif userchoice == "2" :
os.system("cd Cr3dOv3r && sudo python3 Cr3d0v3r.py -h")
elif userchoice == "99":
passwd()
else :
menu()
def wire():
clearScr()
os.system("figlet -f standard -c Wireless Attack Tools | lolcat")
print("""
[1] WiFi-Pumpkin
[2] pixiewps
[3] Bluetooth Honeypot GUI Framework
[4] Fluxion
[5] Wifiphisher
[6] Wifite
[7] EvilTwin
2020-07-11 15:41:58 +05:30
[8] Howmanypeople
2020-06-27 11:35:51 +05:30
[99]Back To The Main Menu """)
choice4 = input("Z4nzu ==>> ")
if choice4 == "1":
clearScr()
wifipumkin()
if choice4 == "2":
clearScr()
pixiewps()
if choice4 == "3":
clearScr()
bluepot()
if choice4 == "4":
clearScr()
fluxion()
if choice4 == "5":
clearScr()
wifiphisher()
elif choice4 == "6":
clearScr()
wifite()
elif choice4 == "7":
clearScr()
eviltwin()
2020-07-11 15:41:58 +05:30
elif choice4== "8":
clearScr()
howmanypeople()
2020-06-27 11:35:51 +05:30
elif choice4 == "99":
menu()
elif choice4 == "":
menu()
else:
menu()
2020-07-11 15:41:58 +05:30
def howmanypeople():
os.system("echo \"Count the number of people around you by monitoring wifi signals.\n[@]WIFI ADAPTER REQUIRED* \n[*]It may be illegal to monitor networks for MAC addresses, \nespecially on networks that you do not own. Please check your country's laws\n\t [!]https://github.com/An0nUD4Y/howmanypeoplearearound \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt-get install tshark;sudo pip install howmanypeoplearearound")
wire()
elif choice == "2":
os.system("sudo howmanypeoplearearound")
elif choice == "99":
wire()
else :
menu()
2020-06-27 11:35:51 +05:30
def wifipumkin():
os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy | lolcat")
wp=input("[1]Install [2]Run [99]Back >>")
if wp == "1":
os.system("sudo apt install libssl-dev libffi-dev build-essential")
os.system("sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git")
os.system("chmod -R 755 wifipumpkin3 && cd wifipumpkin3")
os.system("sudo apt install python3-pyqt5 ")
os.system("sudo python3 setup.py install")
wire()
elif wp == "2":
clearScr()
os.system("sudo wifipumpkin3")
elif wp == "99":
wire()
else :
menu()
def pixiewps():
os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy | lolcat")
choicewps = input("[1]Install [2]Run [99]Back >> ")
if choicewps == "1":
os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential")
os.system("cd pixiewps*/ && make ")
os.system("cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh")
if choicewps == "2":
os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy")
print("You Have To Run Manually By USing >>pixiewps -h ")
pass
elif choicewps == "99":
wire()
else:
menu()
def bluepot():
os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar")
time.sleep(3)
wire()
elif choice == "2":
os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar")
elif choice == "99":
wire()
else:
menu()
def fluxion():
2020-07-11 15:41:58 +05:30
os.system("echo \"Fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
choice = input("[1]Install [2]Run [99]Back >>")
if choice == "1":
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh")
2020-07-11 15:41:58 +05:30
os.system("cd .. ; sudo chmod +x fluxion.sh")
2020-06-27 11:35:51 +05:30
time.sleep(2)
wire()
elif choice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd Fluxion;sudo bash fluxion.sh")
2020-06-27 11:35:51 +05:30
elif choice == "99" :
wire()
else:
menu()
def wifiphisher():
print("""
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
victim stations with malware..
""")
print("For More Details Visit >> https://github.com/wifiphisher/wifiphisher")
wchoice=input("[1]Install [2]Run [99]Back >> ")
if wchoice == "1":
os.system("git clone https://github.com/wifiphisher/wifiphisher.git")
os.system("cd wifiphisher && sudo python3 setup.py install")
wire()
if wchoice == "2":
os.system("cd wifiphisher && sudo wifiphisher")
elif wchoice == "99" :
wire()
else :
menu()
def wifite():
2020-07-11 15:41:58 +05:30
os.system("echo \"[!]https://github.com/derv82/wifite2 \"|boxes -d boy | lolcat")
wc=input("[1]Install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if wc == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/derv82/wifite2.git")
os.system("cd wifite2 && sudo python3 setup.py install ; sudo pip3 install -r requirements.txt")
2020-06-27 11:35:51 +05:30
time.sleep(3)
wire()
elif wc =="2":
os.system("cd wifite2 && sudo wifite")
elif wc == "99":
wire()
else :
menu()
def eviltwin():
os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/Z4nzu/fakeap")
2020-06-27 11:35:51 +05:30
wire()
elif userchoice == "2":
os.system("cd fakeap && sudo bash fakeap.sh")
elif userchoice == "99":
wire()
else :
menu()
def socialattack():
clearScr()
os.system("figlet -f standard SocialMedia Attack | lolcat")
print("""
[1] Instagram Attack
2020-07-11 15:41:58 +05:30
[2] AllinOne SocialMedia Attack
2020-06-27 11:35:51 +05:30
[3] Facebook Attack
[4] Application Checker
[99]Back To Menu
""")
choice=input("Z4nzu >> ")
if choice == "1":
clearScr()
2020-07-11 15:41:58 +05:30
instabrute()
2020-06-27 11:35:51 +05:30
elif choice == "2":
clearScr()
2020-07-11 15:41:58 +05:30
bruteforce()
2020-06-27 11:35:51 +05:30
elif choice == "3":
clearScr()
faceshell()
elif choice == "4" :
clearScr()
appcheck()
elif choice == "99" :
2020-07-11 15:41:58 +05:30
others()
2020-06-27 11:35:51 +05:30
else :
menu()
2020-07-11 15:41:58 +05:30
def instabrute():
os.system("echo \"Brute force attack against Instagram \n\t [!]https://github.com/chinoogawa/instaBrute \"| boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
instachoice=input("[1]install [2]Run [99]Back >> ")
if instachoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/chinoogawa/instaBrute.git ")
os.system("cd instaBrute;sudo pip install -r requirements.txt")
2020-06-27 11:35:51 +05:30
socialattack()
elif instachoice == "2":
2020-07-11 15:41:58 +05:30
uname = input("Enter Username >> ")
passinput=input("Enter wordword list >> ")
os.system("cd instaBrute;sudo python instaBrute.py -u {0} -d {1}".format(uname,passinput))
2020-06-27 11:35:51 +05:30
elif instachoice == "99":
socialattack()
else :
menu()
2020-07-11 15:41:58 +05:30
def bruteforce():
os.system("echo \"Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n[!]python3 Brute_Force.py -g <Account@gmail.com> -l <File_list> \n\t[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
choice = input ("[1]Install [2]Run [99]BAck >> ")
if choice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git")
os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize")
2020-06-27 11:35:51 +05:30
socialattack()
elif choice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd Brute_Force;python3 Brute_Force.py -h")
2020-06-27 11:35:51 +05:30
elif choice == "99":
socialattack()
else :
menu()
def faceshell():
2020-07-11 15:41:58 +05:30
os.system("echo \" Facebook BruteForcer[!]https://github.com/Matrix07ksa/Brute_Force \"|boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
choice = input ("[1]Install [2]Run [99]Back >> ")
if choice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/Matrix07ksa/Brute_Force.git")
os.system("cd Brute_Force ;sudo pip3 install proxylist;pip3 install mechanize")
2020-06-27 11:35:51 +05:30
socialattack()
elif choice == "2":
2020-07-11 15:41:58 +05:30
uname=input("Enter Username >> ")
passinput=input("Enter Wordlist >> ")
os.system("cd Brute_Force;python3 Brute_Force.py -f {0} -l {1}".format(uname,passinput))
2020-06-27 11:35:51 +05:30
elif choice == "99":
socialattack()
else :
menu()
def appcheck():
os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/jakuta-tech/underhanded")
os.system("cd underhanded && sudo chmod +x underhanded.sh")
2020-06-27 11:35:51 +05:30
socialattack()
elif userchoice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd underhanded ; sudo bash underhanded.sh")
2020-06-27 11:35:51 +05:30
elif userchoice == "99":
socialattack()
else :
menu()
def phishattack():
clearScr()
os.system("figlet -f standard -c Phishing Attack Tools | lolcat")
print("""
[1] Setoolkit
[2] SocialFish
2020-07-11 15:41:58 +05:30
[3] HiddenEye
[4] Evilginx2
2020-06-27 11:35:51 +05:30
[5] I-See_You(Get Location using phishing attack)
[6] SayCheese (Grab target's Webcam Shots)
[7] QR Code Jacking
2020-07-11 15:41:58 +05:30
[8] ShellPhish
2020-06-27 11:35:51 +05:30
[99]Back To Main Menu
""")
choice = input("Z4nzu ==>> ")
if choice == "1":
clearScr()
setoolkit()
if choice == "2":
clearScr()
socialfish()
if choice == "3":
clearScr()
2020-07-11 15:41:58 +05:30
hiddeneye()
2020-06-27 11:35:51 +05:30
if choice == "4":
clearScr()
2020-07-11 15:41:58 +05:30
evilginx()
2020-06-27 11:35:51 +05:30
elif choice == "5":
clearScr()
iseeyou()
elif choice == "6":
clearScr()
saycheese()
elif choice == "7":
clearScr()
qrjacking()
2020-07-11 15:41:58 +05:30
elif choice == "8":
clearScr()
shellphish()
elif choice == "99":
2020-06-27 11:35:51 +05:30
clearScr()
menu()
elif choice == "":
menu()
else:
menu()
def socialfish():
2020-07-11 15:41:58 +05:30
os.system("echo \"Automated Phishing Tool & Information Collector \n\t[!]https://github.com/UndeadSec/SocialFish \"|boxes -d boy | lolcat")
choice=input("[1]install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y")
os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt")
time.sleep(2)
phishattack()
elif choice =="2":
os.system("cd SocialFish && sudo python3 SocialFish.py root pass")
elif choice =="99":
phishattack()
else :
menu()
2020-07-11 15:41:58 +05:30
def hiddeneye():
os.system("echo \"Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services \n\t [!]https://github.com/DarkSecDevelopers/HiddenEye \"|boxes -d boy | lolcat ")
choice=input("[1]install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye")
os.system("cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok")
2020-06-27 11:35:51 +05:30
phishattack()
elif choice =="2":
2020-07-11 15:41:58 +05:30
os.system("cd HiddenEye;sudo python3 HiddenEye.py")
2020-06-27 11:35:51 +05:30
elif choice =="99":
phishattack()
else :
menu()
2020-07-11 15:41:58 +05:30
def evilginx():
os.system("echo \"evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies,\nwhich in turn allows to bypass 2-factor authentication protection.\n\n\t [+]Make sure you have installed GO of version at least 1.14.0 \n[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t [+]export GOPATH=$HOME/go \n [+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n[+]Then load it with source ~/.profiles.\n [*]https://github.com/An0nUD4Y/evilginx2 \"|boxes -d boy | lolcat")
choice=input("[1]install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2")
os.system("cd $GOPATH/src/github.com/kgretzky/evilginx2;make")
os.system("sudo make install;sudo evilginx")
2020-06-27 11:35:51 +05:30
time.sleep(2)
phishattack()
elif choice =="2":
2020-07-11 15:41:58 +05:30
os.system("sudo evilginx")
2020-06-27 11:35:51 +05:30
elif choice =="99":
phishattack()
else :
menu()
2020-07-11 15:41:58 +05:30
def shellphish():
os.system("echo \"Phishing Tool for 18 social media \n [!]https://github.com/An0nUD4Y/shellphish \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/An0nUD4Y/shellphish")
elif choice == "2":
os.system("cd shellphish;sudo bash shellphish.sh")
elif choice == "99":
phishattack()
else :
menu()
2020-06-27 11:35:51 +05:30
def iseeyou():
os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git")
os.system("cd I-See-You && sudo chmod u+x ISeeYou.sh")
phishattack()
elif userchoice == "2":
os.system("cd I-See-You && sudo bash ISeeYou.sh")
elif userchoice == "99":
phishattack()
else :
menu()
def saycheese():
os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/hangetzzu/saycheese")
2020-06-27 11:35:51 +05:30
phishattack()
elif userchoice == "2":
os.system("cd saycheese && sudo bash saycheese.sh")
elif userchoice == "99":
phishattack()
else :
menu()
def qrjacking():
os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/cryptedwolf/ohmyqr && sudo apt-get install scrot")
2020-06-27 11:35:51 +05:30
phishattack()
elif userchoice == "2":
os.system("cd ohmyqr && sudo bash ohmyqr.sh")
elif userchoice == "99":
phishattack()
else :
menu()
def socialfinder():
clearScr()
os.system("figlet -f standard SocialMedia Finder | lolcat")
print("""
[1]Find SocialMedia By Facial Recognation System
[2]Find SocialMedia By UserName
2020-07-11 15:41:58 +05:30
[3]Sherlock
[4]SocialScan | Username or Email
2020-06-27 11:35:51 +05:30
[99]Back To Main Menu
""")
choice =input("Z4nzu =>>")
if choice == "1":
2020-07-11 15:41:58 +05:30
clearScr()
2020-06-27 11:35:51 +05:30
facialfind()
elif choice == "2":
2020-07-11 15:41:58 +05:30
clearScr()
finduser()
elif choice == "3":
clearScr()
sherlock()
elif choice == "4":
clearScr()
socialscan()
elif choice == "99":
menu()
else :
menu()
def socialscan():
os.system("echo \"Check email address and username availability on online platforms with 100% accuracy \n\t[*]https://github.com/iojw/socialscan \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo pip install socialscan")
elif choice == "2":
uname =input("Enter Username or Emailid (if both then please space between email & username) >>")
os.system("sudo socialscan {0}".format(uname))
2020-06-27 11:35:51 +05:30
elif choice == "99":
2020-07-11 15:41:58 +05:30
socialfinder()
else :
2020-06-27 11:35:51 +05:30
menu()
2020-07-11 15:41:58 +05:30
def sherlock():
os.system("echo \"Hunt down social media accounts by username across social networks \n For More Usege \n\t >>python3 sherlock --help \n [!]https://github.com/sherlock-project/sherlock \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/sherlock-project/sherlock.git")
os.system("cd sherlock ;sudo python3 -m pip install -r requirements.txt")
elif choice == "2":
uname= input("Enter Username >> ")
os.system("cd sherlock ;sudo python3 sherlock {0}".format(uname))
elif choice == "99":
socialfinder()
2020-06-27 11:35:51 +05:30
else :
menu()
def facialfind():
2020-07-11 15:41:58 +05:30
os.system("echo \"A Social Media Mapping Tool that correlates profiles\n via facial recognition across different sites. \n\t[!]https://github.com/Greenwolf/social_mapper \"|boxes -d boy | lolcat")
choice=input("[1]Install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade")
os.system("sudo git clone https://github.com/Greenwolf/social_mapper.git")
os.system("cd social_mapper/setup")
os.system("sudo python3 -m pip install --no-cache-dir -r requirements.txt")
2020-07-11 15:41:58 +05:30
os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes | lolcat")
2020-06-27 11:35:51 +05:30
elif choice == "2":
os.system("cd social_mapper/setup")
os.system("sudo python social_mapper.py -h")
print("""\033[95m
You have to set Username and password of your AC Or Any Fack Account
2020-07-11 15:41:58 +05:30
[#]Type in Terminal nano social_mapper.py
""")
os.system("echo \"python social_mapper.py -f [<imageFoldername>] -i [<imgFolderPath>] -m fast [<AcName>] -fb -tw\"| boxes | lolcat")
2020-06-27 11:35:51 +05:30
elif choice == "99" :
socialfinder()
else :
menu()
2020-07-11 15:41:58 +05:30
def finduser():
os.system("echo \"Find usernames across over 75 social networks \n [!]https://github.com/xHak9x/finduser \"|boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/xHak9x/finduser.git")
os.system("cd finduser && sudo chmod +x finduser.sh")
2020-06-27 11:35:51 +05:30
time.sleep(3)
socialfinder()
elif userchoice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd finduser && sudo bash finduser.sh")
2020-06-27 11:35:51 +05:30
elif userchoice == "99":
socialfinder()
else :
menu()
def forensic():
clearScr()
os.system("figlet -f standard Forensic Tools | lolcat ")
print("""
2020-07-05 17:52:39 +05:30
[1] Autopsy
[2] Wireshark
[3] Bulk_extractor
[4] Disk Clone and ISO Image Aquire
[5] Toolsley
2020-06-27 11:35:51 +05:30
[99]Back to Menu
""")
choice = input("Z4nzu ==>>")
2020-07-05 17:52:39 +05:30
if choice == "3" :
2020-06-27 11:35:51 +05:30
bulkextractor()
2020-07-05 17:52:39 +05:30
elif choice == "4":
2020-06-27 11:35:51 +05:30
clearScr()
guymager()
2020-07-05 17:52:39 +05:30
elif choice == "1":
2020-06-27 11:35:51 +05:30
clearScr()
autopsy()
2020-07-05 17:52:39 +05:30
elif choice == "2":
clearScr()
wireshark()
elif choice == "5":
clearScr()
toolsley()
2020-06-27 11:35:51 +05:30
elif choice == "99":
menu()
elif choice == "":
menu()
else :
menu()
def bulkextractor():
print("""
[1]GUI Mode(Download required)
[2]CLI Mode
[99]BAck
""")
choice = input("Z4nzu >> ")
if choice == "1":
os.system("sudo git clone https://github.com/simsong/bulk_extractor.git")
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
print("Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor ")
elif choice =="2":
os.system("sudo apt-get install bulk_extractor")
print("bulk_extractor and options")
os.system("bulk_extractor")
os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline | lolcat")
elif choice == "99":
forensic()
elif choice =="":
forensic()
else :
menu()
def guymager():
2020-07-11 15:41:58 +05:30
os.system("echo \"Guymager is a free forensic imager for media acquisition.\n [!]https://guymager.sourceforge.io/ \"|boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt install guymager")
forensic()
elif choice == "2":
clearScr()
os.system("sudo guymager")
elif choice == "99":
forensic()
elif choice == "":
forensic()
else :
menu()
def autopsy():
os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy | lolcat")
2020-07-11 15:41:58 +05:30
choice=input(" [1]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
os.system("sudo autopsy")
if choice == "":
forensic()
elif choice =="99":
forensic()
else :
menu()
2020-07-05 17:52:39 +05:30
def wireshark():
os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
choice = input("[1]Run [99]Back >> ")
if choice == "1":
os.system("sudo wireshark")
elif choice == "99":
forensic()
elif choice == "":
forensic()
else :
menu()
def toolsley():
2020-07-11 15:41:58 +05:30
os.system("echo \" Toolsley got more than ten useful tools for investigation.\n[+]File signature verifier\n[+]File identifier \n[+]Hash & Validate \n[+]Binary inspector \n [+]Encode text \n[+]Data URI generator \n[+]Password generator \" | boxes -d boy | lolcat")
2020-07-05 17:52:39 +05:30
userchoice = input("[1]Open [99]Back >> ")
if userchoice == "1":
print("Trying to open WebBrowser ")
time.sleep(3)
webbrowser.open_new_tab('https://www.toolsley.com/')
elif userchoice == "99":
forensic()
elif userchoice == "":
forensic()
else :
menu()
2020-06-27 11:35:51 +05:30
def postexp():
clearScr()
os.system("figlet -f standard post explotations | lolcat")
print("""
[1] Vegile - Ghost In The Shell
[2] Chrome Keylogger
[99]Back
""")
expchoice = input("Z4nzu =>> ")
if expchoice == "1":
clearScr()
vegile()
if expchoice == "2":
clearScr()
chromekeylogger()
elif expchoice == "99":
menu()
elif expchoice == "":
postexp()
else :
menu()
def vegile():
os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy | lolcat")
vegilechoice = input("[1]Install [2]Run [99]Back >> ")
if vegilechoice == "1":
os.system("sudo git clone https://github.com/Screetsec/Vegile.git")
os.system("cd Vegile && sudo chmod +x Vegile")
postexp()
elif vegilechoice == "2":
os.system("echo \"You can Use Command : \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment")
os.system("cd Vegile && sudo bash Vegile ")
pass
elif vegilechoice == "99":
postexp()
else :
menu()
def chromekeylogger():
os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git")
os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ")
postexp()
elif userchoice == "2":
os.system("cd HeraKeylogger && sudo python3 hera.py ")
elif userchoice == "99":
postexp()
else :
menu()
def routexp():
clearScr()
2020-07-11 15:41:58 +05:30
os.system("figlet -f standard Exploit Framework | lolcat ")
2020-06-27 11:35:51 +05:30
print("""
[1] RouterSploit
2020-07-11 15:41:58 +05:30
[2] WebSploit
[3] Commix
[4] Web2Attack
[5] Fastssh
2020-06-27 11:35:51 +05:30
[99]Back to menu
""")
choice=input("Z4nzu =>> ")
if choice == "1":
clearScr()
routersploit()
elif choice=="99":
menu()
2020-07-11 15:41:58 +05:30
elif choice=="5":
2020-06-27 11:35:51 +05:30
clearScr()
fastssh()
2020-07-11 15:41:58 +05:30
elif choice == "3":
clearScr()
commix()
elif choice == "4":
clearScr()
web2attack()
elif choice == "2":
clearScr()
websploit()
2020-06-27 11:35:51 +05:30
elif choice== "":
routexp()
else :
2020-07-11 15:41:58 +05:30
print("Error Wrong Input..")
routexp()
def commix():
os.system("echo \"Automated All-in-One OS command injection and exploitation tool.\nCommix can be used from web developers, penetration testers or even security researchers\n in order to test web-based applications with the view to find bugs,\n errors or vulnerabilities related to command injection attacks.\n Usage: python commix.py [option(s)] \n\n\t[!]https://github.com/commixproject/commix \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/commixproject/commix.git commix")
elif choice == "99":
routexp()
else :
menu()
def websploit():
os.system("echo \"Websploit is an advanced MITM framework.\n\t [!]https://github.com/The404Hacking/websploit \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("https://github.com/The404Hacking/websploit.git")
elif choice == "2":
os.system("cd websploit;python3 websploit.py")
elif choice == "99":
2020-06-27 11:35:51 +05:30
routexp()
2020-07-11 15:41:58 +05:30
else :
menu()
2020-06-27 11:35:51 +05:30
def routersploit():
os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy | lolcat")
choice=input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://www.github.com/threat9/routersploit")
os.system("cd routersploit && sudo python3 -m pip install -r requirements.txt")
routexp()
elif choice == "2":
os.system("cd routersploit && sudo python3 rsf.py")
elif choice == "99":
routexp()
elif choice == "":
routexp()
else :
menu()
def fastssh():
os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/Z4nzu/fastssh && cd fastssh && sudo chmod +x fastssh.sh")
2020-06-27 11:35:51 +05:30
os.system("sudo apt-get install -y sshpass netcat")
elif userchoice == "2":
os.system("cd fastssh && sudo bash fastssh.sh --scan")
elif userchoice == "99":
routexp()
else :
menu()
2020-07-05 17:52:39 +05:30
2020-06-27 11:35:51 +05:30
def webAttack():
clearScr()
os.system("figlet 'Web Attack Tools' -f standard -c | lolcat")
print("""
[1] Web2Attack
[2] Skipfish
[3] SubDomain Finder
[4] CheckURL
[5] Blazy(Also Find ClickJacking)
2020-07-11 15:41:58 +05:30
[6] Sub-Domain TakeOver
2020-06-27 11:35:51 +05:30
[99]Back To Menu
""")
choice = input("Z4nzu >> ")
if choice == "1":
web2attack()
elif choice == "2":
skipfish()
elif choice == "3":
subdomain()
elif choice == "4":
clearScr()
checkurl()
elif choice == "5":
2020-07-11 15:41:58 +05:30
clearScr()
2020-06-27 11:35:51 +05:30
blazy()
2020-07-11 15:41:58 +05:30
elif choice == "6":
clearScr()
subdomaintakeover()
2020-06-27 11:35:51 +05:30
elif choice == "99":
menu()
2020-07-11 15:41:58 +05:30
else :
print("Wrong Input..")
webAttack()
def subdomaintakeover():
os.system("echo \"Sub-domain takeover vulnerability occur when a sub-domain \n (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..)\nthat has been removed or deleted.\nUsage :python3 takeover.py -d www.domain.com -v \n\t[!]https://github.com/m4ll0k/takeover \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/m4ll0k/takeover.git")
os.system("cd takeover;sudo python3 setup.py install")
webAttack()
elif choice == "99":
webAttack()
2020-06-27 11:35:51 +05:30
else :
menu()
def web2attack():
2020-07-11 15:41:58 +05:30
os.system("echo \"Web hacking framework with tools, exploits by python \n[!]https://github.com/santatic/web2attack \"| boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone https://github.com/santatic/web2attack.git")
2020-07-11 15:41:58 +05:30
menu()
2020-06-27 11:35:51 +05:30
elif userchoice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd web2attack && sudo bash w2aconsole")
2020-06-27 11:35:51 +05:30
elif userchoice == "99":
webAttack()
else :
menu()
def skipfish():
2020-07-11 15:41:58 +05:30
os.system("echo \"Skipfish – Fully automated, active web application security reconnaissance tool \n Usage : skipfish -o [FolderName] targetip/site \n[!]https://tools.kali.org/web-applications/skipfish \"|boxes -d headline | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Run [99]Back >> ")
if userchoice == "1":
os.system("sudo skipfish -h")
os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline | lolcat")
elif userchoice == "99":
webAttack()
else :
menu()
def subdomain():
2020-07-11 15:41:58 +05:30
os.system("echo \"Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT \n Usage:\n\t[1]python sublist3r.py -d example.com \n[2]python sublist3r.py -d example.com -p 80,443\"| boxes -d boy | lolcat")
choice=input("[1]install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
os.system("sudo pip install requests argparse dnspython")
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ")
os.system("cd Sublist3r && sudo pip install -r requirements.txt")
webAttack()
elif choice == "2":
os.system("cd Sublist3r && python sublist3r.py -h")
elif choice == "99" :
webAttack()
else :
2020-07-11 15:41:58 +05:30
menu()
2020-06-27 11:35:51 +05:30
def checkurl():
os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/UndeadSec/checkURL.git")
webAttack()
elif userchoice == "2":
os.system("cd checkURL && python3 checkURL.py --help")
elif userchoice == "99":
webAttack()
else :
menu()
def blazy():
os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/UltimateHackers/Blazy")
os.system("cd Blazy && sudo pip install -r requirements.txt")
webAttack()
elif userchoice == "2":
os.system("cd Blazy && sudo python blazy.py")
elif userchoice == "99":
webAttack()
else :
menu()
def androidhack():
clearScr()
os.system("figlet -f standard -c Android Hacking Tools | lolcat")
print("""
[1] Keydroid
[2] MySMS
2020-07-11 15:41:58 +05:30
[3] Lockphish (Grab target LOCK PIN)
[4] DroidCam (Capture Image)
[5] EvilApp (Hijack Session)
2020-06-27 11:35:51 +05:30
[99]Main Menu
""")
choice = input("Z4nzu =>>")
if choice == "1":
clearScr()
keydroid()
elif choice == "2":
clearScr()
mysms()
2020-07-11 15:41:58 +05:30
# elif choice == "3":
# print("Sorry This Tool Not Available")
# time.sleep(1)
# androidhack()
# # getdroid()
2020-06-27 11:35:51 +05:30
elif choice == "3":
clearScr()
lock()
2020-07-11 15:41:58 +05:30
# elif choice == "4":
# print("Sorry This Tool Not Available")
# time.sleep(1)
# androidhack()
# # droidfile()
# elif choice == "6":
# clearScr()
# whatshack()
2020-06-27 11:35:51 +05:30
elif choice == "4":
clearScr()
droidcam()
2020-07-11 15:41:58 +05:30
elif choice == "5":
2020-06-27 11:35:51 +05:30
clearScr()
evilapp()
elif choice == "99":
2020-07-11 15:41:58 +05:30
others()
2020-06-27 11:35:51 +05:30
else :
menu()
def keydroid():
2020-07-11 15:41:58 +05:30
os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n [+]https://github.com/F4dl0/keydroid \" | boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/F4dl0/keydroid")
2020-06-27 11:35:51 +05:30
androidhack()
elif userchoice == "2":
os.system("cd keydroid && bash keydroid.sh")
elif userchoice == "99":
androidhack()
else :
menu()
def mysms():
2020-07-11 15:41:58 +05:30
os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/papusingh2sms/mysms \" | boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/papusingh2sms/mysms")
2020-06-27 11:35:51 +05:30
androidhack()
elif userchoice == "2":
os.system("cd mysms && bash mysms.sh")
elif userchoice == "99":
androidhack()
else :
menu()
2020-07-11 15:41:58 +05:30
# def getdroid():
# os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy | lolcat")
# userchoice = input("[1]Install [2]Run [99]Back >>")
# if userchoice == "1":
# os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y")
# androidhack()
# elif userchoice == "2":
# os.system("cd getdroid && bash getdroid.sh")
# elif userchoice == "99":
# androidhack()
# else :
# menu()
2020-06-27 11:35:51 +05:30
def lock():
os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone git clone https://github.com/JasonJerry/lockphish")
2020-06-27 11:35:51 +05:30
androidhack()
elif userchoice == "2":
os.system("cd lockphish && bash lockphish.sh")
elif userchoice == "99":
androidhack()
else :
menu()
2020-07-11 15:41:58 +05:30
# def droidfile():
# os.system("echo \"Get files from Android directories\"|boxes -d boy | lolcat")
# userchoice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >>")
# if userchoice == "1":
# os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles")
# elif userchoice == "2":
# os.system("cd droidfiles && bash droidfiles.sh")
# elif userchoice == "3":
# os.system("apt-get install default-jdk apksigner")
# os.system("apt-get install libc6-dev-i386 lib32z1")
# os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk")
# os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1")
# elif userchoice == "99":
# androidhack()
# else :
# menu()
# def whatshack():
# os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell | lolcat")
# userchoice = input("[1]Install [2]Run [99]Back >>")
# if userchoice == "1":
# os.system("sudo git clone https://github.com/thelinuxchoice/whatshack")
# time.sleep(5)
# print("Installing Required Packges..!! It Take More Time ")
# time.sleep(3)
# os.system("apt-get install openjdk-8-jdk && apt-get install gradle")
# os.system("update-alternatives --list java")
# os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java")
# time.sleep(2)
# androidhack()
# elif userchoice == "2":
# os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell")
# os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell")
# os.system("cd whatshack/ && bash whatshack.sh")
# elif userchoice == "99":
# androidhack()
# elif userchoice=="":
# androidhack()
# else :
# menu()
2020-06-27 11:35:51 +05:30
def droidcam():
2020-07-11 15:41:58 +05:30
os.system("echo \"Powerful Tool For Grab Front Camera Snap Using A Link \n[+]https://github.com/kinghacker0/WishFish \"| boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/kinghacker0/WishFish; sudo apt install php wget openssh")
2020-06-27 11:35:51 +05:30
androidhack()
elif userchoice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd wishfish && sudo bash wishfish.sh")
2020-06-27 11:35:51 +05:30
elif userchoice == "99":
androidhack()
else :
menu()
def evilapp():
2020-07-11 15:41:58 +05:30
os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies.\n [!]https://github.com/crypticterminal/EvilApp \" | boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/crypticterminal/EvilApp")
2020-06-27 11:35:51 +05:30
androidhack()
elif userchoice == "2":
os.system("cd evilapp && bash evilapp.sh")
elif userchoice == "99":
androidhack()
else :
menu()
def payloads():
clearScr()
os.system("figlet -f standard -c Payloads | lolcat")
print("""
[1] The FatRat*
[2] Brutal
[3] Stitch
[4] MSFvenom Payload Creator
[5] Venom Shellcode Generator
[6] Spycam
2020-07-11 15:41:58 +05:30
[7] Mob-Droid
2020-06-27 11:35:51 +05:30
[99]Back
""")
choice =input("Z4nzu >> ")
if choice == "1":
clearScr()
thefatrat()
elif choice == "2":
clearScr()
Brutal()
2020-07-11 15:41:58 +05:30
elif choice == "7":
clearScr()
mobdroid()
2020-06-27 11:35:51 +05:30
elif choice == "3":
clearScr()
stitch()
elif choice == "4":
clearScr()
MSFvenom()
elif choice == "5":
clearScr()
venom()
elif choice == "6":
clearScr()
spycam()
elif choice == "99":
menu()
elif choice == "":
payloads()
else :
menu()
2020-07-11 15:41:58 +05:30
def mobdroid():
os.system("echo \"Mob-Droid helps you to generate metasploit payloads in easy way\n without typing long commands and save your time.\n[!]https://github.com/kinghacker0/Mob-Droid \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/kinghacker0/mob-droid")
elif choice == "2":
os.system("cd Mob-Droid;sudo python mob-droid.py")
elif choice == "99":
payloads()
else :
menu()
2020-06-27 11:35:51 +05:30
def thefatrat():
os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy | lolcat")
choice = input("[1]Install [2] Run [3]Update [4]TroubleShoot(if not run) [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git")
os.system("cd TheFatRat && sudo chmod +x setup.sh")
payloads()
elif choice == "2":
os.system("cd TheFatRat && sudo bash setup.sh")
elif choice == "3":
os.system("cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
elif choice == "4":
os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
time.sleep(2)
payloads()
elif choice == "99":
payloads()
else :
menu()
def Brutal():
os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy | lolcat")
print("""
[!]Requirement
>>Arduino Software ( I used v1.6.7 )
>>TeensyDuino
>>Linux udev rules
>>Copy and paste the PaensyLib folder inside your Arduino\libraries
[!]Kindly Visit below link for Installation for Arduino
>> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
""")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/Screetsec/Brutal.git")
os.system("cd Brutal && sudo chmod +x Brutal.sh ")
payloads()
elif choice == "2":
os.system("cd Brutal && sudo bash Brutal.sh")
elif choice == "99":
payloads()
else :
menu()
def stitch():
os.system("echo \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >>" )
if choice == "1":
os.system("sudo git clone https://github.com/nathanlopez/Stitch.git")
os.system("cd Stitch && sudo pip install -r lnx_requirements.txt")
payloads()
elif choice == "2":
os.system("cd Stitch && sudo python main.py")
elif choice == "99":
payloads()
else :
menu()
def MSFvenom():
2020-07-11 15:41:58 +05:30
os.system("echo \"MSFvenom Payload Creator (MSFPC) is a wrapper to generate \nmultiple types of payloads, based on users choice.\nThe idea is to be as simple as possible (only requiring one input) \nto produce their payload. [!]https://github.com/g0tmi1k/msfpc \" |boxes -d boy | lolcat ")
2020-06-27 11:35:51 +05:30
choice= input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
2020-07-11 15:41:58 +05:30
os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git")
os.system("cd msfpc;sudo chmod +x msfpc.sh")
2020-06-27 11:35:51 +05:30
payloads()
elif choice == "2":
2020-07-11 15:41:58 +05:30
os.system("cd msfpc;sudo bash msfpc.sh -h -v")
2020-06-27 11:35:51 +05:30
elif choice == "99":
payloads()
elif choice == "":
payloads()
else :
menu()
def venom():
os.system("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy| lolcat")
choice =input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git")
os.system("sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh")
os.system("sudo ./venom.sh -u")
payloads()
elif choice == "2":
os.system("cd venom && sudo ./venom.sh")
elif choice == "99":
payloads()
else :
menu()
def spycam():
os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/spycam ")
os.system("cd spycam && bash install.sh && chmod +x spycam")
payloads()
elif userchoice == "2":
os.system("cd spycam && ./spycam")
elif userchoice == "99":
payloads()
elif userchoice == "":
payloads()
else :
menu()
def wifijamming():
clearScr()
os.system("figlet -f standard -c Wifi Deautheticate | lolcat")
print("""
2020-07-11 15:41:58 +05:30
[1]WifiJammer-NG
[2] Using Airmon
2020-06-27 11:35:51 +05:30
[99]Back
""")
choice = input("Z4nzu =>> ")
if choice == "1":
clearScr()
2020-07-11 15:41:58 +05:30
wifijammingng()
elif choice == "2":
clearScr()
airmon()
2020-06-27 11:35:51 +05:30
elif choice == "99":
menu()
else :
menu()
2020-07-11 15:41:58 +05:30
def wifijammingng():
os.system("echo \"Continuously jam all wifi clients and access points within range.\n\t [!]https://github.com/MisterBianco/wifijammer-ng \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/MisterBianco/wifijammer-ng.git")
os.system("cd wifijammer-ng;sudo pip3 install -r requirements.txt")
elif choice == "2":
os.system("echo \"python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]\"| boxes | lolcat")
os.system("cd wifijammer-ng;sudo python3 wifijammer.py")
elif choice == "99":
wifijamming()
else :
menu()
2020-06-27 11:35:51 +05:30
def airmon():
print(Logo)
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
print("In Working")
time.sleep(5)
menu()
elif userchoice == "2":
print("""
###########################################################################
# [!] Follow Below steps for Jamming [!] #
# [1]iwconfig #
# [2]airmon-ng #
# [3]airmon-ng start InterfaceName #
# [4]airodump-ng InterfaceName #
# [5]airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName #
# [6]aireply-ng -0 0 -a [mac address] InterfaceName #
# [+]After Complete monitor mode return your interface in normal mode #
# [7]airmon-ng stop InterfaceName #
###########################################################################
""")
os.system("sudo airmon-ng")
elif userchoice == "99":
wifijamming()
elif userchoice == "":
wifijamming()
else :
menu()
def steganography():
clearScr()
os.system("figlet -f standard -c SteganoGraphy | lolcat")
print("""
[1] SteganoHide
[2] StegnoCracker
[3] WhiteSpace
[99]Back
""")
choice = input("Z4nz =>> ")
if choice == "1":
steganohide()
elif choice == "2":
2020-07-11 15:41:58 +05:30
clearScr()
2020-06-27 11:35:51 +05:30
stegnocracker()
elif choice == "3":
2020-07-11 15:41:58 +05:30
clearScr()
2020-06-27 11:35:51 +05:30
whitespace()
elif choice == "99":
menu()
else :
menu()
def steganohide():
choice = input("[1]Install [2]Run [99] >> ")
if choice == "1":
os.system("sudo apt-get install steghide -y ")
steganography()
elif choice == "2":
choice1=input("[1]Hide [2]Extract >> ")
if choice1 =="1":
2020-07-11 15:41:58 +05:30
filehide=input("Enter Filename you want to Embed(1.txt) >> ")
filetobehide=input("Enter Cover Filename(test.jpeg) >> ")
2020-06-27 11:35:51 +05:30
os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide))
elif choice1 =="2":
2020-07-11 15:41:58 +05:30
fromfile=input("Enter Filename From Extract Data >> ")
2020-06-27 11:35:51 +05:30
os.system("steghide extract -sf {0}".format(fromfile))
elif choice == "99":
steganography()
else :
menu()
def stegnocracker():
2020-07-11 15:41:58 +05:30
os.system("echo \"SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy| lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall")
steganography()
elif choice =="2":
file1=input("Enter Filename :- ")
passfile=input("Enter Wordlist Filename :- ")
os.system("stegcracker {0} {1} ".format(file1,passfile))
elif choice == "99":
steganography()
else :
menu()
def whitespace():
2020-07-11 15:41:58 +05:30
os.system("echo \"Use whitespace and unicode chars for steganography \n\t [!]https://github.com/beardog108/snow10 \"|boxes -d boy | lolcat")
2020-06-27 11:35:51 +05:30
choice =input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/beardog108/snow10.git ")
os.system("sudo chmod -R 755 snow10")
steganography()
elif choice == "2":
os.system("cd snow10 && firefox index.html")
elif choice == "99":
steganography()
else :
menu()
def sqltool():
clearScr()
os.system("figlet -f standard -c Sql Tools | lolcat")
print("""
2020-07-07 13:13:11 +05:30
[1] Sqlmap tool
[2] NoSqlMap
[3] Damn Small SQLi Scanner
[4] Explo
[5] Blisqy - Exploit Time-based blind-SQL injection
[6] Leviathan - Wide Range Mass Audit Toolkit
[7] SQLScan
[99]Back
2020-06-27 11:35:51 +05:30
""")
2020-07-07 13:13:11 +05:30
choice =input("\033[96m Z4nzu =>> ")
2020-06-27 11:35:51 +05:30
if choice == "1":
clearScr()
sqlmap()
2020-07-07 13:13:11 +05:30
elif choice == "2":
clearScr()
nosqlmap()
elif choice == "3":
clearScr()
sqliscanner()
elif choice == "4":
clearScr()
explo()
elif choice == "5":
clearScr()
blisqy()
elif choice == "6":
clearScr()
leviathan()
elif choice == "7":
clearScr()
sqlscan()
elif choice == "99":
menu()
else :
menu()
def leviathan():
os.system("echo \"Leviathan is a mass audit toolkit which has wide range service discovery,\nbrute force, SQL injection detection and running custom exploit capabilities. \n [*]It Requires API Keys \n More Usage [!]https://github.com/utkusen/leviathan/wiki \"|boxes -d boy | lolcat ")
choice = input("[1]Install [2]Run [99]BAck >> ")
if choice == "1":
os.system("git clone https://github.com/leviathan-framework/leviathan.git")
os.system("cd leviathan;sudo pip install -r requirements.txt")
sqltool()
elif choice == "2":
os.system("cd leviathan;python leviathan.py")
2020-06-27 11:35:51 +05:30
elif choice == "99":
2020-07-07 13:13:11 +05:30
sqltool()
else :
2020-06-27 11:35:51 +05:30
menu()
2020-07-07 13:13:11 +05:30
def sqlscan():
os.system("echo \"sqlscan is quick web scanner for find an sql inject point. not for educational, this is for hacking. \n [!]https://github.com/Cvar1984/sqlscan \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt install php php-bz2 php-curl php-mbstring curl")
os.system("sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan")
os.system("chmod +x /usr/local/bin/sqlscan")
sqltool()
elif choice == "2":
os.system("sudo sqlscan")
elif choice == "99":
sqltool()
2020-06-27 11:35:51 +05:30
else :
menu()
2020-07-07 13:13:11 +05:30
def blisqy():
os.system("echo \"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection \n on HTTP Headers and also exploitation of the same vulnerability.\n For Usage >> [!]https://github.com/JohnTroony/Blisqy \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/JohnTroony/Blisqy.git ")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def explo():
os.system("echo \"explo is a simple tool to describe web security issues in a human and machine readable format.\n Usage :- \n [1]explo [--verbose|-v] testcase.yaml \n [2]explo [--verbose|-v] examples/*.yaml \n[*]https://github.com/dtag-dev-sec/explo \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/dtag-dev-sec/explo ")
os.system("cd explo ;sudo python setup.py install")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def sqliscanner():
2020-07-11 15:41:58 +05:30
os.system("echo \"Damn Small SQLi Scanner (DSSS) is a fully functional SQL injection\nvulnerability scanner also supporting GET and POST parameters.\n[*]python3 dsss.py -h[help] | -u[URL] \n\tMore Info [!]https://github.com/stamparm/DSSS \"|boxes -d boy | lolcat")
2020-07-07 13:13:11 +05:30
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/stamparm/DSSS.git")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
2020-06-27 11:35:51 +05:30
def sqlmap():
2020-07-07 13:13:11 +05:30
os.system("echo \"sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers \n [!]python sqlmap.py -u [<http://example.com>] --batch --banner \n More Usage [!]https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy | lolcat")
userchoice = input("[1]Install [99]Back >> ")
2020-06-27 11:35:51 +05:30
if userchoice == "1":
os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
print("Downloaded Successfully..!!")
sqltool()
elif userchoice == "99":
sqltool()
else :
menu()
2020-07-07 13:13:11 +05:30
def nosqlmap():
os.system("echo \"NoSQLMap is an open source Python tool designed to \n audit for as well as automate injection attacks and exploit.\n \033[91m [*]Please Install MongoDB \n More Info[!]https://github.com/codingo/NoSQLMap \"|boxes -d boy | lolcat")
choice =input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/codingo/NoSQLMap.git")
os.system("sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install ")
sqltool()
elif choice == "2":
os.system("python NoSQLMap")
elif choice =="99":
sqltool()
else :
menu()
2020-06-27 11:35:51 +05:30
def others():
2020-07-05 17:52:39 +05:30
clearScr()
print(Logo + """
2020-07-07 13:13:11 +05:30
[1] SocialMedia Attack
[2] Android Hack
[3] HatCloud(Bypass CloudFlare for IP)
[4] IDN Homograph Attack Tools
2020-07-11 15:41:58 +05:30
[5] Email Verifier
[6] Hash Cracking Tools
2020-07-07 13:13:11 +05:30
[99]Main Menu
2020-06-27 11:35:51 +05:30
""")
choice = input("Z4nzu =>>")
if choice == "1":
2020-07-11 15:41:58 +05:30
clearScr()
socialattack()
2020-06-27 11:35:51 +05:30
elif choice == "2":
2020-07-11 15:41:58 +05:30
clearScr()
androidhack()
2020-07-05 17:52:39 +05:30
elif choice == "3":
clearScr()
hatcloud()
2020-07-07 13:13:11 +05:30
elif choice == "4":
clearScr()
homograph()
elif choice == "5":
2020-07-11 15:41:58 +05:30
clearScr()
emailverify()
elif choice == "6":
clearScr()
2020-07-07 13:13:11 +05:30
hashcracktool()
2020-06-27 11:35:51 +05:30
elif choice == "99":
menu()
elif choice == "":
others()
else :
menu()
def showme():
2020-07-11 15:41:58 +05:30
print("""
[*] This tool allows you to perform OSINT and reconnaissance on an organisation or an individual.
2020-06-27 11:35:51 +05:30
It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation
leak This database makes finding passwords faster and easier than ever before.
""")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git")
os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ")
2020-07-11 15:41:58 +05:30
passwd()
2020-06-27 11:35:51 +05:30
elif userchoice == "2":
os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py")
elif userchoice == "99":
2020-07-11 15:41:58 +05:30
passwd()
2020-06-27 11:35:51 +05:30
else :
menu()
2020-07-05 17:52:39 +05:30
def hatcloud():
os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/HatBashBR/HatCloud.git")
others()
elif choice == "2":
tsite=input("Enter Site >>")
os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite))
elif choice =="99":
others()
else :
others()
2020-07-11 15:41:58 +05:30
def emailverify():
clearScr()
os.system("figlet -f standard -c Email Verify tools | lolcat")
print("""
[1] KnockMail
[99] Back
""")
choice =input("Z4nzu >>")
if choice == "1":
clearScr()
knockmail()
elif choice == "99":
others()
else :
others()
def knockmail():
os.system("echo \"KnockMail Tool Verify If Email Exists [!]https://github.com/4w4k3/KnockMail \"|boxes -d boy | lolcat")
choice = input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/4w4k3/KnockMail.git")
os.system("cd KnockMail;sudo pip install -r requeriments.txt")
emailverify()
elif choice == "2":
os.system("cd KnockMail;python knock.py")
elif choice == "99":
emailverify()
else :
menu()
2020-07-07 13:13:11 +05:30
def homograph():
clearScr()
os.system("figlet -f standard -c IDN Homograph Attack tools | lolcat")
print("""
[1] EvilURL
[99] Back
""")
choice =input("Z4nzu >>")
if choice == "1":
clearScr()
evilurl()
elif choice == "99":
others()
else :
others()
def evilurl():
os.system("echo \"Generate unicode evil domains for IDN Homograph Attack and detect them. \n [!]https://github.com/UndeadSec/EvilURL \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/UndeadSec/EvilURL.git")
homograph()
elif choice == "2":
os.system("cd EvilURL;python3 evilurl.py")
elif choice == "99":
homograph()
else :
menu()
def hashcracktool():
clearScr()
os.system("figlet -f standard -c Hash Cracking Tools | lolcat")
print("""
[1] Hash Buster
[99]Back
""")
choice = input("Z4nzu >> ")
if choice == "1":
clearScr()
hashbuster()
elif choice == "99":
others()
elif choice == "":
others()
else :
menu()
def hashbuster():
os.system("echo \"Features : \n Automatic hash type identification \n Supports MD5, SHA1, SHA256, SHA384, SHA512 \n [!]https://github.com/s0md3v/Hash-Buster \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Hash-Buster.git")
os.system("cd Hash-Buster;make install")
time.sleep(2)
hashcracktool()
elif choice == "2":
os.system("buster -h")
elif choice == "99":
hashcracktool()
else :
menu()
2020-07-05 17:52:39 +05:30
def Ddos():
clearScr()
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
print("""
[1]SlowLoris
[2]aSYNcrone | Multifunction SYN Flood DDoS Weapon
[3]UFOnet
[4]GoldenEye
[99]Back
""")
choice =input("Z4nzu >> ")
if choice == "1":
clearScr()
slowloris()
elif choice == "2":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
asyncrone()
elif choice == "3":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
ufonet()
elif choice == "4":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
goldeneye()
elif choice == "99":
2020-07-11 15:41:58 +05:30
menu()
2020-07-05 17:52:39 +05:30
else :
print("Invalid ...")
menu()
def slowloris():
os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo pip install slowloris")
Ddos()
elif choice == "2":
ts=input("Enter Target Site :-")
os.system("slowloris %s"%ts)
elif choice == "99":
Ddos()
else :
menu()
def asyncrone():
os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/fatih4842/aSYNcrone.git")
os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread")
Ddos()
elif choice == "2":
sport=input("Enter Source Port >> ")
tip=input("Enter Target IP >> ")
tport=input("Enter Target port >> ")
os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport))
elif choice == "99":
Ddos()
else :
menu()
def ufonet():
os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/epsylon/ufonet.git")
os.system("cd ufonet;sudo python setup.py install")
Ddos()
elif choice == "2":
os.system("sudo ./ufonet --gui")
elif choice == "99":
Ddos()
else :
menu()
def goldeneye():
2020-07-11 15:41:58 +05:30
os.system("echo \"GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\nGoldenEye is a HTTP DoS Test Tool. \n\t [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat")
2020-07-05 17:52:39 +05:30
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye")
Ddos()
elif choice == "2":
os.system("cd GoldenEye ;sudo ./goldeneye.py")
print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py <url> [OPTIONS] ")
elif choice == "99":
Ddos()
else :
menu()
def xsstools():
clearScr()
os.system("figlet -f standard -c XSS Attack Tools | lolcat")
print("""
[1] DalFox(Finder of XSS)
[2] XSS Payload Generator
[3] Extended XSS Searcher and Finder
[4] XSS-Freak
[5] XSpear
[6] XSSCon
[7] XanXSS
2020-07-07 13:13:11 +05:30
[8] Advanced XSS Detection Suite
2020-07-05 17:52:39 +05:30
[99]BAck
""")
choice = input("Z4nzu >> ")
if choice == "1":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
dalfox()
elif choice =="2":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
xsspayload()
elif choice == "99":
2020-07-11 15:41:58 +05:30
menu()
2020-07-05 17:52:39 +05:30
elif choice == "3":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
xssfinder()
elif choice == "4":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
xssfreak()
elif choice == "5":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
xspear()
elif choice == "6":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
xsscon()
elif choice == "7":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-05 17:52:39 +05:30
xanxss()
2020-07-07 13:13:11 +05:30
elif choice == "8":
2020-07-11 15:41:58 +05:30
clearScr()
2020-07-07 13:13:11 +05:30
XSStrike()
2020-07-05 17:52:39 +05:30
elif choice == "":
2020-07-11 15:41:58 +05:30
menu()
2020-07-05 17:52:39 +05:30
else :
2020-07-11 15:41:58 +05:30
menu()
2020-07-05 17:52:39 +05:30
2020-07-07 13:13:11 +05:30
def XSStrike():
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
2020-07-11 15:41:58 +05:30
xc=input("[1]Install [99]Back >>")
2020-07-07 13:13:11 +05:30
if xc == "1":
os.system("sudo rm -rf XSStrike")
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
2020-07-11 15:41:58 +05:30
xsstools()
2020-07-07 13:13:11 +05:30
elif xc == "99":
2020-07-11 15:41:58 +05:30
xsstools()
2020-07-07 13:13:11 +05:30
else :
2020-07-11 15:41:58 +05:30
xsstools()
2020-07-07 13:13:11 +05:30
2020-07-05 17:52:39 +05:30
def dalfox():
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt-get install golang")
os.system("sudo git clone https://github.com/hahwul/dalfox ")
os.system("cd dalfox;go install")
xsstools()
elif choice == "2":
os.system("~/go/bin/dalfox")
print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ")
elif choice =="99":
xsstools()
else :
others()
def xsspayload():
os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/capture0x/XSS-LOADER.git")
os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt")
xsstools()
elif choice == "2":
os.system("cd XSS-LOADER;sudo python3 payloader.py")
elif choice =="99":
xsstools()
else :
others()
def xssfinder():
os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git glone https://github.com/Damian89/extended-xss-search.git")
print("""\033[96m
Follow This Steps After Installation :-
\033[31m [*]Go To extended-xss-search directory,
and Rename the example.app-settings.conf to app-settings.conf
""")
elif choice == "2":
print("""\033[96m
You have To Add Links to scan
\033[31m[!]Go to extended-xss-search
[*]config/urls-to-test.txt
[!]python3 extended-xss-search.py
""")
elif choice =="99":
xsstools()
else :
others()
def xssfreak():
os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git")
os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt")
xsstools()
elif choice == "2":
os.system("cd XSS-Freak;sudo python3 XSS-Freak.py")
elif choice =="99":
xsstools()
else :
others()
def xspear():
os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("gem install XSpear")
xsstools()
elif choice == "2":
os.system("XSpear -h")
elif choice =="99":
xsstools()
else :
others()
def xsscon():
os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/menkrep1337/XSSCon")
os.system("sudo chmod 755 -R XSSCon")
xsstools()
elif choice == "2":
uinput= input("Enter Website >> ")
os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput))
elif choice =="99":
xsstools()
else :
others()
def xanxss():
os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/Ekultek/XanXSS.git ")
xsstools()
elif choice == "2":
os.system("cd XanXSS ;python xanxss.py -h")
print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ")
elif choice =="99":
xsstools()
else :
others()
2020-07-11 15:41:58 +05:30
def update():
print("""
[1] Update Tool or System
[2] Uninstall HackingTool
[99]Back
""")
choice =input("Z4nzu >> ")
if choice == "1":
updatesys()
elif choice == "2":
uninstall()
elif choice == "99":
menu()
else :
menu()
2020-06-27 11:35:51 +05:30
def updatesys():
2020-07-07 13:13:11 +05:30
choice = input("[1]Update System [2]Update Hackingtool [99]Back >> ")
if choice == "1":
os.system("sudo apt update && sudo apt full-upgrade -y")
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
os.system("sudo apt-get install python3-pip")
elif choice == "2":
os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;mkdir hackingtool;cd hackingtool;git clone https://github.com/Z4nzu/hackingtool.git;cd hackingtool;sudo chmod +x install.sh;./install.sh")
elif choice == "99":
menu()
else :
menu()
2020-06-27 11:35:51 +05:30
2020-07-11 15:41:58 +05:30
def uninstall():
choice = input("[1]Uninstall [99]Back >> ")
if choice == "1":
print("hackingtool started to uninstall..")
time.sleep(2)
os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;")
time.sleep(3)
print("Hackingtool Successfully Uninstall..")
time.sleep(1)
print("Happy Hacking..!!")
elif choice == "99":
update()
else :
print("Wrong Input...!!")
uninstall()
2020-06-27 11:35:51 +05:30
def clearScr():
if system() == 'Linux':
os.system('clear')
if system() == 'Windows':
os.system('cls')
if __name__ == "__main__":
try:
if system() == 'Linux':
2020-07-07 13:13:11 +05:30
fpath="/home/hackingtoolpath.txt"
if os.path.isfile(fpath):
file1 = open(fpath,"r")
f=file1.readline()
if os.path.exists("{0}".format(f)):
os.chdir(f)
file1.close()
2020-06-27 11:35:51 +05:30
menu()
2020-06-30 17:18:55 +05:30
else :
2020-07-07 13:13:11 +05:30
os.mkdir("{0}".format(f))
os.chdir("{0}".format(f))
file1.close()
menu()
2020-06-27 11:35:51 +05:30
else :
2020-07-07 13:13:11 +05:30
clearScr()
print(Logo)
print("""
[@] Set Path (All your tools will be install in that directory)
[1]Manual
[2]Default
""")
choice = input("Z4nzu >> ")
if choice == "1":
inpath=input("Enter Path(with Directory Name) >> ")
file =open(fpath,"w")
file.write(inpath)
file.close()
print("Successfully Path Set...!!")
elif choice == "2":
autopath="/home/hackingtool/"
file =open(fpath,"w")
file.write(autopath)
file.close()
time.sleep(1)
print("Your Default Path Is :-"+autopath)
time.sleep(3)
else :
print("Try Again..!!")
2020-06-30 17:18:55 +05:30
else :
2020-07-07 13:13:11 +05:30
fpath="/home/hackingtoolpath.txt"
if os.path.isfile(fpath):
file1 = open(fpath,"r")
f=file1.readline()
if os.path.exists("{0}".format(f)):
os.chdir(f)
file1.close()
menu()
else :
os.mkdir("{0}".format(f))
os.chdir("{0}".format(f))
file1.close()
menu()
else :
clearScr()
print(Logo)
print("""
[@] Set Path (All your tools will be install in that directory)
[1]Manual
[2]Default
""")
choice = input("Z4nzu >> ")
if choice == "1":
inpath=input("Enter Path(with Directory Name) >> ")
file =open(fpath,"w")
file.write(inpath)
file.close()
print("Successfully Path Set...!!")
elif choice == "2":
autopath="/home/hackingtool/"
file =open(fpath,"w")
file.write(autopath)
file.close()
time.sleep(1)
print("Your Default Path Is :-"+autopath)
time.sleep(3)
else :
print("Try Again..!!")
2020-06-30 17:18:55 +05:30
print("Sorry Open New Issue..!!")
2020-07-07 13:13:11 +05:30
except KeyboardInterrupt:
2020-06-27 11:35:51 +05:30
print("\n Sorry ..!!!")
time.sleep(3)