1
0
mirror of https://github.com/Z4nzu/hackingtool.git synced 2025-06-20 06:15:54 +02:00

Update hackingtool.py

This commit is contained in:
Mr.Z4nzu
2020-07-07 13:13:11 +05:30
committed by GitHub
parent f69994f353
commit 028cef9d09

View File

@ -58,12 +58,12 @@ def menu():
[09]Payload Creator
[10]Router Exploit
[11]Wifi Jamming
[12]SocialMedia Attack
[12]Ddos Attack Tools
[13]SocialMedia Finder
[14]Android Hack
[14]XSS Attack Tools
[15]Steganography
[16]More Tools
[17]Update System
[17]Update System OR Hackingtool
[99]Exit
""")
@ -106,19 +106,13 @@ def menu():
wifijamming()
elif choice == "12" :
clearScr()
print("In working ")
time.sleep(3)
pass
#socialattack()
Ddos()
elif choice == "13" :
clearScr()
socialfinder()
elif choice == "14":
clearScr()
print("In working ")
time.sleep(3)
pass
#androidhack()
xsstools()
elif choice == "15":
clearScr()
steganography()
@ -137,7 +131,7 @@ def menu():
menu()
else:
print("Wrong Input...!!")
time.sleep(3)
time.sleep(1)
menu()
def anonsurf():
@ -189,6 +183,7 @@ def multitor():
menu()
def info():
clearScr()
os.system("figlet -f standard -c Information Gathering Tools | lolcat")
print("""
[1] Nmap
@ -196,9 +191,12 @@ def info():
[3] Port Scanning
[4] Host To IP
[5] Xerosploit
[6] Advanced XSS Detection Suite
[6] RED HAWK (All In One Scanning)
[7] ReconSpider(For All Scaning)
[8] IsItDown (Check Website Down/Up)
[9] Infoga - Email OSINT
[10] ReconDog
[11] Striker
[99] Back To Main Menu
""")
choice2 = input("Z4nzu =>> ")
@ -218,45 +216,114 @@ def info():
xerosploit()
if choice2 == "6":
clearScr()
XSStrike()
redhawk()
elif choice2 == "7":
clearScr()
reconspider()
elif choice2 == "8":
clearScr()
isitdown()
elif choice2 == "9":
clearScr()
infogaemail()
elif choice2 == "99":
clearScr()
menu()
elif choice2 == "10":
clearScr()
recondog()
elif choice2 == "11":
clearScr()
striker()
elif choice2 == "":
menu()
else:
menu()
def isitdown():
os.system("echo \"Check Website Is Online or Not \"|boxes -d boy | lolcat")
choice = input("[1]Open [99]Back >> ")
if choice == "1":
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
elif choice == "99":
info()
else :
menu()
def nmap():
nmapchoice = input("[1]Install [99]BAck >> ")
if nmapchoice == "1" :
os.system("sudo git clone https://github.com/nmap/nmap.git")
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
# elif nmapchoice == "2":
# os.system("sudo nmap")
info()
elif nmapchoice == "99":
info()
else:
menu()
def striker():
os.system("echo \"Recon & Vulnerability Scanning Suite [!]https://github.com/s0md3v/Striker \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Striker.git")
os.system("cd Striker && pip3 install -r requirements.txt")
info()
elif choice == "2":
tsite= input("Enter Site Name (example.com) >> ")
os.system("cd Striker && sudo python3 striker.py {0}".format(tsite))
elif choice == "99":
info()
else :
menu()
def redhawk():
os.system("echo \"All in one tool for Information Gathering and Vulnerability Scanning. \n [!]https://github.com/Tuhinshubhra/RED_HAWK \n\n [!]Please Use command [FIX] After Running Tool first time \" | boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK")
info()
elif choice == "2":
os.system("cd RED_HAWK;php rhawk.php")
elif choice == "99":
info()
else :
menu()
def infogaemail():
os.system("echo \"Infoga is a tool gathering email accounts informations\n(ip,hostname,country,...) from different public source \n[!]https://github.com/m4ll0k/Infoga \"| boxes -d boy |lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/m4ll0k/Infoga.git")
os.system("cd infoga;sudo python setup.py install")
info()
elif choice == "2":
os.system("cd infoga;python infoga.py")
elif choice == "99":
info()
else :
menu()
def recondog():
os.system("echo \"ReconDog Information Gathering Suite \n[!]https://github.com/s0md3v/ReconDog \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/ReconDog.git ")
info()
elif choice == "2":
os.system("cd ReconDog;sudo python dog")
elif choice == "99":
info()
else :
menu()
def Dracnmap():
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy | lolcat")
dracnap = input("[1]Install [2]Run [99]Back >> ")
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help \n [!]https://github.com/Screetsec/Dracnmap \" | boxes -d boy | lolcat")
dracnap = input("[1]Install [99]Back >> ")
if dracnap == "1":
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ")
os.system("cd Dracnmap && chmod +x Dracnmap.sh")
time.sleep(2)
info()
elif dracnap == "2":
print("Sorry You Have to Run This tool manually By Changing Path...!!")
print("use ./Dracnmap.sh ")
exit()
elif dracnap == "99":
info()
else :
@ -273,22 +340,6 @@ def ports():
os.system("sudo nmap -O -Pn %s" % target)
sys.exit()
def XSStrike():
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
xc=input("[1]Install [99]BAck >>")
if xc == "1":
os.system("sudo rm -rf XSStrike")
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
info()
# elif xc == "2" :
# clearScr()
# os.system("echo \"YOu have to Run XSStrike as per your Requirment\n By using python3 xsstrike.py [Options]\"|boxes -d boy")
# os.system("cd XSStrike && python3 xsstrike.py")
elif xc == "99":
info()
else :
info()
def xerosploit():
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat")
xeros=input("[1]Install [2]Run [99]Back >>")
@ -305,7 +356,7 @@ def xerosploit():
def reconspider():
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\" | boxes -d boy | lolcat")
userchoice = input("[1]Install [99]Back >>")
userchoice = input("[1]Install [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
@ -511,7 +562,7 @@ def bluepot():
menu()
def fluxion():
os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcat")
os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcAT")
choice = input("[1]Install [2]Run [99]Back >>")
if choice == "1":
os.system("git clone https://github.com/thehackingsage/Fluxion.git")
@ -1304,7 +1355,7 @@ def droidcam():
menu()
def evilapp():
os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies\"boxes -d boy | lolcat")
os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies\" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/evilapp")
@ -1477,7 +1528,6 @@ def wifijamming():
menu()
def airmon():
# os.system("echo \" \" | boxes -d boy")
print(Logo)
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
@ -1505,8 +1555,6 @@ def airmon():
wifijamming()
else :
menu()
# z=raw_input("Enter Your wifi Interface Name :- ")
# os.system("airmon-ng && airmon-ng start %s"%z)
def steganography():
clearScr()
@ -1580,51 +1628,162 @@ def sqltool():
clearScr()
os.system("figlet -f standard -c Sql Tools | lolcat")
print("""
[1] sqlmap tool
[99] Back
[1] Sqlmap tool
[2] NoSqlMap
[3] Damn Small SQLi Scanner
[4] Explo
[5] Blisqy - Exploit Time-based blind-SQL injection
[6] Leviathan - Wide Range Mass Audit Toolkit
[7] SQLScan
[99]Back
""")
choice =input("Z4nzu =>> ")
choice =input("\033[96m Z4nzu =>> ")
if choice == "1":
clearScr()
sqlmap()
elif choice == "2":
clearScr()
nosqlmap()
elif choice == "3":
clearScr()
sqliscanner()
elif choice == "4":
clearScr()
explo()
elif choice == "5":
clearScr()
blisqy()
elif choice == "6":
clearScr()
leviathan()
elif choice == "7":
clearScr()
sqlscan()
elif choice == "99":
menu()
else :
menu()
def leviathan():
os.system("echo \"Leviathan is a mass audit toolkit which has wide range service discovery,\nbrute force, SQL injection detection and running custom exploit capabilities. \n [*]It Requires API Keys \n More Usage [!]https://github.com/utkusen/leviathan/wiki \"|boxes -d boy | lolcat ")
choice = input("[1]Install [2]Run [99]BAck >> ")
if choice == "1":
os.system("git clone https://github.com/leviathan-framework/leviathan.git")
os.system("cd leviathan;sudo pip install -r requirements.txt")
sqltool()
elif choice == "2":
os.system("cd leviathan;python leviathan.py")
elif choice == "99":
sqltool()
else :
menu()
def sqlscan():
os.system("echo \"sqlscan is quick web scanner for find an sql inject point. not for educational, this is for hacking. \n [!]https://github.com/Cvar1984/sqlscan \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt install php php-bz2 php-curl php-mbstring curl")
os.system("sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan")
os.system("chmod +x /usr/local/bin/sqlscan")
sqltool()
elif choice == "2":
os.system("sudo sqlscan")
elif choice == "99":
sqltool()
else :
menu()
def blisqy():
os.system("echo \"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection \n on HTTP Headers and also exploitation of the same vulnerability.\n For Usage >> [!]https://github.com/JohnTroony/Blisqy \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/JohnTroony/Blisqy.git ")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def explo():
os.system("echo \"explo is a simple tool to describe web security issues in a human and machine readable format.\n Usage :- \n [1]explo [--verbose|-v] testcase.yaml \n [2]explo [--verbose|-v] examples/*.yaml \n[*]https://github.com/dtag-dev-sec/explo \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/dtag-dev-sec/explo ")
os.system("cd explo ;sudo python setup.py install")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def sqliscanner():
os.system("echo \"Damn Small SQLi Scanner (DSSS) is a fully functional SQL injection\nvulnerability scanner also supporting GET and POST parameters.\nMore Info [!]https://github.com/stamparm/DSSS \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/stamparm/DSSS.git")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def sqlmap():
os.system("echo \"[!]sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers\"|boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ")
os.system("echo \"sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers \n [!]python sqlmap.py -u [<http://example.com>] --batch --banner \n More Usage [!]https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy | lolcat")
userchoice = input("[1]Install [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
print("Downloaded Successfully..!!")
sqltool()
elif userchoice == "2":
os.system("cd sqlmap-dev && python sqlmap.py -h")
os.system("echo \"[!]python sqlmap.py -u [<http://example.com>] --batch --banner \n[!]For More Usage : https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy")
elif userchoice == "99":
sqltool()
else :
menu()
def nosqlmap():
os.system("echo \"NoSQLMap is an open source Python tool designed to \n audit for as well as automate injection attacks and exploit.\n \033[91m [*]Please Install MongoDB \n More Info[!]https://github.com/codingo/NoSQLMap \"|boxes -d boy | lolcat")
choice =input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/codingo/NoSQLMap.git")
os.system("sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install ")
sqltool()
elif choice == "2":
os.system("python NoSQLMap")
elif choice =="99":
sqltool()
else :
menu()
def others():
clearScr()
print(Logo + """
[1]Ddos Attack Tools
[2]XSS Attack Tools
[3]HatCloud(Bypass CloudFlare for IP)
[99]BAck
[1] SocialMedia Attack
[2] Android Hack
[3] HatCloud(Bypass CloudFlare for IP)
[4] IDN Homograph Attack Tools
[5] Hash Cracking Tools
[99]Main Menu
""")
choice = input("Z4nzu =>>")
if choice == "1":
clearScr()
Ddos()
print("Tool Available in Next Update..!!")
time.sleep(3)
others()
# socialattack()
elif choice == "2":
clearScr()
xsstools()
print("Tool Available in Next Update..!!")
time.sleep(3)
others()
# androidhack()
elif choice == "3":
clearScr()
hatcloud()
elif choice == "4":
clearScr()
homograph()
elif choice == "5":
hashcracktool()
elif choice == "99":
menu()
elif choice == "":
@ -1663,6 +1822,69 @@ def hatcloud():
else :
others()
def homograph():
clearScr()
os.system("figlet -f standard -c IDN Homograph Attack tools | lolcat")
print("""
[1] EvilURL
[99] Back
""")
choice =input("Z4nzu >>")
if choice == "1":
clearScr()
evilurl()
elif choice == "99":
others()
else :
others()
def evilurl():
os.system("echo \"Generate unicode evil domains for IDN Homograph Attack and detect them. \n [!]https://github.com/UndeadSec/EvilURL \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/UndeadSec/EvilURL.git")
homograph()
elif choice == "2":
os.system("cd EvilURL;python3 evilurl.py")
elif choice == "99":
homograph()
else :
menu()
def hashcracktool():
clearScr()
os.system("figlet -f standard -c Hash Cracking Tools | lolcat")
print("""
[1] Hash Buster
[99]Back
""")
choice = input("Z4nzu >> ")
if choice == "1":
clearScr()
hashbuster()
elif choice == "99":
others()
elif choice == "":
others()
else :
menu()
def hashbuster():
os.system("echo \"Features : \n Automatic hash type identification \n Supports MD5, SHA1, SHA256, SHA384, SHA512 \n [!]https://github.com/s0md3v/Hash-Buster \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Hash-Buster.git")
os.system("cd Hash-Buster;make install")
time.sleep(2)
hashcracktool()
elif choice == "2":
os.system("buster -h")
elif choice == "99":
hashcracktool()
else :
menu()
def Ddos():
clearScr()
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
@ -1760,6 +1982,7 @@ def xsstools():
[5] XSpear
[6] XSSCon
[7] XanXSS
[8] Advanced XSS Detection Suite
[99]BAck
""")
choice = input("Z4nzu >> ")
@ -1779,11 +2002,29 @@ def xsstools():
xsscon()
elif choice == "7":
xanxss()
elif choice == "8":
XSStrike()
elif choice == "":
others()
else :
others()
def XSStrike():
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
xc=input("[1]Install [99]BAck >>")
if xc == "1":
os.system("sudo rm -rf XSStrike")
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
info()
# elif xc == "2" :
# clearScr()
# os.system("echo \"YOu have to Run XSStrike as per your Requirment\n By using python3 xsstrike.py [Options]\"|boxes -d boy")
# os.system("cd XSStrike && python3 xsstrike.py")
elif xc == "99":
info()
else :
info()
def dalfox():
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
@ -1894,10 +2135,17 @@ def xanxss():
def updatesys():
os.system("sudo apt update && sudo apt full-upgrade -y")
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
os.system("sudo apt-get install python3-pip")
menu()
choice = input("[1]Update System [2]Update Hackingtool [99]Back >> ")
if choice == "1":
os.system("sudo apt update && sudo apt full-upgrade -y")
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
os.system("sudo apt-get install python3-pip")
elif choice == "2":
os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;mkdir hackingtool;cd hackingtool;git clone https://github.com/Z4nzu/hackingtool.git;cd hackingtool;sudo chmod +x install.sh;./install.sh")
elif choice == "99":
menu()
else :
menu()
def clearScr():
if system() == 'Linux':
@ -1906,72 +2154,89 @@ def clearScr():
os.system('cls')
if __name__ == "__main__":
notuser =getpass.getuser()
user=os.getenv("SUDO_UID")
uname=os.getenv("SUDO_USER")
# notuser =getpass.getuser()
# user=os.getenv("SUDO_UID")
# uname=os.getenv("SUDO_USER")
try:
if system() == 'Linux':
# if path.exists("/home/{0}/Desktop/".format(user)):
# os.chdir("/home/{0}/Desktop/".format(user))
# if os.path.isdir('hackingtool'):
# os.chdir("/home/{0}/Desktop/hackingtool/".format(user))
# menu()
# else :
# os.system("mkdir hackingtool")
# os.chdir("/home/{0}/Desktop/hackingtool/".format(user))
# menu()
if os.geteuid() != 0:
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
fpath="/home/hackingtoolpath.txt"
if os.path.isfile(fpath):
file1 = open(fpath,"r")
f=file1.readline()
if os.path.exists("{0}".format(f)):
os.chdir(f)
file1.close()
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
elif os.geteuid() == 0:
if path.exists("home/{0}/Desktop/".format(notuser)):
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
elif uname == 'None':
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else :
if path.exists("/home/{0}/Desktop/".format(uname)):
os.chdir("/home/{0}/Desktop/".format(uname))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(uname))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(uname))
menu()
elif uname == 'None':
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
os.mkdir("{0}".format(f))
os.chdir("{0}".format(f))
file1.close()
menu()
else :
print("Sorry ...!!")
clearScr()
print(Logo)
print("""
[@] Set Path (All your tools will be install in that directory)
[1]Manual
[2]Default
""")
choice = input("Z4nzu >> ")
if choice == "1":
inpath=input("Enter Path(with Directory Name) >> ")
file =open(fpath,"w")
file.write(inpath)
file.close()
print("Successfully Path Set...!!")
elif choice == "2":
autopath="/home/hackingtool/"
file =open(fpath,"w")
file.write(autopath)
file.close()
time.sleep(1)
print("Your Default Path Is :-"+autopath)
time.sleep(3)
else :
print("Try Again..!!")
else :
fpath="/home/hackingtoolpath.txt"
if os.path.isfile(fpath):
file1 = open(fpath,"r")
f=file1.readline()
if os.path.exists("{0}".format(f)):
os.chdir(f)
file1.close()
menu()
else :
os.mkdir("{0}".format(f))
os.chdir("{0}".format(f))
file1.close()
menu()
else :
clearScr()
print(Logo)
print("""
[@] Set Path (All your tools will be install in that directory)
[1]Manual
[2]Default
""")
choice = input("Z4nzu >> ")
if choice == "1":
inpath=input("Enter Path(with Directory Name) >> ")
file =open(fpath,"w")
file.write(inpath)
file.close()
print("Successfully Path Set...!!")
elif choice == "2":
autopath="/home/hackingtool/"
file =open(fpath,"w")
file.write(autopath)
file.close()
time.sleep(1)
print("Your Default Path Is :-"+autopath)
time.sleep(3)
else :
print("Try Again..!!")
print("Sorry Open New Issue..!!")
except KeyboardInterrupt:
except KeyboardInterrupt:
print("\n Sorry ..!!!")
time.sleep(3)