1
0
mirror of https://github.com/Z4nzu/hackingtool.git synced 2025-06-20 06:15:54 +02:00

Update hackingtool.py

This commit is contained in:
Mr.Z4nzu
2020-07-07 13:13:11 +05:30
committed by GitHub
parent f69994f353
commit 028cef9d09

View File

@ -58,12 +58,12 @@ def menu():
[09]Payload Creator [09]Payload Creator
[10]Router Exploit [10]Router Exploit
[11]Wifi Jamming [11]Wifi Jamming
[12]SocialMedia Attack [12]Ddos Attack Tools
[13]SocialMedia Finder [13]SocialMedia Finder
[14]Android Hack [14]XSS Attack Tools
[15]Steganography [15]Steganography
[16]More Tools [16]More Tools
[17]Update System [17]Update System OR Hackingtool
[99]Exit [99]Exit
""") """)
@ -106,19 +106,13 @@ def menu():
wifijamming() wifijamming()
elif choice == "12" : elif choice == "12" :
clearScr() clearScr()
print("In working ") Ddos()
time.sleep(3)
pass
#socialattack()
elif choice == "13" : elif choice == "13" :
clearScr() clearScr()
socialfinder() socialfinder()
elif choice == "14": elif choice == "14":
clearScr() clearScr()
print("In working ") xsstools()
time.sleep(3)
pass
#androidhack()
elif choice == "15": elif choice == "15":
clearScr() clearScr()
steganography() steganography()
@ -137,7 +131,7 @@ def menu():
menu() menu()
else: else:
print("Wrong Input...!!") print("Wrong Input...!!")
time.sleep(3) time.sleep(1)
menu() menu()
def anonsurf(): def anonsurf():
@ -189,6 +183,7 @@ def multitor():
menu() menu()
def info(): def info():
clearScr()
os.system("figlet -f standard -c Information Gathering Tools | lolcat") os.system("figlet -f standard -c Information Gathering Tools | lolcat")
print(""" print("""
[1] Nmap [1] Nmap
@ -196,9 +191,12 @@ def info():
[3] Port Scanning [3] Port Scanning
[4] Host To IP [4] Host To IP
[5] Xerosploit [5] Xerosploit
[6] Advanced XSS Detection Suite [6] RED HAWK (All In One Scanning)
[7] ReconSpider(For All Scaning) [7] ReconSpider(For All Scaning)
[8] IsItDown (Check Website Down/Up) [8] IsItDown (Check Website Down/Up)
[9] Infoga - Email OSINT
[10] ReconDog
[11] Striker
[99] Back To Main Menu [99] Back To Main Menu
""") """)
choice2 = input("Z4nzu =>> ") choice2 = input("Z4nzu =>> ")
@ -218,45 +216,114 @@ def info():
xerosploit() xerosploit()
if choice2 == "6": if choice2 == "6":
clearScr() clearScr()
XSStrike() redhawk()
elif choice2 == "7": elif choice2 == "7":
clearScr() clearScr()
reconspider() reconspider()
elif choice2 == "8": elif choice2 == "8":
clearScr()
isitdown() isitdown()
elif choice2 == "9":
clearScr()
infogaemail()
elif choice2 == "99": elif choice2 == "99":
clearScr() clearScr()
menu() menu()
elif choice2 == "10":
clearScr()
recondog()
elif choice2 == "11":
clearScr()
striker()
elif choice2 == "": elif choice2 == "":
menu() menu()
else: else:
menu() menu()
def isitdown():
os.system("echo \"Check Website Is Online or Not \"|boxes -d boy | lolcat")
choice = input("[1]Open [99]Back >> ")
if choice == "1":
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
elif choice == "99":
info()
else :
menu()
def nmap(): def nmap():
nmapchoice = input("[1]Install [99]BAck >> ") nmapchoice = input("[1]Install [99]BAck >> ")
if nmapchoice == "1" : if nmapchoice == "1" :
os.system("sudo git clone https://github.com/nmap/nmap.git") os.system("sudo git clone https://github.com/nmap/nmap.git")
os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install") os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install")
# elif nmapchoice == "2": info()
# os.system("sudo nmap")
elif nmapchoice == "99": elif nmapchoice == "99":
info() info()
else: else:
menu() menu()
def striker():
os.system("echo \"Recon & Vulnerability Scanning Suite [!]https://github.com/s0md3v/Striker \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Striker.git")
os.system("cd Striker && pip3 install -r requirements.txt")
info()
elif choice == "2":
tsite= input("Enter Site Name (example.com) >> ")
os.system("cd Striker && sudo python3 striker.py {0}".format(tsite))
elif choice == "99":
info()
else :
menu()
def redhawk():
os.system("echo \"All in one tool for Information Gathering and Vulnerability Scanning. \n [!]https://github.com/Tuhinshubhra/RED_HAWK \n\n [!]Please Use command [FIX] After Running Tool first time \" | boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK")
info()
elif choice == "2":
os.system("cd RED_HAWK;php rhawk.php")
elif choice == "99":
info()
else :
menu()
def infogaemail():
os.system("echo \"Infoga is a tool gathering email accounts informations\n(ip,hostname,country,...) from different public source \n[!]https://github.com/m4ll0k/Infoga \"| boxes -d boy |lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/m4ll0k/Infoga.git")
os.system("cd infoga;sudo python setup.py install")
info()
elif choice == "2":
os.system("cd infoga;python infoga.py")
elif choice == "99":
info()
else :
menu()
def recondog():
os.system("echo \"ReconDog Information Gathering Suite \n[!]https://github.com/s0md3v/ReconDog \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/ReconDog.git ")
info()
elif choice == "2":
os.system("cd ReconDog;sudo python dog")
elif choice == "99":
info()
else :
menu()
def Dracnmap(): def Dracnmap():
os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy | lolcat") os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help \n [!]https://github.com/Screetsec/Dracnmap \" | boxes -d boy | lolcat")
dracnap = input("[1]Install [2]Run [99]Back >> ") dracnap = input("[1]Install [99]Back >> ")
if dracnap == "1": if dracnap == "1":
os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ") os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git ")
os.system("cd Dracnmap && chmod +x Dracnmap.sh") os.system("cd Dracnmap && chmod +x Dracnmap.sh")
time.sleep(2)
info() info()
elif dracnap == "2":
print("Sorry You Have to Run This tool manually By Changing Path...!!")
print("use ./Dracnmap.sh ")
exit()
elif dracnap == "99": elif dracnap == "99":
info() info()
else : else :
@ -273,22 +340,6 @@ def ports():
os.system("sudo nmap -O -Pn %s" % target) os.system("sudo nmap -O -Pn %s" % target)
sys.exit() sys.exit()
def XSStrike():
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
xc=input("[1]Install [99]BAck >>")
if xc == "1":
os.system("sudo rm -rf XSStrike")
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
info()
# elif xc == "2" :
# clearScr()
# os.system("echo \"YOu have to Run XSStrike as per your Requirment\n By using python3 xsstrike.py [Options]\"|boxes -d boy")
# os.system("cd XSStrike && python3 xsstrike.py")
elif xc == "99":
info()
else :
info()
def xerosploit(): def xerosploit():
os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat") os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy | lolcat")
xeros=input("[1]Install [2]Run [99]Back >>") xeros=input("[1]Install [2]Run [99]Back >>")
@ -305,7 +356,7 @@ def xerosploit():
def reconspider(): def reconspider():
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\" | boxes -d boy | lolcat") os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\" | boxes -d boy | lolcat")
userchoice = input("[1]Install [99]Back >>") userchoice = input("[1]Install [99]Back >> ")
if userchoice == "1": if userchoice == "1":
os.system("sudo git clone https://github.com/bhavsec/reconspider.git") os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install") os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
@ -511,7 +562,7 @@ def bluepot():
menu() menu()
def fluxion(): def fluxion():
os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcat") os.system("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy | lolcAT")
choice = input("[1]Install [2]Run [99]Back >>") choice = input("[1]Install [2]Run [99]Back >>")
if choice == "1": if choice == "1":
os.system("git clone https://github.com/thehackingsage/Fluxion.git") os.system("git clone https://github.com/thehackingsage/Fluxion.git")
@ -1304,7 +1355,7 @@ def droidcam():
menu() menu()
def evilapp(): def evilapp():
os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies\"boxes -d boy | lolcat") os.system("echo \"EvilApp is a script to generate Android App that can hijack authenticated sessions in cookies\" | boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1": if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/evilapp") os.system("sudo git clone https://github.com/thelinuxchoice/evilapp")
@ -1477,7 +1528,6 @@ def wifijamming():
menu() menu()
def airmon(): def airmon():
# os.system("echo \" \" | boxes -d boy")
print(Logo) print(Logo)
userchoice = input("[1]Install [2]Run [99]Back >>") userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == "1": if userchoice == "1":
@ -1505,8 +1555,6 @@ def airmon():
wifijamming() wifijamming()
else : else :
menu() menu()
# z=raw_input("Enter Your wifi Interface Name :- ")
# os.system("airmon-ng && airmon-ng start %s"%z)
def steganography(): def steganography():
clearScr() clearScr()
@ -1580,51 +1628,162 @@ def sqltool():
clearScr() clearScr()
os.system("figlet -f standard -c Sql Tools | lolcat") os.system("figlet -f standard -c Sql Tools | lolcat")
print(""" print("""
[1] sqlmap tool [1] Sqlmap tool
[99] Back [2] NoSqlMap
[3] Damn Small SQLi Scanner
[4] Explo
[5] Blisqy - Exploit Time-based blind-SQL injection
[6] Leviathan - Wide Range Mass Audit Toolkit
[7] SQLScan
[99]Back
""") """)
choice =input("Z4nzu =>> ") choice =input("\033[96m Z4nzu =>> ")
if choice == "1": if choice == "1":
clearScr() clearScr()
sqlmap() sqlmap()
elif choice == "2":
clearScr()
nosqlmap()
elif choice == "3":
clearScr()
sqliscanner()
elif choice == "4":
clearScr()
explo()
elif choice == "5":
clearScr()
blisqy()
elif choice == "6":
clearScr()
leviathan()
elif choice == "7":
clearScr()
sqlscan()
elif choice == "99": elif choice == "99":
menu() menu()
else : else :
menu() menu()
def leviathan():
os.system("echo \"Leviathan is a mass audit toolkit which has wide range service discovery,\nbrute force, SQL injection detection and running custom exploit capabilities. \n [*]It Requires API Keys \n More Usage [!]https://github.com/utkusen/leviathan/wiki \"|boxes -d boy | lolcat ")
choice = input("[1]Install [2]Run [99]BAck >> ")
if choice == "1":
os.system("git clone https://github.com/leviathan-framework/leviathan.git")
os.system("cd leviathan;sudo pip install -r requirements.txt")
sqltool()
elif choice == "2":
os.system("cd leviathan;python leviathan.py")
elif choice == "99":
sqltool()
else :
menu()
def sqlscan():
os.system("echo \"sqlscan is quick web scanner for find an sql inject point. not for educational, this is for hacking. \n [!]https://github.com/Cvar1984/sqlscan \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt install php php-bz2 php-curl php-mbstring curl")
os.system("sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan")
os.system("chmod +x /usr/local/bin/sqlscan")
sqltool()
elif choice == "2":
os.system("sudo sqlscan")
elif choice == "99":
sqltool()
else :
menu()
def blisqy():
os.system("echo \"Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection \n on HTTP Headers and also exploitation of the same vulnerability.\n For Usage >> [!]https://github.com/JohnTroony/Blisqy \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/JohnTroony/Blisqy.git ")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def explo():
os.system("echo \"explo is a simple tool to describe web security issues in a human and machine readable format.\n Usage :- \n [1]explo [--verbose|-v] testcase.yaml \n [2]explo [--verbose|-v] examples/*.yaml \n[*]https://github.com/dtag-dev-sec/explo \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/dtag-dev-sec/explo ")
os.system("cd explo ;sudo python setup.py install")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def sqliscanner():
os.system("echo \"Damn Small SQLi Scanner (DSSS) is a fully functional SQL injection\nvulnerability scanner also supporting GET and POST parameters.\nMore Info [!]https://github.com/stamparm/DSSS \"|boxes -d boy | lolcat")
choice =input("[1]Install [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/stamparm/DSSS.git")
sqltool()
elif choice == "99":
sqltool()
else :
menu()
def sqlmap(): def sqlmap():
os.system("echo \"[!]sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers\"|boxes -d boy | lolcat") os.system("echo \"sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers \n [!]python sqlmap.py -u [<http://example.com>] --batch --banner \n More Usage [!]https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy | lolcat")
userchoice = input("[1]Install [2]Run [99]Back >> ") userchoice = input("[1]Install [99]Back >> ")
if userchoice == "1": if userchoice == "1":
os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev") os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
print("Downloaded Successfully..!!") print("Downloaded Successfully..!!")
sqltool() sqltool()
elif userchoice == "2":
os.system("cd sqlmap-dev && python sqlmap.py -h")
os.system("echo \"[!]python sqlmap.py -u [<http://example.com>] --batch --banner \n[!]For More Usage : https://github.com/sqlmapproject/sqlmap/wiki/Usage \"|boxes -d boy")
elif userchoice == "99": elif userchoice == "99":
sqltool() sqltool()
else : else :
menu() menu()
def nosqlmap():
os.system("echo \"NoSQLMap is an open source Python tool designed to \n audit for as well as automate injection attacks and exploit.\n \033[91m [*]Please Install MongoDB \n More Info[!]https://github.com/codingo/NoSQLMap \"|boxes -d boy | lolcat")
choice =input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/codingo/NoSQLMap.git")
os.system("sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install ")
sqltool()
elif choice == "2":
os.system("python NoSQLMap")
elif choice =="99":
sqltool()
else :
menu()
def others(): def others():
clearScr() clearScr()
print(Logo + """ print(Logo + """
[1]Ddos Attack Tools [1] SocialMedia Attack
[2]XSS Attack Tools [2] Android Hack
[3]HatCloud(Bypass CloudFlare for IP) [3] HatCloud(Bypass CloudFlare for IP)
[99]BAck [4] IDN Homograph Attack Tools
[5] Hash Cracking Tools
[99]Main Menu
""") """)
choice = input("Z4nzu =>>") choice = input("Z4nzu =>>")
if choice == "1": if choice == "1":
clearScr() print("Tool Available in Next Update..!!")
Ddos() time.sleep(3)
others()
# socialattack()
elif choice == "2": elif choice == "2":
clearScr() print("Tool Available in Next Update..!!")
xsstools() time.sleep(3)
others()
# androidhack()
elif choice == "3": elif choice == "3":
clearScr() clearScr()
hatcloud() hatcloud()
elif choice == "4":
clearScr()
homograph()
elif choice == "5":
hashcracktool()
elif choice == "99": elif choice == "99":
menu() menu()
elif choice == "": elif choice == "":
@ -1663,6 +1822,69 @@ def hatcloud():
else : else :
others() others()
def homograph():
clearScr()
os.system("figlet -f standard -c IDN Homograph Attack tools | lolcat")
print("""
[1] EvilURL
[99] Back
""")
choice =input("Z4nzu >>")
if choice == "1":
clearScr()
evilurl()
elif choice == "99":
others()
else :
others()
def evilurl():
os.system("echo \"Generate unicode evil domains for IDN Homograph Attack and detect them. \n [!]https://github.com/UndeadSec/EvilURL \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/UndeadSec/EvilURL.git")
homograph()
elif choice == "2":
os.system("cd EvilURL;python3 evilurl.py")
elif choice == "99":
homograph()
else :
menu()
def hashcracktool():
clearScr()
os.system("figlet -f standard -c Hash Cracking Tools | lolcat")
print("""
[1] Hash Buster
[99]Back
""")
choice = input("Z4nzu >> ")
if choice == "1":
clearScr()
hashbuster()
elif choice == "99":
others()
elif choice == "":
others()
else :
menu()
def hashbuster():
os.system("echo \"Features : \n Automatic hash type identification \n Supports MD5, SHA1, SHA256, SHA384, SHA512 \n [!]https://github.com/s0md3v/Hash-Buster \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/s0md3v/Hash-Buster.git")
os.system("cd Hash-Buster;make install")
time.sleep(2)
hashcracktool()
elif choice == "2":
os.system("buster -h")
elif choice == "99":
hashcracktool()
else :
menu()
def Ddos(): def Ddos():
clearScr() clearScr()
os.system("figlet -f standard -c DDOS Attack Tools | lolcat") os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
@ -1760,6 +1982,7 @@ def xsstools():
[5] XSpear [5] XSpear
[6] XSSCon [6] XSSCon
[7] XanXSS [7] XanXSS
[8] Advanced XSS Detection Suite
[99]BAck [99]BAck
""") """)
choice = input("Z4nzu >> ") choice = input("Z4nzu >> ")
@ -1779,11 +2002,29 @@ def xsstools():
xsscon() xsscon()
elif choice == "7": elif choice == "7":
xanxss() xanxss()
elif choice == "8":
XSStrike()
elif choice == "": elif choice == "":
others() others()
else : else :
others() others()
def XSStrike():
os.system("echo \"XSStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy | lolcat")
xc=input("[1]Install [99]BAck >>")
if xc == "1":
os.system("sudo rm -rf XSStrike")
os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt")
info()
# elif xc == "2" :
# clearScr()
# os.system("echo \"YOu have to Run XSStrike as per your Requirment\n By using python3 xsstrike.py [Options]\"|boxes -d boy")
# os.system("cd XSStrike && python3 xsstrike.py")
elif xc == "99":
info()
else :
info()
def dalfox(): def dalfox():
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat") os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ") choice = input("[1]Install [2]Run [99]Back >> ")
@ -1894,9 +2135,16 @@ def xanxss():
def updatesys(): def updatesys():
choice = input("[1]Update System [2]Update Hackingtool [99]Back >> ")
if choice == "1":
os.system("sudo apt update && sudo apt full-upgrade -y") os.system("sudo apt update && sudo apt full-upgrade -y")
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ") os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
os.system("sudo apt-get install python3-pip") os.system("sudo apt-get install python3-pip")
elif choice == "2":
os.system("sudo chmod +x /etc/;sudo chmod +x /usr/share/doc;sudo rm -rf /usr/share/doc/hackingtool/;cd /etc/;sudo rm -rf /etc/hackingtool/;mkdir hackingtool;cd hackingtool;git clone https://github.com/Z4nzu/hackingtool.git;cd hackingtool;sudo chmod +x install.sh;./install.sh")
elif choice == "99":
menu()
else :
menu() menu()
def clearScr(): def clearScr():
@ -1906,72 +2154,89 @@ def clearScr():
os.system('cls') os.system('cls')
if __name__ == "__main__": if __name__ == "__main__":
notuser =getpass.getuser() # notuser =getpass.getuser()
user=os.getenv("SUDO_UID") # user=os.getenv("SUDO_UID")
uname=os.getenv("SUDO_USER") # uname=os.getenv("SUDO_USER")
try: try:
if system() == 'Linux': if system() == 'Linux':
# if path.exists("/home/{0}/Desktop/".format(user)): fpath="/home/hackingtoolpath.txt"
# os.chdir("/home/{0}/Desktop/".format(user)) if os.path.isfile(fpath):
# if os.path.isdir('hackingtool'): file1 = open(fpath,"r")
# os.chdir("/home/{0}/Desktop/hackingtool/".format(user)) f=file1.readline()
# menu() if os.path.exists("{0}".format(f)):
# else : os.chdir(f)
# os.system("mkdir hackingtool") file1.close()
# os.chdir("/home/{0}/Desktop/hackingtool/".format(user))
# menu()
if os.geteuid() != 0:
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
elif os.geteuid() == 0:
if path.exists("home/{0}/Desktop/".format(notuser)):
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
elif uname == 'None':
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu() menu()
else : else :
if path.exists("/home/{0}/Desktop/".format(uname)): os.mkdir("{0}".format(f))
os.chdir("/home/{0}/Desktop/".format(uname)) os.chdir("{0}".format(f))
if os.path.isdir('hackingtool'): file1.close()
os.chdir("/home/{0}/Desktop/hackingtool/".format(uname))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(uname))
menu()
elif uname == 'None':
os.chdir("/home/{0}/Desktop/".format(notuser))
if os.path.isdir('hackingtool'):
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu()
else:
os.system("mkdir hackingtool")
os.chdir("/home/{0}/Desktop/hackingtool/".format(notuser))
menu() menu()
else : else :
print("Sorry ...!!") clearScr()
print(Logo)
print("""
[@] Set Path (All your tools will be install in that directory)
[1]Manual
[2]Default
""")
choice = input("Z4nzu >> ")
if choice == "1":
inpath=input("Enter Path(with Directory Name) >> ")
file =open(fpath,"w")
file.write(inpath)
file.close()
print("Successfully Path Set...!!")
elif choice == "2":
autopath="/home/hackingtool/"
file =open(fpath,"w")
file.write(autopath)
file.close()
time.sleep(1)
print("Your Default Path Is :-"+autopath)
time.sleep(3)
else : else :
print("Try Again..!!")
else :
fpath="/home/hackingtoolpath.txt"
if os.path.isfile(fpath):
file1 = open(fpath,"r")
f=file1.readline()
if os.path.exists("{0}".format(f)):
os.chdir(f)
file1.close()
menu()
else :
os.mkdir("{0}".format(f))
os.chdir("{0}".format(f))
file1.close()
menu()
else :
clearScr()
print(Logo)
print("""
[@] Set Path (All your tools will be install in that directory)
[1]Manual
[2]Default
""")
choice = input("Z4nzu >> ")
if choice == "1":
inpath=input("Enter Path(with Directory Name) >> ")
file =open(fpath,"w")
file.write(inpath)
file.close()
print("Successfully Path Set...!!")
elif choice == "2":
autopath="/home/hackingtool/"
file =open(fpath,"w")
file.write(autopath)
file.close()
time.sleep(1)
print("Your Default Path Is :-"+autopath)
time.sleep(3)
else :
print("Try Again..!!")
print("Sorry Open New Issue..!!") print("Sorry Open New Issue..!!")
except KeyboardInterrupt: except KeyboardInterrupt:
print("\n Sorry ..!!!") print("\n Sorry ..!!!")
time.sleep(3) time.sleep(3)