You've already forked hackingtool
mirror of
https://github.com/Z4nzu/hackingtool.git
synced 2025-06-20 06:15:54 +02:00
Error Fix
This commit is contained in:
247
hackingtool.py
247
hackingtool.py
@ -24,13 +24,14 @@ import random
|
|||||||
import Queue
|
import Queue
|
||||||
import subprocess
|
import subprocess
|
||||||
import re
|
import re
|
||||||
|
import getpass
|
||||||
|
from os import path
|
||||||
from platform import system
|
from platform import system
|
||||||
from urlparse import urlparse
|
from urlparse import urlparse
|
||||||
from xml.dom import minidom
|
from xml.dom import minidom
|
||||||
from optparse import OptionParser
|
from optparse import OptionParser
|
||||||
from time import sleep
|
from time import sleep
|
||||||
from platform import system
|
from platform import system
|
||||||
|
|
||||||
Logo="""\033[33m
|
Logo="""\033[33m
|
||||||
|
|
||||||
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
|
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
|
||||||
@ -47,15 +48,12 @@ Logo="""\033[33m
|
|||||||
\033[97m[!] https://github.com/Z4nzu
|
\033[97m[!] https://github.com/Z4nzu
|
||||||
\033[91m[!] This Tool is Only For Educational Purpose Please Don\'t use for Any illegal Activity [!]
|
\033[91m[!] This Tool is Only For Educational Purpose Please Don\'t use for Any illegal Activity [!]
|
||||||
\033[97m """
|
\033[97m """
|
||||||
|
|
||||||
|
|
||||||
def menu():
|
def menu():
|
||||||
clearScr()
|
|
||||||
print(Logo + """\033[0m
|
print(Logo + """\033[0m
|
||||||
\033[91m[!] This Tool Must Run as a Root..[!]] \033[97m
|
\033[91m[!] This Tool Must Run as a Root..[!]] \033[97m
|
||||||
[00]AnonSurf
|
[00]AnonSurf
|
||||||
[01]Information Gathering
|
[01]Information Gathering
|
||||||
[02]Password Attack
|
[02]Password Attack && Wordlist Generator
|
||||||
[03]Wireless Attack
|
[03]Wireless Attack
|
||||||
[04]SQL Injection Tools
|
[04]SQL Injection Tools
|
||||||
[05]Phishing Attack
|
[05]Phishing Attack
|
||||||
@ -68,93 +66,93 @@ def menu():
|
|||||||
[12]SocialMedia Attack
|
[12]SocialMedia Attack
|
||||||
[13]SocialMedia Finder
|
[13]SocialMedia Finder
|
||||||
[14]Android Hack
|
[14]Android Hack
|
||||||
[15]Port Forwading
|
[15]Steganography
|
||||||
[16]Other Tools
|
[16]Other Tools
|
||||||
[17]Update System
|
[17]Update System
|
||||||
[99]Exit
|
[99]Exit
|
||||||
""")
|
""")
|
||||||
|
|
||||||
choice = input("Z4nzu =>> ")
|
choice = raw_input("Z4nzu =>> ")
|
||||||
if choice == 0 or choice == 00:
|
if choice == "0" or choice == "00":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
anonsurf()
|
anonsurf()
|
||||||
elif choice == 1 or choice == 01:
|
elif choice == "1" or choice == "01":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
info()
|
info()
|
||||||
elif choice == 2 or choice == 02:
|
elif choice == "2" or choice == "02":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
passwd()
|
passwd()
|
||||||
elif choice == 3 or choice == 03:
|
elif choice == "3" or choice == "03":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
wire()
|
wire()
|
||||||
elif choice == 4 or choice == 04:
|
elif choice == "4" or choice == "04":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
sqltool()
|
sqltool()
|
||||||
elif choice == 5 or choice == 05:
|
elif choice == "5" or choice == "05":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
phishattack()
|
phishattack()
|
||||||
elif choice == 6 or choice == 06:
|
elif choice == "6" or choice == "06":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
webAttack()
|
webAttack()
|
||||||
elif choice == 7 or choice == 07:
|
elif choice == "7" or choice == "07":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
postexp()
|
postexp()
|
||||||
elif choice == 8 :
|
elif choice == "8" or choice == "08" :
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
forensic()
|
forensic()
|
||||||
elif choice == 9 :
|
elif choice == "9" or choice == "09" :
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
payloads()
|
payloads()
|
||||||
elif choice == 10:
|
elif choice == "10":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
routexp()
|
routexp()
|
||||||
elif choice == 11:
|
elif choice == "11" :
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
wifijamming()
|
wifijamming()
|
||||||
elif choice == 12:
|
elif choice == "12" :
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
socialattack()
|
socialattack()
|
||||||
elif choice == 13:
|
elif choice == "13" :
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
socialfinder()
|
socialfinder()
|
||||||
elif choice == 14:
|
elif choice == "14":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
androidhack()
|
androidhack()
|
||||||
elif choice == 15:
|
elif choice == "15":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
portforwading()
|
steganography()
|
||||||
elif choice == 16:
|
elif choice == "16":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
others()
|
others()
|
||||||
elif choice == 17:
|
elif choice == "17":
|
||||||
clearScr()
|
clearScr()
|
||||||
print(Logo)
|
print(Logo)
|
||||||
updatesys()
|
updatesys()
|
||||||
elif choice == 99:
|
elif choice == "99" :
|
||||||
clearScr(), sys.exit()
|
clearScr(), sys.exit()
|
||||||
exit()
|
exit()
|
||||||
elif choice == "":
|
elif choice == "":
|
||||||
menu()
|
menu()
|
||||||
else:
|
else:
|
||||||
print("Wrong Input...!!")
|
print("Wrong Input...!!")
|
||||||
time.Sleep(3)
|
time.sleep(3)
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def anonsurf():
|
def anonsurf():
|
||||||
@ -180,7 +178,7 @@ def ansurf():
|
|||||||
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
|
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
|
||||||
if anc == 1:
|
if anc == 1:
|
||||||
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
|
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
|
||||||
os.system("cd kali-anonsurf && sudo ./installer.sh")
|
os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf")
|
||||||
print("Successfully Installed ...!!")
|
print("Successfully Installed ...!!")
|
||||||
elif anc==2:
|
elif anc==2:
|
||||||
os.system("sudo anonsurf start")
|
os.system("sudo anonsurf start")
|
||||||
@ -211,6 +209,7 @@ def info():
|
|||||||
[4] Host To IP
|
[4] Host To IP
|
||||||
[5] Xerosploit
|
[5] Xerosploit
|
||||||
[6] Advanced XSS Detection Suite
|
[6] Advanced XSS Detection Suite
|
||||||
|
[7] ReconSpider(For All Scaning)
|
||||||
[99] Back To Main Menu
|
[99] Back To Main Menu
|
||||||
""")
|
""")
|
||||||
choice2 = input("Z4nzu =>> ")
|
choice2 = input("Z4nzu =>> ")
|
||||||
@ -231,6 +230,9 @@ def info():
|
|||||||
if choice2 == 6:
|
if choice2 == 6:
|
||||||
clearScr()
|
clearScr()
|
||||||
XSStrike()
|
XSStrike()
|
||||||
|
elif choice2 == 7:
|
||||||
|
clearScr()
|
||||||
|
reconspider()
|
||||||
elif choice2 == 99:
|
elif choice2 == 99:
|
||||||
clearScr()
|
clearScr()
|
||||||
menu()
|
menu()
|
||||||
@ -305,6 +307,19 @@ def xerosploit():
|
|||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
|
def reconspider():
|
||||||
|
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\" | boxes -d boy")
|
||||||
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||||||
|
if userchoice == 1:
|
||||||
|
os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
|
||||||
|
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
|
||||||
|
elif userchoice == 2:
|
||||||
|
os.system("cd reconspider && python3 reconspider.py")
|
||||||
|
elif userchoice == 99:
|
||||||
|
info()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
def setoolkit():
|
def setoolkit():
|
||||||
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy")
|
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy")
|
||||||
choiceset = input("[1]Install [2]Run [99]BAck >>")
|
choiceset = input("[1]Install [2]Run [99]BAck >>")
|
||||||
@ -324,6 +339,8 @@ def passwd():
|
|||||||
print("""
|
print("""
|
||||||
[01]Cupp
|
[01]Cupp
|
||||||
[02]WordlistCreator
|
[02]WordlistCreator
|
||||||
|
[03]Goblin WordGenerator
|
||||||
|
[04]Credential reuse attacks
|
||||||
[99]Back To Main Menu
|
[99]Back To Main Menu
|
||||||
""")
|
""")
|
||||||
passchoice = raw_input("Z4nzu ==>> ")
|
passchoice = raw_input("Z4nzu ==>> ")
|
||||||
@ -333,6 +350,12 @@ def passwd():
|
|||||||
elif passchoice == "2" or passchoice == "02":
|
elif passchoice == "2" or passchoice == "02":
|
||||||
clearScr()
|
clearScr()
|
||||||
wlcreator()
|
wlcreator()
|
||||||
|
elif passchoice == "3" or passchoice == "03":
|
||||||
|
clearScr()
|
||||||
|
goblinword()
|
||||||
|
elif passchoice == "4" or passchoice == "04":
|
||||||
|
clearScr()
|
||||||
|
credentialattack()
|
||||||
elif passchoice == "99":
|
elif passchoice == "99":
|
||||||
clearScr()
|
clearScr()
|
||||||
menu()
|
menu()
|
||||||
@ -343,25 +366,50 @@ def passwd():
|
|||||||
|
|
||||||
def cupp():
|
def cupp():
|
||||||
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
|
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
|
||||||
cc=input("[1]Install [2]Run [99]Back")
|
cc=raw_input("[1]Install [2]Run [99]Back >> ")
|
||||||
if cc == 1:
|
if cc == "1":
|
||||||
os.system("git clone https://github.com/Mebus/cupp.git")
|
os.system("git clone https://github.com/Mebus/cupp.git")
|
||||||
print("Download Successfully..!!!")
|
print("Download Successfully..!!!")
|
||||||
elif cc == 2:
|
elif cc == "2":
|
||||||
os.system("cd cupp && ./cupp.py -h")
|
os.system("cd cupp && ./cupp.py -h")
|
||||||
elif cc == 99 :
|
elif cc == "99" :
|
||||||
passwd()
|
passwd()
|
||||||
else :
|
else :
|
||||||
main()
|
main()
|
||||||
|
|
||||||
def wlcreator():
|
def wlcreator():
|
||||||
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
|
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
|
||||||
userchoice = input("[1]Install [2]Run [99]Back >>")
|
userchoice = raw_input("[1]Install [2]Run [99]Back >>")
|
||||||
if userchoice == 1:
|
if userchoice == "1":
|
||||||
os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator")
|
os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator")
|
||||||
elif userchoice == 2:
|
elif userchoice == "2":
|
||||||
os.system("cd wlcreator && gcc -o wlcreator wlcreator.c && ./wlcreator 5")
|
os.system("cd wlcreator && gcc -o wlcreator wlcreator.c && ./wlcreator 5")
|
||||||
elif userchoice == 99:
|
elif userchoice == "99":
|
||||||
|
passwd()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
|
def goblinword():
|
||||||
|
os.system("echo \" GoblinWordGenerator \" | boxes -d boy")
|
||||||
|
userchoice = raw_input("[1]Install [2]Run [99]Back >>")
|
||||||
|
if userchoice == "1":
|
||||||
|
os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git")
|
||||||
|
elif userchoice == "2":
|
||||||
|
os.system("cd GoblinWordGenerator && python3 goblin.py")
|
||||||
|
elif userchoice == "99":
|
||||||
|
passwd()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
|
def credentialattack():
|
||||||
|
os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy")
|
||||||
|
userchoice = raw_input("[1]Install [2]Run [99]Back >> ")
|
||||||
|
if userchoice == "1":
|
||||||
|
os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git")
|
||||||
|
os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt")
|
||||||
|
elif userchoice == "2" :
|
||||||
|
os.system("cd Cr3dOv3r && python3 Cr3d0v3r.py -h")
|
||||||
|
elif userchoice == "99":
|
||||||
passwd()
|
passwd()
|
||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
@ -844,13 +892,17 @@ def autopsy():
|
|||||||
|
|
||||||
def postexp():
|
def postexp():
|
||||||
print("""
|
print("""
|
||||||
[1]Vegile - Ghost In The Shell
|
[1] Vegile - Ghost In The Shell
|
||||||
|
[2] Chrome Keylogger
|
||||||
[99]Back
|
[99]Back
|
||||||
""")
|
""")
|
||||||
expchoice = input("Z4nzu =>> ")
|
expchoice = input("Z4nzu =>> ")
|
||||||
if expchoice == 1:
|
if expchoice == 1:
|
||||||
clearScr()
|
clearScr()
|
||||||
vegile()
|
vegile()
|
||||||
|
if expchoice == 2:
|
||||||
|
clearScr()
|
||||||
|
chromekeylogger()
|
||||||
elif expchoice == 99:
|
elif expchoice == 99:
|
||||||
menu()
|
menu()
|
||||||
elif expchoice == "":
|
elif expchoice == "":
|
||||||
@ -873,6 +925,19 @@ def vegile():
|
|||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
|
def chromekeylogger():
|
||||||
|
os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy")
|
||||||
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||||||
|
if userchoice == 1:
|
||||||
|
os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git")
|
||||||
|
os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ")
|
||||||
|
elif userchoice == 2:
|
||||||
|
os.system("cd HeraKeylogger && python3 hera.py ")
|
||||||
|
elif userchoice == 99:
|
||||||
|
postexp()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
def routexp():
|
def routexp():
|
||||||
print("""
|
print("""
|
||||||
[1] RouterSploit
|
[1] RouterSploit
|
||||||
@ -924,6 +989,8 @@ def webAttack():
|
|||||||
[1] SlowLoris
|
[1] SlowLoris
|
||||||
[2] Skipfish
|
[2] Skipfish
|
||||||
[3] SubDomain Finder
|
[3] SubDomain Finder
|
||||||
|
[4] CheckURL
|
||||||
|
[5] Blazy(Also Find ClickJacking)
|
||||||
[99]Back To Menu
|
[99]Back To Menu
|
||||||
""")
|
""")
|
||||||
wc = input("Z4nzu >> ")
|
wc = input("Z4nzu >> ")
|
||||||
@ -936,6 +1003,12 @@ def webAttack():
|
|||||||
elif wc == 3:
|
elif wc == 3:
|
||||||
clearScr()
|
clearScr()
|
||||||
subdomain()
|
subdomain()
|
||||||
|
elif wc == 4:
|
||||||
|
clearScr()
|
||||||
|
checkurl()
|
||||||
|
elif wc == 5:
|
||||||
|
clearScr()
|
||||||
|
blazy()
|
||||||
elif wc == 99:
|
elif wc == 99:
|
||||||
menu()
|
menu()
|
||||||
else :
|
else :
|
||||||
@ -943,7 +1016,7 @@ def webAttack():
|
|||||||
|
|
||||||
def slowloris():
|
def slowloris():
|
||||||
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
|
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
|
||||||
choice = ("[1]install [2]Run [99]Back >> ")
|
choice = input("[1]install [2]Run [99]Back >> ")
|
||||||
if choice == 1:
|
if choice == 1:
|
||||||
os.system("sudo pip install slowloris")
|
os.system("sudo pip install slowloris")
|
||||||
elif choice == 2:
|
elif choice == 2:
|
||||||
@ -965,22 +1038,48 @@ def skipfish():
|
|||||||
else :
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
|
|
||||||
def subdomain():
|
def subdomain():
|
||||||
print(Logo)
|
print(Logo)
|
||||||
sdc=input("[1]install [2]Run [99]BAck >> ")
|
sdc=input("[1]install [2]Run [99]BAck >> ")
|
||||||
if sdc == 1:
|
if sdc == 1:
|
||||||
os.system("sudo pip install requests argparse dnspython")
|
os.system("sudo pip install requests argparse dnspython")
|
||||||
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && chmod -R 755 Sublist3r && cd Sublist3r && sudo pip install -r requirements.txt")
|
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ")
|
||||||
|
os.system("chmod -R 755 Sublist3r && cd Sublist3r && sudo pip install -r requirements.txt")
|
||||||
menu()
|
menu()
|
||||||
elif sdc == 2:
|
elif sdc == 2:
|
||||||
print("Go to Sublist3r and run ./sublist3r")
|
print("Go to Sublist3r and run ./sublist3r")
|
||||||
os.system("cd Sublist3r && ./sublist3r")
|
os.system("echo \" python sublist3r.py -d example.com \npython sublist3r.py -d example.com -p 80,443\"| boxes -d boy")
|
||||||
|
os.system("cd Sublist3r && python sublist3r -h")
|
||||||
elif sdc == 99 :
|
elif sdc == 99 :
|
||||||
webAttack()
|
webAttack()
|
||||||
else :
|
else :
|
||||||
main()
|
main()
|
||||||
|
|
||||||
|
def checkurl():
|
||||||
|
os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy")
|
||||||
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||||||
|
if userchoice == 1:
|
||||||
|
os.system("sudo git clone https://github.com/UndeadSec/checkURL.git")
|
||||||
|
elif userchoice == 2:
|
||||||
|
os.system("cd checkURL && python3 checkURL.py --help")
|
||||||
|
elif userchoice == 99:
|
||||||
|
webAttack()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
|
def blazy():
|
||||||
|
os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy")
|
||||||
|
userchoice = input("[1]Install [2]Run [99]Back >>")
|
||||||
|
if userchoice == 1:
|
||||||
|
os.system("sudo git clone https://github.com/UltimateHackers/Blazy")
|
||||||
|
os.system("cd Blazy && sudo pip install -r requirements.txt")
|
||||||
|
elif userchoice == 2:
|
||||||
|
os.system("cd Blazy && python blazy.py")
|
||||||
|
elif userchoice == 99:
|
||||||
|
webAttack()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
def androidhack():
|
def androidhack():
|
||||||
print("""
|
print("""
|
||||||
[1] Keydroid
|
[1] Keydroid
|
||||||
@ -1307,9 +1406,52 @@ def airmon():
|
|||||||
# z=raw_input("Enter Your wifi Interface Name :- ")
|
# z=raw_input("Enter Your wifi Interface Name :- ")
|
||||||
# os.system("airmon-ng && airmon-ng start %s"%z)
|
# os.system("airmon-ng && airmon-ng start %s"%z)
|
||||||
|
|
||||||
def portforwading():
|
def steganography():
|
||||||
print("In Working ......")
|
print("""
|
||||||
time.sleep(1)
|
[1]SteganoHide
|
||||||
|
[2]StegnoCracker
|
||||||
|
[99]Back
|
||||||
|
""")
|
||||||
|
choice = input("Z4nz =>> ")
|
||||||
|
if choice == 1:
|
||||||
|
steganohide()
|
||||||
|
elif choice == 2:
|
||||||
|
stegnocracker()
|
||||||
|
elif choice == 99:
|
||||||
|
menu()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
|
def steganohide():
|
||||||
|
choice = input("[1]Install [2]Run [99] >> ")
|
||||||
|
if choice == 1:
|
||||||
|
os.system("sudo apt-get install steghide -y ")
|
||||||
|
elif choice == 2:
|
||||||
|
choice1=input("[1]Hide [2]Extract >> ")
|
||||||
|
if choice1 ==1:
|
||||||
|
filehide=raw_input("Enter Filename you want to Embed(1.txt) :- ")
|
||||||
|
filetobehide=raw_input("Enter Cover Filename(test.jpeg) :- ")
|
||||||
|
os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide))
|
||||||
|
elif choice1 ==2:
|
||||||
|
fromfile=raw_input("Enter Filename From Extract Data :- ")
|
||||||
|
os.system("steghide extract -sf {0}".format(fromfile))
|
||||||
|
elif choice == 99:
|
||||||
|
steganography()
|
||||||
|
else :
|
||||||
|
menu()
|
||||||
|
|
||||||
|
def stegnocracker():
|
||||||
|
os.system("echo \" SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy")
|
||||||
|
choice = ("[1]Install [2]Run [99] >> ")
|
||||||
|
if choice == 1:
|
||||||
|
os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall")
|
||||||
|
elif choice ==2:
|
||||||
|
file1=raw_input("Enter Filename :- ")
|
||||||
|
passfile=raw_input("Enter Wordlist Filename :- ")
|
||||||
|
os.system("stegcracker {0} {1} ".format(file1,passfile))
|
||||||
|
elif choice == 99:
|
||||||
|
steganography()
|
||||||
|
else :
|
||||||
menu()
|
menu()
|
||||||
|
|
||||||
def sqltool():
|
def sqltool():
|
||||||
@ -1388,6 +1530,21 @@ def clearScr():
|
|||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
try:
|
try:
|
||||||
|
if system() == 'Linux':
|
||||||
|
os.chdir("/home/")
|
||||||
|
if os.path.isdir('hackingtool'):
|
||||||
|
os.chdir("/home/hackingtool/")
|
||||||
|
menu()
|
||||||
|
else :
|
||||||
|
os.system("mkdir hackingtool")
|
||||||
|
menu()
|
||||||
|
if system() == 'android':
|
||||||
|
os.chdir("data/data/com.termux/files/home/")
|
||||||
|
if os.path.isdir('hackingtool'):
|
||||||
|
os.chdir("data/data/com.termux/files/home/hackingtool/")
|
||||||
|
menu()
|
||||||
|
else :
|
||||||
|
os.system("mkdir hackingtool")
|
||||||
menu()
|
menu()
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
print(" Sorry ..!!!")
|
print(" Sorry ..!!!")
|
||||||
|
Reference in New Issue
Block a user