1
0
mirror of https://github.com/Z4nzu/hackingtool.git synced 2025-06-20 06:15:54 +02:00

Error Fix

This commit is contained in:
Mr.Z4nzu
2020-04-15 20:16:55 +05:30
committed by GitHub
parent 781d4cbfb9
commit 1dccbaf0f1

View File

@ -24,13 +24,14 @@ import random
import Queue import Queue
import subprocess import subprocess
import re import re
import getpass
from os import path
from platform import system from platform import system
from urlparse import urlparse from urlparse import urlparse
from xml.dom import minidom from xml.dom import minidom
from optparse import OptionParser from optparse import OptionParser
from time import sleep from time import sleep
from platform import system from platform import system
Logo="""\033[33m Logo="""\033[33m
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█ ▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
@ -47,15 +48,12 @@ Logo="""\033[33m
\033[97m[!] https://github.com/Z4nzu \033[97m[!] https://github.com/Z4nzu
\033[91m[!] This Tool is Only For Educational Purpose Please Don\'t use for Any illegal Activity [!] \033[91m[!] This Tool is Only For Educational Purpose Please Don\'t use for Any illegal Activity [!]
\033[97m """ \033[97m """
def menu(): def menu():
clearScr()
print(Logo + """\033[0m print(Logo + """\033[0m
\033[91m[!] This Tool Must Run as a Root..[!]] \033[97m \033[91m[!] This Tool Must Run as a Root..[!]] \033[97m
[00]AnonSurf [00]AnonSurf
[01]Information Gathering [01]Information Gathering
[02]Password Attack [02]Password Attack && Wordlist Generator
[03]Wireless Attack [03]Wireless Attack
[04]SQL Injection Tools [04]SQL Injection Tools
[05]Phishing Attack [05]Phishing Attack
@ -68,93 +66,93 @@ def menu():
[12]SocialMedia Attack [12]SocialMedia Attack
[13]SocialMedia Finder [13]SocialMedia Finder
[14]Android Hack [14]Android Hack
[15]Port Forwading [15]Steganography
[16]Other Tools [16]Other Tools
[17]Update System [17]Update System
[99]Exit [99]Exit
""") """)
choice = input("Z4nzu =>> ") choice = raw_input("Z4nzu =>> ")
if choice == 0 or choice == 00: if choice == "0" or choice == "00":
clearScr() clearScr()
print(Logo) print(Logo)
anonsurf() anonsurf()
elif choice == 1 or choice == 01: elif choice == "1" or choice == "01":
clearScr() clearScr()
print(Logo) print(Logo)
info() info()
elif choice == 2 or choice == 02: elif choice == "2" or choice == "02":
clearScr() clearScr()
print(Logo) print(Logo)
passwd() passwd()
elif choice == 3 or choice == 03: elif choice == "3" or choice == "03":
clearScr() clearScr()
print(Logo) print(Logo)
wire() wire()
elif choice == 4 or choice == 04: elif choice == "4" or choice == "04":
clearScr() clearScr()
print(Logo) print(Logo)
sqltool() sqltool()
elif choice == 5 or choice == 05: elif choice == "5" or choice == "05":
clearScr() clearScr()
print(Logo) print(Logo)
phishattack() phishattack()
elif choice == 6 or choice == 06: elif choice == "6" or choice == "06":
clearScr() clearScr()
print(Logo) print(Logo)
webAttack() webAttack()
elif choice == 7 or choice == 07: elif choice == "7" or choice == "07":
clearScr() clearScr()
print(Logo) print(Logo)
postexp() postexp()
elif choice == 8 : elif choice == "8" or choice == "08" :
clearScr() clearScr()
print(Logo) print(Logo)
forensic() forensic()
elif choice == 9 : elif choice == "9" or choice == "09" :
clearScr() clearScr()
print(Logo) print(Logo)
payloads() payloads()
elif choice == 10: elif choice == "10":
clearScr() clearScr()
print(Logo) print(Logo)
routexp() routexp()
elif choice == 11: elif choice == "11" :
clearScr() clearScr()
print(Logo) print(Logo)
wifijamming() wifijamming()
elif choice == 12: elif choice == "12" :
clearScr() clearScr()
print(Logo) print(Logo)
socialattack() socialattack()
elif choice == 13: elif choice == "13" :
clearScr() clearScr()
print(Logo) print(Logo)
socialfinder() socialfinder()
elif choice == 14: elif choice == "14":
clearScr() clearScr()
print(Logo) print(Logo)
androidhack() androidhack()
elif choice == 15: elif choice == "15":
clearScr() clearScr()
print(Logo) print(Logo)
portforwading() steganography()
elif choice == 16: elif choice == "16":
clearScr() clearScr()
print(Logo) print(Logo)
others() others()
elif choice == 17: elif choice == "17":
clearScr() clearScr()
print(Logo) print(Logo)
updatesys() updatesys()
elif choice == 99: elif choice == "99" :
clearScr(), sys.exit() clearScr(), sys.exit()
exit() exit()
elif choice == "": elif choice == "":
menu() menu()
else: else:
print("Wrong Input...!!") print("Wrong Input...!!")
time.Sleep(3) time.sleep(3)
menu() menu()
def anonsurf(): def anonsurf():
@ -180,7 +178,7 @@ def ansurf():
anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ") anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ")
if anc == 1: if anc == 1:
os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git") os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git")
os.system("cd kali-anonsurf && sudo ./installer.sh") os.system("cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf")
print("Successfully Installed ...!!") print("Successfully Installed ...!!")
elif anc==2: elif anc==2:
os.system("sudo anonsurf start") os.system("sudo anonsurf start")
@ -211,6 +209,7 @@ def info():
[4] Host To IP [4] Host To IP
[5] Xerosploit [5] Xerosploit
[6] Advanced XSS Detection Suite [6] Advanced XSS Detection Suite
[7] ReconSpider(For All Scaning)
[99] Back To Main Menu [99] Back To Main Menu
""") """)
choice2 = input("Z4nzu =>> ") choice2 = input("Z4nzu =>> ")
@ -231,6 +230,9 @@ def info():
if choice2 == 6: if choice2 == 6:
clearScr() clearScr()
XSStrike() XSStrike()
elif choice2 == 7:
clearScr()
reconspider()
elif choice2 == 99: elif choice2 == 99:
clearScr() clearScr()
menu() menu()
@ -305,6 +307,19 @@ def xerosploit():
else : else :
menu() menu()
def reconspider():
os.system("echo \" ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, \nWebsites, Organizations and find out information from different sources.\" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == 1:
os.system("sudo git clone https://github.com/bhavsec/reconspider.git")
os.system("sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install")
elif userchoice == 2:
os.system("cd reconspider && python3 reconspider.py")
elif userchoice == 99:
info()
else :
menu()
def setoolkit(): def setoolkit():
os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy") os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy")
choiceset = input("[1]Install [2]Run [99]BAck >>") choiceset = input("[1]Install [2]Run [99]BAck >>")
@ -324,6 +339,8 @@ def passwd():
print(""" print("""
[01]Cupp [01]Cupp
[02]WordlistCreator [02]WordlistCreator
[03]Goblin WordGenerator
[04]Credential reuse attacks
[99]Back To Main Menu [99]Back To Main Menu
""") """)
passchoice = raw_input("Z4nzu ==>> ") passchoice = raw_input("Z4nzu ==>> ")
@ -333,6 +350,12 @@ def passwd():
elif passchoice == "2" or passchoice == "02": elif passchoice == "2" or passchoice == "02":
clearScr() clearScr()
wlcreator() wlcreator()
elif passchoice == "3" or passchoice == "03":
clearScr()
goblinword()
elif passchoice == "4" or passchoice == "04":
clearScr()
credentialattack()
elif passchoice == "99": elif passchoice == "99":
clearScr() clearScr()
menu() menu()
@ -343,25 +366,50 @@ def passwd():
def cupp(): def cupp():
os.system("echo \"Common User Password Generator..!!\"| boxes -d boy") os.system("echo \"Common User Password Generator..!!\"| boxes -d boy")
cc=input("[1]Install [2]Run [99]Back") cc=raw_input("[1]Install [2]Run [99]Back >> ")
if cc == 1: if cc == "1":
os.system("git clone https://github.com/Mebus/cupp.git") os.system("git clone https://github.com/Mebus/cupp.git")
print("Download Successfully..!!!") print("Download Successfully..!!!")
elif cc == 2: elif cc == "2":
os.system("cd cupp && ./cupp.py -h") os.system("cd cupp && ./cupp.py -h")
elif cc == 99 : elif cc == "99" :
passwd() passwd()
else : else :
main() main()
def wlcreator(): def wlcreator():
os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy") os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>") userchoice = raw_input("[1]Install [2]Run [99]Back >>")
if userchoice == 1: if userchoice == "1":
os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator") os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator")
elif userchoice == 2: elif userchoice == "2":
os.system("cd wlcreator && gcc -o wlcreator wlcreator.c && ./wlcreator 5") os.system("cd wlcreator && gcc -o wlcreator wlcreator.c && ./wlcreator 5")
elif userchoice == 99: elif userchoice == "99":
passwd()
else :
menu()
def goblinword():
os.system("echo \" GoblinWordGenerator \" | boxes -d boy")
userchoice = raw_input("[1]Install [2]Run [99]Back >>")
if userchoice == "1":
os.system("sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git")
elif userchoice == "2":
os.system("cd GoblinWordGenerator && python3 goblin.py")
elif userchoice == "99":
passwd()
else :
menu()
def credentialattack():
os.system("echo \"[!]Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.\n[!]Check if the target credentials you found is reused on other websites/services.\n[!]Checking if the old password you got from the target/leaks is still used in any website.\n[#]This Tool Available in MAC & Windows Os \n\t[!] https://github.com/D4Vinci/Cr3dOv3r\" | boxes -d boy")
userchoice = raw_input("[1]Install [2]Run [99]Back >> ")
if userchoice == "1":
os.system("sudo git clone https://github.com/D4Vinci/Cr3dOv3r.git")
os.system("cd Cr3dOv3r && python3 -m pip install -r requirements.txt")
elif userchoice == "2" :
os.system("cd Cr3dOv3r && python3 Cr3d0v3r.py -h")
elif userchoice == "99":
passwd() passwd()
else : else :
menu() menu()
@ -844,13 +892,17 @@ def autopsy():
def postexp(): def postexp():
print(""" print("""
[1]Vegile - Ghost In The Shell [1] Vegile - Ghost In The Shell
[2] Chrome Keylogger
[99]Back [99]Back
""") """)
expchoice = input("Z4nzu =>> ") expchoice = input("Z4nzu =>> ")
if expchoice == 1: if expchoice == 1:
clearScr() clearScr()
vegile() vegile()
if expchoice == 2:
clearScr()
chromekeylogger()
elif expchoice == 99: elif expchoice == 99:
menu() menu()
elif expchoice == "": elif expchoice == "":
@ -873,6 +925,19 @@ def vegile():
else : else :
menu() menu()
def chromekeylogger():
os.system("echo \" Hera Chrome Keylogger \" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == 1:
os.system("sudo git clone https://github.com/UndeadSec/HeraKeylogger.git")
os.system("cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt ")
elif userchoice == 2:
os.system("cd HeraKeylogger && python3 hera.py ")
elif userchoice == 99:
postexp()
else :
menu()
def routexp(): def routexp():
print(""" print("""
[1] RouterSploit [1] RouterSploit
@ -924,6 +989,8 @@ def webAttack():
[1] SlowLoris [1] SlowLoris
[2] Skipfish [2] Skipfish
[3] SubDomain Finder [3] SubDomain Finder
[4] CheckURL
[5] Blazy(Also Find ClickJacking)
[99]Back To Menu [99]Back To Menu
""") """)
wc = input("Z4nzu >> ") wc = input("Z4nzu >> ")
@ -936,6 +1003,12 @@ def webAttack():
elif wc == 3: elif wc == 3:
clearScr() clearScr()
subdomain() subdomain()
elif wc == 4:
clearScr()
checkurl()
elif wc == 5:
clearScr()
blazy()
elif wc == 99: elif wc == 99:
menu() menu()
else : else :
@ -943,7 +1016,7 @@ def webAttack():
def slowloris(): def slowloris():
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ") os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ")
choice = ("[1]install [2]Run [99]Back >> ") choice = input("[1]install [2]Run [99]Back >> ")
if choice == 1: if choice == 1:
os.system("sudo pip install slowloris") os.system("sudo pip install slowloris")
elif choice == 2: elif choice == 2:
@ -965,22 +1038,48 @@ def skipfish():
else : else :
menu() menu()
def subdomain(): def subdomain():
print(Logo) print(Logo)
sdc=input("[1]install [2]Run [99]BAck >> ") sdc=input("[1]install [2]Run [99]BAck >> ")
if sdc == 1: if sdc == 1:
os.system("sudo pip install requests argparse dnspython") os.system("sudo pip install requests argparse dnspython")
os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && chmod -R 755 Sublist3r && cd Sublist3r && sudo pip install -r requirements.txt") os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git ")
os.system("chmod -R 755 Sublist3r && cd Sublist3r && sudo pip install -r requirements.txt")
menu() menu()
elif sdc == 2: elif sdc == 2:
print("Go to Sublist3r and run ./sublist3r") print("Go to Sublist3r and run ./sublist3r")
os.system("cd Sublist3r && ./sublist3r") os.system("echo \" python sublist3r.py -d example.com \npython sublist3r.py -d example.com -p 80,443\"| boxes -d boy")
os.system("cd Sublist3r && python sublist3r -h")
elif sdc == 99 : elif sdc == 99 :
webAttack() webAttack()
else : else :
main() main()
def checkurl():
os.system("echo \" Detect evil urls that uses IDN Homograph Attack.\n\t[!]python3 checkURL.py --url google.com \" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == 1:
os.system("sudo git clone https://github.com/UndeadSec/checkURL.git")
elif userchoice == 2:
os.system("cd checkURL && python3 checkURL.py --help")
elif userchoice == 99:
webAttack()
else :
menu()
def blazy():
os.system("echo \"Blazy is a modern login page bruteforcer \" | boxes -d boy")
userchoice = input("[1]Install [2]Run [99]Back >>")
if userchoice == 1:
os.system("sudo git clone https://github.com/UltimateHackers/Blazy")
os.system("cd Blazy && sudo pip install -r requirements.txt")
elif userchoice == 2:
os.system("cd Blazy && python blazy.py")
elif userchoice == 99:
webAttack()
else :
menu()
def androidhack(): def androidhack():
print(""" print("""
[1] Keydroid [1] Keydroid
@ -1307,10 +1406,53 @@ def airmon():
# z=raw_input("Enter Your wifi Interface Name :- ") # z=raw_input("Enter Your wifi Interface Name :- ")
# os.system("airmon-ng && airmon-ng start %s"%z) # os.system("airmon-ng && airmon-ng start %s"%z)
def portforwading(): def steganography():
print("In Working ......") print("""
time.sleep(1) [1]SteganoHide
menu() [2]StegnoCracker
[99]Back
""")
choice = input("Z4nz =>> ")
if choice == 1:
steganohide()
elif choice == 2:
stegnocracker()
elif choice == 99:
menu()
else :
menu()
def steganohide():
choice = input("[1]Install [2]Run [99] >> ")
if choice == 1:
os.system("sudo apt-get install steghide -y ")
elif choice == 2:
choice1=input("[1]Hide [2]Extract >> ")
if choice1 ==1:
filehide=raw_input("Enter Filename you want to Embed(1.txt) :- ")
filetobehide=raw_input("Enter Cover Filename(test.jpeg) :- ")
os.system("steghide embed -cf {0} -ef {1}".format(filetobehide,filehide))
elif choice1 ==2:
fromfile=raw_input("Enter Filename From Extract Data :- ")
os.system("steghide extract -sf {0}".format(fromfile))
elif choice == 99:
steganography()
else :
menu()
def stegnocracker():
os.system("echo \" SteganoCracker is a tool that uncover hidden data inside files\n using brute-force utility \"|boxes -d boy")
choice = ("[1]Install [2]Run [99] >> ")
if choice == 1:
os.system("pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall")
elif choice ==2:
file1=raw_input("Enter Filename :- ")
passfile=raw_input("Enter Wordlist Filename :- ")
os.system("stegcracker {0} {1} ".format(file1,passfile))
elif choice == 99:
steganography()
else :
menu()
def sqltool(): def sqltool():
print(""" print("""
@ -1388,7 +1530,22 @@ def clearScr():
if __name__ == "__main__": if __name__ == "__main__":
try: try:
menu() if system() == 'Linux':
os.chdir("/home/")
if os.path.isdir('hackingtool'):
os.chdir("/home/hackingtool/")
menu()
else :
os.system("mkdir hackingtool")
menu()
if system() == 'android':
os.chdir("data/data/com.termux/files/home/")
if os.path.isdir('hackingtool'):
os.chdir("data/data/com.termux/files/home/hackingtool/")
menu()
else :
os.system("mkdir hackingtool")
menu()
except KeyboardInterrupt: except KeyboardInterrupt:
print(" Sorry ..!!!") print(" Sorry ..!!!")
time.sleep(3) time.sleep(3)