1
0
mirror of https://github.com/Z4nzu/hackingtool.git synced 2025-06-20 06:15:54 +02:00

Update hackingtool.py

This commit is contained in:
Mr.Z4nzu
2020-07-05 17:52:39 +05:30
committed by GitHub
parent 4e35ff8db7
commit 86ad40cc11

View File

@ -29,7 +29,6 @@ from urllib.parse import urlparse
from xml.dom import minidom
from optparse import OptionParser
from time import sleep
from platform import system
Logo="""\033[33m
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
@ -335,6 +334,7 @@ def passwd():
[02]WordlistCreator
[03]Goblin WordGenerator
[04]Credential reuse attacks
[05]Password list((1.4 Billion Clear Text Password))
[99]Back To Main Menu
""")
passchoice = input("Z4nzu ==>> ")
@ -350,6 +350,9 @@ def passwd():
elif passchoice == "4" or passchoice == "04":
clearScr()
credentialattack()
elif passchoice == "5" or passchoice == "05":
clearScr()
showme()
elif passchoice == "99":
clearScr()
menu()
@ -833,21 +836,29 @@ def forensic():
clearScr()
os.system("figlet -f standard Forensic Tools | lolcat ")
print("""
[1] Bulk_extractor
[2] Disk Clone and ISO Image Aquire
[3] AutoSpy
[1] Autopsy
[2] Wireshark
[3] Bulk_extractor
[4] Disk Clone and ISO Image Aquire
[5] Toolsley
[99]Back to Menu
""")
choice = input("Z4nzu ==>>")
if choice == "1" :
if choice == "3" :
clearScr()
bulkextractor()
elif choice == "2":
elif choice == "4":
clearScr()
guymager()
elif choice == "3":
elif choice == "1":
clearScr()
autopsy()
elif choice == "2":
clearScr()
wireshark()
elif choice == "5":
clearScr()
toolsley()
elif choice == "99":
menu()
elif choice == "":
@ -909,6 +920,32 @@ def autopsy():
else :
menu()
def wireshark():
os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
choice = input("[1]Run [99]Back >> ")
if choice == "1":
os.system("sudo wireshark")
elif choice == "99":
forensic()
elif choice == "":
forensic()
else :
menu()
def toolsley():
os.system("echo \" Toolsley got more than ten useful tools for investigation.\n\b File signature verifier\n\b File identifier \n\b Hash & Validate \n\b Binary inspector \n\bEncode text \n\b Data URI generator \n\b Password generator \" | boxes -d boy | lolcat")
userchoice = input("[1]Open [99]Back >> ")
if userchoice == "1":
print("Trying to open WebBrowser ")
time.sleep(3)
webbrowser.open_new_tab('https://www.toolsley.com/')
elif userchoice == "99":
forensic()
elif userchoice == "":
forensic()
else :
menu()
def postexp():
clearScr()
os.system("figlet -f standard post explotations | lolcat")
@ -1012,23 +1049,7 @@ def fastssh():
routexp()
else :
menu()
def Ddos():
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
print("""
[1]SlowLoris
[99]Back
""")
choice =input("Z4nzu >> ")
if choice == "1":
clearScr()
slowloris()
elif choice == "2":
pass
elif choice == "99":
others()
else :
print("Invalid ...")
menu()
def webAttack():
clearScr()
os.system("figlet 'Web Attack Tools' -f standard -c | lolcat")
@ -1071,19 +1092,6 @@ def web2attack():
else :
menu()
def slowloris():
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo pip install slowloris")
elif choice == "2":
print(Logo)
ts=input("Enter Target Site :-")
os.system("slowloris %s"%ts)
elif choice == "99":
webAttack()
else :
menu()
def skipfish():
userchoice = input("[1]Run [99]Back >> ")
@ -1096,7 +1104,6 @@ def skipfish():
menu()
def subdomain():
choice=input("[1]install [2]Run [99]BAck >> ")
if choice == "1":
os.system("sudo pip install requests argparse dnspython")
@ -1595,9 +1602,11 @@ def sqlmap():
menu()
def others():
print("""
clearScr()
print(Logo + """
[1]Ddos Attack Tools
[2]SMWYG-Show-Me-What-You-Got (1.4 Billion Clear Text Password)
[2]XSS Attack Tools
[3]HatCloud(Bypass CloudFlare for IP)
[99]BAck
""")
choice = input("Z4nzu =>>")
@ -1606,7 +1615,10 @@ def others():
Ddos()
elif choice == "2":
clearScr()
showme()
xsstools()
elif choice == "3":
clearScr()
hatcloud()
elif choice == "99":
menu()
elif choice == "":
@ -1631,6 +1643,250 @@ def showme():
else :
menu()
def hatcloud():
os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/HatBashBR/HatCloud.git")
others()
elif choice == "2":
tsite=input("Enter Site >>")
os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite))
elif choice =="99":
others()
else :
others()
def Ddos():
clearScr()
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
print("""
[1]SlowLoris
[2]aSYNcrone | Multifunction SYN Flood DDoS Weapon
[3]UFOnet
[4]GoldenEye
[99]Back
""")
choice =input("Z4nzu >> ")
if choice == "1":
clearScr()
slowloris()
elif choice == "2":
asyncrone()
elif choice == "3":
ufonet()
elif choice == "4":
goldeneye()
elif choice == "99":
others()
else :
print("Invalid ...")
menu()
def slowloris():
os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo pip install slowloris")
Ddos()
elif choice == "2":
ts=input("Enter Target Site :-")
os.system("slowloris %s"%ts)
elif choice == "99":
Ddos()
else :
menu()
def asyncrone():
os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/fatih4842/aSYNcrone.git")
os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread")
Ddos()
elif choice == "2":
sport=input("Enter Source Port >> ")
tip=input("Enter Target IP >> ")
tport=input("Enter Target port >> ")
os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport))
elif choice == "99":
Ddos()
else :
menu()
def ufonet():
os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/epsylon/ufonet.git")
os.system("cd ufonet;sudo python setup.py install")
Ddos()
elif choice == "2":
os.system("sudo ./ufonet --gui")
elif choice == "99":
Ddos()
else :
menu()
def goldeneye():
os.system("echo \"More Info [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat")
choice = input("[1]install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye")
Ddos()
elif choice == "2":
os.system("cd GoldenEye ;sudo ./goldeneye.py")
print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py <url> [OPTIONS] ")
elif choice == "99":
Ddos()
else :
menu()
def xsstools():
clearScr()
os.system("figlet -f standard -c XSS Attack Tools | lolcat")
print("""
[1] DalFox(Finder of XSS)
[2] XSS Payload Generator
[3] Extended XSS Searcher and Finder
[4] XSS-Freak
[5] XSpear
[6] XSSCon
[7] XanXSS
[99]BAck
""")
choice = input("Z4nzu >> ")
if choice == "1":
dalfox()
elif choice =="2":
xsspayload()
elif choice == "99":
others()
elif choice == "3":
xssfinder()
elif choice == "4":
xssfreak()
elif choice == "5":
xspear()
elif choice == "6":
xsscon()
elif choice == "7":
xanxss()
elif choice == "":
others()
else :
others()
def dalfox():
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("sudo apt-get install golang")
os.system("sudo git clone https://github.com/hahwul/dalfox ")
os.system("cd dalfox;go install")
xsstools()
elif choice == "2":
os.system("~/go/bin/dalfox")
print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ")
elif choice =="99":
xsstools()
else :
others()
def xsspayload():
os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/capture0x/XSS-LOADER.git")
os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt")
xsstools()
elif choice == "2":
os.system("cd XSS-LOADER;sudo python3 payloader.py")
elif choice =="99":
xsstools()
else :
others()
def xssfinder():
os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git glone https://github.com/Damian89/extended-xss-search.git")
print("""\033[96m
Follow This Steps After Installation :-
\033[31m [*]Go To extended-xss-search directory,
and Rename the example.app-settings.conf to app-settings.conf
""")
elif choice == "2":
print("""\033[96m
You have To Add Links to scan
\033[31m[!]Go to extended-xss-search
[*]config/urls-to-test.txt
[!]python3 extended-xss-search.py
""")
elif choice =="99":
xsstools()
else :
others()
def xssfreak():
os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git")
os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt")
xsstools()
elif choice == "2":
os.system("cd XSS-Freak;sudo python3 XSS-Freak.py")
elif choice =="99":
xsstools()
else :
others()
def xspear():
os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("gem install XSpear")
xsstools()
elif choice == "2":
os.system("XSpear -h")
elif choice =="99":
xsstools()
else :
others()
def xsscon():
os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/menkrep1337/XSSCon")
os.system("sudo chmod 755 -R XSSCon")
xsstools()
elif choice == "2":
uinput= input("Enter Website >> ")
os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput))
elif choice =="99":
xsstools()
else :
others()
def xanxss():
os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")
choice = input("[1]Install [2]Run [99]Back >> ")
if choice == "1":
os.system("git clone https://github.com/Ekultek/XanXSS.git ")
xsstools()
elif choice == "2":
os.system("cd XanXSS ;python xanxss.py -h")
print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ")
elif choice =="99":
xsstools()
else :
others()
def updatesys():
os.system("sudo apt update && sudo apt full-upgrade -y")
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
@ -1707,15 +1963,6 @@ if __name__ == "__main__":
menu()
else :
print("Sorry ...!!")
elif path.exists('/data'):
os.chdir("data/data/com.termux/files/home/")
if os.path.isdir('hackingtool'):
os.chdir("data/data/com.termux/files/home/hackingtool/")
menu()
else :
os.system("mkdir hackingtool")
os.chdir("data/data/com.termux/files/home/hackingtool/")
menu()
else :
print("Sorry Open New Issue..!!")
except KeyboardInterrupt: