You've already forked hackingtool
mirror of
https://github.com/Z4nzu/hackingtool.git
synced 2025-06-20 06:15:54 +02:00
Update hackingtool.py
This commit is contained in:
347
hackingtool.py
347
hackingtool.py
@ -29,7 +29,6 @@ from urllib.parse import urlparse
|
||||
from xml.dom import minidom
|
||||
from optparse import OptionParser
|
||||
from time import sleep
|
||||
from platform import system
|
||||
Logo="""\033[33m
|
||||
|
||||
▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
|
||||
@ -335,6 +334,7 @@ def passwd():
|
||||
[02]WordlistCreator
|
||||
[03]Goblin WordGenerator
|
||||
[04]Credential reuse attacks
|
||||
[05]Password list((1.4 Billion Clear Text Password))
|
||||
[99]Back To Main Menu
|
||||
""")
|
||||
passchoice = input("Z4nzu ==>> ")
|
||||
@ -350,6 +350,9 @@ def passwd():
|
||||
elif passchoice == "4" or passchoice == "04":
|
||||
clearScr()
|
||||
credentialattack()
|
||||
elif passchoice == "5" or passchoice == "05":
|
||||
clearScr()
|
||||
showme()
|
||||
elif passchoice == "99":
|
||||
clearScr()
|
||||
menu()
|
||||
@ -833,21 +836,29 @@ def forensic():
|
||||
clearScr()
|
||||
os.system("figlet -f standard Forensic Tools | lolcat ")
|
||||
print("""
|
||||
[1] Bulk_extractor
|
||||
[2] Disk Clone and ISO Image Aquire
|
||||
[3] AutoSpy
|
||||
[1] Autopsy
|
||||
[2] Wireshark
|
||||
[3] Bulk_extractor
|
||||
[4] Disk Clone and ISO Image Aquire
|
||||
[5] Toolsley
|
||||
[99]Back to Menu
|
||||
""")
|
||||
choice = input("Z4nzu ==>>")
|
||||
if choice == "1" :
|
||||
if choice == "3" :
|
||||
clearScr()
|
||||
bulkextractor()
|
||||
elif choice == "2":
|
||||
elif choice == "4":
|
||||
clearScr()
|
||||
guymager()
|
||||
elif choice == "3":
|
||||
elif choice == "1":
|
||||
clearScr()
|
||||
autopsy()
|
||||
elif choice == "2":
|
||||
clearScr()
|
||||
wireshark()
|
||||
elif choice == "5":
|
||||
clearScr()
|
||||
toolsley()
|
||||
elif choice == "99":
|
||||
menu()
|
||||
elif choice == "":
|
||||
@ -909,6 +920,32 @@ def autopsy():
|
||||
else :
|
||||
menu()
|
||||
|
||||
def wireshark():
|
||||
os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
|
||||
choice = input("[1]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo wireshark")
|
||||
elif choice == "99":
|
||||
forensic()
|
||||
elif choice == "":
|
||||
forensic()
|
||||
else :
|
||||
menu()
|
||||
|
||||
def toolsley():
|
||||
os.system("echo \" Toolsley got more than ten useful tools for investigation.\n\b File signature verifier\n\b File identifier \n\b Hash & Validate \n\b Binary inspector \n\bEncode text \n\b Data URI generator \n\b Password generator \" | boxes -d boy | lolcat")
|
||||
userchoice = input("[1]Open [99]Back >> ")
|
||||
if userchoice == "1":
|
||||
print("Trying to open WebBrowser ")
|
||||
time.sleep(3)
|
||||
webbrowser.open_new_tab('https://www.toolsley.com/')
|
||||
elif userchoice == "99":
|
||||
forensic()
|
||||
elif userchoice == "":
|
||||
forensic()
|
||||
else :
|
||||
menu()
|
||||
|
||||
def postexp():
|
||||
clearScr()
|
||||
os.system("figlet -f standard post explotations | lolcat")
|
||||
@ -1012,23 +1049,7 @@ def fastssh():
|
||||
routexp()
|
||||
else :
|
||||
menu()
|
||||
def Ddos():
|
||||
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
|
||||
print("""
|
||||
[1]SlowLoris
|
||||
[99]Back
|
||||
""")
|
||||
choice =input("Z4nzu >> ")
|
||||
if choice == "1":
|
||||
clearScr()
|
||||
slowloris()
|
||||
elif choice == "2":
|
||||
pass
|
||||
elif choice == "99":
|
||||
others()
|
||||
else :
|
||||
print("Invalid ...")
|
||||
menu()
|
||||
|
||||
def webAttack():
|
||||
clearScr()
|
||||
os.system("figlet 'Web Attack Tools' -f standard -c | lolcat")
|
||||
@ -1071,19 +1092,6 @@ def web2attack():
|
||||
else :
|
||||
menu()
|
||||
|
||||
def slowloris():
|
||||
os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
|
||||
choice = input("[1]install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo pip install slowloris")
|
||||
elif choice == "2":
|
||||
print(Logo)
|
||||
ts=input("Enter Target Site :-")
|
||||
os.system("slowloris %s"%ts)
|
||||
elif choice == "99":
|
||||
webAttack()
|
||||
else :
|
||||
menu()
|
||||
|
||||
def skipfish():
|
||||
userchoice = input("[1]Run [99]Back >> ")
|
||||
@ -1096,7 +1104,6 @@ def skipfish():
|
||||
menu()
|
||||
|
||||
def subdomain():
|
||||
|
||||
choice=input("[1]install [2]Run [99]BAck >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo pip install requests argparse dnspython")
|
||||
@ -1595,9 +1602,11 @@ def sqlmap():
|
||||
menu()
|
||||
|
||||
def others():
|
||||
print("""
|
||||
clearScr()
|
||||
print(Logo + """
|
||||
[1]Ddos Attack Tools
|
||||
[2]SMWYG-Show-Me-What-You-Got (1.4 Billion Clear Text Password)
|
||||
[2]XSS Attack Tools
|
||||
[3]HatCloud(Bypass CloudFlare for IP)
|
||||
[99]BAck
|
||||
""")
|
||||
choice = input("Z4nzu =>>")
|
||||
@ -1606,7 +1615,10 @@ def others():
|
||||
Ddos()
|
||||
elif choice == "2":
|
||||
clearScr()
|
||||
showme()
|
||||
xsstools()
|
||||
elif choice == "3":
|
||||
clearScr()
|
||||
hatcloud()
|
||||
elif choice == "99":
|
||||
menu()
|
||||
elif choice == "":
|
||||
@ -1631,6 +1643,250 @@ def showme():
|
||||
else :
|
||||
menu()
|
||||
|
||||
def hatcloud():
|
||||
os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git clone https://github.com/HatBashBR/HatCloud.git")
|
||||
others()
|
||||
elif choice == "2":
|
||||
tsite=input("Enter Site >>")
|
||||
os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite))
|
||||
elif choice =="99":
|
||||
others()
|
||||
else :
|
||||
others()
|
||||
|
||||
def Ddos():
|
||||
clearScr()
|
||||
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
|
||||
print("""
|
||||
[1]SlowLoris
|
||||
[2]aSYNcrone | Multifunction SYN Flood DDoS Weapon
|
||||
[3]UFOnet
|
||||
[4]GoldenEye
|
||||
[99]Back
|
||||
""")
|
||||
choice =input("Z4nzu >> ")
|
||||
if choice == "1":
|
||||
clearScr()
|
||||
slowloris()
|
||||
elif choice == "2":
|
||||
asyncrone()
|
||||
elif choice == "3":
|
||||
ufonet()
|
||||
elif choice == "4":
|
||||
goldeneye()
|
||||
elif choice == "99":
|
||||
others()
|
||||
else :
|
||||
print("Invalid ...")
|
||||
menu()
|
||||
|
||||
def slowloris():
|
||||
os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
|
||||
choice = input("[1]install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo pip install slowloris")
|
||||
Ddos()
|
||||
elif choice == "2":
|
||||
ts=input("Enter Target Site :-")
|
||||
os.system("slowloris %s"%ts)
|
||||
elif choice == "99":
|
||||
Ddos()
|
||||
else :
|
||||
menu()
|
||||
|
||||
def asyncrone():
|
||||
os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git clone https://github.com/fatih4842/aSYNcrone.git")
|
||||
os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread")
|
||||
Ddos()
|
||||
elif choice == "2":
|
||||
sport=input("Enter Source Port >> ")
|
||||
tip=input("Enter Target IP >> ")
|
||||
tport=input("Enter Target port >> ")
|
||||
os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport))
|
||||
elif choice == "99":
|
||||
Ddos()
|
||||
else :
|
||||
menu()
|
||||
|
||||
def ufonet():
|
||||
os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo git clone https://github.com/epsylon/ufonet.git")
|
||||
os.system("cd ufonet;sudo python setup.py install")
|
||||
Ddos()
|
||||
elif choice == "2":
|
||||
os.system("sudo ./ufonet --gui")
|
||||
elif choice == "99":
|
||||
Ddos()
|
||||
else :
|
||||
menu()
|
||||
|
||||
def goldeneye():
|
||||
os.system("echo \"More Info [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye")
|
||||
Ddos()
|
||||
elif choice == "2":
|
||||
os.system("cd GoldenEye ;sudo ./goldeneye.py")
|
||||
print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py <url> [OPTIONS] ")
|
||||
elif choice == "99":
|
||||
Ddos()
|
||||
else :
|
||||
menu()
|
||||
|
||||
|
||||
def xsstools():
|
||||
clearScr()
|
||||
os.system("figlet -f standard -c XSS Attack Tools | lolcat")
|
||||
print("""
|
||||
[1] DalFox(Finder of XSS)
|
||||
[2] XSS Payload Generator
|
||||
[3] Extended XSS Searcher and Finder
|
||||
[4] XSS-Freak
|
||||
[5] XSpear
|
||||
[6] XSSCon
|
||||
[7] XanXSS
|
||||
[99]BAck
|
||||
""")
|
||||
choice = input("Z4nzu >> ")
|
||||
if choice == "1":
|
||||
dalfox()
|
||||
elif choice =="2":
|
||||
xsspayload()
|
||||
elif choice == "99":
|
||||
others()
|
||||
elif choice == "3":
|
||||
xssfinder()
|
||||
elif choice == "4":
|
||||
xssfreak()
|
||||
elif choice == "5":
|
||||
xspear()
|
||||
elif choice == "6":
|
||||
xsscon()
|
||||
elif choice == "7":
|
||||
xanxss()
|
||||
elif choice == "":
|
||||
others()
|
||||
else :
|
||||
others()
|
||||
|
||||
def dalfox():
|
||||
os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("sudo apt-get install golang")
|
||||
os.system("sudo git clone https://github.com/hahwul/dalfox ")
|
||||
os.system("cd dalfox;go install")
|
||||
xsstools()
|
||||
elif choice == "2":
|
||||
os.system("~/go/bin/dalfox")
|
||||
print("\033[96m You Need To Run manually by using [!]~/go/bin/dalfox [options] ")
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
def xsspayload():
|
||||
os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git clone https://github.com/capture0x/XSS-LOADER.git")
|
||||
os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt")
|
||||
xsstools()
|
||||
elif choice == "2":
|
||||
os.system("cd XSS-LOADER;sudo python3 payloader.py")
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
def xssfinder():
|
||||
os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git glone https://github.com/Damian89/extended-xss-search.git")
|
||||
print("""\033[96m
|
||||
Follow This Steps After Installation :-
|
||||
\033[31m [*]Go To extended-xss-search directory,
|
||||
and Rename the example.app-settings.conf to app-settings.conf
|
||||
""")
|
||||
elif choice == "2":
|
||||
print("""\033[96m
|
||||
You have To Add Links to scan
|
||||
\033[31m[!]Go to extended-xss-search
|
||||
[*]config/urls-to-test.txt
|
||||
[!]python3 extended-xss-search.py
|
||||
""")
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
def xssfreak():
|
||||
os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git")
|
||||
os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt")
|
||||
xsstools()
|
||||
elif choice == "2":
|
||||
os.system("cd XSS-Freak;sudo python3 XSS-Freak.py")
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
def xspear():
|
||||
os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("gem install XSpear")
|
||||
xsstools()
|
||||
elif choice == "2":
|
||||
os.system("XSpear -h")
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
def xsscon():
|
||||
os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git clone https://github.com/menkrep1337/XSSCon")
|
||||
os.system("sudo chmod 755 -R XSSCon")
|
||||
xsstools()
|
||||
elif choice == "2":
|
||||
uinput= input("Enter Website >> ")
|
||||
os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput))
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
def xanxss():
|
||||
os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")
|
||||
choice = input("[1]Install [2]Run [99]Back >> ")
|
||||
if choice == "1":
|
||||
os.system("git clone https://github.com/Ekultek/XanXSS.git ")
|
||||
xsstools()
|
||||
elif choice == "2":
|
||||
os.system("cd XanXSS ;python xanxss.py -h")
|
||||
print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ")
|
||||
elif choice =="99":
|
||||
xsstools()
|
||||
else :
|
||||
others()
|
||||
|
||||
|
||||
def updatesys():
|
||||
os.system("sudo apt update && sudo apt full-upgrade -y")
|
||||
os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
|
||||
@ -1707,15 +1963,6 @@ if __name__ == "__main__":
|
||||
menu()
|
||||
else :
|
||||
print("Sorry ...!!")
|
||||
elif path.exists('/data'):
|
||||
os.chdir("data/data/com.termux/files/home/")
|
||||
if os.path.isdir('hackingtool'):
|
||||
os.chdir("data/data/com.termux/files/home/hackingtool/")
|
||||
menu()
|
||||
else :
|
||||
os.system("mkdir hackingtool")
|
||||
os.chdir("data/data/com.termux/files/home/hackingtool/")
|
||||
menu()
|
||||
else :
|
||||
print("Sorry Open New Issue..!!")
|
||||
except KeyboardInterrupt:
|
||||
|
Reference in New Issue
Block a user