diff --git a/tools/exploit_frameworks.py b/tools/exploit_frameworks.py index da228b0..9b78e1e 100644 --- a/tools/exploit_frameworks.py +++ b/tools/exploit_frameworks.py @@ -35,7 +35,10 @@ class Commix(HackingTool): "errors or vulnerabilities related to command injection " \ "attacks.\n Usage: python commix.py [option(s)]" INSTALL_COMMANDS = [ - "git clone https://github.com/commixproject/commix.git commix"] + "git clone https://github.com/commixproject/commix.git commix", + "cd commix;sudo python setup.py install" + ] + RUN_COMMANDS = ["sudo python commix.py --wizard"] PROJECT_URL = "https://github.com/commixproject/commix" def __init__(self): diff --git a/tools/forensic_tools.py b/tools/forensic_tools.py index d2b2bc0..57e9d92 100644 --- a/tools/forensic_tools.py +++ b/tools/forensic_tools.py @@ -30,7 +30,7 @@ class Wireshark(HackingTool): class BulkExtractor(HackingTool): TITLE = "Bulk extractor" - DESCRIPTION = "" + DESCRIPTION = "Extract useful information without parsing the file system" PROJECT_URL = "https://github.com/simsong/bulk_extractor" def __init__(self): @@ -49,9 +49,9 @@ class BulkExtractor(HackingTool): "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor") def cli_mode(self): - os.system("sudo apt-get install bulk_extractor") + os.system("sudo apt install bulk-extractor") print("bulk_extractor and options") - os.system("bulk_extractor") + os.system("bulk_extractor -h") os.system( 'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat') diff --git a/tools/information_gathering_tools.py b/tools/information_gathering_tools.py index 269a229..8d7ae53 100644 --- a/tools/information_gathering_tools.py +++ b/tools/information_gathering_tools.py @@ -30,11 +30,11 @@ class Dracnmap(HackingTool): "sudo git clone https://github.com/Screetsec/Dracnmap.git", "cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh" ] - RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"] + RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"] PROJECT_URL = "https://github.com/Screetsec/Dracnmap" - def __init__(self): - super(Dracnmap, self).__init__(runnable = False) +# def __init__(self): +# super(Dracnmap, self).__init__(runnable = False) class PortScan(HackingTool): @@ -93,10 +93,11 @@ class ReconSpider(HackingTool): "sudo git clone https://github.com/bhavsec/reconspider.git", "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install" ] + RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"] PROJECT_URL = "https://github.com/bhavsec/reconspider" - def __init__(self): - super(ReconSpider, self).__init__(runnable = False) +# def __init__(self): +# super(ReconSpider, self).__init__(runnable = False) class IsItDown(HackingTool): @@ -117,9 +118,9 @@ class Infoga(HackingTool): "(ip, hostname, country,...) from different public source" INSTALL_COMMANDS = [ "git clone https://github.com/m4ll0k/Infoga.git", - "cd infoga;sudo python setup.py install" + "cd Infoga;sudo python3 setup.py install" ] - RUN_COMMANDS = ["cd infoga;python infoga.py"] + RUN_COMMANDS = ["cd Infoga;python3 infoga.py"] PROJECT_URL = "https://github.com/m4ll0k/Infoga" @@ -142,7 +143,7 @@ class Striker(HackingTool): def run(self): site = input("Enter Site Name (example.com) >> ") - os.system("cd Striker;") + os.chdir("Striker") subprocess.run(["sudo", "python3", "striker.py", site]) @@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool): def run(self): ip = input("Enter Ip >> ") - os.system("cd rang3r;") + os.chdir("rang3r") subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip]) @@ -194,10 +195,11 @@ class Breacher(HackingTool): DESCRIPTION = "An advanced multithreaded admin panel finder written in python." INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"] PROJECT_URL = "https://github.com/s0md3v/Breacher" - - def __init__(self): - super(Breacher, self).__init__(runnable = False) - + + def run(self): + domain = input("Enter domain (example.com) >> ") + os.chdir("Breacher") + subprocess.run(["python3", "breacher.py", "-u", domain]) class InformationGatheringTools(HackingToolsCollection): TITLE = "Information gathering tools" diff --git a/tools/other_tools.py b/tools/other_tools.py index b7c8910..0b8cbd5 100644 --- a/tools/other_tools.py +++ b/tools/other_tools.py @@ -25,7 +25,7 @@ class HatCloud(HackingTool): def run(self): site = input("Enter Site >> ") - os.system("cd HatCloud;") + os.chdir("HatCloud") subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site]) diff --git a/tools/others/android_attack.py b/tools/others/android_attack.py index 3c06381..5b56a2a 100644 --- a/tools/others/android_attack.py +++ b/tools/others/android_attack.py @@ -42,7 +42,7 @@ class Droidcam(HackingTool): "sudo git clone https://github.com/kinghacker0/WishFish.git;" "sudo apt install php wget openssh-client" ] - RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"] + RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"] PROJECT_URL = "https://github.com/kinghacker0/WishFish" @@ -52,7 +52,7 @@ class EvilApp(HackingTool): "hijack authenticated sessions in cookies." INSTALL_COMMANDS = [ "sudo git clone https://github.com/crypticterminal/EvilApp.git"] - RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"] + RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"] PROJECT_URL = "https://github.com/crypticterminal/EvilApp" diff --git a/tools/others/email_verifier.py b/tools/others/email_verifier.py index d25fc59..5969bd0 100644 --- a/tools/others/email_verifier.py +++ b/tools/others/email_verifier.py @@ -7,13 +7,14 @@ class KnockMail(HackingTool): TITLE = "Knockmail" DESCRIPTION = "KnockMail Tool Verify If Email Exists" INSTALL_COMMANDS = [ - "git clone https://github.com/4w4k3/KnockMail.git", - "cd KnockMail;sudo pip install -r requeriments.txt" + "git clone https://github.com/heywoodlh/KnockMail.git", + "cd KnockMail;sudo pip3 install -r requirements.txt" ] - RUN_COMMANDS = ["cd KnockMail;python knock.py"] - PROJECT_URL = "https://github.com/4w4k3/KnockMail" + RUN_COMMANDS = ["cd KnockMail;python3 knockmail.py"] + PROJECT_URL = "https://github.com/heywoodlh/KnockMail" class EmailVerifyTools(HackingToolsCollection): TITLE = "Email Verify tools" TOOLS = [KnockMail()] + diff --git a/tools/others/socialmedia.py b/tools/others/socialmedia.py index c4be439..27d6fce 100644 --- a/tools/others/socialmedia.py +++ b/tools/others/socialmedia.py @@ -11,14 +11,14 @@ class InstaBrute(HackingTool): DESCRIPTION = "Brute force attack against Instagram" INSTALL_COMMANDS = [ "sudo git clone https://github.com/chinoogawa/instaBrute.git", - "cd instaBrute;sudo pip install -r requirements.txt" + "cd instaBrute;sudo pip2.7 install -r requirements.txt" ] PROJECT_URL = "https://github.com/chinoogawa/instaBrute" def run(self): name = input("Enter Username >> ") wordlist = input("Enter wordword list >> ") - os.system("cd instaBrute;") + os.chdir("instaBrute") subprocess.run( ["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d", f"{wordlist}"]) @@ -48,7 +48,7 @@ class Faceshell(HackingTool): def run(self): name = input("Enter Username >> ") wordlist = input("Enter Wordlist >> ") - os.system("cd Brute_Force;") + os.chdir("Brute_Force") subprocess.run( ["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"]) diff --git a/tools/others/socialmedia_finder.py b/tools/others/socialmedia_finder.py index a8f029e..89fb489 100644 --- a/tools/others/socialmedia_finder.py +++ b/tools/others/socialmedia_finder.py @@ -60,7 +60,7 @@ class Sherlock(HackingTool): def run(self): name = input("Enter Username >> ") - os.system("cd sherlock;") + os.chdir('sherlock') subprocess.run(["sudo", "python3", "sherlock", f"{name}"]) diff --git a/tools/sql_tools.py b/tools/sql_tools.py index fb13ff4..666ff9b 100644 --- a/tools/sql_tools.py +++ b/tools/sql_tools.py @@ -9,16 +9,13 @@ class Sqlmap(HackingTool): "automates the process of \n" \ "detecting and exploiting SQL injection flaws and taking " \ "over of database servers \n " \ - "[!] python sqlmap.py -u [] --batch --banner \n " \ + "[!] python3 sqlmap.py -u [] --batch --banner \n " \ "More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage" INSTALL_COMMANDS = [ "sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"] + RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"] PROJECT_URL = "https://github.com/sqlmapproject/sqlmap" - def __init__(self): - super(Sqlmap, self).__init__(runnable = False) - - class NoSqlMap(HackingTool): TITLE = "NoSqlMap" DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \ diff --git a/tools/webattack.py b/tools/webattack.py index 4ff2fa1..d4915c7 100644 --- a/tools/webattack.py +++ b/tools/webattack.py @@ -33,14 +33,14 @@ class SubDomainFinder(HackingTool): DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \ "subdomains of websites using OSINT \n " \ "Usage:\n\t" \ - "[1] python sublist3r.py -d example.com \n" \ - "[2] python sublist3r.py -d example.com -p 80,443" + "[1] python3 sublist3r.py -d example.com \n" \ + "[2] python3 sublist3r.py -d example.com -p 80,443" INSTALL_COMMANDS = [ - "sudo pip install requests argparse dnspython", + "sudo pip3 install requests argparse dnspython", "sudo git clone https://github.com/aboul3la/Sublist3r.git", - "cd Sublist3r && sudo pip install -r requirements.txt" + "cd Sublist3r && sudo pip3 install -r requirements.txt" ] - RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"] + RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"] PROJECT_URL = "https://github.com/aboul3la/Sublist3r" @@ -59,9 +59,9 @@ class Blazy(HackingTool): DESCRIPTION = "Blazy is a modern login page bruteforcer" INSTALL_COMMANDS = [ "sudo git clone https://github.com/UltimateHackers/Blazy.git", - "cd Blazy && sudo pip install -r requirements.txt" + "cd Blazy && sudo pip2.7 install -r requirements.txt" ] - RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"] + RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"] PROJECT_URL = "https://github.com/UltimateHackers/Blazy" @@ -81,7 +81,6 @@ class SubDomainTakeOver(HackingTool): def __init__(self): super(SubDomainTakeOver, self).__init__(runnable = False) - class Dirb(HackingTool): TITLE = "Dirb" DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \ @@ -90,7 +89,7 @@ class Dirb(HackingTool): "attack against \n a web server and analizing the response." INSTALL_COMMANDS = [ "sudo git clone https://gitlab.com/kalilinux/packages/dirb.git", - "cd dirb;sudo ./configure;make" + "cd dirb;sudo bash configure;make" ] PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb" diff --git a/tools/wireless_attack_tools.py b/tools/wireless_attack_tools.py index 6dfa1b8..fc8022f 100644 --- a/tools/wireless_attack_tools.py +++ b/tools/wireless_attack_tools.py @@ -14,9 +14,9 @@ class WIFIPumpkin(HackingTool): INSTALL_COMMANDS = [ "sudo apt install libssl-dev libffi-dev build-essential", "sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git", - "chmod -R 755 wifipumpkin3 && cd wifipumpkin3", + "chmod -R 755 wifipumpkin3", "sudo apt install python3-pyqt5", - "sudo python3 setup.py install" + "cd wifipumpkin3;sudo python3 setup.py install" ] RUN_COMMANDS = ["sudo wifipumpkin3"] PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3" @@ -53,10 +53,10 @@ class BluePot(HackingTool): "You must install/libbluetooth-dev on " \ "Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE" INSTALL_COMMANDS = [ - "wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz " - "&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar" + "sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz" + "sudo tar xfz bluepot-0.2.tar.gz;sudo rm bluepot-0.2.tar.gz" ] - RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"] + RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"] PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot" @@ -91,10 +91,10 @@ class Wifiphisher(HackingTool): class Wifite(HackingTool): TITLE = "Wifite" + DESCRIPTION = "Wifite is an automated wireless attack tool" INSTALL_COMMANDS = [ "sudo git clone https://github.com/derv82/wifite2.git", "cd wifite2 && sudo python3 setup.py install" - ";sudo pip3 install -r requirements.txt" ] RUN_COMMANDS = ["cd wifite2; sudo wifite"] PROJECT_URL = "https://github.com/derv82/wifite2" diff --git a/tools/wordlist_generator.py b/tools/wordlist_generator.py index 6ea3760..3e1be2d 100644 --- a/tools/wordlist_generator.py +++ b/tools/wordlist_generator.py @@ -8,10 +8,8 @@ class Cupp(HackingTool): DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \ "and you can choose Length, Lowercase, Capital, Numbers and Special Chars" INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"] - PROJECT_URL = "https://github.com/Mebus/cupp.git" - - def __init__(self): - super(Cupp, self).__init__(runnable = False) + RUN_COMMANDS = ["python3 cupp.py -i"] + PROJECT_URL = "https://github.com/Mebus/cupp" class WlCreator(HackingTool):