You've already forked hackingtool
mirror of
https://github.com/Z4nzu/hackingtool.git
synced 2025-06-20 06:15:54 +02:00
Merge pull request #123 from Greatest125/master
minor fixes (typos, installation instructions update, etc)
This commit is contained in:
@ -35,7 +35,10 @@ class Commix(HackingTool):
|
|||||||
"errors or vulnerabilities related to command injection " \
|
"errors or vulnerabilities related to command injection " \
|
||||||
"attacks.\n Usage: python commix.py [option(s)]"
|
"attacks.\n Usage: python commix.py [option(s)]"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"git clone https://github.com/commixproject/commix.git commix"]
|
"git clone https://github.com/commixproject/commix.git commix",
|
||||||
|
"cd commix;sudo python setup.py install"
|
||||||
|
]
|
||||||
|
RUN_COMMANDS = ["sudo python commix.py --wizard"]
|
||||||
PROJECT_URL = "https://github.com/commixproject/commix"
|
PROJECT_URL = "https://github.com/commixproject/commix"
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
|
@ -30,7 +30,7 @@ class Wireshark(HackingTool):
|
|||||||
|
|
||||||
class BulkExtractor(HackingTool):
|
class BulkExtractor(HackingTool):
|
||||||
TITLE = "Bulk extractor"
|
TITLE = "Bulk extractor"
|
||||||
DESCRIPTION = ""
|
DESCRIPTION = "Extract useful information without parsing the file system"
|
||||||
PROJECT_URL = "https://github.com/simsong/bulk_extractor"
|
PROJECT_URL = "https://github.com/simsong/bulk_extractor"
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
@ -49,9 +49,9 @@ class BulkExtractor(HackingTool):
|
|||||||
"Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
|
"Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
|
||||||
|
|
||||||
def cli_mode(self):
|
def cli_mode(self):
|
||||||
os.system("sudo apt-get install bulk_extractor")
|
os.system("sudo apt install bulk-extractor")
|
||||||
print("bulk_extractor and options")
|
print("bulk_extractor and options")
|
||||||
os.system("bulk_extractor")
|
os.system("bulk_extractor -h")
|
||||||
os.system(
|
os.system(
|
||||||
'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')
|
'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')
|
||||||
|
|
||||||
|
@ -30,11 +30,11 @@ class Dracnmap(HackingTool):
|
|||||||
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
|
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
|
||||||
"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
|
"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"]
|
RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
|
||||||
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
|
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
|
||||||
|
|
||||||
def __init__(self):
|
# def __init__(self):
|
||||||
super(Dracnmap, self).__init__(runnable = False)
|
# super(Dracnmap, self).__init__(runnable = False)
|
||||||
|
|
||||||
|
|
||||||
class PortScan(HackingTool):
|
class PortScan(HackingTool):
|
||||||
@ -93,10 +93,11 @@ class ReconSpider(HackingTool):
|
|||||||
"sudo git clone https://github.com/bhavsec/reconspider.git",
|
"sudo git clone https://github.com/bhavsec/reconspider.git",
|
||||||
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
|
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
|
||||||
]
|
]
|
||||||
|
RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
|
||||||
PROJECT_URL = "https://github.com/bhavsec/reconspider"
|
PROJECT_URL = "https://github.com/bhavsec/reconspider"
|
||||||
|
|
||||||
def __init__(self):
|
# def __init__(self):
|
||||||
super(ReconSpider, self).__init__(runnable = False)
|
# super(ReconSpider, self).__init__(runnable = False)
|
||||||
|
|
||||||
|
|
||||||
class IsItDown(HackingTool):
|
class IsItDown(HackingTool):
|
||||||
@ -117,9 +118,9 @@ class Infoga(HackingTool):
|
|||||||
"(ip, hostname, country,...) from different public source"
|
"(ip, hostname, country,...) from different public source"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"git clone https://github.com/m4ll0k/Infoga.git",
|
"git clone https://github.com/m4ll0k/Infoga.git",
|
||||||
"cd infoga;sudo python setup.py install"
|
"cd Infoga;sudo python3 setup.py install"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd infoga;python infoga.py"]
|
RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
|
||||||
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
|
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
|
||||||
|
|
||||||
|
|
||||||
@ -142,7 +143,7 @@ class Striker(HackingTool):
|
|||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
site = input("Enter Site Name (example.com) >> ")
|
site = input("Enter Site Name (example.com) >> ")
|
||||||
os.system("cd Striker;")
|
os.chdir("Striker")
|
||||||
subprocess.run(["sudo", "python3", "striker.py", site])
|
subprocess.run(["sudo", "python3", "striker.py", site])
|
||||||
|
|
||||||
|
|
||||||
@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool):
|
|||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
ip = input("Enter Ip >> ")
|
ip = input("Enter Ip >> ")
|
||||||
os.system("cd rang3r;")
|
os.chdir("rang3r")
|
||||||
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
|
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
|
||||||
|
|
||||||
|
|
||||||
@ -195,9 +196,10 @@ class Breacher(HackingTool):
|
|||||||
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
|
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
|
||||||
PROJECT_URL = "https://github.com/s0md3v/Breacher"
|
PROJECT_URL = "https://github.com/s0md3v/Breacher"
|
||||||
|
|
||||||
def __init__(self):
|
def run(self):
|
||||||
super(Breacher, self).__init__(runnable = False)
|
domain = input("Enter domain (example.com) >> ")
|
||||||
|
os.chdir("Breacher")
|
||||||
|
subprocess.run(["python3", "breacher.py", "-u", domain])
|
||||||
|
|
||||||
class InformationGatheringTools(HackingToolsCollection):
|
class InformationGatheringTools(HackingToolsCollection):
|
||||||
TITLE = "Information gathering tools"
|
TITLE = "Information gathering tools"
|
||||||
|
@ -25,7 +25,7 @@ class HatCloud(HackingTool):
|
|||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
site = input("Enter Site >> ")
|
site = input("Enter Site >> ")
|
||||||
os.system("cd HatCloud;")
|
os.chdir("HatCloud")
|
||||||
subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])
|
subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])
|
||||||
|
|
||||||
|
|
||||||
|
@ -42,7 +42,7 @@ class Droidcam(HackingTool):
|
|||||||
"sudo git clone https://github.com/kinghacker0/WishFish.git;"
|
"sudo git clone https://github.com/kinghacker0/WishFish.git;"
|
||||||
"sudo apt install php wget openssh-client"
|
"sudo apt install php wget openssh-client"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"]
|
RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"]
|
||||||
PROJECT_URL = "https://github.com/kinghacker0/WishFish"
|
PROJECT_URL = "https://github.com/kinghacker0/WishFish"
|
||||||
|
|
||||||
|
|
||||||
@ -52,7 +52,7 @@ class EvilApp(HackingTool):
|
|||||||
"hijack authenticated sessions in cookies."
|
"hijack authenticated sessions in cookies."
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo git clone https://github.com/crypticterminal/EvilApp.git"]
|
"sudo git clone https://github.com/crypticterminal/EvilApp.git"]
|
||||||
RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"]
|
RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"]
|
||||||
PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
|
PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
|
||||||
|
|
||||||
|
|
||||||
|
@ -7,13 +7,14 @@ class KnockMail(HackingTool):
|
|||||||
TITLE = "Knockmail"
|
TITLE = "Knockmail"
|
||||||
DESCRIPTION = "KnockMail Tool Verify If Email Exists"
|
DESCRIPTION = "KnockMail Tool Verify If Email Exists"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"git clone https://github.com/4w4k3/KnockMail.git",
|
"git clone https://github.com/heywoodlh/KnockMail.git",
|
||||||
"cd KnockMail;sudo pip install -r requeriments.txt"
|
"cd KnockMail;sudo pip3 install -r requirements.txt"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd KnockMail;python knock.py"]
|
RUN_COMMANDS = ["cd KnockMail;python3 knockmail.py"]
|
||||||
PROJECT_URL = "https://github.com/4w4k3/KnockMail"
|
PROJECT_URL = "https://github.com/heywoodlh/KnockMail"
|
||||||
|
|
||||||
|
|
||||||
class EmailVerifyTools(HackingToolsCollection):
|
class EmailVerifyTools(HackingToolsCollection):
|
||||||
TITLE = "Email Verify tools"
|
TITLE = "Email Verify tools"
|
||||||
TOOLS = [KnockMail()]
|
TOOLS = [KnockMail()]
|
||||||
|
|
||||||
|
@ -11,14 +11,14 @@ class InstaBrute(HackingTool):
|
|||||||
DESCRIPTION = "Brute force attack against Instagram"
|
DESCRIPTION = "Brute force attack against Instagram"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo git clone https://github.com/chinoogawa/instaBrute.git",
|
"sudo git clone https://github.com/chinoogawa/instaBrute.git",
|
||||||
"cd instaBrute;sudo pip install -r requirements.txt"
|
"cd instaBrute;sudo pip2.7 install -r requirements.txt"
|
||||||
]
|
]
|
||||||
PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
|
PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
|
||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
name = input("Enter Username >> ")
|
name = input("Enter Username >> ")
|
||||||
wordlist = input("Enter wordword list >> ")
|
wordlist = input("Enter wordword list >> ")
|
||||||
os.system("cd instaBrute;")
|
os.chdir("instaBrute")
|
||||||
subprocess.run(
|
subprocess.run(
|
||||||
["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
|
["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
|
||||||
f"{wordlist}"])
|
f"{wordlist}"])
|
||||||
@ -48,7 +48,7 @@ class Faceshell(HackingTool):
|
|||||||
def run(self):
|
def run(self):
|
||||||
name = input("Enter Username >> ")
|
name = input("Enter Username >> ")
|
||||||
wordlist = input("Enter Wordlist >> ")
|
wordlist = input("Enter Wordlist >> ")
|
||||||
os.system("cd Brute_Force;")
|
os.chdir("Brute_Force")
|
||||||
subprocess.run(
|
subprocess.run(
|
||||||
["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])
|
["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ class Sherlock(HackingTool):
|
|||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
name = input("Enter Username >> ")
|
name = input("Enter Username >> ")
|
||||||
os.system("cd sherlock;")
|
os.chdir('sherlock')
|
||||||
subprocess.run(["sudo", "python3", "sherlock", f"{name}"])
|
subprocess.run(["sudo", "python3", "sherlock", f"{name}"])
|
||||||
|
|
||||||
|
|
||||||
|
@ -9,16 +9,13 @@ class Sqlmap(HackingTool):
|
|||||||
"automates the process of \n" \
|
"automates the process of \n" \
|
||||||
"detecting and exploiting SQL injection flaws and taking " \
|
"detecting and exploiting SQL injection flaws and taking " \
|
||||||
"over of database servers \n " \
|
"over of database servers \n " \
|
||||||
"[!] python sqlmap.py -u [<http://example.com>] --batch --banner \n " \
|
"[!] python3 sqlmap.py -u [<http://example.com>] --batch --banner \n " \
|
||||||
"More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
|
"More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
|
"sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
|
||||||
|
RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"]
|
||||||
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
|
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
|
||||||
|
|
||||||
def __init__(self):
|
|
||||||
super(Sqlmap, self).__init__(runnable = False)
|
|
||||||
|
|
||||||
|
|
||||||
class NoSqlMap(HackingTool):
|
class NoSqlMap(HackingTool):
|
||||||
TITLE = "NoSqlMap"
|
TITLE = "NoSqlMap"
|
||||||
DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \
|
DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \
|
||||||
|
@ -33,14 +33,14 @@ class SubDomainFinder(HackingTool):
|
|||||||
DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
|
DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
|
||||||
"subdomains of websites using OSINT \n " \
|
"subdomains of websites using OSINT \n " \
|
||||||
"Usage:\n\t" \
|
"Usage:\n\t" \
|
||||||
"[1] python sublist3r.py -d example.com \n" \
|
"[1] python3 sublist3r.py -d example.com \n" \
|
||||||
"[2] python sublist3r.py -d example.com -p 80,443"
|
"[2] python3 sublist3r.py -d example.com -p 80,443"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo pip install requests argparse dnspython",
|
"sudo pip3 install requests argparse dnspython",
|
||||||
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
|
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
|
||||||
"cd Sublist3r && sudo pip install -r requirements.txt"
|
"cd Sublist3r && sudo pip3 install -r requirements.txt"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"]
|
RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"]
|
||||||
PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
|
PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
|
||||||
|
|
||||||
|
|
||||||
@ -59,9 +59,9 @@ class Blazy(HackingTool):
|
|||||||
DESCRIPTION = "Blazy is a modern login page bruteforcer"
|
DESCRIPTION = "Blazy is a modern login page bruteforcer"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
|
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
|
||||||
"cd Blazy && sudo pip install -r requirements.txt"
|
"cd Blazy && sudo pip2.7 install -r requirements.txt"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"]
|
RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"]
|
||||||
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
|
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
|
||||||
|
|
||||||
|
|
||||||
@ -81,7 +81,6 @@ class SubDomainTakeOver(HackingTool):
|
|||||||
def __init__(self):
|
def __init__(self):
|
||||||
super(SubDomainTakeOver, self).__init__(runnable = False)
|
super(SubDomainTakeOver, self).__init__(runnable = False)
|
||||||
|
|
||||||
|
|
||||||
class Dirb(HackingTool):
|
class Dirb(HackingTool):
|
||||||
TITLE = "Dirb"
|
TITLE = "Dirb"
|
||||||
DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
|
DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
|
||||||
@ -90,7 +89,7 @@ class Dirb(HackingTool):
|
|||||||
"attack against \n a web server and analizing the response."
|
"attack against \n a web server and analizing the response."
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
|
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
|
||||||
"cd dirb;sudo ./configure;make"
|
"cd dirb;sudo bash configure;make"
|
||||||
]
|
]
|
||||||
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
|
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
|
||||||
|
|
||||||
|
@ -14,9 +14,9 @@ class WIFIPumpkin(HackingTool):
|
|||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo apt install libssl-dev libffi-dev build-essential",
|
"sudo apt install libssl-dev libffi-dev build-essential",
|
||||||
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
|
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
|
||||||
"chmod -R 755 wifipumpkin3 && cd wifipumpkin3",
|
"chmod -R 755 wifipumpkin3",
|
||||||
"sudo apt install python3-pyqt5",
|
"sudo apt install python3-pyqt5",
|
||||||
"sudo python3 setup.py install"
|
"cd wifipumpkin3;sudo python3 setup.py install"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["sudo wifipumpkin3"]
|
RUN_COMMANDS = ["sudo wifipumpkin3"]
|
||||||
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
|
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
|
||||||
@ -53,10 +53,10 @@ class BluePot(HackingTool):
|
|||||||
"You must install/libbluetooth-dev on " \
|
"You must install/libbluetooth-dev on " \
|
||||||
"Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
|
"Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz "
|
"sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz"
|
||||||
"&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar"
|
"sudo tar xfz bluepot-0.2.tar.gz;sudo rm bluepot-0.2.tar.gz"
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"]
|
RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
|
||||||
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
|
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
|
||||||
|
|
||||||
|
|
||||||
@ -91,10 +91,10 @@ class Wifiphisher(HackingTool):
|
|||||||
|
|
||||||
class Wifite(HackingTool):
|
class Wifite(HackingTool):
|
||||||
TITLE = "Wifite"
|
TITLE = "Wifite"
|
||||||
|
DESCRIPTION = "Wifite is an automated wireless attack tool"
|
||||||
INSTALL_COMMANDS = [
|
INSTALL_COMMANDS = [
|
||||||
"sudo git clone https://github.com/derv82/wifite2.git",
|
"sudo git clone https://github.com/derv82/wifite2.git",
|
||||||
"cd wifite2 && sudo python3 setup.py install"
|
"cd wifite2 && sudo python3 setup.py install"
|
||||||
";sudo pip3 install -r requirements.txt"
|
|
||||||
]
|
]
|
||||||
RUN_COMMANDS = ["cd wifite2; sudo wifite"]
|
RUN_COMMANDS = ["cd wifite2; sudo wifite"]
|
||||||
PROJECT_URL = "https://github.com/derv82/wifite2"
|
PROJECT_URL = "https://github.com/derv82/wifite2"
|
||||||
|
@ -8,10 +8,8 @@ class Cupp(HackingTool):
|
|||||||
DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
|
DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
|
||||||
"and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
|
"and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
|
||||||
INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
|
INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
|
||||||
PROJECT_URL = "https://github.com/Mebus/cupp.git"
|
RUN_COMMANDS = ["python3 cupp.py -i"]
|
||||||
|
PROJECT_URL = "https://github.com/Mebus/cupp"
|
||||||
def __init__(self):
|
|
||||||
super(Cupp, self).__init__(runnable = False)
|
|
||||||
|
|
||||||
|
|
||||||
class WlCreator(HackingTool):
|
class WlCreator(HackingTool):
|
||||||
|
Reference in New Issue
Block a user