You've already forked hackingtool
mirror of
https://github.com/Z4nzu/hackingtool.git
synced 2025-06-20 06:15:54 +02:00
Refactored the whole project
List of changes + Handling information about a tool has been improved a lot by providing a `HackingTool` class, which takes care of showing the options, running the selected option, executing the required commands + This class is designed with flexibililty and simplicity in mind, so adding a new tool is a lot easier, mention TITLE, DESCRIPTION, list of INSTALL_COMMANDS, RUN_COMMANDS and PROJECT_URL and there you go... + grouping all the `HackingTool`s is also made super simpler by providing a `HackingToolsCollection` class which groups the tools into their respective categories. Just add the instances of `HackingTool` classes to the TOOLS property of the `HackingToolsCollection`. + Refactored all the tools into separate files based on their categories. + Added a READM_template.md and generate_readme.py script to automatically generate Table of contents and the list of tools available automatically. + Now each tool in the README.md points to its project url if provided. This makes it easier to visit the project from the readme.
This commit is contained in:
219
tools/information_gathering_tools.py
Normal file
219
tools/information_gathering_tools.py
Normal file
@ -0,0 +1,219 @@
|
||||
# coding=utf-8
|
||||
import os
|
||||
import socket
|
||||
import subprocess
|
||||
import webbrowser
|
||||
|
||||
from core import HackingTool
|
||||
from core import HackingToolsCollection
|
||||
from core import clear_screen
|
||||
|
||||
|
||||
class NMAP(HackingTool):
|
||||
TITLE = "Network Map (nmap)"
|
||||
DESCRIPTION = "Free and open source utility for network discovery and security auditing"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/nmap/nmap.git",
|
||||
"sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/nmap/nmap"
|
||||
|
||||
def __init__(self):
|
||||
super(NMAP, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class Dracnmap(HackingTool):
|
||||
TITLE = "Dracnmap"
|
||||
DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
|
||||
"exploit the network and gathering information with nmap help."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
|
||||
"cd Dracnmap && chmod +x Dracnmap.sh"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
|
||||
|
||||
def __init__(self):
|
||||
super(Dracnmap, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class PortScan(HackingTool):
|
||||
TITLE = "Port scanning"
|
||||
|
||||
def __init__(self):
|
||||
super(PortScan, self).__init__(installable = False)
|
||||
|
||||
def run(self):
|
||||
clear_screen()
|
||||
target = input('Select a Target IP: ')
|
||||
subprocess.run(["sudo", "nmap", "-O", "-Pn", target])
|
||||
|
||||
|
||||
class Host2IP(HackingTool):
|
||||
TITLE = "Host to IP "
|
||||
|
||||
def __init__(self):
|
||||
super(Host2IP, self).__init__(installable = False)
|
||||
|
||||
def run(self):
|
||||
clear_screen()
|
||||
host = input("Enter host name (e.g. www.google.com):- ")
|
||||
ips = socket.gethostbyname(host)
|
||||
print(ips)
|
||||
|
||||
|
||||
class XeroSploit(HackingTool):
|
||||
TITLE = "Xerosploit"
|
||||
DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \
|
||||
"man-in-the-middle attacks for testing purposes"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/LionSec/xerosploit.git",
|
||||
"cd xerosploit && sudo python install.py"
|
||||
]
|
||||
RUN_COMMANDS = ["sudo xerosploit"]
|
||||
PROJECT_URL = "https://github.com/LionSec/xerosploit"
|
||||
|
||||
|
||||
class RedHawk(HackingTool):
|
||||
TITLE = "RED HAWK (All In One Scanning)"
|
||||
DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]
|
||||
RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]
|
||||
PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"
|
||||
|
||||
|
||||
class ReconSpider(HackingTool):
|
||||
TITLE = "ReconSpider(For All Scaning)"
|
||||
DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \
|
||||
" Framework for scanning IP Address, Emails, \n" \
|
||||
"Websites, Organizations and find out information from" \
|
||||
" different sources.\n"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/bhavsec/reconspider.git",
|
||||
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/bhavsec/reconspider"
|
||||
|
||||
def __init__(self):
|
||||
super(ReconSpider, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class IsItDown(HackingTool):
|
||||
TITLE = "IsItDown (Check Website Down/Up)"
|
||||
DESCRIPTION = "Check Website Is Online or Not"
|
||||
|
||||
def __init__(self):
|
||||
super(IsItDown, self).__init__(
|
||||
[('Open', self.open)], installable = False, runnable = False)
|
||||
|
||||
def open(self):
|
||||
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
|
||||
|
||||
|
||||
class Infoga(HackingTool):
|
||||
TITLE = "Infoga - Email OSINT"
|
||||
DESCRIPTION = "Infoga is a tool gathering email accounts informations\n" \
|
||||
"(ip, hostname, country,...) from different public source"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/m4ll0k/Infoga.git",
|
||||
"cd infoga;sudo python setup.py install"
|
||||
]
|
||||
RUN_COMMANDS = ["cd infoga;python infoga.py"]
|
||||
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
|
||||
|
||||
|
||||
class ReconDog(HackingTool):
|
||||
TITLE = "ReconDog"
|
||||
DESCRIPTION = "ReconDog Information Gathering Suite"
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]
|
||||
RUN_COMMANDS = ["cd ReconDog;sudo python dog"]
|
||||
PROJECT_URL = "https://github.com/s0md3v/ReconDog"
|
||||
|
||||
|
||||
class Striker(HackingTool):
|
||||
TITLE = "Striker"
|
||||
DESCRIPTION = "Recon & Vulnerability Scanning Suite"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/s0md3v/Striker.git",
|
||||
"cd Striker && pip3 install -r requirements.txt"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/s0md3v/Striker"
|
||||
|
||||
def run(self):
|
||||
site = input("Enter Site Name (example.com) >> ")
|
||||
os.system("cd Striker;")
|
||||
subprocess.run(["sudo", "python3", "striker.py", site])
|
||||
|
||||
|
||||
class SecretFinder(HackingTool):
|
||||
TITLE = "SecretFinder (like API & etc)"
|
||||
DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \
|
||||
"like apikeys, accesstoken, authorizations, jwt,..etc \n " \
|
||||
"and search anything on javascript files.\n\n " \
|
||||
"Usage: python SecretFinder.py -h"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",
|
||||
"cd secretfinder; sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"
|
||||
|
||||
def __init__(self):
|
||||
super(SecretFinder, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class Shodan(HackingTool):
|
||||
TITLE = "Find Info Using Shodan"
|
||||
DESCRIPTION = "Get ports, vulnerabilities, informations, banners,..etc \n " \
|
||||
"for any IP with Shodan (no apikey! no rate limit!)\n" \
|
||||
"[X] Don't use this tool because your ip will be blocked by Shodan!"
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]
|
||||
PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"
|
||||
|
||||
def __init__(self):
|
||||
super(Shodan, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class PortScannerRanger(HackingTool):
|
||||
TITLE = "Port Scanner - rang3r"
|
||||
DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \
|
||||
"all alive hosts within your range that you specify."
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/floriankunushevci/rang3r.git;"
|
||||
"sudo pip install termcolor"]
|
||||
PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
|
||||
|
||||
def run(self):
|
||||
ip = input("Enter Ip >> ")
|
||||
os.system("cd rang3r;")
|
||||
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
|
||||
|
||||
|
||||
class Breacher(HackingTool):
|
||||
TITLE = "Breacher"
|
||||
DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
|
||||
PROJECT_URL = "https://github.com/s0md3v/Breacher"
|
||||
|
||||
def __init__(self):
|
||||
super(Breacher, self).__init__(runnable = False)
|
||||
|
||||
|
||||
class InformationGatheringTools(HackingToolsCollection):
|
||||
TITLE = "Information gathering tools"
|
||||
TOOLS = [
|
||||
NMAP(),
|
||||
Dracnmap(),
|
||||
PortScan(),
|
||||
Host2IP(),
|
||||
XeroSploit(),
|
||||
RedHawk(),
|
||||
ReconSpider(),
|
||||
IsItDown(),
|
||||
Infoga(),
|
||||
ReconDog(),
|
||||
Striker(),
|
||||
SecretFinder(),
|
||||
Shodan(),
|
||||
PortScannerRanger(),
|
||||
Breacher()
|
||||
]
|
Reference in New Issue
Block a user