diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..4e8425c
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,21 @@
+MIT License
+
+Copyright (c) 2020 Mr.Z4nzu
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all
+copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+SOFTWARE.
diff --git a/README.md b/README.md
index 11c62a1..441ce3c 100644
--- a/README.md
+++ b/README.md
@@ -1,2 +1,243 @@
-# Hacking.Tools
-ALL IN ONE Hacking Tool For Hackers
+### All in One Hacking tool For Hackersπ₯
+
+
+
+
+
+
+
+[](http://hits.dwyl.com/Z4nzu/hackingtool)
+
+
+#### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I)
+
+## Update Available V1.1.0 π
+- [x] Added New Tools
+ - [x] Reverse Engineering
+ - [x] RAT Tools
+ - [x] Web Crawling
+ - [x] Payload Injector
+- [x] Multitor Tools update
+- [X] Added Tool in wifijamming
+
+
+# Hackingtool Menu π§°
+- [Anonymously Hiding Tools](#anonymously-hiding-tools)
+- [Information gathering tools](#information-gathering-tools)
+- [Wordlist Generator](#wordlist-generator)
+- [Wireless attack tools](#wireless-attack-tools)
+- [SQL Injection Tools](#sql-injection-tools)
+- [Phishing attack tools](#phishing-attack-tools)
+- [Web Attack tools](#web-attack-tools)
+- [Post exploitation tools](#post-exploitation-tools)
+- [Forensic tools](#forensic-tools)
+- [Payload creation tools](#payload-creation-tools)
+- [Exploit framework](#exploit-framework)
+- [Reverse engineering tools](#reverse-engineering-tools)
+- [DDOS Attack Tools](#ddos-attack-tools)
+- [Remote Administrator Tools (RAT)](#remote-administrator-tools--rat-)
+- [XSS Attack Tools](#xss-attack-tools)
+- [Steganograhy tools](#steganograhy-tools)
+- [Other tools](#other-tools)
+ - [SocialMedia Bruteforce](#socialmedia-bruteforce)
+ - [Android Hacking tools](#android-hacking-tools)
+ - [IDN Homograph Attack](#idn-homograph-attack)
+ - [Email Verify tools](#email-verify-tools)
+ - [Hash cracking tools](#hash-cracking-tools)
+ - [Wifi Deauthenticate](#wifi-deauthenticate)
+ - [SocialMedia Finder](#socialmedia-finder)
+ - [Payload Injector](#payload-injector)
+ - [Web crawling](#web-crawling)
+ - [Mix tools](#mix-tools)
+
+
+### Anonymously Hiding Tools
+- [Anonmously Surf](https://github.com/Und3rf10w/kali-anonsurf)
+- [Multitor](https://github.com/trimstray/multitor)
+### Information gathering tools
+- [Network Map (nmap)](https://github.com/nmap/nmap)
+- [Dracnmap](https://github.com/Screetsec/Dracnmap)
+- Port scanning
+- Host to IP
+- [Xerosploit](https://github.com/LionSec/xerosploit)
+- [RED HAWK (All In One Scanning)](https://github.com/Tuhinshubhra/RED_HAWK)
+- [ReconSpider(For All Scaning)](https://github.com/bhavsec/reconspider)
+- IsItDown (Check Website Down/Up)
+- [Infoga - Email OSINT](https://github.com/m4ll0k/Infoga)
+- [ReconDog](https://github.com/s0md3v/ReconDog)
+- [Striker](https://github.com/s0md3v/Striker)
+- [SecretFinder (like API & etc)](https://github.com/m4ll0k/SecretFinder)
+- [Find Info Using Shodan](https://github.com/m4ll0k/Shodanfy.py)
+- [Port Scanner - rang3r](https://github.com/floriankunushevci/rang3r)
+- [Breacher](https://github.com/s0md3v/Breacher)
+### Wordlist Generator
+- [Cupp](https://github.com/Mebus/cupp.git)
+- [WordlistCreator](https://github.com/Z4nzu/wlcreator)
+- [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
+- [Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
+### Wireless attack tools
+- [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3)
+- [pixiewps](https://github.com/wiire/pixiewps)
+- [Bluetooth Honeypot GUI Framework](https://github.com/andrewmichaelsmith/bluepot)
+- [Fluxion](https://github.com/thehackingsage/Fluxion)
+- [Wifiphisher](https://github.com/wifiphisher/wifiphisher)
+- [Wifite](https://github.com/derv82/wifite2)
+- [EvilTwin](https://github.com/Z4nzu/fakeap)
+- [Fastssh](https://github.com/Z4nzu/fastssh)
+- Howmanypeople
+### SQL Injection Tools
+- [Sqlmap tool](https://github.com/sqlmapproject/sqlmap)
+- [NoSqlMap](https://github.com/codingo/NoSQLMap)
+- [Damn Small SQLi Scanner](https://github.com/stamparm/DSSS)
+- [Explo](https://github.com/dtag-dev-sec/explo)
+- [Blisqy - Exploit Time-based blind-SQL injection](https://github.com/JohnTroony/Blisqy)
+- [Leviathan - Wide Range Mass Audit Toolkit](https://github.com/leviathan-framework/leviathan)
+- [SQLScan](https://github.com/Cvar1984/sqlscan)
+### Phishing attack tools
+- [Setoolkit](https://github.com/trustedsec/social-engineer-toolkit)
+- [SocialFish](https://github.com/UndeadSec/SocialFish)
+- [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye)
+- [Evilginx2](https://github.com/kgretzky/evilginx2)
+- [I-See_You(Get Location using phishing attack)](https://github.com/Viralmaniar/I-See-You)
+- [SayCheese (Grab target's Webcam Shots)](https://github.com/hangetzzu/saycheese)
+- [QR Code Jacking](https://github.com/cryptedwolf/ohmyqr)
+- [ShellPhish](https://github.com/An0nUD4Y/shellphish)
+- [BlackPhish](https://github.com/iinc0gnit0/BlackPhish)
+### Web Attack tools
+- [Web2Attack](https://github.com/santatic/web2attack)
+- Skipfish
+- [SubDomain Finder](https://github.com/aboul3la/Sublist3r)
+- [CheckURL](https://github.com/UndeadSec/checkURL)
+- [Blazy(Also Find ClickJacking)](https://github.com/UltimateHackers/Blazy)
+- [Sub-Domain TakeOver](https://github.com/m4ll0k/takeover)
+- [Dirb](https://gitlab.com/kalilinux/packages/dirb)
+### Post exploitation tools
+- [Vegile - Ghost In The Shell](https://github.com/Screetsec/Vegile)
+- [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger)
+### Forensic tools
+- Autopsy
+- Wireshark
+- [Bulk extractor](https://github.com/simsong/bulk_extractor)
+- [Disk Clone and ISO Image Aquire](https://guymager.sourceforge.io/)
+- [Toolsley](https://www.toolsley.com/)
+### Payload creation tools
+- [The FatRat](https://github.com/Screetsec/TheFatRat)
+- [Brutal](https://github.com/Screetsec/Brutal)
+- [Stitch](https://nathanlopez.github.io/Stitch)
+- [MSFvenom Payload Creator](https://github.com/g0tmi1k/msfpc)
+- [Venom Shellcode Generator](https://github.com/r00t-3xp10it/venom)
+- [Spycam](https://github.com/thelinuxchoice/spycam)
+- [Mob-Droid](https://github.com/kinghacker0/Mob-Droid)
+- [Enigma](https://github.com/UndeadSec/Enigma)
+### Exploit framework
+- [RouterSploit](https://github.com/threat9/routersploit)
+- [WebSploit](https://github.com/The404Hacking/websploit )
+- [Commix](https://github.com/commixproject/commix)
+- [Web2Attack](https://github.com/santatic/web2attack)
+### Reverse engineering tools
+- [Androguard](https://github.com/androguard/androguard )
+- [Apk2Gold](https://github.com/lxdvs/apk2gold )
+- [JadX](https://github.com/skylot/jadx)
+### DDOS Attack Tools
+- SlowLoris
+- [Asyncrone | Multifunction SYN Flood DDoS Weapon](https://github.com/fatihsnsy/aSYNcrone)
+- [UFOnet](https://github.com/epsylon/ufonet)
+- [GoldenEye](https://github.com/jseidl/GoldenEye)
+### Remote Administrator Tools (RAT)
+- [Stitch](https://github.com/nathanlopez/Stitch)
+- [Pyshell](https://github.com/knassar702/pyshell)
+### XSS Attack Tools
+- [DalFox(Finder of XSS)](https://github.com/hahwul/dalfox)
+- [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER.git)
+- [Extended XSS Searcher and Finder](https://github.com/Damian89/extended-xss-search)
+- [XSS-Freak](https://github.com/PR0PH3CY33/XSS-Freak)
+- [XSpear](https://github.com/hahwul/XSpear)
+- [XSSCon](https://github.com/menkrep1337/XSSCon)
+- [XanXSS](https://github.com/Ekultek/XanXSS)
+- [Advanced XSS Detection Suite](https://github.com/UltimateHackers/XSStrike)
+- [RVuln](https://github.com/iinc0gnit0/RVuln)
+### Steganograhy tools
+- SteganoHide
+- StegnoCracker
+- [Whitespace](https://github.com/beardog108/snow10)
+### Other tools
+#### SocialMedia Bruteforce
+- [Instagram Attack](https://github.com/chinoogawa/instaBrute)
+- [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force)
+- [Facebook Attack](https://github.com/Matrix07ksa/Brute_Force)
+- [Application Checker](https://github.com/jakuta-tech/underhanded)
+#### Android Hacking tools
+- [Keydroid](https://github.com/F4dl0/keydroid)
+- [MySMS](https://github.com/papusingh2sms/mysms)
+- [Lockphish (Grab target LOCK PIN)](https://github.com/JasonJerry/lockphish)
+- [DroidCam (Capture Image)](https://github.com/kinghacker0/WishFish)
+- [EvilApp (Hijack Session)](https://github.com/crypticterminal/EvilApp)
+- [HatCloud(Bypass CloudFlare for IP)](https://github.com/HatBashBR/HatCloud)
+#### IDN Homograph Attack
+- [EvilURL](https://github.com/UndeadSec/EvilURL)
+#### Email Verify tools
+- [Knockmail](https://github.com/4w4k3/KnockMail)
+#### Hash cracking tools
+- [Hash Buster](https://github.com/s0md3v/Hash-Buster)
+#### Wifi Deauthenticate
+- [WifiJammer-NG](https://github.com/MisterBianco/wifijammer-ng)
+- [KawaiiDeauther](https://github.com/aryanrtm/KawaiiDeauther)
+#### SocialMedia Finder
+- [Find SocialMedia By Facial Recognation System](https://github.com/Greenwolf/social_mapper)
+- [Find SocialMedia By UserName](https://github.com/xHak9x/finduser)
+- [Sherlock](https://github.com/sherlock-project/sherlock)
+- [SocialScan | Username or Email](https://github.com/iojw/socialscan)
+#### Payload Injector
+- [Debinject](https://github.com/UndeadSec/Debinject)
+- [Pixload](https://github.com/chinarulezzz/pixload)
+#### Web crawling
+- [Gospider](https://github.com/jaeles-project/gospider)
+#### Mix tools
+- Terminal Multiplexer
+
+
+
+
+
+
+
+
+## Installation For Linux 
+
+#### This Tool Must Run As ROOT !!!
+
+ git clone https://github.com/Z4nzu/hackingtool.git
+
+ chmod -R 755 hackingtool
+
+ cd hackingtool
+
+ sudo pip3 install -r requirement.txt
+
+ bash install.sh
+
+ sudo hackingtool
+
+ After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool**
+
+#### Thanks to original Author of the tools used in hackingtool
+
+
+
Please Don't Use for illegal Activity
+
+### To do
+- [ ] Release Tool
+- [ ] Add Tools for CTF
+- [ ] Want to do automatic
+
+## Social Media :mailbox_with_no_mail:
+[](https://twitter.com/_Zinzu07)
+[](https://github.com/Z4nzu/)
+##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8)
+
+
+
+
+#### Don't Forgot to share with Your Friends
+### The new Update get will soon stay updated
+#### Thank you..!!
diff --git a/README_template.md b/README_template.md
new file mode 100644
index 0000000..ffe02ef
--- /dev/null
+++ b/README_template.md
@@ -0,0 +1,72 @@
+### All in One Hacking tool For Hackersπ₯
+
+
+
+
+
+
+
+[](http://hits.dwyl.com/Z4nzu/hackingtool)
+
+
+#### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I)
+
+## Update Available V1.1.0 π
+- [x] Added New Tools
+ - [x] Reverse Engineering
+ - [x] RAT Tools
+ - [x] Web Crawling
+ - [x] Payload Injector
+- [x] Multitor Tools update
+- [X] Added Tool in wifijamming
+
+
+# Hackingtool Menu π§°
+{{toc}}
+
+{{tools}}
+
+
+
+
+
+
+
+## Installation For Linux 
+
+#### This Tool Must Run As ROOT !!!
+
+ git clone https://github.com/Z4nzu/hackingtool.git
+
+ chmod -R 755 hackingtool
+
+ cd hackingtool
+
+ sudo pip3 install -r requirement.txt
+
+ bash install.sh
+
+ sudo hackingtool
+
+ After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool**
+
+#### Thanks to original Author of the tools used in hackingtool
+
+
+
Please Don't Use for illegal Activity
+
+### To do
+- [ ] Release Tool
+- [ ] Add Tools for CTF
+- [ ] Want to do automatic
+
+## Social Media :mailbox_with_no_mail:
+[](https://twitter.com/_Zinzu07)
+[](https://github.com/Z4nzu/)
+##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8)
+
+
+
+
+#### Don't Forgot to share with Your Friends
+#### Thank you..!!
diff --git a/core.py b/core.py
new file mode 100644
index 0000000..e59ef3c
--- /dev/null
+++ b/core.py
@@ -0,0 +1,185 @@
+# coding=utf-8
+import os
+import sys
+import webbrowser
+from platform import system
+from traceback import print_exc
+from typing import Any
+from typing import Callable
+from typing import List
+from typing import Tuple
+
+
+def clear_screen():
+ if system() == "Linux":
+ os.system("clear")
+ if system() == "Windows":
+ os.system("cls")
+
+
+def validate_input(ip, val_range):
+ try:
+ ip = int(ip)
+ if ip in val_range:
+ return ip
+ else:
+ return None
+ except:
+ return None
+
+
+class HackingTool(object):
+ # About the HackingTool
+ TITLE: str = "" # used to show info in the menu
+ DESCRIPTION: str = ""
+
+ INSTALL_COMMANDS: List[str] = []
+ INSTALLATION_DIR: str = ""
+
+ UNINSTALL_COMMANDS: List[str] = []
+
+ RUN_COMMANDS: List[str] = []
+
+ OPTIONS: List[Tuple[str, Callable]] = []
+
+ PROJECT_URL: str = ""
+
+ def __init__(self, options = None, installable: bool = True,
+ runnable: bool = True):
+ if options is None:
+ options = []
+ if isinstance(options, list):
+ self.OPTIONS = []
+ if installable:
+ self.OPTIONS.append(('Install', self.install))
+ if runnable:
+ self.OPTIONS.append(('Run', self.run))
+ self.OPTIONS.extend(options)
+ else:
+ raise Exception(
+ "options must be a list of (option_name, option_fn) tuples")
+
+ def show_info(self):
+ desc = self.DESCRIPTION
+ if self.PROJECT_URL:
+ desc += '\n\t[*] '
+ desc += self.PROJECT_URL
+ os.system(f'echo "{desc}"|boxes -d boy | lolcat')
+ # print(desc)
+
+ def show_options(self, parent = None):
+ clear_screen()
+ self.show_info()
+ for index, option in enumerate(self.OPTIONS):
+ print("[{:2}] {}".format(index + 1, option[0]))
+ if self.PROJECT_URL:
+ print("[{:2}] {}".format(98, "Open project page"))
+ print("[{:2}] {}".format(
+ 99, ("Back to " + parent.TITLE) if parent is not None else "Exit"))
+ option_index = input("Select an option : ")
+ try:
+ option_index = int(option_index)
+ if option_index - 1 in range(len(self.OPTIONS)):
+ ret_code = self.OPTIONS[option_index - 1][1]()
+ if ret_code != 99:
+ input("\n\nPress ENTER to continue:")
+ elif option_index == 98:
+ self.show_project_page()
+ elif option_index == 99:
+ if parent is None:
+ sys.exit()
+ return 99
+ except (TypeError, ValueError):
+ print("Please enter a valid option")
+ input("\n\nPress ENTER to continue:")
+ except Exception:
+ print_exc()
+ input("\n\nPress ENTER to continue:")
+ return self.show_options(parent = parent)
+
+ def before_install(self):
+ pass
+
+ def install(self):
+ self.before_install()
+ if isinstance(self.INSTALL_COMMANDS, (list, tuple)):
+ for INSTALL_COMMAND in self.INSTALL_COMMANDS:
+ os.system(INSTALL_COMMAND)
+ self.after_install()
+
+ def after_install(self):
+ print("Successfully installed!")
+
+ def before_uninstall(self) -> bool:
+ """ Ask for confirmation from the user and return """
+ return True
+
+ def uninstall(self):
+ if self.before_uninstall():
+ if isinstance(self.UNINSTALL_COMMANDS, (list, tuple)):
+ for UNINSTALL_COMMAND in self.UNINSTALL_COMMANDS:
+ os.system(UNINSTALL_COMMAND)
+ self.after_uninstall()
+
+ def after_uninstall(self):
+ pass
+
+ def before_run(self):
+ pass
+
+ def run(self):
+ self.before_run()
+ if isinstance(self.RUN_COMMANDS, (list, tuple)):
+ for RUN_COMMAND in self.RUN_COMMANDS:
+ os.system(RUN_COMMAND)
+ self.after_run()
+
+ def after_run(self):
+ pass
+
+ def is_installed(self, dir_to_check = None):
+ print("Unimplemented: DO NOT USE")
+ return "?"
+
+ def show_project_page(self):
+ webbrowser.open_new_tab(self.PROJECT_URL)
+
+
+class HackingToolsCollection(object):
+ TITLE: str = "" # used to show info in the menu
+ DESCRIPTION: str = ""
+ TOOLS = [] # type: List[Any[HackingTool, HackingToolsCollection]]
+
+ def __init__(self):
+ pass
+
+ def show_info(self):
+ os.system("figlet -f standard -c {} | lolcat".format(self.TITLE))
+ # os.system(f'echo "{self.DESCRIPTION}"|boxes -d boy | lolcat')
+ # print(self.DESCRIPTION)
+
+ def show_options(self, parent = None):
+ clear_screen()
+ self.show_info()
+ for index, tool in enumerate(self.TOOLS):
+ print("[{:2}] {}".format(index, tool.TITLE))
+ print("[{:2}] {}".format(
+ 99, ("Back to " + parent.TITLE) if parent is not None else "Exit"))
+ tool_index = input("Choose a tool to proceed: ")
+ try:
+ tool_index = int(tool_index)
+ if tool_index in range(len(self.TOOLS)):
+ ret_code = self.TOOLS[tool_index].show_options(parent = self)
+ if ret_code != 99:
+ input("\n\nPress ENTER to continue:")
+ elif tool_index == 99:
+ if parent is None:
+ sys.exit()
+ return 99
+ except (TypeError, ValueError):
+ print("Please enter a valid option")
+ input("\n\nPress ENTER to continue:")
+ except Exception as e:
+ print_exc()
+ input("\n\nPress ENTER to continue:")
+ return self.show_options(parent = parent)
diff --git a/generate_readme.py b/generate_readme.py
new file mode 100644
index 0000000..5990fd2
--- /dev/null
+++ b/generate_readme.py
@@ -0,0 +1,52 @@
+# coding=utf-8
+import re
+
+from core import HackingTool
+from core import HackingToolsCollection
+from main import all_tools
+
+
+def sanitize_anchor(s):
+ return re.sub(r"\W", "-", s.lower())
+
+
+def get_toc(tools, indentation = ""):
+ md = ""
+ for tool in tools:
+ if isinstance(tool, HackingToolsCollection):
+ md += (indentation + "- [{}](#{})\n".format(
+ tool.TITLE, sanitize_anchor(tool.TITLE)))
+ md += get_toc(tool.TOOLS, indentation = indentation + ' ')
+ return md
+
+
+def get_tools_toc(tools, indentation = "##"):
+ md = ""
+ for tool in tools:
+ if isinstance(tool, HackingToolsCollection):
+ md += (indentation + "# {}\n".format(tool.TITLE))
+ md += get_tools_toc(tool.TOOLS, indentation = indentation + '#')
+ elif isinstance(tool, HackingTool):
+ if tool.PROJECT_URL:
+ md += ("- [{}]({})\n".format(tool.TITLE, tool.PROJECT_URL))
+ else:
+ md += ("- {}\n".format(tool.TITLE))
+ return md
+
+
+def generate_readme():
+ toc = get_toc(all_tools[:-1])
+ tools_desc = get_tools_toc(all_tools[:-1])
+
+ with open("README_template.md") as fh:
+ readme_template = fh.read()
+
+ readme_template = readme_template.replace("{{toc}}", toc)
+ readme_template = readme_template.replace("{{tools}}", tools_desc)
+
+ with open("README.md", "w") as fh:
+ fh.write(readme_template)
+
+
+if __name__ == '__main__':
+ generate_readme()
diff --git a/hackingtool.py b/hackingtool.py
new file mode 100644
index 0000000..0ef91a3
--- /dev/null
+++ b/hackingtool.py
@@ -0,0 +1,123 @@
+##!/usr/bin/env python3
+# -*- coding: UTF-8 -*-
+# Version 1.1.0
+import os
+import webbrowser
+from platform import system
+from time import sleep
+
+from core import HackingToolsCollection
+from tools.anonsurf import AnonSurfTools
+from tools.ddos import DDOSTools
+from tools.exploit_frameworks import ExploitFrameworkTools
+from tools.forensic_tools import ForensicTools
+from tools.information_gathering_tools import InformationGatheringTools
+from tools.other_tools import OtherTools
+from tools.payload_creator import PayloadCreatorTools
+from tools.phising_attack import PhishingAttackTools
+from tools.post_exploitation import PostExploitationTools
+from tools.remote_administration import RemoteAdministrationTools
+from tools.reverse_engineering import ReverseEngineeringTools
+from tools.sql_tools import SqlInjectionTools
+from tools.steganography import SteganographyTools
+from tools.tool_manager import ToolManager
+from tools.webattack import WebAttackTools
+from tools.wireless_attack_tools import WirelessAttackTools
+from tools.wordlist_generator import WordlistGeneratorTools
+from tools.xss_attack import XSSAttackTools
+
+logo = """\033[33m
+ ββ ββ βββββββββ βββββββββ ββ βββ ββ βββββββ ββββββββ βββ ββββββββ ββββββββ ββ
+ βββ βββ βββ βββ βββ βββ βββ βββββ βββ βββββββββ βββ βββ βββββββββββ βββ βββ βββ βββ βββ
+ βββ βββ βββ βββ βββ ββ βββββββ ββββ βββ βββ βββ ββ ββββββββ βββ βββ βββ βββ βββ
+ βββββββββββββ βββ βββ βββ βββββββ ββββ βββ βββ ββββ βββ β βββ βββ βββ βββ βββ
+βββββββββββββ ββββββββββββ βββ ββββββββ ββββ βββ βββ βββββ βββββ βββ βββ βββ βββ βββ βββ
+ βββ βββ βββ βββ βββ ββ βββββββ βββ βββ βββ βββ βββ βββ βββ βββ βββ βββ βββ
+ βββ βββ βββ βββ βββ βββ βββ βββββ βββ βββ βββ βββ βββ βββ βββ βββ βββ βββ ββββ β
+ βββ ββ βββ ββ βββββββββ βββ βββ ββ ββ ββ βββββββββ ββββββ ββββββββ ββββββββ βββββββββ
+ β β
+ \033[34m[β] https://github.com/Z4nzu/hackingtool [β]
+ \033[34m[β] Version 1.1.0 [β]
+ \033[91m[X] Please Don't Use For illegal Activity [X]
+\033[97m """
+
+all_tools = [
+ AnonSurfTools(),
+ InformationGatheringTools(),
+ WordlistGeneratorTools(),
+ WirelessAttackTools(),
+ SqlInjectionTools(),
+ PhishingAttackTools(),
+ WebAttackTools(),
+ PostExploitationTools(),
+ ForensicTools(),
+ PayloadCreatorTools(),
+ ExploitFrameworkTools(),
+ ReverseEngineeringTools(),
+ DDOSTools(),
+ RemoteAdministrationTools(),
+ XSSAttackTools(),
+ SteganographyTools(),
+ OtherTools(),
+ ToolManager()
+]
+
+
+class AllTools(HackingToolsCollection):
+ TITLE = "All tools"
+ TOOLS = all_tools
+
+ def show_info(self):
+ print(logo + '\033[0m \033[97m')
+
+
+if __name__ == "__main__":
+ try:
+ if system() == 'Linux':
+ fpath = "/home/hackingtoolpath.txt"
+ if not os.path.exists(fpath):
+ os.system('clear')
+ # run.menu()
+ print("""
+ [@] Set Path (All your tools will be install in that directory)
+ [1] Manual
+ [2] Default
+ """)
+ choice = input("Z4nzu =>> ")
+
+ if choice == "1":
+ inpath = input("Enter Path (with Directory Name) >> ")
+ with open(fpath, "w") as f:
+ f.write(inpath)
+ print("Successfully Path Set...!!")
+ elif choice == "2":
+ autopath = "/home/hackingtool/"
+ with open(fpath, "w") as f:
+ f.write(autopath)
+ print(f"Your Default Path Is:- {autopath}")
+ sleep(3)
+ else:
+ print("Try Again..!!")
+ exit(0)
+
+ with open(fpath) as f:
+ archive = f.readline()
+ if not os.path.exists(archive):
+ os.mkdir(archive)
+ os.chdir(archive)
+ all_tools = AllTools()
+ all_tools.show_options()
+
+ # If not Linux and probably Windows
+ elif system() == "Windows":
+ print(
+ "\033[91m Please Run This Tool In Debian System For Best Result " "\e[00m")
+ sleep(2)
+ webbrowser.open_new_tab("https://tinyurl.com/y522modc")
+
+ else:
+ print("Please Check Your Sytem or Open new issue ...")
+
+ except KeyboardInterrupt:
+ print("\nExiting ..!!!")
+ sleep(2)
diff --git a/images/A0.png b/images/A0.png
new file mode 100644
index 0000000..c6b4ef5
Binary files /dev/null and b/images/A0.png differ
diff --git a/images/A00.png b/images/A00.png
new file mode 100644
index 0000000..1170378
Binary files /dev/null and b/images/A00.png differ
diff --git a/images/A1.png b/images/A1.png
new file mode 100644
index 0000000..9736e6f
Binary files /dev/null and b/images/A1.png differ
diff --git a/images/A2.png b/images/A2.png
new file mode 100644
index 0000000..3345608
Binary files /dev/null and b/images/A2.png differ
diff --git a/images/A4.png b/images/A4.png
new file mode 100644
index 0000000..dae6193
Binary files /dev/null and b/images/A4.png differ
diff --git a/images/demo b/images/demo
new file mode 100644
index 0000000..8b13789
--- /dev/null
+++ b/images/demo
@@ -0,0 +1 @@
+
diff --git a/install.sh b/install.sh
new file mode 100644
index 0000000..afdfcef
--- /dev/null
+++ b/install.sh
@@ -0,0 +1,97 @@
+#!/bin/bash
+clear
+
+BLACK='\e[30m'
+RED='\e[31m'
+GREEN='\e[92m'
+YELLOW='\e[33m'
+ORANGE='\e[93m'
+BLUE='\e[34m'
+PURPLE='\e[35m'
+CYAN='\e[36m'
+WHITE='\e[37m'
+NC='\e[0m'
+purpal='\033[35m'
+
+echo -e "${ORANGE} "
+echo ""
+echo " ββ ββ βββββββββ βββββββββ ββ βββ ββ βββββββ ββββββββ βββ ββββββββ ββββββββ ββ ";
+echo " βββ βββ βββ βββ βββ βββ βββ βββββ βββ βββββββββ βββ βββ βββββββββββ βββ βββ βββ βββ βββ ";
+echo " βββ βββ βββ βββ βββ ββ βββββββ ββββ βββ βββ βββ ββ ββββββββ βββ βββ βββ βββ βββ ";
+echo " βββββββββββββ βββ βββ βββ βββββββ ββββ βββ βββ ββββ βββ β βββ βββ βββ βββ βββ ";
+echo "βββββββββββββ ββββββββββββ βββ ββββββββ ββββ βββ βββ βββββ βββββ βββ βββ βββ βββ βββ βββ ";
+echo " βββ βββ βββ βββ βββ ββ βββββββ βββ βββ βββ βββ βββ βββ βββ βββ βββ βββ βββ ";
+echo " βββ βββ βββ βββ βββ βββ βββ βββββ βββ βββ βββ βββ βββ βββ βββ βββ βββ βββ ββββ β ";
+echo " βββ ββ βββ ββ βββββββββ βββ βββ ββ ββ ββ βββββββββ ββββββ ββββββββ ββββββββ βββββββββ ";
+echo " β β ";
+
+echo -e "${BLUE} https://github.com/Z4nzu/hackingtool ${NC}"
+
+echo -e "${RED} [!] This Tool Must Run As ROOT [!]${NC}"
+echo ""
+echo -e ${CYAN} "Select Best Option : "
+echo ""
+echo -e "${WHITE} [1] Kali Linux / Parrot-Os "
+echo -e "${WHITE} [0] Exit "
+echo -n -e "Z4nzu >> "
+read choice
+INSTALL_DIR="/usr/share/doc/hackingtool"
+BIN_DIR="/usr/bin/"
+if [ $choice == 1 ]; then
+ echo "[*] Checking Internet Connection .."
+ wget -q --tries=10 --timeout=20 --spider https://google.com
+ if [[ $? -eq 0 ]]; then
+ echo -e ${BLUE}"[β] Loading ... "
+ sudo apt-get update && apt-get upgrade
+ sudo apt-get install python-pip
+ echo "[β] Checking directories..."
+ if [ -d "$INSTALL_DIR" ]; then
+ echo "[!] A Directory hackingtool Was Found.. Do You Want To Replace It ? [y/n]:" ;
+ read input
+ if [ "$input" = "y" ]; then
+ rm -R "$INSTALL_DIR"
+ else
+ exit
+ fi
+ fi
+ echo "[β] Installing ...";
+ echo "";
+ git clone https://github.com/Z4nzu/hackingtool.git "$INSTALL_DIR";
+ echo "#!/bin/bash
+ python3 $INSTALL_DIR/hackingtool.py" '${1+"$@"}' > hackingtool;
+ sudo chmod +x hackingtool;
+ sudo cp hackingtool /usr/bin/;
+ rm hackingtool;
+ echo "";
+ echo "[β] Trying to installing Requirements ..."
+ sudo pip3 install lolcat
+ sudo apt-get install -y figlet
+ sudo pip3 install boxes
+ sudo apt-get install boxes
+ sudo pip3 install flask
+ sudo pip3 install requests
+ else
+ echo -e $RED "Please Check Your Internet Connection ..!!"
+ fi
+
+ if [ -d "$INSTALL_DIR" ]; then
+ echo "";
+ echo "[β] Successfuly Installed !!! ";
+ echo "";
+ echo "";
+ echo -e $ORANGE " [+]+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++[+]"
+ echo " [+] [+]"
+ echo -e $ORANGE " [+] βββ Now Just Type In Terminal (hackingtool) βββ [+]"
+ echo " [+] [+]"
+ echo -e $ORANGE " [+]+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++[+]"
+ else
+ echo "[β] Installation Failed !!! [β]";
+ exit
+ fi
+elif [ $choice -eq 0 ];
+then
+ echo -e $RED "[β] THank Y0u !! [β] "
+ exit
+else
+ echo -e $RED "[!] Select Valid Option [!]"
+fi
diff --git a/requirement.txt b/requirement.txt
new file mode 100644
index 0000000..2341f97
--- /dev/null
+++ b/requirement.txt
@@ -0,0 +1,4 @@
+lolcat
+boxes
+flask
+requests
diff --git a/tools/anonsurf.py b/tools/anonsurf.py
new file mode 100644
index 0000000..0544fad
--- /dev/null
+++ b/tools/anonsurf.py
@@ -0,0 +1,45 @@
+# coding=utf-8
+import os
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class AnonymouslySurf(HackingTool):
+ TITLE = "Anonmously Surf"
+ DESCRIPTION = "It automatically overwrites the RAM when\n" \
+ "the system is shutting down and also change Ip."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git",
+ "cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf"
+ ]
+ RUN_COMMANDS = ["sudo anonsurf start"]
+ PROJECT_URL = "https://github.com/Und3rf10w/kali-anonsurf"
+
+ def __init__(self):
+ super(AnonymouslySurf, self).__init__([('Stop', self.stop)])
+
+ def stop(self):
+ os.system("sudo anonsurf stop")
+
+
+class Multitor(HackingTool):
+ TITLE = "Multitor"
+ DESCRIPTION = "How to stay in multi places at the same time"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/trimstray/multitor.git",
+ "cd multitor;sudo bash setup.sh install"
+ ]
+ PROJECT_URL = "https://github.com/trimstray/multitor"
+
+ def __init__(self):
+ super(Multitor, self).__init__(runnable = False)
+
+
+class AnonSurfTools(HackingToolsCollection):
+ TITLE = "Anonymously Hiding Tools"
+ DESCRIPTION = ""
+ TOOLS = [
+ AnonymouslySurf(),
+ Multitor()
+ ]
diff --git a/tools/ddos.py b/tools/ddos.py
new file mode 100644
index 0000000..be19d5f
--- /dev/null
+++ b/tools/ddos.py
@@ -0,0 +1,77 @@
+# coding=utf-8
+import os
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class SlowLoris(HackingTool):
+ TITLE = "SlowLoris"
+ DESCRIPTION = "Slowloris is basically an HTTP Denial of Service attack." \
+ "It send lots of HTTP Request"
+ INSTALL_COMMANDS = ["sudo pip install slowloris"]
+
+ def run(self):
+ target_site = input("Enter Target Site:- ")
+ subprocess.run(["slowloris", target_site])
+
+
+class Asyncrone(HackingTool):
+ TITLE = "Asyncrone | Multifunction SYN Flood DDoS Weapon"
+ DESCRIPTION = "aSYNcrone is a C language based, mulltifunction SYN Flood " \
+ "DDoS Weapon.\nDisable the destination system by sending a " \
+ "SYN packet intensively to the destination."
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/fatih4842/aSYNcrone.git",
+ "cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread"
+ ]
+ PROJECT_URL = "https://github.com/fatihsnsy/aSYNcrone"
+
+ def run(self):
+ source_port = input("Enter Source Port >> ")
+ target_ip = input("Enter Target IP >> ")
+ target_port = input("Enter Target port >> ")
+ os.system("cd aSYNcrone;")
+ subprocess.run([
+ "sudo", "./aSYNcrone", source_port, target_ip, target_port, 1000])
+
+
+class UFONet(HackingTool):
+ TITLE = "UFOnet"
+ DESCRIPTION = "UFONet - is a free software, P2P and cryptographic " \
+ "-disruptive \n toolkit- that allows to perform DoS and " \
+ "DDoS attacks\n\b " \
+ "More Usage Visit"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/epsylon/ufonet.git",
+ "cd ufonet;sudo python setup.py install"
+ ]
+ RUN_COMMANDS = ["sudo ./ufonet --gui"]
+ PROJECT_URL = "https://github.com/epsylon/ufonet"
+
+
+class GoldenEye(HackingTool):
+ TITLE = "GoldenEye"
+ DESCRIPTION = "GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\n" \
+ "GoldenEye is a HTTP DoS Test Tool."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/jseidl/GoldenEye.git;"
+ "chmod -R 755 GoldenEye"
+ ]
+ PROJECT_URL = "https://github.com/jseidl/GoldenEye"
+
+ def run(self):
+ os.system("cd GoldenEye ;sudo ./goldeneye.py")
+ print("\033[96m Go to Directory \n "
+ "[*] USAGE: ./goldeneye.py [OPTIONS]")
+
+
+class DDOSTools(HackingToolsCollection):
+ TITLE = "DDOS Attack Tools"
+ TOOLS = [
+ SlowLoris(),
+ Asyncrone(),
+ UFONet(),
+ GoldenEye()
+ ]
diff --git a/tools/exploit_frameworks.py b/tools/exploit_frameworks.py
new file mode 100644
index 0000000..b285095
--- /dev/null
+++ b/tools/exploit_frameworks.py
@@ -0,0 +1,50 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+from tools.webattack import Web2Attack
+
+
+class RouterSploit(HackingTool):
+ TITLE = "RouterSploit"
+ DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \
+ "framework dedicated to embedded devices"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/threat9/routersploit.git",
+ "cd routersploit && sudo python3 -m pip install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"]
+ PROJECT_URL = "https://github.com/threat9/routersploit"
+
+
+class WebSploit(HackingTool):
+ TITLE = "WebSploit"
+ DESCRIPTION = "Websploit is an advanced MITM framework."
+ INSTALL_COMMANDS = ["https://github.com/The404Hacking/websploit.git"]
+ RUN_COMMANDS = ["cd websploit;python3 websploit.py"]
+ PROJECT_URL = "https://github.com/The404Hacking/websploit "
+
+
+class Commix(HackingTool):
+ TITLE = "Commix"
+ DESCRIPTION = "Automated All-in-One OS command injection and exploitation " \
+ "tool.\nCommix can be used from web developers, penetration " \
+ "testers or even security researchers\n in order to test " \
+ "web-based applications with the view to find bugs,\n " \
+ "errors or vulnerabilities related to command injection " \
+ "attacks.\n Usage: python commix.py [option(s)]"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/commixproject/commix.git commix"]
+ PROJECT_URL = "https://github.com/commixproject/commix"
+
+ def __init__(self):
+ super(Commix, self).__init__(runnable = False)
+
+
+class ExploitFrameworkTools(HackingToolsCollection):
+ TITLE = "Exploit framework"
+ TOOLS = [
+ RouterSploit(),
+ WebSploit(),
+ Commix(),
+ Web2Attack()
+ ]
diff --git a/tools/forensic_tools.py b/tools/forensic_tools.py
new file mode 100644
index 0000000..d2b2bc0
--- /dev/null
+++ b/tools/forensic_tools.py
@@ -0,0 +1,91 @@
+# coding=utf-8
+import os
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Autopsy(HackingTool):
+ TITLE = "Autopsy"
+ DESCRIPTION = "Autopsy is a platform that is used by Cyber Investigators.\n" \
+ "[!] Works in any Os\n" \
+ "[!] Recover Deleted Files from any OS & MEdia \n" \
+ "[!] Extract Image Metadata"
+ RUN_COMMANDS = "sudo autopsy"
+
+ def __init__(self):
+ super(Autopsy, self).__init__(installable = False)
+
+
+class Wireshark(HackingTool):
+ TITLE = "Wireshark"
+ DESCRIPTION = "Wireshark is a network capture and analyzer \n" \
+ "tool to see whatβs happening in your network.\n " \
+ "And also investigate Network related incident"
+ RUN_COMMANDS = ["sudo wireshark"]
+
+ def __init__(self):
+ super(Wireshark, self).__init__(installable = False)
+
+
+class BulkExtractor(HackingTool):
+ TITLE = "Bulk extractor"
+ DESCRIPTION = ""
+ PROJECT_URL = "https://github.com/simsong/bulk_extractor"
+
+ def __init__(self):
+ super(BulkExtractor, self).__init__([
+ ('GUI Mode (Download required)', self.gui_mode),
+ ('CLI Mode', self.cli_mode)
+ ], installable = False, runnable = False)
+
+ def gui_mode(self):
+ os.system(
+ "sudo git clone https://github.com/simsong/bulk_extractor.git")
+ os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
+ print(
+ "If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
+ print(
+ "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
+
+ def cli_mode(self):
+ os.system("sudo apt-get install bulk_extractor")
+ print("bulk_extractor and options")
+ os.system("bulk_extractor")
+ os.system(
+ 'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')
+
+
+class Guymager(HackingTool):
+ TITLE = "Disk Clone and ISO Image Aquire"
+ DESCRIPTION = "Guymager is a free forensic imager for media acquisition."
+ INSTALL_COMMANDS = ["sudo apt install guymager"]
+ RUN_COMMANDS = ["sudo guymager"]
+ PROJECT_URL = "https://guymager.sourceforge.io/"
+
+
+class Toolsley(HackingTool):
+ TITLE = "Toolsley"
+ DESCRIPTION = "Toolsley got more than ten useful tools for investigation.\n" \
+ "[+]File signature verifier\n" \
+ "[+]File identifier \n" \
+ "[+]Hash & Validate \n" \
+ "[+]Binary inspector \n " \
+ "[+]Encode text \n" \
+ "[+]Data URI generator \n" \
+ "[+]Password generator"
+ PROJECT_URL = "https://www.toolsley.com/"
+
+ def __init__(self):
+ super(Toolsley, self).__init__(installable = False, runnable = False)
+
+
+class ForensicTools(HackingToolsCollection):
+ TITLE = "Forensic tools"
+ TOOLS = [
+ Autopsy(),
+ Wireshark(),
+ BulkExtractor(),
+ Guymager(),
+ Toolsley()
+ ]
diff --git a/tools/information_gathering_tools.py b/tools/information_gathering_tools.py
new file mode 100644
index 0000000..7d424c7
--- /dev/null
+++ b/tools/information_gathering_tools.py
@@ -0,0 +1,219 @@
+# coding=utf-8
+import os
+import socket
+import subprocess
+import webbrowser
+
+from core import HackingTool
+from core import HackingToolsCollection
+from core import clear_screen
+
+
+class NMAP(HackingTool):
+ TITLE = "Network Map (nmap)"
+ DESCRIPTION = "Free and open source utility for network discovery and security auditing"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/nmap/nmap.git",
+ "sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
+ ]
+ PROJECT_URL = "https://github.com/nmap/nmap"
+
+ def __init__(self):
+ super(NMAP, self).__init__(runnable = False)
+
+
+class Dracnmap(HackingTool):
+ TITLE = "Dracnmap"
+ DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
+ "exploit the network and gathering information with nmap help."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Screetsec/Dracnmap.git",
+ "cd Dracnmap && chmod +x Dracnmap.sh"
+ ]
+ PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
+
+ def __init__(self):
+ super(Dracnmap, self).__init__(runnable = False)
+
+
+class PortScan(HackingTool):
+ TITLE = "Port scanning"
+
+ def __init__(self):
+ super(PortScan, self).__init__(installable = False)
+
+ def run(self):
+ clear_screen()
+ target = input('Select a Target IP: ')
+ subprocess.run(["sudo", "nmap", "-O", "-Pn", target])
+
+
+class Host2IP(HackingTool):
+ TITLE = "Host to IP "
+
+ def __init__(self):
+ super(Host2IP, self).__init__(installable = False)
+
+ def run(self):
+ clear_screen()
+ host = input("Enter host name (e.g. www.google.com):- ")
+ ips = socket.gethostbyname(host)
+ print(ips)
+
+
+class XeroSploit(HackingTool):
+ TITLE = "Xerosploit"
+ DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \
+ "man-in-the-middle attacks for testing purposes"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/LionSec/xerosploit.git",
+ "cd xerosploit && sudo python install.py"
+ ]
+ RUN_COMMANDS = ["sudo xerosploit"]
+ PROJECT_URL = "https://github.com/LionSec/xerosploit"
+
+
+class RedHawk(HackingTool):
+ TITLE = "RED HAWK (All In One Scanning)"
+ DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]
+ RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]
+ PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"
+
+
+class ReconSpider(HackingTool):
+ TITLE = "ReconSpider(For All Scaning)"
+ DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \
+ " Framework for scanning IP Address, Emails, \n" \
+ "Websites, Organizations and find out information from" \
+ " different sources.\n"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/bhavsec/reconspider.git",
+ "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
+ ]
+ PROJECT_URL = "https://github.com/bhavsec/reconspider"
+
+ def __init__(self):
+ super(ReconSpider, self).__init__(runnable = False)
+
+
+class IsItDown(HackingTool):
+ TITLE = "IsItDown (Check Website Down/Up)"
+ DESCRIPTION = "Check Website Is Online or Not"
+
+ def __init__(self):
+ super(IsItDown, self).__init__(
+ [('Open', self.open)], installable = False, runnable = False)
+
+ def open(self):
+ webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
+
+
+class Infoga(HackingTool):
+ TITLE = "Infoga - Email OSINT"
+ DESCRIPTION = "Infoga is a tool gathering email accounts informations\n" \
+ "(ip, hostname, country,...) from different public source"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/m4ll0k/Infoga.git",
+ "cd infoga;sudo python setup.py install"
+ ]
+ RUN_COMMANDS = ["cd infoga;python infoga.py"]
+ PROJECT_URL = "https://github.com/m4ll0k/Infoga"
+
+
+class ReconDog(HackingTool):
+ TITLE = "ReconDog"
+ DESCRIPTION = "ReconDog Information Gathering Suite"
+ INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]
+ RUN_COMMANDS = ["cd ReconDog;sudo python dog"]
+ PROJECT_URL = "https://github.com/s0md3v/ReconDog"
+
+
+class Striker(HackingTool):
+ TITLE = "Striker"
+ DESCRIPTION = "Recon & Vulnerability Scanning Suite"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/s0md3v/Striker.git",
+ "cd Striker && pip3 install -r requirements.txt"
+ ]
+ PROJECT_URL = "https://github.com/s0md3v/Striker"
+
+ def run(self):
+ site = input("Enter Site Name (example.com) >> ")
+ os.system("cd Striker;")
+ subprocess.run(["sudo", "python3", "striker.py", site])
+
+
+class SecretFinder(HackingTool):
+ TITLE = "SecretFinder (like API & etc)"
+ DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \
+ "like apikeys, accesstoken, authorizations, jwt,..etc \n " \
+ "and search anything on javascript files.\n\n " \
+ "Usage: python SecretFinder.py -h"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",
+ "cd secretfinder; sudo pip3 install -r requirements.txt"
+ ]
+ PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"
+
+ def __init__(self):
+ super(SecretFinder, self).__init__(runnable = False)
+
+
+class Shodan(HackingTool):
+ TITLE = "Find Info Using Shodan"
+ DESCRIPTION = "Get ports, vulnerabilities, informations, banners,..etc \n " \
+ "for any IP with Shodan (no apikey! no rate limit!)\n" \
+ "[X] Don't use this tool because your ip will be blocked by Shodan!"
+ INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]
+ PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"
+
+ def __init__(self):
+ super(Shodan, self).__init__(runnable = False)
+
+
+class PortScannerRanger(HackingTool):
+ TITLE = "Port Scanner - rang3r"
+ DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \
+ "all alive hosts within your range that you specify."
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/floriankunushevci/rang3r.git;"
+ "sudo pip install termcolor"]
+ PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
+
+ def run(self):
+ ip = input("Enter Ip >> ")
+ os.system("cd rang3r;")
+ subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
+
+
+class Breacher(HackingTool):
+ TITLE = "Breacher"
+ DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
+ INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
+ PROJECT_URL = "https://github.com/s0md3v/Breacher"
+
+ def __init__(self):
+ super(Breacher, self).__init__(runnable = False)
+
+
+class InformationGatheringTools(HackingToolsCollection):
+ TITLE = "Information gathering tools"
+ TOOLS = [
+ NMAP(),
+ Dracnmap(),
+ PortScan(),
+ Host2IP(),
+ XeroSploit(),
+ RedHawk(),
+ ReconSpider(),
+ IsItDown(),
+ Infoga(),
+ ReconDog(),
+ Striker(),
+ SecretFinder(),
+ Shodan(),
+ PortScannerRanger(),
+ Breacher()
+ ]
diff --git a/tools/other_tools.py b/tools/other_tools.py
new file mode 100644
index 0000000..b7c8910
--- /dev/null
+++ b/tools/other_tools.py
@@ -0,0 +1,46 @@
+# coding=utf-8
+import os
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+from tools.others.android_attack import AndroidAttackTools
+from tools.others.email_verifier import EmailVerifyTools
+from tools.others.hash_crack import HashCrackingTools
+from tools.others.homograph_attacks import IDNHomographAttackTools
+from tools.others.mix_tools import MixTools
+from tools.others.payload_injection import PayloadInjectorTools
+from tools.others.socialmedia import SocialMediaBruteforceTools
+from tools.others.socialmedia_finder import SocialMediaFinderTools
+from tools.others.web_crawling import WebCrawlingTools
+from tools.others.wifi_jamming import WifiJammingTools
+
+
+class HatCloud(HackingTool):
+ TITLE = "HatCloud(Bypass CloudFlare for IP)"
+ DESCRIPTION = "HatCloud build in Ruby. It makes bypass in CloudFlare for " \
+ "discover real IP."
+ INSTALL_COMMANDS = ["git clone https://github.com/HatBashBR/HatCloud.git"]
+ PROJECT_URL = "https://github.com/HatBashBR/HatCloud"
+
+ def run(self):
+ site = input("Enter Site >> ")
+ os.system("cd HatCloud;")
+ subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])
+
+
+class OtherTools(HackingToolsCollection):
+ TITLE = "Other tools"
+ TOOLS = [
+ SocialMediaBruteforceTools(),
+ AndroidAttackTools(),
+ HatCloud(),
+ IDNHomographAttackTools(),
+ EmailVerifyTools(),
+ HashCrackingTools(),
+ WifiJammingTools(),
+ SocialMediaFinderTools(),
+ PayloadInjectorTools(),
+ WebCrawlingTools(),
+ MixTools()
+ ]
diff --git a/tools/others/android_attack.py b/tools/others/android_attack.py
new file mode 100644
index 0000000..65bdb21
--- /dev/null
+++ b/tools/others/android_attack.py
@@ -0,0 +1,67 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Keydroid(HackingTool):
+ TITLE = "Keydroid"
+ DESCRIPTION = "Android Keylogger + Reverse Shell\n" \
+ "[!] You have to install Some Manually Refer Below Link:\n " \
+ "[+] https://github.com/F4dl0/keydroid"
+ INSTALL_COMMANDS = ["sudo git clone https://github.com/F4dl0/keydroid.git"]
+ RUN_COMMANDS = ["cd keydroid && bash keydroid.sh"]
+ PROJECT_URL = "https://github.com/F4dl0/keydroid"
+
+
+class MySMS(HackingTool):
+ TITLE = "MySMS"
+ DESCRIPTION = "Script that generates an Android App to hack SMS through WAN \n" \
+ "[!] You have to install Some Manually Refer Below Link:\n\t " \
+ "[+] https://github.com/papusingh2sms/mysms"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/papusingh2sms/mysms.git"]
+ RUN_COMMANDS = ["cd mysms && bash mysms.sh"]
+ PROJECT_URL = "https://github.com/papusingh2sms/mysms"
+
+
+class LockPhish(HackingTool):
+ TITLE = "Lockphish (Grab target LOCK PIN)"
+ DESCRIPTION = "Lockphish it's the first tool for phishing attacks on the " \
+ "lock screen, designed to\n Grab Windows credentials,Android" \
+ " PIN and iPhone Passcode using a https link."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/JasonJerry/lockphish.git"]
+ RUN_COMMANDS = ["cd lockphish && bash lockphish.sh"]
+ PROJECT_URL = "https://github.com/JasonJerry/lockphish"
+
+
+class Droidcam(HackingTool):
+ TITLE = "DroidCam (Capture Image)"
+ DESCRIPTION = "Powerful Tool For Grab Front Camera Snap Using A Link"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/kinghacker0/WishFish.git;"
+ "sudo apt install php wget openssh"
+ ]
+ RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"]
+ PROJECT_URL = "https://github.com/kinghacker0/WishFish"
+
+
+class EvilApp(HackingTool):
+ TITLE = "EvilApp (Hijack Session)"
+ DESCRIPTION = "EvilApp is a script to generate Android App that can " \
+ "hijack authenticated sessions in cookies."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/crypticterminal/EvilApp.git"]
+ RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"]
+ PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
+
+
+class AndroidAttackTools(HackingToolsCollection):
+ TITLE = "Android Hacking tools"
+ TOOLS = [
+ Keydroid(),
+ MySMS(),
+ LockPhish(),
+ Droidcam(),
+ EvilApp()
+ ]
diff --git a/tools/others/email_verifier.py b/tools/others/email_verifier.py
new file mode 100644
index 0000000..d25fc59
--- /dev/null
+++ b/tools/others/email_verifier.py
@@ -0,0 +1,19 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class KnockMail(HackingTool):
+ TITLE = "Knockmail"
+ DESCRIPTION = "KnockMail Tool Verify If Email Exists"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/4w4k3/KnockMail.git",
+ "cd KnockMail;sudo pip install -r requeriments.txt"
+ ]
+ RUN_COMMANDS = ["cd KnockMail;python knock.py"]
+ PROJECT_URL = "https://github.com/4w4k3/KnockMail"
+
+
+class EmailVerifyTools(HackingToolsCollection):
+ TITLE = "Email Verify tools"
+ TOOLS = [KnockMail()]
diff --git a/tools/others/hash_crack.py b/tools/others/hash_crack.py
new file mode 100644
index 0000000..60a7289
--- /dev/null
+++ b/tools/others/hash_crack.py
@@ -0,0 +1,21 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class HashBuster(HackingTool):
+ TITLE = "Hash Buster"
+ DESCRIPTION = "Features: \n " \
+ "Automatic hash type identification \n " \
+ "Supports MD5, SHA1, SHA256, SHA384, SHA512"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/s0md3v/Hash-Buster.git",
+ "cd Hash-Buster;make install"
+ ]
+ RUN_COMMANDS = ["buster -h"]
+ PROJECT_URL = "https://github.com/s0md3v/Hash-Buster"
+
+
+class HashCrackingTools(HackingToolsCollection):
+ TITLE = "Hash cracking tools"
+ TOOLS = [HashBuster()]
diff --git a/tools/others/homograph_attacks.py b/tools/others/homograph_attacks.py
new file mode 100644
index 0000000..1ff2207
--- /dev/null
+++ b/tools/others/homograph_attacks.py
@@ -0,0 +1,17 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class EvilURL(HackingTool):
+ TITLE = "EvilURL"
+ DESCRIPTION = "Generate unicode evil domains for IDN Homograph Attack " \
+ "and detect them."
+ INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/EvilURL.git"]
+ RUN_COMMANDS = ["cd EvilURL;python3 evilurl.py"]
+ PROJECT_URL = "https://github.com/UndeadSec/EvilURL"
+
+
+class IDNHomographAttackTools(HackingToolsCollection):
+ TITLE = "IDN Homograph Attack"
+ TOOLS = [EvilURL()]
diff --git a/tools/others/mix_tools.py b/tools/others/mix_tools.py
new file mode 100644
index 0000000..574eb87
--- /dev/null
+++ b/tools/others/mix_tools.py
@@ -0,0 +1,19 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class TerminalMultiplexer(HackingTool):
+ TITLE = "Terminal Multiplexer"
+ DESCRIPTION = "Terminal Multiplexer is a tiling terminal emulator that " \
+ "allows us to open \n several terminal sessions inside one " \
+ "single window."
+ INSTALL_COMMANDS = ["sudo apt-get install tilix"]
+
+ def __init__(self):
+ super(TerminalMultiplexer, self).__init__(runnable = False)
+
+
+class MixTools(HackingToolsCollection):
+ TITLE = "Mix tools"
+ TOOLS = [TerminalMultiplexer()]
diff --git a/tools/others/payload_injection.py b/tools/others/payload_injection.py
new file mode 100644
index 0000000..92ab146
--- /dev/null
+++ b/tools/others/payload_injection.py
@@ -0,0 +1,37 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class DebInject(HackingTool):
+ TITLE = "Debinject"
+ DESCRIPTION = "Debinject is a tool that inject malicious code into *.debs"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UndeadSec/Debinject.git"]
+ RUN_COMMANDS = ["cd Debinject;python debinject.py"]
+ PROJECT_URL = "https://github.com/UndeadSec/Debinject"
+
+
+class Pixload(HackingTool):
+ TITLE = "Pixload"
+ DESCRIPTION = "Pixload -- Image Payload Creating tools \n " \
+ "Pixload is Set of tools for creating/injecting payload into images."
+ INSTALL_COMMANDS = [
+ "sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl",
+ "sudo git clone https://github.com/chinarulezzz/pixload.git"
+ ]
+ PROJECT_URL = "https://github.com/chinarulezzz/pixload"
+
+ def __init__(self):
+ # super(Pixload, self).__init__([
+ # ('How To Use', self.show_project_page)
+ # ], runnable = False)
+ super(Pixload, self).__init__(runnable = False)
+
+
+class PayloadInjectorTools(HackingToolsCollection):
+ TITLE = "Payload Injector"
+ TOOLS = [
+ DebInject(),
+ Pixload()
+ ]
diff --git a/tools/others/socialmedia.py b/tools/others/socialmedia.py
new file mode 100644
index 0000000..c4be439
--- /dev/null
+++ b/tools/others/socialmedia.py
@@ -0,0 +1,74 @@
+# coding=utf-8
+import os
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class InstaBrute(HackingTool):
+ TITLE = "Instagram Attack"
+ DESCRIPTION = "Brute force attack against Instagram"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/chinoogawa/instaBrute.git",
+ "cd instaBrute;sudo pip install -r requirements.txt"
+ ]
+ PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
+
+ def run(self):
+ name = input("Enter Username >> ")
+ wordlist = input("Enter wordword list >> ")
+ os.system("cd instaBrute;")
+ subprocess.run(
+ ["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
+ f"{wordlist}"])
+
+
+class BruteForce(HackingTool):
+ TITLE = "AllinOne SocialMedia Attack"
+ DESCRIPTION = "Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n" \
+ "[!] python3 Brute_Force.py -g -l "
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
+ "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
+ ]
+ RUN_COMMANDS = ["cd Brute_Force;python3 Brute_Force.py -h"]
+ PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
+
+
+class Faceshell(HackingTool):
+ TITLE = "Facebook Attack"
+ DESCRIPTION = "Facebook BruteForcer"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
+ "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
+ ]
+ PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
+
+ def run(self):
+ name = input("Enter Username >> ")
+ wordlist = input("Enter Wordlist >> ")
+ os.system("cd Brute_Force;")
+ subprocess.run(
+ ["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])
+
+
+class AppCheck(HackingTool):
+ TITLE = "Application Checker"
+ DESCRIPTION = "Tool to check if an app is installed on the target device through a link."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/jakuta-tech/underhanded.git",
+ "cd underhanded && sudo chmod +x underhanded.sh"
+ ]
+ RUN_COMMANDS = ["cd underhanded;sudo bash underhanded.sh"]
+ PROJECT_URL = "https://github.com/jakuta-tech/underhanded"
+
+
+class SocialMediaBruteforceTools(HackingToolsCollection):
+ TITLE = "SocialMedia Bruteforce"
+ TOOLS = [
+ InstaBrute(),
+ BruteForce(),
+ Faceshell(),
+ AppCheck()
+ ]
diff --git a/tools/others/socialmedia_finder.py b/tools/others/socialmedia_finder.py
new file mode 100644
index 0000000..ba1d27d
--- /dev/null
+++ b/tools/others/socialmedia_finder.py
@@ -0,0 +1,85 @@
+# coding=utf-8
+import os
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class FacialFind(HackingTool):
+ TITLE = "Find SocialMedia By Facial Recognation System"
+ DESCRIPTION = "A Social Media Mapping Tool that correlates profiles\n " \
+ "via facial recognition across different sites."
+ INSTALL_COMMANDS = [
+ "sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade",
+ "sudo git clone https://github.com/Greenwolf/social_mapper.git",
+ "cd social_mapper/setup",
+ "sudo python3 -m pip install --no-cache-dir -r requirements.txt",
+ 'echo "[!]Now You have To do some Manually\n'
+ '[!] Install the Geckodriver for your operating system\n'
+ '[!] Copy & Paste Link And Download File As System Configuration\n'
+ '[#] https://github.com/mozilla/geckodriver/releases\n'
+ '[!!] On Linux you can place it in /usr/bin "| boxes | lolcat'
+ ]
+ PROJECT_URL = "https://github.com/Greenwolf/social_mapper"
+
+ def run(self):
+ os.system("cd social_mapper/setup")
+ os.system("sudo python social_mapper.py -h")
+ print("""\033[95m
+ You have to set Username and password of your AC Or Any Fack Account
+ [#] Type in Terminal nano social_mapper.py
+ """)
+ os.system(
+ 'echo "python social_mapper.py -f [] -i [] -m fast [] -fb -tw"| boxes | lolcat')
+
+
+class FindUser(HackingTool):
+ TITLE = "Find SocialMedia By UserName"
+ DESCRIPTION = "Find usernames across over 75 social networks"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/xHak9x/finduser.git",
+ "cd finduser && sudo chmod +x finduser.sh"
+ ]
+ RUN_COMMANDS = ["cd finduser && sudo bash finduser.sh"]
+ PROJECT_URL = "https://github.com/xHak9x/finduser"
+
+
+class Sherlock(HackingTool):
+ TITLE = "Sherlock"
+ DESCRIPTION = "Hunt down social media accounts by username across social networks \n " \
+ "For More Usege \n" \
+ "\t >>python3 sherlock --help"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/sherlock-project/sherlock.git",
+ "cd sherlock;sudo python3 -m pip install -r requirements.txt"
+ ]
+ PROJECT_URL = "https://github.com/sherlock-project/sherlock"
+
+ def run(self):
+ name = input("Enter Username >> ")
+ os.system("cd sherlock;")
+ subprocess.run(["sudo", "python3", "sherlock", f"{name}"])
+
+
+class SocialScan(HackingTool):
+ TITLE = "SocialScan | Username or Email"
+ DESCRIPTION = "Check email address and username availability on online " \
+ "platforms with 100% accuracy"
+ INSTALL_COMMANDS = ["sudo pip install socialscan"]
+ PROJECT_URL = "https://github.com/iojw/socialscan"
+
+ def run(self):
+ name = input(
+ "Enter Username or Emailid (if both then please space between email & username) >> ")
+ subprocess.run(["sudo", "socialscan", f"{name}"])
+
+
+class SocialMediaFinderTools(HackingToolsCollection):
+ TITLE = "SocialMedia Finder"
+ TOOLS = [
+ FacialFind(),
+ FindUser(),
+ Sherlock(),
+ SocialScan()
+ ]
diff --git a/tools/others/web_crawling.py b/tools/others/web_crawling.py
new file mode 100644
index 0000000..8d7989c
--- /dev/null
+++ b/tools/others/web_crawling.py
@@ -0,0 +1,18 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class GoSpider(HackingTool):
+ TITLE = "Gospider"
+ DESCRIPTION = "Gospider - Fast web spider written in Go"
+ INSTALL_COMMANDS = ["sudo go get -u github.com/jaeles-project/gospider"]
+ PROJECT_URL = "https://github.com/jaeles-project/gospider"
+
+ def __init__(self):
+ super(GoSpider, self).__init__(runnable = False)
+
+
+class WebCrawlingTools(HackingToolsCollection):
+ TITLE = "Web crawling"
+ TOOLS = [GoSpider()]
diff --git a/tools/others/wifi_jamming.py b/tools/others/wifi_jamming.py
new file mode 100644
index 0000000..412e915
--- /dev/null
+++ b/tools/others/wifi_jamming.py
@@ -0,0 +1,37 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class WifiJammerNG(HackingTool):
+ TITLE = "WifiJammer-NG"
+ DESCRIPTION = "Continuously jam all wifi clients and access points within range."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/MisterBianco/wifijammer-ng.git",
+ "cd wifijammer-ng;sudo pip3 install -r requirements.txt"
+ ]
+ RUN_COMMANDS = [
+ 'echo "python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]"| boxes | lolcat',
+ "cd wifijammer-ng;sudo python3 wifijammer.py"
+ ]
+ PROJECT_URL = "https://github.com/MisterBianco/wifijammer-ng"
+
+
+class KawaiiDeauther(HackingTool):
+ TITLE = "KawaiiDeauther"
+ DESCRIPTION = "Kawaii Deauther is a pentest toolkit whose goal is to perform \n " \
+ "jam on WiFi clients/routers and spam many fake AP for testing purposes."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/aryanrtm/KawaiiDeauther.git",
+ "cd KawaiiDeauther;sudo bash install.sh"
+ ]
+ RUN_COMMANDS = ["cd KawaiiDeauther;sudo KawaiiDeauther.sh"]
+ PROJECT_URL = "https://github.com/aryanrtm/KawaiiDeauther"
+
+
+class WifiJammingTools(HackingToolsCollection):
+ TITLE = "Wifi Deauthenticate"
+ TOOLS = [
+ WifiJammerNG(),
+ KawaiiDeauther()
+ ]
diff --git a/tools/payload_creator.py b/tools/payload_creator.py
new file mode 100644
index 0000000..22ae29a
--- /dev/null
+++ b/tools/payload_creator.py
@@ -0,0 +1,141 @@
+# coding=utf-8
+import os
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class TheFatRat(HackingTool):
+ TITLE = "The FatRat"
+ DESCRIPTION = "TheFatRat Provides An Easy way to create Backdoors and \n" \
+ "Payload which can bypass most anti-virus"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Screetsec/TheFatRat.git",
+ "cd TheFatRat && sudo chmod +x setup.sh"
+ ]
+ RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"]
+ PROJECT_URL = "https://github.com/Screetsec/TheFatRat"
+
+ def __init__(self):
+ super(TheFatRat, self).__init__([
+ ('Update', self.update),
+ ('Troubleshoot', self.troubleshoot)
+ ])
+
+ def update(self):
+ os.system(
+ "cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
+
+ def troubleshoot(self):
+ os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
+
+
+class Brutal(HackingTool):
+ TITLE = "Brutal"
+ DESCRIPTION = "Brutal is a toolkit to quickly create various payload," \
+ "powershell attack,\nvirus attack and launch listener for " \
+ "a Human Interface Device"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Screetsec/Brutal.git",
+ "cd Brutal && sudo chmod +x Brutal.sh"
+ ]
+ RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"]
+ PROJECT_URL = "https://github.com/Screetsec/Brutal"
+
+ def show_info(self):
+ super(Brutal, self).show_info()
+ print("""
+ [!] Requirement
+ >> Arduino Software (I used v1.6.7)
+ >> TeensyDuino
+ >> Linux udev rules
+ >> Copy and paste the PaensyLib folder inside your Arduino\libraries
+
+ [!] Kindly Visit below link for Installation for Arduino
+ >> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
+ """)
+
+
+class Stitch(HackingTool):
+ TITLE = "Stitch"
+ DESCRIPTION = "Stitch is Cross Platform Python Remote Administrator Tool\n\t" \
+ "[!] Refer Below Link For Wins & MAc Os"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/nathanlopez/Stitch.git",
+ "cd Stitch && sudo pip install -r lnx_requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd Stitch && sudo python main.py"]
+ PROJECT_URL = "https://nathanlopez.github.io/Stitch"
+
+
+class MSFVenom(HackingTool):
+ TITLE = "MSFvenom Payload Creator"
+ DESCRIPTION = "MSFvenom Payload Creator (MSFPC) is a wrapper to generate \n" \
+ "multiple types of payloads, based on users choice.\n" \
+ "The idea is to be as simple as possible (only requiring " \
+ "one input) \nto produce their payload."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/g0tmi1k/msfpc.git",
+ "cd msfpc;sudo chmod +x msfpc.sh"
+ ]
+ RUN_COMMANDS = ["cd msfpc;sudo bash msfpc.sh -h -v"]
+ PROJECT_URL = "https://github.com/g0tmi1k/msfpc"
+
+
+class Venom(HackingTool):
+ TITLE = "Venom Shellcode Generator"
+ DESCRIPTION = "venom 1.0.11 (malicious_server) was build to take " \
+ "advantage of \n apache2 webserver to deliver payloads " \
+ "(LAN) using a fake webpage writen in html"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/r00t-3xp10it/venom.git",
+ "sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh",
+ "sudo ./venom.sh -u"
+ ]
+ RUN_COMMANDS = ["cd venom && sudo ./venom.sh"]
+ PROJECT_URL = "https://github.com/r00t-3xp10it/venom"
+
+
+class Spycam(HackingTool):
+ TITLE = "Spycam"
+ DESCRIPTION = "Script to generate a Win32 payload that takes the webcam " \
+ "image every 1 minute and send it to the attacker"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/thelinuxchoice/spycam.git",
+ "cd spycam && bash install.sh && chmod +x spycam"
+ ]
+ RUN_COMMANDS = ["cd spycam && ./spycam"]
+ PROJECT_URL = "https://github.com/thelinuxchoice/spycam"
+
+
+class MobDroid(HackingTool):
+ TITLE = "Mob-Droid"
+ DESCRIPTION = "Mob-Droid helps you to generate metasploit payloads in " \
+ "easy way\n without typing long commands and save your time"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/kinghacker0/mob-droid.git"]
+ RUN_COMMANDS = ["cd Mob-Droid;sudo python mob-droid.py"]
+ PROJECT_URL = "https://github.com/kinghacker0/Mob-Droid"
+
+
+class Enigma(HackingTool):
+ TITLE = "Enigma"
+ DESCRIPTION = "Enigma is a Multiplatform payload dropper"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UndeadSec/Enigma.git"]
+ RUN_COMMANDS = ["cd Enigma;sudo python3 enigma3.py"]
+ PROJECT_URL = "https://github.com/UndeadSec/Enigma"
+
+
+class PayloadCreatorTools(HackingToolsCollection):
+ TITLE = "Payload creation tools"
+ TOOLS = [
+ TheFatRat(),
+ Brutal(),
+ Stitch(),
+ MSFVenom(),
+ Venom(),
+ Spycam(),
+ MobDroid(),
+ Enigma()
+ ]
diff --git a/tools/phising_attack.py b/tools/phising_attack.py
new file mode 100644
index 0000000..ae545a9
--- /dev/null
+++ b/tools/phising_attack.py
@@ -0,0 +1,130 @@
+# coding=utf-8
+import os
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Setoolkit(HackingTool):
+ TITLE = "Setoolkit"
+ DESCRIPTION = "The Social-Engineer Toolkit is an open-source penetration\n" \
+ "testing framework designed for social engineering"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/trustedsec/social-engineer-toolkit.git",
+ "sudo python social-engineer-toolkit/setup.py"
+ ]
+ RUN_COMMANDS = ["sudo setoolkit"]
+ PROJECT_URL = "https://github.com/trustedsec/social-engineer-toolkit"
+
+
+class SocialFish(HackingTool):
+ TITLE = "SocialFish"
+ DESCRIPTION = "Automated Phishing Tool & Information Collector"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y",
+ "cd SocialFish && sudo python3 -m pip install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd SocialFish && sudo python3 SocialFish.py root pass"]
+ PROJECT_URL = "https://github.com/UndeadSec/SocialFish"
+
+
+class HiddenEye(HackingTool):
+ TITLE = "HiddenEye"
+ DESCRIPTION = "Modern Phishing Tool With Advanced Functionality And " \
+ "Multiple Tunnelling Services \n" \
+ "\t [!]https://github.com/DarkSecDevelopers/HiddenEye"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye",
+ "cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok"
+ ]
+ RUN_COMMANDS = ["cd HiddenEye;sudo python3 HiddenEye.py"]
+ PROJECT_URL = "https://github.com/DarkSecDevelopers/HiddenEye"
+
+
+class Evilginx2(HackingTool):
+ TITLE = "Evilginx2"
+ DESCRIPTION = "evilginx2 is a man-in-the-middle attack framework used " \
+ "for phishing login credentials along with session cookies,\n" \
+ "which in turn allows to bypass 2-factor authentication protection.\n\n\t " \
+ "[+]Make sure you have installed GO of version at least 1.14.0 \n" \
+ "[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t " \
+ "[+]export GOPATH=$HOME/go \n " \
+ "[+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n" \
+ "[+]Then load it with source ~/.profiles."
+ INSTALL_COMMANDS = [
+ "sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2",
+ "cd $GOPATH/src/github.com/kgretzky/evilginx2;make",
+ "sudo make install;sudo evilginx"
+ ]
+ RUN_COMMANDS = ["sudo evilginx"]
+ PROJECT_URL = "https://github.com/kgretzky/evilginx2"
+
+
+class ISeeYou(HackingTool):
+ TITLE = "I-See_You(Get Location using phishing attack)"
+ DESCRIPTION = "[!] ISeeYou is a tool to find Exact Location of Victom By" \
+ " User SocialEngineering or Phishing Engagment..\n" \
+ "[!] Users can expose their local servers to the Internet " \
+ "and decode the location coordinates by looking at the log file"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Viralmaniar/I-See-You.git",
+ "cd I-See-You && sudo chmod u+x ISeeYou.sh"
+ ]
+ RUN_COMMANDS = ["cd I-See-You && sudo bash ISeeYou.sh"]
+ PROJECT_URL = "https://github.com/Viralmaniar/I-See-You"
+
+
+class SayCheese(HackingTool):
+ TITLE = "SayCheese (Grab target's Webcam Shots)"
+ DESCRIPTION = "Take webcam shots from target just sending a malicious link"
+ INSTALL_COMMANDS = ["sudo git clone https://github.com/hangetzzu/saycheese"]
+ RUN_COMMANDS = ["cd saycheese && sudo bash saycheese.sh"]
+ PROJECT_URL = "https://github.com/hangetzzu/saycheese"
+
+
+class QRJacking(HackingTool):
+ TITLE = "QR Code Jacking"
+ DESCRIPTION = "QR Code Jacking (Any Website)"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt-get install scrot"]
+ RUN_COMMANDS = ["cd ohmyqr && sudo bash ohmyqr.sh"]
+ PROJECT_URL = "https://github.com/cryptedwolf/ohmyqr"
+
+
+class ShellPhish(HackingTool):
+ TITLE = "ShellPhish"
+ DESCRIPTION = "Fhishing Tool for 18 social media"
+ INSTALL_COMMANDS = ["git clone https://github.com/An0nUD4Y/shellphish.git"]
+ RUN_COMMANDS = ["cd shellphish;sudo bash shellphish.sh"]
+ PROJECT_URL = "https://github.com/An0nUD4Y/shellphish"
+
+
+class BlackPhish(HackingTool):
+ TITLE = "BlackPhish"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/iinc0gnit0/BlackPhish.git",
+ "cd BlackPhish;sudo bash install.sh"
+ ]
+ RUN_COMMANDS = ["cd BlackPhish;sudo python3 blackphish.py"]
+ PROJECT_URL = "https://github.com/iinc0gnit0/BlackPhish"
+
+ def __init__(self):
+ super(BlackPhish, self).__init__([('Update', self.update)])
+
+ def update(self):
+ os.system("cd BlackPhish;sudo bash update.sh")
+
+
+class PhishingAttackTools(HackingToolsCollection):
+ TITLE = "Phishing attack tools"
+ TOOLS = [
+ Setoolkit(),
+ SocialFish(),
+ HiddenEye(),
+ Evilginx2(),
+ ISeeYou(),
+ SayCheese(),
+ QRJacking(),
+ ShellPhish(),
+ BlackPhish()
+ ]
diff --git a/tools/post_exploitation.py b/tools/post_exploitation.py
new file mode 100644
index 0000000..3d9791f
--- /dev/null
+++ b/tools/post_exploitation.py
@@ -0,0 +1,44 @@
+# coding=utf-8
+import os
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Vegile(HackingTool):
+ TITLE = "Vegile - Ghost In The Shell"
+ DESCRIPTION = "This tool will set up your backdoor/rootkits when " \
+ "backdoor is already setup it will be \n" \
+ "hidden your specific process,unlimited your session in " \
+ "metasploit and transparent."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Screetsec/Vegile.git",
+ "cd Vegile && sudo chmod +x Vegile"
+ ]
+ RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
+ PROJECT_URL = "https://github.com/Screetsec/Vegile"
+
+ def before_run(self):
+ os.system('echo "You can Use Command: \n'
+ '[!] Vegile -i / --inject [backdoor/rootkit] \n'
+ '[!] Vegile -u / --unlimited [backdoor/rootkit] \n'
+ '[!] Vegile -h / --help"|boxes -d parchment')
+
+
+class ChromeKeyLogger(HackingTool):
+ TITLE = "Chrome Keylogger"
+ DESCRIPTION = "Hera Chrome Keylogger"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UndeadSec/HeraKeylogger.git",
+ "cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
+ PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger"
+
+
+class PostExploitationTools(HackingToolsCollection):
+ TITLE = "Post exploitation tools"
+ TOOLS = [
+ Vegile(),
+ ChromeKeyLogger()
+ ]
diff --git a/tools/remote_administration.py b/tools/remote_administration.py
new file mode 100644
index 0000000..b5d7e0e
--- /dev/null
+++ b/tools/remote_administration.py
@@ -0,0 +1,36 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Stitch(HackingTool):
+ TITLE = "Stitch"
+ DESCRIPTION = "Stitch is a cross platform python framework.\n" \
+ "which allows you to build custom payloads\n" \
+ "For Windows, Mac and Linux."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/nathanlopez/Stitch.git",
+ "cd Stitch;sudo pip install -r lnx_requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd Stitch;python main.py"]
+ PROJECT_URL = "https://github.com/nathanlopez/Stitch"
+
+
+class Pyshell(HackingTool):
+ TITLE = "Pyshell"
+ DESCRIPTION = "Pyshell is a Rat Tool that can be able to download & upload " \
+ "files,\n Execute OS Command and more.."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/khalednassar702/Pyshell.git;"
+ "sudo pip install pyscreenshot python-nmap requests"
+ ]
+ RUN_COMMANDS = ["cd Pyshell;./Pyshell"]
+ PROJECT_URL = "https://github.com/knassar702/pyshell"
+
+
+class RemoteAdministrationTools(HackingToolsCollection):
+ TITLE = "Remote Administrator Tools (RAT)"
+ TOOLS = [
+ Stitch(),
+ Pyshell()
+ ]
diff --git a/tools/reverse_engineering.py b/tools/reverse_engineering.py
new file mode 100644
index 0000000..9972334
--- /dev/null
+++ b/tools/reverse_engineering.py
@@ -0,0 +1,56 @@
+# coding=utf-8
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class AndroGuard(HackingTool):
+ TITLE = "Androguard"
+ DESCRIPTION = "Androguard is a Reverse engineering, Malware and goodware " \
+ "analysis of Android applications and more"
+ INSTALL_COMMANDS = ["sudo pip install -U androguard"]
+ PROJECT_URL = "https://github.com/androguard/androguard "
+
+ def __init__(self):
+ super(AndroGuard, self).__init__(runnable = False)
+
+
+class Apk2Gold(HackingTool):
+ TITLE = "Apk2Gold"
+ DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/lxdvs/apk2gold.git",
+ "cd apk2gold;sudo bash make.sh"
+ ]
+ PROJECT_URL = "https://github.com/lxdvs/apk2gold "
+
+ def run(self):
+ uinput = input("Enter (.apk) File >> ")
+ subprocess.run(["sudo", "apk2gold", uinput])
+
+
+class Jadx(HackingTool):
+ TITLE = "JadX"
+ DESCRIPTION = "Jadx is Dex to Java decompiler.\n" \
+ "[*] decompile Dalvik bytecode to java classes from APK, dex," \
+ " aar and zip files\n" \
+ "[*] decode AndroidManifest.xml and other resources from " \
+ "resources.arsc"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/skylot/jadx.git",
+ "cd jadx;./gradlew dist"
+ ]
+ PROJECT_URL = "https://github.com/skylot/jadx"
+
+ def __init__(self):
+ super(Jadx, self).__init__(runnable = False)
+
+
+class ReverseEngineeringTools(HackingToolsCollection):
+ TITLE = "Reverse engineering tools"
+ TOOLS = [
+ AndroGuard(),
+ Apk2Gold(),
+ Jadx()
+ ]
diff --git a/tools/sql_tools.py b/tools/sql_tools.py
new file mode 100644
index 0000000..fb13ff4
--- /dev/null
+++ b/tools/sql_tools.py
@@ -0,0 +1,117 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Sqlmap(HackingTool):
+ TITLE = "Sqlmap tool"
+ DESCRIPTION = "sqlmap is an open source penetration testing tool that " \
+ "automates the process of \n" \
+ "detecting and exploiting SQL injection flaws and taking " \
+ "over of database servers \n " \
+ "[!] python sqlmap.py -u [] --batch --banner \n " \
+ "More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
+ INSTALL_COMMANDS = [
+ "sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
+ PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
+
+ def __init__(self):
+ super(Sqlmap, self).__init__(runnable = False)
+
+
+class NoSqlMap(HackingTool):
+ TITLE = "NoSqlMap"
+ DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \
+ "audit for as well as automate injection attacks and exploit.\n " \
+ "\033[91m " \
+ "[*] Please Install MongoDB \n "
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/codingo/NoSQLMap.git",
+ "sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install"
+ ]
+ RUN_COMMANDS = ["python NoSQLMap"]
+ PROJECT_URL = "https://github.com/codingo/NoSQLMap"
+
+
+class SQLiScanner(HackingTool):
+ TITLE = "Damn Small SQLi Scanner"
+ DESCRIPTION = "Damn Small SQLi Scanner (DSSS) is a fully functional SQL " \
+ "injection\nvulnerability scanner also supporting GET and " \
+ "POST parameters.\n" \
+ "[*]python3 dsss.py -h[help] | -u[URL]"
+ INSTALL_COMMANDS = ["git clone https://github.com/stamparm/DSSS.git"]
+ PROJECT_URL = "https://github.com/stamparm/DSSS"
+
+ def __init__(self):
+ super(SQLiScanner, self).__init__(runnable = False)
+
+
+class Explo(HackingTool):
+ TITLE = "Explo"
+ DESCRIPTION = "Explo is a simple tool to describe web security issues " \
+ "in a human and machine readable format.\n " \
+ "Usage:- \n " \
+ "[1] explo [--verbose|-v] testcase.yaml \n " \
+ "[2] explo [--verbose|-v] examples/*.yaml"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/dtag-dev-sec/explo.git",
+ "cd explo;sudo python setup.py install"
+ ]
+ PROJECT_URL = "https://github.com/dtag-dev-sec/explo"
+
+ def __init__(self):
+ super(Explo, self).__init__(runnable = False)
+
+
+class Blisqy(HackingTool):
+ TITLE = "Blisqy - Exploit Time-based blind-SQL injection"
+ DESCRIPTION = "Blisqy is a tool to aid Web Security researchers to find " \
+ "Time-based Blind SQL injection \n on HTTP Headers and also " \
+ "exploitation of the same vulnerability.\n " \
+ "For Usage >> \n"
+ INSTALL_COMMANDS = ["git clone https://github.com/JohnTroony/Blisqy.git"]
+ PROJECT_URL = "https://github.com/JohnTroony/Blisqy"
+
+ def __init__(self):
+ super(Blisqy, self).__init__(runnable = False)
+
+
+class Leviathan(HackingTool):
+ TITLE = "Leviathan - Wide Range Mass Audit Toolkit"
+ DESCRIPTION = "Leviathan is a mass audit toolkit which has wide range " \
+ "service discovery,\nbrute force, SQL injection detection " \
+ "and running custom exploit capabilities. \n " \
+ "[*] It Requires API Keys \n " \
+ "More Usage [!] https://github.com/utkusen/leviathan/wiki"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/leviathan-framework/leviathan.git",
+ "cd leviathan;sudo pip install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd leviathan;python leviathan.py"]
+ PROJECT_URL = "https://github.com/leviathan-framework/leviathan"
+
+
+class SQLScan(HackingTool):
+ TITLE = "SQLScan"
+ DESCRIPTION = "sqlscan is quick web scanner for find an sql inject point." \
+ " not for educational, this is for hacking."
+ INSTALL_COMMANDS = [
+ "sudo apt install php php-bz2 php-curl php-mbstring curl",
+ "sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan",
+ "chmod +x /usr/local/bin/sqlscan"
+ ]
+ RUN_COMMANDS = ["sudo sqlscan"]
+ PROJECT_URL = "https://github.com/Cvar1984/sqlscan"
+
+
+class SqlInjectionTools(HackingToolsCollection):
+ TITLE = "SQL Injection Tools"
+ TOOLS = [
+ Sqlmap(),
+ NoSqlMap(),
+ SQLiScanner(),
+ Explo(),
+ Blisqy(),
+ Leviathan(),
+ SQLScan()
+ ]
diff --git a/tools/steganography.py b/tools/steganography.py
new file mode 100644
index 0000000..1c7e039
--- /dev/null
+++ b/tools/steganography.py
@@ -0,0 +1,68 @@
+# coding=utf-8
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+from core import validate_input
+
+
+class SteganoHide(HackingTool):
+ TITLE = "SteganoHide"
+ INSTALL_COMMANDS = ["sudo apt-get install steghide -y"]
+
+ def run(self):
+ choice_run = input(
+ "[1] Hide\n"
+ "[2] Extract\n"
+ "[99]Cancel\n"
+ ">> ")
+ choice_run = validate_input(choice_run, [1, 2, 99])
+ if choice_run is None:
+ print("Please choose a valid input")
+ return self.run()
+
+ if choice_run == 99:
+ return
+
+ if choice_run == 1:
+ file_hide = input("Enter Filename you want to Embed (1.txt) >> ")
+ file_to_be_hide = input("Enter Cover Filename(test.jpeg) >> ")
+ subprocess.run(
+ ["steghide", "embed", "-cf", file_to_be_hide, "-ef", file_hide])
+
+ elif choice_run == "2":
+ from_file = input("Enter Filename From Extract Data >> ")
+ subprocess.run(["steghide", "extract", "-sf", from_file])
+
+
+class StegnoCracker(HackingTool):
+ TITLE = "StegnoCracker"
+ DESCRIPTION = "SteganoCracker is a tool that uncover hidden data inside " \
+ "files\n using brute-force utility"
+ INSTALL_COMMANDS = [
+ "pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall"]
+
+ def run(self):
+ filename = input("Enter Filename:- ")
+ passfile = input("Enter Wordlist Filename:- ")
+ subprocess.run(["stegcracker", filename, passfile])
+
+
+class Whitespace(HackingTool):
+ TITLE = "Whitespace"
+ DESCRIPTION = "Use whitespace and unicode chars for steganography"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/beardog108/snow10.git",
+ "sudo chmod -R 755 snow10"
+ ]
+ RUN_COMMANDS = ["cd snow10 && firefox index.html"]
+ PROJECT_URL = "https://github.com/beardog108/snow10"
+
+
+class SteganographyTools(HackingToolsCollection):
+ TITLE = "Steganograhy tools"
+ TOOLS = [
+ SteganoHide(),
+ StegnoCracker(),
+ Whitespace()
+ ]
diff --git a/tools/tool_manager.py b/tools/tool_manager.py
new file mode 100644
index 0000000..f0fa2aa
--- /dev/null
+++ b/tools/tool_manager.py
@@ -0,0 +1,66 @@
+# coding=utf-8
+import os
+from time import sleep
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class UpdateTool(HackingTool):
+ TITLE = "Update Tool or System"
+ DESCRIPTION = "Update Tool or System"
+
+ def __init__(self):
+ super(UpdateTool, self).__init__([
+ ("Update System", self.update_sys),
+ ("Update Hackingtool", self.update_ht)
+ ], installable = False, runnable = False)
+
+ def update_sys(self):
+ os.system("sudo apt update && sudo apt full-upgrade -y")
+ os.system(
+ "sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl")
+ os.system("sudo apt-get install python3-pip")
+
+ def update_ht(self):
+ os.system("sudo chmod +x /etc/;"
+ "sudo chmod +x /usr/share/doc;"
+ "sudo rm -rf /usr/share/doc/hackingtool/;"
+ "cd /etc/;"
+ "sudo rm -rf /etc/hackingtool/;"
+ "mkdir hackingtool;"
+ "cd hackingtool;"
+ "git clone https://github.com/Z4nzu/hackingtool.git;"
+ "cd hackingtool;"
+ "sudo chmod +x install.sh;"
+ "./install.sh")
+
+
+class UninstallTool(HackingTool):
+ TITLE = "Uninstall HackingTool"
+ DESCRIPTION = "Uninstall HackingTool"
+
+ def __init__(self):
+ super(UninstallTool, self).__init__([
+ ('Uninstall', self.uninstall)
+ ], installable = False, runnable = False)
+
+ def uninstall(self):
+ print("hackingtool started to uninstall..\n")
+ sleep(1)
+ os.system("sudo chmod +x /etc/;"
+ "sudo chmod +x /usr/share/doc;"
+ "sudo rm -rf /usr/share/doc/hackingtool/;"
+ "cd /etc/;"
+ "sudo rm -rf /etc/hackingtool/;")
+ print("\nHackingtool Successfully Uninstalled..")
+ print("Happy Hacking..!!")
+ sleep(1)
+
+
+class ToolManager(HackingToolsCollection):
+ TITLE = "Update or Uninstall | Hackingtool"
+ TOOLS = [
+ UpdateTool(),
+ UninstallTool()
+ ]
diff --git a/tools/webattack.py b/tools/webattack.py
new file mode 100644
index 0000000..b4e1b50
--- /dev/null
+++ b/tools/webattack.py
@@ -0,0 +1,113 @@
+# coding=utf-8
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Web2Attack(HackingTool):
+ TITLE = "Web2Attack"
+ DESCRIPTION = "Web hacking framework with tools, exploits by python"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/santatic/web2attack.git"]
+ RUN_COMMANDS = ["cd web2attack && sudo bash w2aconsole"]
+ PROJECT_URL = "https://github.com/santatic/web2attack"
+
+
+class Skipfish(HackingTool):
+ TITLE = "Skipfish"
+ DESCRIPTION = "Skipfish β Fully automated, active web application " \
+ "security reconnaissance tool \n " \
+ "Usage: skipfish -o [FolderName] targetip/site"
+ RUN_COMMANDS = [
+ "sudo skipfish -h",
+ 'echo "skipfish -o [FolderName] targetip/site"|boxes -d headline | lolcat'
+ ]
+
+ def __init__(self):
+ super(Skipfish, self).__init__(installable = False)
+
+
+class SubDomainFinder(HackingTool):
+ TITLE = "SubDomain Finder"
+ DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
+ "subdomains of websites using OSINT \n " \
+ "Usage:\n\t" \
+ "[1] python sublist3r.py -d example.com \n" \
+ "[2] python sublist3r.py -d example.com -p 80,443"
+ INSTALL_COMMANDS = [
+ "sudo pip install requests argparse dnspython",
+ "sudo git clone https://github.com/aboul3la/Sublist3r.git",
+ "cd Sublist3r && sudo pip install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"]
+ PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
+
+
+class CheckURL(HackingTool):
+ TITLE = "CheckURL"
+ DESCRIPTION = "Detect evil urls that uses IDN Homograph Attack.\n\t" \
+ "[!] python3 checkURL.py --url google.com"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UndeadSec/checkURL.git"]
+ RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"]
+ PROJECT_URL = "https://github.com/UndeadSec/checkURL"
+
+
+class Blazy(HackingTool):
+ TITLE = "Blazy(Also Find ClickJacking)"
+ DESCRIPTION = "Blazy is a modern login page bruteforcer"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UltimateHackers/Blazy.git",
+ "cd Blazy && sudo pip install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"]
+ PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
+
+
+class SubDomainTakeOver(HackingTool):
+ TITLE = "Sub-Domain TakeOver"
+ DESCRIPTION = "Sub-domain takeover vulnerability occur when a sub-domain " \
+ "\n (subdomain.example.com) is pointing to a service " \
+ "(e.g: GitHub, AWS/S3,..)\n" \
+ "that has been removed or deleted.\n" \
+ "Usage:python3 takeover.py -d www.domain.com -v"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/m4ll0k/takeover.git",
+ "cd takeover;sudo python3 setup.py install"
+ ]
+ PROJECT_URL = "https://github.com/m4ll0k/takeover"
+
+ def __init__(self):
+ super(SubDomainTakeOver, self).__init__(runnable = False)
+
+
+class Dirb(HackingTool):
+ TITLE = "Dirb"
+ DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
+ "(and/or hidden) Web Objects.\n" \
+ "It basically works by launching a dictionary based " \
+ "attack against \n a web server and analizing the response."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
+ "cd dirb;sudo ./configure;make"
+ ]
+ PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
+
+ def run(self):
+ uinput = input("Enter Url >> ")
+ subprocess.run(["sudo", "dirb", uinput])
+
+
+class WebAttackTools(HackingToolsCollection):
+ TITLE = "Web Attack tools"
+ DESCRIPTION = ""
+ TOOLS = [
+ Web2Attack(),
+ Skipfish(),
+ SubDomainFinder(),
+ CheckURL(),
+ Blazy(),
+ SubDomainTakeOver(),
+ Dirb()
+ ]
diff --git a/tools/wireless_attack_tools.py b/tools/wireless_attack_tools.py
new file mode 100644
index 0000000..f508bdd
--- /dev/null
+++ b/tools/wireless_attack_tools.py
@@ -0,0 +1,155 @@
+# coding=utf-8
+import os
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class WIFIPumpkin(HackingTool):
+ TITLE = "WiFi-Pumpkin"
+ DESCRIPTION = "The WiFi-Pumpkin is a rogue AP framework to easily create " \
+ "these fake networks\n" \
+ "all while forwarding legitimate traffic to and from the " \
+ "unsuspecting target."
+ INSTALL_COMMANDS = [
+ "sudo apt install libssl-dev libffi-dev build-essential",
+ "sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
+ "chmod -R 755 wifipumpkin3 && cd wifipumpkin3",
+ "sudo apt install python3-pyqt5",
+ "sudo python3 setup.py install"
+ ]
+ RUN_COMMANDS = ["sudo wifipumpkin3"]
+ PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
+
+
+class pixiewps(HackingTool):
+ TITLE = "pixiewps"
+ DESCRIPTION = "Pixiewps is a tool written in C used to bruteforce offline " \
+ "the WPS pin\n " \
+ "exploiting the low or non-existing entropy of some Access " \
+ "Points, the so-called pixie dust attack"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
+ "cd pixiewps*/ && make",
+ "cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh"
+ ]
+ PROJECT_URL = "https://github.com/wiire/pixiewps"
+
+ def run(self):
+ os.system(
+ 'echo "'
+ '1.> Put your interface into monitor mode using '
+ '\'airmon-ng start {wireless interface}\n'
+ '2.> wash -i {monitor-interface like mon0}\'\n'
+ '3.> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f"'
+ '| boxes -d boy')
+ print("You Have To Run Manually By USing >>pixiewps -h ")
+
+
+class BluePot(HackingTool):
+ TITLE = "Bluetooth Honeypot GUI Framework"
+ DESCRIPTION = "You need to have at least 1 bluetooh receiver " \
+ "(if you have many it will work with those, too).\n" \
+ "You must install/libbluetooth-dev on " \
+ "Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
+ INSTALL_COMMANDS = [
+ "wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz "
+ "&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar"
+ ]
+ RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"]
+ PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
+
+
+class Fluxion(HackingTool):
+ TITLE = "Fluxion"
+ DESCRIPTION = "Fluxion is a wifi key cracker using evil twin attack..\n" \
+ "you need a wireless adaptor for this tool"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/thehackingsage/Fluxion.git",
+ "cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh",
+ "cd .. ; sudo chmod +x fluxion.sh"
+ ]
+ RUN_COMMANDS = ["cd Fluxion;sudo bash fluxion.sh"]
+ PROJECT_URL = "https://github.com/thehackingsage/Fluxion"
+
+
+class Wifiphisher(HackingTool):
+ TITLE = "Wifiphisher"
+ DESCRIPTION = """
+ Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
+ Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
+ targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
+ connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
+ victim stations with malware..\n
+ For More Details Visit >> https://github.com/wifiphisher/wifiphisher
+ """
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/wifiphisher/wifiphisher.git",
+ "cd wifiphisher;sudo python3 setup.py install"
+ ]
+ RUN_COMMANDS = ["cd wifiphisher;sudo wifiphisher"]
+ PROJECT_URL = "https://github.com/wifiphisher/wifiphisher"
+
+
+class Wifite(HackingTool):
+ TITLE = "Wifite"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/derv82/wifite2.git",
+ "cd wifite2 && sudo python3 setup.py install"
+ ";sudo pip3 install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd wifite2; sudo wifite"]
+ PROJECT_URL = "https://github.com/derv82/wifite2"
+
+
+class EvilTwin(HackingTool):
+ TITLE = "EvilTwin"
+ DESCRIPTION = "Fakeap is a script to perform Evil Twin Attack, by getting" \
+ " credentials using a Fake page and Fake Access Point"
+ INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"]
+ RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
+ PROJECT_URL = "https://github.com/Z4nzu/fakeap"
+
+
+class Fastssh(HackingTool):
+ TITLE = "Fastssh"
+ DESCRIPTION = "Fastssh is an Shell Script to perform multi-threaded scan" \
+ " \n and brute force attack against SSH protocol using the " \
+ "most commonly credentials."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && sudo chmod +x fastssh.sh",
+ "sudo apt-get install -y sshpass netcat"
+ ]
+ RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
+ PROJECT_URL = "https://github.com/Z4nzu/fastssh"
+
+
+class Howmanypeople(HackingTool):
+ TITLE = "Howmanypeople"
+ DESCRIPTION = "Count the number of people around you by monitoring wifi " \
+ "signals.\n" \
+ "[@] WIFI ADAPTER REQUIRED* \n[*]" \
+ "It may be illegal to monitor networks for MAC addresses, \n" \
+ "especially on networks that you do not own. " \
+ "Please check your country's laws"
+ INSTALL_COMMANDS = [
+ "sudo apt-get install tshark"
+ ";sudo pip install howmanypeoplearearound"
+ ]
+ RUN_COMMANDS = ["sudo howmanypeoplearearound"]
+
+
+class WirelessAttackTools(HackingToolsCollection):
+ TITLE = "Wireless attack tools"
+ DESCRIPTION = ""
+ TOOLS = [
+ WIFIPumpkin(),
+ pixiewps(),
+ BluePot(),
+ Fluxion(),
+ Wifiphisher(),
+ Wifite(),
+ EvilTwin(),
+ Fastssh(),
+ Howmanypeople()
+ ]
diff --git a/tools/wordlist_generator.py b/tools/wordlist_generator.py
new file mode 100644
index 0000000..6ea3760
--- /dev/null
+++ b/tools/wordlist_generator.py
@@ -0,0 +1,59 @@
+# coding=utf-8
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Cupp(HackingTool):
+ TITLE = "Cupp"
+ DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
+ "and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
+ INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
+ PROJECT_URL = "https://github.com/Mebus/cupp.git"
+
+ def __init__(self):
+ super(Cupp, self).__init__(runnable = False)
+
+
+class WlCreator(HackingTool):
+ TITLE = "WordlistCreator"
+ DESCRIPTION = "WlCreator is a C program that can create all possibilities" \
+ " of passwords,\n and you can choose Lenght, Lowercase, " \
+ "Capital, Numbers and Special Chars"
+ INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/wlcreator.git"]
+ RUN_COMMANDS = [
+ "cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5"]
+ PROJECT_URL = "https://github.com/Z4nzu/wlcreator"
+
+
+class GoblinWordGenerator(HackingTool):
+ TITLE = "Goblin WordGenerator"
+ DESCRIPTION = "Goblin WordGenerator"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git"]
+ RUN_COMMANDS = ["cd GoblinWordGenerator && python3 goblin.py"]
+ PROJECT_URL = "https://github.com/UndeadSec/GoblinWordGenerator.git"
+
+
+class showme(HackingTool):
+ TITLE = "Password list (1.4 Billion Clear Text Password)"
+ DESCRIPTION = "This tool allows you to perform OSINT and reconnaissance on " \
+ "an organisation or an individual. It allows one to search " \
+ "1.4 Billion clear text credentials which was dumped as " \
+ "part of BreachCompilation leak. This database makes " \
+ "finding passwords faster and easier than ever before."
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git",
+ "cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd SMWYG-Show-Me-What-You-Got && python SMWYG.py"]
+ PROJECT_URL = "https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got"
+
+
+class WordlistGeneratorTools(HackingToolsCollection):
+ TITLE = "Wordlist Generator"
+ TOOLS = [
+ Cupp(),
+ WlCreator(),
+ GoblinWordGenerator(),
+ showme()
+ ]
diff --git a/tools/xss_attack.py b/tools/xss_attack.py
new file mode 100644
index 0000000..1797923
--- /dev/null
+++ b/tools/xss_attack.py
@@ -0,0 +1,145 @@
+# coding=utf-8
+import os
+import subprocess
+
+from core import HackingTool
+from core import HackingToolsCollection
+
+
+class Dalfox(HackingTool):
+ TITLE = "DalFox(Finder of XSS)"
+ DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
+ INSTALL_COMMANDS = [
+ "sudo apt-get install golang",
+ "sudo git clone https://github.com/hahwul/dalfox",
+ "cd dalfox;go install"
+ ]
+ RUN_COMMANDS = [
+ "~/go/bin/dalfox",
+ 'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"'
+ ]
+ PROJECT_URL = "https://github.com/hahwul/dalfox"
+
+
+class XSSPayloadGenerator(HackingTool):
+ TITLE = "XSS Payload Generator"
+ DESCRIPTION = "XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/capture0x/XSS-LOADER.git",
+ "cd XSS-LOADER;sudo pip3 install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd XSS-LOADER;sudo python3 payloader.py"]
+ PROJECT_URL = "https://github.com/capture0x/XSS-LOADER.git"
+
+
+class XSSFinder(HackingTool):
+ TITLE = "Extended XSS Searcher and Finder"
+ DESCRIPTION = "Extended XSS Searcher and Finder"
+ INSTALL_COMMANDS = [
+ "git glone https://github.com/Damian89/extended-xss-search.git"]
+ PROJECT_URL = "https://github.com/Damian89/extended-xss-search"
+
+ def after_install(self):
+ print("""\033[96m
+ Follow This Steps After Installation:-
+ \033[31m [*] Go To extended-xss-search directory,
+ and Rename the example.app-settings.conf to app-settings.conf
+ """)
+ input("Press ENTER to continue")
+
+ def run(self):
+ print("""\033[96m
+ You have To Add Links to scan
+ \033[31m[!] Go to extended-xss-search
+ [*] config/urls-to-test.txt
+ [!] python3 extended-xss-search.py
+ """)
+
+
+class XSSFreak(HackingTool):
+ TITLE = "XSS-Freak"
+ DESCRIPTION = "XSS-Freak is an XSS scanner fully written in python3 from scratch"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/PR0PH3CY33/XSS-Freak.git",
+ "cd XSS-Freak;sudo pip3 install -r requirements.txt"
+ ]
+ RUN_COMMANDS = ["cd XSS-Freak;sudo python3 XSS-Freak.py"]
+ PROJECT_URL = "https://github.com/PR0PH3CY33/XSS-Freak"
+
+
+class XSpear(HackingTool):
+ TITLE = "XSpear"
+ DESCRIPTION = "XSpear is XSS Scanner on ruby gems"
+ INSTALL_COMMANDS = ["gem install XSpear"]
+ RUN_COMMANDS = ["XSpear -h"]
+ PROJECT_URL = "https://github.com/hahwul/XSpear"
+
+
+class XSSCon(HackingTool):
+ TITLE = "XSSCon"
+ INSTALL_COMMANDS = [
+ "git clone https://github.com/menkrep1337/XSSCon.git",
+ "sudo chmod 755 -R XSSCon"
+ ]
+ PROJECT_URL = "https://github.com/menkrep1337/XSSCon"
+
+ def run(self):
+ website = input("Enter Website >> ")
+ os.system("cd XSSCon;")
+ subprocess.run(["python3", "xsscon.py", "-u", website])
+
+
+class XanXSS(HackingTool):
+ TITLE = "XanXSS"
+ DESCRIPTION = "XanXSS is a reflected XSS searching tool\n " \
+ "that creates payloads based from templates"
+ INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"]
+ PROJECT_URL = "https://github.com/Ekultek/XanXSS"
+
+ def run(self):
+ os.system("cd XanXSS ;python xanxss.py -h")
+ print("\033[96m You Have to run it manually By Using\n"
+ " [!]python xanxss.py [Options]")
+
+
+class XSSStrike(HackingTool):
+ TITLE = "Advanced XSS Detection Suite"
+ DESCRIPTION = "XSStrike is a python script designed to detect and exploit XSS vulnerabilites."
+ INSTALL_COMMANDS = [
+ "sudo rm -rf XSStrike",
+ "git clone https://github.com/UltimateHackers/XSStrike.git "
+ "&& cd XSStrike && pip install -r requirements.txt"
+ ]
+ PROJECT_URL = "https://github.com/UltimateHackers/XSStrike"
+
+ def __init__(self):
+ super(XSSStrike, self).__init__(runnable = False)
+
+
+class RVuln(HackingTool):
+ TITLE = "RVuln"
+ DESCRIPTION = "RVuln is multi-threaded and Automated Web Vulnerability " \
+ "Scanner written in Rust"
+ INSTALL_COMMANDS = [
+ "sudo git clone https://github.com/iinc0gnit0/RVuln.git;"
+ "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
+ "source $HOME/.cargo/env",
+ "sudo apt install openssl-dev;sudo cp -r RVuln/ /usr/bin"
+ ]
+ RUN_COMMANDS = ["RVuln"]
+ PROJECT_URL = "https://github.com/iinc0gnit0/RVuln"
+
+
+class XSSAttackTools(HackingToolsCollection):
+ TITLE = "XSS Attack Tools"
+ TOOLS = [
+ Dalfox(),
+ XSSPayloadGenerator(),
+ XSSFinder(),
+ XSSFreak(),
+ XSpear(),
+ XSSCon(),
+ XanXSS(),
+ XSSStrike(),
+ RVuln()
+ ]
diff --git a/update.sh b/update.sh
new file mode 100644
index 0000000..b932440
--- /dev/null
+++ b/update.sh
@@ -0,0 +1,53 @@
+echo "βββββββββββ βββββββ ββββββββββββββ βββ ";
+echo "βββββββββββ ββββββββ ββββββββββββββ βββ ";
+echo " βββββ ββββββββββββββ βββ βββββ βββ βββ ";
+echo " βββββ ββββββββββββββββββ βββββ βββ βββ ";
+echo "ββββββββ ββββββ βββββββββββββββββββββββ ";
+echo "ββββββββ ββββββ βββββββββββββ βββββββ ";
+echo " ";
+
+clear
+
+sudo chmod +x /etc/
+
+clear
+
+sudo chmod +x /usr/share/doc
+
+clear
+
+sudo rm -rf /usr/share/doc/hackingtool/
+
+clear
+
+cd /etc/
+
+clear
+
+sudo rm -rf /etc/hackingtool
+
+clear
+
+mkdir hackingtool
+
+clear
+
+cd hackingtool
+
+clear
+
+git clone https://github.com/Z4nzu/hackingtool.git
+
+clear
+
+cd hackingtool
+
+clear
+
+sudo chmod +x install.sh
+
+clear
+
+./install.sh
+
+clear