diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..4e8425c --- /dev/null +++ b/LICENSE @@ -0,0 +1,21 @@ +MIT License + +Copyright (c) 2020 Mr.Z4nzu + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/README.md b/README.md index 11c62a1..441ce3c 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,243 @@ -# Hacking.Tools -ALL IN ONE Hacking Tool For Hackers +### All in One Hacking tool For HackersπŸ₯‡ +![](https://img.shields.io/github/license/Z4nzu/hackingtool) +![](https://img.shields.io/github/issues/Z4nzu/hackingtool) +![](https://img.shields.io/github/issues-closed/Z4nzu/hackingtool) +![](https://img.shields.io/badge/Python-3-blue) +![](https://img.shields.io/github/forks/Z4nzu/hackingtool) +![](https://img.shields.io/github/stars/Z4nzu/hackingtool) +![](https://img.shields.io/github/last-commit/Z4nzu/hackingtool) +[![HitCount](http://hits.dwyl.com/Z4nzu/hackingtool.svg)](http://hits.dwyl.com/Z4nzu/hackingtool) +![](https://img.shields.io/badge/platform-Linux%20%7C%20KaliLinux%20%7C%20ParrotOs-blue) + +#### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I) + +## Update Available V1.1.0 πŸš€ +- [x] Added New Tools + - [x] Reverse Engineering + - [x] RAT Tools + - [x] Web Crawling + - [x] Payload Injector +- [x] Multitor Tools update +- [X] Added Tool in wifijamming + + +# Hackingtool Menu 🧰 +- [Anonymously Hiding Tools](#anonymously-hiding-tools) +- [Information gathering tools](#information-gathering-tools) +- [Wordlist Generator](#wordlist-generator) +- [Wireless attack tools](#wireless-attack-tools) +- [SQL Injection Tools](#sql-injection-tools) +- [Phishing attack tools](#phishing-attack-tools) +- [Web Attack tools](#web-attack-tools) +- [Post exploitation tools](#post-exploitation-tools) +- [Forensic tools](#forensic-tools) +- [Payload creation tools](#payload-creation-tools) +- [Exploit framework](#exploit-framework) +- [Reverse engineering tools](#reverse-engineering-tools) +- [DDOS Attack Tools](#ddos-attack-tools) +- [Remote Administrator Tools (RAT)](#remote-administrator-tools--rat-) +- [XSS Attack Tools](#xss-attack-tools) +- [Steganograhy tools](#steganograhy-tools) +- [Other tools](#other-tools) + - [SocialMedia Bruteforce](#socialmedia-bruteforce) + - [Android Hacking tools](#android-hacking-tools) + - [IDN Homograph Attack](#idn-homograph-attack) + - [Email Verify tools](#email-verify-tools) + - [Hash cracking tools](#hash-cracking-tools) + - [Wifi Deauthenticate](#wifi-deauthenticate) + - [SocialMedia Finder](#socialmedia-finder) + - [Payload Injector](#payload-injector) + - [Web crawling](#web-crawling) + - [Mix tools](#mix-tools) + + +### Anonymously Hiding Tools +- [Anonmously Surf](https://github.com/Und3rf10w/kali-anonsurf) +- [Multitor](https://github.com/trimstray/multitor) +### Information gathering tools +- [Network Map (nmap)](https://github.com/nmap/nmap) +- [Dracnmap](https://github.com/Screetsec/Dracnmap) +- Port scanning +- Host to IP +- [Xerosploit](https://github.com/LionSec/xerosploit) +- [RED HAWK (All In One Scanning)](https://github.com/Tuhinshubhra/RED_HAWK) +- [ReconSpider(For All Scaning)](https://github.com/bhavsec/reconspider) +- IsItDown (Check Website Down/Up) +- [Infoga - Email OSINT](https://github.com/m4ll0k/Infoga) +- [ReconDog](https://github.com/s0md3v/ReconDog) +- [Striker](https://github.com/s0md3v/Striker) +- [SecretFinder (like API & etc)](https://github.com/m4ll0k/SecretFinder) +- [Find Info Using Shodan](https://github.com/m4ll0k/Shodanfy.py) +- [Port Scanner - rang3r](https://github.com/floriankunushevci/rang3r) +- [Breacher](https://github.com/s0md3v/Breacher) +### Wordlist Generator +- [Cupp](https://github.com/Mebus/cupp.git) +- [WordlistCreator](https://github.com/Z4nzu/wlcreator) +- [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git) +- [Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got) +### Wireless attack tools +- [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3) +- [pixiewps](https://github.com/wiire/pixiewps) +- [Bluetooth Honeypot GUI Framework](https://github.com/andrewmichaelsmith/bluepot) +- [Fluxion](https://github.com/thehackingsage/Fluxion) +- [Wifiphisher](https://github.com/wifiphisher/wifiphisher) +- [Wifite](https://github.com/derv82/wifite2) +- [EvilTwin](https://github.com/Z4nzu/fakeap) +- [Fastssh](https://github.com/Z4nzu/fastssh) +- Howmanypeople +### SQL Injection Tools +- [Sqlmap tool](https://github.com/sqlmapproject/sqlmap) +- [NoSqlMap](https://github.com/codingo/NoSQLMap) +- [Damn Small SQLi Scanner](https://github.com/stamparm/DSSS) +- [Explo](https://github.com/dtag-dev-sec/explo) +- [Blisqy - Exploit Time-based blind-SQL injection](https://github.com/JohnTroony/Blisqy) +- [Leviathan - Wide Range Mass Audit Toolkit](https://github.com/leviathan-framework/leviathan) +- [SQLScan](https://github.com/Cvar1984/sqlscan) +### Phishing attack tools +- [Setoolkit](https://github.com/trustedsec/social-engineer-toolkit) +- [SocialFish](https://github.com/UndeadSec/SocialFish) +- [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye) +- [Evilginx2](https://github.com/kgretzky/evilginx2) +- [I-See_You(Get Location using phishing attack)](https://github.com/Viralmaniar/I-See-You) +- [SayCheese (Grab target's Webcam Shots)](https://github.com/hangetzzu/saycheese) +- [QR Code Jacking](https://github.com/cryptedwolf/ohmyqr) +- [ShellPhish](https://github.com/An0nUD4Y/shellphish) +- [BlackPhish](https://github.com/iinc0gnit0/BlackPhish) +### Web Attack tools +- [Web2Attack](https://github.com/santatic/web2attack) +- Skipfish +- [SubDomain Finder](https://github.com/aboul3la/Sublist3r) +- [CheckURL](https://github.com/UndeadSec/checkURL) +- [Blazy(Also Find ClickJacking)](https://github.com/UltimateHackers/Blazy) +- [Sub-Domain TakeOver](https://github.com/m4ll0k/takeover) +- [Dirb](https://gitlab.com/kalilinux/packages/dirb) +### Post exploitation tools +- [Vegile - Ghost In The Shell](https://github.com/Screetsec/Vegile) +- [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger) +### Forensic tools +- Autopsy +- Wireshark +- [Bulk extractor](https://github.com/simsong/bulk_extractor) +- [Disk Clone and ISO Image Aquire](https://guymager.sourceforge.io/) +- [Toolsley](https://www.toolsley.com/) +### Payload creation tools +- [The FatRat](https://github.com/Screetsec/TheFatRat) +- [Brutal](https://github.com/Screetsec/Brutal) +- [Stitch](https://nathanlopez.github.io/Stitch) +- [MSFvenom Payload Creator](https://github.com/g0tmi1k/msfpc) +- [Venom Shellcode Generator](https://github.com/r00t-3xp10it/venom) +- [Spycam](https://github.com/thelinuxchoice/spycam) +- [Mob-Droid](https://github.com/kinghacker0/Mob-Droid) +- [Enigma](https://github.com/UndeadSec/Enigma) +### Exploit framework +- [RouterSploit](https://github.com/threat9/routersploit) +- [WebSploit](https://github.com/The404Hacking/websploit ) +- [Commix](https://github.com/commixproject/commix) +- [Web2Attack](https://github.com/santatic/web2attack) +### Reverse engineering tools +- [Androguard](https://github.com/androguard/androguard ) +- [Apk2Gold](https://github.com/lxdvs/apk2gold ) +- [JadX](https://github.com/skylot/jadx) +### DDOS Attack Tools +- SlowLoris +- [Asyncrone | Multifunction SYN Flood DDoS Weapon](https://github.com/fatihsnsy/aSYNcrone) +- [UFOnet](https://github.com/epsylon/ufonet) +- [GoldenEye](https://github.com/jseidl/GoldenEye) +### Remote Administrator Tools (RAT) +- [Stitch](https://github.com/nathanlopez/Stitch) +- [Pyshell](https://github.com/knassar702/pyshell) +### XSS Attack Tools +- [DalFox(Finder of XSS)](https://github.com/hahwul/dalfox) +- [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER.git) +- [Extended XSS Searcher and Finder](https://github.com/Damian89/extended-xss-search) +- [XSS-Freak](https://github.com/PR0PH3CY33/XSS-Freak) +- [XSpear](https://github.com/hahwul/XSpear) +- [XSSCon](https://github.com/menkrep1337/XSSCon) +- [XanXSS](https://github.com/Ekultek/XanXSS) +- [Advanced XSS Detection Suite](https://github.com/UltimateHackers/XSStrike) +- [RVuln](https://github.com/iinc0gnit0/RVuln) +### Steganograhy tools +- SteganoHide +- StegnoCracker +- [Whitespace](https://github.com/beardog108/snow10) +### Other tools +#### SocialMedia Bruteforce +- [Instagram Attack](https://github.com/chinoogawa/instaBrute) +- [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force) +- [Facebook Attack](https://github.com/Matrix07ksa/Brute_Force) +- [Application Checker](https://github.com/jakuta-tech/underhanded) +#### Android Hacking tools +- [Keydroid](https://github.com/F4dl0/keydroid) +- [MySMS](https://github.com/papusingh2sms/mysms) +- [Lockphish (Grab target LOCK PIN)](https://github.com/JasonJerry/lockphish) +- [DroidCam (Capture Image)](https://github.com/kinghacker0/WishFish) +- [EvilApp (Hijack Session)](https://github.com/crypticterminal/EvilApp) +- [HatCloud(Bypass CloudFlare for IP)](https://github.com/HatBashBR/HatCloud) +#### IDN Homograph Attack +- [EvilURL](https://github.com/UndeadSec/EvilURL) +#### Email Verify tools +- [Knockmail](https://github.com/4w4k3/KnockMail) +#### Hash cracking tools +- [Hash Buster](https://github.com/s0md3v/Hash-Buster) +#### Wifi Deauthenticate +- [WifiJammer-NG](https://github.com/MisterBianco/wifijammer-ng) +- [KawaiiDeauther](https://github.com/aryanrtm/KawaiiDeauther) +#### SocialMedia Finder +- [Find SocialMedia By Facial Recognation System](https://github.com/Greenwolf/social_mapper) +- [Find SocialMedia By UserName](https://github.com/xHak9x/finduser) +- [Sherlock](https://github.com/sherlock-project/sherlock) +- [SocialScan | Username or Email](https://github.com/iojw/socialscan) +#### Payload Injector +- [Debinject](https://github.com/UndeadSec/Debinject) +- [Pixload](https://github.com/chinarulezzz/pixload) +#### Web crawling +- [Gospider](https://github.com/jaeles-project/gospider) +#### Mix tools +- Terminal Multiplexer + + +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A00.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A0.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A1.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A2.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A4.png) + +## Installation For Linux linux

+ +#### This Tool Must Run As ROOT !!! + + git clone https://github.com/Z4nzu/hackingtool.git + + chmod -R 755 hackingtool + + cd hackingtool + + sudo pip3 install -r requirement.txt + + bash install.sh + + sudo hackingtool + + After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool** + +#### Thanks to original Author of the tools used in hackingtool + + +

Please Don't Use for illegal Activity

+ +### To do +- [ ] Release Tool +- [ ] Add Tools for CTF +- [ ] Want to do automatic + +## Social Media :mailbox_with_no_mail: +[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Fwww.reddit.com%2Fuser%2FFatChicken277)](https://twitter.com/_Zinzu07) +[![GitHub](https://img.shields.io/badge/-GitHub-181717?style=flat-square&logo=github&link=https://github.com/Z4nzu/)](https://github.com/Z4nzu/) +##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8) +![Z4nzu's github stats](https://github-readme-stats.vercel.app/api?username=Z4nzu&show_icons=true&title_color=fff&icon_color=79ff97&text_color=9f9f9f&bg_color=151515) + +Buy Me A Coffee + +#### Don't Forgot to share with Your Friends +### The new Update get will soon stay updated +#### Thank you..!! diff --git a/README_template.md b/README_template.md new file mode 100644 index 0000000..ffe02ef --- /dev/null +++ b/README_template.md @@ -0,0 +1,72 @@ +### All in One Hacking tool For HackersπŸ₯‡ +![](https://img.shields.io/github/license/Z4nzu/hackingtool) +![](https://img.shields.io/github/issues/Z4nzu/hackingtool) +![](https://img.shields.io/github/issues-closed/Z4nzu/hackingtool) +![](https://img.shields.io/badge/Python-3-blue) +![](https://img.shields.io/github/forks/Z4nzu/hackingtool) +![](https://img.shields.io/github/stars/Z4nzu/hackingtool) +![](https://img.shields.io/github/last-commit/Z4nzu/hackingtool) +[![HitCount](http://hits.dwyl.com/Z4nzu/hackingtool.svg)](http://hits.dwyl.com/Z4nzu/hackingtool) +![](https://img.shields.io/badge/platform-Linux%20%7C%20KaliLinux%20%7C%20ParrotOs-blue) + +#### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I) + +## Update Available V1.1.0 πŸš€ +- [x] Added New Tools + - [x] Reverse Engineering + - [x] RAT Tools + - [x] Web Crawling + - [x] Payload Injector +- [x] Multitor Tools update +- [X] Added Tool in wifijamming + + +# Hackingtool Menu 🧰 +{{toc}} + +{{tools}} + +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A00.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A0.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A1.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A2.png) +![](https://github.com/Z4nzu/hackingtool/blob/master/images/A4.png) + +## Installation For Linux linux

+ +#### This Tool Must Run As ROOT !!! + + git clone https://github.com/Z4nzu/hackingtool.git + + chmod -R 755 hackingtool + + cd hackingtool + + sudo pip3 install -r requirement.txt + + bash install.sh + + sudo hackingtool + + After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool** + +#### Thanks to original Author of the tools used in hackingtool + + +

Please Don't Use for illegal Activity

+ +### To do +- [ ] Release Tool +- [ ] Add Tools for CTF +- [ ] Want to do automatic + +## Social Media :mailbox_with_no_mail: +[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Fwww.reddit.com%2Fuser%2FFatChicken277)](https://twitter.com/_Zinzu07) +[![GitHub](https://img.shields.io/badge/-GitHub-181717?style=flat-square&logo=github&link=https://github.com/Z4nzu/)](https://github.com/Z4nzu/) +##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8) +![Z4nzu's github stats](https://github-readme-stats.vercel.app/api?username=Z4nzu&show_icons=true&title_color=fff&icon_color=79ff97&text_color=9f9f9f&bg_color=151515) + +Buy Me A Coffee + +#### Don't Forgot to share with Your Friends +#### Thank you..!! diff --git a/core.py b/core.py new file mode 100644 index 0000000..e59ef3c --- /dev/null +++ b/core.py @@ -0,0 +1,185 @@ +# coding=utf-8 +import os +import sys +import webbrowser +from platform import system +from traceback import print_exc +from typing import Any +from typing import Callable +from typing import List +from typing import Tuple + + +def clear_screen(): + if system() == "Linux": + os.system("clear") + if system() == "Windows": + os.system("cls") + + +def validate_input(ip, val_range): + try: + ip = int(ip) + if ip in val_range: + return ip + else: + return None + except: + return None + + +class HackingTool(object): + # About the HackingTool + TITLE: str = "" # used to show info in the menu + DESCRIPTION: str = "" + + INSTALL_COMMANDS: List[str] = [] + INSTALLATION_DIR: str = "" + + UNINSTALL_COMMANDS: List[str] = [] + + RUN_COMMANDS: List[str] = [] + + OPTIONS: List[Tuple[str, Callable]] = [] + + PROJECT_URL: str = "" + + def __init__(self, options = None, installable: bool = True, + runnable: bool = True): + if options is None: + options = [] + if isinstance(options, list): + self.OPTIONS = [] + if installable: + self.OPTIONS.append(('Install', self.install)) + if runnable: + self.OPTIONS.append(('Run', self.run)) + self.OPTIONS.extend(options) + else: + raise Exception( + "options must be a list of (option_name, option_fn) tuples") + + def show_info(self): + desc = self.DESCRIPTION + if self.PROJECT_URL: + desc += '\n\t[*] ' + desc += self.PROJECT_URL + os.system(f'echo "{desc}"|boxes -d boy | lolcat') + # print(desc) + + def show_options(self, parent = None): + clear_screen() + self.show_info() + for index, option in enumerate(self.OPTIONS): + print("[{:2}] {}".format(index + 1, option[0])) + if self.PROJECT_URL: + print("[{:2}] {}".format(98, "Open project page")) + print("[{:2}] {}".format( + 99, ("Back to " + parent.TITLE) if parent is not None else "Exit")) + option_index = input("Select an option : ") + try: + option_index = int(option_index) + if option_index - 1 in range(len(self.OPTIONS)): + ret_code = self.OPTIONS[option_index - 1][1]() + if ret_code != 99: + input("\n\nPress ENTER to continue:") + elif option_index == 98: + self.show_project_page() + elif option_index == 99: + if parent is None: + sys.exit() + return 99 + except (TypeError, ValueError): + print("Please enter a valid option") + input("\n\nPress ENTER to continue:") + except Exception: + print_exc() + input("\n\nPress ENTER to continue:") + return self.show_options(parent = parent) + + def before_install(self): + pass + + def install(self): + self.before_install() + if isinstance(self.INSTALL_COMMANDS, (list, tuple)): + for INSTALL_COMMAND in self.INSTALL_COMMANDS: + os.system(INSTALL_COMMAND) + self.after_install() + + def after_install(self): + print("Successfully installed!") + + def before_uninstall(self) -> bool: + """ Ask for confirmation from the user and return """ + return True + + def uninstall(self): + if self.before_uninstall(): + if isinstance(self.UNINSTALL_COMMANDS, (list, tuple)): + for UNINSTALL_COMMAND in self.UNINSTALL_COMMANDS: + os.system(UNINSTALL_COMMAND) + self.after_uninstall() + + def after_uninstall(self): + pass + + def before_run(self): + pass + + def run(self): + self.before_run() + if isinstance(self.RUN_COMMANDS, (list, tuple)): + for RUN_COMMAND in self.RUN_COMMANDS: + os.system(RUN_COMMAND) + self.after_run() + + def after_run(self): + pass + + def is_installed(self, dir_to_check = None): + print("Unimplemented: DO NOT USE") + return "?" + + def show_project_page(self): + webbrowser.open_new_tab(self.PROJECT_URL) + + +class HackingToolsCollection(object): + TITLE: str = "" # used to show info in the menu + DESCRIPTION: str = "" + TOOLS = [] # type: List[Any[HackingTool, HackingToolsCollection]] + + def __init__(self): + pass + + def show_info(self): + os.system("figlet -f standard -c {} | lolcat".format(self.TITLE)) + # os.system(f'echo "{self.DESCRIPTION}"|boxes -d boy | lolcat') + # print(self.DESCRIPTION) + + def show_options(self, parent = None): + clear_screen() + self.show_info() + for index, tool in enumerate(self.TOOLS): + print("[{:2}] {}".format(index, tool.TITLE)) + print("[{:2}] {}".format( + 99, ("Back to " + parent.TITLE) if parent is not None else "Exit")) + tool_index = input("Choose a tool to proceed: ") + try: + tool_index = int(tool_index) + if tool_index in range(len(self.TOOLS)): + ret_code = self.TOOLS[tool_index].show_options(parent = self) + if ret_code != 99: + input("\n\nPress ENTER to continue:") + elif tool_index == 99: + if parent is None: + sys.exit() + return 99 + except (TypeError, ValueError): + print("Please enter a valid option") + input("\n\nPress ENTER to continue:") + except Exception as e: + print_exc() + input("\n\nPress ENTER to continue:") + return self.show_options(parent = parent) diff --git a/generate_readme.py b/generate_readme.py new file mode 100644 index 0000000..5990fd2 --- /dev/null +++ b/generate_readme.py @@ -0,0 +1,52 @@ +# coding=utf-8 +import re + +from core import HackingTool +from core import HackingToolsCollection +from main import all_tools + + +def sanitize_anchor(s): + return re.sub(r"\W", "-", s.lower()) + + +def get_toc(tools, indentation = ""): + md = "" + for tool in tools: + if isinstance(tool, HackingToolsCollection): + md += (indentation + "- [{}](#{})\n".format( + tool.TITLE, sanitize_anchor(tool.TITLE))) + md += get_toc(tool.TOOLS, indentation = indentation + ' ') + return md + + +def get_tools_toc(tools, indentation = "##"): + md = "" + for tool in tools: + if isinstance(tool, HackingToolsCollection): + md += (indentation + "# {}\n".format(tool.TITLE)) + md += get_tools_toc(tool.TOOLS, indentation = indentation + '#') + elif isinstance(tool, HackingTool): + if tool.PROJECT_URL: + md += ("- [{}]({})\n".format(tool.TITLE, tool.PROJECT_URL)) + else: + md += ("- {}\n".format(tool.TITLE)) + return md + + +def generate_readme(): + toc = get_toc(all_tools[:-1]) + tools_desc = get_tools_toc(all_tools[:-1]) + + with open("README_template.md") as fh: + readme_template = fh.read() + + readme_template = readme_template.replace("{{toc}}", toc) + readme_template = readme_template.replace("{{tools}}", tools_desc) + + with open("README.md", "w") as fh: + fh.write(readme_template) + + +if __name__ == '__main__': + generate_readme() diff --git a/hackingtool.py b/hackingtool.py new file mode 100644 index 0000000..0ef91a3 --- /dev/null +++ b/hackingtool.py @@ -0,0 +1,123 @@ +##!/usr/bin/env python3 +# -*- coding: UTF-8 -*- +# Version 1.1.0 +import os +import webbrowser +from platform import system +from time import sleep + +from core import HackingToolsCollection +from tools.anonsurf import AnonSurfTools +from tools.ddos import DDOSTools +from tools.exploit_frameworks import ExploitFrameworkTools +from tools.forensic_tools import ForensicTools +from tools.information_gathering_tools import InformationGatheringTools +from tools.other_tools import OtherTools +from tools.payload_creator import PayloadCreatorTools +from tools.phising_attack import PhishingAttackTools +from tools.post_exploitation import PostExploitationTools +from tools.remote_administration import RemoteAdministrationTools +from tools.reverse_engineering import ReverseEngineeringTools +from tools.sql_tools import SqlInjectionTools +from tools.steganography import SteganographyTools +from tools.tool_manager import ToolManager +from tools.webattack import WebAttackTools +from tools.wireless_attack_tools import WirelessAttackTools +from tools.wordlist_generator import WordlistGeneratorTools +from tools.xss_attack import XSSAttackTools + +logo = """\033[33m + β–„β–ˆ β–ˆβ–„ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–„β–ˆ β–„β–ˆβ–„ β–„β–ˆ β–ˆβ–ˆβ–ˆβ–„β–„β–„β–„ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–„β–ˆ + β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–€β–€β–€β–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ + β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆβ–β–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆβ–Œ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–€β–€β–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ + β–„β–ˆβ–ˆβ–ˆβ–„β–„β–„β–„β–ˆβ–ˆβ–ˆβ–„β–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆβ–Œ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ +β–€β–€β–ˆβ–ˆβ–ˆβ–€β–€β–€β–€β–ˆβ–ˆβ–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆβ–Œ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–€β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ + β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–„ β–ˆβ–ˆβ–ˆβ–β–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ + β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–Œ β–„ + β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆ β–€β–ˆβ–€ β–ˆβ–€ β–€β–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„β–„β–ˆβ–ˆ + β–€ β–€ + \033[34m[βœ”] https://github.com/Z4nzu/hackingtool [βœ”] + \033[34m[βœ”] Version 1.1.0 [βœ”] + \033[91m[X] Please Don't Use For illegal Activity [X] +\033[97m """ + +all_tools = [ + AnonSurfTools(), + InformationGatheringTools(), + WordlistGeneratorTools(), + WirelessAttackTools(), + SqlInjectionTools(), + PhishingAttackTools(), + WebAttackTools(), + PostExploitationTools(), + ForensicTools(), + PayloadCreatorTools(), + ExploitFrameworkTools(), + ReverseEngineeringTools(), + DDOSTools(), + RemoteAdministrationTools(), + XSSAttackTools(), + SteganographyTools(), + OtherTools(), + ToolManager() +] + + +class AllTools(HackingToolsCollection): + TITLE = "All tools" + TOOLS = all_tools + + def show_info(self): + print(logo + '\033[0m \033[97m') + + +if __name__ == "__main__": + try: + if system() == 'Linux': + fpath = "/home/hackingtoolpath.txt" + if not os.path.exists(fpath): + os.system('clear') + # run.menu() + print(""" + [@] Set Path (All your tools will be install in that directory) + [1] Manual + [2] Default + """) + choice = input("Z4nzu =>> ") + + if choice == "1": + inpath = input("Enter Path (with Directory Name) >> ") + with open(fpath, "w") as f: + f.write(inpath) + print("Successfully Path Set...!!") + elif choice == "2": + autopath = "/home/hackingtool/" + with open(fpath, "w") as f: + f.write(autopath) + print(f"Your Default Path Is:- {autopath}") + sleep(3) + else: + print("Try Again..!!") + exit(0) + + with open(fpath) as f: + archive = f.readline() + if not os.path.exists(archive): + os.mkdir(archive) + os.chdir(archive) + all_tools = AllTools() + all_tools.show_options() + + # If not Linux and probably Windows + elif system() == "Windows": + print( + "\033[91m Please Run This Tool In Debian System For Best Result " "\e[00m") + sleep(2) + webbrowser.open_new_tab("https://tinyurl.com/y522modc") + + else: + print("Please Check Your Sytem or Open new issue ...") + + except KeyboardInterrupt: + print("\nExiting ..!!!") + sleep(2) diff --git a/images/A0.png b/images/A0.png new file mode 100644 index 0000000..c6b4ef5 Binary files /dev/null and b/images/A0.png differ diff --git a/images/A00.png b/images/A00.png new file mode 100644 index 0000000..1170378 Binary files /dev/null and b/images/A00.png differ diff --git a/images/A1.png b/images/A1.png new file mode 100644 index 0000000..9736e6f Binary files /dev/null and b/images/A1.png differ diff --git a/images/A2.png b/images/A2.png new file mode 100644 index 0000000..3345608 Binary files /dev/null and b/images/A2.png differ diff --git a/images/A4.png b/images/A4.png new file mode 100644 index 0000000..dae6193 Binary files /dev/null and b/images/A4.png differ diff --git a/images/demo b/images/demo new file mode 100644 index 0000000..8b13789 --- /dev/null +++ b/images/demo @@ -0,0 +1 @@ + diff --git a/install.sh b/install.sh new file mode 100644 index 0000000..afdfcef --- /dev/null +++ b/install.sh @@ -0,0 +1,97 @@ +#!/bin/bash +clear + +BLACK='\e[30m' +RED='\e[31m' +GREEN='\e[92m' +YELLOW='\e[33m' +ORANGE='\e[93m' +BLUE='\e[34m' +PURPLE='\e[35m' +CYAN='\e[36m' +WHITE='\e[37m' +NC='\e[0m' +purpal='\033[35m' + +echo -e "${ORANGE} " +echo "" +echo " β–„β–ˆ β–ˆβ–„ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–„β–ˆ β–„β–ˆβ–„ β–„β–ˆ β–ˆβ–ˆβ–ˆβ–„β–„β–„β–„ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–„β–ˆ "; +echo " β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–€β–€β–€β–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ "; +echo " β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆβ–β–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆβ–Œ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–€β–€β–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ "; +echo " β–„β–ˆβ–ˆβ–ˆβ–„β–„β–„β–„β–ˆβ–ˆβ–ˆβ–„β–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆβ–Œ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–„β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ "; +echo "β–€β–€β–ˆβ–ˆβ–ˆβ–€β–€β–€β–€β–ˆβ–ˆβ–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆβ–Œ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–€β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ "; +echo " β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–„ β–ˆβ–ˆβ–ˆβ–β–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ "; +echo " β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–€β–ˆβ–ˆβ–ˆβ–„ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆ β–ˆβ–ˆβ–ˆβ–Œ β–„ "; +echo " β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆ β–€β–ˆβ–€ β–ˆβ–€ β–€β–ˆ β–ˆβ–€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–„β–ˆβ–ˆβ–ˆβ–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„β–„β–ˆβ–ˆ "; +echo " β–€ β–€ "; + +echo -e "${BLUE} https://github.com/Z4nzu/hackingtool ${NC}" + +echo -e "${RED} [!] This Tool Must Run As ROOT [!]${NC}" +echo "" +echo -e ${CYAN} "Select Best Option : " +echo "" +echo -e "${WHITE} [1] Kali Linux / Parrot-Os " +echo -e "${WHITE} [0] Exit " +echo -n -e "Z4nzu >> " +read choice +INSTALL_DIR="/usr/share/doc/hackingtool" +BIN_DIR="/usr/bin/" +if [ $choice == 1 ]; then + echo "[*] Checking Internet Connection .." + wget -q --tries=10 --timeout=20 --spider https://google.com + if [[ $? -eq 0 ]]; then + echo -e ${BLUE}"[βœ”] Loading ... " + sudo apt-get update && apt-get upgrade + sudo apt-get install python-pip + echo "[βœ”] Checking directories..." + if [ -d "$INSTALL_DIR" ]; then + echo "[!] A Directory hackingtool Was Found.. Do You Want To Replace It ? [y/n]:" ; + read input + if [ "$input" = "y" ]; then + rm -R "$INSTALL_DIR" + else + exit + fi + fi + echo "[βœ”] Installing ..."; + echo ""; + git clone https://github.com/Z4nzu/hackingtool.git "$INSTALL_DIR"; + echo "#!/bin/bash + python3 $INSTALL_DIR/hackingtool.py" '${1+"$@"}' > hackingtool; + sudo chmod +x hackingtool; + sudo cp hackingtool /usr/bin/; + rm hackingtool; + echo ""; + echo "[βœ”] Trying to installing Requirements ..." + sudo pip3 install lolcat + sudo apt-get install -y figlet + sudo pip3 install boxes + sudo apt-get install boxes + sudo pip3 install flask + sudo pip3 install requests + else + echo -e $RED "Please Check Your Internet Connection ..!!" + fi + + if [ -d "$INSTALL_DIR" ]; then + echo ""; + echo "[βœ”] Successfuly Installed !!! "; + echo ""; + echo ""; + echo -e $ORANGE " [+]+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++[+]" + echo " [+] [+]" + echo -e $ORANGE " [+] βœ”βœ”βœ” Now Just Type In Terminal (hackingtool) βœ”βœ”βœ” [+]" + echo " [+] [+]" + echo -e $ORANGE " [+]+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++[+]" + else + echo "[✘] Installation Failed !!! [✘]"; + exit + fi +elif [ $choice -eq 0 ]; +then + echo -e $RED "[✘] THank Y0u !! [✘] " + exit +else + echo -e $RED "[!] Select Valid Option [!]" +fi diff --git a/requirement.txt b/requirement.txt new file mode 100644 index 0000000..2341f97 --- /dev/null +++ b/requirement.txt @@ -0,0 +1,4 @@ +lolcat +boxes +flask +requests diff --git a/tools/anonsurf.py b/tools/anonsurf.py new file mode 100644 index 0000000..0544fad --- /dev/null +++ b/tools/anonsurf.py @@ -0,0 +1,45 @@ +# coding=utf-8 +import os + +from core import HackingTool +from core import HackingToolsCollection + + +class AnonymouslySurf(HackingTool): + TITLE = "Anonmously Surf" + DESCRIPTION = "It automatically overwrites the RAM when\n" \ + "the system is shutting down and also change Ip." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git", + "cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf" + ] + RUN_COMMANDS = ["sudo anonsurf start"] + PROJECT_URL = "https://github.com/Und3rf10w/kali-anonsurf" + + def __init__(self): + super(AnonymouslySurf, self).__init__([('Stop', self.stop)]) + + def stop(self): + os.system("sudo anonsurf stop") + + +class Multitor(HackingTool): + TITLE = "Multitor" + DESCRIPTION = "How to stay in multi places at the same time" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/trimstray/multitor.git", + "cd multitor;sudo bash setup.sh install" + ] + PROJECT_URL = "https://github.com/trimstray/multitor" + + def __init__(self): + super(Multitor, self).__init__(runnable = False) + + +class AnonSurfTools(HackingToolsCollection): + TITLE = "Anonymously Hiding Tools" + DESCRIPTION = "" + TOOLS = [ + AnonymouslySurf(), + Multitor() + ] diff --git a/tools/ddos.py b/tools/ddos.py new file mode 100644 index 0000000..be19d5f --- /dev/null +++ b/tools/ddos.py @@ -0,0 +1,77 @@ +# coding=utf-8 +import os +import subprocess + +from core import HackingTool +from core import HackingToolsCollection + + +class SlowLoris(HackingTool): + TITLE = "SlowLoris" + DESCRIPTION = "Slowloris is basically an HTTP Denial of Service attack." \ + "It send lots of HTTP Request" + INSTALL_COMMANDS = ["sudo pip install slowloris"] + + def run(self): + target_site = input("Enter Target Site:- ") + subprocess.run(["slowloris", target_site]) + + +class Asyncrone(HackingTool): + TITLE = "Asyncrone | Multifunction SYN Flood DDoS Weapon" + DESCRIPTION = "aSYNcrone is a C language based, mulltifunction SYN Flood " \ + "DDoS Weapon.\nDisable the destination system by sending a " \ + "SYN packet intensively to the destination." + INSTALL_COMMANDS = [ + "git clone https://github.com/fatih4842/aSYNcrone.git", + "cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread" + ] + PROJECT_URL = "https://github.com/fatihsnsy/aSYNcrone" + + def run(self): + source_port = input("Enter Source Port >> ") + target_ip = input("Enter Target IP >> ") + target_port = input("Enter Target port >> ") + os.system("cd aSYNcrone;") + subprocess.run([ + "sudo", "./aSYNcrone", source_port, target_ip, target_port, 1000]) + + +class UFONet(HackingTool): + TITLE = "UFOnet" + DESCRIPTION = "UFONet - is a free software, P2P and cryptographic " \ + "-disruptive \n toolkit- that allows to perform DoS and " \ + "DDoS attacks\n\b " \ + "More Usage Visit" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/epsylon/ufonet.git", + "cd ufonet;sudo python setup.py install" + ] + RUN_COMMANDS = ["sudo ./ufonet --gui"] + PROJECT_URL = "https://github.com/epsylon/ufonet" + + +class GoldenEye(HackingTool): + TITLE = "GoldenEye" + DESCRIPTION = "GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\n" \ + "GoldenEye is a HTTP DoS Test Tool." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/jseidl/GoldenEye.git;" + "chmod -R 755 GoldenEye" + ] + PROJECT_URL = "https://github.com/jseidl/GoldenEye" + + def run(self): + os.system("cd GoldenEye ;sudo ./goldeneye.py") + print("\033[96m Go to Directory \n " + "[*] USAGE: ./goldeneye.py [OPTIONS]") + + +class DDOSTools(HackingToolsCollection): + TITLE = "DDOS Attack Tools" + TOOLS = [ + SlowLoris(), + Asyncrone(), + UFONet(), + GoldenEye() + ] diff --git a/tools/exploit_frameworks.py b/tools/exploit_frameworks.py new file mode 100644 index 0000000..b285095 --- /dev/null +++ b/tools/exploit_frameworks.py @@ -0,0 +1,50 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection +from tools.webattack import Web2Attack + + +class RouterSploit(HackingTool): + TITLE = "RouterSploit" + DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \ + "framework dedicated to embedded devices" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/threat9/routersploit.git", + "cd routersploit && sudo python3 -m pip install -r requirements.txt" + ] + RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"] + PROJECT_URL = "https://github.com/threat9/routersploit" + + +class WebSploit(HackingTool): + TITLE = "WebSploit" + DESCRIPTION = "Websploit is an advanced MITM framework." + INSTALL_COMMANDS = ["https://github.com/The404Hacking/websploit.git"] + RUN_COMMANDS = ["cd websploit;python3 websploit.py"] + PROJECT_URL = "https://github.com/The404Hacking/websploit " + + +class Commix(HackingTool): + TITLE = "Commix" + DESCRIPTION = "Automated All-in-One OS command injection and exploitation " \ + "tool.\nCommix can be used from web developers, penetration " \ + "testers or even security researchers\n in order to test " \ + "web-based applications with the view to find bugs,\n " \ + "errors or vulnerabilities related to command injection " \ + "attacks.\n Usage: python commix.py [option(s)]" + INSTALL_COMMANDS = [ + "git clone https://github.com/commixproject/commix.git commix"] + PROJECT_URL = "https://github.com/commixproject/commix" + + def __init__(self): + super(Commix, self).__init__(runnable = False) + + +class ExploitFrameworkTools(HackingToolsCollection): + TITLE = "Exploit framework" + TOOLS = [ + RouterSploit(), + WebSploit(), + Commix(), + Web2Attack() + ] diff --git a/tools/forensic_tools.py b/tools/forensic_tools.py new file mode 100644 index 0000000..d2b2bc0 --- /dev/null +++ b/tools/forensic_tools.py @@ -0,0 +1,91 @@ +# coding=utf-8 +import os + +from core import HackingTool +from core import HackingToolsCollection + + +class Autopsy(HackingTool): + TITLE = "Autopsy" + DESCRIPTION = "Autopsy is a platform that is used by Cyber Investigators.\n" \ + "[!] Works in any Os\n" \ + "[!] Recover Deleted Files from any OS & MEdia \n" \ + "[!] Extract Image Metadata" + RUN_COMMANDS = "sudo autopsy" + + def __init__(self): + super(Autopsy, self).__init__(installable = False) + + +class Wireshark(HackingTool): + TITLE = "Wireshark" + DESCRIPTION = "Wireshark is a network capture and analyzer \n" \ + "tool to see what’s happening in your network.\n " \ + "And also investigate Network related incident" + RUN_COMMANDS = ["sudo wireshark"] + + def __init__(self): + super(Wireshark, self).__init__(installable = False) + + +class BulkExtractor(HackingTool): + TITLE = "Bulk extractor" + DESCRIPTION = "" + PROJECT_URL = "https://github.com/simsong/bulk_extractor" + + def __init__(self): + super(BulkExtractor, self).__init__([ + ('GUI Mode (Download required)', self.gui_mode), + ('CLI Mode', self.cli_mode) + ], installable = False, runnable = False) + + def gui_mode(self): + os.system( + "sudo git clone https://github.com/simsong/bulk_extractor.git") + os.system("ls src/ && cd .. && cd java_gui && ./BEViewer") + print( + "If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer") + print( + "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor") + + def cli_mode(self): + os.system("sudo apt-get install bulk_extractor") + print("bulk_extractor and options") + os.system("bulk_extractor") + os.system( + 'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat') + + +class Guymager(HackingTool): + TITLE = "Disk Clone and ISO Image Aquire" + DESCRIPTION = "Guymager is a free forensic imager for media acquisition." + INSTALL_COMMANDS = ["sudo apt install guymager"] + RUN_COMMANDS = ["sudo guymager"] + PROJECT_URL = "https://guymager.sourceforge.io/" + + +class Toolsley(HackingTool): + TITLE = "Toolsley" + DESCRIPTION = "Toolsley got more than ten useful tools for investigation.\n" \ + "[+]File signature verifier\n" \ + "[+]File identifier \n" \ + "[+]Hash & Validate \n" \ + "[+]Binary inspector \n " \ + "[+]Encode text \n" \ + "[+]Data URI generator \n" \ + "[+]Password generator" + PROJECT_URL = "https://www.toolsley.com/" + + def __init__(self): + super(Toolsley, self).__init__(installable = False, runnable = False) + + +class ForensicTools(HackingToolsCollection): + TITLE = "Forensic tools" + TOOLS = [ + Autopsy(), + Wireshark(), + BulkExtractor(), + Guymager(), + Toolsley() + ] diff --git a/tools/information_gathering_tools.py b/tools/information_gathering_tools.py new file mode 100644 index 0000000..7d424c7 --- /dev/null +++ b/tools/information_gathering_tools.py @@ -0,0 +1,219 @@ +# coding=utf-8 +import os +import socket +import subprocess +import webbrowser + +from core import HackingTool +from core import HackingToolsCollection +from core import clear_screen + + +class NMAP(HackingTool): + TITLE = "Network Map (nmap)" + DESCRIPTION = "Free and open source utility for network discovery and security auditing" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/nmap/nmap.git", + "sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install" + ] + PROJECT_URL = "https://github.com/nmap/nmap" + + def __init__(self): + super(NMAP, self).__init__(runnable = False) + + +class Dracnmap(HackingTool): + TITLE = "Dracnmap" + DESCRIPTION = "Dracnmap is an open source program which is using to \n" \ + "exploit the network and gathering information with nmap help." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Screetsec/Dracnmap.git", + "cd Dracnmap && chmod +x Dracnmap.sh" + ] + PROJECT_URL = "https://github.com/Screetsec/Dracnmap" + + def __init__(self): + super(Dracnmap, self).__init__(runnable = False) + + +class PortScan(HackingTool): + TITLE = "Port scanning" + + def __init__(self): + super(PortScan, self).__init__(installable = False) + + def run(self): + clear_screen() + target = input('Select a Target IP: ') + subprocess.run(["sudo", "nmap", "-O", "-Pn", target]) + + +class Host2IP(HackingTool): + TITLE = "Host to IP " + + def __init__(self): + super(Host2IP, self).__init__(installable = False) + + def run(self): + clear_screen() + host = input("Enter host name (e.g. www.google.com):- ") + ips = socket.gethostbyname(host) + print(ips) + + +class XeroSploit(HackingTool): + TITLE = "Xerosploit" + DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \ + "man-in-the-middle attacks for testing purposes" + INSTALL_COMMANDS = [ + "git clone https://github.com/LionSec/xerosploit.git", + "cd xerosploit && sudo python install.py" + ] + RUN_COMMANDS = ["sudo xerosploit"] + PROJECT_URL = "https://github.com/LionSec/xerosploit" + + +class RedHawk(HackingTool): + TITLE = "RED HAWK (All In One Scanning)" + DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning." + INSTALL_COMMANDS = [ + "git clone https://github.com/Tuhinshubhra/RED_HAWK.git"] + RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"] + PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK" + + +class ReconSpider(HackingTool): + TITLE = "ReconSpider(For All Scaning)" + DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \ + " Framework for scanning IP Address, Emails, \n" \ + "Websites, Organizations and find out information from" \ + " different sources.\n" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/bhavsec/reconspider.git", + "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install" + ] + PROJECT_URL = "https://github.com/bhavsec/reconspider" + + def __init__(self): + super(ReconSpider, self).__init__(runnable = False) + + +class IsItDown(HackingTool): + TITLE = "IsItDown (Check Website Down/Up)" + DESCRIPTION = "Check Website Is Online or Not" + + def __init__(self): + super(IsItDown, self).__init__( + [('Open', self.open)], installable = False, runnable = False) + + def open(self): + webbrowser.open_new_tab("https://www.isitdownrightnow.com/") + + +class Infoga(HackingTool): + TITLE = "Infoga - Email OSINT" + DESCRIPTION = "Infoga is a tool gathering email accounts informations\n" \ + "(ip, hostname, country,...) from different public source" + INSTALL_COMMANDS = [ + "git clone https://github.com/m4ll0k/Infoga.git", + "cd infoga;sudo python setup.py install" + ] + RUN_COMMANDS = ["cd infoga;python infoga.py"] + PROJECT_URL = "https://github.com/m4ll0k/Infoga" + + +class ReconDog(HackingTool): + TITLE = "ReconDog" + DESCRIPTION = "ReconDog Information Gathering Suite" + INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"] + RUN_COMMANDS = ["cd ReconDog;sudo python dog"] + PROJECT_URL = "https://github.com/s0md3v/ReconDog" + + +class Striker(HackingTool): + TITLE = "Striker" + DESCRIPTION = "Recon & Vulnerability Scanning Suite" + INSTALL_COMMANDS = [ + "git clone https://github.com/s0md3v/Striker.git", + "cd Striker && pip3 install -r requirements.txt" + ] + PROJECT_URL = "https://github.com/s0md3v/Striker" + + def run(self): + site = input("Enter Site Name (example.com) >> ") + os.system("cd Striker;") + subprocess.run(["sudo", "python3", "striker.py", site]) + + +class SecretFinder(HackingTool): + TITLE = "SecretFinder (like API & etc)" + DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \ + "like apikeys, accesstoken, authorizations, jwt,..etc \n " \ + "and search anything on javascript files.\n\n " \ + "Usage: python SecretFinder.py -h" + INSTALL_COMMANDS = [ + "git clone https://github.com/m4ll0k/SecretFinder.git secretfinder", + "cd secretfinder; sudo pip3 install -r requirements.txt" + ] + PROJECT_URL = "https://github.com/m4ll0k/SecretFinder" + + def __init__(self): + super(SecretFinder, self).__init__(runnable = False) + + +class Shodan(HackingTool): + TITLE = "Find Info Using Shodan" + DESCRIPTION = "Get ports, vulnerabilities, informations, banners,..etc \n " \ + "for any IP with Shodan (no apikey! no rate limit!)\n" \ + "[X] Don't use this tool because your ip will be blocked by Shodan!" + INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"] + PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py" + + def __init__(self): + super(Shodan, self).__init__(runnable = False) + + +class PortScannerRanger(HackingTool): + TITLE = "Port Scanner - rang3r" + DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \ + "all alive hosts within your range that you specify." + INSTALL_COMMANDS = [ + "git clone https://github.com/floriankunushevci/rang3r.git;" + "sudo pip install termcolor"] + PROJECT_URL = "https://github.com/floriankunushevci/rang3r" + + def run(self): + ip = input("Enter Ip >> ") + os.system("cd rang3r;") + subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip]) + + +class Breacher(HackingTool): + TITLE = "Breacher" + DESCRIPTION = "An advanced multithreaded admin panel finder written in python." + INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"] + PROJECT_URL = "https://github.com/s0md3v/Breacher" + + def __init__(self): + super(Breacher, self).__init__(runnable = False) + + +class InformationGatheringTools(HackingToolsCollection): + TITLE = "Information gathering tools" + TOOLS = [ + NMAP(), + Dracnmap(), + PortScan(), + Host2IP(), + XeroSploit(), + RedHawk(), + ReconSpider(), + IsItDown(), + Infoga(), + ReconDog(), + Striker(), + SecretFinder(), + Shodan(), + PortScannerRanger(), + Breacher() + ] diff --git a/tools/other_tools.py b/tools/other_tools.py new file mode 100644 index 0000000..b7c8910 --- /dev/null +++ b/tools/other_tools.py @@ -0,0 +1,46 @@ +# coding=utf-8 +import os +import subprocess + +from core import HackingTool +from core import HackingToolsCollection +from tools.others.android_attack import AndroidAttackTools +from tools.others.email_verifier import EmailVerifyTools +from tools.others.hash_crack import HashCrackingTools +from tools.others.homograph_attacks import IDNHomographAttackTools +from tools.others.mix_tools import MixTools +from tools.others.payload_injection import PayloadInjectorTools +from tools.others.socialmedia import SocialMediaBruteforceTools +from tools.others.socialmedia_finder import SocialMediaFinderTools +from tools.others.web_crawling import WebCrawlingTools +from tools.others.wifi_jamming import WifiJammingTools + + +class HatCloud(HackingTool): + TITLE = "HatCloud(Bypass CloudFlare for IP)" + DESCRIPTION = "HatCloud build in Ruby. It makes bypass in CloudFlare for " \ + "discover real IP." + INSTALL_COMMANDS = ["git clone https://github.com/HatBashBR/HatCloud.git"] + PROJECT_URL = "https://github.com/HatBashBR/HatCloud" + + def run(self): + site = input("Enter Site >> ") + os.system("cd HatCloud;") + subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site]) + + +class OtherTools(HackingToolsCollection): + TITLE = "Other tools" + TOOLS = [ + SocialMediaBruteforceTools(), + AndroidAttackTools(), + HatCloud(), + IDNHomographAttackTools(), + EmailVerifyTools(), + HashCrackingTools(), + WifiJammingTools(), + SocialMediaFinderTools(), + PayloadInjectorTools(), + WebCrawlingTools(), + MixTools() + ] diff --git a/tools/others/android_attack.py b/tools/others/android_attack.py new file mode 100644 index 0000000..65bdb21 --- /dev/null +++ b/tools/others/android_attack.py @@ -0,0 +1,67 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class Keydroid(HackingTool): + TITLE = "Keydroid" + DESCRIPTION = "Android Keylogger + Reverse Shell\n" \ + "[!] You have to install Some Manually Refer Below Link:\n " \ + "[+] https://github.com/F4dl0/keydroid" + INSTALL_COMMANDS = ["sudo git clone https://github.com/F4dl0/keydroid.git"] + RUN_COMMANDS = ["cd keydroid && bash keydroid.sh"] + PROJECT_URL = "https://github.com/F4dl0/keydroid" + + +class MySMS(HackingTool): + TITLE = "MySMS" + DESCRIPTION = "Script that generates an Android App to hack SMS through WAN \n" \ + "[!] You have to install Some Manually Refer Below Link:\n\t " \ + "[+] https://github.com/papusingh2sms/mysms" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/papusingh2sms/mysms.git"] + RUN_COMMANDS = ["cd mysms && bash mysms.sh"] + PROJECT_URL = "https://github.com/papusingh2sms/mysms" + + +class LockPhish(HackingTool): + TITLE = "Lockphish (Grab target LOCK PIN)" + DESCRIPTION = "Lockphish it's the first tool for phishing attacks on the " \ + "lock screen, designed to\n Grab Windows credentials,Android" \ + " PIN and iPhone Passcode using a https link." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/JasonJerry/lockphish.git"] + RUN_COMMANDS = ["cd lockphish && bash lockphish.sh"] + PROJECT_URL = "https://github.com/JasonJerry/lockphish" + + +class Droidcam(HackingTool): + TITLE = "DroidCam (Capture Image)" + DESCRIPTION = "Powerful Tool For Grab Front Camera Snap Using A Link" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/kinghacker0/WishFish.git;" + "sudo apt install php wget openssh" + ] + RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"] + PROJECT_URL = "https://github.com/kinghacker0/WishFish" + + +class EvilApp(HackingTool): + TITLE = "EvilApp (Hijack Session)" + DESCRIPTION = "EvilApp is a script to generate Android App that can " \ + "hijack authenticated sessions in cookies." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/crypticterminal/EvilApp.git"] + RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"] + PROJECT_URL = "https://github.com/crypticterminal/EvilApp" + + +class AndroidAttackTools(HackingToolsCollection): + TITLE = "Android Hacking tools" + TOOLS = [ + Keydroid(), + MySMS(), + LockPhish(), + Droidcam(), + EvilApp() + ] diff --git a/tools/others/email_verifier.py b/tools/others/email_verifier.py new file mode 100644 index 0000000..d25fc59 --- /dev/null +++ b/tools/others/email_verifier.py @@ -0,0 +1,19 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class KnockMail(HackingTool): + TITLE = "Knockmail" + DESCRIPTION = "KnockMail Tool Verify If Email Exists" + INSTALL_COMMANDS = [ + "git clone https://github.com/4w4k3/KnockMail.git", + "cd KnockMail;sudo pip install -r requeriments.txt" + ] + RUN_COMMANDS = ["cd KnockMail;python knock.py"] + PROJECT_URL = "https://github.com/4w4k3/KnockMail" + + +class EmailVerifyTools(HackingToolsCollection): + TITLE = "Email Verify tools" + TOOLS = [KnockMail()] diff --git a/tools/others/hash_crack.py b/tools/others/hash_crack.py new file mode 100644 index 0000000..60a7289 --- /dev/null +++ b/tools/others/hash_crack.py @@ -0,0 +1,21 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class HashBuster(HackingTool): + TITLE = "Hash Buster" + DESCRIPTION = "Features: \n " \ + "Automatic hash type identification \n " \ + "Supports MD5, SHA1, SHA256, SHA384, SHA512" + INSTALL_COMMANDS = [ + "git clone https://github.com/s0md3v/Hash-Buster.git", + "cd Hash-Buster;make install" + ] + RUN_COMMANDS = ["buster -h"] + PROJECT_URL = "https://github.com/s0md3v/Hash-Buster" + + +class HashCrackingTools(HackingToolsCollection): + TITLE = "Hash cracking tools" + TOOLS = [HashBuster()] diff --git a/tools/others/homograph_attacks.py b/tools/others/homograph_attacks.py new file mode 100644 index 0000000..1ff2207 --- /dev/null +++ b/tools/others/homograph_attacks.py @@ -0,0 +1,17 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class EvilURL(HackingTool): + TITLE = "EvilURL" + DESCRIPTION = "Generate unicode evil domains for IDN Homograph Attack " \ + "and detect them." + INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/EvilURL.git"] + RUN_COMMANDS = ["cd EvilURL;python3 evilurl.py"] + PROJECT_URL = "https://github.com/UndeadSec/EvilURL" + + +class IDNHomographAttackTools(HackingToolsCollection): + TITLE = "IDN Homograph Attack" + TOOLS = [EvilURL()] diff --git a/tools/others/mix_tools.py b/tools/others/mix_tools.py new file mode 100644 index 0000000..574eb87 --- /dev/null +++ b/tools/others/mix_tools.py @@ -0,0 +1,19 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class TerminalMultiplexer(HackingTool): + TITLE = "Terminal Multiplexer" + DESCRIPTION = "Terminal Multiplexer is a tiling terminal emulator that " \ + "allows us to open \n several terminal sessions inside one " \ + "single window." + INSTALL_COMMANDS = ["sudo apt-get install tilix"] + + def __init__(self): + super(TerminalMultiplexer, self).__init__(runnable = False) + + +class MixTools(HackingToolsCollection): + TITLE = "Mix tools" + TOOLS = [TerminalMultiplexer()] diff --git a/tools/others/payload_injection.py b/tools/others/payload_injection.py new file mode 100644 index 0000000..92ab146 --- /dev/null +++ b/tools/others/payload_injection.py @@ -0,0 +1,37 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class DebInject(HackingTool): + TITLE = "Debinject" + DESCRIPTION = "Debinject is a tool that inject malicious code into *.debs" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UndeadSec/Debinject.git"] + RUN_COMMANDS = ["cd Debinject;python debinject.py"] + PROJECT_URL = "https://github.com/UndeadSec/Debinject" + + +class Pixload(HackingTool): + TITLE = "Pixload" + DESCRIPTION = "Pixload -- Image Payload Creating tools \n " \ + "Pixload is Set of tools for creating/injecting payload into images." + INSTALL_COMMANDS = [ + "sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl", + "sudo git clone https://github.com/chinarulezzz/pixload.git" + ] + PROJECT_URL = "https://github.com/chinarulezzz/pixload" + + def __init__(self): + # super(Pixload, self).__init__([ + # ('How To Use', self.show_project_page) + # ], runnable = False) + super(Pixload, self).__init__(runnable = False) + + +class PayloadInjectorTools(HackingToolsCollection): + TITLE = "Payload Injector" + TOOLS = [ + DebInject(), + Pixload() + ] diff --git a/tools/others/socialmedia.py b/tools/others/socialmedia.py new file mode 100644 index 0000000..c4be439 --- /dev/null +++ b/tools/others/socialmedia.py @@ -0,0 +1,74 @@ +# coding=utf-8 +import os +import subprocess + +from core import HackingTool +from core import HackingToolsCollection + + +class InstaBrute(HackingTool): + TITLE = "Instagram Attack" + DESCRIPTION = "Brute force attack against Instagram" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/chinoogawa/instaBrute.git", + "cd instaBrute;sudo pip install -r requirements.txt" + ] + PROJECT_URL = "https://github.com/chinoogawa/instaBrute" + + def run(self): + name = input("Enter Username >> ") + wordlist = input("Enter wordword list >> ") + os.system("cd instaBrute;") + subprocess.run( + ["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d", + f"{wordlist}"]) + + +class BruteForce(HackingTool): + TITLE = "AllinOne SocialMedia Attack" + DESCRIPTION = "Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n" \ + "[!] python3 Brute_Force.py -g -l " + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git", + "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize" + ] + RUN_COMMANDS = ["cd Brute_Force;python3 Brute_Force.py -h"] + PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force" + + +class Faceshell(HackingTool): + TITLE = "Facebook Attack" + DESCRIPTION = "Facebook BruteForcer" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git", + "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize" + ] + PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force" + + def run(self): + name = input("Enter Username >> ") + wordlist = input("Enter Wordlist >> ") + os.system("cd Brute_Force;") + subprocess.run( + ["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"]) + + +class AppCheck(HackingTool): + TITLE = "Application Checker" + DESCRIPTION = "Tool to check if an app is installed on the target device through a link." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/jakuta-tech/underhanded.git", + "cd underhanded && sudo chmod +x underhanded.sh" + ] + RUN_COMMANDS = ["cd underhanded;sudo bash underhanded.sh"] + PROJECT_URL = "https://github.com/jakuta-tech/underhanded" + + +class SocialMediaBruteforceTools(HackingToolsCollection): + TITLE = "SocialMedia Bruteforce" + TOOLS = [ + InstaBrute(), + BruteForce(), + Faceshell(), + AppCheck() + ] diff --git a/tools/others/socialmedia_finder.py b/tools/others/socialmedia_finder.py new file mode 100644 index 0000000..ba1d27d --- /dev/null +++ b/tools/others/socialmedia_finder.py @@ -0,0 +1,85 @@ +# coding=utf-8 +import os +import subprocess + +from core import HackingTool +from core import HackingToolsCollection + + +class FacialFind(HackingTool): + TITLE = "Find SocialMedia By Facial Recognation System" + DESCRIPTION = "A Social Media Mapping Tool that correlates profiles\n " \ + "via facial recognition across different sites." + INSTALL_COMMANDS = [ + "sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade", + "sudo git clone https://github.com/Greenwolf/social_mapper.git", + "cd social_mapper/setup", + "sudo python3 -m pip install --no-cache-dir -r requirements.txt", + 'echo "[!]Now You have To do some Manually\n' + '[!] Install the Geckodriver for your operating system\n' + '[!] Copy & Paste Link And Download File As System Configuration\n' + '[#] https://github.com/mozilla/geckodriver/releases\n' + '[!!] On Linux you can place it in /usr/bin "| boxes | lolcat' + ] + PROJECT_URL = "https://github.com/Greenwolf/social_mapper" + + def run(self): + os.system("cd social_mapper/setup") + os.system("sudo python social_mapper.py -h") + print("""\033[95m + You have to set Username and password of your AC Or Any Fack Account + [#] Type in Terminal nano social_mapper.py + """) + os.system( + 'echo "python social_mapper.py -f [] -i [] -m fast [] -fb -tw"| boxes | lolcat') + + +class FindUser(HackingTool): + TITLE = "Find SocialMedia By UserName" + DESCRIPTION = "Find usernames across over 75 social networks" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/xHak9x/finduser.git", + "cd finduser && sudo chmod +x finduser.sh" + ] + RUN_COMMANDS = ["cd finduser && sudo bash finduser.sh"] + PROJECT_URL = "https://github.com/xHak9x/finduser" + + +class Sherlock(HackingTool): + TITLE = "Sherlock" + DESCRIPTION = "Hunt down social media accounts by username across social networks \n " \ + "For More Usege \n" \ + "\t >>python3 sherlock --help" + INSTALL_COMMANDS = [ + "git clone https://github.com/sherlock-project/sherlock.git", + "cd sherlock;sudo python3 -m pip install -r requirements.txt" + ] + PROJECT_URL = "https://github.com/sherlock-project/sherlock" + + def run(self): + name = input("Enter Username >> ") + os.system("cd sherlock;") + subprocess.run(["sudo", "python3", "sherlock", f"{name}"]) + + +class SocialScan(HackingTool): + TITLE = "SocialScan | Username or Email" + DESCRIPTION = "Check email address and username availability on online " \ + "platforms with 100% accuracy" + INSTALL_COMMANDS = ["sudo pip install socialscan"] + PROJECT_URL = "https://github.com/iojw/socialscan" + + def run(self): + name = input( + "Enter Username or Emailid (if both then please space between email & username) >> ") + subprocess.run(["sudo", "socialscan", f"{name}"]) + + +class SocialMediaFinderTools(HackingToolsCollection): + TITLE = "SocialMedia Finder" + TOOLS = [ + FacialFind(), + FindUser(), + Sherlock(), + SocialScan() + ] diff --git a/tools/others/web_crawling.py b/tools/others/web_crawling.py new file mode 100644 index 0000000..8d7989c --- /dev/null +++ b/tools/others/web_crawling.py @@ -0,0 +1,18 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class GoSpider(HackingTool): + TITLE = "Gospider" + DESCRIPTION = "Gospider - Fast web spider written in Go" + INSTALL_COMMANDS = ["sudo go get -u github.com/jaeles-project/gospider"] + PROJECT_URL = "https://github.com/jaeles-project/gospider" + + def __init__(self): + super(GoSpider, self).__init__(runnable = False) + + +class WebCrawlingTools(HackingToolsCollection): + TITLE = "Web crawling" + TOOLS = [GoSpider()] diff --git a/tools/others/wifi_jamming.py b/tools/others/wifi_jamming.py new file mode 100644 index 0000000..412e915 --- /dev/null +++ b/tools/others/wifi_jamming.py @@ -0,0 +1,37 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class WifiJammerNG(HackingTool): + TITLE = "WifiJammer-NG" + DESCRIPTION = "Continuously jam all wifi clients and access points within range." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/MisterBianco/wifijammer-ng.git", + "cd wifijammer-ng;sudo pip3 install -r requirements.txt" + ] + RUN_COMMANDS = [ + 'echo "python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]"| boxes | lolcat', + "cd wifijammer-ng;sudo python3 wifijammer.py" + ] + PROJECT_URL = "https://github.com/MisterBianco/wifijammer-ng" + + +class KawaiiDeauther(HackingTool): + TITLE = "KawaiiDeauther" + DESCRIPTION = "Kawaii Deauther is a pentest toolkit whose goal is to perform \n " \ + "jam on WiFi clients/routers and spam many fake AP for testing purposes." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/aryanrtm/KawaiiDeauther.git", + "cd KawaiiDeauther;sudo bash install.sh" + ] + RUN_COMMANDS = ["cd KawaiiDeauther;sudo KawaiiDeauther.sh"] + PROJECT_URL = "https://github.com/aryanrtm/KawaiiDeauther" + + +class WifiJammingTools(HackingToolsCollection): + TITLE = "Wifi Deauthenticate" + TOOLS = [ + WifiJammerNG(), + KawaiiDeauther() + ] diff --git a/tools/payload_creator.py b/tools/payload_creator.py new file mode 100644 index 0000000..22ae29a --- /dev/null +++ b/tools/payload_creator.py @@ -0,0 +1,141 @@ +# coding=utf-8 +import os + +from core import HackingTool +from core import HackingToolsCollection + + +class TheFatRat(HackingTool): + TITLE = "The FatRat" + DESCRIPTION = "TheFatRat Provides An Easy way to create Backdoors and \n" \ + "Payload which can bypass most anti-virus" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Screetsec/TheFatRat.git", + "cd TheFatRat && sudo chmod +x setup.sh" + ] + RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"] + PROJECT_URL = "https://github.com/Screetsec/TheFatRat" + + def __init__(self): + super(TheFatRat, self).__init__([ + ('Update', self.update), + ('Troubleshoot', self.troubleshoot) + ]) + + def update(self): + os.system( + "cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh") + + def troubleshoot(self): + os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools") + + +class Brutal(HackingTool): + TITLE = "Brutal" + DESCRIPTION = "Brutal is a toolkit to quickly create various payload," \ + "powershell attack,\nvirus attack and launch listener for " \ + "a Human Interface Device" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Screetsec/Brutal.git", + "cd Brutal && sudo chmod +x Brutal.sh" + ] + RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"] + PROJECT_URL = "https://github.com/Screetsec/Brutal" + + def show_info(self): + super(Brutal, self).show_info() + print(""" + [!] Requirement + >> Arduino Software (I used v1.6.7) + >> TeensyDuino + >> Linux udev rules + >> Copy and paste the PaensyLib folder inside your Arduino\libraries + + [!] Kindly Visit below link for Installation for Arduino + >> https://github.com/Screetsec/Brutal/wiki/Install-Requirements + """) + + +class Stitch(HackingTool): + TITLE = "Stitch" + DESCRIPTION = "Stitch is Cross Platform Python Remote Administrator Tool\n\t" \ + "[!] Refer Below Link For Wins & MAc Os" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/nathanlopez/Stitch.git", + "cd Stitch && sudo pip install -r lnx_requirements.txt" + ] + RUN_COMMANDS = ["cd Stitch && sudo python main.py"] + PROJECT_URL = "https://nathanlopez.github.io/Stitch" + + +class MSFVenom(HackingTool): + TITLE = "MSFvenom Payload Creator" + DESCRIPTION = "MSFvenom Payload Creator (MSFPC) is a wrapper to generate \n" \ + "multiple types of payloads, based on users choice.\n" \ + "The idea is to be as simple as possible (only requiring " \ + "one input) \nto produce their payload." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/g0tmi1k/msfpc.git", + "cd msfpc;sudo chmod +x msfpc.sh" + ] + RUN_COMMANDS = ["cd msfpc;sudo bash msfpc.sh -h -v"] + PROJECT_URL = "https://github.com/g0tmi1k/msfpc" + + +class Venom(HackingTool): + TITLE = "Venom Shellcode Generator" + DESCRIPTION = "venom 1.0.11 (malicious_server) was build to take " \ + "advantage of \n apache2 webserver to deliver payloads " \ + "(LAN) using a fake webpage writen in html" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/r00t-3xp10it/venom.git", + "sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh", + "sudo ./venom.sh -u" + ] + RUN_COMMANDS = ["cd venom && sudo ./venom.sh"] + PROJECT_URL = "https://github.com/r00t-3xp10it/venom" + + +class Spycam(HackingTool): + TITLE = "Spycam" + DESCRIPTION = "Script to generate a Win32 payload that takes the webcam " \ + "image every 1 minute and send it to the attacker" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/thelinuxchoice/spycam.git", + "cd spycam && bash install.sh && chmod +x spycam" + ] + RUN_COMMANDS = ["cd spycam && ./spycam"] + PROJECT_URL = "https://github.com/thelinuxchoice/spycam" + + +class MobDroid(HackingTool): + TITLE = "Mob-Droid" + DESCRIPTION = "Mob-Droid helps you to generate metasploit payloads in " \ + "easy way\n without typing long commands and save your time" + INSTALL_COMMANDS = [ + "git clone https://github.com/kinghacker0/mob-droid.git"] + RUN_COMMANDS = ["cd Mob-Droid;sudo python mob-droid.py"] + PROJECT_URL = "https://github.com/kinghacker0/Mob-Droid" + + +class Enigma(HackingTool): + TITLE = "Enigma" + DESCRIPTION = "Enigma is a Multiplatform payload dropper" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UndeadSec/Enigma.git"] + RUN_COMMANDS = ["cd Enigma;sudo python3 enigma3.py"] + PROJECT_URL = "https://github.com/UndeadSec/Enigma" + + +class PayloadCreatorTools(HackingToolsCollection): + TITLE = "Payload creation tools" + TOOLS = [ + TheFatRat(), + Brutal(), + Stitch(), + MSFVenom(), + Venom(), + Spycam(), + MobDroid(), + Enigma() + ] diff --git a/tools/phising_attack.py b/tools/phising_attack.py new file mode 100644 index 0000000..ae545a9 --- /dev/null +++ b/tools/phising_attack.py @@ -0,0 +1,130 @@ +# coding=utf-8 +import os + +from core import HackingTool +from core import HackingToolsCollection + + +class Setoolkit(HackingTool): + TITLE = "Setoolkit" + DESCRIPTION = "The Social-Engineer Toolkit is an open-source penetration\n" \ + "testing framework designed for social engineering" + INSTALL_COMMANDS = [ + "git clone https://github.com/trustedsec/social-engineer-toolkit.git", + "sudo python social-engineer-toolkit/setup.py" + ] + RUN_COMMANDS = ["sudo setoolkit"] + PROJECT_URL = "https://github.com/trustedsec/social-engineer-toolkit" + + +class SocialFish(HackingTool): + TITLE = "SocialFish" + DESCRIPTION = "Automated Phishing Tool & Information Collector" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y", + "cd SocialFish && sudo python3 -m pip install -r requirements.txt" + ] + RUN_COMMANDS = ["cd SocialFish && sudo python3 SocialFish.py root pass"] + PROJECT_URL = "https://github.com/UndeadSec/SocialFish" + + +class HiddenEye(HackingTool): + TITLE = "HiddenEye" + DESCRIPTION = "Modern Phishing Tool With Advanced Functionality And " \ + "Multiple Tunnelling Services \n" \ + "\t [!]https://github.com/DarkSecDevelopers/HiddenEye" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye", + "cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok" + ] + RUN_COMMANDS = ["cd HiddenEye;sudo python3 HiddenEye.py"] + PROJECT_URL = "https://github.com/DarkSecDevelopers/HiddenEye" + + +class Evilginx2(HackingTool): + TITLE = "Evilginx2" + DESCRIPTION = "evilginx2 is a man-in-the-middle attack framework used " \ + "for phishing login credentials along with session cookies,\n" \ + "which in turn allows to bypass 2-factor authentication protection.\n\n\t " \ + "[+]Make sure you have installed GO of version at least 1.14.0 \n" \ + "[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t " \ + "[+]export GOPATH=$HOME/go \n " \ + "[+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n" \ + "[+]Then load it with source ~/.profiles." + INSTALL_COMMANDS = [ + "sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2", + "cd $GOPATH/src/github.com/kgretzky/evilginx2;make", + "sudo make install;sudo evilginx" + ] + RUN_COMMANDS = ["sudo evilginx"] + PROJECT_URL = "https://github.com/kgretzky/evilginx2" + + +class ISeeYou(HackingTool): + TITLE = "I-See_You(Get Location using phishing attack)" + DESCRIPTION = "[!] ISeeYou is a tool to find Exact Location of Victom By" \ + " User SocialEngineering or Phishing Engagment..\n" \ + "[!] Users can expose their local servers to the Internet " \ + "and decode the location coordinates by looking at the log file" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Viralmaniar/I-See-You.git", + "cd I-See-You && sudo chmod u+x ISeeYou.sh" + ] + RUN_COMMANDS = ["cd I-See-You && sudo bash ISeeYou.sh"] + PROJECT_URL = "https://github.com/Viralmaniar/I-See-You" + + +class SayCheese(HackingTool): + TITLE = "SayCheese (Grab target's Webcam Shots)" + DESCRIPTION = "Take webcam shots from target just sending a malicious link" + INSTALL_COMMANDS = ["sudo git clone https://github.com/hangetzzu/saycheese"] + RUN_COMMANDS = ["cd saycheese && sudo bash saycheese.sh"] + PROJECT_URL = "https://github.com/hangetzzu/saycheese" + + +class QRJacking(HackingTool): + TITLE = "QR Code Jacking" + DESCRIPTION = "QR Code Jacking (Any Website)" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt-get install scrot"] + RUN_COMMANDS = ["cd ohmyqr && sudo bash ohmyqr.sh"] + PROJECT_URL = "https://github.com/cryptedwolf/ohmyqr" + + +class ShellPhish(HackingTool): + TITLE = "ShellPhish" + DESCRIPTION = "Fhishing Tool for 18 social media" + INSTALL_COMMANDS = ["git clone https://github.com/An0nUD4Y/shellphish.git"] + RUN_COMMANDS = ["cd shellphish;sudo bash shellphish.sh"] + PROJECT_URL = "https://github.com/An0nUD4Y/shellphish" + + +class BlackPhish(HackingTool): + TITLE = "BlackPhish" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/iinc0gnit0/BlackPhish.git", + "cd BlackPhish;sudo bash install.sh" + ] + RUN_COMMANDS = ["cd BlackPhish;sudo python3 blackphish.py"] + PROJECT_URL = "https://github.com/iinc0gnit0/BlackPhish" + + def __init__(self): + super(BlackPhish, self).__init__([('Update', self.update)]) + + def update(self): + os.system("cd BlackPhish;sudo bash update.sh") + + +class PhishingAttackTools(HackingToolsCollection): + TITLE = "Phishing attack tools" + TOOLS = [ + Setoolkit(), + SocialFish(), + HiddenEye(), + Evilginx2(), + ISeeYou(), + SayCheese(), + QRJacking(), + ShellPhish(), + BlackPhish() + ] diff --git a/tools/post_exploitation.py b/tools/post_exploitation.py new file mode 100644 index 0000000..3d9791f --- /dev/null +++ b/tools/post_exploitation.py @@ -0,0 +1,44 @@ +# coding=utf-8 +import os + +from core import HackingTool +from core import HackingToolsCollection + + +class Vegile(HackingTool): + TITLE = "Vegile - Ghost In The Shell" + DESCRIPTION = "This tool will set up your backdoor/rootkits when " \ + "backdoor is already setup it will be \n" \ + "hidden your specific process,unlimited your session in " \ + "metasploit and transparent." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Screetsec/Vegile.git", + "cd Vegile && sudo chmod +x Vegile" + ] + RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"] + PROJECT_URL = "https://github.com/Screetsec/Vegile" + + def before_run(self): + os.system('echo "You can Use Command: \n' + '[!] Vegile -i / --inject [backdoor/rootkit] \n' + '[!] Vegile -u / --unlimited [backdoor/rootkit] \n' + '[!] Vegile -h / --help"|boxes -d parchment') + + +class ChromeKeyLogger(HackingTool): + TITLE = "Chrome Keylogger" + DESCRIPTION = "Hera Chrome Keylogger" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UndeadSec/HeraKeylogger.git", + "cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt" + ] + RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"] + PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger" + + +class PostExploitationTools(HackingToolsCollection): + TITLE = "Post exploitation tools" + TOOLS = [ + Vegile(), + ChromeKeyLogger() + ] diff --git a/tools/remote_administration.py b/tools/remote_administration.py new file mode 100644 index 0000000..b5d7e0e --- /dev/null +++ b/tools/remote_administration.py @@ -0,0 +1,36 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class Stitch(HackingTool): + TITLE = "Stitch" + DESCRIPTION = "Stitch is a cross platform python framework.\n" \ + "which allows you to build custom payloads\n" \ + "For Windows, Mac and Linux." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/nathanlopez/Stitch.git", + "cd Stitch;sudo pip install -r lnx_requirements.txt" + ] + RUN_COMMANDS = ["cd Stitch;python main.py"] + PROJECT_URL = "https://github.com/nathanlopez/Stitch" + + +class Pyshell(HackingTool): + TITLE = "Pyshell" + DESCRIPTION = "Pyshell is a Rat Tool that can be able to download & upload " \ + "files,\n Execute OS Command and more.." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/khalednassar702/Pyshell.git;" + "sudo pip install pyscreenshot python-nmap requests" + ] + RUN_COMMANDS = ["cd Pyshell;./Pyshell"] + PROJECT_URL = "https://github.com/knassar702/pyshell" + + +class RemoteAdministrationTools(HackingToolsCollection): + TITLE = "Remote Administrator Tools (RAT)" + TOOLS = [ + Stitch(), + Pyshell() + ] diff --git a/tools/reverse_engineering.py b/tools/reverse_engineering.py new file mode 100644 index 0000000..9972334 --- /dev/null +++ b/tools/reverse_engineering.py @@ -0,0 +1,56 @@ +# coding=utf-8 +import subprocess + +from core import HackingTool +from core import HackingToolsCollection + + +class AndroGuard(HackingTool): + TITLE = "Androguard" + DESCRIPTION = "Androguard is a Reverse engineering, Malware and goodware " \ + "analysis of Android applications and more" + INSTALL_COMMANDS = ["sudo pip install -U androguard"] + PROJECT_URL = "https://github.com/androguard/androguard " + + def __init__(self): + super(AndroGuard, self).__init__(runnable = False) + + +class Apk2Gold(HackingTool): + TITLE = "Apk2Gold" + DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/lxdvs/apk2gold.git", + "cd apk2gold;sudo bash make.sh" + ] + PROJECT_URL = "https://github.com/lxdvs/apk2gold " + + def run(self): + uinput = input("Enter (.apk) File >> ") + subprocess.run(["sudo", "apk2gold", uinput]) + + +class Jadx(HackingTool): + TITLE = "JadX" + DESCRIPTION = "Jadx is Dex to Java decompiler.\n" \ + "[*] decompile Dalvik bytecode to java classes from APK, dex," \ + " aar and zip files\n" \ + "[*] decode AndroidManifest.xml and other resources from " \ + "resources.arsc" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/skylot/jadx.git", + "cd jadx;./gradlew dist" + ] + PROJECT_URL = "https://github.com/skylot/jadx" + + def __init__(self): + super(Jadx, self).__init__(runnable = False) + + +class ReverseEngineeringTools(HackingToolsCollection): + TITLE = "Reverse engineering tools" + TOOLS = [ + AndroGuard(), + Apk2Gold(), + Jadx() + ] diff --git a/tools/sql_tools.py b/tools/sql_tools.py new file mode 100644 index 0000000..fb13ff4 --- /dev/null +++ b/tools/sql_tools.py @@ -0,0 +1,117 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class Sqlmap(HackingTool): + TITLE = "Sqlmap tool" + DESCRIPTION = "sqlmap is an open source penetration testing tool that " \ + "automates the process of \n" \ + "detecting and exploiting SQL injection flaws and taking " \ + "over of database servers \n " \ + "[!] python sqlmap.py -u [] --batch --banner \n " \ + "More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage" + INSTALL_COMMANDS = [ + "sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"] + PROJECT_URL = "https://github.com/sqlmapproject/sqlmap" + + def __init__(self): + super(Sqlmap, self).__init__(runnable = False) + + +class NoSqlMap(HackingTool): + TITLE = "NoSqlMap" + DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \ + "audit for as well as automate injection attacks and exploit.\n " \ + "\033[91m " \ + "[*] Please Install MongoDB \n " + INSTALL_COMMANDS = [ + "git clone https://github.com/codingo/NoSQLMap.git", + "sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install" + ] + RUN_COMMANDS = ["python NoSQLMap"] + PROJECT_URL = "https://github.com/codingo/NoSQLMap" + + +class SQLiScanner(HackingTool): + TITLE = "Damn Small SQLi Scanner" + DESCRIPTION = "Damn Small SQLi Scanner (DSSS) is a fully functional SQL " \ + "injection\nvulnerability scanner also supporting GET and " \ + "POST parameters.\n" \ + "[*]python3 dsss.py -h[help] | -u[URL]" + INSTALL_COMMANDS = ["git clone https://github.com/stamparm/DSSS.git"] + PROJECT_URL = "https://github.com/stamparm/DSSS" + + def __init__(self): + super(SQLiScanner, self).__init__(runnable = False) + + +class Explo(HackingTool): + TITLE = "Explo" + DESCRIPTION = "Explo is a simple tool to describe web security issues " \ + "in a human and machine readable format.\n " \ + "Usage:- \n " \ + "[1] explo [--verbose|-v] testcase.yaml \n " \ + "[2] explo [--verbose|-v] examples/*.yaml" + INSTALL_COMMANDS = [ + "git clone https://github.com/dtag-dev-sec/explo.git", + "cd explo;sudo python setup.py install" + ] + PROJECT_URL = "https://github.com/dtag-dev-sec/explo" + + def __init__(self): + super(Explo, self).__init__(runnable = False) + + +class Blisqy(HackingTool): + TITLE = "Blisqy - Exploit Time-based blind-SQL injection" + DESCRIPTION = "Blisqy is a tool to aid Web Security researchers to find " \ + "Time-based Blind SQL injection \n on HTTP Headers and also " \ + "exploitation of the same vulnerability.\n " \ + "For Usage >> \n" + INSTALL_COMMANDS = ["git clone https://github.com/JohnTroony/Blisqy.git"] + PROJECT_URL = "https://github.com/JohnTroony/Blisqy" + + def __init__(self): + super(Blisqy, self).__init__(runnable = False) + + +class Leviathan(HackingTool): + TITLE = "Leviathan - Wide Range Mass Audit Toolkit" + DESCRIPTION = "Leviathan is a mass audit toolkit which has wide range " \ + "service discovery,\nbrute force, SQL injection detection " \ + "and running custom exploit capabilities. \n " \ + "[*] It Requires API Keys \n " \ + "More Usage [!] https://github.com/utkusen/leviathan/wiki" + INSTALL_COMMANDS = [ + "git clone https://github.com/leviathan-framework/leviathan.git", + "cd leviathan;sudo pip install -r requirements.txt" + ] + RUN_COMMANDS = ["cd leviathan;python leviathan.py"] + PROJECT_URL = "https://github.com/leviathan-framework/leviathan" + + +class SQLScan(HackingTool): + TITLE = "SQLScan" + DESCRIPTION = "sqlscan is quick web scanner for find an sql inject point." \ + " not for educational, this is for hacking." + INSTALL_COMMANDS = [ + "sudo apt install php php-bz2 php-curl php-mbstring curl", + "sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan", + "chmod +x /usr/local/bin/sqlscan" + ] + RUN_COMMANDS = ["sudo sqlscan"] + PROJECT_URL = "https://github.com/Cvar1984/sqlscan" + + +class SqlInjectionTools(HackingToolsCollection): + TITLE = "SQL Injection Tools" + TOOLS = [ + Sqlmap(), + NoSqlMap(), + SQLiScanner(), + Explo(), + Blisqy(), + Leviathan(), + SQLScan() + ] diff --git a/tools/steganography.py b/tools/steganography.py new file mode 100644 index 0000000..1c7e039 --- /dev/null +++ b/tools/steganography.py @@ -0,0 +1,68 @@ +# coding=utf-8 +import subprocess + +from core import HackingTool +from core import HackingToolsCollection +from core import validate_input + + +class SteganoHide(HackingTool): + TITLE = "SteganoHide" + INSTALL_COMMANDS = ["sudo apt-get install steghide -y"] + + def run(self): + choice_run = input( + "[1] Hide\n" + "[2] Extract\n" + "[99]Cancel\n" + ">> ") + choice_run = validate_input(choice_run, [1, 2, 99]) + if choice_run is None: + print("Please choose a valid input") + return self.run() + + if choice_run == 99: + return + + if choice_run == 1: + file_hide = input("Enter Filename you want to Embed (1.txt) >> ") + file_to_be_hide = input("Enter Cover Filename(test.jpeg) >> ") + subprocess.run( + ["steghide", "embed", "-cf", file_to_be_hide, "-ef", file_hide]) + + elif choice_run == "2": + from_file = input("Enter Filename From Extract Data >> ") + subprocess.run(["steghide", "extract", "-sf", from_file]) + + +class StegnoCracker(HackingTool): + TITLE = "StegnoCracker" + DESCRIPTION = "SteganoCracker is a tool that uncover hidden data inside " \ + "files\n using brute-force utility" + INSTALL_COMMANDS = [ + "pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall"] + + def run(self): + filename = input("Enter Filename:- ") + passfile = input("Enter Wordlist Filename:- ") + subprocess.run(["stegcracker", filename, passfile]) + + +class Whitespace(HackingTool): + TITLE = "Whitespace" + DESCRIPTION = "Use whitespace and unicode chars for steganography" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/beardog108/snow10.git", + "sudo chmod -R 755 snow10" + ] + RUN_COMMANDS = ["cd snow10 && firefox index.html"] + PROJECT_URL = "https://github.com/beardog108/snow10" + + +class SteganographyTools(HackingToolsCollection): + TITLE = "Steganograhy tools" + TOOLS = [ + SteganoHide(), + StegnoCracker(), + Whitespace() + ] diff --git a/tools/tool_manager.py b/tools/tool_manager.py new file mode 100644 index 0000000..f0fa2aa --- /dev/null +++ b/tools/tool_manager.py @@ -0,0 +1,66 @@ +# coding=utf-8 +import os +from time import sleep + +from core import HackingTool +from core import HackingToolsCollection + + +class UpdateTool(HackingTool): + TITLE = "Update Tool or System" + DESCRIPTION = "Update Tool or System" + + def __init__(self): + super(UpdateTool, self).__init__([ + ("Update System", self.update_sys), + ("Update Hackingtool", self.update_ht) + ], installable = False, runnable = False) + + def update_sys(self): + os.system("sudo apt update && sudo apt full-upgrade -y") + os.system( + "sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl") + os.system("sudo apt-get install python3-pip") + + def update_ht(self): + os.system("sudo chmod +x /etc/;" + "sudo chmod +x /usr/share/doc;" + "sudo rm -rf /usr/share/doc/hackingtool/;" + "cd /etc/;" + "sudo rm -rf /etc/hackingtool/;" + "mkdir hackingtool;" + "cd hackingtool;" + "git clone https://github.com/Z4nzu/hackingtool.git;" + "cd hackingtool;" + "sudo chmod +x install.sh;" + "./install.sh") + + +class UninstallTool(HackingTool): + TITLE = "Uninstall HackingTool" + DESCRIPTION = "Uninstall HackingTool" + + def __init__(self): + super(UninstallTool, self).__init__([ + ('Uninstall', self.uninstall) + ], installable = False, runnable = False) + + def uninstall(self): + print("hackingtool started to uninstall..\n") + sleep(1) + os.system("sudo chmod +x /etc/;" + "sudo chmod +x /usr/share/doc;" + "sudo rm -rf /usr/share/doc/hackingtool/;" + "cd /etc/;" + "sudo rm -rf /etc/hackingtool/;") + print("\nHackingtool Successfully Uninstalled..") + print("Happy Hacking..!!") + sleep(1) + + +class ToolManager(HackingToolsCollection): + TITLE = "Update or Uninstall | Hackingtool" + TOOLS = [ + UpdateTool(), + UninstallTool() + ] diff --git a/tools/webattack.py b/tools/webattack.py new file mode 100644 index 0000000..b4e1b50 --- /dev/null +++ b/tools/webattack.py @@ -0,0 +1,113 @@ +# coding=utf-8 +import subprocess + +from core import HackingTool +from core import HackingToolsCollection + + +class Web2Attack(HackingTool): + TITLE = "Web2Attack" + DESCRIPTION = "Web hacking framework with tools, exploits by python" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/santatic/web2attack.git"] + RUN_COMMANDS = ["cd web2attack && sudo bash w2aconsole"] + PROJECT_URL = "https://github.com/santatic/web2attack" + + +class Skipfish(HackingTool): + TITLE = "Skipfish" + DESCRIPTION = "Skipfish – Fully automated, active web application " \ + "security reconnaissance tool \n " \ + "Usage: skipfish -o [FolderName] targetip/site" + RUN_COMMANDS = [ + "sudo skipfish -h", + 'echo "skipfish -o [FolderName] targetip/site"|boxes -d headline | lolcat' + ] + + def __init__(self): + super(Skipfish, self).__init__(installable = False) + + +class SubDomainFinder(HackingTool): + TITLE = "SubDomain Finder" + DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \ + "subdomains of websites using OSINT \n " \ + "Usage:\n\t" \ + "[1] python sublist3r.py -d example.com \n" \ + "[2] python sublist3r.py -d example.com -p 80,443" + INSTALL_COMMANDS = [ + "sudo pip install requests argparse dnspython", + "sudo git clone https://github.com/aboul3la/Sublist3r.git", + "cd Sublist3r && sudo pip install -r requirements.txt" + ] + RUN_COMMANDS = ["cd Sublist3r && python sublist3r.py -h"] + PROJECT_URL = "https://github.com/aboul3la/Sublist3r" + + +class CheckURL(HackingTool): + TITLE = "CheckURL" + DESCRIPTION = "Detect evil urls that uses IDN Homograph Attack.\n\t" \ + "[!] python3 checkURL.py --url google.com" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UndeadSec/checkURL.git"] + RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"] + PROJECT_URL = "https://github.com/UndeadSec/checkURL" + + +class Blazy(HackingTool): + TITLE = "Blazy(Also Find ClickJacking)" + DESCRIPTION = "Blazy is a modern login page bruteforcer" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UltimateHackers/Blazy.git", + "cd Blazy && sudo pip install -r requirements.txt" + ] + RUN_COMMANDS = ["cd Blazy && sudo python blazy.py"] + PROJECT_URL = "https://github.com/UltimateHackers/Blazy" + + +class SubDomainTakeOver(HackingTool): + TITLE = "Sub-Domain TakeOver" + DESCRIPTION = "Sub-domain takeover vulnerability occur when a sub-domain " \ + "\n (subdomain.example.com) is pointing to a service " \ + "(e.g: GitHub, AWS/S3,..)\n" \ + "that has been removed or deleted.\n" \ + "Usage:python3 takeover.py -d www.domain.com -v" + INSTALL_COMMANDS = [ + "git clone https://github.com/m4ll0k/takeover.git", + "cd takeover;sudo python3 setup.py install" + ] + PROJECT_URL = "https://github.com/m4ll0k/takeover" + + def __init__(self): + super(SubDomainTakeOver, self).__init__(runnable = False) + + +class Dirb(HackingTool): + TITLE = "Dirb" + DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \ + "(and/or hidden) Web Objects.\n" \ + "It basically works by launching a dictionary based " \ + "attack against \n a web server and analizing the response." + INSTALL_COMMANDS = [ + "sudo git clone https://gitlab.com/kalilinux/packages/dirb.git", + "cd dirb;sudo ./configure;make" + ] + PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb" + + def run(self): + uinput = input("Enter Url >> ") + subprocess.run(["sudo", "dirb", uinput]) + + +class WebAttackTools(HackingToolsCollection): + TITLE = "Web Attack tools" + DESCRIPTION = "" + TOOLS = [ + Web2Attack(), + Skipfish(), + SubDomainFinder(), + CheckURL(), + Blazy(), + SubDomainTakeOver(), + Dirb() + ] diff --git a/tools/wireless_attack_tools.py b/tools/wireless_attack_tools.py new file mode 100644 index 0000000..f508bdd --- /dev/null +++ b/tools/wireless_attack_tools.py @@ -0,0 +1,155 @@ +# coding=utf-8 +import os + +from core import HackingTool +from core import HackingToolsCollection + + +class WIFIPumpkin(HackingTool): + TITLE = "WiFi-Pumpkin" + DESCRIPTION = "The WiFi-Pumpkin is a rogue AP framework to easily create " \ + "these fake networks\n" \ + "all while forwarding legitimate traffic to and from the " \ + "unsuspecting target." + INSTALL_COMMANDS = [ + "sudo apt install libssl-dev libffi-dev build-essential", + "sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git", + "chmod -R 755 wifipumpkin3 && cd wifipumpkin3", + "sudo apt install python3-pyqt5", + "sudo python3 setup.py install" + ] + RUN_COMMANDS = ["sudo wifipumpkin3"] + PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3" + + +class pixiewps(HackingTool): + TITLE = "pixiewps" + DESCRIPTION = "Pixiewps is a tool written in C used to bruteforce offline " \ + "the WPS pin\n " \ + "exploiting the low or non-existing entropy of some Access " \ + "Points, the so-called pixie dust attack" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential", + "cd pixiewps*/ && make", + "cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh" + ] + PROJECT_URL = "https://github.com/wiire/pixiewps" + + def run(self): + os.system( + 'echo "' + '1.> Put your interface into monitor mode using ' + '\'airmon-ng start {wireless interface}\n' + '2.> wash -i {monitor-interface like mon0}\'\n' + '3.> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f"' + '| boxes -d boy') + print("You Have To Run Manually By USing >>pixiewps -h ") + + +class BluePot(HackingTool): + TITLE = "Bluetooth Honeypot GUI Framework" + DESCRIPTION = "You need to have at least 1 bluetooh receiver " \ + "(if you have many it will work with those, too).\n" \ + "You must install/libbluetooth-dev on " \ + "Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE" + INSTALL_COMMANDS = [ + "wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz " + "&& tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar" + ] + RUN_COMMANDS = ["cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar"] + PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot" + + +class Fluxion(HackingTool): + TITLE = "Fluxion" + DESCRIPTION = "Fluxion is a wifi key cracker using evil twin attack..\n" \ + "you need a wireless adaptor for this tool" + INSTALL_COMMANDS = [ + "git clone https://github.com/thehackingsage/Fluxion.git", + "cd Fluxion && cd install && sudo chmod +x install.sh && sudo bash install.sh", + "cd .. ; sudo chmod +x fluxion.sh" + ] + RUN_COMMANDS = ["cd Fluxion;sudo bash fluxion.sh"] + PROJECT_URL = "https://github.com/thehackingsage/Fluxion" + + +class Wifiphisher(HackingTool): + TITLE = "Wifiphisher" + DESCRIPTION = """ + Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. + Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing + targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the + connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the + victim stations with malware..\n + For More Details Visit >> https://github.com/wifiphisher/wifiphisher + """ + INSTALL_COMMANDS = [ + "git clone https://github.com/wifiphisher/wifiphisher.git", + "cd wifiphisher;sudo python3 setup.py install" + ] + RUN_COMMANDS = ["cd wifiphisher;sudo wifiphisher"] + PROJECT_URL = "https://github.com/wifiphisher/wifiphisher" + + +class Wifite(HackingTool): + TITLE = "Wifite" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/derv82/wifite2.git", + "cd wifite2 && sudo python3 setup.py install" + ";sudo pip3 install -r requirements.txt" + ] + RUN_COMMANDS = ["cd wifite2; sudo wifite"] + PROJECT_URL = "https://github.com/derv82/wifite2" + + +class EvilTwin(HackingTool): + TITLE = "EvilTwin" + DESCRIPTION = "Fakeap is a script to perform Evil Twin Attack, by getting" \ + " credentials using a Fake page and Fake Access Point" + INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"] + RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"] + PROJECT_URL = "https://github.com/Z4nzu/fakeap" + + +class Fastssh(HackingTool): + TITLE = "Fastssh" + DESCRIPTION = "Fastssh is an Shell Script to perform multi-threaded scan" \ + " \n and brute force attack against SSH protocol using the " \ + "most commonly credentials." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && sudo chmod +x fastssh.sh", + "sudo apt-get install -y sshpass netcat" + ] + RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"] + PROJECT_URL = "https://github.com/Z4nzu/fastssh" + + +class Howmanypeople(HackingTool): + TITLE = "Howmanypeople" + DESCRIPTION = "Count the number of people around you by monitoring wifi " \ + "signals.\n" \ + "[@] WIFI ADAPTER REQUIRED* \n[*]" \ + "It may be illegal to monitor networks for MAC addresses, \n" \ + "especially on networks that you do not own. " \ + "Please check your country's laws" + INSTALL_COMMANDS = [ + "sudo apt-get install tshark" + ";sudo pip install howmanypeoplearearound" + ] + RUN_COMMANDS = ["sudo howmanypeoplearearound"] + + +class WirelessAttackTools(HackingToolsCollection): + TITLE = "Wireless attack tools" + DESCRIPTION = "" + TOOLS = [ + WIFIPumpkin(), + pixiewps(), + BluePot(), + Fluxion(), + Wifiphisher(), + Wifite(), + EvilTwin(), + Fastssh(), + Howmanypeople() + ] diff --git a/tools/wordlist_generator.py b/tools/wordlist_generator.py new file mode 100644 index 0000000..6ea3760 --- /dev/null +++ b/tools/wordlist_generator.py @@ -0,0 +1,59 @@ +# coding=utf-8 +from core import HackingTool +from core import HackingToolsCollection + + +class Cupp(HackingTool): + TITLE = "Cupp" + DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \ + "and you can choose Length, Lowercase, Capital, Numbers and Special Chars" + INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"] + PROJECT_URL = "https://github.com/Mebus/cupp.git" + + def __init__(self): + super(Cupp, self).__init__(runnable = False) + + +class WlCreator(HackingTool): + TITLE = "WordlistCreator" + DESCRIPTION = "WlCreator is a C program that can create all possibilities" \ + " of passwords,\n and you can choose Lenght, Lowercase, " \ + "Capital, Numbers and Special Chars" + INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/wlcreator.git"] + RUN_COMMANDS = [ + "cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5"] + PROJECT_URL = "https://github.com/Z4nzu/wlcreator" + + +class GoblinWordGenerator(HackingTool): + TITLE = "Goblin WordGenerator" + DESCRIPTION = "Goblin WordGenerator" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git"] + RUN_COMMANDS = ["cd GoblinWordGenerator && python3 goblin.py"] + PROJECT_URL = "https://github.com/UndeadSec/GoblinWordGenerator.git" + + +class showme(HackingTool): + TITLE = "Password list (1.4 Billion Clear Text Password)" + DESCRIPTION = "This tool allows you to perform OSINT and reconnaissance on " \ + "an organisation or an individual. It allows one to search " \ + "1.4 Billion clear text credentials which was dumped as " \ + "part of BreachCompilation leak. This database makes " \ + "finding passwords faster and easier than ever before." + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git", + "cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt" + ] + RUN_COMMANDS = ["cd SMWYG-Show-Me-What-You-Got && python SMWYG.py"] + PROJECT_URL = "https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got" + + +class WordlistGeneratorTools(HackingToolsCollection): + TITLE = "Wordlist Generator" + TOOLS = [ + Cupp(), + WlCreator(), + GoblinWordGenerator(), + showme() + ] diff --git a/tools/xss_attack.py b/tools/xss_attack.py new file mode 100644 index 0000000..1797923 --- /dev/null +++ b/tools/xss_attack.py @@ -0,0 +1,145 @@ +# coding=utf-8 +import os +import subprocess + +from core import HackingTool +from core import HackingToolsCollection + + +class Dalfox(HackingTool): + TITLE = "DalFox(Finder of XSS)" + DESCRIPTION = "XSS Scanning and Parameter Analysis tool." + INSTALL_COMMANDS = [ + "sudo apt-get install golang", + "sudo git clone https://github.com/hahwul/dalfox", + "cd dalfox;go install" + ] + RUN_COMMANDS = [ + "~/go/bin/dalfox", + 'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"' + ] + PROJECT_URL = "https://github.com/hahwul/dalfox" + + +class XSSPayloadGenerator(HackingTool): + TITLE = "XSS Payload Generator" + DESCRIPTION = "XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER" + INSTALL_COMMANDS = [ + "git clone https://github.com/capture0x/XSS-LOADER.git", + "cd XSS-LOADER;sudo pip3 install -r requirements.txt" + ] + RUN_COMMANDS = ["cd XSS-LOADER;sudo python3 payloader.py"] + PROJECT_URL = "https://github.com/capture0x/XSS-LOADER.git" + + +class XSSFinder(HackingTool): + TITLE = "Extended XSS Searcher and Finder" + DESCRIPTION = "Extended XSS Searcher and Finder" + INSTALL_COMMANDS = [ + "git glone https://github.com/Damian89/extended-xss-search.git"] + PROJECT_URL = "https://github.com/Damian89/extended-xss-search" + + def after_install(self): + print("""\033[96m + Follow This Steps After Installation:- + \033[31m [*] Go To extended-xss-search directory, + and Rename the example.app-settings.conf to app-settings.conf + """) + input("Press ENTER to continue") + + def run(self): + print("""\033[96m + You have To Add Links to scan + \033[31m[!] Go to extended-xss-search + [*] config/urls-to-test.txt + [!] python3 extended-xss-search.py + """) + + +class XSSFreak(HackingTool): + TITLE = "XSS-Freak" + DESCRIPTION = "XSS-Freak is an XSS scanner fully written in python3 from scratch" + INSTALL_COMMANDS = [ + "git clone https://github.com/PR0PH3CY33/XSS-Freak.git", + "cd XSS-Freak;sudo pip3 install -r requirements.txt" + ] + RUN_COMMANDS = ["cd XSS-Freak;sudo python3 XSS-Freak.py"] + PROJECT_URL = "https://github.com/PR0PH3CY33/XSS-Freak" + + +class XSpear(HackingTool): + TITLE = "XSpear" + DESCRIPTION = "XSpear is XSS Scanner on ruby gems" + INSTALL_COMMANDS = ["gem install XSpear"] + RUN_COMMANDS = ["XSpear -h"] + PROJECT_URL = "https://github.com/hahwul/XSpear" + + +class XSSCon(HackingTool): + TITLE = "XSSCon" + INSTALL_COMMANDS = [ + "git clone https://github.com/menkrep1337/XSSCon.git", + "sudo chmod 755 -R XSSCon" + ] + PROJECT_URL = "https://github.com/menkrep1337/XSSCon" + + def run(self): + website = input("Enter Website >> ") + os.system("cd XSSCon;") + subprocess.run(["python3", "xsscon.py", "-u", website]) + + +class XanXSS(HackingTool): + TITLE = "XanXSS" + DESCRIPTION = "XanXSS is a reflected XSS searching tool\n " \ + "that creates payloads based from templates" + INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"] + PROJECT_URL = "https://github.com/Ekultek/XanXSS" + + def run(self): + os.system("cd XanXSS ;python xanxss.py -h") + print("\033[96m You Have to run it manually By Using\n" + " [!]python xanxss.py [Options]") + + +class XSSStrike(HackingTool): + TITLE = "Advanced XSS Detection Suite" + DESCRIPTION = "XSStrike is a python script designed to detect and exploit XSS vulnerabilites." + INSTALL_COMMANDS = [ + "sudo rm -rf XSStrike", + "git clone https://github.com/UltimateHackers/XSStrike.git " + "&& cd XSStrike && pip install -r requirements.txt" + ] + PROJECT_URL = "https://github.com/UltimateHackers/XSStrike" + + def __init__(self): + super(XSSStrike, self).__init__(runnable = False) + + +class RVuln(HackingTool): + TITLE = "RVuln" + DESCRIPTION = "RVuln is multi-threaded and Automated Web Vulnerability " \ + "Scanner written in Rust" + INSTALL_COMMANDS = [ + "sudo git clone https://github.com/iinc0gnit0/RVuln.git;" + "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;" + "source $HOME/.cargo/env", + "sudo apt install openssl-dev;sudo cp -r RVuln/ /usr/bin" + ] + RUN_COMMANDS = ["RVuln"] + PROJECT_URL = "https://github.com/iinc0gnit0/RVuln" + + +class XSSAttackTools(HackingToolsCollection): + TITLE = "XSS Attack Tools" + TOOLS = [ + Dalfox(), + XSSPayloadGenerator(), + XSSFinder(), + XSSFreak(), + XSpear(), + XSSCon(), + XanXSS(), + XSSStrike(), + RVuln() + ] diff --git a/update.sh b/update.sh new file mode 100644 index 0000000..b932440 --- /dev/null +++ b/update.sh @@ -0,0 +1,53 @@ +echo "β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ•— "; +echo "β•šβ•β•β–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β•šβ•β•β–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ "; +echo " β–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ "; +echo " β–ˆβ–ˆβ–ˆβ•”β• β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•‘ "; +echo "β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• "; +echo "β•šβ•β•β•β•β•β•β• β•šβ•β•β•šβ•β• β•šβ•β•β•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β• "; +echo " "; + +clear + +sudo chmod +x /etc/ + +clear + +sudo chmod +x /usr/share/doc + +clear + +sudo rm -rf /usr/share/doc/hackingtool/ + +clear + +cd /etc/ + +clear + +sudo rm -rf /etc/hackingtool + +clear + +mkdir hackingtool + +clear + +cd hackingtool + +clear + +git clone https://github.com/Z4nzu/hackingtool.git + +clear + +cd hackingtool + +clear + +sudo chmod +x install.sh + +clear + +./install.sh + +clear