[05]Password list((1.4 Billion Clear Text Password))
[99]Back To Main Menu
""")
passchoice=input("Z4nzu ==>> ")
...
...
@@ -350,6 +350,9 @@ def passwd():
elifpasschoice=="4"orpasschoice=="04":
clearScr()
credentialattack()
elifpasschoice=="5"orpasschoice=="05":
clearScr()
showme()
elifpasschoice=="99":
clearScr()
menu()
...
...
@@ -833,21 +836,29 @@ def forensic():
clearScr()
os.system("figlet -f standard Forensic Tools | lolcat ")
print("""
[1] Bulk_extractor
[2] Disk Clone and ISO Image Aquire
[3] AutoSpy
[1] Autopsy
[2] Wireshark
[3] Bulk_extractor
[4] Disk Clone and ISO Image Aquire
[5] Toolsley
[99]Back to Menu
""")
choice=input("Z4nzu ==>>")
ifchoice=="1":
ifchoice=="3":
clearScr()
bulkextractor()
elifchoice=="2":
elifchoice=="4":
clearScr()
guymager()
elifchoice=="3":
elifchoice=="1":
clearScr()
autopsy()
elifchoice=="2":
clearScr()
wireshark()
elifchoice=="5":
clearScr()
toolsley()
elifchoice=="99":
menu()
elifchoice=="":
...
...
@@ -909,6 +920,32 @@ def autopsy():
else:
menu()
defwireshark():
os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
choice=input("[1]Run [99]Back >> ")
ifchoice=="1":
os.system("sudo wireshark")
elifchoice=="99":
forensic()
elifchoice=="":
forensic()
else:
menu()
deftoolsley():
os.system("echo \" Toolsley got more than ten useful tools for investigation.\n\b File signature verifier\n\b File identifier \n\b Hash & Validate \n\b Binary inspector \n\bEncode text \n\b Data URI generator \n\b Password generator \" | boxes -d boy | lolcat")
[2]SMWYG-Show-Me-What-You-Got (1.4 Billion Clear Text Password)
[2]XSS Attack Tools
[3]HatCloud(Bypass CloudFlare for IP)
[99]BAck
""")
choice=input("Z4nzu =>>")
...
...
@@ -1606,7 +1615,10 @@ def others():
Ddos()
elifchoice=="2":
clearScr()
showme()
xsstools()
elifchoice=="3":
clearScr()
hatcloud()
elifchoice=="99":
menu()
elifchoice=="":
...
...
@@ -1631,6 +1643,250 @@ def showme():
else:
menu()
defhatcloud():
os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
print("""
[1]SlowLoris
[2]aSYNcrone | Multifunction SYN Flood DDoS Weapon
[3]UFOnet
[4]GoldenEye
[99]Back
""")
choice=input("Z4nzu >> ")
ifchoice=="1":
clearScr()
slowloris()
elifchoice=="2":
asyncrone()
elifchoice=="3":
ufonet()
elifchoice=="4":
goldeneye()
elifchoice=="99":
others()
else:
print("Invalid ...")
menu()
defslowloris():
os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
choice=input("[1]install [2]Run [99]Back >> ")
ifchoice=="1":
os.system("sudo pip install slowloris")
Ddos()
elifchoice=="2":
ts=input("Enter Target Site :-")
os.system("slowloris %s"%ts)
elifchoice=="99":
Ddos()
else:
menu()
defasyncrone():
os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
and Rename the example.app-settings.conf to app-settings.conf
""")
elifchoice=="2":
print("""\033[96m
You have To Add Links to scan
\033[31m[!]Go to extended-xss-search
[*]config/urls-to-test.txt
[!]python3 extended-xss-search.py
""")
elifchoice=="99":
xsstools()
else:
others()
defxssfreak():
os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")