Unverified Commit 86ad40cc authored by Mr.Z4nzu's avatar Mr.Z4nzu Committed by GitHub
Browse files

Update hackingtool.py

parent 4e35ff8d
Loading
Loading
Loading
Loading
+297 −50
Original line number Diff line number Diff line
@@ -29,7 +29,6 @@ from urllib.parse import urlparse
from xml.dom import minidom
from optparse import OptionParser
from time import sleep
from platform import system
Logo="""\033[33m

   ▄█    █▄       ▄████████  ▄████████    ▄█   ▄█▄  ▄█  ███▄▄▄▄      ▄██████▄           ███      ▄██████▄   ▄██████▄   ▄█       
@@ -335,6 +334,7 @@ def passwd():
                [02]WordlistCreator
                [03]Goblin WordGenerator
                [04]Credential reuse attacks
                [05]Password list((1.4 Billion Clear Text Password))
                [99]Back To Main Menu
       """)
    passchoice = input("Z4nzu ==>> ")
@@ -350,6 +350,9 @@ def passwd():
    elif passchoice == "4" or passchoice == "04":
        clearScr()
        credentialattack()
    elif passchoice == "5" or passchoice == "05":
        clearScr()
        showme()
    elif passchoice == "99":
        clearScr()
        menu()
@@ -833,21 +836,29 @@ def forensic():
    clearScr()
    os.system("figlet -f standard Forensic Tools | lolcat ")
    print("""
        [1] Bulk_extractor
        [2] Disk Clone and ISO Image Aquire
        [3] AutoSpy 
        [1] Autopsy
        [2] Wireshark
        [3] Bulk_extractor 
        [4] Disk Clone and ISO Image Aquire
        [5] Toolsley
        [99]Back to Menu
    """)
    choice = input("Z4nzu ==>>")
    if choice == "1" :
    if choice == "3" :
        clearScr()
        bulkextractor()
    elif choice == "2":
    elif choice == "4":
        clearScr()
        guymager()
    elif choice == "3":
    elif choice == "1":
        clearScr()
        autopsy()
    elif choice == "2":
        clearScr()
        wireshark()
    elif choice == "5":
        clearScr()
        toolsley()
    elif choice == "99":
        menu()
    elif choice == "":
@@ -909,6 +920,32 @@ def autopsy():
    else :
        menu()

def wireshark():
    os.system("echo \" Wireshark is a network capture and analyzer \ntool to see what’s happening in your network.\n And also investigate Network related incident \" | boxes -d boy | lolcat")
    choice = input("[1]Run [99]Back >> ")
    if choice == "1":
        os.system("sudo wireshark")
    elif choice == "99":
        forensic()
    elif choice == "":
        forensic()
    else :
        menu()

def toolsley():
    os.system("echo \" Toolsley got more than ten useful tools for investigation.\n\b File signature verifier\n\b File identifier \n\b Hash & Validate \n\b Binary inspector \n\bEncode text \n\b Data URI generator \n\b Password generator \" | boxes -d boy | lolcat")
    userchoice = input("[1]Open [99]Back >> ")
    if userchoice == "1":
        print("Trying to open WebBrowser ")
        time.sleep(3)
        webbrowser.open_new_tab('https://www.toolsley.com/') 
    elif userchoice == "99":
        forensic()
    elif userchoice == "":
        forensic()
    else :
        menu()

def postexp():
    clearScr()
    os.system("figlet -f standard post explotations | lolcat")
@@ -1012,23 +1049,7 @@ def fastssh():
        routexp()
    else :
        menu()
def Ddos():
    os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
    print("""
        [1]SlowLoris
        [99]Back
    """)
    choice =input("Z4nzu >> ")
    if choice == "1":
        clearScr()
        slowloris()
    elif choice == "2":
        pass
    elif choice == "99":
        others()
    else :
        print("Invalid ...")
        menu()

def webAttack():
    clearScr()
    os.system("figlet 'Web Attack Tools' -f standard -c | lolcat")
@@ -1071,19 +1092,6 @@ def web2attack():
    else :
        menu()

def slowloris():
    os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
    choice = input("[1]install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("sudo pip install slowloris")
    elif choice == "2":
        print(Logo)
        ts=input("Enter Target Site :-")
        os.system("slowloris %s"%ts)
    elif choice == "99":
        webAttack()
    else :
        menu()

def skipfish():
    userchoice = input("[1]Run [99]Back >> ")
@@ -1096,7 +1104,6 @@ def skipfish():
        menu()
    
def subdomain():
    
    choice=input("[1]install [2]Run [99]BAck >> ")
    if choice == "1":
        os.system("sudo pip install requests argparse dnspython")
@@ -1595,9 +1602,11 @@ def sqlmap():
        menu()

def others():
    print("""
    clearScr()
    print(Logo + """
    [1]Ddos Attack Tools
    [2]SMWYG-Show-Me-What-You-Got (1.4 Billion Clear Text Password)
    [2]XSS Attack Tools
    [3]HatCloud(Bypass CloudFlare for IP)
    [99]BAck
    """)
    choice = input("Z4nzu =>>")
@@ -1606,7 +1615,10 @@ def others():
        Ddos()
    elif choice == "2":
        clearScr()
        showme()
        xsstools()
    elif choice == "3":
        clearScr()
        hatcloud()
    elif choice == "99":
        menu()
    elif choice == "":
@@ -1631,6 +1643,250 @@ def showme():
    else :
        menu()

def hatcloud():
    os.system("echo \"HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP.\n\b [!]https://github.com/HatBashBR/HatCloud \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git clone https://github.com/HatBashBR/HatCloud.git")
        others()
    elif choice == "2":
        tsite=input("Enter Site >>")
        os.system("cd HatCloud;sudo ruby hatcloud.rb -b {0}".format(tsite))
    elif choice =="99":
        others()
    else :
        others()

def Ddos():
    clearScr()
    os.system("figlet -f standard -c DDOS Attack Tools | lolcat")
    print("""
        [1]SlowLoris
        [2]aSYNcrone | Multifunction SYN Flood DDoS Weapon 
        [3]UFOnet
        [4]GoldenEye
        [99]Back
    """)
    choice =input("Z4nzu >> ")
    if choice == "1":
        clearScr()
        slowloris()
    elif choice == "2":
        asyncrone()
    elif choice == "3":
        ufonet()
    elif choice == "4":
        goldeneye()
    elif choice == "99":
        others()
    else :
        print("Invalid ...")
        menu()

def slowloris():
    os.system("echo \"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy | lolcat")
    choice = input("[1]install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("sudo pip install slowloris")
        Ddos()
    elif choice == "2":
        ts=input("Enter Target Site :-")
        os.system("slowloris %s"%ts)
    elif choice == "99":
        Ddos()
    else :
        menu()

def asyncrone():
    os.system("echo \"aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon.\nDisable the destination system by sending a SYN packet intensively to the destination.\n\b [!] https://github.com/fatihsnsy/aSYNcrone \"|boxes -d boy | lolcat")
    choice = input("[1]install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git clone https://github.com/fatih4842/aSYNcrone.git")
        os.system("cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread")
        Ddos()
    elif choice == "2":
        sport=input("Enter Source Port >> ")
        tip=input("Enter Target IP >> ")
        tport=input("Enter Target port >> ")
        os.system("cd aSYNcrone;sudo ./aSYNcrone {0} {1} {2} 1000".format(sport,tip,tport))
    elif choice == "99":
        Ddos()
    else :
        menu()

def ufonet():
    os.system("echo \"UFONet - is a free software, P2P and cryptographic -disruptive \n toolkit- that allows to perform DoS and DDoS attacks\n\b More Usage Visit [!]https://github.com/epsylon/ufonet \"|boxes -d boy | lolcat")
    choice = input("[1]install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("sudo git clone https://github.com/epsylon/ufonet.git")
        os.system("cd ufonet;sudo python setup.py install")
        Ddos()
    elif choice == "2":
        os.system("sudo ./ufonet --gui")
    elif choice == "99":
        Ddos()
    else :
        menu()
    
def goldeneye():
    os.system("echo \"More Info [!]https://github.com/jseidl/GoldenEye \"|boxes -d boy | lolcat")
    choice = input("[1]install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("sudo git clone https://github.com/jseidl/GoldenEye.git;chmod -R 755 GoldenEye")
        Ddos()
    elif choice == "2":
        os.system("cd GoldenEye ;sudo ./goldeneye.py")
        print("\033[96m Go to Directory \n [*] USAGE: ./goldeneye.py <url> [OPTIONS] ")
    elif choice == "99":
        Ddos()
    else :
        menu()


def xsstools():
    clearScr()
    os.system("figlet -f standard -c XSS Attack Tools | lolcat")
    print("""
        [1] DalFox(Finder of XSS)
        [2] XSS Payload Generator
        [3] Extended XSS Searcher and Finder
        [4] XSS-Freak
        [5] XSpear 
        [6] XSSCon
        [7] XanXSS
        [99]BAck
    """)
    choice = input("Z4nzu >> ")
    if choice == "1":
        dalfox()
    elif choice =="2":
        xsspayload()
    elif choice == "99":
        others()
    elif choice == "3":
        xssfinder()
    elif choice == "4":
        xssfreak()
    elif choice == "5":
        xspear()
    elif choice == "6":
        xsscon()
    elif choice == "7":
        xanxss()
    elif choice == "":
        others()
    else :
        others()

def dalfox():
    os.system("echo \"XSS Scanning and Parameter Analysis tool.\"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("sudo apt-get install golang")
        os.system("sudo git clone https://github.com/hahwul/dalfox ")
        os.system("cd dalfox;go install")
        xsstools()
    elif choice == "2":
        os.system("~/go/bin/dalfox")
        print("\033[96m You Need To Run manually by using  [!]~/go/bin/dalfox [options] ")
    elif choice =="99":
        xsstools()
    else :
        others()

def xsspayload():
    os.system("echo \" XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git clone https://github.com/capture0x/XSS-LOADER.git")
        os.system("cd XSS-LOADER;sudo pip3 install -r requirements.txt")
        xsstools()
    elif choice == "2":
        os.system("cd XSS-LOADER;sudo python3 payloader.py")
    elif choice =="99":
        xsstools()
    else :
        others()

def xssfinder():
    os.system("echo \"Extended XSS Searcher and Finder \n\b [*]https://github.com/Damian89/extended-xss-search \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git glone https://github.com/Damian89/extended-xss-search.git")
        print("""\033[96m 
        Follow This Steps After Installation :-
            \033[31m [*]Go To extended-xss-search directory,
                and Rename the example.app-settings.conf to app-settings.conf
        """)
    elif choice == "2":
            print("""\033[96m 
            You have To Add Links to scan
        \033[31m[!]Go to extended-xss-search
                [*]config/urls-to-test.txt
                [!]python3 extended-xss-search.py
        """)
    elif choice =="99":
        xsstools()
    else :
        others()

def xssfreak():
    os.system("echo \" XSS-Freak is an XSS scanner fully written in python3 from scratch\n\b [!]https://github.com/PR0PH3CY33/XSS-Freak \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git clone https://github.com/PR0PH3CY33/XSS-Freak.git")
        os.system("cd XSS-Freak;sudo pip3 install -r requirements.txt")
        xsstools()
    elif choice == "2":
        os.system("cd XSS-Freak;sudo python3 XSS-Freak.py")
    elif choice =="99":
        xsstools()
    else :
        others()

def xspear():
    os.system("echo \" XSpear is XSS Scanner on ruby gems\n\b [!]https://github.com/hahwul/XSpear \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("gem install XSpear")
        xsstools()
    elif choice == "2":
        os.system("XSpear -h")
    elif choice =="99":
        xsstools()
    else :
        others()

def xsscon():
    os.system("echo \" [!]https://github.com/menkrep1337/XSSCon \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git clone https://github.com/menkrep1337/XSSCon")
        os.system("sudo chmod 755 -R XSSCon")
        xsstools()
    elif choice == "2":
        uinput= input("Enter Website >> ")
        os.system("cd XSSCon;python3 xsscon.py -u {0}".format(uinput))
    elif choice =="99":
        xsstools()
    else :
        others()

def xanxss():
    os.system("echo \" XanXSS is a reflected XSS searching tool\n that creates payloads based from templates\n\b [!]https://github.com/Ekultek/XanXSS \"|boxes -d boy | lolcat")
    choice = input("[1]Install [2]Run [99]Back >> ")
    if choice == "1":
        os.system("git clone https://github.com/Ekultek/XanXSS.git ")
        xsstools()
    elif choice == "2":
        os.system("cd XanXSS ;python xanxss.py -h")
        print("\033[96m You Have to run it manually By Using \n [!]python xanxss.py [Options] ")
    elif choice =="99":
        xsstools()
    else :
        others()


def updatesys():
    os.system("sudo apt update && sudo apt full-upgrade -y")
    os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ")
@@ -1707,15 +1963,6 @@ if __name__ == "__main__":
                    menu()
            else :
                print("Sorry ...!!")
        elif path.exists('/data'):
            os.chdir("data/data/com.termux/files/home/")
            if os.path.isdir('hackingtool'):
                os.chdir("data/data/com.termux/files/home/hackingtool/")
                menu()
            else :
                os.system("mkdir hackingtool")
                os.chdir("data/data/com.termux/files/home/hackingtool/")
                menu()
        else :
            print("Sorry Open New Issue..!!")
    except KeyboardInterrupt: