Unverified Commit 87769dec authored by Hardik Zinzuvadiya's avatar Hardik Zinzuvadiya Committed by GitHub
Browse files

Merge pull request #123 from Greatest125/master

minor fixes (typos, installation instructions update, etc)
parents fc1afa04 6bd2d702
Loading
Loading
Loading
Loading
+4 −1
Original line number Diff line number Diff line
@@ -35,7 +35,10 @@ class Commix(HackingTool):
                  "errors or vulnerabilities related to command injection " \
                  "attacks.\n Usage: python commix.py [option(s)]"
    INSTALL_COMMANDS = [
        "git clone https://github.com/commixproject/commix.git commix"]
        "git clone https://github.com/commixproject/commix.git commix",
        "cd commix;sudo python setup.py install"
    ]
    RUN_COMMANDS = ["sudo python commix.py --wizard"]
    PROJECT_URL = "https://github.com/commixproject/commix"

    def __init__(self):
+3 −3
Original line number Diff line number Diff line
@@ -30,7 +30,7 @@ class Wireshark(HackingTool):

class BulkExtractor(HackingTool):
    TITLE = "Bulk extractor"
    DESCRIPTION = ""
    DESCRIPTION = "Extract useful information without parsing the file system"
    PROJECT_URL = "https://github.com/simsong/bulk_extractor"

    def __init__(self):
@@ -49,9 +49,9 @@ class BulkExtractor(HackingTool):
            "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")

    def cli_mode(self):
        os.system("sudo apt-get install bulk_extractor")
        os.system("sudo apt install bulk-extractor")
        print("bulk_extractor and options")
        os.system("bulk_extractor")
        os.system("bulk_extractor -h")
        os.system(
            'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')

+15 −13
Original line number Diff line number Diff line
@@ -30,11 +30,11 @@ class Dracnmap(HackingTool):
        "sudo git clone https://github.com/Screetsec/Dracnmap.git",
        "cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh  dracnmap-v2.2.sh"
    ]
    RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"]
    RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
    PROJECT_URL = "https://github.com/Screetsec/Dracnmap"

    def __init__(self):
        super(Dracnmap, self).__init__(runnable = False)
#    def __init__(self):
#        super(Dracnmap, self).__init__(runnable = False)


class PortScan(HackingTool):
@@ -93,10 +93,11 @@ class ReconSpider(HackingTool):
        "sudo git clone https://github.com/bhavsec/reconspider.git",
        "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
    ]
    RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
    PROJECT_URL = "https://github.com/bhavsec/reconspider"

    def __init__(self):
        super(ReconSpider, self).__init__(runnable = False)
#    def __init__(self):
#        super(ReconSpider, self).__init__(runnable = False)


class IsItDown(HackingTool):
@@ -117,9 +118,9 @@ class Infoga(HackingTool):
                  "(ip, hostname, country,...) from different public source"
    INSTALL_COMMANDS = [
        "git clone https://github.com/m4ll0k/Infoga.git",
        "cd infoga;sudo python setup.py install"
        "cd Infoga;sudo python3 setup.py install"
    ]
    RUN_COMMANDS = ["cd infoga;python infoga.py"]
    RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
    PROJECT_URL = "https://github.com/m4ll0k/Infoga"


@@ -142,7 +143,7 @@ class Striker(HackingTool):

    def run(self):
        site = input("Enter Site Name (example.com) >> ")
        os.system("cd Striker;")
        os.chdir("Striker")
        subprocess.run(["sudo", "python3", "striker.py", site])


@@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool):

    def run(self):
        ip = input("Enter Ip >> ")
        os.system("cd rang3r;")
        os.chdir("rang3r")
        subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])


@@ -195,9 +196,10 @@ class Breacher(HackingTool):
    INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
    PROJECT_URL = "https://github.com/s0md3v/Breacher"
    
    def __init__(self):
        super(Breacher, self).__init__(runnable = False)

    def run(self):
        domain = input("Enter domain (example.com) >> ")
        os.chdir("Breacher")
        subprocess.run(["python3", "breacher.py", "-u", domain])

class InformationGatheringTools(HackingToolsCollection):
    TITLE = "Information gathering tools"
+1 −1
Original line number Diff line number Diff line
@@ -25,7 +25,7 @@ class HatCloud(HackingTool):

    def run(self):
        site = input("Enter Site >> ")
        os.system("cd HatCloud;")
        os.chdir("HatCloud")
        subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])


+2 −2
Original line number Diff line number Diff line
@@ -42,7 +42,7 @@ class Droidcam(HackingTool):
        "sudo git clone https://github.com/kinghacker0/WishFish.git;"
        "sudo apt install php wget openssh-client"
    ]
    RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"]
    RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"]
    PROJECT_URL = "https://github.com/kinghacker0/WishFish"


@@ -52,7 +52,7 @@ class EvilApp(HackingTool):
                  "hijack authenticated sessions in cookies."
    INSTALL_COMMANDS = [
        "sudo git clone https://github.com/crypticterminal/EvilApp.git"]
    RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"]
    RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"]
    PROJECT_URL = "https://github.com/crypticterminal/EvilApp"


Loading