Loading tools/exploit_frameworks.py +4 −1 Original line number Diff line number Diff line Loading @@ -35,7 +35,10 @@ class Commix(HackingTool): "errors or vulnerabilities related to command injection " \ "attacks.\n Usage: python commix.py [option(s)]" INSTALL_COMMANDS = [ "git clone https://github.com/commixproject/commix.git commix"] "git clone https://github.com/commixproject/commix.git commix", "cd commix;sudo python setup.py install" ] RUN_COMMANDS = ["sudo python commix.py --wizard"] PROJECT_URL = "https://github.com/commixproject/commix" def __init__(self): Loading tools/forensic_tools.py +3 −3 Original line number Diff line number Diff line Loading @@ -30,7 +30,7 @@ class Wireshark(HackingTool): class BulkExtractor(HackingTool): TITLE = "Bulk extractor" DESCRIPTION = "" DESCRIPTION = "Extract useful information without parsing the file system" PROJECT_URL = "https://github.com/simsong/bulk_extractor" def __init__(self): Loading @@ -49,9 +49,9 @@ class BulkExtractor(HackingTool): "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor") def cli_mode(self): os.system("sudo apt-get install bulk_extractor") os.system("sudo apt install bulk-extractor") print("bulk_extractor and options") os.system("bulk_extractor") os.system("bulk_extractor -h") os.system( 'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat') Loading tools/information_gathering_tools.py +15 −13 Original line number Diff line number Diff line Loading @@ -30,11 +30,11 @@ class Dracnmap(HackingTool): "sudo git clone https://github.com/Screetsec/Dracnmap.git", "cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh" ] RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"] RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"] PROJECT_URL = "https://github.com/Screetsec/Dracnmap" def __init__(self): super(Dracnmap, self).__init__(runnable = False) # def __init__(self): # super(Dracnmap, self).__init__(runnable = False) class PortScan(HackingTool): Loading Loading @@ -93,10 +93,11 @@ class ReconSpider(HackingTool): "sudo git clone https://github.com/bhavsec/reconspider.git", "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install" ] RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"] PROJECT_URL = "https://github.com/bhavsec/reconspider" def __init__(self): super(ReconSpider, self).__init__(runnable = False) # def __init__(self): # super(ReconSpider, self).__init__(runnable = False) class IsItDown(HackingTool): Loading @@ -117,9 +118,9 @@ class Infoga(HackingTool): "(ip, hostname, country,...) from different public source" INSTALL_COMMANDS = [ "git clone https://github.com/m4ll0k/Infoga.git", "cd infoga;sudo python setup.py install" "cd Infoga;sudo python3 setup.py install" ] RUN_COMMANDS = ["cd infoga;python infoga.py"] RUN_COMMANDS = ["cd Infoga;python3 infoga.py"] PROJECT_URL = "https://github.com/m4ll0k/Infoga" Loading @@ -142,7 +143,7 @@ class Striker(HackingTool): def run(self): site = input("Enter Site Name (example.com) >> ") os.system("cd Striker;") os.chdir("Striker") subprocess.run(["sudo", "python3", "striker.py", site]) Loading Loading @@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool): def run(self): ip = input("Enter Ip >> ") os.system("cd rang3r;") os.chdir("rang3r") subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip]) Loading @@ -195,9 +196,10 @@ class Breacher(HackingTool): INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"] PROJECT_URL = "https://github.com/s0md3v/Breacher" def __init__(self): super(Breacher, self).__init__(runnable = False) def run(self): domain = input("Enter domain (example.com) >> ") os.chdir("Breacher") subprocess.run(["python3", "breacher.py", "-u", domain]) class InformationGatheringTools(HackingToolsCollection): TITLE = "Information gathering tools" Loading tools/other_tools.py +1 −1 Original line number Diff line number Diff line Loading @@ -25,7 +25,7 @@ class HatCloud(HackingTool): def run(self): site = input("Enter Site >> ") os.system("cd HatCloud;") os.chdir("HatCloud") subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site]) Loading tools/others/android_attack.py +2 −2 Original line number Diff line number Diff line Loading @@ -42,7 +42,7 @@ class Droidcam(HackingTool): "sudo git clone https://github.com/kinghacker0/WishFish.git;" "sudo apt install php wget openssh-client" ] RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"] RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"] PROJECT_URL = "https://github.com/kinghacker0/WishFish" Loading @@ -52,7 +52,7 @@ class EvilApp(HackingTool): "hijack authenticated sessions in cookies." INSTALL_COMMANDS = [ "sudo git clone https://github.com/crypticterminal/EvilApp.git"] RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"] RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"] PROJECT_URL = "https://github.com/crypticterminal/EvilApp" Loading Loading
tools/exploit_frameworks.py +4 −1 Original line number Diff line number Diff line Loading @@ -35,7 +35,10 @@ class Commix(HackingTool): "errors or vulnerabilities related to command injection " \ "attacks.\n Usage: python commix.py [option(s)]" INSTALL_COMMANDS = [ "git clone https://github.com/commixproject/commix.git commix"] "git clone https://github.com/commixproject/commix.git commix", "cd commix;sudo python setup.py install" ] RUN_COMMANDS = ["sudo python commix.py --wizard"] PROJECT_URL = "https://github.com/commixproject/commix" def __init__(self): Loading
tools/forensic_tools.py +3 −3 Original line number Diff line number Diff line Loading @@ -30,7 +30,7 @@ class Wireshark(HackingTool): class BulkExtractor(HackingTool): TITLE = "Bulk extractor" DESCRIPTION = "" DESCRIPTION = "Extract useful information without parsing the file system" PROJECT_URL = "https://github.com/simsong/bulk_extractor" def __init__(self): Loading @@ -49,9 +49,9 @@ class BulkExtractor(HackingTool): "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor") def cli_mode(self): os.system("sudo apt-get install bulk_extractor") os.system("sudo apt install bulk-extractor") print("bulk_extractor and options") os.system("bulk_extractor") os.system("bulk_extractor -h") os.system( 'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat') Loading
tools/information_gathering_tools.py +15 −13 Original line number Diff line number Diff line Loading @@ -30,11 +30,11 @@ class Dracnmap(HackingTool): "sudo git clone https://github.com/Screetsec/Dracnmap.git", "cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh" ] RUN_COMMANDS = ["sudo ./dracnmap-v2.2.sh"] RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"] PROJECT_URL = "https://github.com/Screetsec/Dracnmap" def __init__(self): super(Dracnmap, self).__init__(runnable = False) # def __init__(self): # super(Dracnmap, self).__init__(runnable = False) class PortScan(HackingTool): Loading Loading @@ -93,10 +93,11 @@ class ReconSpider(HackingTool): "sudo git clone https://github.com/bhavsec/reconspider.git", "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install" ] RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"] PROJECT_URL = "https://github.com/bhavsec/reconspider" def __init__(self): super(ReconSpider, self).__init__(runnable = False) # def __init__(self): # super(ReconSpider, self).__init__(runnable = False) class IsItDown(HackingTool): Loading @@ -117,9 +118,9 @@ class Infoga(HackingTool): "(ip, hostname, country,...) from different public source" INSTALL_COMMANDS = [ "git clone https://github.com/m4ll0k/Infoga.git", "cd infoga;sudo python setup.py install" "cd Infoga;sudo python3 setup.py install" ] RUN_COMMANDS = ["cd infoga;python infoga.py"] RUN_COMMANDS = ["cd Infoga;python3 infoga.py"] PROJECT_URL = "https://github.com/m4ll0k/Infoga" Loading @@ -142,7 +143,7 @@ class Striker(HackingTool): def run(self): site = input("Enter Site Name (example.com) >> ") os.system("cd Striker;") os.chdir("Striker") subprocess.run(["sudo", "python3", "striker.py", site]) Loading Loading @@ -185,7 +186,7 @@ class PortScannerRanger(HackingTool): def run(self): ip = input("Enter Ip >> ") os.system("cd rang3r;") os.chdir("rang3r") subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip]) Loading @@ -195,9 +196,10 @@ class Breacher(HackingTool): INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"] PROJECT_URL = "https://github.com/s0md3v/Breacher" def __init__(self): super(Breacher, self).__init__(runnable = False) def run(self): domain = input("Enter domain (example.com) >> ") os.chdir("Breacher") subprocess.run(["python3", "breacher.py", "-u", domain]) class InformationGatheringTools(HackingToolsCollection): TITLE = "Information gathering tools" Loading
tools/other_tools.py +1 −1 Original line number Diff line number Diff line Loading @@ -25,7 +25,7 @@ class HatCloud(HackingTool): def run(self): site = input("Enter Site >> ") os.system("cd HatCloud;") os.chdir("HatCloud") subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site]) Loading
tools/others/android_attack.py +2 −2 Original line number Diff line number Diff line Loading @@ -42,7 +42,7 @@ class Droidcam(HackingTool): "sudo git clone https://github.com/kinghacker0/WishFish.git;" "sudo apt install php wget openssh-client" ] RUN_COMMANDS = ["cd wishfish && sudo bash wishfish.sh"] RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"] PROJECT_URL = "https://github.com/kinghacker0/WishFish" Loading @@ -52,7 +52,7 @@ class EvilApp(HackingTool): "hijack authenticated sessions in cookies." INSTALL_COMMANDS = [ "sudo git clone https://github.com/crypticterminal/EvilApp.git"] RUN_COMMANDS = ["cd evilapp && bash evilapp.sh"] RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"] PROJECT_URL = "https://github.com/crypticterminal/EvilApp" Loading