From 1d63c3fde8bb9e67ed82c019fdd14a682fa3faa6 Mon Sep 17 00:00:00 2001 From: "Mr.Z4nzu" Date: Sat, 11 Apr 2020 15:00:14 +0530 Subject: [PATCH] FirstTime Upload --- hackingtool.py | 1407 +++++++++++++++++++++++++++++++++++++++++++++++ install.sh | 76 +++ requirement.txt | 3 + update.sh | 53 ++ 4 files changed, 1539 insertions(+) create mode 100644 hackingtool.py create mode 100644 install.sh create mode 100644 requirement.txt create mode 100644 update.sh diff --git a/hackingtool.py b/hackingtool.py new file mode 100644 index 00000000..946f71a6 --- /dev/null +++ b/hackingtool.py @@ -0,0 +1,1407 @@ +##!/usr/bin/env python3 +# -*- coding: iso-8859-15 -*- +import os +import sys +import argparse +import threading +import webbrowser +import requests +import urllib +import time +import httplib +import urllib +import sys +import json +import telnetlib +import glob +import urllib2 +import socket +import base64 +from getpass import getpass +from commands import * +from sys import argv +import random +import Queue +import subprocess +import re +from platform import system +from urlparse import urlparse +from xml.dom import minidom +from optparse import OptionParser +from time import sleep +from platform import system + +Logo="""\033[33m + + ▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█ + ███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███ + ███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███ + ▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███ +▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███ + ███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ + ███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄ + ███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██ + ▀ ▀ + 【T】【h】【i】【s】 【T】【o】【o】【l】 【C】【r】【e】【a】【t】【e】【d】 【B】【y】 【Z】【4】【n】【z】【u】 + + \033[97m[!] https://github.com/Z4nzu + \033[91m[!] This Tool is Only For Educational Purpose Please Don\'t use for Any illegal Activity [!] +\033[97m """ + + +def menu(): + clearScr() + print(Logo + """\033[0m + \033[91m[!] This Tool Must Run as a Root..[!]] \033[97m + [00]AnonSurf + [01]Information Gathering + [02]Password Attack + [03]Wireless Attack + [04]SQL Injection Tools [05]Phishing Attack + [06]Web Attack Tool + [07]Post exploitation + [08]Forensic Tools + [09]Payload Creator + [10]Router Exploit + [11]Wifi Jamming + [12]SocialMedia Attack + [13]SocialMedia Finder + [14]Android Hack + [15]Port Forwading + [16]Other Tools + [17]Update System + [99]Exit + """) + + choice = int(input("Z4nzu =>> ")) + if choice == 0 or choice == 00: + clearScr() + print(Logo) + ansurf() + elif choice == 1 or choice == 01: + clearScr() + print(Logo) + info() + elif choice == 2 or choice == 02: + clearScr() + print(Logo) + passwd() + elif choice == 3 or choice == 03: + clearScr() + print(Logo) + wire() + elif choice == 4 or choice == 04: + clearScr() + print(Logo) + sqltool() + elif choice == 5 or choice == 05: + clearScr() + print(Logo) + phishattack() + elif choice == 6 or choice == 06: + clearScr() + print(Logo) + webAttack() + elif choice == 7 or choice == 07: + clearScr() + print(Logo) + postexp() + elif choice == 8 : + clearScr() + print(Logo) + forensic() + elif choice == 9 : + clearScr() + print(Logo) + payloads() + elif choice == 10: + clearScr() + print(Logo) + routexp() + elif choice == 11: + clearScr() + print(Logo) + wifijamming() + elif choice == 12: + clearScr() + print(Logo) + socialattack() + elif choice == 13: + clearScr() + print(Logo) + socialfinder() + elif choice == 14: + clearScr() + print(Logo) + androidhack() + elif choice == 15: + clearScr() + print(Logo) + portforwading() + elif choice == 16: + clearScr() + print(Logo) + others() + elif choice == 17: + clearScr() + print(Logo) + updatesys() + elif choice == 99: + clearScr(), sys.exit() + exit() + elif choice == "": + menu() + else: + print("Wrong Input...!!") + time.Sleep(3) + menu() + +def anonsurf(): + print(""" + [1] Anonmously Surf + [2] Multitor + [99]Back + """) + choice == input("Z4nzu =>>") + if choice == 1: + clearScr() + ansurf() + elif choice == 2: + clearScr() + multitor() + elif choice == 99: + menu() + else : + menu() + +def ansurf(): + os.system("echo \"It automatically overwrites the RAM when\nthe system is shutting down AnD AlSo cHange Ip\" |boxes -d boy") + anc=input("[1]install [2]Run [3]Stop [99]Main Menu >> ") + if anc == 1: + os.system("sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git") + os.system("cd kali-anonsurf && sudo ./installer.sh") + print("Successfully Installed ...!!") + elif anc==2: + os.system("sudo anonsurf start") + elif anc == 3: + os.system("sudo anonsurf stop") + elif anc == 99: + menu() + else : + menu() + +def multitor(): + os.system("echo \"How to stay in multi places at the same time \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/multitor.git") + elif userchoice == 2: + os.system("cd multitor && bash multitor.sh") + elif userchoice == 99: + menu() + else : + menu() + +def info(): + print(""" + [1] Nmap + [2] Dracnmap + [3] Port Scanning + [4] Host To IP + [5] Xerosploit + [6] Advanced XSS Detection Suite + [99] Back To Main Menu + """) + choice2 = input("Z4nzu =>> ") + if choice2 == 1: + nmap() + if choice2 == 2: + clearScr() + dracmap() + if choice2 == 3: + clearScr() + ports() + if choice2 == 4: + clearScr() + h2ip() + if choice2 == 5: + clearScr() + xerosploit() + if choice2 == 6: + clearScr() + XSStrike() + elif choice2 == 99: + clearScr() + menu() + if choice2 == 9: + clearScr() + elif choice2 == "": + menu() + else: + menu() + +def nmap(): + nmapchoice = input("[1]Install [2]Run [99]BAck >> ") + if nmapchoice == 1 : + time.sleep(1) + print("Start Downloading....!!") + os.system("sudo git clone https://github.com/nmap/nmap.git") + os.system("sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install") + elif nmapchoice == 2: + os.system("sudo nmap") + elif nmapchoice == 99: + info() + else: + menu() + +def Dracnmap(): + os.system("echo \"Dracnmap is an open source program which is using to \nexploit the network and gathering information with nmap help\" | boxes -d boy ") + dracnap = input("[1]Install [2]Run [99]Back >> ") + if dracnap == 1: + os.system("sudo git clone https://github.com/Screetsec/Dracnmap.git && cd Dracnmap && chmod +x Dracnmap.sh") + elif dracnap == 2: + os.system("cd Dracnmap && sudo ./Dracnmap.sh") + elif dracnap == 99: + info() + else : + menu() + +def h2ip(): + host = raw_input("Enter host name :- ") + ips = socket.gethostbyname(host) + print(ips) + +def ports(): + clearScr() + target = raw_input('Select a Target IP : ') + os.system("sudo nmap -O -Pn %s" % target) + sys.exit() + +def XSStrike(): + os.system("echo \"SStrike is a python script designed to detect and exploit XSS vulnerabilites. \"| boxes -d boy") + xc=input("[1]Install [2]Run [99]BAck >>") + if xc == 1: + os.system("sudo rm -rf XSStrike") + os.system("git clone https://github.com/UltimateHackers/XSStrike.git && cd XSStrike && pip install -r requirements.txt") + elif xc == 2 : + clearScr() + os.system("cd XSStrike && python xsstrike") + elif xc == 99: + info() + else : + info() + +def xerosploit(): + os.system("echo \"Xerosploit is a penetration testing toolkit whose goal is to perform \n man-in-th-middle attacks for testing purposes\"|boxes -d boy") + xeros=input("[1]Install [2]Run [99]Back >>") + if xeros == 1: + os.system("git clone https://github.com/LionSec/xerosploit") + os.system("cd xerosploit && sudo python install.py") + elif xeros == 2: + os.system("sudo xerosploit") + elif xeros == 99: + info() + else : + main() + +def setoolkit(): + os.system("echo \"The Social-Engineer Toolkit is an open-source penetration\ntesting framework designed for social engineering\"| boxes -d boy") + choiceset = input("[1]Install [2]Run [99]BAck >>") + if choiceset == 1: + os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git") + os.system("python social-engineer-toolkit/setup.py") + menu() + if choiceset == 2: + clearScr() + os.system("sudo setoolkit") + elif choiceset == 99: + phishattack() + else: + menu() + +def passwd(): + print(""" + [01]Cupp + [02]WordlistCreator + [99]Back To Main Menu + """) + passchoice = raw_input("Z4nzu ==>> ") + if passchoice == "1" or passchoice == "01": + clearScr() + cupp() + elif choice3 == "2" or passchoice == "02": + clearScr() + wlcreator() + elif passchoice == "99": + clearScr() + menu() + elif passchoice == "": + menu() + else: + menu() + +def cupp(): + os.system("echo \"Common User Password Generator..!!\"| boxes -d boy") + cc=raw_input("[1]Install [2]Run [99]Back") + if cc == 1: + os.system("git clone https://github.com/Mebus/cupp.git") + print("Download Successfully..!!!") + elif cc == 2: + os.system("cd cupp && ./cupp.py -h") + elif cc == 99 : + passwd() + else : + main() + +def wlcreator(): + os.system("echo \" WlCreator is a C program that can create all possibilities of passwords,\n and you can choose Lenght, Lowercase, Capital, Numbers and Special Chars\" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/wlcreator") + elif userchoice == 2: + os.system("cd wlcreator && gcc -o wlcreator wlcreator.c && ./wlcreator 5") + elif userchoice == 99: + passwd() + else : + menu() + +def wire(): + print(""" [1] WiFi-Pumpkin + [2] pixiewps + [3] Bluetooth Honeypot GUI Framework + [4] Fluxion + [5] Wifiphisher + [6] Wifite + [7] EvilTwin + [99]Back To The Main Menu """) + choice4 = input("Z4nzu ==>> ") + if choice4 == 1: + clearScr() + wifipumkin() + if choice4 == 2: + clearScr() + pixiewps() + if choice4 == 3: + clearScr() + bluepot() + if choice4 == 4: + clearScr() + fluxion() + if choice4 == 5: + clearScr() + wifiphisher() + elif choice4 == 6: + clearScr() + wifite() + elif choice == 7: + clearScr() + eviltwin() + elif choice4 == 99: + menu() + elif choice4 == "": + menu() + else: + menu() + +def wifipumkin(): + os.system("echo \"The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks\nall while forwarding legitimate traffic to and from the unsuspecting target.\"| boxes -d boy") + wp=input("[1]Install [2]Run [99]Back >>") + if wp == 1: + os.system("sudo git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git") + os.system("chmod -R 755 WiFi-Pumpkin && cd WiFi-Pumpkin") + os.system("sudo pip install -r requirements.txt &&sudo ./installer.sh --install") + elif wp == 2: + clearScr() + os.system("cd WiFi=Pumpkin && python wifi-pumpkin.py") + elif wp == 99: + wire() + else : + menu() + +def pixiewps(): + os.system("echo \"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n exploiting the low or non-existing entropy of some Access Points, the so-called pixie dust attack\"| boxes -d boy") + choicewps = input("[1]Install [2]Run [99]Back >> ") + if choicewps == 1: + os.system("sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential") + os.system("cd pixiewps & make ") + os.system("sudo make install") + os.system("wget https://pastebin.com/y9Dk1Wjh") + if choicewps == 2: + os.system("echo \"1.>Put your interface into monitor mode using 'airmon-ng start {wireless interface}\n2.>wash -i {monitor-interface like mon0}'\n3.>reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f\"| boxes -d boy") + elif choicewps == 99: + wire() + else: + menu() + +def bluepot(): + os.system("echo \"you need to have at least 1 bluetooh receiver (if you have many it will work wiht those, too).\nYou must install/libbluetooth-dev on Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE\"|boxes -d boy ") + choice = input("[1]Install [2]Run [99]Back >> ") + if choice == 1: + os.system("wget https://github.com/andrewmichaelsmith/bluepot/raw/master/bin/bluepot-0.1.tar.gz && tar xfz bluepot-0.1.tar.gz && sudo java -jar bluepot/BluePot-0.1.jar") + elif choice == 2: + os.system("cd bluepot-0.1 && sudo java -jar bluepot/BluePot-0.1.jar") + elif choice == 99: + wire() + else: + menu() + +def fluxion(): + print("echo \"fluxion is a wifi key cracker using evil twin attack..\nyou need a wireless adaptor for this tool\"| boxes -d boy") + choice = input("[1]Install [2]Run [99]Back >>") + if choice == 1: + os.system("git clone https://github.com/thehackingsage/Fluxion.git") + os.system("cd Fluxion && cd install && sudo chmod +x install.sh && sudo ./install.sh") + os.system("cd .. && sudo chmod +x fluxion.sh") + elif choice == 2: + os.system("cd Fluxion && sudo ./fluxion.sh") + elif choice == 99 : + wire() + else: + menu() + +def wifiphisher(): + print(""" + Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. + Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing + targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the + connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the + victim stations with malware.. + """) + wchoice=input("[1]Install [2]Run [99]Back >> ") + if wchoice == 1: + os.system("git clone https://github.com/wifiphisher/wifiphisher.git") + os.system("cd wifiphisher && sudo python3 setup.py install") + if wchoice == 2: + os.system("cd wifiphisher && sudo wifiphiser") + elif wchoice == 99 : + wire() + else : + menu() + +def wifite(): + wc=input("[1]Install [2]Run [99]BAck >> ") + if wc == 1: + os.system("sudo git clone https://github.com/kimocoder/wifite2.git") + os.system("cd wifite2 && sudo python3 setup.py install") + elif wc ==2: + os.system("cd wifite2 && sudo wifite") + elif wc == 99: + wire() + else : + menu() + +def eviltwin(): + os.system("echo \"Fakeap is a script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/fakeap ") + elif userchoice == 2: + os.system("cd fakeap && bash fakeap.sh") + elif userchoice == 99: + wire() + else : + menu() + +def socialattack(): + print(""" + [1] Instagram Attack + [2] Tweeter Attack + [3] Facebook Attack + [4] Application Checker + [99]Back To Menu + """) + sac=input("Z4nzu >> ") + if sac == 1: + clearScr() + instashell() + elif sac == 2: + clearScr() + tweetshell() + elif sac == 3: + clearScr() + faceshell() + elif sac == 4 : + clearScr() + appcheck() + elif sac == 99 : + menu() + else : + menu() + +def instashell(): + os.system("echo \"Instashell is an Shell Script to perform multi-threaded brute force attack against Instagram \"| boxes -d boy") + instachoice=input("[1]install [2]Run [99]Back >> ") + if instachoice == 1: + os.system("sudoo git clone https://github.com/thelinuxchoice/instashell && chmod +x install.sh && sudo ./install.sh") + elif instachoice == 2: + os.system("cd instashell && chmod +x instashell.sh && service tor start && sudo ./instashell.sh") + elif instachoice == 99: + socialattack() + else : + menu() + +def tweetshell(): + os.system("echo \"Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter\"|boxes -d boy") + choice = input ("[1]Install [2]Run [99] >> ") + if choice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/tweetshell && chmod -R 775 tweetshell") + os.system("cd tweetshell && sudo ./install.sh") + elif choice == 2: + os.system("cd tweetshell && service tor start && sudo ./tweetshell.sh") + elif choice == 99: + socialattack() + else : + menu() + +def faceshell(): + os.system("echo \"Facebash is an Shell Script to perform brute force attack against FAcebook\n [!]Facebook blocks account for 1 hour after 20 wrong passwords, so this script can perform only 20 pass/h \"|boxes -d boy") + choice = input ("[1]Install [2]Run [99] >> ") + if choice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/facebash && chmod -R 775 facebash") + os.system("cd facebash && sudo ./install.sh") + elif choice == 2: + os.system("cd facebash && service tor start && sudo ./facebash.sh") + elif choice == 99: + socialattack() + else : + menu() + +def appcheck(): + os.system("echo \"Tool to check if an app is installed on the target device through a link.\"|boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >> ") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/underhanded") + elif userchoice == 2: + os.system("cd underhanded && bash underhanded.sh") + elif userchoice == 99: + socialattack() + else : + menu() + +def phishattack(): + print(""" + [1] Setoolkit + [2] SocialFish + [3] Shellphish + [4] BlackEye + [5] I-See_You(Get Location using phishing attack) + [6] SayCheese (Grab target's Webcam Shots) + [7] QR Code Jacking + [99]Back To Main Menu + """) + choice = input("Z4nzu ==>> ") + if choice == 1: + clearScr() + setoolkit() + if choice == 2: + clearScr() + print("This Tool is Devloped By UndeadSec ") + socialfish() + if choice == 3: + clearScr() + print("This Tool is Developed By thelinuxchoice") + shellphish() + if choice == 4: + clearScr() + print("This Tool is Developed By thelinuxchoice") + blackeye() + elif choice == 5: + clearScr() + iseeyou() + elif choice == 6: + clearScr() + saycheese() + elif choice == 7: + clearScr() + qrjacking() + if choice == 99: + clearScr() + menu() + elif choice == "": + menu() + else: + menu() + +def socialfish(): + sfc=input("[1]install [2]Run [3]BAck >> ") + if sfc == 1: + os.system("sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y") + os.system("cd SocialFish && sudo python3 -m pip install -r requirements.txt") + elif sfc ==2: + os.system("cd SocialFish && python3 SocialFish.py root pass") + elif sfc ==3: + phishattack() + else : + menu() + +def shellphish(): + spc=input("[1]install [2]Run [3]BAck >> ") + if spc == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/shellphish") + print("Downloaded Successfully...!! ") + elif spc ==2: + os.system("cd shellphish && sudo bash shellphish.sh") + elif spc ==3: + phishattack() + else : + menu() + +def blackeye(): + spc=input("[1]install [2]Run [3]BAck >> ") + if spc == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/blackeye") + print("Downloaded Successfully...!! ") + elif spc ==2: + os.system("cd blackeye && sudo bash blackeye.sh") + elif spc ==3: + phishattack() + else : + menu() + +def iseeyou(): + os.system("echo \"[!] ISeeYou is a tool to find Exact Location of Victom By User SocialEngineering or Phishing Engagment..\n[!]Users can expose their local servers to the Internet and decode the location coordinates by looking at the log file\"|boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >> ") + if userchoice == 1: + os.system("sudo git clone https://github.com/Viralmaniar/I-See-You.git") + os.system("cd I-See-You && chmod u+x ISeeYou.sh") + menu() + elif userchoice == 2: + os.system("cd I-See_You && sudo ./ISeeYou.sh") + elif userchoice == 99: + phishattack() + else : + menu() + +def saycheese(): + os.system("echo \"Take webcam shots from target just sending a malicious link\"|boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >> ") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/saycheese") + print("Downloaded Successfully ..!!!") + elif userchoice == 2: + os.system("cd saycheese && bash saycheese.sh") + elif userchoice == 99: + socialfinder() + else : + menu() + +def qrjacking(): + os.system("echo \"QR Code Jacking (Any Website) \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/ohmyqr") + elif userchoice == 2: + os.system("cd ohmyqr && bash ohmyqr.sh") + elif userchoice == 99: + phishattack() + else : + menu() + +def socialfinder(): + print(""" + [1]Find SocialMedia By Facial Recognation System + [2]Find SocialMedia By UserName + [99]Back To Main Menu + """) + sfc =input("Z4nzu =>>") + if sfc == 1: + clearScr() + facialfind() + elif sfc == 2: + clearScr() + userrecon() + elif sfc == 99: + menu() + else : + menu() + +def facialfind(): + ffc=input("[1]Install [2]Run [99]Back >>") + if ffc == 1: + print("Firefox is Required So updating.....") + os.system("sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade") + os.system("echo \"[!]Now You have To do some Manually\n[!]Install the Geckodriver for your operating system\n[!]Copy & Paste Link And Download File As System Configuration\n[#]https://github.com/mozilla/geckodriver/releases\n[!!]On Linux you can place it in /usr/bin \"| boxes -d boy") + time.sleep(5) + os.system("sudo git clone https://github.com/Greenwolf/social_mapper") + os.system("cd social_mapper/setup") + os.system("python3 -m pip install --no-cache-dir -r requirements.txt") + print("Successfully Installed...!!!") + menu() + elif ffc == 2: + os.system("cd social_mapper/setup") + os.system("python social_mapper.py -h") + print("""\033[95m + You have to set Username and password of your AC Or Any Fack Account + {0}Type in Terminal nano social_mapper.py + \n ]""") + os.system("echo \"python social_mapper.py -f [] -i [] -m fast [] -fb -tw\"| boxes -d headline ") + elif ffc == 99 : + socialfinder() + else : + menu() + +def userrecon(): + userchoice = input("[1]Install [2]Run [99]Back") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/userrecon.git") + elif userchoice == 2: + os.system("cd userrecon && chmod +x userrecon.sh && sudo ./userrecon.sh") + elif userchoice == 99: + socialfinder() + else : + menu() + +def forensic(): + print(""" + [1] Bulk_extractor + [2] Disk Clone and ISO Image Aquire + [3] AutoSpy + [99]Back to Menu + """) + fc = input("Z4nzu ==>>") + if fc == 1 : + clearScr() + bulkextractor() + elif fc == 2: + clearScr() + guymager() + elif fc == 3: + clearScr() + autopsy() + elif fc == 99: + main() + elif fc == "": + main() + else : + main() + +def bulkextractor(): + bc=input(""" + [1]GUI Mode(Download required) + [2]CLI Mode + """) + if bc == 1: + os.system("git clone https://github.com/simsong/bulk_extractor.git") + print(os.getcwd()) + os.system("ls src/ && cd .. && cd java_gui && ./BEViewer") + print("If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer") + elif bc ==2: + os.system("sudo apt-get install bulk_extractor") + print("bulk_extractor and options") + os.system("bulk_extractor") + os.system("echo \"bulk_extractor [options] imagefile\" | boxes -d headline ") + else : + main() + +def guymager(): + os.system("apt install guymager") + clearScr() + os.system("guymager") + +def autopsy(): + os.system("echo \"Autopsy is a platform that is used by Cyber Investigators.\n[!] Works in any Os\n[!]Recover Deleted Files from any OS & MEdia \n[!]Extract Image Metadata \"|boxes -d boy ") + print(""" + [1]Linux Os + [2]Windows Os(Download Required) + [99]Back To Menu + """) + ac=input("Z4nzu >> ") + if ac == 1: + os.system("sudo autopsy") + if ac == 2: + wc=input(""" + [1]64-Bit + [2]32-Bit + """) + if wc == 1: + url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi' + import requests + r = requests.get(url) + with open("autppsy.zip", "wb") as code: + code.write(r.content) + urllib.urlretrieve(url, "autopsyzip") + print("Downloaded Successfully..!!") + elif wc == 2: + url = 'https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-32bit.msi' + import requests + r = requests.get(url) + with open("autospy.zip", "wb") as code: + code.write(r.content) + urllib.urlretrieve(url, "autopsy.zip") + print("Downloaded Successfully..!!") + elif ac ==99: + forensic() + else : + menu() + + + # ifinurl() + # if choiceweb == '3': + # clearScr() + # wppjmla() + # if choiceweb == "4": + # clearScr() + # gravity() + # if choiceweb == "5": + # clearScr() + # sqlscan() + # if choiceweb == "6": + # clearScr() + # wpminiscanner() + # if choiceweb == "7": + # clearScr() + # wppluginscan() + # if choiceweb == "8": + # clearScr() + # shelltarget() + # if choiceweb == "9": + # clearScr() + # joomlarce() + # if choiceweb == "10": + # clearScr() + # vbulletinrce() + # if choiceweb == "11": + # clearScr() + # brutex() + # if choiceweb == "12": + # clearScr() + # arachni() + # elif choiceweb == "99": + # menu() + # elif choiceweb == "": + # menu() + # else: + # menu() + +def postexp(): + print(""" + [1]Vegile - Ghost In The Shell + [99]Back + """) + expchoice = input("Z4nzu =>> ") + if expchoice == 1: + clearScr() + vegile() + elif expchoice == 99: + menu() + elif expchoice == "": + menu() + else : + menu() + +def vegile(): + os.system("echo \"[!]This tool will set up your backdoor/rootkits when backdoor is already setup it will be \nhidden your specific process,unlimited your session in metasploit and transparent.\"|boxes -d boy") + vegilechoice = input("[1]Install [2]Run [99]Back >> ") + if vegilechoice == 1: + os.system("sudo git clone https://github.com/Screetsec/Vegile.git") + os.system("cd Vegile && chmod +x Vegile") + menu() + elif vegilechoice == 2: + os.system("echo \You can Use Command : \n[!]Vegile -i / --inject [backdoor/rootkit] \n[!]Vegile -u / --unlimited [backdoor/rootkit] \n[!]Vegile -h / --help\"|boxes -d parchment") + os.system("cd Vegila && sudo ./Vegila -h") + elif vegilechoice == 99: + postexp() + else : + menu() + +def routexp(): + print(""" + [1] RouterSploit + [2] Fastssh + [99]Back to menu + """) + routerchoice=int(input("Z4nzu =>> ")) + if routerchoice == 1: + clearScr() + routersploit() + elif routerchoice==99: + menu() + elif routerchoice==2: + clearScr() + fastssh() + else : + print("You Entered wrong Choice :") + routexp() + +def routersploit(): + os.system("echo \"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices\"|boxes -d boy ") + ch=input("[1]Install [2]Run [99]Back :") + if ch == 1: + os.system("git clone https://www.github.com/threat9/routersploit") + os.system("cd routersploit && python3 -m pip install -r requirements.txt") + os.system("python3 rsf.py") + elif ch == 2: + os.system("cd routersploit && python3 rsf.py") + elif ch== 99: + routexp() + else : + menu() + +def fastssh(): + os.system("echo \"Fastssh is an Shell Script to perform multi-threaded scan \n and brute force attack against SSH protocol using the most commonly credentials. \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/fastssh && cd fastssh && chmod +x fastssh.sh") + os.system("apt-get install -y sshpass netcat") + elif userchoice == 2: + os.system("cd fastssh && ./fastssh.sh") + elif userchoice == 99: + routersploit() + else : + menu() + +def webAttack(): + print(""" + [1] SlowLoris + [2] Skipfish + [3] SubDomain Finder + [99]Back To Menu + """) + wc = input("Z4nzu >> ") + if wc == 1: + clearScr() + slowloris() + elif wc == 2: + clearScr() + skipfish() + elif wc == 3: + clearScr() + subdomain() + elif wc == 99: + menu() + else : + menu() + +def slowloris(): + os.system("echo\"Slowloris is basically an HTTP Denial of Service attack.It send lots of HTTP Request\"|boxes -d boy ") + os.system("sudo pip install slowloris") + ts=raw_input("Enter Target Site :-") + os.system("slowloris %s"%ts) + +def skipfish(): + os.system("sudo skipfish -h") + os.system("echo \"skipfish -o [FolderName] targetip/site\"|boxes -d headline") + +def subdomain(): + sdc=input("[1]install [2]Run [99]BAck >> ") + if sdc == 1: + os.system("sudo pip install requests argparse dnspython") + os.system("sudo git clone https://github.com/aboul3la/Sublist3r.git && cd Sublist3r && sudo pip install -r requirements.txt") + menu() + elif sdc == 2: + print("Go to Sublist3r and run ./sublist3r") + os.system("cd Sublist3r && ./sublist3r") + elif sdc == 99 : + webAttack() + else : + main() + +def androidhack(): + print(""" + [1] Keydroid + [2] MySMS + [3] Getdroid + [4] DroidFiles (Get files from Android Directories) + [5] Lockphish (Grab target LOCK PIN) + [6] Whatsapp Attack + [7] DroidCam (Capture Image) + [8] EvilApp (Hijack Session) + [99]Main Menu + """) + choice = input("Z4nzu =>>") + if choice == 1: + clearScr() + keydroid() + elif choice == 2: + clearScr() + mysms() + elif choice == 3: + clearScr() + getdroid() + elif choice == 5: + clearScr() + lock() + elif choice == 4: + clearScr() + droidfile() + elif choice == 6: + clearScr() + whatshack() + elif choice == 7: + clearScr() + droidcam() + elif choice == 8: + clearScr() + evilapp() + elif choice == 99: + menu() + else : + menu() + +def keydroid(): + os.system("echo \"Android Keylogger + Reverse Shell\n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/keydroid \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/keydroid ") + elif userchoice == 2: + os.system("cd keydroid && bash keydroid.sh") + elif userchoice == 99: + androidhack() + else : + menu() + +def mysms(): + os.system("echo \" Script that generates an Android App to hack SMS through WAN \n[!]You have to install Some Manually Refer Below Link :\n\t [+]https://github.com/thelinuxchoice/mysms \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/mysms") + elif userchoice == 2: + os.system("cd mysms && bash mysms.sh") + elif userchoice == 99: + androidhack() + else : + menu() + +def getdroid(): + os.system("echo \"FUD Android Payload (Reverse Shell) and Listener using Serveo.net (no need config port forwarding) \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/getdroid && apt-get install android-sdk apksigner -y") + elif userchoice == 2: + os.system("cd getdroid && bash getdroid.sh") + elif userchoice == 99: + androidhack() + else : + menu() + +def lock(): + os.system("echo \"Lockphish it's the first tool for phishing attacks on the lock screen, designed to\n Grab Windows credentials,Android PIN and iPhone Passcode using a https link. \"| boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >> ") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/lockphish") + elif userchoice == 2: + os.system("cd lockphish && bash lockphish.sh") + elif userchoice == 99: + androidhack() + else : + menu() + +def droidfile(): + os.system("echo \"Get files from Android directories\"|boxes -d boy") + userchoice = input("[1]Install [2]Run [3] Packges Install(Required) [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/droidfiles") + elif userchoice == 2: + os.system("cd droidfiles && bash droidfiles.sh") + elif userchoice == 3: + os.system("apt-get install default-jdk apksigner") + os.system("apt-get install libc6-dev-i386 lib32z1") + os.system("wget https://dl.google.com/android/repository/sdk-tools-linux-4333796.zip && mkdir -p $HOME/Android/Sdk && unzip sdk-tools-linux* -d $HOME/Android/Sdk") + os.system("curl -s \"https://get.sdkman.io\" | bash && source $HOME/.sdkman/bin/sdkman-init.sh && echo \"Y\" | sdk install java 8.0.191-oracle && sdk use java 8.0.191-oracle && sdk install gradle 2.14.1 && sdk use gradle 2.14.1") + elif userchoice == 99: + androidhack() + else : + menu() + +def whatshack(): + os.system("echo \"Script to generate Android App to Hack All WhatsApp Media Files.\n\t[!]Download Android Studio:\n[+]https://developer.android.com/studio \n\t[!]Installing Android Studio:\n[+]unzip ~/Downloads/android*.zip -d /opt \nRun Android Studio: \n[+] cd /opt/android-studio/bin \n[+] ./studio.sh \n[!]Go to SDK Manager (Configure -> SDK Manager) and Download:\n[!]Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository\" | boxes -d shell") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/whatshack") + time.sleep(5) + print("Installing Required Packges..!! It Take More Time ") + time.sleep(3) + os.system("apt-get install openjdk-8-jdk && apt-get install gradle") + os.system("update-alternatives --list java") + os.system("update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java") + elif userchoice == 2: + os.system("echo \"[#]On First Time, Choose \"n\" when asks to build, then open the project on Android Studio:\n[!]cd /opt/android-studio/bin \n[!]./studio.sh \n[#]Import Gradle Project:\n[!]Choose whatshack app folder: whatshack/app/ \n[#]Wait all dependencies downloading, if you got errors, click on showed links to solve. \n[#]Try build from Android Studio: Build > build APK's \n[#]Click on showed links if you got errors. \n[#]Close Android after building successfully.\n[#]open with any Text Editor the file app/build.gradle\n[!]remove \"google\" \n[#]change gradle version from: 3.4.1 to: 2.2.0 \n[!]save and exit. \n[#]After this Run Script As Root: \n[!]bash whatshack.sh \"| boxes -d shell") + os.system("echo \"If still getting error please visit \n\t[#]https://github.com/thelinuxchoice/whatshack\"|boxes -d shell") + os.system("cd whatshack/ && bash whatshack.sh") + elif userchoice == 99: + socialattack() + else : + menu() + +def droidcam(): + os.system("echo \"Script to generate an Android App to take photos from Cameras using Camera2 function on API 21\n After Installing if you getting error please go to below link \n[+]https://github.com/thelinuxchoice/DroidCam \"| boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/droidcam ") + os.system("cd droidcam && sudo bash install.sh") + elif userchoice == 2: + os.system("cd droidcam && bash droidcam.sh") + elif userchoice == 99: + socialattack() + else : + menu() + +def evilapp(): + os.system("echo \"EvilApp is a script to generate Android App that can hijack autenticated sessions in cookies\"") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/evilapp") + elif userchoice == 2: + os.system("cd evilapp && bash evilapp.sh") + elif userchoice == 99: + socialfinder() + else : + menu() + +def payloads(): + print(""" + [1] The FatRat* + [2] Brutal + [3] Stitch + [4] MSFvenom Payload Creator + [5] Venom Shellcode Generator + [6] Spycam + [99]Back + """) + payloadchoice =input("Z4nzu >> ") + if payloadchoice == 1: + clearScr() + thefatrat() + elif payloadchoice == 2: + clearScr() + Brutal() + elif payloadchoice == 3: + clearScr() + stitch() + elif payloadchoice == 4: + clearScr() + MSFvenom() + elif payloadchoice == 5: + clearScr() + venom() + elif payloadchoice == 6: + clearScr() + spycam() + elif payloadchoice == 99: + menu() + elif payloadchoice == "": + payloads() + else : + menu() + +def thefatrat(): + os.system("echo \"TheFatRat Provides An Easy way to create Backdoors and \nPayload which can bypass most anti-virus\"|boxes -d boy") + fatratchoice = input("[1]Install [2] Run [3]Update [99]Back >> ") + if fatratchoice == 1: + os.system("sudo git clone https://github.com/Screetsec/TheFatRat.git") + os.system("cd TheFatRat && chmod +x setup.sh") + menu() + elif fatratchoice == 2: + os.system("cd TheFatRat && ./setup.sh") + elif fatratchoice == 3: + os.system("cd TheFatRat && ./update && chmod +x setup.sh && ./setup.sh") + elif fatratchoice == 99: + menu() + else : + menu() + +def Brutal(): + os.system("echo \"Brutal is a toolkit to quickly create various payload,powershell attack,\nvirus attack and launch listener for a Human Interface Device\"|boxes -d boy") + print(""" + [!]Requirement + >>Arduino Software ( I used v1.6.7 ) + >>TeensyDuino + >>Linux udev rules + >>Copy and paste the PaensyLib folder inside your Arduino\libraries + [!]More Information + >> https://github.com/Screetsec/Brutal/wiki/Install-Requirements + """) + brutalchoice = input("[1]Install [2]Run [99]Back >> ") + if brutalchoice == 1: + os.system("sudo git clone https://github.com/Screetsec/Brutal.git") + os.system("cd Brutal && chmod +x Brutal.sh ") + elif brutalchoice == 2: + os.system("cd Brutal && sudo ./Brutal.sh") + elif brutalchoice == 99: + payloads() + else : + menu() + +def stitch(): + os.system("echo -e \"Stitch is Cross Platform Python Remote Administrator Tool\n\t[!]Refer Below Link For Wins & MAc Os\n\t(!)https://nathanlopez.github.io/Stitch \" | boxes -d boy | lolcat") + stitchchoice = input("[1]Install [2]Run [99]Back >>" ) + if stitchchoice == 1: + os.system("sudo git clone https://github.com/nathanlopez/Stitch.git") + os.system("cd Stitch && pip install -r lnx_requirements.txt") + elif stitchchoice == 2: + os.system("cd Stitch && python main.py") + elif stitchchoice == 99: + payloads() + else : + menu() + +def MSFvenom(): + MSFvenom= input("[1]Install [2]Run [99]Back >> ") + if MSFvenom == 1: + os.system("sudo git clone https://github.com/g0tmi1k/msfpc.git && cd msfpc && chmod +x msfpc.sh") + menu() + elif MSFvenom == 2: + os.system("cd msfpc && sudo bash msfpc.sh -h -v") + elif MSFvenom == 99: + payloads() + else : + menu() + +def venom(): + print("echo \"venom 1.0.11 (malicious_server) was build to take advantage of \n apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html\"| boxes -d boy") + venomchoice =input("[1]Install [2]Run [99]Back >> ") + if venomchoice == 1: + os.system("sudo git clone https://github.com/r00t-3xp10it/venom.git") + os.system("chmod -R 775 venom-main && cd venom-main && cd aux && sudo ./setup.sh") + os.system("sudo ./venom.sh -u") + print("Download Successfully...!!!") + #sudo find ./ -name "*.sh" -exec chmod +x {} \; sudo find ./ -name "*.py" -exec chmod +x {} \; + print("Give Permission to .sh & .py Files") + elif venomchoice == 2: + os.system("cd venom && sudo ./venom.sh") + elif venomchoice == 99: + menu() + else : + menu() + +def spycam(): + os.system("echo \"Script to generate a Win32 payload that takes the webcam image every 1 minute and send it to the attacker\"|boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >> ") + if userchoice == 1: + os.system("sudo git clone https://github.com/thelinuxchoice/spycam ") + os.system("cd spycam && bash install.sh && chmod +x spycam") + elif userchoice == 2: + os.system("cd spycam && ./spycam") + elif userchoice == 99: + payloads() + else : + menu() + +def wifijamming(): + print(""" + [1] Using Airmon + [99]Back + """) + choice = input("Z4nzu =>> ") + if choice == 1: + clearScr() + airmon() + elif choice == 99: + menu() + else : + menu() + +def airmon(): + # os.system("echo \" \" | boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + print("In Working") + time.sleep(5) + menu() + elif userchoice == 2: + print(""" + ########################################################################### + # [!] Follow Below steps for Jamming [!] # + # [1]iwconfig # + # [2]airmon-ng # + # [3]airmon-ng start InterfaceName # + # [4]airodump-ng InterfaceName # + # [5]airodump-ng -c [CH no.] --bssid [MAC address] InterfaceName # + # [6]aireply-ng -0 0 -a [mac address] InterfaceName # + # [+]After Complete monitor mode return your interface in normal mode # + # [7]airmon-ng stop InterfaceName # + ########################################################################### + """) + os.system("sudo airmon-ng") + elif userchoice == 99: + wifijamming() + else : + menu() + # z=raw_input("Enter Your wifi Interface Name :- ") + # os.system("airmon-ng && airmon-ng start %s"%z) + +def portforwading(): + print("In Working ......") + time.sleep(3) + menu() + +def sqltool(): + print(""" + [1]sqlmap tool + [99]Back + """) + choice =input("Z4nzu =>> ") + if choice == 1: + clearScr() + sqlmap() + elif choice == 99: + menu() + else : + menu() + +def sqlmap(): + os.system("echo \"[!]sqlmap is an open source penetration testing tool that automates the process of \ndetecting and exploiting SQL injection flaws and taking over of database servers\"|boxes -d boy") + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev") + print("Downloaded Successfully..!!") + menu() + elif userchoice == 2: + os.system("cd sqlmap && python sqlmap.py -h") + print("echo \"[!]python sqlmap.py -u [] --batch --banner \n[!]For More Usage : https://github.com/sqlmapproject/sqlmap/wiki/Usage\"|boxes -d boy") + elif userchoice == 99: + sqltool() + else : + menu() + +def others(): + print(""" + [1]SMWYG-Show-Me-What-You-Got (1.4 Billion Clear Text Password) + [99]BAck + """) + choice = input("Z4nzu =>>") + if choice == 1: + clearScr() + showme() + elif choice == 99: + menu() + elif choice == "": + others() + else : + menu() + +def showme(): + print("""This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. + It allows one to search 1.4 Billion clear text credentials which was dumped as part of BreachCompilation + leak This database makes finding passwords faster and easier than ever before. + """) + userchoice = input("[1]Install [2]Run [99]Back >>") + if userchoice == 1: + os.system("sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git") + os.system("cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt ") + menu() + elif userchoice == 2: + os.system("cd SMWYG-Show-Me-What-You-Got && python SMWYG.py") + elif userchoice == 99: + others() + else : + menu() + +def updatesys(): + os.system("sudo apt update && sudo apt full-upgrade -y") + os.system("sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl ") + os.system("sudo apt-get install python3-pip") + menu() + +def clearScr(): + if system() == 'Linux': + os.system('clear') + if system() == 'Windows': + os.system('cls') + +if __name__ == "__main__": + try: + menu() + except KeyboardInterrupt: + print(" Sorry ..!!!") + time.sleep(3) diff --git a/install.sh b/install.sh new file mode 100644 index 00000000..89196556 --- /dev/null +++ b/install.sh @@ -0,0 +1,76 @@ +#!/bin/bash +clear + +BLACK='\e[30m' +RED='\e[31m' +GREEN='\e[32m' +YELLOW='\e[33m' +BLUE='\e[34m' +PURPLE='\e[35m' +CYAN='\e[36m' +WHITE='\e[37m' +NC='\e[0m' + +echo -e "${CYAN} " +echo "" +echo " ▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█ "; +echo " ███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███ "; +echo " ███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███ "; +echo " ▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███ "; +echo "▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███ "; +echo " ███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ "; +echo " ███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄ "; +echo " ███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██ "; +echo " ▀ ▀ "; +echo -e "${YELLOW} 【T】【h】【i】【s】 【T】【o】【o】【l】 【C】【r】【e】【a】【t】【e】【d】 【B】【y】 【Z】【4】【n】【z】【u】 " + +echo -e "${BLUE} Github.com/Z4nzu ${NC}" + +echo -e "${RED} [!] This Tool Must Run As ROOT [!]${NC}" +echo -e "${WHITE}[>] Press ENTER to Install Hacking Tool, CTRL+C to Abort.${NC}" +read INPUT +echo "" + +if [ "$PREFIX" = "/data/data/com.termux/files/usr" ]; then + INSTALL_DIR="$PREFIX/usr/share/doc/hackingtool" + BIN_DIR="$PREFIX/usr/bin/" + pkg install -y git python3 +else + INSTALL_DIR="/usr/share/doc/hackingtool" + BIN_DIR="/usr/bin/" +fi + +echo "[✔] Checking directories..."; +if [ -d "$INSTALL_DIR" ]; then + echo "[!] A Directory hackingtool Was Found.. Do You Want To Replace It ? [y/n]:" ; + read mama + if [ "$mama" = "y" ]; then + rm -R "$INSTALL_DIR" + else + exit + fi +fi + +echo "[✔] Installing ..."; +echo ""; +git clone https://github.com/Z4nzu/hackingtool.git "$INSTALL_DIR"; +echo "#!/bin/bash +python $INSTALL_DIR/hackingtool.py" '${1+"$@"}' > hackingtool; +chmod +x hackingtool; +sudo cp hackingtool /usr/bin/; +rm hacktronian; + + +if [ -d "$INSTALL_DIR" ] ; +then + echo ""; + echo "[✔] Successfuly Installed !!! [✔]"; + echo ""; + echo "[✔]========================================================================[✔]"; + echo "[✔] ✔✔✔ All Is Done!! you can execute tool by typing hackingtool !! ✔✔✔ [✔]"; + echo "[✔]========================================================================[✔]"; + echo ""; +else + echo "[✘] Installation Failed !!! [✘]"; + exit +fi diff --git a/requirement.txt b/requirement.txt new file mode 100644 index 00000000..63d775c1 --- /dev/null +++ b/requirement.txt @@ -0,0 +1,3 @@ +lolcat +boxes +flask \ No newline at end of file diff --git a/update.sh b/update.sh new file mode 100644 index 00000000..b932440f --- /dev/null +++ b/update.sh @@ -0,0 +1,53 @@ +echo "███████╗██╗ ██╗███╗ ██╗███████╗██╗ ██╗ "; +echo "╚══███╔╝██║ ██║████╗ ██║╚══███╔╝██║ ██║ "; +echo " ███╔╝ ███████║██╔██╗ ██║ ███╔╝ ██║ ██║ "; +echo " ███╔╝ ╚════██║██║╚██╗██║ ███╔╝ ██║ ██║ "; +echo "███████╗ ██║██║ ╚████║███████╗╚██████╔╝ "; +echo "╚══════╝ ╚═╝╚═╝ ╚═══╝╚══════╝ ╚═════╝ "; +echo " "; + +clear + +sudo chmod +x /etc/ + +clear + +sudo chmod +x /usr/share/doc + +clear + +sudo rm -rf /usr/share/doc/hackingtool/ + +clear + +cd /etc/ + +clear + +sudo rm -rf /etc/hackingtool + +clear + +mkdir hackingtool + +clear + +cd hackingtool + +clear + +git clone https://github.com/Z4nzu/hackingtool.git + +clear + +cd hackingtool + +clear + +sudo chmod +x install.sh + +clear + +./install.sh + +clear