├── images
├── demo
├── A0.png
├── A00.png
├── A1.png
├── A2.png
└── A4.png
├── requirement.txt
├── tools
├── others
│ ├── web_crawling.py
│ ├── homograph_attacks.py
│ ├── email_verifier.py
│ ├── mix_tools.py
│ ├── hash_crack.py
│ ├── payload_injection.py
│ ├── wifi_jamming.py
│ ├── socialmedia.py
│ ├── android_attack.py
│ └── socialmedia_finder.py
├── remote_administration.py
├── anonsurf.py
├── post_exploitation.py
├── other_tools.py
├── reverse_engineering.py
├── exploit_frameworks.py
├── tool_manager.py
├── steganography.py
├── wordlist_generator.py
├── ddos.py
├── forensic_tools.py
├── webattack.py
├── sql_tools.py
├── xss_attack.py
├── payload_creator.py
├── phising_attack.py
├── wireless_attack_tools.py
└── information_gathering_tools.py
├── .github
└── ISSUE_TEMPLATE
│ ├── feature_request.md
│ └── bug_report.md
├── update.sh
├── LICENSE
├── generate_readme.py
├── README_template.md
├── install.sh
├── hackingtool.py
├── core.py
└── README.md
/images/demo:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/requirement.txt:
--------------------------------------------------------------------------------
1 | lolcat
2 | boxes
3 | flask
4 | requests
5 |
--------------------------------------------------------------------------------
/images/A0.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ALBINPRAVEEN/hackingtool/HEAD/images/A0.png
--------------------------------------------------------------------------------
/images/A00.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ALBINPRAVEEN/hackingtool/HEAD/images/A00.png
--------------------------------------------------------------------------------
/images/A1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ALBINPRAVEEN/hackingtool/HEAD/images/A1.png
--------------------------------------------------------------------------------
/images/A2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ALBINPRAVEEN/hackingtool/HEAD/images/A2.png
--------------------------------------------------------------------------------
/images/A4.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ALBINPRAVEEN/hackingtool/HEAD/images/A4.png
--------------------------------------------------------------------------------
/tools/others/web_crawling.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class GoSpider(HackingTool):
7 | TITLE = "Gospider"
8 | DESCRIPTION = "Gospider - Fast web spider written in Go"
9 | INSTALL_COMMANDS = ["sudo go get -u github.com/jaeles-project/gospider"]
10 | PROJECT_URL = "https://github.com/jaeles-project/gospider"
11 |
12 | def __init__(self):
13 | super(GoSpider, self).__init__(runnable = False)
14 |
15 |
16 | class WebCrawlingTools(HackingToolsCollection):
17 | TITLE = "Web crawling"
18 | TOOLS = [GoSpider()]
19 |
--------------------------------------------------------------------------------
/tools/others/homograph_attacks.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class EvilURL(HackingTool):
7 | TITLE = "EvilURL"
8 | DESCRIPTION = "Generate unicode evil domains for IDN Homograph Attack " \
9 | "and detect them."
10 | INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/EvilURL.git"]
11 | RUN_COMMANDS = ["cd EvilURL;python3 evilurl.py"]
12 | PROJECT_URL = "https://github.com/UndeadSec/EvilURL"
13 |
14 |
15 | class IDNHomographAttackTools(HackingToolsCollection):
16 | TITLE = "IDN Homograph Attack"
17 | TOOLS = [EvilURL()]
18 |
--------------------------------------------------------------------------------
/tools/others/email_verifier.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class KnockMail(HackingTool):
7 | TITLE = "Knockmail"
8 | DESCRIPTION = "KnockMail Tool Verify If Email Exists"
9 | INSTALL_COMMANDS = [
10 | "git clone https://github.com/heywoodlh/KnockMail.git",
11 | "cd KnockMail;sudo pip3 install -r requirements.txt"
12 | ]
13 | RUN_COMMANDS = ["cd KnockMail;python3 knockmail.py"]
14 | PROJECT_URL = "https://github.com/heywoodlh/KnockMail"
15 |
16 |
17 | class EmailVerifyTools(HackingToolsCollection):
18 | TITLE = "Email Verify tools"
19 | TOOLS = [KnockMail()]
20 |
21 |
--------------------------------------------------------------------------------
/tools/others/mix_tools.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class TerminalMultiplexer(HackingTool):
7 | TITLE = "Terminal Multiplexer"
8 | DESCRIPTION = "Terminal Multiplexer is a tiling terminal emulator that " \
9 | "allows us to open \n several terminal sessions inside one " \
10 | "single window."
11 | INSTALL_COMMANDS = ["sudo apt-get install tilix"]
12 |
13 | def __init__(self):
14 | super(TerminalMultiplexer, self).__init__(runnable = False)
15 |
16 |
17 | class MixTools(HackingToolsCollection):
18 | TITLE = "Mix tools"
19 | TOOLS = [TerminalMultiplexer()]
20 |
--------------------------------------------------------------------------------
/.github/ISSUE_TEMPLATE/feature_request.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Feature request
3 | about: Suggest an idea for this project
4 | title: ''
5 | labels: ''
6 | assignees: ''
7 |
8 | ---
9 |
10 | **Is your feature request related to a problem? Please describe.**
11 | A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
12 |
13 | **Describe the solution you'd like**
14 | A clear and concise description of what you want to happen.
15 |
16 | **Describe alternatives you've considered**
17 | A clear and concise description of any alternative solutions or features you've considered.
18 |
19 | **Additional context**
20 | Add any other context or screenshots about the feature request here.
21 |
--------------------------------------------------------------------------------
/tools/others/hash_crack.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class HashBuster(HackingTool):
7 | TITLE = "Hash Buster"
8 | DESCRIPTION = "Features: \n " \
9 | "Automatic hash type identification \n " \
10 | "Supports MD5, SHA1, SHA256, SHA384, SHA512"
11 | INSTALL_COMMANDS = [
12 | "git clone https://github.com/s0md3v/Hash-Buster.git",
13 | "cd Hash-Buster;make install"
14 | ]
15 | RUN_COMMANDS = ["buster -h"]
16 | PROJECT_URL = "https://github.com/s0md3v/Hash-Buster"
17 |
18 |
19 | class HashCrackingTools(HackingToolsCollection):
20 | TITLE = "Hash cracking tools"
21 | TOOLS = [HashBuster()]
22 |
--------------------------------------------------------------------------------
/update.sh:
--------------------------------------------------------------------------------
1 | echo "███████╗██╗ ██╗███╗ ██╗███████╗██╗ ██╗ ";
2 | echo "╚══███╔╝██║ ██║████╗ ██║╚══███╔╝██║ ██║ ";
3 | echo " ███╔╝ ███████║██╔██╗ ██║ ███╔╝ ██║ ██║ ";
4 | echo " ███╔╝ ╚════██║██║╚██╗██║ ███╔╝ ██║ ██║ ";
5 | echo "███████╗ ██║██║ ╚████║███████╗╚██████╔╝ ";
6 | echo "╚══════╝ ╚═╝╚═╝ ╚═══╝╚══════╝ ╚═════╝ ";
7 | echo " ";
8 |
9 | clear
10 |
11 | sudo chmod +x /etc/
12 |
13 | clear
14 |
15 | sudo chmod +x /usr/share/doc
16 |
17 | clear
18 |
19 | sudo rm -rf /usr/share/doc/hackingtool/
20 |
21 | clear
22 |
23 | cd /etc/
24 |
25 | clear
26 |
27 | sudo rm -rf /etc/hackingtool
28 |
29 | clear
30 |
31 | mkdir hackingtool
32 |
33 | clear
34 |
35 | cd hackingtool
36 |
37 | clear
38 |
39 | git clone https://github.com/Z4nzu/hackingtool.git
40 |
41 | clear
42 |
43 | cd hackingtool
44 |
45 | clear
46 |
47 | sudo chmod +x install.sh
48 |
49 | clear
50 |
51 | ./install.sh
52 |
53 | clear
54 |
--------------------------------------------------------------------------------
/.github/ISSUE_TEMPLATE/bug_report.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Bug report
3 | about: Create a report to help us improve
4 | title: ''
5 | labels: ''
6 | assignees: ''
7 |
8 | ---
9 |
10 | **Describe the bug**
11 | A clear and concise description of what the bug is.
12 |
13 | **To Reproduce**
14 | Steps to reproduce the behavior:
15 | 1. Go to '...'
16 | 2. Click on '....'
17 | 3. Scroll down to '....'
18 | 4. See error
19 |
20 | **Expected behavior**
21 | A clear and concise description of what you expected to happen.
22 |
23 | **Screenshots**
24 | If applicable, add screenshots to help explain your problem.
25 |
26 | **Desktop (please complete the following information):**
27 | - OS: [e.g. iOS]
28 | - Browser [e.g. chrome, safari]
29 | - Version [e.g. 22]
30 |
31 | **Smartphone (please complete the following information):**
32 | - Device: [e.g. iPhone6]
33 | - OS: [e.g. iOS8.1]
34 | - Browser [e.g. stock browser, safari]
35 | - Version [e.g. 22]
36 |
37 | **Additional context**
38 | Add any other context about the problem here.
39 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2020 Mr.Z4nzu
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/tools/remote_administration.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class Stitch(HackingTool):
7 | TITLE = "Stitch"
8 | DESCRIPTION = "Stitch is a cross platform python framework.\n" \
9 | "which allows you to build custom payloads\n" \
10 | "For Windows, Mac and Linux."
11 | INSTALL_COMMANDS = [
12 | "sudo git clone https://github.com/nathanlopez/Stitch.git",
13 | "cd Stitch;sudo pip install -r lnx_requirements.txt"
14 | ]
15 | RUN_COMMANDS = ["cd Stitch;python main.py"]
16 | PROJECT_URL = "https://github.com/nathanlopez/Stitch"
17 |
18 |
19 | class Pyshell(HackingTool):
20 | TITLE = "Pyshell"
21 | DESCRIPTION = "Pyshell is a Rat Tool that can be able to download & upload " \
22 | "files,\n Execute OS Command and more.."
23 | INSTALL_COMMANDS = [
24 | "sudo git clone https://github.com/knassar702/Pyshell.git;"
25 | "sudo pip install pyscreenshot python-nmap requests"
26 | ]
27 | RUN_COMMANDS = ["cd Pyshell;./Pyshell"]
28 | PROJECT_URL = "https://github.com/knassar702/pyshell"
29 |
30 |
31 | class RemoteAdministrationTools(HackingToolsCollection):
32 | TITLE = "Remote Administrator Tools (RAT)"
33 | TOOLS = [
34 | Stitch(),
35 | Pyshell()
36 | ]
37 |
--------------------------------------------------------------------------------
/tools/others/payload_injection.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class DebInject(HackingTool):
7 | TITLE = "Debinject"
8 | DESCRIPTION = "Debinject is a tool that inject malicious code into *.debs"
9 | INSTALL_COMMANDS = [
10 | "sudo git clone https://github.com/UndeadSec/Debinject.git"]
11 | RUN_COMMANDS = ["cd Debinject;python debinject.py"]
12 | PROJECT_URL = "https://github.com/UndeadSec/Debinject"
13 |
14 |
15 | class Pixload(HackingTool):
16 | TITLE = "Pixload"
17 | DESCRIPTION = "Pixload -- Image Payload Creating tools \n " \
18 | "Pixload is Set of tools for creating/injecting payload into images."
19 | INSTALL_COMMANDS = [
20 | "sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl",
21 | "sudo git clone https://github.com/chinarulezzz/pixload.git"
22 | ]
23 | PROJECT_URL = "https://github.com/chinarulezzz/pixload"
24 |
25 | def __init__(self):
26 | # super(Pixload, self).__init__([
27 | # ('How To Use', self.show_project_page)
28 | # ], runnable = False)
29 | super(Pixload, self).__init__(runnable = False)
30 |
31 |
32 | class PayloadInjectorTools(HackingToolsCollection):
33 | TITLE = "Payload Injector"
34 | TOOLS = [
35 | DebInject(),
36 | Pixload()
37 | ]
38 |
--------------------------------------------------------------------------------
/tools/others/wifi_jamming.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class WifiJammerNG(HackingTool):
7 | TITLE = "WifiJammer-NG"
8 | DESCRIPTION = "Continuously jam all wifi clients and access points within range."
9 | INSTALL_COMMANDS = [
10 | "sudo git clone https://github.com/MisterBianco/wifijammer-ng.git",
11 | "cd wifijammer-ng;sudo pip install -r requirements.txt"
12 | ]
13 | RUN_COMMANDS = [
14 | 'echo "python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]"| boxes | lolcat',
15 | "cd wifijammer-ng;sudo python wifijammer.py"
16 | ]
17 | PROJECT_URL = "https://github.com/MisterBianco/wifijammer-ng"
18 |
19 |
20 | class KawaiiDeauther(HackingTool):
21 | TITLE = "KawaiiDeauther"
22 | DESCRIPTION = "Kawaii Deauther is a pentest toolkit whose goal is to perform \n " \
23 | "jam on WiFi clients/routers and spam many fake AP for testing purposes."
24 | INSTALL_COMMANDS = [
25 | "sudo git clone https://github.com/aryanrtm/KawaiiDeauther.git",
26 | "cd KawaiiDeauther;sudo bash install.sh"
27 | ]
28 | RUN_COMMANDS = ["cd KawaiiDeauther;sudo bash KawaiiDeauther.sh"]
29 | PROJECT_URL = "https://github.com/aryanrtm/KawaiiDeauther"
30 |
31 |
32 | class WifiJammingTools(HackingToolsCollection):
33 | TITLE = "Wifi Deauthenticate"
34 | TOOLS = [
35 | WifiJammerNG(),
36 | KawaiiDeauther()
37 | ]
38 |
--------------------------------------------------------------------------------
/tools/anonsurf.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class AnonymouslySurf(HackingTool):
9 | TITLE = "Anonymously Surf"
10 | DESCRIPTION = "It automatically overwrites the RAM when\n" \
11 | "the system is shutting down and also change Ip."
12 | INSTALL_COMMANDS = [
13 | "sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git",
14 | "cd kali-anonsurf && sudo ./installer.sh && cd .. && sudo rm -r kali-anonsurf"
15 | ]
16 | RUN_COMMANDS = ["sudo anonsurf start"]
17 | PROJECT_URL = "https://github.com/Und3rf10w/kali-anonsurf"
18 |
19 | def __init__(self):
20 | super(AnonymouslySurf, self).__init__([('Stop', self.stop)])
21 |
22 | def stop(self):
23 | os.system("sudo anonsurf stop")
24 |
25 |
26 | class Multitor(HackingTool):
27 | TITLE = "Multitor"
28 | DESCRIPTION = "How to stay in multi places at the same time"
29 | INSTALL_COMMANDS = [
30 | "sudo git clone https://github.com/trimstray/multitor.git",
31 | "cd multitor;sudo bash setup.sh install"
32 | ]
33 | RUN_COMMANDS = ["multitor --init 2 --user debian-tor --socks-port 9000 --control-port 9900 --proxy privoxy --haproxy"]
34 | PROJECT_URL = "https://github.com/trimstray/multitor"
35 |
36 | def __init__(self):
37 | super(Multitor, self).__init__(runnable = False)
38 |
39 |
40 | class AnonSurfTools(HackingToolsCollection):
41 | TITLE = "Anonymously Hiding Tools"
42 | DESCRIPTION = ""
43 | TOOLS = [
44 | AnonymouslySurf(),
45 | Multitor()
46 | ]
47 |
--------------------------------------------------------------------------------
/generate_readme.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import re
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 | from main import all_tools
7 |
8 |
9 | def sanitize_anchor(s):
10 | return re.sub(r"\W", "-", s.lower())
11 |
12 |
13 | def get_toc(tools, indentation = ""):
14 | md = ""
15 | for tool in tools:
16 | if isinstance(tool, HackingToolsCollection):
17 | md += (indentation + "- [{}](#{})\n".format(
18 | tool.TITLE, sanitize_anchor(tool.TITLE)))
19 | md += get_toc(tool.TOOLS, indentation = indentation + ' ')
20 | return md
21 |
22 |
23 | def get_tools_toc(tools, indentation = "##"):
24 | md = ""
25 | for tool in tools:
26 | if isinstance(tool, HackingToolsCollection):
27 | md += (indentation + "# {}\n".format(tool.TITLE))
28 | md += get_tools_toc(tool.TOOLS, indentation = indentation + '#')
29 | elif isinstance(tool, HackingTool):
30 | if tool.PROJECT_URL:
31 | md += ("- [{}]({})\n".format(tool.TITLE, tool.PROJECT_URL))
32 | else:
33 | md += ("- {}\n".format(tool.TITLE))
34 | return md
35 |
36 |
37 | def generate_readme():
38 | toc = get_toc(all_tools[:-1])
39 | tools_desc = get_tools_toc(all_tools[:-1])
40 |
41 | with open("README_template.md") as fh:
42 | readme_template = fh.read()
43 |
44 | readme_template = readme_template.replace("{{toc}}", toc)
45 | readme_template = readme_template.replace("{{tools}}", tools_desc)
46 |
47 | with open("README.md", "w") as fh:
48 | fh.write(readme_template)
49 |
50 |
51 | if __name__ == '__main__':
52 | generate_readme()
53 |
--------------------------------------------------------------------------------
/tools/post_exploitation.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class Vegile(HackingTool):
9 | TITLE = "Vegile - Ghost In The Shell"
10 | DESCRIPTION = "This tool will set up your backdoor/rootkits when " \
11 | "backdoor is already setup it will be \n" \
12 | "hidden your specific process,unlimited your session in " \
13 | "metasploit and transparent."
14 | INSTALL_COMMANDS = [
15 | "sudo git clone https://github.com/Screetsec/Vegile.git",
16 | "cd Vegile && sudo chmod +x Vegile"
17 | ]
18 | RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
19 | PROJECT_URL = "https://github.com/Screetsec/Vegile"
20 |
21 | def before_run(self):
22 | os.system('echo "You can Use Command: \n'
23 | '[!] Vegile -i / --inject [backdoor/rootkit] \n'
24 | '[!] Vegile -u / --unlimited [backdoor/rootkit] \n'
25 | '[!] Vegile -h / --help"|boxes -d parchment')
26 |
27 |
28 | class ChromeKeyLogger(HackingTool):
29 | TITLE = "Chrome Keylogger"
30 | DESCRIPTION = "Hera Chrome Keylogger"
31 | INSTALL_COMMANDS = [
32 | "sudo git clone https://github.com/UndeadSec/HeraKeylogger.git",
33 | "cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
34 | ]
35 | RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
36 | PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger"
37 |
38 |
39 | class PostExploitationTools(HackingToolsCollection):
40 | TITLE = "Post exploitation tools"
41 | TOOLS = [
42 | Vegile(),
43 | ChromeKeyLogger()
44 | ]
45 |
--------------------------------------------------------------------------------
/tools/other_tools.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import subprocess
4 |
5 | from core import HackingTool
6 | from core import HackingToolsCollection
7 | from tools.others.android_attack import AndroidAttackTools
8 | from tools.others.email_verifier import EmailVerifyTools
9 | from tools.others.hash_crack import HashCrackingTools
10 | from tools.others.homograph_attacks import IDNHomographAttackTools
11 | from tools.others.mix_tools import MixTools
12 | from tools.others.payload_injection import PayloadInjectorTools
13 | from tools.others.socialmedia import SocialMediaBruteforceTools
14 | from tools.others.socialmedia_finder import SocialMediaFinderTools
15 | from tools.others.web_crawling import WebCrawlingTools
16 | from tools.others.wifi_jamming import WifiJammingTools
17 |
18 |
19 | class HatCloud(HackingTool):
20 | TITLE = "HatCloud(Bypass CloudFlare for IP)"
21 | DESCRIPTION = "HatCloud build in Ruby. It makes bypass in CloudFlare for " \
22 | "discover real IP."
23 | INSTALL_COMMANDS = ["git clone https://github.com/HatBashBR/HatCloud.git"]
24 | PROJECT_URL = "https://github.com/HatBashBR/HatCloud"
25 |
26 | def run(self):
27 | site = input("Enter Site >> ")
28 | os.chdir("HatCloud")
29 | subprocess.run(["sudo", "ruby", "hatcloud.rb", "-b", site])
30 |
31 |
32 | class OtherTools(HackingToolsCollection):
33 | TITLE = "Other tools"
34 | TOOLS = [
35 | SocialMediaBruteforceTools(),
36 | AndroidAttackTools(),
37 | HatCloud(),
38 | IDNHomographAttackTools(),
39 | EmailVerifyTools(),
40 | HashCrackingTools(),
41 | WifiJammingTools(),
42 | SocialMediaFinderTools(),
43 | PayloadInjectorTools(),
44 | WebCrawlingTools(),
45 | MixTools()
46 | ]
47 |
--------------------------------------------------------------------------------
/tools/reverse_engineering.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import subprocess
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class AndroGuard(HackingTool):
9 | TITLE = "Androguard"
10 | DESCRIPTION = "Androguard is a Reverse engineering, Malware and goodware " \
11 | "analysis of Android applications and more"
12 | INSTALL_COMMANDS = ["sudo pip3 install -U androguard"]
13 | PROJECT_URL = "https://github.com/androguard/androguard "
14 |
15 | def __init__(self):
16 | super(AndroGuard, self).__init__(runnable = False)
17 |
18 |
19 | class Apk2Gold(HackingTool):
20 | TITLE = "Apk2Gold"
21 | DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java"
22 | INSTALL_COMMANDS = [
23 | "sudo git clone https://github.com/lxdvs/apk2gold.git",
24 | "cd apk2gold;sudo bash make.sh"
25 | ]
26 | PROJECT_URL = "https://github.com/lxdvs/apk2gold "
27 |
28 | def run(self):
29 | uinput = input("Enter (.apk) File >> ")
30 | subprocess.run(["sudo", "apk2gold", uinput])
31 |
32 |
33 | class Jadx(HackingTool):
34 | TITLE = "JadX"
35 | DESCRIPTION = "Jadx is Dex to Java decompiler.\n" \
36 | "[*] decompile Dalvik bytecode to java classes from APK, dex," \
37 | " aar and zip files\n" \
38 | "[*] decode AndroidManifest.xml and other resources from " \
39 | "resources.arsc"
40 | INSTALL_COMMANDS = [
41 | "sudo git clone https://github.com/skylot/jadx.git",
42 | "cd jadx;./gradlew dist"
43 | ]
44 | PROJECT_URL = "https://github.com/skylot/jadx"
45 |
46 | def __init__(self):
47 | super(Jadx, self).__init__(runnable = False)
48 |
49 |
50 | class ReverseEngineeringTools(HackingToolsCollection):
51 | TITLE = "Reverse engineering tools"
52 | TOOLS = [
53 | AndroGuard(),
54 | Apk2Gold(),
55 | Jadx()
56 | ]
57 |
--------------------------------------------------------------------------------
/tools/exploit_frameworks.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 | from tools.webattack import Web2Attack
5 |
6 |
7 | class RouterSploit(HackingTool):
8 | TITLE = "RouterSploit"
9 | DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \
10 | "framework dedicated to embedded devices"
11 | INSTALL_COMMANDS = [
12 | "sudo git clone https://github.com/threat9/routersploit.git",
13 | "cd routersploit && sudo python3 -m pip install -r requirements.txt"
14 | ]
15 | RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"]
16 | PROJECT_URL = "https://github.com/threat9/routersploit"
17 |
18 |
19 | class WebSploit(HackingTool):
20 | TITLE = "WebSploit"
21 | DESCRIPTION = "Websploit is an advanced MITM framework."
22 | INSTALL_COMMANDS = [
23 | "sudo git clone https://github.com/The404Hacking/websploit.git;cd websploit/Setup;sudo chmod +x install.sh && sudo bash install.sh"
24 | ]
25 | RUN_COMMANDS = ["sudo websploit"]
26 | PROJECT_URL = "https://github.com/The404Hacking/websploit "
27 |
28 |
29 | class Commix(HackingTool):
30 | TITLE = "Commix"
31 | DESCRIPTION = "Automated All-in-One OS command injection and exploitation " \
32 | "tool.\nCommix can be used from web developers, penetration " \
33 | "testers or even security researchers\n in order to test " \
34 | "web-based applications with the view to find bugs,\n " \
35 | "errors or vulnerabilities related to command injection " \
36 | "attacks.\n Usage: python commix.py [option(s)]"
37 | INSTALL_COMMANDS = [
38 | "git clone https://github.com/commixproject/commix.git commix",
39 | "cd commix;sudo python setup.py install"
40 | ]
41 | RUN_COMMANDS = ["sudo python commix.py --wizard"]
42 | PROJECT_URL = "https://github.com/commixproject/commix"
43 |
44 | def __init__(self):
45 | super(Commix, self).__init__(runnable = False)
46 |
47 |
48 | class ExploitFrameworkTools(HackingToolsCollection):
49 | TITLE = "Exploit framework"
50 | TOOLS = [
51 | RouterSploit(),
52 | WebSploit(),
53 | Commix(),
54 | Web2Attack()
55 | ]
56 |
--------------------------------------------------------------------------------
/tools/tool_manager.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | from time import sleep
4 |
5 | from core import HackingTool
6 | from core import HackingToolsCollection
7 |
8 |
9 | class UpdateTool(HackingTool):
10 | TITLE = "Update Tool or System"
11 | DESCRIPTION = "Update Tool or System"
12 |
13 | def __init__(self):
14 | super(UpdateTool, self).__init__([
15 | ("Update System", self.update_sys),
16 | ("Update Hackingtool", self.update_ht)
17 | ], installable = False, runnable = False)
18 |
19 | def update_sys(self):
20 | os.system("sudo apt update && sudo apt full-upgrade -y")
21 | os.system(
22 | "sudo apt-get install tor openssl curl && sudo apt-get update tor openssl curl")
23 | os.system("sudo apt-get install python3-pip")
24 |
25 | def update_ht(self):
26 | os.system("sudo chmod +x /etc/;"
27 | "sudo chmod +x /usr/share/doc;"
28 | "sudo rm -rf /usr/share/doc/hackingtool/;"
29 | "cd /etc/;"
30 | "sudo rm -rf /etc/hackingtool/;"
31 | "mkdir hackingtool;"
32 | "cd hackingtool;"
33 | "git clone https://github.com/Z4nzu/hackingtool.git;"
34 | "cd hackingtool;"
35 | "sudo chmod +x install.sh;"
36 | "./install.sh")
37 |
38 |
39 | class UninstallTool(HackingTool):
40 | TITLE = "Uninstall HackingTool"
41 | DESCRIPTION = "Uninstall HackingTool"
42 |
43 | def __init__(self):
44 | super(UninstallTool, self).__init__([
45 | ('Uninstall', self.uninstall)
46 | ], installable = False, runnable = False)
47 |
48 | def uninstall(self):
49 | print("hackingtool started to uninstall..\n")
50 | sleep(1)
51 | os.system("sudo chmod +x /etc/;"
52 | "sudo chmod +x /usr/share/doc;"
53 | "sudo rm -rf /usr/share/doc/hackingtool/;"
54 | "cd /etc/;"
55 | "sudo rm -rf /etc/hackingtool/;")
56 | print("\nHackingtool Successfully Uninstalled..")
57 | print("Happy Hacking..!!")
58 | sleep(1)
59 |
60 |
61 | class ToolManager(HackingToolsCollection):
62 | TITLE = "Update or Uninstall | Hackingtool"
63 | TOOLS = [
64 | UpdateTool(),
65 | UninstallTool()
66 | ]
67 |
--------------------------------------------------------------------------------
/tools/steganography.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import subprocess
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 | from core import validate_input
7 |
8 |
9 | class SteganoHide(HackingTool):
10 | TITLE = "SteganoHide"
11 | INSTALL_COMMANDS = ["sudo apt-get install steghide -y"]
12 |
13 | def run(self):
14 | choice_run = input(
15 | "[1] Hide\n"
16 | "[2] Extract\n"
17 | "[99]Cancel\n"
18 | ">> ")
19 | choice_run = validate_input(choice_run, [1, 2, 99])
20 | if choice_run is None:
21 | print("Please choose a valid input")
22 | return self.run()
23 |
24 | if choice_run == 99:
25 | return
26 |
27 | if choice_run == 1:
28 | file_hide = input("Enter Filename you want to Embed (1.txt) >> ")
29 | file_to_be_hide = input("Enter Cover Filename(test.jpeg) >> ")
30 | subprocess.run(
31 | ["steghide", "embed", "-cf", file_to_be_hide, "-ef", file_hide])
32 |
33 | elif choice_run == "2":
34 | from_file = input("Enter Filename From Extract Data >> ")
35 | subprocess.run(["steghide", "extract", "-sf", from_file])
36 |
37 |
38 | class StegnoCracker(HackingTool):
39 | TITLE = "StegnoCracker"
40 | DESCRIPTION = "SteganoCracker is a tool that uncover hidden data inside " \
41 | "files\n using brute-force utility"
42 | INSTALL_COMMANDS = [
43 | "pip3 install stegcracker && pip3 install stegcracker -U --force-reinstall"]
44 |
45 | def run(self):
46 | filename = input("Enter Filename:- ")
47 | passfile = input("Enter Wordlist Filename:- ")
48 | subprocess.run(["stegcracker", filename, passfile])
49 |
50 |
51 | class Whitespace(HackingTool):
52 | TITLE = "Whitespace"
53 | DESCRIPTION = "Use whitespace and unicode chars for steganography"
54 | INSTALL_COMMANDS = [
55 | "sudo git clone https://github.com/beardog108/snow10.git",
56 | "sudo chmod -R 755 snow10"
57 | ]
58 | RUN_COMMANDS = ["cd snow10 && firefox index.html"]
59 | PROJECT_URL = "https://github.com/beardog108/snow10"
60 |
61 |
62 | class SteganographyTools(HackingToolsCollection):
63 | TITLE = "Steganograhy tools"
64 | TOOLS = [
65 | SteganoHide(),
66 | StegnoCracker(),
67 | Whitespace()
68 | ]
69 |
--------------------------------------------------------------------------------
/tools/wordlist_generator.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class Cupp(HackingTool):
7 | TITLE = "Cupp"
8 | DESCRIPTION = "WlCreator is a C program that can create all possibilities of passwords,\n " \
9 | "and you can choose Length, Lowercase, Capital, Numbers and Special Chars"
10 | INSTALL_COMMANDS = ["git clone https://github.com/Mebus/cupp.git"]
11 | RUN_COMMANDS = ["python3 cupp.py -i"]
12 | PROJECT_URL = "https://github.com/Mebus/cupp"
13 |
14 |
15 | class WlCreator(HackingTool):
16 | TITLE = "WordlistCreator"
17 | DESCRIPTION = "WlCreator is a C program that can create all possibilities" \
18 | " of passwords,\n and you can choose Lenght, Lowercase, " \
19 | "Capital, Numbers and Special Chars"
20 | INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/wlcreator.git"]
21 | RUN_COMMANDS = [
22 | "cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5"]
23 | PROJECT_URL = "https://github.com/Z4nzu/wlcreator"
24 |
25 |
26 | class GoblinWordGenerator(HackingTool):
27 | TITLE = "Goblin WordGenerator"
28 | DESCRIPTION = "Goblin WordGenerator"
29 | INSTALL_COMMANDS = [
30 | "sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git"]
31 | RUN_COMMANDS = ["cd GoblinWordGenerator && python3 goblin.py"]
32 | PROJECT_URL = "https://github.com/UndeadSec/GoblinWordGenerator.git"
33 |
34 |
35 | class showme(HackingTool):
36 | TITLE = "Password list (1.4 Billion Clear Text Password)"
37 | DESCRIPTION = "This tool allows you to perform OSINT and reconnaissance on " \
38 | "an organisation or an individual. It allows one to search " \
39 | "1.4 Billion clear text credentials which was dumped as " \
40 | "part of BreachCompilation leak. This database makes " \
41 | "finding passwords faster and easier than ever before."
42 | INSTALL_COMMANDS = [
43 | "sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git",
44 | "cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt"
45 | ]
46 | RUN_COMMANDS = ["cd SMWYG-Show-Me-What-You-Got && python SMWYG.py"]
47 | PROJECT_URL = "https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got"
48 |
49 |
50 | class WordlistGeneratorTools(HackingToolsCollection):
51 | TITLE = "Wordlist Generator"
52 | TOOLS = [
53 | Cupp(),
54 | WlCreator(),
55 | GoblinWordGenerator(),
56 | showme()
57 | ]
58 |
--------------------------------------------------------------------------------
/tools/others/socialmedia.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import subprocess
4 |
5 | from core import HackingTool
6 | from core import HackingToolsCollection
7 |
8 |
9 | class InstaBrute(HackingTool):
10 | TITLE = "Instagram Attack"
11 | DESCRIPTION = "Brute force attack against Instagram"
12 | INSTALL_COMMANDS = [
13 | "sudo git clone https://github.com/chinoogawa/instaBrute.git",
14 | "cd instaBrute;sudo pip2.7 install -r requirements.txt"
15 | ]
16 | PROJECT_URL = "https://github.com/chinoogawa/instaBrute"
17 |
18 | def run(self):
19 | name = input("Enter Username >> ")
20 | wordlist = input("Enter wordword list >> ")
21 | os.chdir("instaBrute")
22 | subprocess.run(
23 | ["sudo", "python", "instaBrute.py", "-u", f"{name}", "-d",
24 | f"{wordlist}"])
25 |
26 |
27 | class BruteForce(HackingTool):
28 | TITLE = "AllinOne SocialMedia Attack"
29 | DESCRIPTION = "Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n" \
30 | "[!] python3 Brute_Force.py -g -l "
31 | INSTALL_COMMANDS = [
32 | "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
33 | "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
34 | ]
35 | RUN_COMMANDS = ["cd Brute_Force;python3 Brute_Force.py -h"]
36 | PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
37 |
38 |
39 | class Faceshell(HackingTool):
40 | TITLE = "Facebook Attack"
41 | DESCRIPTION = "Facebook BruteForcer"
42 | INSTALL_COMMANDS = [
43 | "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
44 | "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
45 | ]
46 | PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
47 |
48 | def run(self):
49 | name = input("Enter Username >> ")
50 | wordlist = input("Enter Wordlist >> ")
51 | os.chdir("Brute_Force")
52 | subprocess.run(
53 | ["python3", "Brute_Force.py", "-f", f"{name}", "-l", f"{wordlist}"])
54 |
55 |
56 | class AppCheck(HackingTool):
57 | TITLE = "Application Checker"
58 | DESCRIPTION = "Tool to check if an app is installed on the target device through a link."
59 | INSTALL_COMMANDS = [
60 | "sudo git clone https://github.com/jakuta-tech/underhanded.git",
61 | "cd underhanded && sudo chmod +x underhanded.sh"
62 | ]
63 | RUN_COMMANDS = ["cd underhanded;sudo bash underhanded.sh"]
64 | PROJECT_URL = "https://github.com/jakuta-tech/underhanded"
65 |
66 |
67 | class SocialMediaBruteforceTools(HackingToolsCollection):
68 | TITLE = "SocialMedia Bruteforce"
69 | TOOLS = [
70 | InstaBrute(),
71 | BruteForce(),
72 | Faceshell(),
73 | AppCheck()
74 | ]
75 |
--------------------------------------------------------------------------------
/tools/others/android_attack.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class Keydroid(HackingTool):
7 | TITLE = "Keydroid"
8 | DESCRIPTION = "Android Keylogger + Reverse Shell\n" \
9 | "[!] You have to install Some Manually Refer Below Link:\n " \
10 | "[+] https://github.com/F4dl0/keydroid"
11 | INSTALL_COMMANDS = ["sudo git clone https://github.com/F4dl0/keydroid.git"]
12 | RUN_COMMANDS = ["cd keydroid && bash keydroid.sh"]
13 | PROJECT_URL = "https://github.com/F4dl0/keydroid"
14 |
15 |
16 | class MySMS(HackingTool):
17 | TITLE = "MySMS"
18 | DESCRIPTION = "Script that generates an Android App to hack SMS through WAN \n" \
19 | "[!] You have to install Some Manually Refer Below Link:\n\t " \
20 | "[+] https://github.com/papusingh2sms/mysms"
21 | INSTALL_COMMANDS = [
22 | "sudo git clone https://github.com/papusingh2sms/mysms.git"]
23 | RUN_COMMANDS = ["cd mysms && bash mysms.sh"]
24 | PROJECT_URL = "https://github.com/papusingh2sms/mysms"
25 |
26 |
27 | class LockPhish(HackingTool):
28 | TITLE = "Lockphish (Grab target LOCK PIN)"
29 | DESCRIPTION = "Lockphish it's the first tool for phishing attacks on the " \
30 | "lock screen, designed to\n Grab Windows credentials,Android" \
31 | " PIN and iPhone Passcode using a https link."
32 | INSTALL_COMMANDS = [
33 | "sudo git clone https://github.com/JasonJerry/lockphish.git"]
34 | RUN_COMMANDS = ["cd lockphish && bash lockphish.sh"]
35 | PROJECT_URL = "https://github.com/JasonJerry/lockphish"
36 |
37 |
38 | class Droidcam(HackingTool):
39 | TITLE = "DroidCam (Capture Image)"
40 | DESCRIPTION = "Powerful Tool For Grab Front Camera Snap Using A Link"
41 | INSTALL_COMMANDS = [
42 | "sudo git clone https://github.com/kinghacker0/WishFish.git;"
43 | "sudo apt install php wget openssh-client"
44 | ]
45 | RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"]
46 | PROJECT_URL = "https://github.com/kinghacker0/WishFish"
47 |
48 |
49 | class EvilApp(HackingTool):
50 | TITLE = "EvilApp (Hijack Session)"
51 | DESCRIPTION = "EvilApp is a script to generate Android App that can " \
52 | "hijack authenticated sessions in cookies."
53 | INSTALL_COMMANDS = [
54 | "sudo git clone https://github.com/crypticterminal/EvilApp.git"]
55 | RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"]
56 | PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
57 |
58 |
59 | class AndroidAttackTools(HackingToolsCollection):
60 | TITLE = "Android Hacking tools"
61 | TOOLS = [
62 | Keydroid(),
63 | MySMS(),
64 | LockPhish(),
65 | Droidcam(),
66 | EvilApp()
67 | ]
68 |
--------------------------------------------------------------------------------
/tools/ddos.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import subprocess
4 |
5 | from core import HackingTool
6 | from core import HackingToolsCollection
7 |
8 |
9 | class SlowLoris(HackingTool):
10 | TITLE = "SlowLoris"
11 | DESCRIPTION = "Slowloris is basically an HTTP Denial of Service attack." \
12 | "It send lots of HTTP Request"
13 | INSTALL_COMMANDS = ["sudo pip3 install slowloris"]
14 |
15 | def run(self):
16 | target_site = input("Enter Target Site:- ")
17 | subprocess.run(["slowloris", target_site])
18 |
19 |
20 | class Asyncrone(HackingTool):
21 | TITLE = "Asyncrone | Multifunction SYN Flood DDoS Weapon"
22 | DESCRIPTION = "aSYNcrone is a C language based, mulltifunction SYN Flood " \
23 | "DDoS Weapon.\nDisable the destination system by sending a " \
24 | "SYN packet intensively to the destination."
25 | INSTALL_COMMANDS = [
26 | "git clone https://github.com/fatih4842/aSYNcrone.git",
27 | "cd aSYNcrone;sudo gcc aSYNcrone.c -o aSYNcrone -lpthread"
28 | ]
29 | PROJECT_URL = "https://github.com/fatihsnsy/aSYNcrone"
30 |
31 | def run(self):
32 | source_port = input("Enter Source Port >> ")
33 | target_ip = input("Enter Target IP >> ")
34 | target_port = input("Enter Target port >> ")
35 | os.system("cd aSYNcrone;")
36 | subprocess.run([
37 | "sudo", "./aSYNcrone", source_port, target_ip, target_port, 1000])
38 |
39 |
40 | class UFONet(HackingTool):
41 | TITLE = "UFOnet"
42 | DESCRIPTION = "UFONet - is a free software, P2P and cryptographic " \
43 | "-disruptive \n toolkit- that allows to perform DoS and " \
44 | "DDoS attacks\n\b " \
45 | "More Usage Visit"
46 | INSTALL_COMMANDS = [
47 | "sudo git clone https://github.com/epsylon/ufonet.git",
48 | "cd ufonet;sudo python3 setup.py install;sudo pip3 install GeoIP;sudo pip3 install python-geoip;sudo pip3 install pygeoip;sudo pip3 install requests;sudo pip3 install pycrypto;sudo pip3 install pycurl;sudo pip3 install whois;sudo pip3 install scapy-python3"
49 | ]
50 | RUN_COMMANDS = ["sudo python3 ufonet --gui"]
51 | PROJECT_URL = "https://github.com/epsylon/ufonet"
52 |
53 |
54 | class GoldenEye(HackingTool):
55 | TITLE = "GoldenEye"
56 | DESCRIPTION = "GoldenEye is an python3 app for SECURITY TESTING PURPOSES ONLY!\n" \
57 | "GoldenEye is a HTTP DoS Test Tool."
58 | INSTALL_COMMANDS = [
59 | "sudo git clone https://github.com/jseidl/GoldenEye.git;"
60 | "chmod -R 755 GoldenEye"
61 | ]
62 | PROJECT_URL = "https://github.com/jseidl/GoldenEye"
63 |
64 | def run(self):
65 | os.system("cd GoldenEye ;sudo ./goldeneye.py")
66 | print("\033[96m Go to Directory \n "
67 | "[*] USAGE: ./goldeneye.py [OPTIONS]")
68 |
69 |
70 | class DDOSTools(HackingToolsCollection):
71 | TITLE = "DDOS Attack Tools"
72 | TOOLS = [
73 | SlowLoris(),
74 | Asyncrone(),
75 | UFONet(),
76 | GoldenEye()
77 | ]
78 |
--------------------------------------------------------------------------------
/README_template.md:
--------------------------------------------------------------------------------
1 | ### All in One Hacking tool For Hackers🥇
2 | 
3 | 
4 | 
5 | 
6 | 
7 | 
8 | 
9 | [](http://hits.dwyl.com/Z4nzu/hackingtool)
10 | 
11 |
12 | #### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I)
13 |
14 | ## Update Available V1.1.0 🚀
15 | - [x] Added New Tools
16 | - [x] Reverse Engineering
17 | - [x] RAT Tools
18 | - [x] Web Crawling
19 | - [x] Payload Injector
20 | - [x] Multitor Tools update
21 | - [X] Added Tool in wifijamming
22 |
23 |
24 | # Hackingtool Menu 🧰
25 | {{toc}}
26 |
27 | {{tools}}
28 |
29 | 
30 | 
31 | 
32 | 
33 | 
34 |
35 | ## Installation For Linux 
36 |
37 | #### This Tool Must Run As ROOT !!!
38 |
39 | git clone https://github.com/Z4nzu/hackingtool.git
40 |
41 | chmod -R 755 hackingtool
42 |
43 | cd hackingtool
44 |
45 | sudo pip3 install -r requirement.txt
46 |
47 | bash install.sh
48 |
49 | sudo hackingtool
50 |
51 | After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool**
52 |
53 | #### Thanks to original Author of the tools used in hackingtool
54 |
55 |
56 |
Please Don't Use for illegal Activity
57 |
58 | ### To do
59 | - [ ] Release Tool
60 | - [ ] Add Tools for CTF
61 | - [ ] Want to do automatic
62 |
63 | ## Social Media :mailbox_with_no_mail:
64 | [](https://twitter.com/_Zinzu07)
65 | [](https://github.com/Z4nzu/)
66 | ##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8)
67 | 
68 |
69 |
70 |
71 | #### Don't Forgot to share with Your Friends
72 | #### Thank you..!!
73 |
--------------------------------------------------------------------------------
/tools/forensic_tools.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class Autopsy(HackingTool):
9 | TITLE = "Autopsy"
10 | DESCRIPTION = "Autopsy is a platform that is used by Cyber Investigators.\n" \
11 | "[!] Works in any Os\n" \
12 | "[!] Recover Deleted Files from any OS & MEdia \n" \
13 | "[!] Extract Image Metadata"
14 | RUN_COMMANDS = "sudo autopsy"
15 |
16 | def __init__(self):
17 | super(Autopsy, self).__init__(installable = False)
18 |
19 |
20 | class Wireshark(HackingTool):
21 | TITLE = "Wireshark"
22 | DESCRIPTION = "Wireshark is a network capture and analyzer \n" \
23 | "tool to see what’s happening in your network.\n " \
24 | "And also investigate Network related incident"
25 | RUN_COMMANDS = ["sudo wireshark"]
26 |
27 | def __init__(self):
28 | super(Wireshark, self).__init__(installable = False)
29 |
30 |
31 | class BulkExtractor(HackingTool):
32 | TITLE = "Bulk extractor"
33 | DESCRIPTION = "Extract useful information without parsing the file system"
34 | PROJECT_URL = "https://github.com/simsong/bulk_extractor"
35 |
36 | def __init__(self):
37 | super(BulkExtractor, self).__init__([
38 | ('GUI Mode (Download required)', self.gui_mode),
39 | ('CLI Mode', self.cli_mode)
40 | ], installable = False, runnable = False)
41 |
42 | def gui_mode(self):
43 | os.system(
44 | "sudo git clone https://github.com/simsong/bulk_extractor.git")
45 | os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
46 | print(
47 | "If you getting error after clone go to /java_gui/src/ And Compile .Jar file && run ./BEViewer")
48 | print(
49 | "Please Visit For More Details About Installation >> https://github.com/simsong/bulk_extractor")
50 |
51 | def cli_mode(self):
52 | os.system("sudo apt install bulk-extractor")
53 | print("bulk_extractor and options")
54 | os.system("bulk_extractor -h")
55 | os.system(
56 | 'echo "bulk_extractor [options] imagefile" | boxes -d headline | lolcat')
57 |
58 |
59 | class Guymager(HackingTool):
60 | TITLE = "Disk Clone and ISO Image Aquire"
61 | DESCRIPTION = "Guymager is a free forensic imager for media acquisition."
62 | INSTALL_COMMANDS = ["sudo apt install guymager"]
63 | RUN_COMMANDS = ["sudo guymager"]
64 | PROJECT_URL = "https://guymager.sourceforge.io/"
65 |
66 |
67 | class Toolsley(HackingTool):
68 | TITLE = "Toolsley"
69 | DESCRIPTION = "Toolsley got more than ten useful tools for investigation.\n" \
70 | "[+]File signature verifier\n" \
71 | "[+]File identifier \n" \
72 | "[+]Hash & Validate \n" \
73 | "[+]Binary inspector \n " \
74 | "[+]Encode text \n" \
75 | "[+]Data URI generator \n" \
76 | "[+]Password generator"
77 | PROJECT_URL = "https://www.toolsley.com/"
78 |
79 | def __init__(self):
80 | super(Toolsley, self).__init__(installable = False, runnable = False)
81 |
82 |
83 | class ForensicTools(HackingToolsCollection):
84 | TITLE = "Forensic tools"
85 | TOOLS = [
86 | Autopsy(),
87 | Wireshark(),
88 | BulkExtractor(),
89 | Guymager(),
90 | Toolsley()
91 | ]
92 |
--------------------------------------------------------------------------------
/tools/others/socialmedia_finder.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import subprocess
4 |
5 | from core import HackingTool
6 | from core import HackingToolsCollection
7 |
8 |
9 | class FacialFind(HackingTool):
10 | TITLE = "Find SocialMedia By Facial Recognation System"
11 | DESCRIPTION = "A Social Media Mapping Tool that correlates profiles\n " \
12 | "via facial recognition across different sites."
13 | INSTALL_COMMANDS = [
14 | "sudo apt install -y software-properties-common",
15 | "sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade",
16 | "sudo git clone https://github.com/Greenwolf/social_mapper.git",
17 | "sudo apt install -y build-essential cmake libgtk-3-dev libboost-all-dev",
18 | "cd social_mapper/setup",
19 | "sudo python3 -m pip install --no-cache-dir -r requirements.txt",
20 | 'echo "[!]Now You have To do some Manually\n'
21 | '[!] Install the Geckodriver for your operating system\n'
22 | '[!] Copy & Paste Link And Download File As System Configuration\n'
23 | '[#] https://github.com/mozilla/geckodriver/releases\n'
24 | '[!!] On Linux you can place it in /usr/bin "| boxes | lolcat'
25 | ]
26 | PROJECT_URL = "https://github.com/Greenwolf/social_mapper"
27 |
28 | def run(self):
29 | os.system("cd social_mapper/setup")
30 | os.system("sudo python social_mapper.py -h")
31 | print("""\033[95m
32 | You have to set Username and password of your AC Or Any Fack Account
33 | [#] Type in Terminal nano social_mapper.py
34 | """)
35 | os.system(
36 | 'echo "python social_mapper.py -f [] -i [] -m fast [] -fb -tw"| boxes | lolcat')
37 |
38 |
39 | class FindUser(HackingTool):
40 | TITLE = "Find SocialMedia By UserName"
41 | DESCRIPTION = "Find usernames across over 75 social networks"
42 | INSTALL_COMMANDS = [
43 | "sudo git clone https://github.com/xHak9x/finduser.git",
44 | "cd finduser && sudo chmod +x finduser.sh"
45 | ]
46 | RUN_COMMANDS = ["cd finduser && sudo bash finduser.sh"]
47 | PROJECT_URL = "https://github.com/xHak9x/finduser"
48 |
49 |
50 | class Sherlock(HackingTool):
51 | TITLE = "Sherlock"
52 | DESCRIPTION = "Hunt down social media accounts by username across social networks \n " \
53 | "For More Usege \n" \
54 | "\t >>python3 sherlock --help"
55 | INSTALL_COMMANDS = [
56 | "git clone https://github.com/sherlock-project/sherlock.git",
57 | "cd sherlock;sudo python3 -m pip install -r requirements.txt"
58 | ]
59 | PROJECT_URL = "https://github.com/sherlock-project/sherlock"
60 |
61 | def run(self):
62 | name = input("Enter Username >> ")
63 | os.chdir('sherlock')
64 | subprocess.run(["sudo", "python3", "sherlock", f"{name}"])
65 |
66 |
67 | class SocialScan(HackingTool):
68 | TITLE = "SocialScan | Username or Email"
69 | DESCRIPTION = "Check email address and username availability on online " \
70 | "platforms with 100% accuracy"
71 | INSTALL_COMMANDS = ["sudo pip install socialscan"]
72 | PROJECT_URL = "https://github.com/iojw/socialscan"
73 |
74 | def run(self):
75 | name = input(
76 | "Enter Username or Emailid (if both then please space between email & username) >> ")
77 | subprocess.run(["sudo", "socialscan", f"{name}"])
78 |
79 |
80 | class SocialMediaFinderTools(HackingToolsCollection):
81 | TITLE = "SocialMedia Finder"
82 | TOOLS = [
83 | FacialFind(),
84 | FindUser(),
85 | Sherlock(),
86 | SocialScan()
87 | ]
88 |
--------------------------------------------------------------------------------
/install.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | clear
3 |
4 | BLACK='\e[30m'
5 | RED='\e[31m'
6 | GREEN='\e[92m'
7 | YELLOW='\e[33m'
8 | ORANGE='\e[93m'
9 | BLUE='\e[34m'
10 | PURPLE='\e[35m'
11 | CYAN='\e[36m'
12 | WHITE='\e[37m'
13 | NC='\e[0m'
14 | purpal='\033[35m'
15 |
16 | echo -e "${ORANGE} "
17 | echo ""
18 | echo " ▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█ ";
19 | echo " ███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███ ";
20 | echo " ███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███ ";
21 | echo " ▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███ ";
22 | echo "▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███ ";
23 | echo " ███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ";
24 | echo " ███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄ ";
25 | echo " ███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██ ";
26 | echo " ▀ ▀ ";
27 |
28 | echo -e "${BLUE} https://github.com/Z4nzu/hackingtool ${NC}"
29 |
30 | echo -e "${RED} [!] This Tool Must Run As ROOT [!]${NC}"
31 | echo ""
32 | echo -e ${CYAN} "Select Best Option : "
33 | echo ""
34 | echo -e "${WHITE} [1] Kali Linux / Parrot-Os "
35 | echo -e "${WHITE} [0] Exit "
36 | echo -n -e "Z4nzu >> "
37 | read choice
38 | INSTALL_DIR="/usr/share/doc/hackingtool"
39 | BIN_DIR="/usr/bin/"
40 | if [ $choice == 1 ]; then
41 | echo "[*] Checking Internet Connection .."
42 | wget -q --tries=10 --timeout=20 --spider https://google.com
43 | if [[ $? -eq 0 ]]; then
44 | echo -e ${BLUE}"[✔] Loading ... "
45 | sudo apt-get update && apt-get upgrade
46 | sudo apt-get install python-pip
47 | echo "[✔] Checking directories..."
48 | if [ -d "$INSTALL_DIR" ]; then
49 | echo "[!] A Directory hackingtool Was Found.. Do You Want To Replace It ? [y/n]:" ;
50 | read input
51 | if [ "$input" = "y" ]; then
52 | rm -R "$INSTALL_DIR"
53 | else
54 | exit
55 | fi
56 | fi
57 | echo "[✔] Installing ...";
58 | echo "";
59 | git clone https://github.com/Z4nzu/hackingtool.git "$INSTALL_DIR";
60 | echo "#!/bin/bash
61 | python3 $INSTALL_DIR/hackingtool.py" '${1+"$@"}' > hackingtool;
62 | sudo chmod +x hackingtool;
63 | sudo cp hackingtool /usr/bin/;
64 | rm hackingtool;
65 | echo "";
66 | echo "[✔] Trying to installing Requirements ..."
67 | sudo pip3 install lolcat
68 | sudo apt-get install -y figlet
69 | sudo pip3 install boxes
70 | sudo apt-get install boxes
71 | sudo pip3 install flask
72 | sudo pip3 install requests
73 | else
74 | echo -e $RED "Please Check Your Internet Connection ..!!"
75 | fi
76 |
77 | if [ -d "$INSTALL_DIR" ]; then
78 | echo "";
79 | echo "[✔] Successfuly Installed !!! ";
80 | echo "";
81 | echo "";
82 | echo -e $ORANGE " [+]+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++[+]"
83 | echo " [+] [+]"
84 | echo -e $ORANGE " [+] ✔✔✔ Now Just Type In Terminal (hackingtool) ✔✔✔ [+]"
85 | echo " [+] [+]"
86 | echo -e $ORANGE " [+]+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++[+]"
87 | else
88 | echo "[✘] Installation Failed !!! [✘]";
89 | exit
90 | fi
91 | elif [ $choice -eq 0 ];
92 | then
93 | echo -e $RED "[✘] THank Y0u !! [✘] "
94 | exit
95 | else
96 | echo -e $RED "[!] Select Valid Option [!]"
97 | fi
98 |
--------------------------------------------------------------------------------
/tools/webattack.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import subprocess
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class Web2Attack(HackingTool):
9 | TITLE = "Web2Attack"
10 | DESCRIPTION = "Web hacking framework with tools, exploits by python"
11 | INSTALL_COMMANDS = [
12 | "sudo git clone https://github.com/santatic/web2attack.git"]
13 | RUN_COMMANDS = ["cd web2attack && sudo python3 w2aconsole"]
14 | PROJECT_URL = "https://github.com/santatic/web2attack"
15 |
16 |
17 | class Skipfish(HackingTool):
18 | TITLE = "Skipfish"
19 | DESCRIPTION = "Skipfish – Fully automated, active web application " \
20 | "security reconnaissance tool \n " \
21 | "Usage: skipfish -o [FolderName] targetip/site"
22 | RUN_COMMANDS = [
23 | "sudo skipfish -h",
24 | 'echo "skipfish -o [FolderName] targetip/site"|boxes -d headline | lolcat'
25 | ]
26 |
27 | def __init__(self):
28 | super(Skipfish, self).__init__(installable = False)
29 |
30 |
31 | class SubDomainFinder(HackingTool):
32 | TITLE = "SubDomain Finder"
33 | DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
34 | "subdomains of websites using OSINT \n " \
35 | "Usage:\n\t" \
36 | "[1] python3 sublist3r.py -d example.com \n" \
37 | "[2] python3 sublist3r.py -d example.com -p 80,443"
38 | INSTALL_COMMANDS = [
39 | "sudo pip3 install requests argparse dnspython",
40 | "sudo git clone https://github.com/aboul3la/Sublist3r.git",
41 | "cd Sublist3r && sudo pip3 install -r requirements.txt"
42 | ]
43 | RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"]
44 | PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
45 |
46 |
47 | class CheckURL(HackingTool):
48 | TITLE = "CheckURL"
49 | DESCRIPTION = "Detect evil urls that uses IDN Homograph Attack.\n\t" \
50 | "[!] python3 checkURL.py --url google.com"
51 | INSTALL_COMMANDS = [
52 | "sudo git clone https://github.com/UndeadSec/checkURL.git"]
53 | RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"]
54 | PROJECT_URL = "https://github.com/UndeadSec/checkURL"
55 |
56 |
57 | class Blazy(HackingTool):
58 | TITLE = "Blazy(Also Find ClickJacking)"
59 | DESCRIPTION = "Blazy is a modern login page bruteforcer"
60 | INSTALL_COMMANDS = [
61 | "sudo git clone https://github.com/UltimateHackers/Blazy.git",
62 | "cd Blazy && sudo pip2.7 install -r requirements.txt"
63 | ]
64 | RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"]
65 | PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
66 |
67 |
68 | class SubDomainTakeOver(HackingTool):
69 | TITLE = "Sub-Domain TakeOver"
70 | DESCRIPTION = "Sub-domain takeover vulnerability occur when a sub-domain " \
71 | "\n (subdomain.example.com) is pointing to a service " \
72 | "(e.g: GitHub, AWS/S3,..)\n" \
73 | "that has been removed or deleted.\n" \
74 | "Usage:python3 takeover.py -d www.domain.com -v"
75 | INSTALL_COMMANDS = [
76 | "git clone https://github.com/m4ll0k/takeover.git",
77 | "cd takeover;sudo python3 setup.py install"
78 | ]
79 | PROJECT_URL = "https://github.com/m4ll0k/takeover"
80 |
81 | def __init__(self):
82 | super(SubDomainTakeOver, self).__init__(runnable = False)
83 |
84 | class Dirb(HackingTool):
85 | TITLE = "Dirb"
86 | DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
87 | "(and/or hidden) Web Objects.\n" \
88 | "It basically works by launching a dictionary based " \
89 | "attack against \n a web server and analizing the response."
90 | INSTALL_COMMANDS = [
91 | "sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
92 | "cd dirb;sudo bash configure;make"
93 | ]
94 | PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
95 |
96 | def run(self):
97 | uinput = input("Enter Url >> ")
98 | subprocess.run(["sudo", "dirb", uinput])
99 |
100 |
101 | class WebAttackTools(HackingToolsCollection):
102 | TITLE = "Web Attack tools"
103 | DESCRIPTION = ""
104 | TOOLS = [
105 | Web2Attack(),
106 | Skipfish(),
107 | SubDomainFinder(),
108 | CheckURL(),
109 | Blazy(),
110 | SubDomainTakeOver(),
111 | Dirb()
112 | ]
113 |
--------------------------------------------------------------------------------
/tools/sql_tools.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from core import HackingTool
3 | from core import HackingToolsCollection
4 |
5 |
6 | class Sqlmap(HackingTool):
7 | TITLE = "Sqlmap tool"
8 | DESCRIPTION = "sqlmap is an open source penetration testing tool that " \
9 | "automates the process of \n" \
10 | "detecting and exploiting SQL injection flaws and taking " \
11 | "over of database servers \n " \
12 | "[!] python3 sqlmap.py -u [] --batch --banner \n " \
13 | "More Usage [!] https://github.com/sqlmapproject/sqlmap/wiki/Usage"
14 | INSTALL_COMMANDS = [
15 | "sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
16 | RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"]
17 | PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
18 |
19 | class NoSqlMap(HackingTool):
20 | TITLE = "NoSqlMap"
21 | DESCRIPTION = "NoSQLMap is an open source Python tool designed to \n " \
22 | "audit for as well as automate injection attacks and exploit.\n " \
23 | "\033[91m " \
24 | "[*] Please Install MongoDB \n "
25 | INSTALL_COMMANDS = [
26 | "git clone https://github.com/codingo/NoSQLMap.git",
27 | "sudo chmod -R 755 NoSQLMap;cd NoSQLMap;python setup.py install"
28 | ]
29 | RUN_COMMANDS = ["python NoSQLMap"]
30 | PROJECT_URL = "https://github.com/codingo/NoSQLMap"
31 |
32 |
33 | class SQLiScanner(HackingTool):
34 | TITLE = "Damn Small SQLi Scanner"
35 | DESCRIPTION = "Damn Small SQLi Scanner (DSSS) is a fully functional SQL " \
36 | "injection\nvulnerability scanner also supporting GET and " \
37 | "POST parameters.\n" \
38 | "[*]python3 dsss.py -h[help] | -u[URL]"
39 | INSTALL_COMMANDS = ["git clone https://github.com/stamparm/DSSS.git"]
40 | PROJECT_URL = "https://github.com/stamparm/DSSS"
41 |
42 | def __init__(self):
43 | super(SQLiScanner, self).__init__(runnable = False)
44 |
45 |
46 | class Explo(HackingTool):
47 | TITLE = "Explo"
48 | DESCRIPTION = "Explo is a simple tool to describe web security issues " \
49 | "in a human and machine readable format.\n " \
50 | "Usage:- \n " \
51 | "[1] explo [--verbose|-v] testcase.yaml \n " \
52 | "[2] explo [--verbose|-v] examples/*.yaml"
53 | INSTALL_COMMANDS = [
54 | "git clone https://github.com/dtag-dev-sec/explo.git",
55 | "cd explo;sudo python setup.py install"
56 | ]
57 | PROJECT_URL = "https://github.com/dtag-dev-sec/explo"
58 |
59 | def __init__(self):
60 | super(Explo, self).__init__(runnable = False)
61 |
62 |
63 | class Blisqy(HackingTool):
64 | TITLE = "Blisqy - Exploit Time-based blind-SQL injection"
65 | DESCRIPTION = "Blisqy is a tool to aid Web Security researchers to find " \
66 | "Time-based Blind SQL injection \n on HTTP Headers and also " \
67 | "exploitation of the same vulnerability.\n " \
68 | "For Usage >> \n"
69 | INSTALL_COMMANDS = ["git clone https://github.com/JohnTroony/Blisqy.git"]
70 | PROJECT_URL = "https://github.com/JohnTroony/Blisqy"
71 |
72 | def __init__(self):
73 | super(Blisqy, self).__init__(runnable = False)
74 |
75 |
76 | class Leviathan(HackingTool):
77 | TITLE = "Leviathan - Wide Range Mass Audit Toolkit"
78 | DESCRIPTION = "Leviathan is a mass audit toolkit which has wide range " \
79 | "service discovery,\nbrute force, SQL injection detection " \
80 | "and running custom exploit capabilities. \n " \
81 | "[*] It Requires API Keys \n " \
82 | "More Usage [!] https://github.com/utkusen/leviathan/wiki"
83 | INSTALL_COMMANDS = [
84 | "git clone https://github.com/leviathan-framework/leviathan.git",
85 | "cd leviathan;sudo pip install -r requirements.txt"
86 | ]
87 | RUN_COMMANDS = ["cd leviathan;python leviathan.py"]
88 | PROJECT_URL = "https://github.com/leviathan-framework/leviathan"
89 |
90 |
91 | class SQLScan(HackingTool):
92 | TITLE = "SQLScan"
93 | DESCRIPTION = "sqlscan is quick web scanner for find an sql inject point." \
94 | " not for educational, this is for hacking."
95 | INSTALL_COMMANDS = [
96 | "sudo apt install php php-bz2 php-curl php-mbstring curl",
97 | "sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan",
98 | "chmod +x /usr/local/bin/sqlscan"
99 | ]
100 | RUN_COMMANDS = ["sudo sqlscan"]
101 | PROJECT_URL = "https://github.com/Cvar1984/sqlscan"
102 |
103 |
104 | class SqlInjectionTools(HackingToolsCollection):
105 | TITLE = "SQL Injection Tools"
106 | TOOLS = [
107 | Sqlmap(),
108 | NoSqlMap(),
109 | SQLiScanner(),
110 | Explo(),
111 | Blisqy(),
112 | Leviathan(),
113 | SQLScan()
114 | ]
115 |
--------------------------------------------------------------------------------
/tools/xss_attack.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import subprocess
4 |
5 | from core import HackingTool
6 | from core import HackingToolsCollection
7 |
8 |
9 | class Dalfox(HackingTool):
10 | TITLE = "DalFox(Finder of XSS)"
11 | DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
12 | INSTALL_COMMANDS = [
13 | "sudo apt-get install golang",
14 | "sudo git clone https://github.com/hahwul/dalfox",
15 | "cd dalfox;go install"
16 | ]
17 | RUN_COMMANDS = [
18 | "~/go/bin/dalfox",
19 | 'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"'
20 | ]
21 | PROJECT_URL = "https://github.com/hahwul/dalfox"
22 |
23 |
24 | class XSSPayloadGenerator(HackingTool):
25 | TITLE = "XSS Payload Generator"
26 | DESCRIPTION = "XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER"
27 | INSTALL_COMMANDS = [
28 | "git clone https://github.com/capture0x/XSS-LOADER.git",
29 | "cd XSS-LOADER;sudo pip3 install -r requirements.txt"
30 | ]
31 | RUN_COMMANDS = ["cd XSS-LOADER;sudo python3 payloader.py"]
32 | PROJECT_URL = "https://github.com/capture0x/XSS-LOADER.git"
33 |
34 |
35 | class XSSFinder(HackingTool):
36 | TITLE = "Extended XSS Searcher and Finder"
37 | DESCRIPTION = "Extended XSS Searcher and Finder"
38 | INSTALL_COMMANDS = [
39 | "git clone https://github.com/Damian89/extended-xss-search.git"]
40 | PROJECT_URL = "https://github.com/Damian89/extended-xss-search"
41 |
42 | def after_install(self):
43 | print("""\033[96m
44 | Follow This Steps After Installation:-
45 | \033[31m [*] Go To extended-xss-search directory,
46 | and Rename the example.app-settings.conf to app-settings.conf
47 | """)
48 | input("Press ENTER to continue")
49 |
50 | def run(self):
51 | print("""\033[96m
52 | You have To Add Links to scan
53 | \033[31m[!] Go to extended-xss-search
54 | [*] config/urls-to-test.txt
55 | [!] python3 extended-xss-search.py
56 | """)
57 |
58 |
59 | class XSSFreak(HackingTool):
60 | TITLE = "XSS-Freak"
61 | DESCRIPTION = "XSS-Freak is an XSS scanner fully written in python3 from scratch"
62 | INSTALL_COMMANDS = [
63 | "git clone https://github.com/PR0PH3CY33/XSS-Freak.git",
64 | "cd XSS-Freak;sudo pip3 install -r requirements.txt"
65 | ]
66 | RUN_COMMANDS = ["cd XSS-Freak;sudo python3 XSS-Freak.py"]
67 | PROJECT_URL = "https://github.com/PR0PH3CY33/XSS-Freak"
68 |
69 |
70 | class XSpear(HackingTool):
71 | TITLE = "XSpear"
72 | DESCRIPTION = "XSpear is XSS Scanner on ruby gems"
73 | INSTALL_COMMANDS = ["gem install XSpear"]
74 | RUN_COMMANDS = ["XSpear -h"]
75 | PROJECT_URL = "https://github.com/hahwul/XSpear"
76 |
77 |
78 | class XSSCon(HackingTool):
79 | TITLE = "XSSCon"
80 | INSTALL_COMMANDS = [
81 | "git clone https://github.com/menkrep1337/XSSCon.git",
82 | "sudo chmod 755 -R XSSCon"
83 | ]
84 | PROJECT_URL = "https://github.com/menkrep1337/XSSCon"
85 |
86 | def run(self):
87 | website = input("Enter Website >> ")
88 | os.system("cd XSSCon;")
89 | subprocess.run(["python3", "xsscon.py", "-u", website])
90 |
91 |
92 | class XanXSS(HackingTool):
93 | TITLE = "XanXSS"
94 | DESCRIPTION = "XanXSS is a reflected XSS searching tool\n " \
95 | "that creates payloads based from templates"
96 | INSTALL_COMMANDS = ["git clone https://github.com/Ekultek/XanXSS.git"]
97 | PROJECT_URL = "https://github.com/Ekultek/XanXSS"
98 |
99 | def run(self):
100 | os.system("cd XanXSS ;python xanxss.py -h")
101 | print("\033[96m You Have to run it manually By Using\n"
102 | " [!]python xanxss.py [Options]")
103 |
104 |
105 | class XSSStrike(HackingTool):
106 | TITLE = "Advanced XSS Detection Suite"
107 | DESCRIPTION = "XSStrike is a python script designed to detect and exploit XSS vulnerabilites."
108 | INSTALL_COMMANDS = [
109 | "sudo rm -rf XSStrike",
110 | "git clone https://github.com/UltimateHackers/XSStrike.git "
111 | "&& cd XSStrike && pip install -r requirements.txt"
112 | ]
113 | PROJECT_URL = "https://github.com/UltimateHackers/XSStrike"
114 |
115 | def __init__(self):
116 | super(XSSStrike, self).__init__(runnable = False)
117 |
118 |
119 | class RVuln(HackingTool):
120 | TITLE = "RVuln"
121 | DESCRIPTION = "RVuln is multi-threaded and Automated Web Vulnerability " \
122 | "Scanner written in Rust"
123 | INSTALL_COMMANDS = [
124 | "sudo git clone https://github.com/iinc0gnit0/RVuln.git;"
125 | "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
126 | "source $HOME/.cargo/env;"
127 | "sudo apt install librust-openssl-dev;"
128 | "cd RVuln;sudo su;cargo build --release;mv target/release/RVuln"
129 | ]
130 | RUN_COMMANDS = ["RVuln"]
131 | PROJECT_URL = "https://github.com/iinc0gnit0/RVuln"
132 |
133 |
134 | class XSSAttackTools(HackingToolsCollection):
135 | TITLE = "XSS Attack Tools"
136 | TOOLS = [
137 | Dalfox(),
138 | XSSPayloadGenerator(),
139 | XSSFinder(),
140 | XSSFreak(),
141 | XSpear(),
142 | XSSCon(),
143 | XanXSS(),
144 | XSSStrike(),
145 | RVuln()
146 | ]
147 |
--------------------------------------------------------------------------------
/hackingtool.py:
--------------------------------------------------------------------------------
1 | ##!/usr/bin/env python3
2 | # -*- coding: UTF-8 -*-
3 | # Version 1.1.0
4 | import os
5 | import webbrowser
6 | from platform import system
7 | from time import sleep
8 |
9 | from core import HackingToolsCollection
10 | from tools.anonsurf import AnonSurfTools
11 | from tools.ddos import DDOSTools
12 | from tools.exploit_frameworks import ExploitFrameworkTools
13 | from tools.forensic_tools import ForensicTools
14 | from tools.information_gathering_tools import InformationGatheringTools
15 | from tools.other_tools import OtherTools
16 | from tools.payload_creator import PayloadCreatorTools
17 | from tools.phising_attack import PhishingAttackTools
18 | from tools.post_exploitation import PostExploitationTools
19 | from tools.remote_administration import RemoteAdministrationTools
20 | from tools.reverse_engineering import ReverseEngineeringTools
21 | from tools.sql_tools import SqlInjectionTools
22 | from tools.steganography import SteganographyTools
23 | from tools.tool_manager import ToolManager
24 | from tools.webattack import WebAttackTools
25 | from tools.wireless_attack_tools import WirelessAttackTools
26 | from tools.wordlist_generator import WordlistGeneratorTools
27 | from tools.xss_attack import XSSAttackTools
28 |
29 | logo = """\033[33m
30 | ▄█ █▄ ▄████████ ▄████████ ▄█ ▄█▄ ▄█ ███▄▄▄▄ ▄██████▄ ███ ▄██████▄ ▄██████▄ ▄█
31 | ███ ███ ███ ███ ███ ███ ███ ▄███▀ ███ ███▀▀▀██▄ ███ ███ ▀█████████▄ ███ ███ ███ ███ ███
32 | ███ ███ ███ ███ ███ █▀ ███▐██▀ ███▌ ███ ███ ███ █▀ ▀███▀▀██ ███ ███ ███ ███ ███
33 | ▄███▄▄▄▄███▄▄ ███ ███ ███ ▄█████▀ ███▌ ███ ███ ▄███ ███ ▀ ███ ███ ███ ███ ███
34 | ▀▀███▀▀▀▀███▀ ▀███████████ ███ ▀▀█████▄ ███▌ ███ ███ ▀▀███ ████▄ ███ ███ ███ ███ ███ ███
35 | ███ ███ ███ ███ ███ █▄ ███▐██▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███
36 | ███ ███ ███ ███ ███ ███ ███ ▀███▄ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███▌ ▄
37 | ███ █▀ ███ █▀ ████████▀ ███ ▀█▀ █▀ ▀█ █▀ ████████▀ ▄████▀ ▀██████▀ ▀██████▀ █████▄▄██
38 | ▀ ▀
39 | \033[34m[✔] https://github.com/Z4nzu/hackingtool [✔]
40 | \033[34m[✔] Version 1.1.0 [✔]
41 | \033[91m[X] Please Don't Use For illegal Activity [X]
42 | \033[97m """
43 |
44 | all_tools = [
45 | AnonSurfTools(),
46 | InformationGatheringTools(),
47 | WordlistGeneratorTools(),
48 | WirelessAttackTools(),
49 | SqlInjectionTools(),
50 | PhishingAttackTools(),
51 | WebAttackTools(),
52 | PostExploitationTools(),
53 | ForensicTools(),
54 | PayloadCreatorTools(),
55 | ExploitFrameworkTools(),
56 | ReverseEngineeringTools(),
57 | DDOSTools(),
58 | RemoteAdministrationTools(),
59 | XSSAttackTools(),
60 | SteganographyTools(),
61 | OtherTools(),
62 | ToolManager()
63 | ]
64 |
65 |
66 | class AllTools(HackingToolsCollection):
67 | TITLE = "All tools"
68 | TOOLS = all_tools
69 |
70 | def show_info(self):
71 | print(logo + '\033[0m \033[97m')
72 |
73 |
74 | if __name__ == "__main__":
75 | try:
76 | if system() == 'Linux':
77 | fpath = "/home/hackingtoolpath.txt"
78 | if not os.path.exists(fpath):
79 | os.system('clear')
80 | # run.menu()
81 | print("""
82 | [@] Set Path (All your tools will be installed in that directory)
83 | [1] Manual
84 | [2] Default
85 | """)
86 | choice = input("Z4nzu =>> ")
87 |
88 | if choice == "1":
89 | inpath = input("Enter Path (with Directory Name) >> ")
90 | with open(fpath, "w") as f:
91 | f.write(inpath)
92 | print(f"Successfully Set Path to: {inpath}")
93 | elif choice == "2":
94 | autopath = "/home/hackingtool/"
95 | with open(fpath, "w") as f:
96 | f.write(autopath)
97 | print(f"Your Default Path Is: {autopath}")
98 | sleep(3)
99 | else:
100 | print("Try Again..!!")
101 | exit(0)
102 |
103 | with open(fpath) as f:
104 | archive = f.readline()
105 | if not os.path.exists(archive):
106 | os.mkdir(archive)
107 | os.chdir(archive)
108 | all_tools = AllTools()
109 | all_tools.show_options()
110 |
111 | # If not Linux and probably Windows
112 | elif system() == "Windows":
113 | print(
114 | "\033[91m Please Run This Tool On A Debian System For Best Results " "\e[00m")
115 | sleep(2)
116 | webbrowser.open_new_tab("https://tinyurl.com/y522modc")
117 |
118 | else:
119 | print("Please Check Your System or Open New Issue ...")
120 |
121 | except KeyboardInterrupt:
122 | print("\nExiting ..!!!")
123 | sleep(2)
124 |
--------------------------------------------------------------------------------
/tools/payload_creator.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class TheFatRat(HackingTool):
9 | TITLE = "The FatRat"
10 | DESCRIPTION = "TheFatRat Provides An Easy way to create Backdoors and \n" \
11 | "Payload which can bypass most anti-virus"
12 | INSTALL_COMMANDS = [
13 | "sudo git clone https://github.com/Screetsec/TheFatRat.git",
14 | "cd TheFatRat && sudo chmod +x setup.sh"
15 | ]
16 | RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"]
17 | PROJECT_URL = "https://github.com/Screetsec/TheFatRat"
18 |
19 | def __init__(self):
20 | super(TheFatRat, self).__init__([
21 | ('Update', self.update),
22 | ('Troubleshoot', self.troubleshoot)
23 | ])
24 |
25 | def update(self):
26 | os.system(
27 | "cd TheFatRat && bash update && chmod +x setup.sh && bash setup.sh")
28 |
29 | def troubleshoot(self):
30 | os.system("cd TheFatRat && sudo chmod +x chk_tools && ./chk_tools")
31 |
32 |
33 | class Brutal(HackingTool):
34 | TITLE = "Brutal"
35 | DESCRIPTION = "Brutal is a toolkit to quickly create various payload," \
36 | "powershell attack,\nvirus attack and launch listener for " \
37 | "a Human Interface Device"
38 | INSTALL_COMMANDS = [
39 | "sudo git clone https://github.com/Screetsec/Brutal.git",
40 | "cd Brutal && sudo chmod +x Brutal.sh"
41 | ]
42 | RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"]
43 | PROJECT_URL = "https://github.com/Screetsec/Brutal"
44 |
45 | def show_info(self):
46 | super(Brutal, self).show_info()
47 | print("""
48 | [!] Requirement
49 | >> Arduino Software (I used v1.6.7)
50 | >> TeensyDuino
51 | >> Linux udev rules
52 | >> Copy and paste the PaensyLib folder inside your Arduino\libraries
53 |
54 | [!] Kindly Visit below link for Installation for Arduino
55 | >> https://github.com/Screetsec/Brutal/wiki/Install-Requirements
56 | """)
57 |
58 |
59 | class Stitch(HackingTool):
60 | TITLE = "Stitch"
61 | DESCRIPTION = "Stitch is Cross Platform Python Remote Administrator Tool\n\t" \
62 | "[!] Refer Below Link For Wins & MAc Os"
63 | INSTALL_COMMANDS = [
64 | "sudo git clone https://github.com/nathanlopez/Stitch.git",
65 | "cd Stitch && sudo pip install -r lnx_requirements.txt"
66 | ]
67 | RUN_COMMANDS = ["cd Stitch && sudo python main.py"]
68 | PROJECT_URL = "https://nathanlopez.github.io/Stitch"
69 |
70 |
71 | class MSFVenom(HackingTool):
72 | TITLE = "MSFvenom Payload Creator"
73 | DESCRIPTION = "MSFvenom Payload Creator (MSFPC) is a wrapper to generate \n" \
74 | "multiple types of payloads, based on users choice.\n" \
75 | "The idea is to be as simple as possible (only requiring " \
76 | "one input) \nto produce their payload."
77 | INSTALL_COMMANDS = [
78 | "sudo git clone https://github.com/g0tmi1k/msfpc.git",
79 | "cd msfpc;sudo chmod +x msfpc.sh"
80 | ]
81 | RUN_COMMANDS = ["cd msfpc;sudo bash msfpc.sh -h -v"]
82 | PROJECT_URL = "https://github.com/g0tmi1k/msfpc"
83 |
84 |
85 | class Venom(HackingTool):
86 | TITLE = "Venom Shellcode Generator"
87 | DESCRIPTION = "venom 1.0.11 (malicious_server) was build to take " \
88 | "advantage of \n apache2 webserver to deliver payloads " \
89 | "(LAN) using a fake webpage writen in html"
90 | INSTALL_COMMANDS = [
91 | "sudo git clone https://github.com/r00t-3xp10it/venom.git",
92 | "sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh",
93 | "sudo ./venom.sh -u"
94 | ]
95 | RUN_COMMANDS = ["cd venom && sudo ./venom.sh"]
96 | PROJECT_URL = "https://github.com/r00t-3xp10it/venom"
97 |
98 |
99 | class Spycam(HackingTool):
100 | TITLE = "Spycam"
101 | DESCRIPTION = "Script to generate a Win32 payload that takes the webcam " \
102 | "image every 1 minute and send it to the attacker"
103 | INSTALL_COMMANDS = [
104 | "sudo git clone https://github.com/indexnotfound404/spycam.git",
105 | "cd spycam && bash install.sh && chmod +x spycam"
106 | ]
107 | RUN_COMMANDS = ["cd spycam && ./spycam"]
108 | PROJECT_URL = "https://github.com/indexnotfound404/spycam"
109 |
110 |
111 | class MobDroid(HackingTool):
112 | TITLE = "Mob-Droid"
113 | DESCRIPTION = "Mob-Droid helps you to generate metasploit payloads in " \
114 | "easy way\n without typing long commands and save your time"
115 | INSTALL_COMMANDS = [
116 | "git clone https://github.com/kinghacker0/mob-droid.git"]
117 | RUN_COMMANDS = ["cd mob-droid;sudo python mob-droid.py"]
118 | PROJECT_URL = "https://github.com/kinghacker0/Mob-Droid"
119 |
120 |
121 | class Enigma(HackingTool):
122 | TITLE = "Enigma"
123 | DESCRIPTION = "Enigma is a Multiplatform payload dropper"
124 | INSTALL_COMMANDS = [
125 | "sudo git clone https://github.com/UndeadSec/Enigma.git"]
126 | RUN_COMMANDS = ["cd Enigma;sudo python enigma.py"]
127 | PROJECT_URL = "https://github.com/UndeadSec/Enigma"
128 |
129 |
130 | class PayloadCreatorTools(HackingToolsCollection):
131 | TITLE = "Payload creation tools"
132 | TOOLS = [
133 | TheFatRat(),
134 | Brutal(),
135 | Stitch(),
136 | MSFVenom(),
137 | Venom(),
138 | Spycam(),
139 | MobDroid(),
140 | Enigma()
141 | ]
142 |
--------------------------------------------------------------------------------
/tools/phising_attack.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class Setoolkit(HackingTool):
9 | TITLE = "Setoolkit"
10 | DESCRIPTION = "The Social-Engineer Toolkit is an open-source penetration\n" \
11 | "testing framework designed for social engineering"
12 | INSTALL_COMMANDS = [
13 | "git clone https://github.com/trustedsec/social-engineer-toolkit/",
14 | "cd social-engineer-toolkit && sudo python3 setup.py"
15 | ]
16 | RUN_COMMANDS = ["sudo setoolkit"]
17 | PROJECT_URL = "https://github.com/trustedsec/social-engineer-toolkit"
18 |
19 |
20 | class SocialFish(HackingTool):
21 | TITLE = "SocialFish"
22 | DESCRIPTION = "Automated Phishing Tool & Information Collector NOTE: username is 'root' and password is 'pass'"
23 | INSTALL_COMMANDS = [
24 | "sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y",
25 | "cd SocialFish && sudo python3 -m pip install -r requirements.txt"
26 | ]
27 | RUN_COMMANDS = ["cd SocialFish && sudo python3 SocialFish.py root pass"]
28 | PROJECT_URL = "https://github.com/UndeadSec/SocialFish"
29 |
30 |
31 | class HiddenEye(HackingTool):
32 | TITLE = "HiddenEye"
33 | DESCRIPTION = "Modern Phishing Tool With Advanced Functionality And " \
34 | "Multiple Tunnelling Services \n" \
35 | "\t [!]https://github.com/DarkSecDevelopers/HiddenEye"
36 | INSTALL_COMMANDS = [
37 | "sudo git clone https://github.com/DarkSecDevelopers/HiddenEye.git ;sudo chmod 777 HiddenEye",
38 | "cd HiddenEye;sudo pip3 install -r requirements.txt;sudo pip3 install requests;pip3 install pyngrok"
39 | ]
40 | RUN_COMMANDS = ["cd HiddenEye;sudo python3 HiddenEye.py"]
41 | PROJECT_URL = "https://github.com/DarkSecDevelopers/HiddenEye"
42 |
43 |
44 | class Evilginx2(HackingTool):
45 | TITLE = "Evilginx2"
46 | DESCRIPTION = "evilginx2 is a man-in-the-middle attack framework used " \
47 | "for phishing login credentials along with session cookies,\n" \
48 | "which in turn allows to bypass 2-factor authentication protection.\n\n\t " \
49 | "[+]Make sure you have installed GO of version at least 1.14.0 \n" \
50 | "[+]After installation, add this to your ~/.profile, assuming that you installed GO in /usr/local/go\n\t " \
51 | "[+]export GOPATH=$HOME/go \n " \
52 | "[+]export PATH=$PATH:/usr/local/go/bin:$GOPATH/bin \n" \
53 | "[+]Then load it with source ~/.profiles."
54 | INSTALL_COMMANDS = [
55 | "sudo apt-get install git make;go get -u github.com/kgretzky/evilginx2",
56 | "cd $GOPATH/src/github.com/kgretzky/evilginx2;make",
57 | "sudo make install;sudo evilginx"
58 | ]
59 | RUN_COMMANDS = ["sudo evilginx"]
60 | PROJECT_URL = "https://github.com/kgretzky/evilginx2"
61 |
62 |
63 | class ISeeYou(HackingTool):
64 | TITLE = "I-See_You(Get Location using phishing attack)"
65 | DESCRIPTION = "[!] ISeeYou is a tool to find Exact Location of Victom By" \
66 | " User SocialEngineering or Phishing Engagment..\n" \
67 | "[!] Users can expose their local servers to the Internet " \
68 | "and decode the location coordinates by looking at the log file"
69 | INSTALL_COMMANDS = [
70 | "sudo git clone https://github.com/Viralmaniar/I-See-You.git",
71 | "cd I-See-You && sudo chmod u+x ISeeYou.sh"
72 | ]
73 | RUN_COMMANDS = ["cd I-See-You && sudo bash ISeeYou.sh"]
74 | PROJECT_URL = "https://github.com/Viralmaniar/I-See-You"
75 |
76 |
77 | class SayCheese(HackingTool):
78 | TITLE = "SayCheese (Grab target's Webcam Shots)"
79 | DESCRIPTION = "Take webcam shots from target just sending a malicious link"
80 | INSTALL_COMMANDS = ["sudo git clone https://github.com/hangetzzu/saycheese"]
81 | RUN_COMMANDS = ["cd saycheese && sudo bash saycheese.sh"]
82 | PROJECT_URL = "https://github.com/hangetzzu/saycheese"
83 |
84 |
85 | class QRJacking(HackingTool):
86 | TITLE = "QR Code Jacking"
87 | DESCRIPTION = "QR Code Jacking (Any Website)"
88 | INSTALL_COMMANDS = [
89 | "sudo git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt -y install scrot"]
90 | RUN_COMMANDS = ["cd ohmyqr && sudo bash ohmyqr.sh"]
91 | PROJECT_URL = "https://github.com/cryptedwolf/ohmyqr"
92 |
93 |
94 | class ShellPhish(HackingTool):
95 | TITLE = "ShellPhish"
96 | DESCRIPTION = "Fhishing Tool for 18 social media"
97 | INSTALL_COMMANDS = ["git clone https://github.com/An0nUD4Y/shellphish.git"]
98 | RUN_COMMANDS = ["cd shellphish;sudo bash shellphish.sh"]
99 | PROJECT_URL = "https://github.com/An0nUD4Y/shellphish"
100 |
101 |
102 | class BlackPhish(HackingTool):
103 | TITLE = "BlackPhish"
104 | INSTALL_COMMANDS = [
105 | "sudo git clone https://github.com/iinc0gnit0/BlackPhish.git",
106 | "cd BlackPhish;sudo bash install.sh"
107 | ]
108 | RUN_COMMANDS = ["cd BlackPhish;sudo python3 blackphish.py"]
109 | PROJECT_URL = "https://github.com/iinc0gnit0/BlackPhish"
110 |
111 | def __init__(self):
112 | super(BlackPhish, self).__init__([('Update', self.update)])
113 |
114 | def update(self):
115 | os.system("cd BlackPhish;sudo bash update.sh")
116 |
117 |
118 | class PhishingAttackTools(HackingToolsCollection):
119 | TITLE = "Phishing attack tools"
120 | TOOLS = [
121 | Setoolkit(),
122 | SocialFish(),
123 | HiddenEye(),
124 | Evilginx2(),
125 | ISeeYou(),
126 | SayCheese(),
127 | QRJacking(),
128 | ShellPhish(),
129 | BlackPhish()
130 | ]
131 |
--------------------------------------------------------------------------------
/core.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import sys
4 | import webbrowser
5 | from platform import system
6 | from traceback import print_exc
7 | from typing import Any
8 | from typing import Callable
9 | from typing import List
10 | from typing import Tuple
11 |
12 |
13 | def clear_screen():
14 | if system() == "Linux":
15 | os.system("clear")
16 | if system() == "Windows":
17 | os.system("cls")
18 |
19 |
20 | def validate_input(ip, val_range):
21 | try:
22 | ip = int(ip)
23 | if ip in val_range:
24 | return ip
25 | else:
26 | return None
27 | except:
28 | return None
29 |
30 |
31 | class HackingTool(object):
32 | # About the HackingTool
33 | TITLE: str = "" # used to show info in the menu
34 | DESCRIPTION: str = ""
35 |
36 | INSTALL_COMMANDS: List[str] = []
37 | INSTALLATION_DIR: str = ""
38 |
39 | UNINSTALL_COMMANDS: List[str] = []
40 |
41 | RUN_COMMANDS: List[str] = []
42 |
43 | OPTIONS: List[Tuple[str, Callable]] = []
44 |
45 | PROJECT_URL: str = ""
46 |
47 | def __init__(self, options = None, installable: bool = True,
48 | runnable: bool = True):
49 | if options is None:
50 | options = []
51 | if isinstance(options, list):
52 | self.OPTIONS = []
53 | if installable:
54 | self.OPTIONS.append(('Install', self.install))
55 | if runnable:
56 | self.OPTIONS.append(('Run', self.run))
57 | self.OPTIONS.extend(options)
58 | else:
59 | raise Exception(
60 | "options must be a list of (option_name, option_fn) tuples")
61 |
62 | def show_info(self):
63 | desc = self.DESCRIPTION
64 | if self.PROJECT_URL:
65 | desc += '\n\t[*] '
66 | desc += self.PROJECT_URL
67 | os.system(f'echo "{desc}"|boxes -d boy | lolcat')
68 |
69 | def show_options(self, parent = None):
70 | clear_screen()
71 | self.show_info()
72 | for index, option in enumerate(self.OPTIONS):
73 | print(f"[{index + 1}] {option[0]}")
74 | if self.PROJECT_URL:
75 | print(f"[{98}] Open project page")
76 | print(f"[{99}] Back to {parent.TITLE if parent is not None else 'Exit'}")
77 | option_index = input("Select an option : ")
78 | try:
79 | option_index = int(option_index)
80 | if option_index - 1 in range(len(self.OPTIONS)):
81 | ret_code = self.OPTIONS[option_index - 1][1]()
82 | if ret_code != 99:
83 | input("\n\nPress ENTER to continue:")
84 | elif option_index == 98:
85 | self.show_project_page()
86 | elif option_index == 99:
87 | if parent is None:
88 | sys.exit()
89 | return 99
90 | except (TypeError, ValueError):
91 | print("Please enter a valid option")
92 | input("\n\nPress ENTER to continue:")
93 | except Exception:
94 | print_exc()
95 | input("\n\nPress ENTER to continue:")
96 | return self.show_options(parent = parent)
97 |
98 | def before_install(self):
99 | pass
100 |
101 | def install(self):
102 | self.before_install()
103 | if isinstance(self.INSTALL_COMMANDS, (list, tuple)):
104 | for INSTALL_COMMAND in self.INSTALL_COMMANDS:
105 | os.system(INSTALL_COMMAND)
106 | self.after_install()
107 |
108 | def after_install(self):
109 | print("Successfully installed!")
110 |
111 | def before_uninstall(self) -> bool:
112 | """ Ask for confirmation from the user and return """
113 | return True
114 |
115 | def uninstall(self):
116 | if self.before_uninstall():
117 | if isinstance(self.UNINSTALL_COMMANDS, (list, tuple)):
118 | for UNINSTALL_COMMAND in self.UNINSTALL_COMMANDS:
119 | os.system(UNINSTALL_COMMAND)
120 | self.after_uninstall()
121 |
122 | def after_uninstall(self):
123 | pass
124 |
125 | def before_run(self):
126 | pass
127 |
128 | def run(self):
129 | self.before_run()
130 | if isinstance(self.RUN_COMMANDS, (list, tuple)):
131 | for RUN_COMMAND in self.RUN_COMMANDS:
132 | os.system(RUN_COMMAND)
133 | self.after_run()
134 |
135 | def after_run(self):
136 | pass
137 |
138 | def is_installed(self, dir_to_check = None):
139 | print("Unimplemented: DO NOT USE")
140 | return "?"
141 |
142 | def show_project_page(self):
143 | webbrowser.open_new_tab(self.PROJECT_URL)
144 |
145 |
146 | class HackingToolsCollection(object):
147 | TITLE: str = "" # used to show info in the menu
148 | DESCRIPTION: str = ""
149 | TOOLS = [] # type: List[Any[HackingTool, HackingToolsCollection]]
150 |
151 | def __init__(self):
152 | pass
153 |
154 | def show_info(self):
155 | os.system("figlet -f standard -c {} | lolcat".format(self.TITLE))
156 | # os.system(f'echo "{self.DESCRIPTION}"|boxes -d boy | lolcat')
157 | # print(self.DESCRIPTION)
158 |
159 | def show_options(self, parent = None):
160 | clear_screen()
161 | self.show_info()
162 | for index, tool in enumerate(self.TOOLS):
163 | print(f"[{index} {tool.TITLE}")
164 | print(f"[{99}] Back to {parent.TITLE if parent is not None else 'Exit'}")
165 | tool_index = input("Choose a tool to proceed: ")
166 | try:
167 | tool_index = int(tool_index)
168 | if tool_index in range(len(self.TOOLS)):
169 | ret_code = self.TOOLS[tool_index].show_options(parent = self)
170 | if ret_code != 99:
171 | input("\n\nPress ENTER to continue:")
172 | elif tool_index == 99:
173 | if parent is None:
174 | sys.exit()
175 | return 99
176 | except (TypeError, ValueError):
177 | print("Please enter a valid option")
178 | input("\n\nPress ENTER to continue:")
179 | except Exception as e:
180 | print_exc()
181 | input("\n\nPress ENTER to continue:")
182 | return self.show_options(parent = parent)
183 |
--------------------------------------------------------------------------------
/tools/wireless_attack_tools.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 |
4 | from core import HackingTool
5 | from core import HackingToolsCollection
6 |
7 |
8 | class WIFIPumpkin(HackingTool):
9 | TITLE = "WiFi-Pumpkin"
10 | DESCRIPTION = "The WiFi-Pumpkin is a rogue AP framework to easily create " \
11 | "these fake networks\n" \
12 | "all while forwarding legitimate traffic to and from the " \
13 | "unsuspecting target."
14 | INSTALL_COMMANDS = [
15 | "sudo apt install libssl-dev libffi-dev build-essential",
16 | "sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
17 | "chmod -R 755 wifipumpkin3",
18 | "sudo apt install python3-pyqt5",
19 | "cd wifipumpkin3;sudo python3 setup.py install"
20 | ]
21 | RUN_COMMANDS = ["sudo wifipumpkin3"]
22 | PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
23 |
24 |
25 | class pixiewps(HackingTool):
26 | TITLE = "pixiewps"
27 | DESCRIPTION = "Pixiewps is a tool written in C used to bruteforce offline " \
28 | "the WPS pin\n " \
29 | "exploiting the low or non-existing entropy of some Access " \
30 | "Points, the so-called pixie dust attack"
31 | INSTALL_COMMANDS = [
32 | "sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
33 | "cd pixiewps*/ && make",
34 | "cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh"
35 | ]
36 | PROJECT_URL = "https://github.com/wiire/pixiewps"
37 |
38 | def run(self):
39 | os.system(
40 | 'echo "'
41 | '1.> Put your interface into monitor mode using '
42 | '\'airmon-ng start {wireless interface}\n'
43 | '2.> wash -i {monitor-interface like mon0}\'\n'
44 | '3.> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f"'
45 | '| boxes -d boy')
46 | print("You Have To Run Manually By USing >>pixiewps -h ")
47 |
48 |
49 | class BluePot(HackingTool):
50 | TITLE = "Bluetooth Honeypot GUI Framework"
51 | DESCRIPTION = "You need to have at least 1 bluetooh receiver " \
52 | "(if you have many it will work with those, too).\n" \
53 | "You must install/libbluetooth-dev on " \
54 | "Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
55 | INSTALL_COMMANDS = [
56 | "sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz"
57 | "sudo tar xfz bluepot-0.2.tar.gz;sudo rm bluepot-0.2.tar.gz"
58 | ]
59 | RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
60 | PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
61 |
62 |
63 | class Fluxion(HackingTool):
64 | TITLE = "Fluxion"
65 | DESCRIPTION = "Fluxion is a remake of linset by vk496 with enhanced functionality."
66 | INSTALL_COMMANDS = [
67 | "git clone https://github.com/FluxionNetwork/fluxion.git",
68 | "cd fluxion && sudo chmod +x fluxion.sh",
69 | ]
70 | RUN_COMMANDS = ["cd fluxion;sudo bash fluxion.sh -i"]
71 | PROJECT_URL = "https://github.com/FluxionNetwork/fluxion"
72 |
73 |
74 | class Wifiphisher(HackingTool):
75 | TITLE = "Wifiphisher"
76 | DESCRIPTION = """
77 | Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
78 | Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
79 | targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
80 | connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
81 | victim stations with malware..\n
82 | For More Details Visit >> https://github.com/wifiphisher/wifiphisher
83 | """
84 | INSTALL_COMMANDS = [
85 | "git clone https://github.com/wifiphisher/wifiphisher.git",
86 | "cd wifiphisher;sudo python3 setup.py install"
87 | ]
88 | RUN_COMMANDS = ["cd wifiphisher;sudo wifiphisher"]
89 | PROJECT_URL = "https://github.com/wifiphisher/wifiphisher"
90 |
91 |
92 | class Wifite(HackingTool):
93 | TITLE = "Wifite"
94 | DESCRIPTION = "Wifite is an automated wireless attack tool"
95 | INSTALL_COMMANDS = [
96 | "sudo git clone https://github.com/derv82/wifite2.git",
97 | "cd wifite2 && sudo python3 setup.py install"
98 | ]
99 | RUN_COMMANDS = ["cd wifite2; sudo wifite"]
100 | PROJECT_URL = "https://github.com/derv82/wifite2"
101 |
102 |
103 | class EvilTwin(HackingTool):
104 | TITLE = "EvilTwin"
105 | DESCRIPTION = "Fakeap is a script to perform Evil Twin Attack, by getting" \
106 | " credentials using a Fake page and Fake Access Point"
107 | INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"]
108 | RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
109 | PROJECT_URL = "https://github.com/Z4nzu/fakeap"
110 |
111 |
112 | class Fastssh(HackingTool):
113 | TITLE = "Fastssh"
114 | DESCRIPTION = "Fastssh is an Shell Script to perform multi-threaded scan" \
115 | " \n and brute force attack against SSH protocol using the " \
116 | "most commonly credentials."
117 | INSTALL_COMMANDS = [
118 | "sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && sudo chmod +x fastssh.sh",
119 | "sudo apt-get install -y sshpass netcat"
120 | ]
121 | RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
122 | PROJECT_URL = "https://github.com/Z4nzu/fastssh"
123 |
124 |
125 | class Howmanypeople(HackingTool):
126 | TITLE = "Howmanypeople"
127 | DESCRIPTION = "Count the number of people around you by monitoring wifi " \
128 | "signals.\n" \
129 | "[@] WIFI ADAPTER REQUIRED* \n[*]" \
130 | "It may be illegal to monitor networks for MAC addresses, \n" \
131 | "especially on networks that you do not own. " \
132 | "Please check your country's laws"
133 | INSTALL_COMMANDS = [
134 | "sudo apt-get install tshark"
135 | ";sudo python3 -m pip install howmanypeoplearearound"
136 | ]
137 | RUN_COMMANDS = ["howmanypeoplearearound"]
138 |
139 |
140 | class WirelessAttackTools(HackingToolsCollection):
141 | TITLE = "Wireless attack tools"
142 | DESCRIPTION = ""
143 | TOOLS = [
144 | WIFIPumpkin(),
145 | pixiewps(),
146 | BluePot(),
147 | Fluxion(),
148 | Wifiphisher(),
149 | Wifite(),
150 | EvilTwin(),
151 | Fastssh(),
152 | Howmanypeople()
153 | ]
154 |
--------------------------------------------------------------------------------
/tools/information_gathering_tools.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | import os
3 | import socket
4 | import subprocess
5 | import webbrowser
6 |
7 | from core import HackingTool
8 | from core import HackingToolsCollection
9 | from core import clear_screen
10 |
11 |
12 | class NMAP(HackingTool):
13 | TITLE = "Network Map (nmap)"
14 | DESCRIPTION = "Free and open source utility for network discovery and security auditing"
15 | INSTALL_COMMANDS = [
16 | "sudo git clone https://github.com/nmap/nmap.git",
17 | "sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
18 | ]
19 | PROJECT_URL = "https://github.com/nmap/nmap"
20 |
21 | def __init__(self):
22 | super(NMAP, self).__init__(runnable = False)
23 |
24 |
25 | class Dracnmap(HackingTool):
26 | TITLE = "Dracnmap"
27 | DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
28 | "exploit the network and gathering information with nmap help."
29 | INSTALL_COMMANDS = [
30 | "sudo git clone https://github.com/Screetsec/Dracnmap.git",
31 | "cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
32 | ]
33 | RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
34 | PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
35 |
36 | # def __init__(self):
37 | # super(Dracnmap, self).__init__(runnable = False)
38 |
39 |
40 | class PortScan(HackingTool):
41 | TITLE = "Port scanning"
42 |
43 | def __init__(self):
44 | super(PortScan, self).__init__(installable = False)
45 |
46 | def run(self):
47 | clear_screen()
48 | target = input('Select a Target IP: ')
49 | subprocess.run(["sudo", "nmap", "-O", "-Pn", target])
50 |
51 |
52 | class Host2IP(HackingTool):
53 | TITLE = "Host to IP "
54 |
55 | def __init__(self):
56 | super(Host2IP, self).__init__(installable = False)
57 |
58 | def run(self):
59 | clear_screen()
60 | host = input("Enter host name (e.g. www.google.com):- ")
61 | ips = socket.gethostbyname(host)
62 | print(ips)
63 |
64 |
65 | class XeroSploit(HackingTool):
66 | TITLE = "Xerosploit"
67 | DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \
68 | "man-in-the-middle attacks for testing purposes"
69 | INSTALL_COMMANDS = [
70 | "git clone https://github.com/LionSec/xerosploit.git",
71 | "cd xerosploit && sudo python install.py"
72 | ]
73 | RUN_COMMANDS = ["sudo xerosploit"]
74 | PROJECT_URL = "https://github.com/LionSec/xerosploit"
75 |
76 |
77 | class RedHawk(HackingTool):
78 | TITLE = "RED HAWK (All In One Scanning)"
79 | DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."
80 | INSTALL_COMMANDS = [
81 | "git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]
82 | RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]
83 | PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"
84 |
85 |
86 | class ReconSpider(HackingTool):
87 | TITLE = "ReconSpider(For All Scaning)"
88 | DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \
89 | " Framework for scanning IP Address, Emails, \n" \
90 | "Websites, Organizations and find out information from" \
91 | " different sources.\n"
92 | INSTALL_COMMANDS = [
93 | "sudo git clone https://github.com/bhavsec/reconspider.git",
94 | "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
95 | ]
96 | RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
97 | PROJECT_URL = "https://github.com/bhavsec/reconspider"
98 |
99 | # def __init__(self):
100 | # super(ReconSpider, self).__init__(runnable = False)
101 |
102 |
103 | class IsItDown(HackingTool):
104 | TITLE = "IsItDown (Check Website Down/Up)"
105 | DESCRIPTION = "Check Website Is Online or Not"
106 |
107 | def __init__(self):
108 | super(IsItDown, self).__init__(
109 | [('Open', self.open)], installable = False, runnable = False)
110 |
111 | def open(self):
112 | webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
113 |
114 |
115 | class Infoga(HackingTool):
116 | TITLE = "Infoga - Email OSINT"
117 | DESCRIPTION = "Infoga is a tool gathering email accounts informations\n" \
118 | "(ip, hostname, country,...) from different public source"
119 | INSTALL_COMMANDS = [
120 | "git clone https://github.com/m4ll0k/Infoga.git",
121 | "cd Infoga;sudo python3 setup.py install"
122 | ]
123 | RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
124 | PROJECT_URL = "https://github.com/m4ll0k/Infoga"
125 |
126 |
127 | class ReconDog(HackingTool):
128 | TITLE = "ReconDog"
129 | DESCRIPTION = "ReconDog Information Gathering Suite"
130 | INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]
131 | RUN_COMMANDS = ["cd ReconDog;sudo python dog"]
132 | PROJECT_URL = "https://github.com/s0md3v/ReconDog"
133 |
134 |
135 | class Striker(HackingTool):
136 | TITLE = "Striker"
137 | DESCRIPTION = "Recon & Vulnerability Scanning Suite"
138 | INSTALL_COMMANDS = [
139 | "git clone https://github.com/s0md3v/Striker.git",
140 | "cd Striker && pip3 install -r requirements.txt"
141 | ]
142 | PROJECT_URL = "https://github.com/s0md3v/Striker"
143 |
144 | def run(self):
145 | site = input("Enter Site Name (example.com) >> ")
146 | os.chdir("Striker")
147 | subprocess.run(["sudo", "python3", "striker.py", site])
148 |
149 |
150 | class SecretFinder(HackingTool):
151 | TITLE = "SecretFinder (like API & etc)"
152 | DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \
153 | "like apikeys, accesstoken, authorizations, jwt,..etc \n " \
154 | "and search anything on javascript files.\n\n " \
155 | "Usage: python SecretFinder.py -h"
156 | INSTALL_COMMANDS = [
157 | "git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",
158 | "cd secretfinder; sudo pip3 install -r requirements.txt"
159 | ]
160 | PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"
161 |
162 | def __init__(self):
163 | super(SecretFinder, self).__init__(runnable = False)
164 |
165 |
166 | class Shodan(HackingTool):
167 | TITLE = "Find Info Using Shodan"
168 | DESCRIPTION = "Get ports, vulnerabilities, informations, banners,..etc \n " \
169 | "for any IP with Shodan (no apikey! no rate limit!)\n" \
170 | "[X] Don't use this tool because your ip will be blocked by Shodan!"
171 | INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]
172 | PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"
173 |
174 | def __init__(self):
175 | super(Shodan, self).__init__(runnable = False)
176 |
177 |
178 | class PortScannerRanger(HackingTool):
179 | TITLE = "Port Scanner - rang3r"
180 | DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \
181 | "all alive hosts within your range that you specify."
182 | INSTALL_COMMANDS = [
183 | "git clone https://github.com/floriankunushevci/rang3r.git;"
184 | "sudo pip install termcolor"]
185 | PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
186 |
187 | def run(self):
188 | ip = input("Enter Ip >> ")
189 | os.chdir("rang3r")
190 | subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
191 |
192 |
193 | class Breacher(HackingTool):
194 | TITLE = "Breacher"
195 | DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
196 | INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
197 | PROJECT_URL = "https://github.com/s0md3v/Breacher"
198 |
199 | def run(self):
200 | domain = input("Enter domain (example.com) >> ")
201 | os.chdir("Breacher")
202 | subprocess.run(["python3", "breacher.py", "-u", domain])
203 |
204 | class InformationGatheringTools(HackingToolsCollection):
205 | TITLE = "Information gathering tools"
206 | TOOLS = [
207 | NMAP(),
208 | Dracnmap(),
209 | PortScan(),
210 | Host2IP(),
211 | XeroSploit(),
212 | RedHawk(),
213 | ReconSpider(),
214 | IsItDown(),
215 | Infoga(),
216 | ReconDog(),
217 | Striker(),
218 | SecretFinder(),
219 | Shodan(),
220 | PortScannerRanger(),
221 | Breacher()
222 | ]
223 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | ### All in One Hacking tool For Hackers🥇
2 | 
3 | 
4 | 
5 | 
6 | 
7 | 
8 | 
9 | [](http://hits.dwyl.com/Z4nzu/hackingtool)
10 | 
11 |
12 | #### Install Kali Linux in WIndows10 Without VirtualBox [YOUTUBE](https://youtu.be/BsFhpIDcd9I)
13 |
14 | ## Update Available V1.1.0 🚀
15 | - [x] Added New Tools
16 | - [x] Reverse Engineering
17 | - [x] RAT Tools
18 | - [x] Web Crawling
19 | - [x] Payload Injector
20 | - [x] Multitor Tools update
21 | - [X] Added Tool in wifijamming
22 |
23 |
24 | # Hackingtool Menu 🧰
25 | - [Anonymously Hiding Tools](#anonymously-hiding-tools)
26 | - [Information gathering tools](#information-gathering-tools)
27 | - [Wordlist Generator](#wordlist-generator)
28 | - [Wireless attack tools](#wireless-attack-tools)
29 | - [SQL Injection Tools](#sql-injection-tools)
30 | - [Phishing attack tools](#phishing-attack-tools)
31 | - [Web Attack tools](#web-attack-tools)
32 | - [Post exploitation tools](#post-exploitation-tools)
33 | - [Forensic tools](#forensic-tools)
34 | - [Payload creation tools](#payload-creation-tools)
35 | - [Exploit framework](#exploit-framework)
36 | - [Reverse engineering tools](#reverse-engineering-tools)
37 | - [DDOS Attack Tools](#ddos-attack-tools)
38 | - [Remote Administrator Tools (RAT)](#remote-administrator-tools--rat-)
39 | - [XSS Attack Tools](#xss-attack-tools)
40 | - [Steganograhy tools](#steganograhy-tools)
41 | - [Other tools](#other-tools)
42 | - [SocialMedia Bruteforce](#socialmedia-bruteforce)
43 | - [Android Hacking tools](#android-hacking-tools)
44 | - [IDN Homograph Attack](#idn-homograph-attack)
45 | - [Email Verify tools](#email-verify-tools)
46 | - [Hash cracking tools](#hash-cracking-tools)
47 | - [Wifi Deauthenticate](#wifi-deauthenticate)
48 | - [SocialMedia Finder](#socialmedia-finder)
49 | - [Payload Injector](#payload-injector)
50 | - [Web crawling](#web-crawling)
51 | - [Mix tools](#mix-tools)
52 |
53 |
54 | ### Anonymously Hiding Tools
55 | - [Anonmously Surf](https://github.com/Und3rf10w/kali-anonsurf)
56 | - [Multitor](https://github.com/trimstray/multitor)
57 | ### Information gathering tools
58 | - [Network Map (nmap)](https://github.com/nmap/nmap)
59 | - [Dracnmap](https://github.com/Screetsec/Dracnmap)
60 | - Port scanning
61 | - Host to IP
62 | - [Xerosploit](https://github.com/LionSec/xerosploit)
63 | - [RED HAWK (All In One Scanning)](https://github.com/Tuhinshubhra/RED_HAWK)
64 | - [ReconSpider(For All Scaning)](https://github.com/bhavsec/reconspider)
65 | - IsItDown (Check Website Down/Up)
66 | - [Infoga - Email OSINT](https://github.com/m4ll0k/Infoga)
67 | - [ReconDog](https://github.com/s0md3v/ReconDog)
68 | - [Striker](https://github.com/s0md3v/Striker)
69 | - [SecretFinder (like API & etc)](https://github.com/m4ll0k/SecretFinder)
70 | - [Find Info Using Shodan](https://github.com/m4ll0k/Shodanfy.py)
71 | - [Port Scanner - rang3r](https://github.com/floriankunushevci/rang3r)
72 | - [Breacher](https://github.com/s0md3v/Breacher)
73 | ### Wordlist Generator
74 | - [Cupp](https://github.com/Mebus/cupp.git)
75 | - [WordlistCreator](https://github.com/Z4nzu/wlcreator)
76 | - [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)
77 | - [Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
78 | ### Wireless attack tools
79 | - [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3)
80 | - [pixiewps](https://github.com/wiire/pixiewps)
81 | - [Bluetooth Honeypot GUI Framework](https://github.com/andrewmichaelsmith/bluepot)
82 | - [Fluxion](https://github.com/thehackingsage/Fluxion)
83 | - [Wifiphisher](https://github.com/wifiphisher/wifiphisher)
84 | - [Wifite](https://github.com/derv82/wifite2)
85 | - [EvilTwin](https://github.com/Z4nzu/fakeap)
86 | - [Fastssh](https://github.com/Z4nzu/fastssh)
87 | - Howmanypeople
88 | ### SQL Injection Tools
89 | - [Sqlmap tool](https://github.com/sqlmapproject/sqlmap)
90 | - [NoSqlMap](https://github.com/codingo/NoSQLMap)
91 | - [Damn Small SQLi Scanner](https://github.com/stamparm/DSSS)
92 | - [Explo](https://github.com/dtag-dev-sec/explo)
93 | - [Blisqy - Exploit Time-based blind-SQL injection](https://github.com/JohnTroony/Blisqy)
94 | - [Leviathan - Wide Range Mass Audit Toolkit](https://github.com/leviathan-framework/leviathan)
95 | - [SQLScan](https://github.com/Cvar1984/sqlscan)
96 | ### Phishing attack tools
97 | - [Setoolkit](https://github.com/trustedsec/social-engineer-toolkit)
98 | - [SocialFish](https://github.com/UndeadSec/SocialFish)
99 | - [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye)
100 | - [Evilginx2](https://github.com/kgretzky/evilginx2)
101 | - [I-See_You(Get Location using phishing attack)](https://github.com/Viralmaniar/I-See-You)
102 | - [SayCheese (Grab target's Webcam Shots)](https://github.com/hangetzzu/saycheese)
103 | - [QR Code Jacking](https://github.com/cryptedwolf/ohmyqr)
104 | - [ShellPhish](https://github.com/An0nUD4Y/shellphish)
105 | - [BlackPhish](https://github.com/iinc0gnit0/BlackPhish)
106 | ### Web Attack tools
107 | - [Web2Attack](https://github.com/santatic/web2attack)
108 | - Skipfish
109 | - [SubDomain Finder](https://github.com/aboul3la/Sublist3r)
110 | - [CheckURL](https://github.com/UndeadSec/checkURL)
111 | - [Blazy(Also Find ClickJacking)](https://github.com/UltimateHackers/Blazy)
112 | - [Sub-Domain TakeOver](https://github.com/m4ll0k/takeover)
113 | - [Dirb](https://gitlab.com/kalilinux/packages/dirb)
114 | ### Post exploitation tools
115 | - [Vegile - Ghost In The Shell](https://github.com/Screetsec/Vegile)
116 | - [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger)
117 | ### Forensic tools
118 | - Autopsy
119 | - Wireshark
120 | - [Bulk extractor](https://github.com/simsong/bulk_extractor)
121 | - [Disk Clone and ISO Image Aquire](https://guymager.sourceforge.io/)
122 | - [Toolsley](https://www.toolsley.com/)
123 | ### Payload creation tools
124 | - [The FatRat](https://github.com/Screetsec/TheFatRat)
125 | - [Brutal](https://github.com/Screetsec/Brutal)
126 | - [Stitch](https://nathanlopez.github.io/Stitch)
127 | - [MSFvenom Payload Creator](https://github.com/g0tmi1k/msfpc)
128 | - [Venom Shellcode Generator](https://github.com/r00t-3xp10it/venom)
129 | - [Spycam](https://github.com/thelinuxchoice/spycam)
130 | - [Mob-Droid](https://github.com/kinghacker0/Mob-Droid)
131 | - [Enigma](https://github.com/UndeadSec/Enigma)
132 | ### Exploit framework
133 | - [RouterSploit](https://github.com/threat9/routersploit)
134 | - [WebSploit](https://github.com/The404Hacking/websploit )
135 | - [Commix](https://github.com/commixproject/commix)
136 | - [Web2Attack](https://github.com/santatic/web2attack)
137 | ### Reverse engineering tools
138 | - [Androguard](https://github.com/androguard/androguard )
139 | - [Apk2Gold](https://github.com/lxdvs/apk2gold )
140 | - [JadX](https://github.com/skylot/jadx)
141 | ### DDOS Attack Tools
142 | - SlowLoris
143 | - [Asyncrone | Multifunction SYN Flood DDoS Weapon](https://github.com/fatihsnsy/aSYNcrone)
144 | - [UFOnet](https://github.com/epsylon/ufonet)
145 | - [GoldenEye](https://github.com/jseidl/GoldenEye)
146 | ### Remote Administrator Tools (RAT)
147 | - [Stitch](https://github.com/nathanlopez/Stitch)
148 | - [Pyshell](https://github.com/knassar702/pyshell)
149 | ### XSS Attack Tools
150 | - [DalFox(Finder of XSS)](https://github.com/hahwul/dalfox)
151 | - [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER.git)
152 | - [Extended XSS Searcher and Finder](https://github.com/Damian89/extended-xss-search)
153 | - [XSS-Freak](https://github.com/PR0PH3CY33/XSS-Freak)
154 | - [XSpear](https://github.com/hahwul/XSpear)
155 | - [XSSCon](https://github.com/menkrep1337/XSSCon)
156 | - [XanXSS](https://github.com/Ekultek/XanXSS)
157 | - [Advanced XSS Detection Suite](https://github.com/UltimateHackers/XSStrike)
158 | - [RVuln](https://github.com/iinc0gnit0/RVuln)
159 | ### Steganograhy tools
160 | - SteganoHide
161 | - StegnoCracker
162 | - [Whitespace](https://github.com/beardog108/snow10)
163 | ### Other tools
164 | #### SocialMedia Bruteforce
165 | - [Instagram Attack](https://github.com/chinoogawa/instaBrute)
166 | - [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force)
167 | - [Facebook Attack](https://github.com/Matrix07ksa/Brute_Force)
168 | - [Application Checker](https://github.com/jakuta-tech/underhanded)
169 | #### Android Hacking tools
170 | - [Keydroid](https://github.com/F4dl0/keydroid)
171 | - [MySMS](https://github.com/papusingh2sms/mysms)
172 | - [Lockphish (Grab target LOCK PIN)](https://github.com/JasonJerry/lockphish)
173 | - [DroidCam (Capture Image)](https://github.com/kinghacker0/WishFish)
174 | - [EvilApp (Hijack Session)](https://github.com/crypticterminal/EvilApp)
175 | - [HatCloud(Bypass CloudFlare for IP)](https://github.com/HatBashBR/HatCloud)
176 | #### IDN Homograph Attack
177 | - [EvilURL](https://github.com/UndeadSec/EvilURL)
178 | #### Email Verify tools
179 | - [Knockmail](https://github.com/4w4k3/KnockMail)
180 | #### Hash cracking tools
181 | - [Hash Buster](https://github.com/s0md3v/Hash-Buster)
182 | #### Wifi Deauthenticate
183 | - [WifiJammer-NG](https://github.com/MisterBianco/wifijammer-ng)
184 | - [KawaiiDeauther](https://github.com/aryanrtm/KawaiiDeauther)
185 | #### SocialMedia Finder
186 | - [Find SocialMedia By Facial Recognation System](https://github.com/Greenwolf/social_mapper)
187 | - [Find SocialMedia By UserName](https://github.com/xHak9x/finduser)
188 | - [Sherlock](https://github.com/sherlock-project/sherlock)
189 | - [SocialScan | Username or Email](https://github.com/iojw/socialscan)
190 | #### Payload Injector
191 | - [Debinject](https://github.com/UndeadSec/Debinject)
192 | - [Pixload](https://github.com/chinarulezzz/pixload)
193 | #### Web crawling
194 | - [Gospider](https://github.com/jaeles-project/gospider)
195 | #### Mix tools
196 | - Terminal Multiplexer
197 |
198 |
199 | 
200 | 
201 | 
202 | 
203 | 
204 |
205 | ## Installation For Linux 
206 |
207 | #### This Tool Must Run As ROOT !!!
208 |
209 | git clone https://github.com/Z4nzu/hackingtool.git
210 |
211 | chmod -R 755 hackingtool
212 |
213 | cd hackingtool
214 |
215 | sudo pip3 install -r requirement.txt
216 |
217 | bash install.sh
218 |
219 | sudo hackingtool
220 |
221 | After Following All Steps Just Type In Terminal **root@kaliLinux:~** **hackingtool**
222 |
223 | #### Thanks to original Author of the tools used in hackingtool
224 |
225 |
226 |
Please Don't Use for illegal Activity
227 |
228 | ### To do
229 | - [ ] Release Tool
230 | - [ ] Add Tools for CTF
231 | - [ ] Want to do automatic
232 |
233 | ## Social Media :mailbox_with_no_mail:
234 | [](https://twitter.com/_Zinzu07)
235 | [](https://github.com/Z4nzu/)
236 | ##### Your Favourite Tool is not in hackingtool or Suggestions Please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8)
237 | 
238 |
239 |
240 |
241 | #### Don't Forgot to share with Your Friends
242 | ### The new Update get will soon stay updated
243 | #### Thank you..!!
244 |
--------------------------------------------------------------------------------