├── .gitignore
├── src
├── .Hack4Squad.sh.swp
└── nmap
│ └── portscanner.py
├── website
└── public
│ └── banner.png
├── LICENSE
├── README.md
├── install.sh
└── H4S.sh
/.gitignore:
--------------------------------------------------------------------------------
1 | .*.swp
2 | __pycache__
3 | .swp
4 | ^.swp
5 | ^swp
6 |
--------------------------------------------------------------------------------
/src/.Hack4Squad.sh.swp:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elfalehed/hack4squad/HEAD/src/.Hack4Squad.sh.swp
--------------------------------------------------------------------------------
/website/public/banner.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/elfalehed/hack4squad/HEAD/website/public/banner.png
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2020 Mohamed Elfaleh
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # :skull: Hack4Squad [](https://github.com/dwyl/esta/issues) [](https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&logo=linux&logoColor=black)
2 |
3 | A bash hacking utility
4 |
5 | ---
6 |
7 | Hack4Squad is a collection for Hacking Tools (Bash and Python based) :computer:
8 |
9 |
10 |
11 |
12 | ---
13 |
14 | # Tools
15 |
16 | 1. Reconnaissance
17 | - Dirsearch
18 | - Nmap
19 | - Lynis
20 | - Wascan
21 | - Airgeddon
22 | - Scant3r
23 | 2. Exploitation
24 | - Airgeddon
25 | - PasteJacker
26 | 3. OSINT
27 | - Sherlock
28 | - Photon
29 |
30 | And more tools to be added soon.
31 |
32 | # 1. Requirements
33 |
34 | Please make sure these packages below are installed;
35 |
36 | - [Git](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git)
37 | - [Python 3](https://docs.python-guide.org/starting/install3/linux/)
38 | - [Pip](https://pip.pypa.io/en/stable/installing/)
39 |
40 | # 2. Installation
41 |
42 | - Note that this script must be run as root.
43 |
44 | ```Shell
45 | $ chmod +x install.sh
46 | $ sudo ./install.sh
47 | ```
48 |
49 | # 3. Execution
50 |
51 | ```Shell
52 | $ chmod +x Hack4Squad.sh
53 | $ ./Hack4Squad.sh
54 | ```
55 |
56 | ---
57 |
58 | # Status:
59 |
60 |  **_In progress..._**
61 |
62 | ## 2DO:
63 |
64 | - Fix the installation
65 | - Fix the prompts configuration
66 |
67 |
68 |
--------------------------------------------------------------------------------
/src/nmap/portscanner.py:
--------------------------------------------------------------------------------
1 | #! /usr/bin/env python3
2 | # Hack4Squad -- KMx404
3 |
4 | import socket
5 | from datetime import datetime
6 | import os
7 | import subprocess
8 |
9 | #Clear secreen
10 |
11 | subprocess.call('clear',shell=True)
12 |
13 | #data inputs
14 |
15 | Server_host=socket.gethostname()
16 | Server_Ip=socket.gethostbyname(Server_host)
17 |
18 | print("-"*84)
19 | print("")
20 | print(" Scanning Remote Ip : "+Server_Ip)
21 | print("")
22 | print("-"*84)
23 |
24 | # Check what time did the scan start
25 |
26 | t1=datetime.now()
27 |
28 |
29 | # Error handling
30 |
31 | try :
32 | for port in range(1,1025) :
33 | sock=socket.socket()
34 | result=sock.connect_ex((Server_Ip,port))
35 |
36 | #this fuction will return 0 if the port is open
37 |
38 | if result== 0 :
39 | print("port{} =====> Is Open ".format(port))
40 | else :
41 | print("port{} =====> Is Closed ".format(port))
42 | sock.close()
43 | except KeyboardInterrupt :
44 | print("Exiting ..............")
45 | sys.exit()
46 | except socket.gaierror :
47 | print("Socket Name Can not resolved ")
48 | print("")
49 | print("Exiting ..............")
50 | sys.exit()
51 | except socket.error :
52 | print("Can't Connet To Server ")
53 | sys.exit()
54 | #Check time again
55 | t2=datetime.now()
56 | #total time of running this script
57 | time=t2-t1
58 | print("")
59 | print(" [ "+" Hack4Squad "*3+" ] ")
60 | print("")
61 | print(" Script Run For ===> {} S".format(time))
62 | print("")
63 | print("")
64 | print(" [ "+" Hack4Squad "*3+" ] ")
65 |
66 |
67 |
68 |
69 |
--------------------------------------------------------------------------------
/install.sh:
--------------------------------------------------------------------------------
1 | #! /bin/bash
2 |
3 | # Testing if ran as sudo && have pip3 installed
4 |
5 | if ! [ -x "$(command -v pip3)" ] || ! [ -x "$(command -v git)" ]; then
6 | echo 'Please update/install pip3/git to the latest version.'
7 | exit 1
8 | else
9 | if [ $USER != 'root' ]; then
10 | echo 'You must be root'
11 | exit 1
12 | else
13 | # There should be a command to install each required tool
14 | # KMx404 - Hack4Squad
15 | clear
16 | echo -e "\e[33m [installing the needed requirements] "
17 | echo ' '
18 | echo -e "\e[33m [Airgeddon]"
19 | git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git &>/dev/null
20 | cd airgeddon
21 | bash airgeddon.sh &>/dev/null
22 | echo " Installation Completed"
23 | echo ' '
24 | echo -e "\e[33m [WAScan]"
25 | git clone https://github.com/m4ll0k/WAScan.git &>/dev/null
26 | cd wascan
27 | pip3 install BeautifulSoup &>/dev/null
28 | cd ..
29 | echo ' '
30 | echo " Installation Completed"
31 | echo ''
32 | echo -e "\e[33m [Scant3r]"
33 | git clone https://github.com/knassar702/scant3r.git &>/dev/null
34 | cd scant3r
35 | pip3 install -r requirements.txt &>/dev/null
36 | cd ..
37 | echo ''
38 | echo " Installation Completed"
39 | echo ''
40 | echo -e "\e[33m [Lynis]"
41 | git clone https://github.com/CISOfy/lynis.git &>/dev/null
42 | echo ' Installation Completed'
43 | echo ' '
44 | ## OSINT TOOLS INSTALLATION
45 | echo -e "\e[33m [Photon]"
46 | git clone https://github.com/s0md3v/Photon &>/dev/null
47 | cd Photon
48 | pip3 install -r requirements.txt &>/dev/null
49 | cd ..
50 | echo ' Installation Completed'
51 | echo ' '
52 | echo -e "\e[33m [Sherlock]"
53 | git clone https://github.com/sherlock-project/sherlock &>/dev/null
54 | cd sherlock
55 | pip3 install -r requirements.txt &>/dev/null
56 | cd ..
57 | echo ' Installation Completed'
58 | echo ' '
59 | echo -e "\e[33m [Dirsearch]"
60 | git clone https://github.com/maurosoria/dirsearch &>/dev/null
61 | echo ' Installation Completed'
62 | echo ' '
63 | echo -e "\e[33m [PasteJacker]"
64 | git clone https://github.com/D4Vinci/PasteJacker.git
65 | sudo python3 -m pip install ./PasteJacker
66 | sudo pastejacker
67 | clear
68 | chmod +x Hack4Squad.sh
69 | ./Hack4Squad.sh
70 | fi
71 | fi
72 |
--------------------------------------------------------------------------------
/H4S.sh:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | # Name: Hack4Squad
4 | # Clone the repository and add your features in the develop branch
5 | # Author: MOHAMED ELFALEH // @elfalehded >> All contributers are mentioned in the README file
6 | # Version: V0.1
7 | # BashV: V4.1+
8 | # Happy Hacking
9 |
10 | nmap_scan1() {
11 | echo ' '
12 | echo '################# Hack4Squad - Nmap > Basic Website Scan #################'
13 | echo ' '
14 | echo 'Example: '
15 | echo 'Your target:$ scanme.nmap.org'
16 | echo ' '
17 | read -p 'Your target:$ ' scansite
18 | nmap -sS -O $scansite
19 | echo ' '
20 | echo ' '
21 | read -p '99 - Return:$ ' ann
22 | if [ $ann = '99' ]; then
23 | chmod +x Hack4Squad.sh
24 | ./Hack4Squad.sh
25 | fi
26 |
27 | }
28 | nmap_scan2() {
29 | echo '################# Hack4Squad - Nmap > Basic Address Scan #################'
30 | echo ' '
31 | read -p 'Your address:$ ' scanaddress
32 | nmap -sS $scanaddress
33 | echo ' '
34 | echo ' '
35 | read -p '99 - Return:$ ' noo
36 | if [ $noo = '99' ]; then
37 | chmod +x Hack4Squad.sh
38 | ./Hack4Squad.sh
39 | fi
40 | }
41 | nmap_scan3() {
42 | echo '################# Hack4Squad - Nmap > Basic OS Scan #################'
43 | echo ' '
44 | nmap -A -O 192.168.0.1
45 | }
46 | nmap_scann() {
47 | echo ' '
48 | echo '################# Hack4Squad - NmapScans #################'
49 | echo ' '
50 | echo '1 - SCAN A WEBSITE'
51 | echo '2 - SCAN AN ADDRESS'
52 | echo '3 - SCAN AN OS'
53 | echo '4 - EXIT'
54 | echo '99 - RETURN '
55 | echo ' '
56 | read -p 'Pick$: ' po
57 | if [ $po = '1' ]; then
58 | nmap_scan1
59 | elif [ $po = '2' ]; then
60 | nmap_scan2
61 | elif [ $po = '3' ]; then
62 | nmap_scan3
63 | elif [ $po = '4' ]; then
64 | exit
65 | elif [ $po = '99' ]; then
66 | chmod +x Hack4Squad.sh
67 | ./Hack4Squad.sh
68 | fi
69 | }
70 | scant3r_normal_scan() {
71 | echo ' '
72 | echo '################# Hack4Squad - Webscans > SCANT3R > NORMAL SCAN'
73 | echo ' '
74 | python3 SCANT3R_V2.py
75 | echo ' '
76 | echo ' '
77 | read -p '99 - Return' ann
78 | if [ $ann = '99' ]; then
79 | chmod +x Hack4Squad.sh
80 | ./Hack4Squad.sh
81 | fi
82 | }
83 | scant3r() {
84 | echo ' '
85 | echo '################# Hack4Squad - Webscans > SCANT3R #################'
86 | echo ' '
87 | echo '1 - NORMAL SCAN'
88 | echo '2 - SCAN WITH ADDED MODULE'
89 | echo '3 - WITH RANDOM USER-AGENTS'
90 | echo '99 - RETURN '
91 | echo ' '
92 | read -p 'pick:$ ' poo
93 | if [ $poo = '1' ]; then
94 | scant3r_normal_scan
95 | elif [ $poo = '2' ]; then
96 | scant3r_added_module
97 | elif [ $poo = '3' ]; then
98 | scant3r_random_user_agents
99 | elif [ $poo = '99' ]; then
100 | chmod +x Hack4Squad.sh
101 | ./Hack4Squad.sh
102 | fi
103 | }
104 | dirsearchDefaultScan() {
105 | echo ' '
106 | echo '################### Hack4Squad - OSINT > Diresearch > Default Scan ################### '
107 | echo ' '
108 | echo -n "Enter Your URL: "
109 | read url
110 | sudo python3 dirsearch/dirsearch.py -u $url --clean-view
111 |
112 | }
113 | dirsearchAdvancedScan() {
114 | echo ' '
115 | echo '################# Hack4Squad - OSINT > Diresearch > Advanced Scan ################### '
116 | echo ' '
117 | echo -n "Enter Your URL: "
118 | read url
119 | echo -n 'Enter your wordlist path '
120 | read wordlist
121 | echo -n 'Enter the number of Threads:'
122 | read th
123 | dirsearch -u $url -e * -w $wordlist -t $th --random-agents
124 | }
125 | dirsearchScans() {
126 | echo ' '
127 | echo '################### Hack4Squad - OSINT > Diresearch ################### '
128 | echo ' '
129 | echo '1 - SIMPLE SCAN'
130 | echo '2 - ADVANCED SCAN'
131 | read -p 'Pick:$ ' poo
132 | if [ $poo = '1' ]; then
133 | dirsearchDefaultScan
134 | elif [ $poo = '2']; then
135 | dirsearchAdvancedScan
136 | fi
137 | }
138 | web_scans() {
139 | echo ''
140 | echo '################# Hack4Squad - WebHacking Tools - Scans #################'
141 | echo ' '
142 | echo '1 - SCANT3R '
143 | echo '2 - DIRSEARCH '
144 | echo '3 - PASTEJACKER '
145 | echo ' '
146 | echo '99 - Return '
147 | echo ' '
148 | read -p 'pick$: ' poo
149 | if [ $poo = '1' ]; then
150 | clear
151 | scant3r
152 | elif [ $poo = '2' ]; then
153 | dirsearchScans
154 | elif [ $poo = '3' ]; then
155 | cd PasteJacker
156 | sude pastejacker
157 | elif [ $poo = '99' ]; then
158 | chmod +x Hack4Squad.sh
159 | ./Hack4Squad.sh
160 | fi
161 | }
162 | wire_audit() {
163 | echo ' '
164 | echo '################# Hack4Squad - Wireless auditing'
165 | echo ' '
166 | echo '1 - Airgeddon'
167 | echo '2 - '
168 | echo '3 - Return'
169 | echo ' '
170 | read -p 'pick:$ ' pa
171 | if [ $pa = '1' ]; then
172 | clear
173 | cd airgeddon
174 | chmod +x airgeddon.sh
175 | ./airgeddon.sh
176 | elif [ $po = '3' ]; then
177 | clear
178 | chmod Hack4Squad.sh
179 | ./Hack4Squad
180 | fi
181 | }
182 | os_scans() {
183 | echo ' '
184 | echo '################# Hack4Squad - OS scans'
185 | echo '1 - Lynis'
186 | echo '2 '
187 | echo '3- Exit'
188 | echo '99 - RETURN'
189 | echo ' '
190 | read -p 'pick:$ ' po
191 | if [ $po = '1' ]; then
192 | clear
193 | mkdir lynis-res
194 | cd lynis
195 | path = pwd
196 | ./lynis audit system
197 | cd ..
198 | mv lynis-report.dat path
199 | mv lynis.log path
200 | mv lynis-report.dat lynis-res
201 | mv lynis.log lynis-res
202 |
203 | elif [ $po = '3' ]; then
204 | exit
205 | elif [ $po = '99' ]; then
206 | chmod +x Hack4Squad.sh
207 | ./Hack4Squad.sh
208 | fi
209 | }
210 | photonAdvancedScan() {
211 | echo ' '
212 | echo '################### Hack4Squad - OSINT > Photon > Advanced scan ################### '
213 | echo ' '
214 | echo -e 'Enter Your URL: '
215 | read url
216 | python3 Photon/photon.py -u $url --wayback --keys --dns -o output
217 | echo ' '
218 | read -p '99 - Return:$ ' poo
219 | if [ $poo = '99' ]; then
220 | clear
221 | chmod +x Hack4Squad.sh
222 | ./Hack4Squad.sh
223 | fi
224 | }
225 | photonSimpleScan() {
226 | echo ' '
227 | echo '################# Hack4Squad - OSINT > Photon > Simple scan ################## '
228 | echo ' '
229 | echo -n 'Enter Your URL: '
230 | read url
231 | python3 Photon/photon.py -u $url
232 | echo ' '
233 | read -p '99 - Return:$ ' poo
234 | if [ $poo = '99']; then
235 | clear
236 | chmod +x Hack4Squad.sh
237 | ./Hack4Squad.sh
238 | fi
239 | }
240 | osint_tools() {
241 | echo ' '
242 | echo '################# Hack4Squad - OSINT #################'
243 | echo ' '
244 | echo '1 - SIMPLY SCAN A WEBSITE WITH PHOTON'
245 | echo '2 - ADVANCED SCAN A WEBSITE WITH PHOTON'
246 | echo ' '
247 | echo '4 - EXIT'
248 | echo '99 - RETURN'
249 | echo ' '
250 | # NEW
251 | read -p 'pick:$ ' po
252 | if [ $po = '1' ]; then
253 | photonSimpleScan
254 | elif [ $po = '2' ]; then
255 | photonAdvancedScan
256 | elif [ $po = '99' ]; then
257 | chmod Hack4Squad.sh
258 | ./Hack4Squad.sh
259 |
260 | fi
261 | }
262 | clear
263 | echo '\e[1;31m-------------------------------------------------------------'
264 | echo ' _ _ _ _ _ ____ _ '
265 | echo '| | | | __ _ ___| | _| || |/ ___| __ _ _ _ __ _ __| |'
266 | echo '| |_| |/ _` |/ __| |/ / || |\___ \ / _` | | | |/ _` |/ _` |'
267 | echo '| _ | (_| | (__| <|__ _|__) | (_| | |_| | (_| | (_| |'
268 | echo '|_| |_|\__,_|\___|_|\_\ |_||____/ \__, |\__,_|\__,_|\__,_|'
269 | echo ' |_| '
270 | echo '------------------------------------------------------------- '
271 | echo ' \e[1;33m A BASH HACKING UTILITY \e[0m '
272 | echo '\e[1;31m Author: @ELFALEHED \e[0m'
273 | echo '\e[1;31m-------------------------------------------------------------\e[0m'
274 | echo ' 1 - \e[1;34m NMAP SCAN \e[0m '
275 | echo ' 2 - \e[1;34m WEB SECURITY HACK TOOLS - SCANNERS \e[0m '
276 | echo ' 3 - \e[1;34m OS SCANNERS \e[0m '
277 | echo ' 4 - \e[1;34m WIRELESS NETWORKS AUDITING \e[0m '
278 | echo ' 5 - \e[1;34m OSINT TOOLS \e[0m '
279 | echo ' 6 - \e[1;34m CONTACT THE CODER \e[0m '
280 | echo '\e[1;31m------------------------------------------------------------- '
281 | echo '\e[1;36m [$] H3LL0,' $USER
282 | echo ' '
283 | echo ' [!] Greetingz. This script is a gift for my fellow Hackers out there. Happy Hacking! '
284 | echo ' [!] Note: Make sure you installed all of the Requirements '
285 | echo ' '
286 | echo ' [~] Use this script only on your Network '
287 | echo ' '
288 | if [ $(id -u) != 0 ]; then
289 | echo '>\e[1;31m You are not root. You need to restart the script with Sudo privilages'
290 | # elevate script privileges
291 | fi
292 | echo ' '
293 | read -p 'Pick$: ' choice
294 | if [ $choice = '1' ]; then
295 | clear
296 | echo '\e[1;31m-------------------------------------------------------------- '
297 | echo ' _ __ '
298 | echo ' / | / /___ ___ ____ _____ ______________ _____ '
299 | echo ' / |/ / __ `__ \/ __ `/ __ \ / ___/ ___/ __ `/ __ \ '
300 | echo ' / /| / / / / / / /_/ / /_/ / (__ ) /__/ /_/ / / / / '
301 | echo ' /_/ |_/_/ /_/ /_/\__,_/ .___/ /____/\___/\__,_/_/ /_/ '
302 | echo ' /_/ '
303 | echo '\e[1;31m-------------------------------------------------------------- '
304 | nmap_scann
305 | elif [ $choice = '2' ]; then
306 | clear
307 | echo '\e[1;31m-------------------------------------------------------- '
308 | echo ' __ __ '
309 | echo ' | | / /__ / /_ ______________ _____ _____ '
310 | echo ' | | /| / / _ \/ __ \ / ___/ ___/ __ `/ __ \/ ___/ '
311 | echo ' | |/ |/ / __/ /_/ / (__ ) /__/ /_/ / / / (__ ) '
312 | echo ' |__/|__/\___/_.___/ /____/\___/\__,_/_/ /_/____/ '
313 | echo ' '
314 | echo '\e[1;31m------------------------------------------------------ '
315 | web_scans
316 | elif [ $choice = '3' ]; then
317 | clear
318 | echo '\e[1;31m-------------------------------------------------------- '
319 | echo ' ___ ____ '
320 | echo ' / _ \/ ___| ___ ___ __ _ _ __ ___ '
321 | echo ' | | | \___ \ / __|/ __/ _` | _ \/ __| '
322 | echo ' | |_| |___) | \__ \ (_| (_| | | | \__ \ '
323 | echo ' \___/|____/ |___/\___\__,_|_| |_|___/ '
324 | echo ' '
325 | echo '\e[1;31m------------------------------------------------------ '
326 | os_scans
327 | elif [ $choice = '4' ]; then
328 | clear
329 | echo '\e[1;31m---------------------------------------------------------------------------------- '
330 | echo ' _ _ _ _ _ _ '
331 | echo ' __ _(_)_ __ ___| | ___ ___ ___ __ _ _ _ __| (_) |_(_)_ __ __ _ '
332 | echo ' \ \ /\ / / | __/ _ \ |/ _ \/ __/ __| / _` | | | |/ _` | | __| | _ \ / _` | '
333 | echo ' \ V V /| | | | __/ | __/\__ \__ \ | (_| | |_| | (_| | | |_| | | | | (_| | '
334 | echo ' \_/\_/ |_|_| \___|_|\___||___/___/ \__,_|\__,_|\__,_|_|\__|_|_| |_|\__, | '
335 | echo ' |___/ '
336 | echo ' '
337 | echo '\e[1;31m---------------------------------------------------------------------------------- '
338 | wire_audit
339 | elif [ $choice = '5' ]; then
340 | clear
341 | echo '\e[1;31m---------------------------------------------------------------------------------- '
342 | echo ' ___ _ _ _ _ '
343 | echo ' / _ \ ___(_)_ __ | |_ | |_ ___ ___ | |___ '
344 | echo ' | | | / __| | _ \| __| | __/ _ \ / _ \| / __| '
345 | echo ' | |_| \__ \ | | | | |_ | || (_) | (_) | \__ \ '
346 | echo ' \___/|___/_|_| |_|\__| \__\___/ \___/|_|___/ '
347 | echo ' '
348 | echo '\e[1;31m---------------------------------------------------------------------------------- '
349 | osint_tools
350 | elif [ $choice = '6' ]; then
351 | firefox "https://linktr.ee/KMx404"
352 | else
353 | clear
354 | echo ' '
355 | echo ' '
356 | chmod +x Hack4Squad.sh
357 | ./Hack4Squad.sh
358 | fi
359 |
--------------------------------------------------------------------------------