├── .gitignore ├── src ├── .Hack4Squad.sh.swp └── nmap │ └── portscanner.py ├── website └── public │ └── banner.png ├── LICENSE ├── README.md ├── install.sh └── H4S.sh /.gitignore: -------------------------------------------------------------------------------- 1 | .*.swp 2 | __pycache__ 3 | .swp 4 | ^.swp 5 | ^swp 6 | -------------------------------------------------------------------------------- /src/.Hack4Squad.sh.swp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elfalehed/hack4squad/HEAD/src/.Hack4Squad.sh.swp -------------------------------------------------------------------------------- /website/public/banner.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elfalehed/hack4squad/HEAD/website/public/banner.png -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2020 Mohamed Elfaleh 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # :skull: Hack4Squad [![contributions welcome](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?steyle=flat)](https://github.com/dwyl/esta/issues) [](https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&logo=linux&logoColor=black) 2 | 3 | A bash hacking utility 4 | 5 | --- 6 | 7 | Hack4Squad is a collection for Hacking Tools (Bash and Python based) :computer:
8 | 9 | 10 | 11 | 12 | --- 13 | 14 | # Tools 15 | 16 | 1. Reconnaissance 17 | - Dirsearch 18 | - Nmap 19 | - Lynis 20 | - Wascan 21 | - Airgeddon 22 | - Scant3r 23 | 2. Exploitation 24 | - Airgeddon 25 | - PasteJacker 26 | 3. OSINT 27 | - Sherlock 28 | - Photon 29 | 30 | And more tools to be added soon. 31 | 32 | # 1. Requirements 33 | 34 | Please make sure these packages below are installed; 35 | 36 | - [Git](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git) 37 | - [Python 3](https://docs.python-guide.org/starting/install3/linux/) 38 | - [Pip](https://pip.pypa.io/en/stable/installing/) 39 | 40 | # 2. Installation 41 | 42 | - Note that this script must be run as root. 43 | 44 | ```Shell 45 | $ chmod +x install.sh 46 | $ sudo ./install.sh 47 | ``` 48 | 49 | # 3. Execution 50 | 51 | ```Shell 52 | $ chmod +x Hack4Squad.sh 53 | $ ./Hack4Squad.sh 54 | ``` 55 | 56 | --- 57 | 58 | # Status: 59 | 60 | ![70%](https://progress-bar.dev/70) **_In progress..._** 61 | 62 | ## 2DO: 63 | 64 | - Fix the installation 65 | - Fix the prompts configuration 66 | 67 |
68 | -------------------------------------------------------------------------------- /src/nmap/portscanner.py: -------------------------------------------------------------------------------- 1 | #! /usr/bin/env python3 2 | # Hack4Squad -- KMx404 3 | 4 | import socket 5 | from datetime import datetime 6 | import os 7 | import subprocess 8 | 9 | #Clear secreen 10 | 11 | subprocess.call('clear',shell=True) 12 | 13 | #data inputs 14 | 15 | Server_host=socket.gethostname() 16 | Server_Ip=socket.gethostbyname(Server_host) 17 | 18 | print("-"*84) 19 | print("") 20 | print(" Scanning Remote Ip : "+Server_Ip) 21 | print("") 22 | print("-"*84) 23 | 24 | # Check what time did the scan start 25 | 26 | t1=datetime.now() 27 | 28 | 29 | # Error handling 30 | 31 | try : 32 | for port in range(1,1025) : 33 | sock=socket.socket() 34 | result=sock.connect_ex((Server_Ip,port)) 35 | 36 | #this fuction will return 0 if the port is open 37 | 38 | if result== 0 : 39 | print("port{} =====> Is Open ".format(port)) 40 | else : 41 | print("port{} =====> Is Closed ".format(port)) 42 | sock.close() 43 | except KeyboardInterrupt : 44 | print("Exiting ..............") 45 | sys.exit() 46 | except socket.gaierror : 47 | print("Socket Name Can not resolved ") 48 | print("") 49 | print("Exiting ..............") 50 | sys.exit() 51 | except socket.error : 52 | print("Can't Connet To Server ") 53 | sys.exit() 54 | #Check time again 55 | t2=datetime.now() 56 | #total time of running this script 57 | time=t2-t1 58 | print("") 59 | print(" [ "+" Hack4Squad "*3+" ] ") 60 | print("") 61 | print(" Script Run For ===> {} S".format(time)) 62 | print("") 63 | print("") 64 | print(" [ "+" Hack4Squad "*3+" ] ") 65 | 66 | 67 | 68 | 69 | -------------------------------------------------------------------------------- /install.sh: -------------------------------------------------------------------------------- 1 | #! /bin/bash 2 | 3 | # Testing if ran as sudo && have pip3 installed 4 | 5 | if ! [ -x "$(command -v pip3)" ] || ! [ -x "$(command -v git)" ]; then 6 | echo 'Please update/install pip3/git to the latest version.' 7 | exit 1 8 | else 9 | if [ $USER != 'root' ]; then 10 | echo 'You must be root' 11 | exit 1 12 | else 13 | # There should be a command to install each required tool 14 | # KMx404 - Hack4Squad 15 | clear 16 | echo -e "\e[33m [installing the needed requirements] " 17 | echo ' ' 18 | echo -e "\e[33m [Airgeddon]" 19 | git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git &>/dev/null 20 | cd airgeddon 21 | bash airgeddon.sh &>/dev/null 22 | echo " Installation Completed" 23 | echo ' ' 24 | echo -e "\e[33m [WAScan]" 25 | git clone https://github.com/m4ll0k/WAScan.git &>/dev/null 26 | cd wascan 27 | pip3 install BeautifulSoup &>/dev/null 28 | cd .. 29 | echo ' ' 30 | echo " Installation Completed" 31 | echo '' 32 | echo -e "\e[33m [Scant3r]" 33 | git clone https://github.com/knassar702/scant3r.git &>/dev/null 34 | cd scant3r 35 | pip3 install -r requirements.txt &>/dev/null 36 | cd .. 37 | echo '' 38 | echo " Installation Completed" 39 | echo '' 40 | echo -e "\e[33m [Lynis]" 41 | git clone https://github.com/CISOfy/lynis.git &>/dev/null 42 | echo ' Installation Completed' 43 | echo ' ' 44 | ## OSINT TOOLS INSTALLATION 45 | echo -e "\e[33m [Photon]" 46 | git clone https://github.com/s0md3v/Photon &>/dev/null 47 | cd Photon 48 | pip3 install -r requirements.txt &>/dev/null 49 | cd .. 50 | echo ' Installation Completed' 51 | echo ' ' 52 | echo -e "\e[33m [Sherlock]" 53 | git clone https://github.com/sherlock-project/sherlock &>/dev/null 54 | cd sherlock 55 | pip3 install -r requirements.txt &>/dev/null 56 | cd .. 57 | echo ' Installation Completed' 58 | echo ' ' 59 | echo -e "\e[33m [Dirsearch]" 60 | git clone https://github.com/maurosoria/dirsearch &>/dev/null 61 | echo ' Installation Completed' 62 | echo ' ' 63 | echo -e "\e[33m [PasteJacker]" 64 | git clone https://github.com/D4Vinci/PasteJacker.git 65 | sudo python3 -m pip install ./PasteJacker 66 | sudo pastejacker 67 | clear 68 | chmod +x Hack4Squad.sh 69 | ./Hack4Squad.sh 70 | fi 71 | fi 72 | -------------------------------------------------------------------------------- /H4S.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | # Name: Hack4Squad 4 | # Clone the repository and add your features in the develop branch 5 | # Author: MOHAMED ELFALEH // @elfalehded >> All contributers are mentioned in the README file 6 | # Version: V0.1 7 | # BashV: V4.1+ 8 | # Happy Hacking 9 | 10 | nmap_scan1() { 11 | echo ' ' 12 | echo '################# Hack4Squad - Nmap > Basic Website Scan #################' 13 | echo ' ' 14 | echo 'Example: ' 15 | echo 'Your target:$ scanme.nmap.org' 16 | echo ' ' 17 | read -p 'Your target:$ ' scansite 18 | nmap -sS -O $scansite 19 | echo ' ' 20 | echo ' ' 21 | read -p '99 - Return:$ ' ann 22 | if [ $ann = '99' ]; then 23 | chmod +x Hack4Squad.sh 24 | ./Hack4Squad.sh 25 | fi 26 | 27 | } 28 | nmap_scan2() { 29 | echo '################# Hack4Squad - Nmap > Basic Address Scan #################' 30 | echo ' ' 31 | read -p 'Your address:$ ' scanaddress 32 | nmap -sS $scanaddress 33 | echo ' ' 34 | echo ' ' 35 | read -p '99 - Return:$ ' noo 36 | if [ $noo = '99' ]; then 37 | chmod +x Hack4Squad.sh 38 | ./Hack4Squad.sh 39 | fi 40 | } 41 | nmap_scan3() { 42 | echo '################# Hack4Squad - Nmap > Basic OS Scan #################' 43 | echo ' ' 44 | nmap -A -O 192.168.0.1 45 | } 46 | nmap_scann() { 47 | echo ' ' 48 | echo '################# Hack4Squad - NmapScans #################' 49 | echo ' ' 50 | echo '1 - SCAN A WEBSITE' 51 | echo '2 - SCAN AN ADDRESS' 52 | echo '3 - SCAN AN OS' 53 | echo '4 - EXIT' 54 | echo '99 - RETURN ' 55 | echo ' ' 56 | read -p 'Pick$: ' po 57 | if [ $po = '1' ]; then 58 | nmap_scan1 59 | elif [ $po = '2' ]; then 60 | nmap_scan2 61 | elif [ $po = '3' ]; then 62 | nmap_scan3 63 | elif [ $po = '4' ]; then 64 | exit 65 | elif [ $po = '99' ]; then 66 | chmod +x Hack4Squad.sh 67 | ./Hack4Squad.sh 68 | fi 69 | } 70 | scant3r_normal_scan() { 71 | echo ' ' 72 | echo '################# Hack4Squad - Webscans > SCANT3R > NORMAL SCAN' 73 | echo ' ' 74 | python3 SCANT3R_V2.py 75 | echo ' ' 76 | echo ' ' 77 | read -p '99 - Return' ann 78 | if [ $ann = '99' ]; then 79 | chmod +x Hack4Squad.sh 80 | ./Hack4Squad.sh 81 | fi 82 | } 83 | scant3r() { 84 | echo ' ' 85 | echo '################# Hack4Squad - Webscans > SCANT3R #################' 86 | echo ' ' 87 | echo '1 - NORMAL SCAN' 88 | echo '2 - SCAN WITH ADDED MODULE' 89 | echo '3 - WITH RANDOM USER-AGENTS' 90 | echo '99 - RETURN ' 91 | echo ' ' 92 | read -p 'pick:$ ' poo 93 | if [ $poo = '1' ]; then 94 | scant3r_normal_scan 95 | elif [ $poo = '2' ]; then 96 | scant3r_added_module 97 | elif [ $poo = '3' ]; then 98 | scant3r_random_user_agents 99 | elif [ $poo = '99' ]; then 100 | chmod +x Hack4Squad.sh 101 | ./Hack4Squad.sh 102 | fi 103 | } 104 | dirsearchDefaultScan() { 105 | echo ' ' 106 | echo '################### Hack4Squad - OSINT > Diresearch > Default Scan ################### ' 107 | echo ' ' 108 | echo -n "Enter Your URL: " 109 | read url 110 | sudo python3 dirsearch/dirsearch.py -u $url --clean-view 111 | 112 | } 113 | dirsearchAdvancedScan() { 114 | echo ' ' 115 | echo '################# Hack4Squad - OSINT > Diresearch > Advanced Scan ################### ' 116 | echo ' ' 117 | echo -n "Enter Your URL: " 118 | read url 119 | echo -n 'Enter your wordlist path ' 120 | read wordlist 121 | echo -n 'Enter the number of Threads:' 122 | read th 123 | dirsearch -u $url -e * -w $wordlist -t $th --random-agents 124 | } 125 | dirsearchScans() { 126 | echo ' ' 127 | echo '################### Hack4Squad - OSINT > Diresearch ################### ' 128 | echo ' ' 129 | echo '1 - SIMPLE SCAN' 130 | echo '2 - ADVANCED SCAN' 131 | read -p 'Pick:$ ' poo 132 | if [ $poo = '1' ]; then 133 | dirsearchDefaultScan 134 | elif [ $poo = '2']; then 135 | dirsearchAdvancedScan 136 | fi 137 | } 138 | web_scans() { 139 | echo '' 140 | echo '################# Hack4Squad - WebHacking Tools - Scans #################' 141 | echo ' ' 142 | echo '1 - SCANT3R ' 143 | echo '2 - DIRSEARCH ' 144 | echo '3 - PASTEJACKER ' 145 | echo ' ' 146 | echo '99 - Return ' 147 | echo ' ' 148 | read -p 'pick$: ' poo 149 | if [ $poo = '1' ]; then 150 | clear 151 | scant3r 152 | elif [ $poo = '2' ]; then 153 | dirsearchScans 154 | elif [ $poo = '3' ]; then 155 | cd PasteJacker 156 | sude pastejacker 157 | elif [ $poo = '99' ]; then 158 | chmod +x Hack4Squad.sh 159 | ./Hack4Squad.sh 160 | fi 161 | } 162 | wire_audit() { 163 | echo ' ' 164 | echo '################# Hack4Squad - Wireless auditing' 165 | echo ' ' 166 | echo '1 - Airgeddon' 167 | echo '2 - ' 168 | echo '3 - Return' 169 | echo ' ' 170 | read -p 'pick:$ ' pa 171 | if [ $pa = '1' ]; then 172 | clear 173 | cd airgeddon 174 | chmod +x airgeddon.sh 175 | ./airgeddon.sh 176 | elif [ $po = '3' ]; then 177 | clear 178 | chmod Hack4Squad.sh 179 | ./Hack4Squad 180 | fi 181 | } 182 | os_scans() { 183 | echo ' ' 184 | echo '################# Hack4Squad - OS scans' 185 | echo '1 - Lynis' 186 | echo '2 ' 187 | echo '3- Exit' 188 | echo '99 - RETURN' 189 | echo ' ' 190 | read -p 'pick:$ ' po 191 | if [ $po = '1' ]; then 192 | clear 193 | mkdir lynis-res 194 | cd lynis 195 | path = pwd 196 | ./lynis audit system 197 | cd .. 198 | mv lynis-report.dat path 199 | mv lynis.log path 200 | mv lynis-report.dat lynis-res 201 | mv lynis.log lynis-res 202 | 203 | elif [ $po = '3' ]; then 204 | exit 205 | elif [ $po = '99' ]; then 206 | chmod +x Hack4Squad.sh 207 | ./Hack4Squad.sh 208 | fi 209 | } 210 | photonAdvancedScan() { 211 | echo ' ' 212 | echo '################### Hack4Squad - OSINT > Photon > Advanced scan ################### ' 213 | echo ' ' 214 | echo -e 'Enter Your URL: ' 215 | read url 216 | python3 Photon/photon.py -u $url --wayback --keys --dns -o output 217 | echo ' ' 218 | read -p '99 - Return:$ ' poo 219 | if [ $poo = '99' ]; then 220 | clear 221 | chmod +x Hack4Squad.sh 222 | ./Hack4Squad.sh 223 | fi 224 | } 225 | photonSimpleScan() { 226 | echo ' ' 227 | echo '################# Hack4Squad - OSINT > Photon > Simple scan ################## ' 228 | echo ' ' 229 | echo -n 'Enter Your URL: ' 230 | read url 231 | python3 Photon/photon.py -u $url 232 | echo ' ' 233 | read -p '99 - Return:$ ' poo 234 | if [ $poo = '99']; then 235 | clear 236 | chmod +x Hack4Squad.sh 237 | ./Hack4Squad.sh 238 | fi 239 | } 240 | osint_tools() { 241 | echo ' ' 242 | echo '################# Hack4Squad - OSINT #################' 243 | echo ' ' 244 | echo '1 - SIMPLY SCAN A WEBSITE WITH PHOTON' 245 | echo '2 - ADVANCED SCAN A WEBSITE WITH PHOTON' 246 | echo ' ' 247 | echo '4 - EXIT' 248 | echo '99 - RETURN' 249 | echo ' ' 250 | # NEW 251 | read -p 'pick:$ ' po 252 | if [ $po = '1' ]; then 253 | photonSimpleScan 254 | elif [ $po = '2' ]; then 255 | photonAdvancedScan 256 | elif [ $po = '99' ]; then 257 | chmod Hack4Squad.sh 258 | ./Hack4Squad.sh 259 | 260 | fi 261 | } 262 | clear 263 | echo '\e[1;31m-------------------------------------------------------------' 264 | echo ' _ _ _ _ _ ____ _ ' 265 | echo '| | | | __ _ ___| | _| || |/ ___| __ _ _ _ __ _ __| |' 266 | echo '| |_| |/ _` |/ __| |/ / || |\___ \ / _` | | | |/ _` |/ _` |' 267 | echo '| _ | (_| | (__| <|__ _|__) | (_| | |_| | (_| | (_| |' 268 | echo '|_| |_|\__,_|\___|_|\_\ |_||____/ \__, |\__,_|\__,_|\__,_|' 269 | echo ' |_| ' 270 | echo '------------------------------------------------------------- ' 271 | echo ' \e[1;33m A BASH HACKING UTILITY \e[0m ' 272 | echo '\e[1;31m Author: @ELFALEHED \e[0m' 273 | echo '\e[1;31m-------------------------------------------------------------\e[0m' 274 | echo ' 1 - \e[1;34m NMAP SCAN \e[0m ' 275 | echo ' 2 - \e[1;34m WEB SECURITY HACK TOOLS - SCANNERS \e[0m ' 276 | echo ' 3 - \e[1;34m OS SCANNERS \e[0m ' 277 | echo ' 4 - \e[1;34m WIRELESS NETWORKS AUDITING \e[0m ' 278 | echo ' 5 - \e[1;34m OSINT TOOLS \e[0m ' 279 | echo ' 6 - \e[1;34m CONTACT THE CODER \e[0m ' 280 | echo '\e[1;31m------------------------------------------------------------- '  281 | echo '\e[1;36m [$] H3LL0,' $USER 282 | echo ' ' 283 | echo ' [!] Greetingz. This script is a gift for my fellow Hackers out there. Happy Hacking! ' 284 | echo ' [!] Note: Make sure you installed all of the Requirements ' 285 | echo ' ' 286 | echo ' [~] Use this script only on your Network ' 287 | echo ' ' 288 | if [ $(id -u) != 0 ]; then 289 | echo '>\e[1;31m You are not root. You need to restart the script with Sudo privilages' 290 | # elevate script privileges 291 | fi 292 | echo ' ' 293 | read -p 'Pick$: ' choice 294 | if [ $choice = '1' ]; then 295 | clear 296 | echo '\e[1;31m-------------------------------------------------------------- ' 297 | echo ' _ __ ' 298 | echo ' / | / /___ ___ ____ _____ ______________ _____ ' 299 | echo ' / |/ / __ `__ \/ __ `/ __ \ / ___/ ___/ __ `/ __ \ ' 300 | echo ' / /| / / / / / / /_/ / /_/ / (__ ) /__/ /_/ / / / / ' 301 | echo ' /_/ |_/_/ /_/ /_/\__,_/ .___/ /____/\___/\__,_/_/ /_/ ' 302 | echo ' /_/ ' 303 | echo '\e[1;31m-------------------------------------------------------------- ' 304 | nmap_scann 305 | elif [ $choice = '2' ]; then 306 | clear 307 | echo '\e[1;31m-------------------------------------------------------- ' 308 | echo ' __ __ ' 309 | echo ' | | / /__ / /_ ______________ _____ _____ ' 310 | echo ' | | /| / / _ \/ __ \ / ___/ ___/ __ `/ __ \/ ___/ ' 311 | echo ' | |/ |/ / __/ /_/ / (__ ) /__/ /_/ / / / (__ ) ' 312 | echo ' |__/|__/\___/_.___/ /____/\___/\__,_/_/ /_/____/ ' 313 | echo ' ' 314 | echo '\e[1;31m------------------------------------------------------ ' 315 | web_scans 316 | elif [ $choice = '3' ]; then 317 | clear 318 | echo '\e[1;31m-------------------------------------------------------- ' 319 | echo ' ___ ____ ' 320 | echo ' / _ \/ ___| ___ ___ __ _ _ __ ___ ' 321 | echo ' | | | \___ \ / __|/ __/ _` | _ \/ __| ' 322 | echo ' | |_| |___) | \__ \ (_| (_| | | | \__ \ ' 323 | echo ' \___/|____/ |___/\___\__,_|_| |_|___/ ' 324 | echo ' ' 325 | echo '\e[1;31m------------------------------------------------------ ' 326 | os_scans 327 | elif [ $choice = '4' ]; then 328 | clear 329 | echo '\e[1;31m---------------------------------------------------------------------------------- ' 330 | echo ' _ _ _ _ _ _ ' 331 | echo ' __ _(_)_ __ ___| | ___ ___ ___ __ _ _ _ __| (_) |_(_)_ __ __ _ ' 332 | echo ' \ \ /\ / / | __/ _ \ |/ _ \/ __/ __| / _` | | | |/ _` | | __| | _ \ / _` | ' 333 | echo ' \ V V /| | | | __/ | __/\__ \__ \ | (_| | |_| | (_| | | |_| | | | | (_| | ' 334 | echo ' \_/\_/ |_|_| \___|_|\___||___/___/ \__,_|\__,_|\__,_|_|\__|_|_| |_|\__, | ' 335 | echo ' |___/ ' 336 | echo ' ' 337 | echo '\e[1;31m---------------------------------------------------------------------------------- ' 338 | wire_audit 339 | elif [ $choice = '5' ]; then 340 | clear 341 | echo '\e[1;31m---------------------------------------------------------------------------------- ' 342 | echo ' ___ _ _ _ _ ' 343 | echo ' / _ \ ___(_)_ __ | |_ | |_ ___ ___ | |___ ' 344 | echo ' | | | / __| | _ \| __| | __/ _ \ / _ \| / __| ' 345 | echo ' | |_| \__ \ | | | | |_ | || (_) | (_) | \__ \ ' 346 | echo ' \___/|___/_|_| |_|\__| \__\___/ \___/|_|___/ ' 347 | echo ' ' 348 | echo '\e[1;31m---------------------------------------------------------------------------------- ' 349 | osint_tools 350 | elif [ $choice = '6' ]; then 351 | firefox "https://linktr.ee/KMx404" 352 | else 353 | clear 354 | echo ' ' 355 | echo ' ' 356 | chmod +x Hack4Squad.sh 357 | ./Hack4Squad.sh 358 | fi 359 | --------------------------------------------------------------------------------