├── .github ├── FUNDING.yml └── workflows │ └── shiftleft.yml ├── .gitignore ├── .pyup.yml ├── LICENSE ├── README.md ├── dbnr ├── dbnr_uninstall ├── debonair ├── init.py ├── install ├── install.py ├── pics ├── README └── home.png ├── requirements.txt ├── src └── debonair │ ├── __init__.py │ ├── core.py │ ├── kickstart │ └── uninstall.py └── start.py /.github/FUNDING.yml: -------------------------------------------------------------------------------- 1 | # These are supported funding model platforms 2 | 3 | github: # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2] 4 | patreon: # with a single Patreon username 5 | open_collective: # 6 | ko_fi: gerrishon 7 | tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel 8 | community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry 9 | liberapay: # Replace with a single Liberapay username 10 | issuehunt: # Replace with a single IssueHunt username 11 | otechie: # Replace with a single Otechie username 12 | custom: ['https://tinyurl.com/ygaj5fwj'] 13 | -------------------------------------------------------------------------------- /.github/workflows/shiftleft.yml: -------------------------------------------------------------------------------- 1 | --- 2 | # This workflow integrates ShiftLeft NG SAST with GitHub 3 | # Visit https://docs.shiftleft.io for help 4 | name: ShiftLeft 5 | 6 | on: 7 | pull_request: 8 | workflow_dispatch: 9 | 10 | jobs: 11 | NextGen-Static-Analysis: 12 | runs-on: ubuntu-20.04 13 | steps: 14 | - uses: actions/checkout@v2 15 | - name: Download ShiftLeft CLI 16 | run: | 17 | curl https://cdn.shiftleft.io/download/sl > ${GITHUB_WORKSPACE}/sl && chmod a+rx ${GITHUB_WORKSPACE}/sl 18 | - name: Extract branch name 19 | shell: bash 20 | run: echo "##[set-output name=branch;]$(echo ${GITHUB_REF#refs/heads/})" 21 | id: extract_branch 22 | - name: NextGen Static Analysis 23 | run: | 24 | pip install --upgrade setuptools wheel 25 | pip install -r requirements.txt 26 | ${GITHUB_WORKSPACE}/sl analyze --wait --app debonair --tag branch=${{ github.head_ref || steps.extract_branch.outputs.branch }} --python $(pwd) 27 | env: 28 | SHIFTLEFT_ACCESS_TOKEN: ${{ secrets.SHIFTLEFT_ACCESS_TOKEN }} 29 | 30 | if: 31 | ${{ hashFiles('requirements.txt') != '' }} 32 | - name: Legacy Static Analysis 33 | run: | 34 | echo "Please update your `shiftleft-python-demo` fork!" 35 | ${GITHUB_WORKSPACE}/sl analyze --wait --no-cpg --app debonair --tag branch=${{ github.head_ref || steps.extract_branch.outputs.branch }} --python $(pwd) 36 | env: 37 | SHIFTLEFT_ACCESS_TOKEN: ${{ secrets.SHIFTLEFT_ACCESS_TOKEN }} 38 | 39 | if: 40 | ${{ hashFiles('requirements.txt') == '' }} 41 | 42 | ## Uncomment the following section to enable build rule checking and enforcing. 43 | #Build-Rules: 44 | #runs-on: ubuntu-latest 45 | #needs: NextGen-Static-Analysis 46 | #steps: 47 | #- uses: actions/checkout@v2 48 | #- name: Download ShiftLeft CLI 49 | # run: | 50 | # curl https://cdn.shiftleft.io/download/sl > ${GITHUB_WORKSPACE}/sl && chmod a+rx ${GITHUB_WORKSPACE}/sl 51 | #- name: Validate Build Rules 52 | # run: | 53 | # ${GITHUB_WORKSPACE}/sl check-analysis --app debonair \ 54 | # --source 'tag.branch=${{ github.event.pull_request.base.ref }}' \ 55 | # --target "tag.branch=${{ github.head_ref || steps.extract_branch.outputs.branch }}" \ 56 | # --report \ 57 | # --github-pr-number=${{github.event.number}} \ 58 | # --github-pr-user=${{ github.repository_owner }} \ 59 | # --github-pr-repo=${{ github.event.repository.name }} \ 60 | # --github-token=${{ secrets.GITHUB_TOKEN }} 61 | # env: 62 | #SHIFTLEFT_ACCESS_TOKEN: ${{ secrets.SHIFTLEFT_ACCESS_TOKEN }} 63 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | # Byte-compiled / optimized / DLL files 2 | __pycache__/ 3 | *.py[cod] 4 | *$py.class 5 | 6 | # C extensions 7 | *.so 8 | 9 | # Distribution / packaging 10 | .Python 11 | build/ 12 | develop-eggs/ 13 | dist/ 14 | downloads/ 15 | eggs/ 16 | .eggs/ 17 | lib/ 18 | lib64/ 19 | parts/ 20 | sdist/ 21 | var/ 22 | wheels/ 23 | pip-wheel-metadata/ 24 | share/python-wheels/ 25 | *.egg-info/ 26 | .installed.cfg 27 | *.egg 28 | MANIFEST 29 | 30 | # PyInstaller 31 | # Usually these files are written by a python script from a template 32 | # before PyInstaller builds the exe, so as to inject date/other infos into it. 33 | *.manifest 34 | *.spec 35 | 36 | # Installer logs 37 | pip-log.txt 38 | pip-delete-this-directory.txt 39 | 40 | # Unit test / coverage reports 41 | htmlcov/ 42 | .tox/ 43 | .nox/ 44 | .coverage 45 | .coverage.* 46 | .cache 47 | nosetests.xml 48 | coverage.xml 49 | *.cover 50 | *.py,cover 51 | .hypothesis/ 52 | .pytest_cache/ 53 | 54 | # Translations 55 | *.mo 56 | *.pot 57 | 58 | # Django stuff: 59 | *.log 60 | local_settings.py 61 | db.sqlite3 62 | db.sqlite3-journal 63 | 64 | # Flask stuff: 65 | instance/ 66 | .webassets-cache 67 | 68 | # Scrapy stuff: 69 | .scrapy 70 | 71 | # Sphinx documentation 72 | docs/_build/ 73 | 74 | # PyBuilder 75 | target/ 76 | 77 | # Jupyter Notebook 78 | .ipynb_checkpoints 79 | 80 | # IPython 81 | profile_default/ 82 | ipython_config.py 83 | 84 | # pyenv 85 | .python-version 86 | 87 | # pipenv 88 | # According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control. 89 | # However, in case of collaboration, if having platform-specific dependencies or dependencies 90 | # having no cross-platform support, pipenv may install dependencies that don't work, or not 91 | # install all needed dependencies. 92 | #Pipfile.lock 93 | 94 | # PEP 582; used by e.g. github.com/David-OConnor/pyflow 95 | __pypackages__/ 96 | 97 | # Celery stuff 98 | celerybeat-schedule 99 | celerybeat.pid 100 | 101 | # SageMath parsed files 102 | *.sage.py 103 | 104 | # Environments 105 | .env 106 | .venv 107 | env/ 108 | venv/ 109 | ENV/ 110 | env.bak/ 111 | venv.bak/ 112 | 113 | # Spyder project settings 114 | .spyderproject 115 | .spyproject 116 | 117 | # Rope project settings 118 | .ropeproject 119 | 120 | # mkdocs documentation 121 | /site 122 | 123 | # mypy 124 | .mypy_cache/ 125 | .dmypy.json 126 | dmypy.json 127 | 128 | # Pyre type checker 129 | .pyre/ 130 | -------------------------------------------------------------------------------- /.pyup.yml: -------------------------------------------------------------------------------- 1 | # autogenerated pyup.io config file 2 | # see https://pyup.io/docs/configuration/ for all available options 3 | 4 | schedule: every week 5 | update: false 6 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Copyright 2021 Secretum Inc. 2 | 3 | Redistribution and use in source and binary forms, with or without 4 | modification, are permitted provided that the following conditions are 5 | met: 6 | 7 | 1. Redistributions of source code must retain the above copyright 8 | notice, this list of conditions and the following disclaimer. 9 | 10 | 2. Redistributions in binary form must reproduce the above copyright 11 | notice, this list of conditions and the following disclaimer in the 12 | documentation and/or other materials provided with the distribution. 13 | 14 | 3. Neither the name of the copyright holder nor the names of its 15 | contributors may be used to endorse or promote products derived from 16 | this software without specific prior written permission. 17 | 18 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 19 | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 20 | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 21 | PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 22 | HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 23 | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 24 | TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 25 | PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 26 | LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 27 | NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 28 | SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 |

Debonair

2 | 3 | [![ ](pics/home.png)](https://github.com/gerrishons) 4 | --- 5 | 6 | [![GitHub stars](https://img.shields.io/github/stars/secretum-inc/debonair.svg)](https://github.com/secretum-inc/debonair/stargazers) 7 | [![GitHub forks](https://img.shields.io/github/forks/secretum-inc/debonair.svg)](https://github.com/secretum-inc/debonair/network/members) 8 | [![GitHub issues](https://img.shields.io/github/issues/secretum-inc/debonair.svg)](https://github.com/secretum-inc/debonair/issues) 9 | [![GitHub watchers](https://img.shields.io/github/watchers/secretum-inc/debonair.svg)](https://github.com/secretum-inc/debonair/watchers) 10 | [![Python](https://img.shields.io/badge/language-Python%203-blue.svg)](https://www.python.org) 11 | [![Twitter Follow](https://img.shields.io/twitter/follow/gerrishon_s?style=social)](https://twitter.com/gerrishon_s) 12 | 13 | 14 | 15 | ### Introduction 16 | > :information_source: Debonair is an all in one, across the board and automatic installer for helpful tools. 17 | 18 | 19 | ## Installation⬇️ 20 | 21 | 22 | 1. Clone the project files and cd into the directory: 23 | 24 | git clone https://github.com/secretum-inc/debonair && cd debonair 25 | 26 | 2. Run: 27 | 28 | python3 init.py 29 | 30 | 31 | ## Tool Categories🚥 32 | `Information Gathering` 33 | `Vulnerability Scanner/Analysis` 34 | `Web hacking` 35 | `Database Assessment` 36 | `Password Attacks` 37 | `Wireless Attacks` 38 | `Reverse Engineering` 39 | `Exploitation Tools` 40 | `Sniffing & Spoofing` 41 | `Reporting Tools` 42 | `Forensic Tools` 43 | `Stress Testing` 44 | `Linux Distos` 45 | `Termux Utility` 46 | `Shell Function [.bashrc]` 47 | `CLI Games` 48 | `Malware Analysis` 49 | `Compiler/Interpreter` 50 | `Social Engineering Tools` 51 | 52 | ## How to use👨‍💻 53 | 54 | Type **`debonair`** or **`dbnr`** from anywhere in your terminal 55 | 56 | :bulb: Each number represents a specific output. 57 | 58 | :bulb: Type the number corresponding number to a tool you want to install. 59 | 60 | 61 | ## Requirements🎲 62 | • Python **3.6+** 63 | 64 | • quo **2021.×** 65 | 66 | ## Contributing👥 67 | 68 | If you run into an issue, we would be very happy if you would file a bug on the [issue tracker](https://github.com/secretum-inc/debonair/issues). You can also contribute by adding more tools by creating a pull request 69 | 70 | ## License📑 71 | 72 | Debonair is licensed under BSD-3-Clause License. See the `LICENSE` file in the top distribution directory for the full license text. 73 | 74 | 75 | ## Donate🎁 76 | 77 | Please consider [Donating](https://www.paypal.com/donate?hosted_button_id=KP893BC2EKK54) today 78 | 79 | ------------------------------------------------------------------------ 80 | 81 | -------------------------------------------------------------------------------- /dbnr: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | if [ -d /data/data/com.termux/files/usr/etc ]; then 4 | conf_dir="/data/data/com.termux/files/usr/etc" 5 | elif [ -d /usr/etc ]; then 6 | conf_dir="/usr/etc" 7 | elif [ -d /etc ]; then 8 | conf_dir="/etc" 9 | fi 10 | 11 | if [ -e /usr/lib/sudo ]; then 12 | sudo python3 $conf_dir/debonair_/debonair/start.py 13 | else 14 | python3 $conf_dir/debonair_/debonair/start.py 15 | fi 16 | exit 17 | -------------------------------------------------------------------------------- /dbnr_uninstall: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | if [ -d /data/data/com.termux/files/usr/etc ]; then 4 | conf_dir="/data/data/com.termux/files/usr/etc" 5 | elif [ -d /usr/etc ]; then 6 | conf_dir="/usr/etc" 7 | elif [ -d /etc ]; then 8 | conf_dir="/etc" 9 | fi 10 | 11 | if [ -e /usr/lib/sudo ]; then 12 | sudo python3 $conf_dir/debonair_/debonair/src/debonair/uninstall.py 13 | else 14 | python3 $conf_dir/debonair_/debonair/src/debonair/uninstall.py 15 | fi 16 | exit 17 | -------------------------------------------------------------------------------- /debonair: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | if [ -d /data/data/com.termux/files/usr/etc ]; then 4 | conf_dir="/data/data/com.termux/files/usr/etc" 5 | elif [ -d /usr/etc ]; then 6 | conf_dir="/usr/etc" 7 | elif [ -d /etc ]; then 8 | conf_dir="/etc" 9 | fi 10 | 11 | if [ -e /usr/lib/sudo ]; then 12 | sudo python3 $conf_dir/debonair_/debonair/start.py 13 | else 14 | python3 $conf_dir/debonair_/debonair/start.py 15 | fi 16 | exit 17 | -------------------------------------------------------------------------------- /init.py: -------------------------------------------------------------------------------- 1 | import os 2 | import sys 3 | 4 | os.system("chmod +x install") 5 | os.system("sh install") 6 | -------------------------------------------------------------------------------- /install: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | # 3 | # 4 | 5 | if [ -e /usr/lib/sudo ];then 6 | if [ -e /usr/bin/apt-get ];then 7 | if [ ! -e /usr/bin/python3 ];then 8 | sudo apt-get update 9 | sudo apt-get upgrade -y 10 | sudo apt-get install python -y 11 | sudo apt-get install python3 -y 12 | fi 13 | fi 14 | else 15 | if [ -d /usr/bin ];then 16 | if [ -e /usr/bin/apt-get ];then 17 | if [ ! -e /usr/bin/python3 ];then 18 | apt-get update 19 | apt -get upgrade -y 20 | apt-get install python -y 21 | apt-get install python3 -y 22 | fi 23 | fi 24 | fi 25 | fi 26 | if [ -d /data/data/com.termux/files/usr/bin ]; then 27 | if [ ! -e /data/data/com.termux/files/usr/bin/python3 ];then 28 | pkg update 29 | pkg upgrade -y 30 | pkg install python -y 31 | pkg install python3 -y 32 | fi 33 | fi 34 | if [ -e /usr/lib/sudo ];then 35 | if [ -e /usr/bin/yum ];then 36 | if [ ! -e /usr/bin/python3 ];then 37 | sudo yum update 38 | sudo yum upgrade -y 39 | sudo yum install python -y 40 | sudo yum install python3 -y 41 | fi 42 | fi 43 | else 44 | if [ -d /usr/bin ];then 45 | if [ -e /usr/bin/yum ];then 46 | if [ ! -e /usr/bin/python3 ];then 47 | yum update 48 | yum upgrade -y 49 | yum install python -y 50 | yum install python3 -y 51 | fi 52 | fi 53 | fi 54 | fi 55 | if [ -e /usr/local/bin/brew ];then 56 | if [ ! -e /usr/local/bin/python3 ];then 57 | brew install python -y 58 | brew install python3 -y 59 | fi 60 | fi 61 | if [ -e /usr/local/bin/brew ];then 62 | if [ ! -e /usr/local/bin/python ];then 63 | brew install python -y 64 | brew install python3 -y 65 | fi 66 | fi 67 | if [ -e /usr/bin/apk ];then 68 | if [ ! -e /usr/bin/python ];then 69 | apk install python -y 70 | apk install python3 -y 71 | fi 72 | fi 73 | if [ -e /usr/bin/apk ];then 74 | if [ ! -e /usr/bin/python3 ];then 75 | apk install python -y 76 | apk install python3 -y 77 | fi 78 | fi 79 | pip install -r requirements.txt 80 | python3 install.py 81 | exit 82 | 83 | 84 | 85 | -------------------------------------------------------------------------------- /install.py: -------------------------------------------------------------------------------- 1 | import quo 2 | import os 3 | import sys 4 | import time 5 | from quo import command, app, echo, pause, confirm 6 | 7 | @command() 8 | @app("--terms") 9 | def install(terms): 10 | echo(f"THE SOFTWARE IS PROVIDED `AS IS`, WITHOUT WARRANTY OF ANY KIND, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERRCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL I BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THIS SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE", foreground="vblack", background="vwhite", bold=True) 11 | time.sleep(3) 12 | confirm("Do you want to install Debonair?", abort=True) 13 | pause() 14 | echo(f"Technically, Moses was the first person with a tablet downloading data from the cloud...", foreground="red", dim=True, bold=True) 15 | os.system("cd /etc/ && rm -rf debonair_ && mkdir debonair_ && cd /etc/debonair_/ && git clone --quiet https://github.com/secretum-inc/debonair.git && cd /etc/debonair_/debonair/ && chmod +x debonair && chmod +x dbnr && mv -f debonair /usr/bin/ && mv -f dbnr /usr/bin/ && cd && rm -rf debonair && dbnr") 16 | 17 | if __name__ == "__main__": 18 | install() 19 | L 20 | -------------------------------------------------------------------------------- /pics/README: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /pics/home.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scalabli/debonair/e47b3f0be9b36401fc3973f622f99a0e33149863/pics/home.png -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | requests>=2.24.0 2 | quo>=2021.5.5.2 3 | 4 | # Dependencies of requests 5 | idna<3,>=2.5 6 | certifi>=2017.4.17 7 | urllib3>=1.26.4 8 | chardet<4,>=3.0.2 9 | -------------------------------------------------------------------------------- /src/debonair/__init__.py: -------------------------------------------------------------------------------- 1 | # 2 | -------------------------------------------------------------------------------- /src/debonair/core.py: -------------------------------------------------------------------------------- 1 | import os 2 | import quo 3 | import subprocess 4 | import urllib.request 5 | from quo import command, app, echo, prompt 6 | from subprocess import check_output as inputstream 7 | 8 | current_dir = os.getcwd() 9 | _banner = """ 10 | 11 | ╭━━━┳━━━┳━━╮╭━━━┳━╮╱╭┳━━━┳━━┳━━━┳━━━╮ 12 | ╰╮╭╮┃╭━━┫╭╮┃┃╭━╮┃┃╰╮┃┃╭━╮┣┫┣┫╭━╮┃╭━━╯ 13 | ╱┃┃┃┃╰━━┫╰╯╰┫┃╱┃┃╭╮╰╯┃┃╱┃┃┃┃┃╰━╯┃╰━━╮ 14 | ╱┃┃┃┃╭━━┫╭━╮┃┃╱┃┃┃╰╮┃┃╰━╯┃┃┃┃╭╮╭┫╭━━╯ 15 | ╭╯╰╯┃╰━━┫╰━╯┃╰━╯┃┃╱┃┃┃╭━╮┣┫┣┫┃┃╰┫╰━━╮ 16 | ╰━━━┻━━━┻━━━┻━━━┻╯╱╰━┻╯╱╰┻━━┻╯╰━┻━━━╯ 17 | 18 | """ 19 | 20 | import sys 21 | import time 22 | _banner2 = """ 23 | 24 | ##################################### 25 | # [99] < Back (Main menu) # 26 | # [00] Exit Debonair # 27 | ##################################### 28 | """ 29 | os.system("cd /etc/ && touch debonair.conf") 30 | os.system("cd /etc/ && touch debonair_1") 31 | prefix = os.getenv("PREFIX") 32 | configBase = "[HOME] = ~" 33 | configFile = "/etc/debonair.conf" 34 | cache_1 = "/etc/debonair_1" 35 | 36 | @command() 37 | @app("--sources_list") 38 | def repo_check(sources_list): 39 | if os.path.isfile(os.getenv("PREFIX")+"/etc/apt/sources.list.d/"+sources_list): 40 | return True 41 | return False 42 | 43 | @command() 44 | @app("--statusId") 45 | def writeStatus(statusId): 46 | open(cache_1,"w").write(str(statusId)) 47 | 48 | def readStatus(): 49 | try: 50 | statusId = open(cache_1,"r").read() 51 | if statusId == "1": 52 | return True 53 | return False 54 | except IOError: 55 | return False 56 | 57 | def checkConfigFile(): 58 | if os.path.exists(configFile): 59 | if os.path.isdir(configFile): 60 | os.system(f"rm -rf {configFile}") 61 | open(configFile,"w").write(configBase) 62 | else: 63 | open(configFile,"w").write(configBase) 64 | 65 | def loadConfigFile(): 66 | checkConfigFile() 67 | lfile = "" 68 | try: 69 | lfile = [x.split("=")[-1].strip() for x in open(configFile,"r").splitlines() if x.split("=")[0].strip() == "[HOME]"][0] 70 | except Exception as e: 71 | lfile = "~" 72 | return lfile 73 | 74 | homeDir = loadConfigFile() 75 | 76 | def restart_program(): 77 | python = sys.executable 78 | os.execl(python, python, * sys.argv) 79 | curdir = os.getcwd() 80 | 81 | def backtomenu_option(): 82 | if not readStatus(): 83 | echo(f'{_banner2}', foreground="red", bold=True, italic=True) 84 | backtomenu = prompt("@dbnr >>> ") 85 | 86 | if backtomenu == "99": 87 | restart_program() 88 | elif backtomenu == "00": 89 | sys.exit() 90 | else: 91 | echo(f"ERROR: Wrong Input", foreground="red") 92 | time.sleep(2) 93 | restart_program() 94 | 95 | def banner(): 96 | echo(f'{_banner}', foreground="yellow", bold=True) 97 | 98 | ### Repo Installer 99 | def pointless_repo(): 100 | urllib.request.urlretrieve('https://github.com/secretum-inc/debonair/src/debonair/kickstart','kickstart') 101 | os.system('kickstart') 102 | os.remove('kickstart') 103 | os.system('apt update -y') 104 | ### 105 | 106 | def nmap(): 107 | echo(f"%%%%%%% Installing... Nmap", foreground="vcyan") 108 | # secretum inc 109 | os.system('apt install nmap') 110 | echo('###### Done') 111 | echo(f"###### Type 'nmap' to start.", foreground="red") 112 | backtomenu_option() 113 | 114 | def red_hawk(): 115 | echo(f"%%%%%%% Installing... RED HAWK", foreground="vcyan") 116 | # secretum inc 117 | os.system('apt install git php') 118 | os.system('git clone https://github.com/Tuhinshubhra/RED_HAWK') 119 | os.system('mv RED_HAWK {}'.format(homeDir)) 120 | echo('###### Done') 121 | backtomenu_option() 122 | 123 | def dtect(): 124 | echo(f"%%%%%%% Installing... D-TECT", foreground="vcyan") 125 | # secretum inc 126 | os.system('apt install python2 git') 127 | os.system('git clone https://github.com/bibortone/D-Tech') 128 | os.system('mv D-Tech {}/D-TECT'.format(homeDir)) 129 | echo('###### Done') 130 | backtomenu_option() 131 | 132 | def sqlmap(): 133 | echo(f"%%%%%%% Installing... sqlmap", foreground="vcyan") 134 | # secretum inc 135 | os.system('apt install git python2') 136 | os.system('git clone https://github.com/sqlmapproject/sqlmap') 137 | os.system('mv sqlmap {}'.format(homeDir)) 138 | echo('###### Done') 139 | backtomenu_option() 140 | 141 | def infoga(): 142 | echo(f"%%%%%%% Installing... Infoga", foreground="vcyan") 143 | # secretum inc 144 | os.system('apt install python2 git') 145 | os.system('python2 -m pip install requests urllib3 urlparse') 146 | os.system('git clone https://github.com/m4ll0k/Infoga') 147 | os.system('mv Infoga {}'.format(homeDir)) 148 | echo('###### Done') 149 | backtomenu_option() 150 | 151 | def reconDog(): 152 | echo(f"%%%%%%% Installing... ReconDog", foreground="vcyan") 153 | # secretum inc 154 | os.system('apt install python2 git') 155 | os.system('git clone https://github.com/s0md3v/ReconDog') 156 | os.system('mv ReconDog {}'.format(homeDir)) 157 | echo('###### Done') 158 | backtomenu_option() 159 | 160 | def androZenmap(): 161 | echo(f"%%%%%%% Installing... AndroZenmap", foreground="vcyan") 162 | # secretum inc 163 | os.system('apt install nmap curl') 164 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/androzenmap.sh') 165 | os.system('mkdir {}/AndroZenmap'.format(homeDir)) 166 | os.system('mv androzenmap.sh {}/AndroZenmap'.format(homeDir)) 167 | echo('###### Done') 168 | backtomenu_option() 169 | 170 | def sqlmate(): 171 | echo(f"%%%%%%% Installing... sqlmate", foreground="vcyan") 172 | # secretum inc 173 | os.system('apt install python2 git') 174 | os.system('python2 -m pip install mechanize bs4 HTMLparser argparse requests urlparse2') 175 | os.system('git clone https://github.com/s0md3v/sqlmate') 176 | os.system('mv sqlmate {}'.format(homeDir)) 177 | echo('###### Done') 178 | backtomenu_option() 179 | 180 | def astraNmap(): 181 | echo(f"%%%%%%% Installing... AstraNmap", foreground="vcyan") 182 | # secretum inc 183 | os.system('apt install git nmap') 184 | os.system('git clone https://github.com/Gameye98/AstraNmap') 185 | os.system('mv AstraNmap {}'.format(homeDir)) 186 | echo('###### Done') 187 | backtomenu_option() 188 | 189 | def weeman(): 190 | echo(f"%%%%%%% Installing... weeman", foreground="vcyan") 191 | # secretum inc 192 | os.system('apt install clang git python2') 193 | os.system('python2 -m pip bs4 html5lib lxml') 194 | os.system('git clone https://github.com/evait-security/weeman') 195 | os.system('mv weeman {}'.format(homeDir)) 196 | echo('###### Done') 197 | backtomenu_option() 198 | 199 | def easyMap(): 200 | echo(f"%%%%%%% Installing... Easymap", foreground="vcyan") 201 | # secretum inc 202 | os.system('apt install php git') 203 | os.system('git clone https://github.com/Cvar1984/Easymap') 204 | os.system('mv Easymap {}'.format(homeDir)) 205 | os.system('cd {}/Easymap && sh install.sh'.format(homeDir)) 206 | echo('###### Done') 207 | backtomenu_option() 208 | 209 | def xd3v(): 210 | echo(f"%%%%%%% Installing... XD3v", foreground="vcyan") 211 | # secretum inc 212 | os.system('apt install curl') 213 | os.system('curl -k -O https://gist.github.com/Gameye98/92035588bd0228df6fb7fa77a5f26bc2/raw/f8e73cd3d9f2a72bd536087bb6ba7bc8baef7d1d/xd3v.sh') 214 | os.system('mv xd3v.sh {0}/../usr/bin/xd3v && chmod +x {0}/../usr/bin/xd3v'.format(homeDir)) 215 | echo('###### Done') 216 | echo(f"###### Type 'xd3v' to start.") 217 | backtomenu_option() 218 | 219 | def crips(): 220 | echo(f"%%%%%%% Installing... Crips", foreground="vcyan") 221 | # secretum inxlc 222 | os.system("apt install git python2 openssl curl libcurl wget") 223 | os.system("git clone https://github.com/Manisso/Crips") 224 | os.system("mv Crips {}".format(homeDir)) 225 | echo('###### Done') 226 | backtomenu_option() 227 | 228 | def sir(): 229 | echo(f"%%%%%%% Installing... SIR", foreground="vcyan") 230 | # secretum inxlc 231 | os.system("apt install python2 git") 232 | os.system("python2 -m pip install bs4 urllib2") 233 | os.system("git clone https://github.com/AeonDave/sir.git") 234 | os.system("mv sir {}".format(homeDir)) 235 | echo('###### Done') 236 | backtomenu_option() 237 | 238 | def xshell(): 239 | echo(f"%%%%%%% Installing... Xshell", foreground="vcyan") 240 | # secretum inxlc 241 | os.system("apt install lynx python2 figlet ruby php nano w3m") 242 | os.system("git clone https://github.com/Ubaii/Xshell") 243 | os.system("mv Xshell {}".format(homeDir)) 244 | echo('###### Done') 245 | backtomenu_option() 246 | 247 | def evilURL(): 248 | echo(f"%%%%%%% Installing... EvilURL", foreground="vcyan") 249 | # secretum inxlc 250 | os.system("apt install git python2 python3") 251 | os.system("git clone https://github.com/UndeadSec/EvilURL") 252 | os.system("mv EvilURL {}".format(homeDir)) 253 | echo('###### Done') 254 | backtomenu_option() 255 | 256 | def striker(): 257 | echo(f"%%%%%%% Installing... Striker", foreground="vcyan") 258 | # secretum inc 259 | os.system('apt install git python2') 260 | os.system('git clone https://github.com/s0md3v/Striker') 261 | os.system('mv Striker {}'.format(homeDir)) 262 | os.system('cd {}/Striker && python2 -m pip install -r requirements.txt'.format(homeDir)) 263 | echo('###### Done') 264 | backtomenu_option() 265 | 266 | def dsss(): 267 | echo(f"%%%%%%% Installing... DSSS", foreground="vcyan") 268 | # secretum inc 269 | os.system('apt install python2 git') 270 | os.system('git clone https://github.com/stamparm/DSSS') 271 | os.system('mv DSSS {}'.format(homeDir)) 272 | echo('###### Done') 273 | backtomenu_option() 274 | 275 | def sqliv(): 276 | echo(f"%%%%%%% Installing... SQLiv", foreground="vcyan") 277 | # secretum inc 278 | os.system('apt install python2 git') 279 | os.system('git clone https://github.com/the-robot/sqliv') 280 | os.system('mv sqliv {}'.format(homeDir)) 281 | echo('###### Done') 282 | backtomenu_option() 283 | 284 | def sqlscan(): 285 | echo(f"%%%%%%% Installing... sqlscan", foreground="vcyan") 286 | # secretum inc 287 | os.system('apt install git php') 288 | os.system('git clone http://www.github.com/Cvar1984/sqlscan') 289 | os.system('mv sqlscan {}'.format(homeDir)) 290 | echo('###### Done') 291 | backtomenu_option() 292 | 293 | def wordpreSScan(): 294 | echo(f"%%%%%%% Installing... Wordpresscan", foreground="vcyan") 295 | # secretum inc 296 | os.system('apt install python2 python2-dev clang libxml2-dev libxml2-utils libxslt-dev') 297 | os.system('git clone https://github.com/swisskyrepo/Wordpresscan') 298 | os.system('mv Wordpresscan {}'.format(homeDir)) 299 | os.system('cd {}/Wordpresscan && python2 -m pip install -r requirements.txt'.format(homeDir)) 300 | echo('###### Done') 301 | backtomenu_option() 302 | 303 | def wpscan(): 304 | echo(f"%%%%%%% Installing... WPScan", foreground="vcyan") 305 | # secretum inc 306 | os.system('apt install git ruby curl') 307 | os.system('git clone https://github.com/wpscanteam/wpscan') 308 | os.system('mv wpscan {0} && cd {0}/wpscan'.format(homeDir)) 309 | os.system('gem install bundle && bundle config build.nokogiri --use-system-libraries && bundle install && ruby wpscan.rb --update') 310 | echo('###### Done') 311 | backtomenu_option() 312 | 313 | def wordpresscan(): 314 | echo(f"%%%%%%% Installing... wordpresscan(2)", foreground="vcyan") 315 | # secretum inc 316 | os.system('apt install nmap figlet git') 317 | os.system('git clone https://github.com/silverhat007/termux-wordpresscan') 318 | os.system('cd termux-wordpresscan && chmod +x * && sh install.sh') 319 | os.system('mv termux-wordpresscan {}'.format(homeDir)) 320 | echo('###### Done') 321 | echo(f"###### Type 'wordpresscan' to start.") 322 | backtomenu_option() 323 | 324 | def routersploit(): 325 | echo(f"%%%%%%% Installing... Routersploit", foreground="vcyan") 326 | # secretum inc 327 | os.system('apt install python2 git') 328 | os.system('python2 -m pip install requests') 329 | os.system('git clone https://github.com/threat9/routersploit') 330 | os.system('mv routersploit {0};cd {0}/routersploit;python2 -m pip install -r requirements.txt;termux-fix-shebang rsf.py'.format(homeDir)) 331 | echo('###### Done') 332 | backtomenu_option() 333 | 334 | def torshammer(): 335 | echo(f"%%%%%%% Installing... Torshammer", foreground="vcyan") 336 | # secretum inc 337 | os.system('apt install python2 git') 338 | os.system('git clone https://github.com/dotfighter/torshammer') 339 | os.system('mv torshammer {}'.format(homeDir)) 340 | echo('###### Done') 341 | backtomenu_option() 342 | 343 | def slowloris(): 344 | echo(f"%%%%%%% Installing... Slowloris", foreground="vcyan") 345 | # secretum inc 346 | os.system('apt install python2 git') 347 | os.system('git clone https://github.com/gkbrk/slowloris') 348 | os.system('mv slowloris {}'.format(homeDir)) 349 | echo('###### Done') 350 | backtomenu_option() 351 | 352 | def fl00d12(): 353 | echo(f"%%%%%%% Installing... Fl00d & Fl00d2", foreground="vcyan") 354 | # secretum inc 355 | os.system('apt install python2 curl') 356 | os.system('mkdir {}/fl00d'.format(homeDir)) 357 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/fl00d.py') 358 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/fl00d2.py') 359 | os.system('mv fl00d.py {0}/fl00d && mv fl00d2.py {0}/fl00d'.format(homeDir)) 360 | echo('###### Done') 361 | backtomenu_option() 362 | 363 | def goldeneye(): 364 | echo(f"%%%%%%% Installing... GoldenEye", foreground="vcyan") 365 | # secretum inc 366 | os.system('apt install git python2') 367 | os.system('git clone https://github.com/jseidl/GoldenEye') 368 | os.system('mv GoldenEye {}'.format(homeDir)) 369 | echo('###### Done') 370 | backtomenu_option() 371 | 372 | def xerxes(): 373 | echo(f"%%%%%%% Installing... Xerxes", foreground="vcyan") 374 | # secretum inc 375 | os.system('apt install git') 376 | os.system('apt install clang') 377 | os.system('git clone https://github.com/baraalmasri/xerxes') 378 | os.system('mv xerxes {}'.format(homeDir)) 379 | os.system('cd {}/xerxes && clang xerxes.c -o xerxes'.format(homeDir)) 380 | os.system('chmod 755 {0}/xerxes/xerxes && cp {0}/xerxes/xerxes $PREFIX/bin'.format(homeDir)) 381 | echo('###### Done') 382 | echo('###### Usage: xerxes ​www.fakesite.com​ 80') 383 | backtomenu_option() 384 | 385 | def planetwork_ddos(): 386 | echo(f"%%%%%%% Installing... Planetwork-DDOS", foreground="vcyan") 387 | # secretum inc 388 | os.system('apt install git python2') 389 | os.system('git clone https://github.com/Hydra7/Planetwork-DDOS') 390 | os.system('mv Planetwork-DDOS {}'.format(homeDir)) 391 | echo('###### Done') 392 | backtomenu_option() 393 | 394 | def hydra(): 395 | echo(f"%%%%%%% Installing... Hydra", foreground="vcyan") 396 | # secretum inc 397 | os.system('apt install hydra') 398 | echo('###### Done') 399 | backtomenu_option() 400 | 401 | def black_hydra(): 402 | echo(f"%%%%%%% Installing... Black Hydra", foreground="vcyan") 403 | # secretum inc 404 | os.system('apt install hydra git python2') 405 | os.system('git clone https://github.com/Gameye98/Black-Hydra') 406 | os.system('mv Black-Hydra {}'.format(homeDir)) 407 | echo('###### Done') 408 | backtomenu_option() 409 | 410 | def cupp(): 411 | echo(f"%%%%%%% Installing... Cupp", foreground="vcyan") 412 | # secretum inc 413 | os.system('apt install python2 git') 414 | os.system('git clone https://github.com/Mebus/cupp') 415 | os.system('mv cupp {}'.format(homeDir)) 416 | echo('###### Done') 417 | backtomenu_option() 418 | 419 | def asu(): 420 | echo(f"%%%%%%% Installing... ASU", foreground="vcyan") 421 | # secretum inc 422 | os.system('apt install git python2 php') 423 | os.system('python2 -m pip install requests bs4 mechanize') 424 | os.system('git clone https://github.com/LOoLzeC/ASU') 425 | os.system('mv ASU {}'.format(homeDir)) 426 | echo('###### Done') 427 | backtomenu_option() 428 | 429 | def hash_buster(): 430 | echo(f"%%%%%%% Installing... Hash-Buster", foreground="vcyan") 431 | # secretum inc 432 | os.system('apt install python2 git') 433 | os.system('git clone https://github.com/s0md3v/Hash-Buster') 434 | os.system('mv Hash-Buster {}'.format(homeDir)) 435 | echo('###### Done') 436 | backtomenu_option() 437 | 438 | def instaHack(): 439 | echo(f"%%%%%%% Installing... InstaHack", foreground="vcyan") 440 | # secretum inc 441 | os.system('apt install python2 git') 442 | os.system('python2 -m pip install requests') 443 | os.system('git clone https://github.com/Slayeri4/instahack') 444 | os.system('mv instahack {}'.format(homeDir)) 445 | echo('###### Done') 446 | backtomenu_option() 447 | 448 | def indonesian_wordlist(): 449 | echo(f"%%%%%%% Installing... indonesian-wordlist", foreground="vcyan") 450 | # secretum inc 451 | os.system('apt install git') 452 | os.system('git clone https://github.com/geovedi/indonesian-wordlist') 453 | os.system('mv indonesian-wordlist {}'.format(homeDir)) 454 | echo('###### Done') 455 | backtomenu_option() 456 | 457 | def fbBrute(): 458 | echo(f"%%%%%%% Installing... Facebook Brute Force 3", foreground="vcyan") 459 | # secretum inc 460 | os.system('apt install curl python2') 461 | os.system('python2 -m pip install mechanize') 462 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/facebook3.py') 463 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/wordlist/password.txt') 464 | os.system('mkdir {}/facebook-brute-3'.format(homeDir)) 465 | os.system('mv facebook3.py {0}/facebook-brute-3 && mv password.txt {0}/facebook-brute-3'.format(homeDir)) 466 | echo('###### Done') 467 | backtomenu_option() 468 | 469 | def webdav(): 470 | echo(f"%%%%%%% Installing... WebDAV", foreground="vcyan") 471 | # secretum inc 472 | os.system('apt install python2 openssl curl libcurl') 473 | os.system('python2 -m pip install urllib3 chardet certifi idna requests') 474 | os.system('mkdir {}/webdav'.format(homeDir)) 475 | os.system('curl -k -O https://pastebin.com/raw/HnVyQPtR;mv HnVyQPtR {}/webdav/webdav.py'.format(homeDir)) 476 | echo('###### Done') 477 | backtomenu_option() 478 | 479 | def webmassploit(): 480 | echo(f"%%%%%%% Installing... Webdav Mass Exploiter", foreground="vcyan") 481 | # secretum inxlc 482 | os.system("apt install python2 openssl curl libcurl") 483 | os.system("python2 -m pip install requests") 484 | os.system("curl -k -O https://pastebin.com/raw/K1VYVHxX && mv K1VYVHxX webdav.py") 485 | os.system("mkdir {0}/webdav-mass-exploit && mv webdav.py {0}/webdav-mass-exploit".format(homeDir)) 486 | echo('###### Done') 487 | backtomenu_option() 488 | 489 | def sqldump(): 490 | echo(f"%%%%%%% Installing... sqldump", foreground="vcyan") 491 | # secretum inc 492 | os.system('apt install python2 curl') 493 | os.system('python2 -m pip install google') 494 | os.system('curl -k -O https://gist.githubusercontent.com/Gameye98/76076c9a282a6f32749894d5368024a6/raw/6f9e754f2f81ab2b8efda30603dc8306c65bd651/sqldump.py') 495 | os.system('mkdir {0}/sqldump && chmod +x sqldump.py && mv sqldump.py {0}/sqldump'.format(homeDir)) 496 | echo('###### Done') 497 | backtomenu_option() 498 | 499 | def websploit(): 500 | echo(f"%%%%%%% Installing... Websploit", foreground="vcyan") 501 | # secretum inc 502 | os.system('apt install git python2') 503 | os.system('python2 -m pip install scapy') 504 | os.system('git clone https://github.com/The404Hacking/websploit') 505 | os.system('mv websploit {}'.format(homeDir)) 506 | echo('###### Done') 507 | backtomenu_option() 508 | 509 | def metasploit(): 510 | echo(f"%%%%%%% Installing... Metasploit", foreground="vcyan") 511 | # secretum inxlc 512 | os.system("apt install unstable-repo") 513 | os.system("cd {} && apt install metasploit".format(homeDir)) 514 | echo('###### Done') 515 | echo(f"###### Type 'msfconsole' to start.") 516 | backtomenu_option() 517 | 518 | def commix(): 519 | echo(f"%%%%%%% Installing... Commix", foreground="vcyan") 520 | # secretum inc 521 | os.system('apt install python2 git') 522 | os.system('git clone https://github.com/commixproject/commix') 523 | os.system('mv commix {}'.format(homeDir)) 524 | echo('###### Done') 525 | backtomenu_option() 526 | 527 | def brutal(): 528 | echo(f"%%%%%%% Installing... Brutal", foreground="vcyan") 529 | # secretum inc 530 | os.system('apt install git') 531 | os.system('git clone https://github.com/Screetsec/Brutal') 532 | os.system('mv Brutal {}'.format(homeDir)) 533 | echo('###### Done') 534 | backtomenu_option() 535 | 536 | def knockmail(): 537 | echo(f"%%%%%%% Installing... KnockMail", foreground="vcyan") 538 | # secretum inc 539 | os.system('apt install python2 git') 540 | os.system('python2 -m pip install validate_email pyDNS') 541 | os.system('git clone https://github.com/4w4k3/KnockMail') 542 | os.system('mv KnockMail {}'.format(homeDir)) 543 | echo('###### Done') 544 | backtomenu_option() 545 | 546 | def hac(): 547 | echo(f"%%%%%%% Installing... Hac", foreground="vcyan") 548 | # secretum inc 549 | os.system('apt install php git') 550 | os.system('git clone https://github.com/Cvar1984/Hac') 551 | os.system('mv Hac {}'.format(homeDir)) 552 | echo('###### Done') 553 | backtomenu_option() 554 | 555 | def rang3r(): 556 | echo(f"%%%%%%% Installing... Rang3r", foreground="vcyan") 557 | # secretum inxlc 558 | os.system("apt install git python2 && python2 -m pip install optparse termcolor") 559 | os.system("git clone https://github.com/floriankunushevci/rang3r") 560 | os.system("mv rang3r {}".format(homeDir)) 561 | echo('###### Done') 562 | backtomenu_option() 563 | 564 | def sh33ll(): 565 | echo(f"%%%%%%% Installing... SH33LL", foreground="vcyan") 566 | # secretum inxlc 567 | os.system("apt install git python2") 568 | os.system("git clone https://github.com/LOoLzeC/SH33LL") 569 | os.system("mv SH33LL {}".format(homeDir)) 570 | echo('###### Done') 571 | backtomenu_option() 572 | 573 | def social(): 574 | echo(f"%%%%%%% Installing... Social-Engineering", foreground="vcyan") 575 | # secretum inxlc 576 | os.system("apt install python2 perl") 577 | os.system("git clone https://github.com/LOoLzeC/social-engineering") 578 | os.system("mv social-engineering {}".format(homeDir)) 579 | echo('###### Done') 580 | backtomenu_option() 581 | 582 | def spiderbot(): 583 | echo(f"%%%%%%% Installing... SpiderBot", foreground="vcyan") 584 | # secretum inxlc 585 | os.system("apt install git php") 586 | os.system("git clone https://github.com/Cvar1984/SpiderBot") 587 | os.system("mv SpiderBot {}".format(homeDir)) 588 | echo('###### Done') 589 | backtomenu_option() 590 | 591 | def ngrok(): 592 | echo(f"%%%%%%% Installing... Ngrok", foreground="vcyan") 593 | # secretum inc 594 | os.system('apt install git') 595 | os.system('git clone https://github.com/themastersunil/ngrok') 596 | os.system('mv ngrok {}'.format(homeDir)) 597 | echo('###### Done') 598 | backtomenu_option() 599 | 600 | def sudo(): 601 | echo(f"%%%%%%% Installing... sudo", foreground="vcyan") 602 | # secretum inc 603 | os.system('apt install ncurses-utils git') 604 | os.system('git clone https://github.com/st42/termux-sudo') 605 | os.system('mv termux-sudo {0} && cd {0}/termux-sudo && chmod 777 *'.format(homeDir)) 606 | os.system('cat sudo > /data/data/com.termux/files/usr/bin/sudo') 607 | os.system('chmod 700 /data/data/com.termux/files/usr/bin/sudo') 608 | echo('###### Done') 609 | backtomenu_option() 610 | 611 | def ubuntu(): 612 | echo(f"%%%%%%% Installing... Ubuntu", foreground="vcyan") 613 | # secretum inc 614 | os.system('apt install python2 git') 615 | os.system('git clone https://github.com/Neo-Oli/termux-ubuntu') 616 | os.system('mv termux-ubuntu {0} && cd {0}/termux-ubuntu && bash ubuntu.sh'.format(homeDir)) 617 | echo('###### Done') 618 | backtomenu_option() 619 | 620 | def fedora(): 621 | echo(f"%%%%%%% Installing... Fedora", foreground="vcyan") 622 | # secretum inc 623 | os.system('apt install wget git') 624 | os.system('wget https://raw.githubusercontent.com/nmilosev/termux-fedora/master/termux-fedora.sh') 625 | os.system('mv termux-fedora.sh {}'.format(homeDir)) 626 | echo('###### Done') 627 | backtomenu_option() 628 | 629 | def nethunter(): 630 | echo(f"%%%%%%% Installing... Kali NetHunter", foreground="vcyan") 631 | # secretum inc 632 | os.system('apt install git') 633 | os.system('git clone https://github.com/Hax4us/Nethunter-In-Termux') 634 | os.system('mv Nethunter-In-Termux {}'.format(homeDir)) 635 | echo('###### Done') 636 | backtomenu_option() 637 | 638 | def blackbox(): 639 | echo(f"%%%%%%% Installing... BlackBox", foreground="vcyan") 640 | # secretum inc 641 | os.system('apt install python2 git && python2 -m pip install optparse passlib') 642 | os.system('git clone https://github.com/jothatron/blackbox') 643 | os.system('mv blackbox {}'.format(homeDir)) 644 | echo('###### Done') 645 | backtomenu_option() 646 | 647 | def xattacker(): 648 | echo(f"%%%%%%% Installing... XAttacker", foreground="vcyan") 649 | # secretum inc 650 | os.system('apt install git perl') 651 | os.system('cpnm install HTTP::Request') 652 | os.system('cpnm install LWP::Useragent') 653 | os.system('git clone https://github.com/Moham3dRiahi/XAttacker') 654 | os.system('mv XAttacker {}'.format(homeDir)) 655 | echo('###### Done') 656 | backtomenu_option() 657 | 658 | def vcrt(): 659 | echo(f"%%%%%%% Installing... VCRT", foreground="vcyan") 660 | # secretum inc 661 | os.system('apt install python2 git') 662 | os.system('git clone https://github.com/LOoLzeC/Evil-create-framework') 663 | os.system('mv Evil-create-framework {}'.format(homeDir)) 664 | echo('###### Done') 665 | backtomenu_option() 666 | 667 | def socfish(): 668 | echo(f"%%%%%%% Installing... SocialFish", foreground="vcyan") 669 | # secretum inc 670 | os.system('apt install python2 git && python2 -m pip install wget') 671 | os.system('git clone https://github.com/UndeadSec/SocialFish') 672 | os.system('mv SocialFish {}'.format(homeDir)) 673 | echo('###### Done') 674 | backtomenu_option() 675 | 676 | def ecode(): 677 | echo(f"%%%%%%% Installing... ECode", foreground="vcyan") 678 | # secretum inc 679 | os.system('apt install php git') 680 | os.system('git clone https://github.com/Cvar1984/Ecode') 681 | os.system('mv Ecode {}'.format(homeDir)) 682 | echo('###### Done') 683 | backtomenu_option() 684 | 685 | def xsstrike(): 686 | echo(f"%%%%%%% Installing... XSStrike", foreground="vcyan") 687 | # secretum inc 688 | os.system('apt install git python2') 689 | os.system('python2 -m pip install fuzzywuzzy prettytable mechanize HTMLParser') 690 | os.system('git clone https://github.com/s0md3v/XSStrike') 691 | os.system('mv XSStrike {}'.format(homeDir)) 692 | echo('###### Done') 693 | backtomenu_option() 694 | 695 | def breacher(): 696 | echo(f"%%%%%%% Installing... Breacher", foreground="vcyan") 697 | # secretum inc 698 | os.system('apt install git python2') 699 | os.system('python2 -m pip install requests argparse') 700 | os.system('git clone https://github.com/s0md3v/Breacher') 701 | os.system('mv Breacher {}'.format(homeDir)) 702 | echo('###### Done') 703 | backtomenu_option() 704 | 705 | def stylemux(): 706 | echo(f"%%%%%%% Installing... Termux-Styling", foreground="vcyan") 707 | # secretum inc 708 | os.system('apt install git') 709 | os.system('git clone https://github.com/BagazMukti/Termux-Styling-Shell-Script') 710 | os.system('mv Termux-Styling-Shell-Script {}'.format(homeDir)) 711 | echo('###### Done') 712 | backtomenu_option() 713 | 714 | def txtool(): 715 | echo(f"%%%%%%% Installing... TXTool", foreground="vcyan") 716 | # secretum inc 717 | os.system('apt install git python2 nmap php curl') 718 | os.system('python2 -m pip install requests') 719 | os.system('git clone https://github.com/kuburan/txtool') 720 | os.system('mv txtool {}'.format(homeDir)) 721 | echo('###### Done') 722 | backtomenu_option() 723 | 724 | def passgencvar(): 725 | echo(f"%%%%%%% Installing... PassGen", foreground="vcyan") 726 | # secretum inc 727 | os.system('apt install git php') 728 | os.system('git clone https://github.com/Cvar1984/PassGen') 729 | os.system('mv PassGen {}'.format(homeDir)) 730 | echo('###### Done') 731 | backtomenu_option() 732 | 733 | def owscan(): 734 | echo(f"%%%%%%% Installing... OWScan", foreground="vcyan") 735 | # secretum inc 736 | os.system('apt install git php') 737 | os.system('git clone https://github.com/Gameye98/OWScan') 738 | os.system('mv OWScan {}'.format(homeDir)) 739 | echo('###### Done') 740 | backtomenu_option() 741 | 742 | def sanlen(): 743 | echo(f"%%%%%%% Installing... santet-online", foreground="vcyan") 744 | # secretum inc 745 | os.system('apt install git python2 && python2 -m pip install requests') 746 | os.system('git clone https://github.com/Gameye98/santet-online') 747 | os.system('mv santet-online {}'.format(homeDir)) 748 | echo('###### Done') 749 | backtomenu_option() 750 | 751 | def spazsms(): 752 | echo(f"%%%%%%% Installing... SpazSMS", foreground="vcyan") 753 | # secretum inc 754 | os.system('apt install git python2 && python2 -m pip install requests') 755 | os.system('git clone https://github.com/Gameye98/SpazSMS') 756 | os.system('mv SpazSMS {}'.format(homeDir)) 757 | echo('###### Done') 758 | backtomenu_option() 759 | 760 | def hasher(): 761 | echo(f"%%%%%%% Installing... Hasher", foreground="vcyan") 762 | # secretum inc 763 | os.system('apt install git python2 && python2 -m pip install passlib binascii progressbar') 764 | os.system('git clone https://github.com/CiKu370/hasher') 765 | os.system('mv hasher {}'.format(homeDir)) 766 | echo('###### Done') 767 | backtomenu_option() 768 | 769 | def hashgenerator(): 770 | echo(f"%%%%%%% Installing... Hash-Generator", foreground="vcyan") 771 | # secretum inc 772 | os.system('apt install git python2 && python2 -m pip install passlib progressbar') 773 | os.system('git clone https://github.com/CiKu370/hash-generator') 774 | os.system('mv hash-generator {}'.format(homeDir)) 775 | echo('###### Done') 776 | backtomenu_option() 777 | 778 | def kodork(): 779 | echo(f"%%%%%%% Installing... ko-dork", foreground="vcyan") 780 | # secretum inc 781 | os.system('apt install git python2 && python2 -m pip install urllib2') 782 | os.system('git clone https://github.com/CiKu370/ko-dork') 783 | os.system('mv ko-dork {}'.format(homeDir)) 784 | echo('###### Done') 785 | backtomenu_option() 786 | 787 | def snitch(): 788 | echo(f"%%%%%%% Installing... snitch", foreground="vcyan") 789 | # secretum inc 790 | os.system('apt install git python2') 791 | os.system('git clone https://github.com/Smaash/snitch') 792 | os.system('mv snitch {}'.format(homeDir)) 793 | echo('###### Done') 794 | backtomenu_option() 795 | 796 | def osif(): 797 | echo(f"%%%%%%% Installing... OSIF", foreground="vcyan") 798 | # secretum inc 799 | os.system('apt install git python2') 800 | os.system('python2 -m pip install requests') 801 | os.system('git clone https://github.com/CiKu370/OSIF') 802 | os.system('mv OSIF {}'.format(homeDir)) 803 | echo('###### Done') 804 | backtomenu_option() 805 | 806 | def nk26(): 807 | echo(f"%%%%%%% Installing... nk26", foreground="vcyan") 808 | # secretum inc 809 | os.system('apt install git php') 810 | os.system('git clone https://github.com/milio48/nk26') 811 | os.system('mv nk26 {}'.format(homeDir)) 812 | echo('###### Done') 813 | backtomenu_option() 814 | 815 | def devploit(): 816 | echo(f"%%%%%%% Installing... Devploit", foreground="vcyan") 817 | # secretum inc 818 | os.system('apt install python2 git && python2 -m pip install urllib2') 819 | os.system('git clone https://github.com/joker25000/Devploit') 820 | os.system('mv Devploit {}'.format(homeDir)) 821 | echo('###### Done') 822 | backtomenu_option() 823 | 824 | def hasherdotid(): 825 | echo(f"%%%%%%% Installing... Hasherdotid", foreground="vcyan") 826 | # secretum inc 827 | os.system('apt install python2 git') 828 | os.system('git clone https://github.com/galauerscrew/hasherdotid') 829 | os.system('mv hasherdotid {}'.format(homeDir)) 830 | echo('###### Done') 831 | backtomenu_option() 832 | 833 | def namechk(): 834 | echo(f"%%%%%%% Installing... Namechk", foreground="vcyan") 835 | # secretum inc 836 | os.system('apt install git') 837 | os.system('git clone https://github.com/HA71/Namechk') 838 | os.system('mv Namechk {}'.format(homeDir)) 839 | echo('###### Done') 840 | backtomenu_option() 841 | 842 | def xlPy(): 843 | echo(f"%%%%%%% Installing... xl-py", foreground="vcyan") 844 | # secretum inc 845 | os.system('apt install python git') 846 | os.system('git clone https://github.com/albertoanggi/xl-py') 847 | os.system('mv xl-py {}'.format(homeDir)) 848 | echo('###### Done') 849 | backtomenu_option() 850 | 851 | def beanshell(): 852 | echo(f"%%%%%%% Installing... Beanshell", foreground="vcyan") 853 | # secretum inc 854 | os.system('apt install dpkg wget') 855 | os.system('wget https://github.com/amsitlab/amsitlab.github.io/raw/master/dists/termux/amsitlab/binary-all/beanshell_2.04_all.deb') 856 | os.system('dpkg -i beanshell_2.04_all.deb') 857 | os.system('rm beanshell_2.04_all.deb') 858 | echo('###### Done') 859 | echo(f"###### Type 'bsh' to start.") 860 | backtomenu_option() 861 | 862 | def crunch(): 863 | echo(f"%%%%%%% Installing... Crunch", foreground="vcyan") 864 | # secretum inc 865 | os.system('apt install unstable-repo') 866 | os.system('apt install crunch') 867 | echo(f"###### Done") 868 | echo(f"###### Type 'crunch' to start.") 869 | backtomenu_option() 870 | 871 | def binploit(): 872 | echo(f"%%%%%%% Installing... Binary Exploitation", foreground="vcyan") 873 | # secretum inc 874 | os.system('apt install unstable-repo') 875 | os.system('apt install gdb radare2 ired ddrescue bin-utils yasm strace ltrace cdb hexcurse memcached llvmdb') 876 | echo(f"###### Done") 877 | echo(f"###### Tutorial: https://youtu.be/3NTXFUxcKPc") 878 | backtomenu_option() 879 | 880 | def textr(): 881 | echo(f"%%%%%%% Installing... Textr", foreground="vcyan") 882 | # secretum inc 883 | os.system('apt install dpkg wget') 884 | os.system('wget https://raw.githubusercontent.com/amsitlab/textr/master/textr_1.0_all.deb') 885 | os.system('dpkg -i textr_1.0_all.deb') 886 | os.system('rm textr_1.0_all.deb') 887 | echo('###### Done') 888 | echo(f"###### Type 'textr' to start.") 889 | backtomenu_option() 890 | 891 | def apsca(): 892 | echo(f"%%%%%%% Installing... ApSca", foreground="vcyan") 893 | # secretum inc 894 | os.system('apt install dpkg wget') 895 | os.system('wget https://raw.githubusercontent.com/BlackHoleSecurity/apsca/master/apsca_0.1_all.deb') 896 | os.system('dpkg -i apsca_0.1_all.deb') 897 | os.system('rm apsca_0.1_all.deb') 898 | echo('###### Done') 899 | echo(f"###### Type 'apsca' to start.") 900 | backtomenu_option() 901 | 902 | def amox(): 903 | echo(f"%%%%%%% Installing... amox", foreground="vcyan") 904 | # secretum inc 905 | os.system('apt install dpkg wget') 906 | os.system('wget https://gitlab.com/dtlily/amox/raw/master/amox_1.0_all.deb') 907 | os.system('dpkg -i amox_1.0_all.deb') 908 | os.system('rm amox_1.0_all.deb') 909 | echo('###### Done') 910 | echo(f"###### Type 'amox' to start.") 911 | backtomenu_option() 912 | 913 | def fade(): 914 | echo(f"%%%%%%% Installing... FaDe", foreground="vcyan") 915 | # secretum inc 916 | os.system('apt install git python2 && python2 -m pip install requests') 917 | os.system('git clone https://github.com/Gameye98/FaDe') 918 | os.system('mv FaDe {}'.format(homeDir)) 919 | echo('###### Done') 920 | backtomenu_option() 921 | 922 | def ginf(): 923 | echo(f"%%%%%%% Installing... GINF", foreground="vcyan") 924 | # secretum inc 925 | os.system('apt install git php') 926 | os.system('git clone https://github.com/Gameye98/GINF') 927 | os.system('mv GINF {}'.format(homeDir)) 928 | echo('###### Done') 929 | backtomenu_option() 930 | 931 | def auxile(): 932 | echo(f"%%%%%%% Installing... AUXILE", foreground="vcyan") 933 | # secretum inc 934 | os.system('apt install git python2 && python2 -m pip install requests bs4 pexpect') 935 | os.system('git clone https://github.com/CiKu370/AUXILE') 936 | os.system('mv AUXILE {}'.format(homeDir)) 937 | echo('###### Done') 938 | backtomenu_option() 939 | 940 | def inther(): 941 | echo(f"%%%%%%% Installing... inther", foreground="vcyan") 942 | # secretum inc 943 | os.system('apt install git ruby') 944 | os.system('git clone https://github.com/Gameye98/inther') 945 | os.system('mv inther {}'.format(homeDir)) 946 | echo('###### Done') 947 | backtomenu_option() 948 | 949 | def hpb(): 950 | echo(f"%%%%%%% Installing... HPB", foreground="vcyan") 951 | # secretum inc 952 | os.system('apt install dpkg wget') 953 | os.system('wget https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/package/html_0.1_all.deb') 954 | os.system('dpkg -i html_0.1_all.deb') 955 | os.system('rm html_0.1_all.deb') 956 | echo('###### Done') 957 | echo(f"###### Type 'hpb' to start.") 958 | backtomenu_option() 959 | 960 | def fmbrute(): 961 | echo(f"%%%%%%% Installing... FMBrute", foreground="vcyan") 962 | # secretum inc 963 | os.system('apt install git python && python -m pip install requests') 964 | os.system('git clone https://github.com/Gameye98/FMBrute') 965 | os.system('mv FMBrute {}'.format(homeDir)) 966 | echo('###### Done') 967 | backtomenu_option() 968 | 969 | def hashid(): 970 | echo(f"%%%%%%% Installing... HashID", foreground="vcyan") 971 | # secretum inc 972 | os.system('apt install python2 && python2 -m pip install hashid') 973 | echo(f"###### Done") 974 | echo(f"###### Type 'hashid -h' to show usage of hashid") 975 | backtomenu_option() 976 | 977 | def gpstr(): 978 | echo(f"%%%%%%% Installing... GPS Tracking", foreground="vcyan") 979 | # secretum inc 980 | os.system('apt install php git') 981 | os.system('git clone https://github.com/indosecid/gps_tracking') 982 | os.system('mv gps_tracking {}'.format(homeDir)) 983 | echo(f"###### Done") 984 | backtomenu_option() 985 | 986 | def pret(): 987 | echo(f"%%%%%%% Installing... PRET", foreground="vcyan") 988 | # secretum inc 989 | os.system('apt install python2 imagemagick git') 990 | os.system('python2 -m pip install colorama pysnmp') 991 | os.system('git clone https://github.com/RUB-NDS/PRET') 992 | os.system('mv PRET {}'.format(homeDir)) 993 | echo(f"###### Done") 994 | backtomenu_option() 995 | 996 | def atlas(): 997 | echo(f"%%%%%%% Installing... Atlas", foreground="vcyan") 998 | # secretum inc 999 | os.system('apt install git python2 && python2 -m pip install urllib2') 1000 | os.system('git clone https://github.com/m4ll0k/Atlas') 1001 | os.system('mv Atlas {}'.format(homeDir)) 1002 | echo(f"###### Done") 1003 | backtomenu_option() 1004 | 1005 | def hashcat(): 1006 | echo(f"%%%%%%% Installing... Hashcat", foreground="vcyan") 1007 | # secretum inc 1008 | os.system('apt install unstable-repo') 1009 | os.system('apt install hashcat') 1010 | echo(f"###### Done") 1011 | echo(f"###### Type 'hashcat' to start.") 1012 | backtomenu_option() 1013 | 1014 | def liteotp(): 1015 | echo(f"%%%%%%% Installing... LiteOTP", foreground="vcyan") 1016 | # secretum inc 1017 | os.system('apt install php wget') 1018 | os.system('wget https://raw.githubusercontent.com/Cvar1984/LiteOTP/master/build/main.phar -O $PREFIX/bin/lite') 1019 | echo(f"###### Done") 1020 | echo(f"###### Type 'lite' to start.") 1021 | backtomenu_option() 1022 | 1023 | def fbbrutex(): 1024 | echo(f"%%%%%%% Installing... FBBrute", foreground="vcyan") 1025 | # secretum inc 1026 | os.system('apt install git python && python -m pip install requests') 1027 | os.system('git clone https://github.com/Gameye98/FBBrute') 1028 | os.system('mv FBBrute {}'.format(homeDir)) 1029 | echo('###### Done') 1030 | backtomenu_option() 1031 | 1032 | def fim(): 1033 | echo(f"%%%%%%% Installing... fim", foreground="vcyan") 1034 | # secretum inc 1035 | os.system('apt install git python && python -m pip install requests bs4') 1036 | os.system('git clone https://github.com/karjok/fim') 1037 | os.system('mv fim {}'.format(homeDir)) 1038 | echo('###### Done') 1039 | backtomenu_option() 1040 | 1041 | def rshell(): 1042 | echo(f"%%%%%%% Installing... RShell", foreground="vcyan") 1043 | # secretum inc 1044 | os.system('apt install git python && python -m pip install colorama') 1045 | os.system('git clone https://github.com/Jishu-Epic/RShell') 1046 | os.system('mv RShell {}'.format(homeDir)) 1047 | echo('###### Done') 1048 | backtomenu_option() 1049 | 1050 | def termpyter(): 1051 | echo(f"%%%%%%% Installing... TermPyter", foreground="vcyan") 1052 | # secretum inc 1053 | os.system('apt install git python') 1054 | os.system('git clone https://github.com/Jishu-Epic/TermPyter') 1055 | os.system('mv TermPyter {}'.format(homeDir)) 1056 | echo('###### Done') 1057 | backtomenu_option() 1058 | 1059 | def maxsubdofinder(): 1060 | echo(f"%%%%%%% Installing... MaxSubdoFinder", foreground="vcyan") 1061 | # secretum inc 1062 | os.system('apt install git python2') 1063 | os.system('python2 -m pip install requests') 1064 | os.system('git clone https://github.com/maxteroit/MaxSubdoFinder') 1065 | os.system('mv MaxSubdoFinder {}'.format(homeDir)) 1066 | echo('###### Done') 1067 | backtomenu_option() 1068 | 1069 | def jadx(): 1070 | echo(f"%%%%%%% Installing... jadx", foreground="vcyan") 1071 | # secretum inc 1072 | os.system('apt install dpkg wget') 1073 | os.system('wget https://github.com/Lexiie/Termux-Jadx/blob/master/jadx-0.6.1_all.deb?raw=true') 1074 | os.system('dpkg -i jadx-0.6.1_all.deb?raw=true') 1075 | os.system('rm -rf jadx-0.6.1_all.deb?raw=true') 1076 | echo('###### Done') 1077 | echo(f"###### Type 'jadx' to start.") 1078 | backtomenu_option() 1079 | 1080 | def pwnedornot(): 1081 | echo(f"%%%%%%% Installing... pwnedOrNot", foreground="vcyan") 1082 | # secretum inc 1083 | os.system('apt install git python') 1084 | os.system('python -m pip install requests') 1085 | os.system('git clone https://github.com/thewhiteh4t/pwnedOrNot') 1086 | os.system('mv pwnedOrNot {}'.format(homeDir)) 1087 | echo('###### Done') 1088 | backtomenu_option() 1089 | 1090 | def maclook(): 1091 | echo(f"%%%%%%% Installing... Mac-Lookup", foreground="vcyan") 1092 | # secretum inc 1093 | os.system('apt install git python') 1094 | os.system('python -m pip install requests') 1095 | os.system('git clone https://github.com/T4P4N/Mac-Lookup') 1096 | os.system('mv Mac-Lookup {}'.format(homeDir)) 1097 | echo('###### Done') 1098 | backtomenu_option() 1099 | 1100 | def f4k3(): 1101 | echo(f"%%%%%%% Installing... F4K3", foreground="vcyan") 1102 | # secretum inc 1103 | os.system('apt install dpkg wget') 1104 | os.system('wget https://github.com/Gameye98/Gameye98.github.io/blob/master/package/f4k3_1.0_all.deb') 1105 | os.system('dpkg -i f4k3_1.0_all.deb') 1106 | os.system('rm -rf f4k3_1.0_all.deb') 1107 | echo('###### Done') 1108 | echo(f"###### Type 'f4k3' to start.") 1109 | backtomenu_option() 1110 | 1111 | def katak(): 1112 | echo(f"%%%%%%% Installing... Katak", foreground="vcyan") 1113 | # secretum inc 1114 | os.system('apt install git python2') 1115 | os.system('python2 -m pip install requests progressbar') 1116 | os.system('git clone https://github.com/Gameye98/Katak') 1117 | os.system('mv Katak {}'.format(homeDir)) 1118 | echo('###### Done') 1119 | backtomenu_option() 1120 | 1121 | def heroku(): 1122 | echo(f"%%%%%%% Installing... heroku", foreground="vcyan") 1123 | # secretum inc 1124 | os.system('apt install nodejs') 1125 | os.system('npm install heroku -g') 1126 | echo('###### Done') 1127 | echo(f"###### Type 'heroku' to start.") 1128 | backtomenu_option() 1129 | 1130 | def google(): 1131 | echo(f"%%%%%%% Installing... google", foreground="vcyan") 1132 | # secretum inc 1133 | os.system('apt install python') 1134 | os.system('python -m pip install google') 1135 | echo('###### Done') 1136 | echo(f"###### Type 'google' to start.") 1137 | backtomenu_option() 1138 | 1139 | def billcypher(): 1140 | echo(f"%%%%%%% Installing... BillCypher", foreground="vcyan") 1141 | # secretum inc 1142 | os.system('apt install git python') 1143 | os.system('python -m pip install argparse dnspython requests urllib3 colorama') 1144 | os.system('git clone https://github.com/GitHackTools/BillCipher') 1145 | os.system('mv BillCypher {}'.format(homeDir)) 1146 | echo('###### Done') 1147 | backtomenu_option() 1148 | 1149 | def vbug(): 1150 | echo(f"%%%%%%% Installing... vbug", foreground="vcyan") 1151 | # secretum inc 1152 | os.system('apt install git python2') 1153 | os.system('git clone https://github.com/Gameye98/vbug') 1154 | os.system('mv vbug {}'.format(homeDir)) 1155 | echo('###### Done') 1156 | backtomenu_option() 1157 | 1158 | def kojawafft(): 1159 | echo(f"%%%%%%% Installing... kojawafft", foreground="vcyan") 1160 | # secretum inc 1161 | os.system('apt install git nodejs') 1162 | os.system('git clone https://github.com/sandalpenyok/kojawafft') 1163 | os.system('mv kojawafft {}'.format(homeDir)) 1164 | os.system('cd $HOME/kojawafft && unzip node_modules.zip && cd -') 1165 | echo('###### Done') 1166 | backtomenu_option() 1167 | 1168 | def aircrackng(): 1169 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted"); 1170 | else: 1171 | echo(f"%%%%%%% Installing... aircrack-ng", foreground="vcyan") 1172 | # secretum inc 1173 | os.system('apt install root-repo aircrack-ng') 1174 | echo('###### Done') 1175 | echo(f"###### Type 'aircrack-ng' to start.") 1176 | backtomenu_option() 1177 | 1178 | def ettercap(): 1179 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted"); 1180 | else: 1181 | echo(f"%%%%%%% Installing... ettercap", foreground="vcyan") 1182 | # secretum inc 1183 | os.system('apt install root-repo ettercap') 1184 | echo('###### Done') 1185 | echo(f"###### Type 'ettercap' to start.") 1186 | backtomenu_option() 1187 | 1188 | def ccgen(): 1189 | echo(f"%%%%%%% Installing... ccgen", foreground="vcyan") 1190 | # secretum inc 1191 | os.system('apt install git python') 1192 | os.system('git clone https://github.com/Gameye98/ccgen') 1193 | os.system('mv ccgen {}'.format(homeDir)) 1194 | echo('###### Done') 1195 | backtomenu_option() 1196 | 1197 | def ddcrypt(): 1198 | echo(f"%%%%%%% Installing... ddcrypt", foreground="vcyan") 1199 | # secretum inc 1200 | os.system('apt install git python') 1201 | os.system('git clone https://github.com/Gameye98/ddcrypt') 1202 | os.system('mv ddcrypt {}'.format(homeDir)) 1203 | echo('###### Done') 1204 | backtomenu_option() 1205 | 1206 | def dnsrecon(): 1207 | echo(f"%%%%%%% Installing... dnsrecon", foreground="vcyan") 1208 | # secretum inc 1209 | os.system('apt install git python') 1210 | os.system('git clone https://github.com/darkoperator/dnsrecon') 1211 | os.system('python -m pip install -r dnsrecon/requirements.txt') 1212 | os.system('mv dnsrecon {}'.format(homeDir)) 1213 | echo('###### Done') 1214 | backtomenu_option() 1215 | 1216 | def zphisher(): 1217 | echo(f"%%%%%%% Installing... zphisher", foreground="vcyan") 1218 | # secretum inc 1219 | os.system('apt install git php openssh curl') 1220 | os.system('git clone https://github.com/htr-tech/zphisher') 1221 | os.system('mv zphisher {}'.format(homeDir)) 1222 | echo('###### Done') 1223 | backtomenu_option() 1224 | 1225 | def apktool(): 1226 | echo(f"%%%%%%% Installing... apktool", foreground="vcyan") 1227 | # secretum inc 1228 | os.system('apt install git dpkg') 1229 | os.system('git clone https://github.com/Lexiie/Termux-Apktool') 1230 | os.system('mv Termux-Apktool {}'.format(homeDir)) 1231 | os.system('cd {}/Termux-Apktool && dpkg -i *.deb'.format(homeDir)) 1232 | echo('###### Done') 1233 | echo(f"###### Type 'apktool' to start.") 1234 | backtomenu_option() 1235 | 1236 | def uncompyle(): 1237 | echo(f"%%%%%%% Installing... uncompyle6", foreground="vcyan") 1238 | # secretum inc 1239 | os.system('apt install python python2') 1240 | os.system('python2 -m pip install uncompyle6') 1241 | os.system('mv $PREFIX/bin/uncompyle6 $PREFIX/bin/uncompyle') 1242 | os.system('python -m pip install uncompyle6') 1243 | echo('###### Done') 1244 | echo('###### (py2) Usage: uncompyle') 1245 | echo('###### (py3) Usage: uncompyle6') 1246 | backtomenu_option() 1247 | 1248 | def wifite(): 1249 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted"); 1250 | else: 1251 | echo(f"%%%%%%% Installing... Wifite", foreground="vcyan") 1252 | # secretum inc 1253 | os.system('apt install git python2') 1254 | os.system('git clone https://github.com/derv82/wifite') 1255 | os.system('mv wifite {}'.format(homeDir)) 1256 | echo('###### Done') 1257 | backtomenu_option() 1258 | 1259 | def parrot(): 1260 | echo(f"%%%%%%% Installing... Parrot", foreground="vcyan") 1261 | # secretum inc 1262 | os.system('apt install wget openssl-tool proot -y && hash -r && cd {} && wget https://raw.githubusercontent.com/AndronixApp/AndronixOrigin/master/Installer/Parrot/parrot.sh && bash parrot.sh'.format(homeDir)) 1263 | os.system('cd {} && bash start-parrot.sh'.format(homeDir)) 1264 | echo('###### Done') 1265 | echo('###### Make sure visit: https://techriz.com/how-to-install-parrot-linux-on-android-without-root/') 1266 | os.system('am start -a android.intent.action.VIEW -d "https://techriz.com/how-to-install-parrot-linux-on-android-without-root/"') 1267 | backtomenu_option() 1268 | 1269 | def archlinux(): 1270 | echo(f"%%%%%%% Installing... Arch Linux", foreground="vcyan") 1271 | # secretum inc 1272 | os.system('apt install git') 1273 | os.system('cd $HOME && git clone https://github.com/sdrausty/TermuxArch') 1274 | os.system('cd $HOME && bash TermuxArch/setupTermuxArch.sh') 1275 | echo('###### Done') 1276 | backtomenu_option() 1277 | 1278 | def tshark(): 1279 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted"); 1280 | else: 1281 | echo(f"%%%%%%% Installing... tshark", foreground="vcyan") 1282 | # secretum inc 1283 | os.system('apt install root-repo tshark') 1284 | echo('###### Done') 1285 | echo(f"###### Type 'tshark' to start.") 1286 | backtomenu_option() 1287 | 1288 | def dos2unix(): 1289 | echo(f"%%%%%%% Installing... dos2unix", foreground="vcyan") 1290 | # secretum inc 1291 | os.system('apt install dos2unix') 1292 | echo('###### Done') 1293 | echo(f"###### Type 'dos2unix' to start.") 1294 | backtomenu_option() 1295 | 1296 | def exiftool(): 1297 | echo(f"%%%%%%% Installing... exiftool", foreground="vcyan") 1298 | # secretum inc 1299 | os.system('apt install exiftool') 1300 | echo('###### Done') 1301 | echo(f"###### Type 'exiftool' to start.") 1302 | backtomenu_option() 1303 | 1304 | def iconv(): 1305 | echo(f"%%%%%%% Installing... iconv", foreground="vcyan") 1306 | # secretum inc 1307 | os.system('apt install iconv') 1308 | echo('###### Done') 1309 | echo(f"###### Type 'iconv' to start.") 1310 | backtomenu_option() 1311 | 1312 | def mediainfo(): 1313 | echo(f"%%%%%%% Installing... mediainfo", foreground="vcyan") 1314 | # secretum inc 1315 | os.system('apt install mediainfo') 1316 | echo('###### Done') 1317 | echo('###### Usage: mediainfo filename.pdf') 1318 | backtomenu_option() 1319 | 1320 | def pdfinfo(): 1321 | echo(f"%%%%%%% Installing... pdfinfo", foreground="vcyan") 1322 | # secretum inc 1323 | os.system('apt install poppler') 1324 | echo('###### Done') 1325 | echo('###### Usage: pdfinfo filename.pdf') 1326 | backtomenu_option() 1327 | 1328 | def tcpdump(): 1329 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted"); 1330 | else: 1331 | echo(f"%%%%%%% Installing... tcpdump", foreground="vcyan") 1332 | # secretum inc 1333 | os.system('apt install root-repo tcpdump') 1334 | echo('###### Done') 1335 | echo(f"###### Type 'tcpdump' to start.") 1336 | backtomenu_option() 1337 | 1338 | def hping3(): 1339 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted"); 1340 | else: 1341 | echo(f"%%%%%%% Installing... hping3", foreground="vcyan") 1342 | # secretum inc 1343 | os.system('apt install root-repo hping3') 1344 | echo('###### Done') 1345 | echo(f"###### Type 'hping3' to start.") 1346 | backtomenu_option() 1347 | 1348 | def dbdat(): 1349 | echo(f"%%%%%%% Installing... DbDat", foreground="vcyan") 1350 | # secretum inc 1351 | os.system('apt install git python2') 1352 | os.system('python2 -m pip install MySQL-python psycopg2 cx_Oracle pymssql ibm_db pymongo pyyaml couchdb') 1353 | os.system('git clone https://github.com/foospidy/DbDat') 1354 | os.system('mv DbDat {}'.format(homeDir)) 1355 | echo('###### Done') 1356 | backtomenu_option() 1357 | 1358 | def nosqlmap(): 1359 | echo(f"%%%%%%% Installing... NoSQLMap", foreground="vcyan") 1360 | # secretum inc 1361 | os.system('apt install git python2 unstable-repo metasploit') 1362 | os.system('python2 -m pip install pymongo httplib2') 1363 | os.system('git clone https://github.com/codingo/NoSQLMap') 1364 | os.system('mv NoSQLMap {}'.format(homeDir)) 1365 | echo('###### Done') 1366 | backtomenu_option() 1367 | 1368 | def audit_couchdb(): 1369 | echo(f"%%%%%%% Installing... audit_couchdb", foreground="vcyan") 1370 | # secretum inc 1371 | os.system('apt install git nodejs') 1372 | os.system('npm install -g npm@next audit_couchdb') 1373 | os.system('git clone https://github.com/iriscouch/audit_couchdb') 1374 | os.system('mv audit_couchdb {}'.format(homeDir)) 1375 | echo('###### Done') 1376 | echo('###### Usage: audit_couchdb https://admin:secret@localhost:5984') 1377 | backtomenu_option() 1378 | 1379 | def mongoaudit(): 1380 | echo(f"%%%%%%% Installing... mongoaudit", foreground="vcyan") 1381 | # secretum inc 1382 | os.system('apt install git python -y') 1383 | os.system('python -m pip install pymongo mongoaudit') 1384 | echo('###### Done') 1385 | echo(f"###### Type 'mongoaudit' to start.") 1386 | backtomenu_option() 1387 | 1388 | def wifiphisher(): 1389 | echo(f"%%%%%%% Installing... Wifiphisher", foreground="vcyan") 1390 | # secretum inc 1391 | os.system('apt install git python -y') 1392 | os.system('python -m pip install setuptools scapy') 1393 | os.system('git clone https://github.com/wifiphisher/wifiphisher') 1394 | os.system('mv wifiphisher {0} && cd {0}/wifiphisher && python setup.py install'.format(homeDir)) 1395 | echo('###### Done') 1396 | backtomenu_option() 1397 | 1398 | def sherlock(): 1399 | echo(f"%%%%%%% Installing... sherlock", foreground="vcyan") 1400 | # secretum inc 1401 | os.system('apt install git python -y') 1402 | os.system('git clone https://github.com/sherlock-project/sherlock') 1403 | os.system('mv sherlock {0} && cd {0}/sherlock && python -m pip install -r requirements.txt'.format(homeDir)) 1404 | echo('###### Done') 1405 | backtomenu_option() 1406 | 1407 | def shc(): 1408 | echo(f"%%%%%%% Installing... shc", foreground="vcyan") 1409 | # secretum inc 1410 | os.system('apt install shc -y') 1411 | echo('###### Done') 1412 | echo(f"###### Type 'shc' to start.") 1413 | backtomenu_option() 1414 | 1415 | def steghide(): 1416 | echo(f"%%%%%%% Installing... steghide", foreground="vcyan") 1417 | # secretum inc 1418 | os.system('apt install steghide -y') 1419 | echo('###### Done') 1420 | echo(f"###### Type 'steghide' to start.") 1421 | backtomenu_option() 1422 | 1423 | def tesseract(): 1424 | echo(f"%%%%%%% Installing... tesseract", foreground="vcyan") 1425 | # secretum inc 1426 | os.system('apt install tesseract -y') 1427 | echo('###### Done') 1428 | echo(f"###### Type 'tesseract' to start.") 1429 | backtomenu_option() 1430 | 1431 | def sleuthkit(): 1432 | echo(f"%%%%%%% Installing... sleuthkit", foreground="vcyan") 1433 | # secretum inc 1434 | os.system('apt install sleuthkit -y') 1435 | echo('###### Done') 1436 | echo(f"###### Type 'pkg files sleuthkit | grep usr/bin' to check executable file related to sleuthkit package.") 1437 | backtomenu_option() 1438 | 1439 | def octave(): 1440 | echo(f"%%%%%%% Installing... Octave", foreground="vcyan") 1441 | # secretum inc 1442 | if not repo_check("pointless.list"): 1443 | pointless_repo() 1444 | os.system('apt install octave -y') 1445 | echo('###### Done') 1446 | echo(f"###### Type 'octave' to start.") 1447 | backtomenu_option() 1448 | 1449 | def fpcompiler(): 1450 | echo(f"%%%%%%% Installing... fp-compiler", foreground="vcyan") 1451 | # secretum inc 1452 | if not repo_check("pointless.list"): 1453 | pointless_repo() 1454 | os.system('apt install fp-compiler -y') 1455 | echo('###### Done') 1456 | echo(f"###### Type 'fpc' to start.") 1457 | backtomenu_option() 1458 | 1459 | def numpy(): 1460 | echo(f"%%%%%%% Installing... numpy", foreground="vcyan") 1461 | # secretum inc 1462 | if not repo_check("pointless.list"): 1463 | pointless_repo() 1464 | os.system('apt install numpy -y') 1465 | echo('###### Done') 1466 | echo(f"###### Type 'pkg files numpy | grep usr/bin' to check executable file related to numpy package.") 1467 | backtomenu_option() 1468 | 1469 | def userrecon(): 1470 | echo(f"%%%%%%% Installing... userrecon", foreground="vcyan") 1471 | # secretum inc 1472 | os.system('apt install wget dpkg curl -y') 1473 | os.system('wget https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/package/userrecon_1.0_all.deb') 1474 | os.system('dpkg -i userrecon_1.0_all.deb') 1475 | os.system('rm userrecon_1.0_all.deb') 1476 | echo('###### Done') 1477 | echo(f"###### Type 'userrecon' to start.") 1478 | backtomenu_option() 1479 | 1480 | def mrsip(): 1481 | echo(f"%%%%%%% Installing... Mr.SIP", foreground="vcyan") 1482 | # secretum inc 1483 | os.system('apt install git python -y') 1484 | os.system('python -m pip install netifaces ipaddress scapy pyfiglet') 1485 | os.system('git clone https://github.com/meliht/Mr.SIP') 1486 | os.system('mv Mr.SIP {}'.format(homeDir)) 1487 | echo('###### Done') 1488 | backtomenu_option() 1489 | 1490 | def tmscanner(): 1491 | echo(f"%%%%%%% Installing... TM-scanner", foreground="vcyan") 1492 | # secretum inc 1493 | os.system('apt install python python2 nmap git -y') 1494 | os.system('python -m pip install colorama requests') 1495 | os.system('python2 -m pip install colorama requests') 1496 | os.system('git clone https://github.com/TechnicalMujeeb/TM-scanner') 1497 | os.system('mv TM-scanner {}'.format(homeDir)) 1498 | echo('###### Done') 1499 | backtomenu_option() 1500 | 1501 | def xss_payload_list(): 1502 | echo(f"%%%%%%% Installing... xss-payload-list", foreground="vcyan") 1503 | # secretum inc 1504 | os.system('apt install git -y') 1505 | os.system('git clone https://github.com/payloadbox/xss-payload-list') 1506 | os.system('mv xss-payload-list {}'.format(homeDir)) 1507 | echo('###### Done') 1508 | backtomenu_option() 1509 | 1510 | def clickbot(): 1511 | echo(f"%%%%%%% Installing... ClickBot", foreground="vcyan") 1512 | # secretum inc 1513 | os.system('apt install python git -y') 1514 | os.system('git clone https://github.com/ziziwho/clickbot') 1515 | os.system("python -m pip install asyncio colorama telethon rsa pyaes asyncio async_generator colorama bs4 requests") 1516 | os.system('mv clickbot {}'.format(homeDir)) 1517 | echo('###### Done') 1518 | backtomenu_option() 1519 | 1520 | def phoneinfoga(): 1521 | echo(f"%%%%%%% Installing... PhoneInfoga", foreground="vcyan") 1522 | # secretum inc 1523 | os.system('apt install python git -y') 1524 | os.system('git clone https://github.com/ExpertAnonymous/PhoneInfoga') 1525 | os.chdir("PhoneInfoga") 1526 | os.system("python -m pip install -r requirements.txt") 1527 | os.chdir("..") 1528 | os.system('mv PhoneInfoga {}'.format(homeDir)) 1529 | echo('###### Done') 1530 | backtomenu_option() 1531 | 1532 | def btc2idr(): 1533 | echo(f"%%%%%%% Installing... BTC-to-IDR-checker", foreground="vcyan") 1534 | # secretum inc 1535 | os.system('apt install python git -y') 1536 | os.system('git clone https://github.com/guruku/BTC-to-IDR-checker') 1537 | os.system('mv BTC-to-IDR-checker {}'.format(homeDir)) 1538 | echo('###### Done') 1539 | backtomenu_option() 1540 | 1541 | def sitebroker(): 1542 | echo(f"%%%%%%% Installing... SiteBroker", foreground="vcyan") 1543 | # secretum inc 1544 | os.system('apt install python php git -y') 1545 | os.system('git clone https://github.com/Anon-Exploiter/SiteBroker') 1546 | os.chdir("SiteBroker") 1547 | os.system('python -m pip install -r requirements.txt') 1548 | os.system('python -m pip install html5lib') 1549 | os.chdir("..") 1550 | os.system('mv SiteBroker {}'.format(homeDir)) 1551 | echo('###### Done') 1552 | backtomenu_option() 1553 | 1554 | def dostattack(): 1555 | echo(f"%%%%%%% Installing... dost-attack", foreground="vcyan") 1556 | # secretum inc 1557 | os.system('apt install git -y') 1558 | os.system('git clone https://github.com/verluchie/dost-attack') 1559 | os.system('mv dost-attack {}'.format(homeDir)) 1560 | echo('###### Done') 1561 | backtomenu_option() 1562 | 1563 | def cfr(): 1564 | echo(f"%%%%%%% Installing... CFR", foreground="vcyan") 1565 | # secretum inc 1566 | os.system('apt install dx wget -y') 1567 | os.system('mkdir $PREFIX/bin/lib') 1568 | os.system('wget https://www.benf.org/other/cfr/cfr-0.151.jar -O $PREFIX/bin/lib/cfr-0.151.jar') 1569 | os.chdir(prefix+"/bin/lib") 1570 | os.system('dx --dex --output=cfr-0.151.dex cfr-0.151.jar') 1571 | with open(prefix+"/bin/cfr","w") as f: 1572 | f.write("#!/usr/bin/bash\n") 1573 | f.write("dalvikvm -cp $PREFIX/bin/lib/cfr-0.151.dex org/benf/cfr/reader/Main \"$@\"") 1574 | os.system('chmod 755 $PREFIX/bin/cfr') 1575 | os.system('chmod 755 $PREFIX/bin/lib/cfr-0.151.dex') 1576 | os.chdir(current_dir) 1577 | echo('###### Done') 1578 | echo(f"###### Type 'cfr' to start.") 1579 | backtomenu_option() 1580 | 1581 | def upx(): 1582 | echo(f"%%%%%%% Installing... UPX", foreground="vcyan") 1583 | # secretum inc 1584 | os.system('apt install wget tar -y') 1585 | os.system('wget https://github.com/upx/upx/releases/download/v3.96/upx-3.96-arm64_linux.tar.xz') 1586 | os.system('tar xf upx-3.96-arm64_linux.tar.xz') 1587 | os.system('mv upx-3.96-arm64_linux/upx $PREFIX/bin/upx') 1588 | os.system('rm -rf upx-3.96-arm64_linux upx-3.96-arm64_linux.tar.xz') 1589 | os.system('chmod 755 $PREFIX/bin/upx') 1590 | echo('###### Done') 1591 | echo(f"###### Type 'upx' to start.") 1592 | backtomenu_option() 1593 | 1594 | def pyinstxtractor(): 1595 | echo(f"%%%%%%% Installing... pyinstxtractor", foreground="vcyan") 1596 | # secretum inc 1597 | os.system('apt install git python -y') 1598 | os.system('git clone https://github.com/extremecoders-re/pyinstxtractor') 1599 | os.system('mv pyinstxtractor {}'.format(homeDir)) 1600 | echo('###### Done') 1601 | backtomenu_option() 1602 | 1603 | def innoextract(): 1604 | echo(f"%%%%%%% Installing... innoextract", foreground="vcyan") 1605 | # secretum inc 1606 | os.system('apt install git clang -y') 1607 | os.system('git clone https://github.com/dscharrer/innoextract') 1608 | os.chdir("innoextract") 1609 | os.system('mkdir -p build') 1610 | os.chdir("build") 1611 | os.system('cmake .. && make') 1612 | os.system('mv innoextract $PREFIX/bin && chmod 755 $PREFIX/bin/innoextract') 1613 | os.chdir(current_dir) 1614 | os.system('rm -rf innoextract') 1615 | echo('###### Done') 1616 | echo(f"###### Type 'innoextract' to start.") 1617 | backtomenu_option() 1618 | 1619 | def lynis(): 1620 | echo(f"%%%%%%% Installing... Lynis", foreground="vcyan") 1621 | # secretum inc 1622 | os.system('apt install git -y') 1623 | os.system('git clone https://github.com/CISOfy/lynis') 1624 | os.system('mv lynis {}'.format(homeDir)) 1625 | echo('###### Done') 1626 | backtomenu_option() 1627 | 1628 | def chkrootkit(): 1629 | echo(f"%%%%%%% Installing... Chkrootkit", foreground="vcyan") 1630 | # secretum inc 1631 | os.system('apt install clang git -y') 1632 | os.system('git clone https://github.com/Magentron/chkrootkit') 1633 | os.system('mv chkrootkit {}'.format(homeDir)) 1634 | echo('###### Done') 1635 | backtomenu_option() 1636 | 1637 | def clamav(): 1638 | echo(f"%%%%%%% Installing... ClamAV", foreground="vcyan") 1639 | # secretum inc 1640 | os.system('apt install clamav -y') 1641 | os.system('freshclam') 1642 | echo('###### Done') 1643 | echo(f"###### Type 'clamscan' to start.") 1644 | backtomenu_option() 1645 | 1646 | def yara(): 1647 | echo(f"%%%%%%% Installing... Yara", foreground="vcyan") 1648 | # secretum inc 1649 | os.system('apt install yara -y') 1650 | echo('###### Done') 1651 | echo(f"###### Type 'yara' to start.") 1652 | backtomenu_option() 1653 | 1654 | def virustotal(): 1655 | echo(f"%%%%%%% Installing... VirusTotal-CLI", foreground="vcyan") 1656 | # secretum inc 1657 | os.system('apt install virustotal-cli -y') 1658 | echo('###### Done') 1659 | echo(f"###### Type 'vt' to start.") 1660 | backtomenu_option() 1661 | 1662 | def maigret(): 1663 | echo(f"%%%%%%% Installing... maigret", foreground="vcyan") 1664 | # secretum inc 1665 | os.system('apt install python -y') 1666 | os.system('python -m pip install maigret') 1667 | echo('###### Done') 1668 | echo(f"###### Usage: maigret ") 1669 | echo(f"###### Usage: maigret -h") 1670 | backtomenu_option() 1671 | 1672 | def xplsearch(): 1673 | echo(f"%%%%%%% Installing... XPL-SEARCH", foreground="vcyan") 1674 | # secretum inc 1675 | os.system('apt install git php -y') 1676 | os.system('git clone https://github.com/r00tmars/XPL-SEARCH') 1677 | os.system('mv XPL-SEARCH {}'.format(homeDir)) 1678 | echo('###### Done') 1679 | backtomenu_option() 1680 | 1681 | def xadmin(): 1682 | echo(f"%%%%%%% Installing... Xadmin", foreground="vcyan") 1683 | # secretum inc 1684 | os.system('apt install git perl -y') 1685 | os.system('git clone https://github.com/Manisso/Xadmin') 1686 | os.system('mv Xadmin {}'.format(homeDir)) 1687 | echo('###### Done') 1688 | backtomenu_option() 1689 | 1690 | def credmap(): 1691 | echo(f"%%%%%%% Installing... Credmap", foreground="vcyan") 1692 | # secretum inc 1693 | os.system('apt install git python2 -y') 1694 | os.system('git clone https://github.com/lightos/credmap') 1695 | os.system('mv credmap {}'.format(homeDir)) 1696 | echo('###### Done') 1697 | backtomenu_option() 1698 | 1699 | def mapeye(): 1700 | echo(f"%%%%%%% Installing... MapEye", foreground="vcyan") 1701 | # secretum inc 1702 | os.system('apt install git php python -y') 1703 | os.system('python -m pip install requests') 1704 | os.system('git clone https://github.com/bhikandeshmukh/MapEye') 1705 | os.system('mv MapEye {}'.format(homeDir)) 1706 | echo('###### Done') 1707 | backtomenu_option() 1708 | 1709 | def gathetool(): 1710 | echo(f"%%%%%%% Installing... GatheTOOL", foreground="vcyan") 1711 | # secretum inc 1712 | os.system('apt install git php python -y') 1713 | os.system('python -m pip install requests') 1714 | os.system('git clone https://github.com/AngelSecurityTeam/GatheTOOL') 1715 | os.system('mv GatheTOOL {}'.format(homeDir)) 1716 | echo('###### Done') 1717 | backtomenu_option() 1718 | 1719 | def avpass(): 1720 | echo(f"%%%%%%% Installing... avpass", foreground="vcyan") 1721 | # secretum inc 1722 | os.system('apt install git python2 python -y') 1723 | os.system('git clone https://github.com/sslab-gatech/avpass') 1724 | os.system('mv avpass {}'.format(homeDir)) 1725 | echo('###### Done') 1726 | backtomenu_option() 1727 | 1728 | def binwalk(): 1729 | echo(f"%%%%%%% Installing... binwalk", foreground="vcyan") 1730 | # secretum inc 1731 | if not repo_check("pointless.list"): 1732 | pointless_repo() 1733 | os.system('apt install gzip bzip2 tar arj lhasa p7zip cabextract sleuthkit lzop mtd-utils cmake build-essential make numpy scipy python git -y') 1734 | os.system('git clone https://github.com/ReFirmLabs/binwalk') 1735 | os.chdir("binwalk") 1736 | os.system('python setup.py install') 1737 | os.chdir("..") 1738 | os.system('mv binwalk {}'.format(homeDir)) 1739 | echo('###### Done') 1740 | echo(f"###### Type 'binwalk' to start.") 1741 | backtomenu_option() 1742 | 1743 | def arat(): 1744 | echo(f"%%%%%%% Installing... A-Rat", foreground="vcyan") 1745 | # secretum inc 1746 | os.system('apt install python git -y') 1747 | os.system('git clone https://github.com/RexTheGod/A-Rat') 1748 | os.system('mv A-Rat {}'.format(homeDir)) 1749 | echo('###### Done') 1750 | backtomenu_option() 1751 | 1752 | def adbtk(): 1753 | echo(f"%%%%%%% Installing... ADB-Toolkit", foreground="vcyan") 1754 | # secretum inc 1755 | os.system('apt install git -y') 1756 | os.system('git clone https://github.com/ASHWIN990/ADB-Toolkit') 1757 | os.system('mv ADB-Toolkit {}'.format(homeDir)) 1758 | echo('###### Done') 1759 | backtomenu_option() 1760 | 1761 | def androbugs(): 1762 | echo(f"%%%%%%% Installing... AndroBugs_Framework", foreground="vcyan") 1763 | # secretum inc 1764 | os.system('apt install git python2 -y') 1765 | os.system('python2 -m pip install pymongo') 1766 | os.system('git clone https://github.com/AndroBugs/AndroBugs_Framework') 1767 | os.system('mv AndroBugs_Framework {}'.format(homeDir)) 1768 | echo('###### Done') 1769 | backtomenu_option() 1770 | 1771 | def tekdefense(): 1772 | echo(f"%%%%%%% Installing... TekDefense-Automater", foreground="vcyan") 1773 | # secretum inc 1774 | os.system('apt install git python2 -y') 1775 | os.system('python2 -m pip install requests') 1776 | os.system('git clone https://github.com/1aN0rmus/TekDefense-Automater') 1777 | os.system('mv TekDefense-Automater {}'.format(homeDir)) 1778 | echo('###### Done') 1779 | backtomenu_option() 1780 | 1781 | def baf(): 1782 | echo(f"%%%%%%% Installing... BAF", foreground="vcyan") 1783 | # secretum inc 1784 | os.system('apt install git python2 -y') 1785 | os.system('python2 -m pip install requests bs4 selenium colored termcolor') 1786 | os.system('git clone https://github.com/engMaher/BAF') 1787 | os.system('mv BAF {}'.format(homeDir)) 1788 | echo('###### Done') 1789 | backtomenu_option() 1790 | 1791 | def brutex(): 1792 | echo(f"%%%%%%% Installing... BruteX", foreground="vcyan") 1793 | # secretum inc 1794 | os.system('apt install git hydra -y') 1795 | os.system('git clone https://github.com/1N3/BruteX') 1796 | os.system('mv BruteX {}'.format(homeDir)) 1797 | echo('###### Done') 1798 | backtomenu_option() 1799 | 1800 | def cmseek(): 1801 | echo(f"%%%%%%% Installing... CMSeeK", foreground="vcyan") 1802 | # secretum inc 1803 | os.system('apt install git python -y') 1804 | os.system('python -m pip install requests') 1805 | os.system('git clone https://github.com/Tuhinshubhra/CMSeeK') 1806 | os.system('mv CMSeeK {}'.format(homeDir)) 1807 | echo('###### Done') 1808 | backtomenu_option() 1809 | 1810 | ### Compiler/Interpreter 1811 | def python2(): 1812 | echo(f"%%%%%%% Installing... Python2", foreground="vcyan") 1813 | # secretum inc 1814 | os.system('apt install python2 -y') 1815 | echo('###### Done') 1816 | echo(f"###### Type 'python2' to start.") 1817 | backtomenu_option() 1818 | 1819 | def ecj(): 1820 | echo(f"%%%%%%% Installing... ecj", foreground="vcyan") 1821 | # secretum inc 1822 | os.system('apt install ecj -y') 1823 | echo('###### Done') 1824 | echo(f"###### Type 'ecj' to start.") 1825 | backtomenu_option() 1826 | 1827 | def golang(): 1828 | echo(f"%%%%%%% Installing... Golang", foreground="vcyan") 1829 | # secretum inc 1830 | os.system('apt install golang -y') 1831 | echo('###### Done') 1832 | echo(f"###### Type 'go' to start.") 1833 | backtomenu_option() 1834 | 1835 | def ldc(): 1836 | echo(f"%%%%%%% Installing... ldc", foreground="vcyan") 1837 | # secretum inc 1838 | os.system('apt install ldc -y') 1839 | echo('###### Done') 1840 | echo(f"###### Type 'ldc2' to start.") 1841 | backtomenu_option() 1842 | 1843 | def nim(): 1844 | echo(f"%%%%%%% Installing... Nim", foreground="vcyan") 1845 | # secretum inc 1846 | os.system('apt install nim -y') 1847 | echo('###### Done') 1848 | echo(f"###### Type 'nim' to start.") 1849 | backtomenu_option() 1850 | 1851 | def shc(): 1852 | echo(f"%%%%%%% Installing... shc", foreground="vcyan") 1853 | # secretum inc 1854 | os.system('apt install shc -y') 1855 | echo('###### Done') 1856 | echo(f"###### Type 'shc' to start.") 1857 | backtomenu_option() 1858 | 1859 | def tcc(): 1860 | echo(f"%%%%%%% Installing... TCC", foreground="vcyan") 1861 | # secretum inc 1862 | os.system('apt install tcc -y') 1863 | echo('###### Done') 1864 | echo(f"###### Type 'tcc' to start.") 1865 | backtomenu_option() 1866 | 1867 | def php(): 1868 | echo(f"%%%%%%% Installing... PHP", foreground="vcyan") 1869 | # secretum inc 1870 | os.system('apt install php -y') 1871 | echo('###### Done') 1872 | echo(f"###### Type 'php' to start.") 1873 | backtomenu_option() 1874 | 1875 | def ruby(): 1876 | echo(f"%%%%%%% Installing... Ruby", foreground="vcyan") 1877 | # secretum inc 1878 | os.system('apt install ruby -y') 1879 | echo('###### Done') 1880 | echo(f"###### Type 'ruby' to start.") 1881 | backtomenu_option() 1882 | 1883 | def perl(): 1884 | echo(f"%%%%%%% Installing... Perl", foreground="vcyan") 1885 | # secretum inc 1886 | os.system('apt install perl -y') 1887 | echo('###### Done') 1888 | echo(f"###### Type 'perl' to start.") 1889 | backtomenu_option() 1890 | 1891 | def vlang(): 1892 | echo(f"%%%%%%% Installing... Vlang", foreground="vcyan") 1893 | # secretum inc 1894 | os.system('apt install vlang -y') 1895 | echo('###### Done') 1896 | echo(f"###### Type 'vlang' to start.") 1897 | backtomenu_option() 1898 | 1899 | def blogc(): 1900 | echo(f"%%%%%%% Installing... BlogC", foreground="vcyan") 1901 | # secretum inc 1902 | os.system('apt install blogc -y') 1903 | echo('###### Done') 1904 | echo(f"###### Type 'blogc' to start.") 1905 | backtomenu_option() 1906 | 1907 | ### termux games 1908 | def street_car(): 1909 | echo(f"%%%%%%% Installing... street-car", foreground="vcyan") 1910 | # secretum inc 1911 | os.system('apt install git python python2 -y') 1912 | os.system('git clone https://github.com/JustaHackers/street_car') 1913 | os.system('mv street_car {}'.format(homeDir)) 1914 | echo('###### Done') 1915 | backtomenu_option() 1916 | 1917 | def flappy_bird(): 1918 | echo(f"%%%%%%% Installing... flappy-bird", foreground="vcyan") 1919 | # secretum inc 1920 | os.system('apt install git python2 -y') 1921 | os.system('git clone https://github.com/JustAHackers/flappy_bird') 1922 | os.system('mv flappy_bird {}'.format(homeDir)) 1923 | echo('###### Done') 1924 | backtomenu_option() 1925 | 1926 | def speed_typing(): 1927 | echo(f"%%%%%%% Installing... Speed Typing", foreground="vcyan") 1928 | # secretum inc 1929 | os.system('apt install git python2 -y') 1930 | os.system('git clone https://github.com/JustAHackers/typing-speed-test') 1931 | os.system('mv typing-speed-test {}'.format(homeDir)) 1932 | echo('###### Done') 1933 | backtomenu_option() 1934 | 1935 | def nsnake(): 1936 | echo(f"%%%%%%% Installing... nsnake", foreground="vcyan") 1937 | # secretum inc 1938 | os.system('apt install nsnake -y') 1939 | echo('###### Done') 1940 | echo(f"###### Type 'nsnake' to start.") 1941 | backtomenu_option() 1942 | 1943 | def nudoku(): 1944 | echo(f"%%%%%%% Installing... Sudoku", foreground="vcyan") 1945 | # secretum inc 1946 | os.system('apt install nudoku -y') 1947 | echo('###### Done') 1948 | echo(f"###### Type 'nudoku' to start.") 1949 | backtomenu_option() 1950 | 1951 | def moon_buggy(): 1952 | echo(f"%%%%%%% Installing... Moon-Buggy", foreground="vcyan") 1953 | # secretum inc 1954 | os.system('apt install moon-buggy -y') 1955 | echo('###### Done') 1956 | echo(f"###### Type 'moon-buggy' to start.") 1957 | backtomenu_option() 1958 | 1959 | def ttysolitaire(): 1960 | echo(f"%%%%%%% Installing... tty-solitaire", foreground="vcyan") 1961 | # secretum inc 1962 | os.system('apt install tty-solitaire -y') 1963 | echo('###### Done') 1964 | echo(f"###### Type 'ttysolitaire' to start.") 1965 | backtomenu_option() 1966 | 1967 | def pacman4console(): 1968 | echo(f"%%%%%%% Installing... Pacman4Console", foreground="vcyan") 1969 | # secretum inc 1970 | os.system('apt install pacman4console -y') 1971 | echo('###### Done') 1972 | echo(f"###### Type 'pacman' to start.") 1973 | backtomenu_option() 1974 | 1975 | ### bash function --- 1976 | def fbvid(): 1977 | echo(f"%%%%%%% Installing... fbvid", foreground="vcyan") 1978 | # secretum inc 1979 | os.system('apt install python ffmpeg -y') 1980 | os.system('python -m pip install youtube-dl') 1981 | fbvid_code = open(".myshfunc/fbvid.sh","r").read() 1982 | open(os.getenv("HOME")+"/.bashrc","a").write(fbvid_code) 1983 | os.system('source '+os.getenv("HOME")+"/.bashrc") 1984 | echo('###### Done') 1985 | echo('###### Usage: fbvid "POST_URL"') 1986 | backtomenu_option() 1987 | 1988 | def cast2video(): 1989 | echo(f"%%%%%%% Installing... cast2video", foreground="vcyan") 1990 | # secretum inc 1991 | os.system('apt install clang python ffmpeg -y') 1992 | os.system('python -m pip install CPython ttygif') 1993 | cast2video_code = open(".myshfunc/cast2video.sh","r").read() 1994 | open(os.getenv("HOME")+"/.bashrc","a").write(cast2video_code) 1995 | os.system('source '+os.getenv("HOME")+"/.bashrc") 1996 | echo('###### Done') 1997 | echo('###### Usage: cast2video file.cast') 1998 | backtomenu_option() 1999 | 2000 | def iconset(): 2001 | echo(f"%%%%%%% Installing... iconset", foreground="vcyan") 2002 | iconset_code = open(".myshfunc/iconset.sh","r").read() 2003 | open(os.getenv("HOME")+"/.bashrc","a").write(iconset_code) 2004 | os.system('source '+os.getenv("HOME")+"/.bashrc") 2005 | echo('###### Done') 2006 | echo('###### Usage: iconset project_name icon.png') 2007 | backtomenu_option() 2008 | 2009 | def readme(): 2010 | echo(f"%%%%%%% Installing... readme", foreground="vcyan") 2011 | # secretum inc 2012 | os.system('apt install curl -y') 2013 | readme_code = open(".myshfunc/readme.sh","r").read() 2014 | open(os.getenv("HOME")+"/.bashrc","a").write(readme_code) 2015 | os.system('source '+os.getenv("HOME")+"/.bashrc") 2016 | echo('###### Done') 2017 | echo('###### Usage: readme User/Repo') 2018 | backtomenu_option() 2019 | 2020 | def makedeb(): 2021 | echo(f"%%%%%%% Installing... makedeb", foreground="vcyan") 2022 | # secretum inc 2023 | os.system('apt install dpkg neovim -y') 2024 | makedeb_code = open(".myshfunc/makedeb.sh","r").read() 2025 | open(os.getenv("HOME")+"/.bashrc","a").write(makedeb_code) 2026 | os.system('source '+os.getenv("HOME")+"/.bashrc") 2027 | echo('###### Done') 2028 | echo('###### Usage: makedeb') 2029 | backtomenu_option() 2030 | 2031 | def quikfind(): 2032 | echo(f"%%%%%%% Installing... quikfind", foreground="vcyan") 2033 | quikfind_code = open(".myshfunc/quikfind.sh","r").read() 2034 | open(os.getenv("HOME")+"/.bashrc","a").write(quikfind_code) 2035 | os.system('source '+os.getenv("HOME")+"/.bashrc") 2036 | echo('###### Done') 2037 | echo('###### Usage: quikfind') 2038 | backtomenu_option() 2039 | 2040 | def pranayama(): 2041 | echo(f"%%%%%%% Installing... pranayama", foreground="vcyan") 2042 | # secretum inc 2043 | os.system('apt install termux-api -y') 2044 | pranayama_code = open(".myshfunc/pranayama.sh","r").read() 2045 | open(os.getenv("HOME")+"/.bashrc","a").write(pranayama_code) 2046 | os.system('source '+os.getenv("HOME")+"./bashrc") 2047 | echo('###### Done') 2048 | echo('###### Usage: pranayama') 2049 | echo('###### or') 2050 | echo('###### pranayama [n]') 2051 | backtomenu_option() 2052 | 2053 | def sqlc(): 2054 | echo(f"%%%%%%% Installing... sqlc", foreground="vcyan") 2055 | # secretum inc 2056 | os.system('apt install python sqlite3 -y') 2057 | sqlc_code = open(".myshfunc/sqlc.sh","r").read() 2058 | open(os.getenv("HOME")+"/.bashrc","a").write(sqlc_code) 2059 | os.system('source '+os.getenv("HOME")+"/.bashrc") 2060 | echo('###### Done') 2061 | echo('###### Usage: sqlc db_file sql_script') 2062 | backtomenu_option() 2063 | -------------------------------------------------------------------------------- /src/debonair/kickstart: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env bash 2 | #!/data/data/com.termux/files/usr/bin/sh 3 | 4 | # Get some needed tools. coreutils for mkdir command, gnugp for the signing key, and apt-transport-https to actually connect to the repo 5 | apt-get update 6 | apt-get --assume-yes install coreutils gnupg 7 | # Make the sources.list.d directory 8 | mkdir -p $PREFIX/etc/apt/sources.list.d 9 | # Write the needed source file 10 | if apt-cache policy | grep -q "termux.*24\|termux.org\|bintray.*24\|k51qzi5uqu5dg9vawh923wejqffxiu9bhqlze5f508msk0h7ylpac27fdgaskx" ; then 11 | echo "deb https://its-pointless.github.io/files/24 termux extras" > $PREFIX/etc/apt/sources.list.d/pointless.list 12 | else 13 | echo "deb https://its-pointless.github.io/files/21 termux extras" > $PREFIX/etc/apt/sources.list.d/pointless.list 14 | fi 15 | # Add signing key from https://its-pointless.github.io/pointless.gpg 16 | if [ -n $(command -v curl) ]; then 17 | curl -sLo $PREFIX/etc/apt/trusted.gpg.d/pointless.gpg --create-dirs https://its-pointless.github.io/pointless.gpg 18 | elif [ -n $(command -v wget) ]; then 19 | wget -qP $PREFIX/etc/apt/trusted.gpg.d https://its-pointless.github.io/pointless.gpg 20 | fi 21 | # Update apt 22 | apt update 23 | -------------------------------------------------------------------------------- /src/debonair/uninstall.py: -------------------------------------------------------------------------------- 1 | import quo 2 | os.system("cd /etc/ && rm -rf debonair_ && cd /usr/bin && rm -rf dbnr && rm -rf debonair") 3 | quo.flair(f"Debonair has been uninstalled", foreground="vred", bold=True) 4 | -------------------------------------------------------------------------------- /start.py: -------------------------------------------------------------------------------- 1 | import os 2 | import sys 3 | import quo 4 | import readline 5 | from time import sleep as timeout 6 | from src.debonair.core import * 7 | 8 | @command() 9 | @app("--list", help="--list contains the homepage section") 10 | def main(list): 11 | banner() 12 | echo(f" [01] Information Gathering", foreground="vred", bold=True) 13 | echo(f" [02] Vulnerability Analysis", foreground="vblue", bold=True) 14 | echo(f" [03] Web Hacking", foreground="vyellow", bold=True) 15 | echo(f" [04] Database Assessment", foreground="vgreen", bold=True) 16 | echo(f" [05] Password Attacks",foreground="vwhite", bold=True) 17 | echo(f" [06] Wireless Attacks", foreground="vcyan", bold=True) 18 | echo(f" [07] Reverse Engineering", foreground="vmagenta", bold=True) 19 | echo(f" [08] Exploitation Tools", foreground=(165, 42, 42), bold=True) 20 | echo(f" [09] Sniffing and Spoofing", foreground=(0, 128, 128), bold=True) 21 | echo(f" [10] Reporting Tools", foreground=(128, 128, 0), bold=True) 22 | echo(f" [11] Forensic Tools", foreground=(210, 105, 30), bold=True) 23 | echo(f" [12] Stress Testing", foreground=(188, 143, 143), bold=True) 24 | echo(f" [13] Install Linux Distro", foreground=(65, 105, 225), bold=True) 25 | echo(f" [14] Termux Utility", foreground=(255, 127, 80), bold=True) 26 | echo(f" [15] Shell Function [.bashrc]", bold=True) 27 | echo(f" [16] Install CLI Games", foreground=(255, 215, 0), bold=True) 28 | echo(f" [17] Malware Analysis", foreground=(175, 238, 238), bold=True) 29 | echo(f" [18] Compiler/Interpreter", foreground=(127, 255, 212), bold=True) 30 | echo(f" [19] Social Engineering Tools", foreground=(255, 20, 147), bold=True) 31 | echo(f" [00] Exit Debonair", foreground="black", background="yellow", bold=True) 32 | debonair = prompt("@dbnr >> install ") 33 | 34 | # 01 - Information Gathering 35 | if debonair.strip() == "1" or debonair.strip() == "01": 36 | print("\n [01] Nmap: Utility for network discovery and security auditing") 37 | print(" [02] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling") 38 | print(" [03] D-TECT: All-In-One Tool for Penetration Testing") 39 | print(" [04] sqlmap: Automatic SQL injection and database takeover tool") 40 | print(" [05] Infoga: Tool for Gathering Email Accounts Informations") 41 | print(" [06] ReconDog: Information Gathering and Vulnerability Scanner tool") 42 | print(" [07] AndroZenmap") 43 | print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap") 44 | print(" [09] AstraNmap: Security scanner used to find hosts and services on a computer network") 45 | print(" [10] MapEye: Accurate GPS Location Tracker (Android, IOS, Windows phones)") 46 | print(" [11] Easymap: Nmap Shortcut") 47 | print(" [12] BlackBox: A Penetration Testing Framework") 48 | print(" [13] XD3v: Powerful tool that lets you know all the essential details about your phone") 49 | print(" [14] Crips: This Tools is a collection of online IP Tools that can be used to quickly get information about IP Address's, Web Pages and DNS records") 50 | print(" [15] SIR: Resolve from the net the last known ip of a Skype Name") 51 | print(" [16] EvilURL: Generate unicode evil domains for IDN Homograph Attack and detect them") 52 | print(" [17] Striker: Recon & Vulnerability Scanning Suite") 53 | print(" [18] Xshell: ToolKit") 54 | print(" [19] OWScan: OVID Web Scanner") 55 | print(" [20] OSIF: Open Source Information Facebook") 56 | print(" [21] Devploit: Simple Information Gathering Tool") 57 | print(" [22] Namechk: Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks") 58 | print(" [23] AUXILE: Web Application Analysis Framework") 59 | print(" [24] inther: Information gathering using shodan, censys and hackertarget") 60 | print(" [25] GINF: GitHub Information Gathering Tool") 61 | print(" [26] GPS Tracking") 62 | print(" [27] ASU: Facebook Hacking ToolKit") 63 | print(" [28] fim: Facebook Image Downloader") 64 | print(" [29] MaxSubdoFinder: Tool for Discovering Subdomain") 65 | print(" [30] pwnedOrNot: OSINT Tool for Finding Passwords of Compromised Email Accounts") 66 | print(" [31] Mac-Lookup: Finds information about a Particular Mac address") 67 | print(" [32] BillCipher: Information Gathering tool for a Website or IP address") 68 | print(" [33] dnsrecon: Security assessment and network troubleshooting") 69 | print(" [34] zphisher: Automated Phishing Tool") 70 | print(" [35] Mr.SIP: SIP-Based Audit and Attack Tool") 71 | print(" [36] Sherlock: Hunt down social media accounts by username") 72 | print(" [37] userrecon: Find usernames across over 75 social networks") 73 | print(" [38] PhoneInfoga: One of the most advanced tools to scan phone numbers using only free resources") 74 | print(" [39] SiteBroker: A cross-platform python based utility for information gathering and penetration testing automation") 75 | print(" [40] maigret: Collect a dossier on a person by username from thousands of sites") 76 | print(" [41] GatheTOOL: Information Gathering - API hackertarget.com") 77 | print(" [42] ADB-ToolKit") 78 | print(" [43] TekDefense-Automater: Automater - IP URL and MD5 OSINT Analysis") 79 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 80 | infogathering = prompt("@dbnr >> install ") 81 | if infogathering == "@": 82 | infogathering = "" 83 | for x in range(1,201): 84 | infogathering += f"{x} " 85 | if len(infogathering.split()) > 1: 86 | writeStatus(1) 87 | # © Gerrishon Sirere 88 | # Secretum Inc 89 | for infox in infogathering.split(): 90 | if infox.strip() == "01" or infox.strip() == "1": nmap() 91 | elif infox.strip() == "02" or infox.strip() == "2": red_hawk() 92 | elif infox.strip() == "03" or infox.strip() == "3": dtect() 93 | elif infox.strip() == "04" or infox.strip() == "4": sqlmap() 94 | elif infox.strip() == "05" or infox.strip() == "5": infoga() 95 | elif infox.strip() == "06" or infox.strip() == "6": reconDog() 96 | elif infox.strip() == "07" or infox.strip() == "7": androZenmap() 97 | elif infox.strip() == "08" or infox.strip() == "8": sqlmate() 98 | elif infox.strip() == "09" or infox.strip() == "9": astraNmap() 99 | elif infox.strip() == "10": mapeye() 100 | elif infox.strip() == "11": easyMap() 101 | elif infox.strip() == "12": blackbox() 102 | elif infox.strip() == "13": xd3v() 103 | elif infox.strip() == "14": crips() 104 | elif infox.strip() == "15": sir() 105 | elif infox.strip() == "16": evilURL() 106 | elif infox.strip() == "17": striker() 107 | elif infox.strip() == "18": xshell() 108 | elif infox.strip() == "19": owscan() 109 | elif infox.strip() == "20": osif() 110 | elif infox.strip() == "21": devploit() 111 | elif infox.strip() == "22": namechk() 112 | elif infox.strip() == "23": auxile() 113 | elif infox.strip() == "24": inther() 114 | elif infox.strip() == "25": ginf() 115 | elif infox.strip() == "26": gpstr() 116 | elif infox.strip() == "27": asu() 117 | elif infox.strip() == "28": fim() 118 | elif infox.strip() == "29": maxsubdofinder() 119 | elif infox.strip() == "30": pwnedOrNot() 120 | elif infox.strip() == "31": maclook() 121 | elif infox.strip() == "32": billcypher() 122 | elif infox.strip() == "33": dnsrecon() 123 | elif infox.strip() == "34": zphisher() 124 | elif infox.strip() == "35": mrsip() 125 | elif infox.strip() == "36": sherlock() 126 | elif infox.strip() == "37": userrecon() 127 | elif infox.strip() == "38": phoneinfoga() 128 | elif infox.strip() == "39": sitebroker() 129 | elif infox.strip() == "40": maigret() 130 | elif infox.strip() == "41": gathetool() 131 | elif infox.strip() == "42": adbtk() 132 | elif infox.strip() == "43": tekdefense() 133 | elif infox.strip() == "00" or infox.strip() == "0": restart_program() 134 | else: echo(f"ERROR: Wrong Input", foreground="red", bold=True);timeout(1);restart_program() 135 | if readStatus(): 136 | writeStatus(0) 137 | 138 | # 02 - Vulnerability Analysis 139 | elif debonair.strip() == "2" or debonair.strip() == "02": 140 | print("\n [01] Nmap: Utility for network discovery and security auditing") 141 | print(" [02] AndroZenmap") 142 | print(" [03] AstraNmap: Security scanner used to find hosts and services on a computer network") 143 | print(" [04] Easymap: Nmap Shortcut") 144 | print(" [05] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling") 145 | print(" [06] D-TECT: All-In-One Tool for Penetration Testing") 146 | print(" [07] Damn Small SQLi Scanner: A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code") 147 | print(" [08] SQLiv: massive SQL injection vulnerability scanner") 148 | print(" [09] sqlmap: Automatic SQL injection and database takeover tool") 149 | print(" [10] sqlscan: Quick SQL Scanner, Dorker, Webshell injector PHP") 150 | print(" [11] Wordpresscan: WPScan rewritten in Python + some WPSeku ideas") 151 | print(" [12] WPScan: Free wordPress security scanner") 152 | print(" [13] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap") 153 | print(" [14] termux-wordpresscan") 154 | print(" [15] TM-scanner: websites vulnerability scanner for termux") 155 | print(" [16] Rang3r: Multi Thread IP + Port Scanner") 156 | print(" [17] Striker: Recon & Vulnerability Scanning Suite") 157 | print(" [18] Routersploit: Exploitation Framework for Embedded Devices") 158 | print(" [19] Xshell: ToolKit") 159 | print(" [20] SH33LL: Shell Scanner") 160 | print(" [21] BlackBox: A Penetration Testing Framework") 161 | print(" [22] XAttacker: Website Vulnerability Scanner & Auto Exploiter") 162 | print(" [23] OWScan: OVID Web Scanner") 163 | print(" [24] XPL-SEARCH: Search exploits in multiple exploit databases") 164 | print(" [25] AndroBugs_Framework: An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications") 165 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 166 | vulnsys = prompt("@dbnr >> install ") 167 | if vulnsys == "@": 168 | vulnsys = "" 169 | for x in range(1,201): 170 | vulnsys += f"{x} " 171 | if len(vulnsys.split()) > 1: 172 | writeStatus(1) 173 | # © Gerrishon Sirere 174 | # Secretum Inc 175 | for vulnx in vulnsys.split(): 176 | if vulnsys.strip() == "01" or vulnsys.strip() == "1": nmap() 177 | elif vulnsys.strip() == "02" or vulnsys.strip() == "2": androZenmap() 178 | elif vulnsys.strip() == "03" or vulnsys.strip() == "3": astraNmap() 179 | elif vulnsys.strip() == "04" or vulnsys.strip() == "4": easyMap() 180 | elif vulnsys.strip() == "05" or vulnsys.strip() == "5": red_hawk() 181 | elif vulnsys.strip() == "06" or vulnsys.strip() == "6": dtect() 182 | elif vulnsys.strip() == "07" or vulnsys.strip() == "7": dsss() 183 | elif vulnsys.strip() == "08" or vulnsys.strip() == "8": sqliv() 184 | elif vulnsys.strip() == "09" or vulnsys.strip() == "9": sqlmap() 185 | elif vulnsys.strip() == "10": sqlscan() 186 | elif vulnsys.strip() == "11": wordpreSScan() 187 | elif vulnsys.strip() == "12": wpscan() 188 | elif vulnsys.strip() == "13": sqlmate() 189 | elif vulnsys.strip() == "14": wordpresscan() 190 | elif vulnsys.strip() == "15": tmscanner() 191 | elif vulnsys.strip() == "16": rang3r() 192 | elif vulnsys.strip() == "17": striker() 193 | elif vulnsys.strip() == "18": routersploit() 194 | elif vulnsys.strip() == "19": xshell() 195 | elif vulnsys.strip() == "20": sh33ll() 196 | elif vulnsys.strip() == "21": blackbox() 197 | elif vulnsys.strip() == "22": xattacker() 198 | elif vulnsys.strip() == "23": owscan() 199 | elif vulnsys.strip() == "24": xplsearch() 200 | elif vulnsys.strip() == "25": androbugs() 201 | elif vulnsys.strip() == "00" or vulnsys.strip() == "0": restart_program() 202 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 203 | if readStatus(): 204 | writeStatus(0) 205 | 206 | # 03 - Web Hacking 207 | elif debonair.strip() == "3" or debonair.strip() == "03": 208 | print("\n [01] sqlmap: Automatic SQL injection and database takeover tool") 209 | print(" [02] WebDAV: WebDAV File Upload Exploiter") 210 | print(" [03] MaxSubdoFinder: Tool for Discovering Subdomain") 211 | print(" [04] Webdav Mass Exploit") 212 | print(" [05] Atlas: Quick SQLMap Tamper Suggester") 213 | print(" [06] sqldump: Dump sql result sites with easy") 214 | print(" [07] Websploit: An advanced MiTM Framework") 215 | print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap") 216 | print(" [09] inther: Information gathering using shodan, censys and hackertarget") 217 | print(" [10] HPB: HTML Pages Builder") 218 | print(" [11] Xshell: ToolKit") 219 | print(" [12] SH33LL: Shell Scanner") 220 | print(" [13] XAttacker: Website Vulnerability Scanner & Auto Exploiter") 221 | print(" [14] XSStrike: Most advanced XSS Scanner") 222 | print(" [15] Breacher: An advanced multithreaded admin panel finder") 223 | print(" [16] OWScan: OVID Web Scanner") 224 | print(" [17] ko-dork: A simple vuln web scanner") 225 | print(" [18] ApSca: Powerful web penetration application") 226 | print(" [19] amox: Find backdoor or shell planted on a site via dictionary attack") 227 | print(" [20] FaDe: Fake deface with kindeditor, fckeditor and webdav") 228 | print(" [21] AUXILE: Auxile Framework") 229 | print(" [22] xss-payload-list: Cross Site Scripting ( XSS ) Vulnerability Payload List") 230 | print(" [23] Xadmin: Admin Panel Finder") 231 | print(" [24] CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs") 232 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 233 | webhack = prompt("@dbnr >> install ") 234 | if webhack == "@": 235 | webhack = "" 236 | for x in range(1,201): 237 | webhack += f"{x} " 238 | if len(webhack.split()) > 1: 239 | writeStatus(1) 240 | # © Gerrishon Sirere 241 | # Secretum Inc 242 | for webhx in webhack.split(): 243 | if webhx.strip() == "01" or webhx.strip() == "1": sqlmap() 244 | elif webhx.strip() == "02" or webhx.strip() == "2": webdav() 245 | elif webhx.strip() == "03" or webhx.strip() == "3": maxsubdofinder() 246 | elif webhx.strip() == "04" or webhx.strip() == "4": webmassploit() 247 | elif webhx.strip() == "05" or webhx.strip() == "5": atlas() 248 | elif webhx.strip() == "06" or webhx.strip() == "6": sqldump() 249 | elif webhx.strip() == "07" or webhx.strip() == "7": websploit() 250 | elif webhx.strip() == "08" or webhx.strip() == "8": sqlmate() 251 | elif webhx.strip() == "09" or webhx.strip() == "9": inther() 252 | elif webhx.strip() == "10": hpb() 253 | elif webhx.strip() == "11": xshell() 254 | elif webhx.strip() == "12": sh33ll() 255 | elif webhx.strip() == "13": xattacker() 256 | elif webhx.strip() == "14": xsstrike() 257 | elif webhx.strip() == "15": breacher() 258 | elif webhx.strip() == "16": owscan() 259 | elif webhx.strip() == "17": kodork() 260 | elif webhx.strip() == "18": apsca() 261 | elif webhx.strip() == "19": amox() 262 | elif webhx.strip() == "20": fade() 263 | elif webhx.strip() == "21": auxile() 264 | elif webhx.strip() == "22": xss_payload_list() 265 | elif webhx.strip() == "23": xadmin() 266 | elif webhx.strip() == "24": cmseek() 267 | elif webhx.strip() == "00" or webhx.strip() == "0": restart_program() 268 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 269 | if readStatus(): 270 | writeStatus(0) 271 | 272 | # 04 - Database Assessment 273 | elif debonair.strip() == "4" or debonair.strip() == "04": 274 | print("\n [01] DbDat: DbDat performs numerous checks on a database to evaluate security") 275 | print(" [02] sqlmap: Automatic SQL injection and database takeover tool") 276 | print(" [03] NoSQLMap: Automated NoSQL database enumeration and web application exploitation tool") 277 | print(" [04] audit_couchdb: Detect security issues, large or small, in a CouchDB server") 278 | print(" [05] mongoaudit: An automated pentesting tool that lets you know if your MongoDB instances are properly secured") 279 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 280 | dbssm = prompt("@dbnr >> install ") 281 | if dbssm == "@": 282 | dbssm = "" 283 | for x in range(1,201): 284 | dbssm += f"{x} " 285 | if len(dbssm.split()) > 1: 286 | writeStatus(1) 287 | # © Gerrishon Sirere 288 | # Secretum Inc 289 | for dbsx in dbssm.split(): 290 | if dbsx.strip() == "01" or dbsx.strip() == "1": dbdat() 291 | elif dbsx.strip() == "02" or dbsx.strip() == "2": sqlmap() 292 | elif dbsx.strip() == "03" or dbsx.strip() == "3": nosqlmap 293 | elif dbsx.strip() == "04" or dbsx.strip() == "4": audit_couchdb() 294 | elif dbsx.strip() == "05" or dbsx.strip() == "5": mongoaudit() 295 | elif dbsx.strip() == "00" or dbsx.strip() == "0": restart_program() 296 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 297 | if readStatus(): 298 | writeStatus(0) 299 | 300 | # 05 - Password Attacks 301 | elif debonair.strip() == "5" or debonair.strip() == "05": 302 | print("\n [01] Hydra: Network logon cracker supporting different services") 303 | print(" [02] FMBrute: Facebook Multi Brute Force") 304 | print(" [03] HashID: Software to identify the different types of hashes") 305 | print(" [04] Facebook Brute Force 3") 306 | print(" [05] Black Hydra: A small program to shorten brute force sessions on hydra") 307 | print(" [06] Hash Buster: Crack hashes in seconds") 308 | print(" [07] FBBrute: Facebook Brute Force") 309 | print(" [08] Cupp: Common User Passwords Profiler") 310 | print(" [09] InstaHack: Instagram Brute Force") 311 | print(" [10] Indonesian Wordlist") 312 | print(" [11] Xshell") 313 | print(" [12] Aircrack-ng: WiFi security auditing tools suite") 314 | print(" [13] BlackBox: A Penetration Testing Framework") 315 | print(" [14] Katak: An open source software login brute-forcer toolkit and hash decrypter") 316 | print(" [15] Hasher: Hash cracker with auto detect hash") 317 | print(" [16] Hash-Generator: Beautiful Hash Generator") 318 | print(" [17] nk26: Nkosec Encode") 319 | print(" [18] Hasherdotid: A tool for find an encrypted text") 320 | print(" [19] Crunch: Highly customizable wordlist generator") 321 | print(" [20] Hashcat: World's fastest and most advanced password recovery utility") 322 | print(" [21] ASU: Facebook Hacking ToolKit") 323 | print(" [22] Credmap: An open source tool that was created to bring awareness to the dangers of credential reuse") 324 | print(" [23] BruteX: Automatically brute force all services running on a target") 325 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 326 | passtak = prompt("@dbnr >> install ") 327 | if passtak == "@": 328 | passtak = "" 329 | for x in range(1,201): 330 | passtak += f"{x} " 331 | if len(passtak.split()) > 1: 332 | writeStatus(1) 333 | # © Gerrishon Sirere 334 | # Secretum Inc 335 | for passx in passtak.split(): 336 | if passx.strip() == "01" or passx.strip() == "1": hydra() 337 | elif passx.strip() == "02" or passx.strip() == "2": fmbrute() 338 | elif passx.strip() == "03" or passx.strip() == "3": hashid() 339 | elif passx.strip() == "04" or passx.strip() == "4": fbBrute() 340 | elif passx.strip() == "05" or passx.strip() == "5": black_hydra() 341 | elif passx.strip() == "06" or passx.strip() == "6": hash_buster() 342 | elif passx.strip() == "07" or passx.strip() == "7": fbbrutex() 343 | elif passx.strip() == "08" or passx.strip() == "8": cupp() 344 | elif passx.strip() == "09" or passx.strip() == "9": instaHack() 345 | elif passx.strip() == "10": indonesian_wordlist() 346 | elif passx.strip() == "11": xshell() 347 | elif passx.strip() == "12": aircrackng() 348 | elif passx.strip() == "13": blackbox() 349 | elif passx.strip() == "14": katak() 350 | elif passx.strip() == "15": hasher() 351 | elif passx.strip() == "16": hashgenerator() 352 | elif passx.strip() == "17": nk26() 353 | elif passx.strip() == "18": hasherdotid() 354 | elif passx.strip() == "19": crunch() 355 | elif passx.strip() == "20": hashcat() 356 | elif passx.strip() == "21": asu() 357 | elif passx.strip() == "22": credmap() 358 | elif passx.strip() == "23": brutex() 359 | elif passx.strip() == "00" or passx.strip() == "0": restart_program() 360 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 361 | if readStatus(): 362 | writeStatus(0) 363 | 364 | # 06 - Wireless Attacks 365 | elif debonair.strip() == "6" or debonair.strip() == "06": 366 | print("\n [01] Aircrack-ng: WiFi security auditing tools suite") 367 | print(" [02] Wifite: An automated wireless attack tool") 368 | print(" [03] Wifiphisher: The Rogue Access Point Framework") 369 | print(" [04] Routersploit: Exploitation Framework for Embedded Devices") 370 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 371 | wiretak = prompt("@dbnr >> install ") 372 | if wiretak == "@": 373 | wiretak = "" 374 | for x in range(1,201): 375 | wiretak += f"{x} " 376 | if len(wiretak.split()) > 1: 377 | writeStatus(1) 378 | # © Gerrishon Sirere 379 | # Secretum Inc 380 | for wirex in wiretak.split(): 381 | if wirex.strip() == "01" or wirex.strip() == "1": aircrackng() 382 | elif wirex.strip() == "02" or wirex.strip() == "2": wifite() 383 | elif wirex.strip() == "03" or wirex.strip() == "3": wifiphisher() 384 | elif wirex.strip() == "04" or wirex.strip() == "4": routersploit() 385 | elif wirex.strip() == "00" or wirex.strip() == "0": restart_program() 386 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 387 | if readStatus(): 388 | writeStatus(0) 389 | 390 | # 07 - Reverse Engineering 391 | elif debonair.strip() == "7" or debonair.strip() == "07": 392 | print("\n [01] Binary Exploitation") 393 | print(" [02] jadx: DEX to JAVA Decompiler") 394 | print(" [03] apktool: A utility that can be used for reverse engineering Android applications") 395 | print(" [04] uncompyle6: Python cross-version byte-code decompiler") 396 | print(" [05] ddcrypt: DroidScript APK Deobfuscator") 397 | print(" [06] CFR: Yet another java decompiler") 398 | print(" [07] UPX: Ultimate Packer for eXecutables") 399 | print(" [08] pyinstxtractor: PyInstaller Extractor") 400 | print(" [09] innoextract: A tool to unpack installers created by Inno Setup") 401 | print(" [10] binwalk: Firmware analysis tool") 402 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 403 | reversi = prompt("@dbnr >> install ") 404 | if reversi == "@": 405 | reversi = "" 406 | for x in range(1,201): 407 | reversi += f"{x} " 408 | if len(reversi.split()) > 1: 409 | writeStatus(1) 410 | # © Gerrishon Sirere 411 | # Secretum Inc 412 | for revex in reversi.split(): 413 | if revex.strip() == "01" or revex.strip() == "1": binploit() 414 | elif revex.strip() == "02" or revex.strip() == "2": jadx() 415 | elif revex.strip() == "03" or revex.strip() == "3": apktool() 416 | elif revex.strip() == "04" or revex.strip() == "4": uncompyle() 417 | elif revex.strip() == "05" or revex.strip() == "5": ddcrypt() 418 | elif revex.strip() == "06" or revex.strip() == "6": cfr() 419 | elif revex.strip() == "07" or revex.strip() == "7": upx() 420 | elif revex.strip() == "08" or revex.strip() == "8": pyinstxtractor() 421 | elif revex.strip() == "09" or revex.strip() == "9": innoextract() 422 | elif revex.strip() == "10": binwalk() 423 | elif revex.strip() == "00" or revex.strip() == "0": restart_program() 424 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 425 | if readStatus(): 426 | writeStatus(0) 427 | 428 | # 08 - Exploitation Tools 429 | elif debonair.strip() == "8" or debonair.strip() == "08": 430 | print("\n [01] Metasploit: Advanced open-source platform for developing, testing and using exploit code") 431 | print(" [02] commix: Automated All-in-One OS Command Injection and Exploitation Tool") 432 | print(" [03] BlackBox: A Penetration Testing Framework") 433 | print(" [04] Brutal: Payload for teensy like a rubber ducky but the syntax is different") 434 | print(" [05] TXTool: An easy pentesting tool") 435 | print(" [06] XAttacker: Website Vulnerability Scanner & Auto Exploiter") 436 | print(" [07] Websploit: An advanced MiTM Framework") 437 | print(" [08] Routersploit: Exploitation Framework for Embedded Devices") 438 | print(" [09] A-Rat: Remote Administration Tool") 439 | print(" [10] BAF: Blind Attacking Framework") 440 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 441 | exploitool = prompt("@dbnr >> install ") 442 | if exploitool == "@": 443 | exploitool = "" 444 | for x in range(1,201): 445 | exploitool += f"{x} " 446 | if len(exploitool.split()) > 1: 447 | writeStatus(1) 448 | # © Gerrishon Sirere 449 | # Secretum Inc 450 | for explx in exploitool.split(): 451 | if explx.strip() == "01" or explx.strip() == "1": metasploit() 452 | elif explx.strip() == "02" or explx.strip() == "2": commix() 453 | elif explx.strip() == "03" or explx.strip() == "3": blackbox() 454 | elif explx.strip() == "04" or explx.strip() == "4": brutal() 455 | elif explx.strip() == "05" or explx.strip() == "5": txtool() 456 | elif explx.strip() == "06" or explx.strip() == "6": xattacker() 457 | elif explx.strip() == "07" or explx.strip() == "7": websploit() 458 | elif explx.strip() == "08" or explx.strip() == "8": routersploit() 459 | elif explx.strip() == "09" or explx.strip() == "9": arat() 460 | elif explx.strip() == "10": baf() 461 | elif explx.strip() == "00" or explx.strip() == "0": restart_program() 462 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 463 | if readStatus(): 464 | writeStatus(0) 465 | 466 | # 09 - Sniffing and Spoofing 467 | elif debonair.strip() == "9" or debonair.strip() == "09": 468 | print("\n [01] KnockMail: Verify if Email Exists") 469 | print(" [02] tcpdump: A powerful command-line packet analyzer") 470 | print(" [03] Ettercap: Comprehensive suite for MITM attacks, can sniff live connections, do content filtering on the fly and much more") 471 | print(" [04] hping3: hping is a command-line oriented TCP/IP packet assembler/analyzer") 472 | print(" [05] tshark: Network protocol analyzer and sniffer") 473 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 474 | sspoof = prompt("@dbnr >> install ") 475 | if sspoof == "@": 476 | sspoof = "" 477 | for x in range(1,201): 478 | sspoof += f"{x} " 479 | if len(sspoof.split()) > 1: 480 | writeStatus(1) 481 | # © Gerrishon Sirere 482 | # Secretum Inc 483 | for sspx in sspoof.split(): 484 | if sspx.strip() == "01" or sspx.strip() == "1": knockmail() 485 | elif sspx.strip() == "02" or sspx.strip() == "2": tcpdump() 486 | elif sspx.strip() == "03" or sspx.strip() == "3": ettercap() 487 | elif sspx.strip() == "04" or sspx.strip() == "4": hping3() 488 | elif sspx.strip() == "05" or sspx.strip() == "5": tshark() 489 | elif sspx.strip() == "00" or sspx.strip() == "0": restart_program() 490 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 491 | if readStatus(): 492 | writeStatus(0) 493 | 494 | # 10 - Reporting Tools 495 | elif debonair.strip() == "10": 496 | print("\n [01] dos2unix: Converts between DOS and Unix text files") 497 | print(" [02] exiftool: Utility for reading, writing and editing meta information in a wide variety of files") 498 | print(" [03] iconv: Utility converting between different character encodings") 499 | print(" [04] mediainfo: Command-line utility for reading information from media files") 500 | print(" [05] pdfinfo: PDF document information extractor") 501 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 502 | reportls = prompt("@dbnr >> install ") 503 | if reportls == "@": 504 | reportls = "" 505 | for x in range(1,201): 506 | reportls += f"{x} " 507 | if len(reportls.split()) > 1: 508 | writeStatus(1) 509 | # © Gerrishon Sirere 510 | # Secretum Inc 511 | for reportx in reportls.split(): 512 | if reportx.strip() == "01" or reportx.strip() == "1": dos2unix() 513 | elif reportx.strip() == "02" or reportx.strip() == "2": exiftool() 514 | elif reportx.strip() == "03" or reportx.strip() == "3": iconv() 515 | elif reportx.strip() == "04" or reportx.strip() == "4": mediainfo() 516 | elif reportx.strip() == "05" or reportx.strip() == "5": pdfinfo() 517 | elif reportx.strip() == "00" or reportx.strip() == "0": restart_program() 518 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 519 | if readStatus(): 520 | writeStatus(0) 521 | 522 | # 11 - Forensic Tools 523 | elif debonair.strip() == "11": 524 | print("\n [01] steghide: Embeds a message in a file by replacing some of the least significant bits") 525 | print(" [02] tesseract: Tesseract is probably the most accurate open source OCR engine available") 526 | print(" [03] sleuthkit: The Sleuth Kit (TSK) is a library for digital forensics tools") 527 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 528 | forensc = prompt("@dbnr >> install ") 529 | if forensc == "@": 530 | forensc = "" 531 | for x in range(1,201): 532 | forensc += f"{x} " 533 | if len(forensc.split()) > 1: 534 | writeStatus(1) 535 | # © Gerrishon Sirere 536 | # Secretum Inc 537 | for forenx in forensc.split(): 538 | if forenx.strip() == "01" or forenx.strip() == "1": steghide() 539 | elif forenx.strip() == "02" or forenx.strip() == "2": tesseract() 540 | elif forenx.strip() == "03" or forenx.strip() == "3": sleuthkit() 541 | elif forenx.strip() == "00" or forenx.strip() == "0": restart_program() 542 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 543 | if readStatus(): 544 | writeStatus(0) 545 | 546 | # 12 - Stress Testing 547 | elif debonair.strip() == "12": 548 | print("\n [01] Torshammer: Slow post DDOS tool") 549 | print(" [02] Slowloris: Low bandwidth DoS tool") 550 | print(" [03] Fl00d & Fl00d2: UDP Flood tool") 551 | print(" [04] GoldenEye: GoldenEye Layer 7 (KeepAlive+NoCache) DoS test tool") 552 | print(" [05] Xerxes: The most powerful DoS tool") 553 | print(" [06] Planetwork-DDOS") 554 | print(" [07] Xshell") 555 | print(" [08] santet-online: Social Engineering Tool") 556 | print(" [09] dost-attack: WebServer Attacking Tools") 557 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 558 | stresstest = prompt("@dbnr >> install ") 559 | if stresstest == "@": 560 | stresstest = "" 561 | for x in range(1,201): 562 | stresstest += f"{x} " 563 | if len(stresstest.split()) > 1: 564 | writeStatus(1) 565 | # © Gerrishon Sirere 566 | # Secretum Inc 567 | for stressx in stresstest.split(): 568 | if stressx.strip() == "01" or stressx.strip() == "1": torshammer() 569 | elif stressx.strip() == "02" or stressx.strip() == "2": slowloris() 570 | elif stressx.strip() == "03" or stressx.strip() == "3": fl00d12() 571 | elif stressx.strip() == "04" or stressx.strip() == "4": goldeneye() 572 | elif stressx.strip() == "05" or stressx.strip() == "5": xerxes() 573 | elif stressx.strip() == "06" or stressx.strip() == "6": planetwork_ddos() 574 | elif stressx.strip() == "07" or stressx.strip() == "7": xshell() 575 | elif stressx.strip() == "08" or stressx.strip() == "8": sanlen() 576 | elif stressx.strip() == "09" or stressx.strip() == "9": dostattack() 577 | elif stressx.strip() == "00" or stressx.strip() == "0": restart_program() 578 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 579 | if readStatus(): 580 | writeStatus(0) 581 | 582 | # 13 - Install Linux Distro 583 | elif debonair.strip() == "13": 584 | print("\n [01] Ubuntu") 585 | print(" [02] Fedora") 586 | print(" [03] Kali Nethunter") 587 | print(" [04] Parrot") 588 | print(" [05] Arch Linux") 589 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 590 | innudis = prompt("@dbnr >> install ") 591 | if innudis == "@": 592 | innudis = "" 593 | for x in range(1,201): 594 | innudis += f"{x} " 595 | if len(innudis.split()) > 1: 596 | writeStatus(1) 597 | # © Gerrishon Sirere 598 | # Secretum Inc 599 | for innux in innudis.split(): 600 | if innux.strip() == "01" or innux.strip() == "1": ubuntu() 601 | elif innux.strip() == "02" or innux.strip() == "2": fedora() 602 | elif innux.strip() == "03" or innux.strip() == "3": nethunter() 603 | elif innux.strip() == "04" or innux.strip() == "4": parrot() 604 | elif innux.strip() == "05" or innux.strip() == "5": archlinux() 605 | elif innux.strip() == "00" or innux.strip() == "0": restart_program() 606 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 607 | if readStatus(): 608 | writeStatus(0) 609 | 610 | # 14 - Termux Utility 611 | elif debonair.strip() == "14": 612 | print("\n [01] SpiderBot: Curl website using random proxy and user agent") 613 | print(" [02] Ngrok: tunnel local ports to public URLs and inspect traffic") 614 | print(" [03] Sudo: sudo installer for Android") 615 | print(" [04] google: Python bindings to the Google search engine") 616 | print(" [05] kojawafft") 617 | print(" [06] ccgen: Credit Card Generator") 618 | print(" [07] VCRT: Virus Creator") 619 | print(" [08] E-Code: PHP Script Encoder") 620 | print(" [09] Termux-Styling") 621 | print(" [11] xl-py: XL Direct Purchase Package") 622 | print(" [12] BeanShell: A small, free, embeddable Java source interpreter with object scripting language features, written in Java") 623 | print(" [13] vbug: Virus Maker") 624 | print(" [14] Crunch: Highly customizable wordlist generator") 625 | print(" [15] Textr: Simple tool for running text") 626 | print(" [16] heroku: CLI to interact with Heroku") 627 | print(" [17] RShell: Reverse shell for single listening") 628 | print(" [18] TermPyter: Fix all error Jupyter installation on termux") 629 | print(" [19] Numpy: The fundamental package for scientific computing with Python") 630 | print(" [20] BTC-to-IDR-checker: Check the exchange rate virtual money currency to Indonesia Rupiah from Bitcoin.co.id API") 631 | print(" [21] ClickBot: Earn money using telegram bot") 632 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 633 | moretool = prompt("@dbnr >> install ") 634 | if moretool == "@": 635 | moretool = "" 636 | for x in range(1,201): 637 | moretool += f"{x} " 638 | if len(moretool.split()) > 1: 639 | writeStatus(1) 640 | # © Gerrishon Sirere 641 | # Secretum Inc 642 | for moret in moretool.split(): 643 | if moret.strip() == "01" or moret.strip() == "1": spiderbot() 644 | elif moret.strip() == "02" or moret.strip() == "2": ngrok() 645 | elif moret.strip() == "03" or moret.strip() == "3": sudo() 646 | elif moret.strip() == "04" or moret.strip() == "4": google() 647 | elif moret.strip() == "05" or moret.strip() == "5": kojawafft() 648 | elif moret.strip() == "06" or moret.strip() == "6": ccgen() 649 | elif moret.strip() == "07" or moret.strip() == "7": vcrt() 650 | elif moret.strip() == "08" or moret.strip() == "8": ecode() 651 | elif moret.strip() == "09" or moret.strip() == "9": stylemux() 652 | elif moret.strip() == "10": passgencvar() 653 | elif moret.strip() == "11": xlPy() 654 | elif moret.strip() == "12": beanshell() 655 | elif moret.strip() == "13": vbug() 656 | elif moret.strip() == "14": crunch() 657 | elif moret.strip() == "15": textr() 658 | elif moret.strip() == "16": heroku() 659 | elif moret.strip() == "17": rshell() 660 | elif moret.strip() == "18": termpyter() 661 | elif moret.strip() == "19": numpy() 662 | elif moret.strip() == "20": btc2idr() 663 | elif moret.strip() == "21": clickbot() 664 | elif moret.strip() == "00" or moret.strip() == "0": restart_program() 665 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 666 | if readStatus(): 667 | writeStatus(0) 668 | 669 | # 15 - Shell Function [.bashrc] 670 | elif debonair.strip() == "15": 671 | print("\n [01] FBVid (FB Video Downloader)") 672 | print(" [02] cast2video (Asciinema Cast Converter)") 673 | print(" [03] iconset (AIDE App Icon)") 674 | print(" [04] readme (GitHub README.md)") 675 | print(" [05] makedeb (DEB Package Builder)") 676 | print(" [06] quikfind (Search Files)") 677 | print(" [07] pranayama (4-7-8 Relax Breathing)") 678 | print(" [08] sqlc (SQLite Query Processor)") 679 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 680 | myshf = prompt("@dbnr >> install ") 681 | if myshf == "@": 682 | myshf = "" 683 | for x in range(1,201): 684 | myshf += f"{x} " 685 | if len(myshf.split()) > 1: 686 | writeStatus(1) 687 | # © Gerrishon Sirere 688 | # Secretum Inc 689 | for mysh in myshf.split(): 690 | if mysh.strip() == "01" or mysh.strip() == "1": fbvid() 691 | elif mysh.strip() == "02" or mysh.strip() == "2": cast2video() 692 | elif mysh.strip() == "03" or mysh.strip() == "3": iconset() 693 | elif mysh.strip() == "04" or mysh.strip() == "4": readme() 694 | elif mysh.strip() == "05" or mysh.strip() == "5": makedeb() 695 | elif mysh.strip() == "06" or mysh.strip() == "6": quikfind() 696 | elif mysh.strip() == "07" or mysh.strip() == "7": pranayama() 697 | elif mysh.strip() == "08" or mysh.strip() == "8": sqlc() 698 | elif mysh.strip() == "00" or mysh.strip() == "0": restart_program() 699 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 700 | if readStatus(): 701 | writeStatus(0) 702 | 703 | # 16 - Install CLI Games 704 | elif debonair.strip() == "16": 705 | print("\n [01] Flappy Bird") 706 | print(" [02] Street Car") 707 | print(" [03] Speed Typing") 708 | print(" [04] NSnake: The classic snake game with textual interface") 709 | print(" [05] Moon buggy: Simple game where you drive a car across the moon's surface") 710 | print(" [06] Nudoku: ncurses based sudoku game") 711 | print(" [07] tty-solitaire") 712 | print(" [08] Pacman4Console") 713 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 714 | cligam = prompt("@dbnr >> install ") 715 | if cligam == "@": 716 | cligam = "" 717 | for x in range(1,201): 718 | cligam += f"{x} " 719 | if len(cligam.split()) > 1: 720 | writeStatus(1) 721 | # © Gerrishon Sirere 722 | # Secretum Inc 723 | for clig in cligam.split(): 724 | if clig.strip() == "01" or clig.strip() == "1": flappy_bird() 725 | elif clig.strip() == "02" or clig.strip() == "2": street_car() 726 | elif clig.strip() == "03" or clig.strip() == "3": speed_typing() 727 | elif clig.strip() == "04" or clig.strip() == "4": nsnake() 728 | elif clig.strip() == "05" or clig.strip() == "5": moon_buggy() 729 | elif clig.strip() == "06" or clig.strip() == "6": nudoku() 730 | elif clig.strip() == "07" or clig.strip() == "7": ttysolitaire() 731 | elif clig.strip() == "08" or clig.strip() == "8": pacman4console() 732 | elif clig.strip() == "00" or clig.strip() == "0": restart_program() 733 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 734 | if readStatus(): 735 | writeStatus(0) 736 | 737 | # 17 - Malware Analysis 738 | elif debonair.strip() == "17": 739 | print("\n [01] Lynis: Security Auditing and Rootkit Scanner") 740 | print(" [02] Chkrootkit: A Linux Rootkit Scanners") 741 | print(" [03] ClamAV: Antivirus Software Toolkit") 742 | print(" [04] Yara: Tool aimed at helping malware researchers to identify and classify malware samples") 743 | print(" [05] VirusTotal-CLI: Command line interface for VirusTotal") 744 | print(" [06] avpass: Tool for leaking and bypassing Android malware detection system") 745 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 746 | malsys = prompt("@dbnr >> install ") 747 | if malsys == "@": 748 | malsys = "" 749 | for x in range(1,201): 750 | malsys += f"{x} " 751 | if len(malsys.split()) > 1: 752 | writeStatus(1) 753 | # © Gerrishon Sirere 754 | # Secretum Inc 755 | for malx in malsys.split(): 756 | if malx.strip() == "01" or malx.strip() == "1": lynis() 757 | elif malx.strip() == "02" or malx.strip() == "2": chkrootkit() 758 | elif malx.strip() == "03" or malx.strip() == "3": clamav() 759 | elif malx.strip() == "04" or malx.strip() == "4": yara() 760 | elif malx.strip() == "05" or malx.strip() == "5": virustotal() 761 | elif malx.strip() == "06" or malx.strip() == "6": avpass() 762 | elif malx.strip() == "00" or malx.strip() == "0": restart_program() 763 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 764 | if readStatus(): 765 | writeStatus(0) 766 | 767 | # 18 - Compiler/Interpreter 768 | elif debonair.strip() == "18": 769 | print("\n [01] Python2: Python 2 programming language intended to enable clear programs") 770 | print(" [02] ecj: Eclipse Compiler for Java") 771 | print(" [03] Golang: Go programming language compiler") 772 | print(" [04] ldc: D programming language compiler, built with LLVM") 773 | print(" [05] Nim: Nim programming language compiler") 774 | print(" [06] shc: Shell script compiler") 775 | print(" [07] TCC: Tiny C Compiler") 776 | print(" [08] PHP: Server-side, HTML-embedded scripting language") 777 | print(" [09] Ruby: Dynamic programming language with a focus on simplicity and productivity") 778 | print(" [10] Perl: Capable, feature-rich programming language") 779 | print(" [11] Vlang: Simple, fast, safe, compiled language for developing maintainable software") 780 | print(" [12] BeanShell: Small, free, embeddable, source level Java interpreter with object based scripting language features written in Java") 781 | print(" [13] fp-compiler: Free Pascal is a 32, 64 and 16 bit professional Pascal compiler") 782 | print(" [14] Octave: Scientific Programming Language") 783 | print(" [15] BlogC: A blog compiler") 784 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 785 | compter = prompt("@dbnr >> install ") 786 | if compter == "@": 787 | compter = "" 788 | for x in range(1,201): 789 | compter += f"{x} " 790 | if len(compter.split()) > 1: 791 | writeStatus(1) 792 | # © Gerrishon Sirere 793 | # Secretum Inc 794 | for compt in compter.split(): 795 | if compt.strip() == "01" or compt.strip() == "1": python2() 796 | elif compt.strip() == "02" or compt.strip() == "2": ecj() 797 | elif compt.strip() == "03" or compt.strip() == "3": golang() 798 | elif compt.strip() == "04" or compt.strip() == "4": ldc() 799 | elif compt.strip() == "05" or compt.strip() == "5": nim() 800 | elif compt.strip() == "06" or compt.strip() == "6": shc() 801 | elif compt.strip() == "07" or compt.strip() == "7": tcc() 802 | elif compt.strip() == "08" or compt.strip() == "8": php() 803 | elif compt.strip() == "09" or compt.strip() == "9": ruby() 804 | elif compt.strip() == "10": perl() 805 | elif compt.strip() == "11": vlang() 806 | elif compt.strip() == "12": beanshell() 807 | elif compt.strip() == "13": fpcompiler() 808 | elif compt.strip() == "14": octave() 809 | elif compt.strip() == "15": blogc() 810 | elif compt.strip() == "00" or compt.strip() == "0": restart_program() 811 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 812 | if readStatus(): 813 | writeStatus(0) 814 | 815 | # 19 - Social Engineering Tools 816 | elif debonair.strip() == "19": 817 | print("\n [01] weeman: HTTP server for phishing in python") 818 | print(" [02] SocialFish: Educational Phishing Tool & Information Collector") 819 | print(" [03] santet-online: Social Engineering Tool") 820 | print(" [04] SpazSMS: Send unsolicited messages repeatedly on the same phone number") 821 | print(" [05] LiteOTP: Multi Spam SMS OTP") 822 | print(" [06] F4K3: Fake User Data Generator") 823 | print(" [07] Hac") 824 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True) 825 | soceng = prompt("@dbnr >> install ") 826 | if soceng == "@": 827 | soceng = "" 828 | for x in range(1,201): 829 | soceng += f"{x} " 830 | if len(soceng.split()) > 1: 831 | writeStatus(1) 832 | # © Gerrishon Sirere 833 | # Secretum Inc 834 | for socng in soceng.split(): 835 | if socng.strip() == "01" or socng.strip() == "1": weeman() 836 | elif socng.strip() == "02" or socng.strip() == "2": socfish() 837 | elif socng.strip() == "03" or socng.strip() == "3": sanlen() 838 | elif socng.strip() == "04" or socng.strip() == "4": spazsms() 839 | elif socng.strip() == "05" or socng.strip() == "5": liteotp() 840 | elif socng.strip() == "06" or socng.strip() == "6": f4k3() 841 | elif socng.strip() == "07" or socng.strip() == "7": hac() 842 | elif socng.strip() == "00" or socng.strip() == "0": restart_program() 843 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program() 844 | if readStatus(): 845 | writeStatus(0) 846 | elif debonair.strip() == "00": 847 | sys.exit() 848 | 849 | else: 850 | echo(f"ERROR: Invalid Input", foreground="vred", bold=True) 851 | timeout(1) 852 | restart_program() 853 | 854 | if __name__ == "__main__": 855 | os.system("clear") 856 | main() 857 | --------------------------------------------------------------------------------