├── .github
├── FUNDING.yml
└── workflows
│ └── shiftleft.yml
├── .gitignore
├── .pyup.yml
├── LICENSE
├── README.md
├── dbnr
├── dbnr_uninstall
├── debonair
├── init.py
├── install
├── install.py
├── pics
├── README
└── home.png
├── requirements.txt
├── src
└── debonair
│ ├── __init__.py
│ ├── core.py
│ ├── kickstart
│ └── uninstall.py
└── start.py
/.github/FUNDING.yml:
--------------------------------------------------------------------------------
1 | # These are supported funding model platforms
2 |
3 | github: # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2]
4 | patreon: # with a single Patreon username
5 | open_collective: #
6 | ko_fi: gerrishon
7 | tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
8 | community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
9 | liberapay: # Replace with a single Liberapay username
10 | issuehunt: # Replace with a single IssueHunt username
11 | otechie: # Replace with a single Otechie username
12 | custom: ['https://tinyurl.com/ygaj5fwj']
13 |
--------------------------------------------------------------------------------
/.github/workflows/shiftleft.yml:
--------------------------------------------------------------------------------
1 | ---
2 | # This workflow integrates ShiftLeft NG SAST with GitHub
3 | # Visit https://docs.shiftleft.io for help
4 | name: ShiftLeft
5 |
6 | on:
7 | pull_request:
8 | workflow_dispatch:
9 |
10 | jobs:
11 | NextGen-Static-Analysis:
12 | runs-on: ubuntu-20.04
13 | steps:
14 | - uses: actions/checkout@v2
15 | - name: Download ShiftLeft CLI
16 | run: |
17 | curl https://cdn.shiftleft.io/download/sl > ${GITHUB_WORKSPACE}/sl && chmod a+rx ${GITHUB_WORKSPACE}/sl
18 | - name: Extract branch name
19 | shell: bash
20 | run: echo "##[set-output name=branch;]$(echo ${GITHUB_REF#refs/heads/})"
21 | id: extract_branch
22 | - name: NextGen Static Analysis
23 | run: |
24 | pip install --upgrade setuptools wheel
25 | pip install -r requirements.txt
26 | ${GITHUB_WORKSPACE}/sl analyze --wait --app debonair --tag branch=${{ github.head_ref || steps.extract_branch.outputs.branch }} --python $(pwd)
27 | env:
28 | SHIFTLEFT_ACCESS_TOKEN: ${{ secrets.SHIFTLEFT_ACCESS_TOKEN }}
29 |
30 | if:
31 | ${{ hashFiles('requirements.txt') != '' }}
32 | - name: Legacy Static Analysis
33 | run: |
34 | echo "Please update your `shiftleft-python-demo` fork!"
35 | ${GITHUB_WORKSPACE}/sl analyze --wait --no-cpg --app debonair --tag branch=${{ github.head_ref || steps.extract_branch.outputs.branch }} --python $(pwd)
36 | env:
37 | SHIFTLEFT_ACCESS_TOKEN: ${{ secrets.SHIFTLEFT_ACCESS_TOKEN }}
38 |
39 | if:
40 | ${{ hashFiles('requirements.txt') == '' }}
41 |
42 | ## Uncomment the following section to enable build rule checking and enforcing.
43 | #Build-Rules:
44 | #runs-on: ubuntu-latest
45 | #needs: NextGen-Static-Analysis
46 | #steps:
47 | #- uses: actions/checkout@v2
48 | #- name: Download ShiftLeft CLI
49 | # run: |
50 | # curl https://cdn.shiftleft.io/download/sl > ${GITHUB_WORKSPACE}/sl && chmod a+rx ${GITHUB_WORKSPACE}/sl
51 | #- name: Validate Build Rules
52 | # run: |
53 | # ${GITHUB_WORKSPACE}/sl check-analysis --app debonair \
54 | # --source 'tag.branch=${{ github.event.pull_request.base.ref }}' \
55 | # --target "tag.branch=${{ github.head_ref || steps.extract_branch.outputs.branch }}" \
56 | # --report \
57 | # --github-pr-number=${{github.event.number}} \
58 | # --github-pr-user=${{ github.repository_owner }} \
59 | # --github-pr-repo=${{ github.event.repository.name }} \
60 | # --github-token=${{ secrets.GITHUB_TOKEN }}
61 | # env:
62 | #SHIFTLEFT_ACCESS_TOKEN: ${{ secrets.SHIFTLEFT_ACCESS_TOKEN }}
63 |
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 | # Byte-compiled / optimized / DLL files
2 | __pycache__/
3 | *.py[cod]
4 | *$py.class
5 |
6 | # C extensions
7 | *.so
8 |
9 | # Distribution / packaging
10 | .Python
11 | build/
12 | develop-eggs/
13 | dist/
14 | downloads/
15 | eggs/
16 | .eggs/
17 | lib/
18 | lib64/
19 | parts/
20 | sdist/
21 | var/
22 | wheels/
23 | pip-wheel-metadata/
24 | share/python-wheels/
25 | *.egg-info/
26 | .installed.cfg
27 | *.egg
28 | MANIFEST
29 |
30 | # PyInstaller
31 | # Usually these files are written by a python script from a template
32 | # before PyInstaller builds the exe, so as to inject date/other infos into it.
33 | *.manifest
34 | *.spec
35 |
36 | # Installer logs
37 | pip-log.txt
38 | pip-delete-this-directory.txt
39 |
40 | # Unit test / coverage reports
41 | htmlcov/
42 | .tox/
43 | .nox/
44 | .coverage
45 | .coverage.*
46 | .cache
47 | nosetests.xml
48 | coverage.xml
49 | *.cover
50 | *.py,cover
51 | .hypothesis/
52 | .pytest_cache/
53 |
54 | # Translations
55 | *.mo
56 | *.pot
57 |
58 | # Django stuff:
59 | *.log
60 | local_settings.py
61 | db.sqlite3
62 | db.sqlite3-journal
63 |
64 | # Flask stuff:
65 | instance/
66 | .webassets-cache
67 |
68 | # Scrapy stuff:
69 | .scrapy
70 |
71 | # Sphinx documentation
72 | docs/_build/
73 |
74 | # PyBuilder
75 | target/
76 |
77 | # Jupyter Notebook
78 | .ipynb_checkpoints
79 |
80 | # IPython
81 | profile_default/
82 | ipython_config.py
83 |
84 | # pyenv
85 | .python-version
86 |
87 | # pipenv
88 | # According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control.
89 | # However, in case of collaboration, if having platform-specific dependencies or dependencies
90 | # having no cross-platform support, pipenv may install dependencies that don't work, or not
91 | # install all needed dependencies.
92 | #Pipfile.lock
93 |
94 | # PEP 582; used by e.g. github.com/David-OConnor/pyflow
95 | __pypackages__/
96 |
97 | # Celery stuff
98 | celerybeat-schedule
99 | celerybeat.pid
100 |
101 | # SageMath parsed files
102 | *.sage.py
103 |
104 | # Environments
105 | .env
106 | .venv
107 | env/
108 | venv/
109 | ENV/
110 | env.bak/
111 | venv.bak/
112 |
113 | # Spyder project settings
114 | .spyderproject
115 | .spyproject
116 |
117 | # Rope project settings
118 | .ropeproject
119 |
120 | # mkdocs documentation
121 | /site
122 |
123 | # mypy
124 | .mypy_cache/
125 | .dmypy.json
126 | dmypy.json
127 |
128 | # Pyre type checker
129 | .pyre/
130 |
--------------------------------------------------------------------------------
/.pyup.yml:
--------------------------------------------------------------------------------
1 | # autogenerated pyup.io config file
2 | # see https://pyup.io/docs/configuration/ for all available options
3 |
4 | schedule: every week
5 | update: false
6 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | Copyright 2021 Secretum Inc.
2 |
3 | Redistribution and use in source and binary forms, with or without
4 | modification, are permitted provided that the following conditions are
5 | met:
6 |
7 | 1. Redistributions of source code must retain the above copyright
8 | notice, this list of conditions and the following disclaimer.
9 |
10 | 2. Redistributions in binary form must reproduce the above copyright
11 | notice, this list of conditions and the following disclaimer in the
12 | documentation and/or other materials provided with the distribution.
13 |
14 | 3. Neither the name of the copyright holder nor the names of its
15 | contributors may be used to endorse or promote products derived from
16 | this software without specific prior written permission.
17 |
18 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
21 | PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 | HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
24 | TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
25 | PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
26 | LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
27 | NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
28 | SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
Debonair
2 |
3 | [](https://github.com/gerrishons)
4 | ---
5 |
6 | [](https://github.com/secretum-inc/debonair/stargazers)
7 | [](https://github.com/secretum-inc/debonair/network/members)
8 | [](https://github.com/secretum-inc/debonair/issues)
9 | [](https://github.com/secretum-inc/debonair/watchers)
10 | [](https://www.python.org)
11 | [](https://twitter.com/gerrishon_s)
12 |
13 |
14 |
15 | ### Introduction
16 | > :information_source: Debonair is an all in one, across the board and automatic installer for helpful tools.
17 |
18 |
19 | ## Installation⬇️
20 |
21 |
22 | 1. Clone the project files and cd into the directory:
23 |
24 | git clone https://github.com/secretum-inc/debonair && cd debonair
25 |
26 | 2. Run:
27 |
28 | python3 init.py
29 |
30 |
31 | ## Tool Categories🚥
32 | `Information Gathering`
33 | `Vulnerability Scanner/Analysis`
34 | `Web hacking`
35 | `Database Assessment`
36 | `Password Attacks`
37 | `Wireless Attacks`
38 | `Reverse Engineering`
39 | `Exploitation Tools`
40 | `Sniffing & Spoofing`
41 | `Reporting Tools`
42 | `Forensic Tools`
43 | `Stress Testing`
44 | `Linux Distos`
45 | `Termux Utility`
46 | `Shell Function [.bashrc]`
47 | `CLI Games`
48 | `Malware Analysis`
49 | `Compiler/Interpreter`
50 | `Social Engineering Tools`
51 |
52 | ## How to use👨💻
53 |
54 | Type **`debonair`** or **`dbnr`** from anywhere in your terminal
55 |
56 | :bulb: Each number represents a specific output.
57 |
58 | :bulb: Type the number corresponding number to a tool you want to install.
59 |
60 |
61 | ## Requirements🎲
62 | • Python **3.6+**
63 |
64 | • quo **2021.×**
65 |
66 | ## Contributing👥
67 |
68 | If you run into an issue, we would be very happy if you would file a bug on the [issue tracker](https://github.com/secretum-inc/debonair/issues). You can also contribute by adding more tools by creating a pull request
69 |
70 | ## License📑
71 |
72 | Debonair is licensed under BSD-3-Clause License. See the `LICENSE` file in the top distribution directory for the full license text.
73 |
74 |
75 | ## Donate🎁
76 |
77 | Please consider [Donating](https://www.paypal.com/donate?hosted_button_id=KP893BC2EKK54) today
78 |
79 | ------------------------------------------------------------------------
80 |
81 |
--------------------------------------------------------------------------------
/dbnr:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | if [ -d /data/data/com.termux/files/usr/etc ]; then
4 | conf_dir="/data/data/com.termux/files/usr/etc"
5 | elif [ -d /usr/etc ]; then
6 | conf_dir="/usr/etc"
7 | elif [ -d /etc ]; then
8 | conf_dir="/etc"
9 | fi
10 |
11 | if [ -e /usr/lib/sudo ]; then
12 | sudo python3 $conf_dir/debonair_/debonair/start.py
13 | else
14 | python3 $conf_dir/debonair_/debonair/start.py
15 | fi
16 | exit
17 |
--------------------------------------------------------------------------------
/dbnr_uninstall:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | if [ -d /data/data/com.termux/files/usr/etc ]; then
4 | conf_dir="/data/data/com.termux/files/usr/etc"
5 | elif [ -d /usr/etc ]; then
6 | conf_dir="/usr/etc"
7 | elif [ -d /etc ]; then
8 | conf_dir="/etc"
9 | fi
10 |
11 | if [ -e /usr/lib/sudo ]; then
12 | sudo python3 $conf_dir/debonair_/debonair/src/debonair/uninstall.py
13 | else
14 | python3 $conf_dir/debonair_/debonair/src/debonair/uninstall.py
15 | fi
16 | exit
17 |
--------------------------------------------------------------------------------
/debonair:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | if [ -d /data/data/com.termux/files/usr/etc ]; then
4 | conf_dir="/data/data/com.termux/files/usr/etc"
5 | elif [ -d /usr/etc ]; then
6 | conf_dir="/usr/etc"
7 | elif [ -d /etc ]; then
8 | conf_dir="/etc"
9 | fi
10 |
11 | if [ -e /usr/lib/sudo ]; then
12 | sudo python3 $conf_dir/debonair_/debonair/start.py
13 | else
14 | python3 $conf_dir/debonair_/debonair/start.py
15 | fi
16 | exit
17 |
--------------------------------------------------------------------------------
/init.py:
--------------------------------------------------------------------------------
1 | import os
2 | import sys
3 |
4 | os.system("chmod +x install")
5 | os.system("sh install")
6 |
--------------------------------------------------------------------------------
/install:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 | #
3 | #
4 |
5 | if [ -e /usr/lib/sudo ];then
6 | if [ -e /usr/bin/apt-get ];then
7 | if [ ! -e /usr/bin/python3 ];then
8 | sudo apt-get update
9 | sudo apt-get upgrade -y
10 | sudo apt-get install python -y
11 | sudo apt-get install python3 -y
12 | fi
13 | fi
14 | else
15 | if [ -d /usr/bin ];then
16 | if [ -e /usr/bin/apt-get ];then
17 | if [ ! -e /usr/bin/python3 ];then
18 | apt-get update
19 | apt -get upgrade -y
20 | apt-get install python -y
21 | apt-get install python3 -y
22 | fi
23 | fi
24 | fi
25 | fi
26 | if [ -d /data/data/com.termux/files/usr/bin ]; then
27 | if [ ! -e /data/data/com.termux/files/usr/bin/python3 ];then
28 | pkg update
29 | pkg upgrade -y
30 | pkg install python -y
31 | pkg install python3 -y
32 | fi
33 | fi
34 | if [ -e /usr/lib/sudo ];then
35 | if [ -e /usr/bin/yum ];then
36 | if [ ! -e /usr/bin/python3 ];then
37 | sudo yum update
38 | sudo yum upgrade -y
39 | sudo yum install python -y
40 | sudo yum install python3 -y
41 | fi
42 | fi
43 | else
44 | if [ -d /usr/bin ];then
45 | if [ -e /usr/bin/yum ];then
46 | if [ ! -e /usr/bin/python3 ];then
47 | yum update
48 | yum upgrade -y
49 | yum install python -y
50 | yum install python3 -y
51 | fi
52 | fi
53 | fi
54 | fi
55 | if [ -e /usr/local/bin/brew ];then
56 | if [ ! -e /usr/local/bin/python3 ];then
57 | brew install python -y
58 | brew install python3 -y
59 | fi
60 | fi
61 | if [ -e /usr/local/bin/brew ];then
62 | if [ ! -e /usr/local/bin/python ];then
63 | brew install python -y
64 | brew install python3 -y
65 | fi
66 | fi
67 | if [ -e /usr/bin/apk ];then
68 | if [ ! -e /usr/bin/python ];then
69 | apk install python -y
70 | apk install python3 -y
71 | fi
72 | fi
73 | if [ -e /usr/bin/apk ];then
74 | if [ ! -e /usr/bin/python3 ];then
75 | apk install python -y
76 | apk install python3 -y
77 | fi
78 | fi
79 | pip install -r requirements.txt
80 | python3 install.py
81 | exit
82 |
83 |
84 |
85 |
--------------------------------------------------------------------------------
/install.py:
--------------------------------------------------------------------------------
1 | import quo
2 | import os
3 | import sys
4 | import time
5 | from quo import command, app, echo, pause, confirm
6 |
7 | @command()
8 | @app("--terms")
9 | def install(terms):
10 | echo(f"THE SOFTWARE IS PROVIDED `AS IS`, WITHOUT WARRANTY OF ANY KIND, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERRCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL I BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THIS SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE", foreground="vblack", background="vwhite", bold=True)
11 | time.sleep(3)
12 | confirm("Do you want to install Debonair?", abort=True)
13 | pause()
14 | echo(f"Technically, Moses was the first person with a tablet downloading data from the cloud...", foreground="red", dim=True, bold=True)
15 | os.system("cd /etc/ && rm -rf debonair_ && mkdir debonair_ && cd /etc/debonair_/ && git clone --quiet https://github.com/secretum-inc/debonair.git && cd /etc/debonair_/debonair/ && chmod +x debonair && chmod +x dbnr && mv -f debonair /usr/bin/ && mv -f dbnr /usr/bin/ && cd && rm -rf debonair && dbnr")
16 |
17 | if __name__ == "__main__":
18 | install()
19 | L
20 |
--------------------------------------------------------------------------------
/pics/README:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/pics/home.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scalabli/debonair/e47b3f0be9b36401fc3973f622f99a0e33149863/pics/home.png
--------------------------------------------------------------------------------
/requirements.txt:
--------------------------------------------------------------------------------
1 | requests>=2.24.0
2 | quo>=2021.5.5.2
3 |
4 | # Dependencies of requests
5 | idna<3,>=2.5
6 | certifi>=2017.4.17
7 | urllib3>=1.26.4
8 | chardet<4,>=3.0.2
9 |
--------------------------------------------------------------------------------
/src/debonair/__init__.py:
--------------------------------------------------------------------------------
1 | #
2 |
--------------------------------------------------------------------------------
/src/debonair/core.py:
--------------------------------------------------------------------------------
1 | import os
2 | import quo
3 | import subprocess
4 | import urllib.request
5 | from quo import command, app, echo, prompt
6 | from subprocess import check_output as inputstream
7 |
8 | current_dir = os.getcwd()
9 | _banner = """
10 |
11 | ╭━━━┳━━━┳━━╮╭━━━┳━╮╱╭┳━━━┳━━┳━━━┳━━━╮
12 | ╰╮╭╮┃╭━━┫╭╮┃┃╭━╮┃┃╰╮┃┃╭━╮┣┫┣┫╭━╮┃╭━━╯
13 | ╱┃┃┃┃╰━━┫╰╯╰┫┃╱┃┃╭╮╰╯┃┃╱┃┃┃┃┃╰━╯┃╰━━╮
14 | ╱┃┃┃┃╭━━┫╭━╮┃┃╱┃┃┃╰╮┃┃╰━╯┃┃┃┃╭╮╭┫╭━━╯
15 | ╭╯╰╯┃╰━━┫╰━╯┃╰━╯┃┃╱┃┃┃╭━╮┣┫┣┫┃┃╰┫╰━━╮
16 | ╰━━━┻━━━┻━━━┻━━━┻╯╱╰━┻╯╱╰┻━━┻╯╰━┻━━━╯
17 |
18 | """
19 |
20 | import sys
21 | import time
22 | _banner2 = """
23 |
24 | #####################################
25 | # [99] < Back (Main menu) #
26 | # [00] Exit Debonair #
27 | #####################################
28 | """
29 | os.system("cd /etc/ && touch debonair.conf")
30 | os.system("cd /etc/ && touch debonair_1")
31 | prefix = os.getenv("PREFIX")
32 | configBase = "[HOME] = ~"
33 | configFile = "/etc/debonair.conf"
34 | cache_1 = "/etc/debonair_1"
35 |
36 | @command()
37 | @app("--sources_list")
38 | def repo_check(sources_list):
39 | if os.path.isfile(os.getenv("PREFIX")+"/etc/apt/sources.list.d/"+sources_list):
40 | return True
41 | return False
42 |
43 | @command()
44 | @app("--statusId")
45 | def writeStatus(statusId):
46 | open(cache_1,"w").write(str(statusId))
47 |
48 | def readStatus():
49 | try:
50 | statusId = open(cache_1,"r").read()
51 | if statusId == "1":
52 | return True
53 | return False
54 | except IOError:
55 | return False
56 |
57 | def checkConfigFile():
58 | if os.path.exists(configFile):
59 | if os.path.isdir(configFile):
60 | os.system(f"rm -rf {configFile}")
61 | open(configFile,"w").write(configBase)
62 | else:
63 | open(configFile,"w").write(configBase)
64 |
65 | def loadConfigFile():
66 | checkConfigFile()
67 | lfile = ""
68 | try:
69 | lfile = [x.split("=")[-1].strip() for x in open(configFile,"r").splitlines() if x.split("=")[0].strip() == "[HOME]"][0]
70 | except Exception as e:
71 | lfile = "~"
72 | return lfile
73 |
74 | homeDir = loadConfigFile()
75 |
76 | def restart_program():
77 | python = sys.executable
78 | os.execl(python, python, * sys.argv)
79 | curdir = os.getcwd()
80 |
81 | def backtomenu_option():
82 | if not readStatus():
83 | echo(f'{_banner2}', foreground="red", bold=True, italic=True)
84 | backtomenu = prompt("@dbnr >>> ")
85 |
86 | if backtomenu == "99":
87 | restart_program()
88 | elif backtomenu == "00":
89 | sys.exit()
90 | else:
91 | echo(f"ERROR: Wrong Input", foreground="red")
92 | time.sleep(2)
93 | restart_program()
94 |
95 | def banner():
96 | echo(f'{_banner}', foreground="yellow", bold=True)
97 |
98 | ### Repo Installer
99 | def pointless_repo():
100 | urllib.request.urlretrieve('https://github.com/secretum-inc/debonair/src/debonair/kickstart','kickstart')
101 | os.system('kickstart')
102 | os.remove('kickstart')
103 | os.system('apt update -y')
104 | ###
105 |
106 | def nmap():
107 | echo(f"%%%%%%% Installing... Nmap", foreground="vcyan")
108 | # secretum inc
109 | os.system('apt install nmap')
110 | echo('###### Done')
111 | echo(f"###### Type 'nmap' to start.", foreground="red")
112 | backtomenu_option()
113 |
114 | def red_hawk():
115 | echo(f"%%%%%%% Installing... RED HAWK", foreground="vcyan")
116 | # secretum inc
117 | os.system('apt install git php')
118 | os.system('git clone https://github.com/Tuhinshubhra/RED_HAWK')
119 | os.system('mv RED_HAWK {}'.format(homeDir))
120 | echo('###### Done')
121 | backtomenu_option()
122 |
123 | def dtect():
124 | echo(f"%%%%%%% Installing... D-TECT", foreground="vcyan")
125 | # secretum inc
126 | os.system('apt install python2 git')
127 | os.system('git clone https://github.com/bibortone/D-Tech')
128 | os.system('mv D-Tech {}/D-TECT'.format(homeDir))
129 | echo('###### Done')
130 | backtomenu_option()
131 |
132 | def sqlmap():
133 | echo(f"%%%%%%% Installing... sqlmap", foreground="vcyan")
134 | # secretum inc
135 | os.system('apt install git python2')
136 | os.system('git clone https://github.com/sqlmapproject/sqlmap')
137 | os.system('mv sqlmap {}'.format(homeDir))
138 | echo('###### Done')
139 | backtomenu_option()
140 |
141 | def infoga():
142 | echo(f"%%%%%%% Installing... Infoga", foreground="vcyan")
143 | # secretum inc
144 | os.system('apt install python2 git')
145 | os.system('python2 -m pip install requests urllib3 urlparse')
146 | os.system('git clone https://github.com/m4ll0k/Infoga')
147 | os.system('mv Infoga {}'.format(homeDir))
148 | echo('###### Done')
149 | backtomenu_option()
150 |
151 | def reconDog():
152 | echo(f"%%%%%%% Installing... ReconDog", foreground="vcyan")
153 | # secretum inc
154 | os.system('apt install python2 git')
155 | os.system('git clone https://github.com/s0md3v/ReconDog')
156 | os.system('mv ReconDog {}'.format(homeDir))
157 | echo('###### Done')
158 | backtomenu_option()
159 |
160 | def androZenmap():
161 | echo(f"%%%%%%% Installing... AndroZenmap", foreground="vcyan")
162 | # secretum inc
163 | os.system('apt install nmap curl')
164 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/androzenmap.sh')
165 | os.system('mkdir {}/AndroZenmap'.format(homeDir))
166 | os.system('mv androzenmap.sh {}/AndroZenmap'.format(homeDir))
167 | echo('###### Done')
168 | backtomenu_option()
169 |
170 | def sqlmate():
171 | echo(f"%%%%%%% Installing... sqlmate", foreground="vcyan")
172 | # secretum inc
173 | os.system('apt install python2 git')
174 | os.system('python2 -m pip install mechanize bs4 HTMLparser argparse requests urlparse2')
175 | os.system('git clone https://github.com/s0md3v/sqlmate')
176 | os.system('mv sqlmate {}'.format(homeDir))
177 | echo('###### Done')
178 | backtomenu_option()
179 |
180 | def astraNmap():
181 | echo(f"%%%%%%% Installing... AstraNmap", foreground="vcyan")
182 | # secretum inc
183 | os.system('apt install git nmap')
184 | os.system('git clone https://github.com/Gameye98/AstraNmap')
185 | os.system('mv AstraNmap {}'.format(homeDir))
186 | echo('###### Done')
187 | backtomenu_option()
188 |
189 | def weeman():
190 | echo(f"%%%%%%% Installing... weeman", foreground="vcyan")
191 | # secretum inc
192 | os.system('apt install clang git python2')
193 | os.system('python2 -m pip bs4 html5lib lxml')
194 | os.system('git clone https://github.com/evait-security/weeman')
195 | os.system('mv weeman {}'.format(homeDir))
196 | echo('###### Done')
197 | backtomenu_option()
198 |
199 | def easyMap():
200 | echo(f"%%%%%%% Installing... Easymap", foreground="vcyan")
201 | # secretum inc
202 | os.system('apt install php git')
203 | os.system('git clone https://github.com/Cvar1984/Easymap')
204 | os.system('mv Easymap {}'.format(homeDir))
205 | os.system('cd {}/Easymap && sh install.sh'.format(homeDir))
206 | echo('###### Done')
207 | backtomenu_option()
208 |
209 | def xd3v():
210 | echo(f"%%%%%%% Installing... XD3v", foreground="vcyan")
211 | # secretum inc
212 | os.system('apt install curl')
213 | os.system('curl -k -O https://gist.github.com/Gameye98/92035588bd0228df6fb7fa77a5f26bc2/raw/f8e73cd3d9f2a72bd536087bb6ba7bc8baef7d1d/xd3v.sh')
214 | os.system('mv xd3v.sh {0}/../usr/bin/xd3v && chmod +x {0}/../usr/bin/xd3v'.format(homeDir))
215 | echo('###### Done')
216 | echo(f"###### Type 'xd3v' to start.")
217 | backtomenu_option()
218 |
219 | def crips():
220 | echo(f"%%%%%%% Installing... Crips", foreground="vcyan")
221 | # secretum inxlc
222 | os.system("apt install git python2 openssl curl libcurl wget")
223 | os.system("git clone https://github.com/Manisso/Crips")
224 | os.system("mv Crips {}".format(homeDir))
225 | echo('###### Done')
226 | backtomenu_option()
227 |
228 | def sir():
229 | echo(f"%%%%%%% Installing... SIR", foreground="vcyan")
230 | # secretum inxlc
231 | os.system("apt install python2 git")
232 | os.system("python2 -m pip install bs4 urllib2")
233 | os.system("git clone https://github.com/AeonDave/sir.git")
234 | os.system("mv sir {}".format(homeDir))
235 | echo('###### Done')
236 | backtomenu_option()
237 |
238 | def xshell():
239 | echo(f"%%%%%%% Installing... Xshell", foreground="vcyan")
240 | # secretum inxlc
241 | os.system("apt install lynx python2 figlet ruby php nano w3m")
242 | os.system("git clone https://github.com/Ubaii/Xshell")
243 | os.system("mv Xshell {}".format(homeDir))
244 | echo('###### Done')
245 | backtomenu_option()
246 |
247 | def evilURL():
248 | echo(f"%%%%%%% Installing... EvilURL", foreground="vcyan")
249 | # secretum inxlc
250 | os.system("apt install git python2 python3")
251 | os.system("git clone https://github.com/UndeadSec/EvilURL")
252 | os.system("mv EvilURL {}".format(homeDir))
253 | echo('###### Done')
254 | backtomenu_option()
255 |
256 | def striker():
257 | echo(f"%%%%%%% Installing... Striker", foreground="vcyan")
258 | # secretum inc
259 | os.system('apt install git python2')
260 | os.system('git clone https://github.com/s0md3v/Striker')
261 | os.system('mv Striker {}'.format(homeDir))
262 | os.system('cd {}/Striker && python2 -m pip install -r requirements.txt'.format(homeDir))
263 | echo('###### Done')
264 | backtomenu_option()
265 |
266 | def dsss():
267 | echo(f"%%%%%%% Installing... DSSS", foreground="vcyan")
268 | # secretum inc
269 | os.system('apt install python2 git')
270 | os.system('git clone https://github.com/stamparm/DSSS')
271 | os.system('mv DSSS {}'.format(homeDir))
272 | echo('###### Done')
273 | backtomenu_option()
274 |
275 | def sqliv():
276 | echo(f"%%%%%%% Installing... SQLiv", foreground="vcyan")
277 | # secretum inc
278 | os.system('apt install python2 git')
279 | os.system('git clone https://github.com/the-robot/sqliv')
280 | os.system('mv sqliv {}'.format(homeDir))
281 | echo('###### Done')
282 | backtomenu_option()
283 |
284 | def sqlscan():
285 | echo(f"%%%%%%% Installing... sqlscan", foreground="vcyan")
286 | # secretum inc
287 | os.system('apt install git php')
288 | os.system('git clone http://www.github.com/Cvar1984/sqlscan')
289 | os.system('mv sqlscan {}'.format(homeDir))
290 | echo('###### Done')
291 | backtomenu_option()
292 |
293 | def wordpreSScan():
294 | echo(f"%%%%%%% Installing... Wordpresscan", foreground="vcyan")
295 | # secretum inc
296 | os.system('apt install python2 python2-dev clang libxml2-dev libxml2-utils libxslt-dev')
297 | os.system('git clone https://github.com/swisskyrepo/Wordpresscan')
298 | os.system('mv Wordpresscan {}'.format(homeDir))
299 | os.system('cd {}/Wordpresscan && python2 -m pip install -r requirements.txt'.format(homeDir))
300 | echo('###### Done')
301 | backtomenu_option()
302 |
303 | def wpscan():
304 | echo(f"%%%%%%% Installing... WPScan", foreground="vcyan")
305 | # secretum inc
306 | os.system('apt install git ruby curl')
307 | os.system('git clone https://github.com/wpscanteam/wpscan')
308 | os.system('mv wpscan {0} && cd {0}/wpscan'.format(homeDir))
309 | os.system('gem install bundle && bundle config build.nokogiri --use-system-libraries && bundle install && ruby wpscan.rb --update')
310 | echo('###### Done')
311 | backtomenu_option()
312 |
313 | def wordpresscan():
314 | echo(f"%%%%%%% Installing... wordpresscan(2)", foreground="vcyan")
315 | # secretum inc
316 | os.system('apt install nmap figlet git')
317 | os.system('git clone https://github.com/silverhat007/termux-wordpresscan')
318 | os.system('cd termux-wordpresscan && chmod +x * && sh install.sh')
319 | os.system('mv termux-wordpresscan {}'.format(homeDir))
320 | echo('###### Done')
321 | echo(f"###### Type 'wordpresscan' to start.")
322 | backtomenu_option()
323 |
324 | def routersploit():
325 | echo(f"%%%%%%% Installing... Routersploit", foreground="vcyan")
326 | # secretum inc
327 | os.system('apt install python2 git')
328 | os.system('python2 -m pip install requests')
329 | os.system('git clone https://github.com/threat9/routersploit')
330 | os.system('mv routersploit {0};cd {0}/routersploit;python2 -m pip install -r requirements.txt;termux-fix-shebang rsf.py'.format(homeDir))
331 | echo('###### Done')
332 | backtomenu_option()
333 |
334 | def torshammer():
335 | echo(f"%%%%%%% Installing... Torshammer", foreground="vcyan")
336 | # secretum inc
337 | os.system('apt install python2 git')
338 | os.system('git clone https://github.com/dotfighter/torshammer')
339 | os.system('mv torshammer {}'.format(homeDir))
340 | echo('###### Done')
341 | backtomenu_option()
342 |
343 | def slowloris():
344 | echo(f"%%%%%%% Installing... Slowloris", foreground="vcyan")
345 | # secretum inc
346 | os.system('apt install python2 git')
347 | os.system('git clone https://github.com/gkbrk/slowloris')
348 | os.system('mv slowloris {}'.format(homeDir))
349 | echo('###### Done')
350 | backtomenu_option()
351 |
352 | def fl00d12():
353 | echo(f"%%%%%%% Installing... Fl00d & Fl00d2", foreground="vcyan")
354 | # secretum inc
355 | os.system('apt install python2 curl')
356 | os.system('mkdir {}/fl00d'.format(homeDir))
357 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/fl00d.py')
358 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/fl00d2.py')
359 | os.system('mv fl00d.py {0}/fl00d && mv fl00d2.py {0}/fl00d'.format(homeDir))
360 | echo('###### Done')
361 | backtomenu_option()
362 |
363 | def goldeneye():
364 | echo(f"%%%%%%% Installing... GoldenEye", foreground="vcyan")
365 | # secretum inc
366 | os.system('apt install git python2')
367 | os.system('git clone https://github.com/jseidl/GoldenEye')
368 | os.system('mv GoldenEye {}'.format(homeDir))
369 | echo('###### Done')
370 | backtomenu_option()
371 |
372 | def xerxes():
373 | echo(f"%%%%%%% Installing... Xerxes", foreground="vcyan")
374 | # secretum inc
375 | os.system('apt install git')
376 | os.system('apt install clang')
377 | os.system('git clone https://github.com/baraalmasri/xerxes')
378 | os.system('mv xerxes {}'.format(homeDir))
379 | os.system('cd {}/xerxes && clang xerxes.c -o xerxes'.format(homeDir))
380 | os.system('chmod 755 {0}/xerxes/xerxes && cp {0}/xerxes/xerxes $PREFIX/bin'.format(homeDir))
381 | echo('###### Done')
382 | echo('###### Usage: xerxes www.fakesite.com 80')
383 | backtomenu_option()
384 |
385 | def planetwork_ddos():
386 | echo(f"%%%%%%% Installing... Planetwork-DDOS", foreground="vcyan")
387 | # secretum inc
388 | os.system('apt install git python2')
389 | os.system('git clone https://github.com/Hydra7/Planetwork-DDOS')
390 | os.system('mv Planetwork-DDOS {}'.format(homeDir))
391 | echo('###### Done')
392 | backtomenu_option()
393 |
394 | def hydra():
395 | echo(f"%%%%%%% Installing... Hydra", foreground="vcyan")
396 | # secretum inc
397 | os.system('apt install hydra')
398 | echo('###### Done')
399 | backtomenu_option()
400 |
401 | def black_hydra():
402 | echo(f"%%%%%%% Installing... Black Hydra", foreground="vcyan")
403 | # secretum inc
404 | os.system('apt install hydra git python2')
405 | os.system('git clone https://github.com/Gameye98/Black-Hydra')
406 | os.system('mv Black-Hydra {}'.format(homeDir))
407 | echo('###### Done')
408 | backtomenu_option()
409 |
410 | def cupp():
411 | echo(f"%%%%%%% Installing... Cupp", foreground="vcyan")
412 | # secretum inc
413 | os.system('apt install python2 git')
414 | os.system('git clone https://github.com/Mebus/cupp')
415 | os.system('mv cupp {}'.format(homeDir))
416 | echo('###### Done')
417 | backtomenu_option()
418 |
419 | def asu():
420 | echo(f"%%%%%%% Installing... ASU", foreground="vcyan")
421 | # secretum inc
422 | os.system('apt install git python2 php')
423 | os.system('python2 -m pip install requests bs4 mechanize')
424 | os.system('git clone https://github.com/LOoLzeC/ASU')
425 | os.system('mv ASU {}'.format(homeDir))
426 | echo('###### Done')
427 | backtomenu_option()
428 |
429 | def hash_buster():
430 | echo(f"%%%%%%% Installing... Hash-Buster", foreground="vcyan")
431 | # secretum inc
432 | os.system('apt install python2 git')
433 | os.system('git clone https://github.com/s0md3v/Hash-Buster')
434 | os.system('mv Hash-Buster {}'.format(homeDir))
435 | echo('###### Done')
436 | backtomenu_option()
437 |
438 | def instaHack():
439 | echo(f"%%%%%%% Installing... InstaHack", foreground="vcyan")
440 | # secretum inc
441 | os.system('apt install python2 git')
442 | os.system('python2 -m pip install requests')
443 | os.system('git clone https://github.com/Slayeri4/instahack')
444 | os.system('mv instahack {}'.format(homeDir))
445 | echo('###### Done')
446 | backtomenu_option()
447 |
448 | def indonesian_wordlist():
449 | echo(f"%%%%%%% Installing... indonesian-wordlist", foreground="vcyan")
450 | # secretum inc
451 | os.system('apt install git')
452 | os.system('git clone https://github.com/geovedi/indonesian-wordlist')
453 | os.system('mv indonesian-wordlist {}'.format(homeDir))
454 | echo('###### Done')
455 | backtomenu_option()
456 |
457 | def fbBrute():
458 | echo(f"%%%%%%% Installing... Facebook Brute Force 3", foreground="vcyan")
459 | # secretum inc
460 | os.system('apt install curl python2')
461 | os.system('python2 -m pip install mechanize')
462 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/scripts/facebook3.py')
463 | os.system('curl -O https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/wordlist/password.txt')
464 | os.system('mkdir {}/facebook-brute-3'.format(homeDir))
465 | os.system('mv facebook3.py {0}/facebook-brute-3 && mv password.txt {0}/facebook-brute-3'.format(homeDir))
466 | echo('###### Done')
467 | backtomenu_option()
468 |
469 | def webdav():
470 | echo(f"%%%%%%% Installing... WebDAV", foreground="vcyan")
471 | # secretum inc
472 | os.system('apt install python2 openssl curl libcurl')
473 | os.system('python2 -m pip install urllib3 chardet certifi idna requests')
474 | os.system('mkdir {}/webdav'.format(homeDir))
475 | os.system('curl -k -O https://pastebin.com/raw/HnVyQPtR;mv HnVyQPtR {}/webdav/webdav.py'.format(homeDir))
476 | echo('###### Done')
477 | backtomenu_option()
478 |
479 | def webmassploit():
480 | echo(f"%%%%%%% Installing... Webdav Mass Exploiter", foreground="vcyan")
481 | # secretum inxlc
482 | os.system("apt install python2 openssl curl libcurl")
483 | os.system("python2 -m pip install requests")
484 | os.system("curl -k -O https://pastebin.com/raw/K1VYVHxX && mv K1VYVHxX webdav.py")
485 | os.system("mkdir {0}/webdav-mass-exploit && mv webdav.py {0}/webdav-mass-exploit".format(homeDir))
486 | echo('###### Done')
487 | backtomenu_option()
488 |
489 | def sqldump():
490 | echo(f"%%%%%%% Installing... sqldump", foreground="vcyan")
491 | # secretum inc
492 | os.system('apt install python2 curl')
493 | os.system('python2 -m pip install google')
494 | os.system('curl -k -O https://gist.githubusercontent.com/Gameye98/76076c9a282a6f32749894d5368024a6/raw/6f9e754f2f81ab2b8efda30603dc8306c65bd651/sqldump.py')
495 | os.system('mkdir {0}/sqldump && chmod +x sqldump.py && mv sqldump.py {0}/sqldump'.format(homeDir))
496 | echo('###### Done')
497 | backtomenu_option()
498 |
499 | def websploit():
500 | echo(f"%%%%%%% Installing... Websploit", foreground="vcyan")
501 | # secretum inc
502 | os.system('apt install git python2')
503 | os.system('python2 -m pip install scapy')
504 | os.system('git clone https://github.com/The404Hacking/websploit')
505 | os.system('mv websploit {}'.format(homeDir))
506 | echo('###### Done')
507 | backtomenu_option()
508 |
509 | def metasploit():
510 | echo(f"%%%%%%% Installing... Metasploit", foreground="vcyan")
511 | # secretum inxlc
512 | os.system("apt install unstable-repo")
513 | os.system("cd {} && apt install metasploit".format(homeDir))
514 | echo('###### Done')
515 | echo(f"###### Type 'msfconsole' to start.")
516 | backtomenu_option()
517 |
518 | def commix():
519 | echo(f"%%%%%%% Installing... Commix", foreground="vcyan")
520 | # secretum inc
521 | os.system('apt install python2 git')
522 | os.system('git clone https://github.com/commixproject/commix')
523 | os.system('mv commix {}'.format(homeDir))
524 | echo('###### Done')
525 | backtomenu_option()
526 |
527 | def brutal():
528 | echo(f"%%%%%%% Installing... Brutal", foreground="vcyan")
529 | # secretum inc
530 | os.system('apt install git')
531 | os.system('git clone https://github.com/Screetsec/Brutal')
532 | os.system('mv Brutal {}'.format(homeDir))
533 | echo('###### Done')
534 | backtomenu_option()
535 |
536 | def knockmail():
537 | echo(f"%%%%%%% Installing... KnockMail", foreground="vcyan")
538 | # secretum inc
539 | os.system('apt install python2 git')
540 | os.system('python2 -m pip install validate_email pyDNS')
541 | os.system('git clone https://github.com/4w4k3/KnockMail')
542 | os.system('mv KnockMail {}'.format(homeDir))
543 | echo('###### Done')
544 | backtomenu_option()
545 |
546 | def hac():
547 | echo(f"%%%%%%% Installing... Hac", foreground="vcyan")
548 | # secretum inc
549 | os.system('apt install php git')
550 | os.system('git clone https://github.com/Cvar1984/Hac')
551 | os.system('mv Hac {}'.format(homeDir))
552 | echo('###### Done')
553 | backtomenu_option()
554 |
555 | def rang3r():
556 | echo(f"%%%%%%% Installing... Rang3r", foreground="vcyan")
557 | # secretum inxlc
558 | os.system("apt install git python2 && python2 -m pip install optparse termcolor")
559 | os.system("git clone https://github.com/floriankunushevci/rang3r")
560 | os.system("mv rang3r {}".format(homeDir))
561 | echo('###### Done')
562 | backtomenu_option()
563 |
564 | def sh33ll():
565 | echo(f"%%%%%%% Installing... SH33LL", foreground="vcyan")
566 | # secretum inxlc
567 | os.system("apt install git python2")
568 | os.system("git clone https://github.com/LOoLzeC/SH33LL")
569 | os.system("mv SH33LL {}".format(homeDir))
570 | echo('###### Done')
571 | backtomenu_option()
572 |
573 | def social():
574 | echo(f"%%%%%%% Installing... Social-Engineering", foreground="vcyan")
575 | # secretum inxlc
576 | os.system("apt install python2 perl")
577 | os.system("git clone https://github.com/LOoLzeC/social-engineering")
578 | os.system("mv social-engineering {}".format(homeDir))
579 | echo('###### Done')
580 | backtomenu_option()
581 |
582 | def spiderbot():
583 | echo(f"%%%%%%% Installing... SpiderBot", foreground="vcyan")
584 | # secretum inxlc
585 | os.system("apt install git php")
586 | os.system("git clone https://github.com/Cvar1984/SpiderBot")
587 | os.system("mv SpiderBot {}".format(homeDir))
588 | echo('###### Done')
589 | backtomenu_option()
590 |
591 | def ngrok():
592 | echo(f"%%%%%%% Installing... Ngrok", foreground="vcyan")
593 | # secretum inc
594 | os.system('apt install git')
595 | os.system('git clone https://github.com/themastersunil/ngrok')
596 | os.system('mv ngrok {}'.format(homeDir))
597 | echo('###### Done')
598 | backtomenu_option()
599 |
600 | def sudo():
601 | echo(f"%%%%%%% Installing... sudo", foreground="vcyan")
602 | # secretum inc
603 | os.system('apt install ncurses-utils git')
604 | os.system('git clone https://github.com/st42/termux-sudo')
605 | os.system('mv termux-sudo {0} && cd {0}/termux-sudo && chmod 777 *'.format(homeDir))
606 | os.system('cat sudo > /data/data/com.termux/files/usr/bin/sudo')
607 | os.system('chmod 700 /data/data/com.termux/files/usr/bin/sudo')
608 | echo('###### Done')
609 | backtomenu_option()
610 |
611 | def ubuntu():
612 | echo(f"%%%%%%% Installing... Ubuntu", foreground="vcyan")
613 | # secretum inc
614 | os.system('apt install python2 git')
615 | os.system('git clone https://github.com/Neo-Oli/termux-ubuntu')
616 | os.system('mv termux-ubuntu {0} && cd {0}/termux-ubuntu && bash ubuntu.sh'.format(homeDir))
617 | echo('###### Done')
618 | backtomenu_option()
619 |
620 | def fedora():
621 | echo(f"%%%%%%% Installing... Fedora", foreground="vcyan")
622 | # secretum inc
623 | os.system('apt install wget git')
624 | os.system('wget https://raw.githubusercontent.com/nmilosev/termux-fedora/master/termux-fedora.sh')
625 | os.system('mv termux-fedora.sh {}'.format(homeDir))
626 | echo('###### Done')
627 | backtomenu_option()
628 |
629 | def nethunter():
630 | echo(f"%%%%%%% Installing... Kali NetHunter", foreground="vcyan")
631 | # secretum inc
632 | os.system('apt install git')
633 | os.system('git clone https://github.com/Hax4us/Nethunter-In-Termux')
634 | os.system('mv Nethunter-In-Termux {}'.format(homeDir))
635 | echo('###### Done')
636 | backtomenu_option()
637 |
638 | def blackbox():
639 | echo(f"%%%%%%% Installing... BlackBox", foreground="vcyan")
640 | # secretum inc
641 | os.system('apt install python2 git && python2 -m pip install optparse passlib')
642 | os.system('git clone https://github.com/jothatron/blackbox')
643 | os.system('mv blackbox {}'.format(homeDir))
644 | echo('###### Done')
645 | backtomenu_option()
646 |
647 | def xattacker():
648 | echo(f"%%%%%%% Installing... XAttacker", foreground="vcyan")
649 | # secretum inc
650 | os.system('apt install git perl')
651 | os.system('cpnm install HTTP::Request')
652 | os.system('cpnm install LWP::Useragent')
653 | os.system('git clone https://github.com/Moham3dRiahi/XAttacker')
654 | os.system('mv XAttacker {}'.format(homeDir))
655 | echo('###### Done')
656 | backtomenu_option()
657 |
658 | def vcrt():
659 | echo(f"%%%%%%% Installing... VCRT", foreground="vcyan")
660 | # secretum inc
661 | os.system('apt install python2 git')
662 | os.system('git clone https://github.com/LOoLzeC/Evil-create-framework')
663 | os.system('mv Evil-create-framework {}'.format(homeDir))
664 | echo('###### Done')
665 | backtomenu_option()
666 |
667 | def socfish():
668 | echo(f"%%%%%%% Installing... SocialFish", foreground="vcyan")
669 | # secretum inc
670 | os.system('apt install python2 git && python2 -m pip install wget')
671 | os.system('git clone https://github.com/UndeadSec/SocialFish')
672 | os.system('mv SocialFish {}'.format(homeDir))
673 | echo('###### Done')
674 | backtomenu_option()
675 |
676 | def ecode():
677 | echo(f"%%%%%%% Installing... ECode", foreground="vcyan")
678 | # secretum inc
679 | os.system('apt install php git')
680 | os.system('git clone https://github.com/Cvar1984/Ecode')
681 | os.system('mv Ecode {}'.format(homeDir))
682 | echo('###### Done')
683 | backtomenu_option()
684 |
685 | def xsstrike():
686 | echo(f"%%%%%%% Installing... XSStrike", foreground="vcyan")
687 | # secretum inc
688 | os.system('apt install git python2')
689 | os.system('python2 -m pip install fuzzywuzzy prettytable mechanize HTMLParser')
690 | os.system('git clone https://github.com/s0md3v/XSStrike')
691 | os.system('mv XSStrike {}'.format(homeDir))
692 | echo('###### Done')
693 | backtomenu_option()
694 |
695 | def breacher():
696 | echo(f"%%%%%%% Installing... Breacher", foreground="vcyan")
697 | # secretum inc
698 | os.system('apt install git python2')
699 | os.system('python2 -m pip install requests argparse')
700 | os.system('git clone https://github.com/s0md3v/Breacher')
701 | os.system('mv Breacher {}'.format(homeDir))
702 | echo('###### Done')
703 | backtomenu_option()
704 |
705 | def stylemux():
706 | echo(f"%%%%%%% Installing... Termux-Styling", foreground="vcyan")
707 | # secretum inc
708 | os.system('apt install git')
709 | os.system('git clone https://github.com/BagazMukti/Termux-Styling-Shell-Script')
710 | os.system('mv Termux-Styling-Shell-Script {}'.format(homeDir))
711 | echo('###### Done')
712 | backtomenu_option()
713 |
714 | def txtool():
715 | echo(f"%%%%%%% Installing... TXTool", foreground="vcyan")
716 | # secretum inc
717 | os.system('apt install git python2 nmap php curl')
718 | os.system('python2 -m pip install requests')
719 | os.system('git clone https://github.com/kuburan/txtool')
720 | os.system('mv txtool {}'.format(homeDir))
721 | echo('###### Done')
722 | backtomenu_option()
723 |
724 | def passgencvar():
725 | echo(f"%%%%%%% Installing... PassGen", foreground="vcyan")
726 | # secretum inc
727 | os.system('apt install git php')
728 | os.system('git clone https://github.com/Cvar1984/PassGen')
729 | os.system('mv PassGen {}'.format(homeDir))
730 | echo('###### Done')
731 | backtomenu_option()
732 |
733 | def owscan():
734 | echo(f"%%%%%%% Installing... OWScan", foreground="vcyan")
735 | # secretum inc
736 | os.system('apt install git php')
737 | os.system('git clone https://github.com/Gameye98/OWScan')
738 | os.system('mv OWScan {}'.format(homeDir))
739 | echo('###### Done')
740 | backtomenu_option()
741 |
742 | def sanlen():
743 | echo(f"%%%%%%% Installing... santet-online", foreground="vcyan")
744 | # secretum inc
745 | os.system('apt install git python2 && python2 -m pip install requests')
746 | os.system('git clone https://github.com/Gameye98/santet-online')
747 | os.system('mv santet-online {}'.format(homeDir))
748 | echo('###### Done')
749 | backtomenu_option()
750 |
751 | def spazsms():
752 | echo(f"%%%%%%% Installing... SpazSMS", foreground="vcyan")
753 | # secretum inc
754 | os.system('apt install git python2 && python2 -m pip install requests')
755 | os.system('git clone https://github.com/Gameye98/SpazSMS')
756 | os.system('mv SpazSMS {}'.format(homeDir))
757 | echo('###### Done')
758 | backtomenu_option()
759 |
760 | def hasher():
761 | echo(f"%%%%%%% Installing... Hasher", foreground="vcyan")
762 | # secretum inc
763 | os.system('apt install git python2 && python2 -m pip install passlib binascii progressbar')
764 | os.system('git clone https://github.com/CiKu370/hasher')
765 | os.system('mv hasher {}'.format(homeDir))
766 | echo('###### Done')
767 | backtomenu_option()
768 |
769 | def hashgenerator():
770 | echo(f"%%%%%%% Installing... Hash-Generator", foreground="vcyan")
771 | # secretum inc
772 | os.system('apt install git python2 && python2 -m pip install passlib progressbar')
773 | os.system('git clone https://github.com/CiKu370/hash-generator')
774 | os.system('mv hash-generator {}'.format(homeDir))
775 | echo('###### Done')
776 | backtomenu_option()
777 |
778 | def kodork():
779 | echo(f"%%%%%%% Installing... ko-dork", foreground="vcyan")
780 | # secretum inc
781 | os.system('apt install git python2 && python2 -m pip install urllib2')
782 | os.system('git clone https://github.com/CiKu370/ko-dork')
783 | os.system('mv ko-dork {}'.format(homeDir))
784 | echo('###### Done')
785 | backtomenu_option()
786 |
787 | def snitch():
788 | echo(f"%%%%%%% Installing... snitch", foreground="vcyan")
789 | # secretum inc
790 | os.system('apt install git python2')
791 | os.system('git clone https://github.com/Smaash/snitch')
792 | os.system('mv snitch {}'.format(homeDir))
793 | echo('###### Done')
794 | backtomenu_option()
795 |
796 | def osif():
797 | echo(f"%%%%%%% Installing... OSIF", foreground="vcyan")
798 | # secretum inc
799 | os.system('apt install git python2')
800 | os.system('python2 -m pip install requests')
801 | os.system('git clone https://github.com/CiKu370/OSIF')
802 | os.system('mv OSIF {}'.format(homeDir))
803 | echo('###### Done')
804 | backtomenu_option()
805 |
806 | def nk26():
807 | echo(f"%%%%%%% Installing... nk26", foreground="vcyan")
808 | # secretum inc
809 | os.system('apt install git php')
810 | os.system('git clone https://github.com/milio48/nk26')
811 | os.system('mv nk26 {}'.format(homeDir))
812 | echo('###### Done')
813 | backtomenu_option()
814 |
815 | def devploit():
816 | echo(f"%%%%%%% Installing... Devploit", foreground="vcyan")
817 | # secretum inc
818 | os.system('apt install python2 git && python2 -m pip install urllib2')
819 | os.system('git clone https://github.com/joker25000/Devploit')
820 | os.system('mv Devploit {}'.format(homeDir))
821 | echo('###### Done')
822 | backtomenu_option()
823 |
824 | def hasherdotid():
825 | echo(f"%%%%%%% Installing... Hasherdotid", foreground="vcyan")
826 | # secretum inc
827 | os.system('apt install python2 git')
828 | os.system('git clone https://github.com/galauerscrew/hasherdotid')
829 | os.system('mv hasherdotid {}'.format(homeDir))
830 | echo('###### Done')
831 | backtomenu_option()
832 |
833 | def namechk():
834 | echo(f"%%%%%%% Installing... Namechk", foreground="vcyan")
835 | # secretum inc
836 | os.system('apt install git')
837 | os.system('git clone https://github.com/HA71/Namechk')
838 | os.system('mv Namechk {}'.format(homeDir))
839 | echo('###### Done')
840 | backtomenu_option()
841 |
842 | def xlPy():
843 | echo(f"%%%%%%% Installing... xl-py", foreground="vcyan")
844 | # secretum inc
845 | os.system('apt install python git')
846 | os.system('git clone https://github.com/albertoanggi/xl-py')
847 | os.system('mv xl-py {}'.format(homeDir))
848 | echo('###### Done')
849 | backtomenu_option()
850 |
851 | def beanshell():
852 | echo(f"%%%%%%% Installing... Beanshell", foreground="vcyan")
853 | # secretum inc
854 | os.system('apt install dpkg wget')
855 | os.system('wget https://github.com/amsitlab/amsitlab.github.io/raw/master/dists/termux/amsitlab/binary-all/beanshell_2.04_all.deb')
856 | os.system('dpkg -i beanshell_2.04_all.deb')
857 | os.system('rm beanshell_2.04_all.deb')
858 | echo('###### Done')
859 | echo(f"###### Type 'bsh' to start.")
860 | backtomenu_option()
861 |
862 | def crunch():
863 | echo(f"%%%%%%% Installing... Crunch", foreground="vcyan")
864 | # secretum inc
865 | os.system('apt install unstable-repo')
866 | os.system('apt install crunch')
867 | echo(f"###### Done")
868 | echo(f"###### Type 'crunch' to start.")
869 | backtomenu_option()
870 |
871 | def binploit():
872 | echo(f"%%%%%%% Installing... Binary Exploitation", foreground="vcyan")
873 | # secretum inc
874 | os.system('apt install unstable-repo')
875 | os.system('apt install gdb radare2 ired ddrescue bin-utils yasm strace ltrace cdb hexcurse memcached llvmdb')
876 | echo(f"###### Done")
877 | echo(f"###### Tutorial: https://youtu.be/3NTXFUxcKPc")
878 | backtomenu_option()
879 |
880 | def textr():
881 | echo(f"%%%%%%% Installing... Textr", foreground="vcyan")
882 | # secretum inc
883 | os.system('apt install dpkg wget')
884 | os.system('wget https://raw.githubusercontent.com/amsitlab/textr/master/textr_1.0_all.deb')
885 | os.system('dpkg -i textr_1.0_all.deb')
886 | os.system('rm textr_1.0_all.deb')
887 | echo('###### Done')
888 | echo(f"###### Type 'textr' to start.")
889 | backtomenu_option()
890 |
891 | def apsca():
892 | echo(f"%%%%%%% Installing... ApSca", foreground="vcyan")
893 | # secretum inc
894 | os.system('apt install dpkg wget')
895 | os.system('wget https://raw.githubusercontent.com/BlackHoleSecurity/apsca/master/apsca_0.1_all.deb')
896 | os.system('dpkg -i apsca_0.1_all.deb')
897 | os.system('rm apsca_0.1_all.deb')
898 | echo('###### Done')
899 | echo(f"###### Type 'apsca' to start.")
900 | backtomenu_option()
901 |
902 | def amox():
903 | echo(f"%%%%%%% Installing... amox", foreground="vcyan")
904 | # secretum inc
905 | os.system('apt install dpkg wget')
906 | os.system('wget https://gitlab.com/dtlily/amox/raw/master/amox_1.0_all.deb')
907 | os.system('dpkg -i amox_1.0_all.deb')
908 | os.system('rm amox_1.0_all.deb')
909 | echo('###### Done')
910 | echo(f"###### Type 'amox' to start.")
911 | backtomenu_option()
912 |
913 | def fade():
914 | echo(f"%%%%%%% Installing... FaDe", foreground="vcyan")
915 | # secretum inc
916 | os.system('apt install git python2 && python2 -m pip install requests')
917 | os.system('git clone https://github.com/Gameye98/FaDe')
918 | os.system('mv FaDe {}'.format(homeDir))
919 | echo('###### Done')
920 | backtomenu_option()
921 |
922 | def ginf():
923 | echo(f"%%%%%%% Installing... GINF", foreground="vcyan")
924 | # secretum inc
925 | os.system('apt install git php')
926 | os.system('git clone https://github.com/Gameye98/GINF')
927 | os.system('mv GINF {}'.format(homeDir))
928 | echo('###### Done')
929 | backtomenu_option()
930 |
931 | def auxile():
932 | echo(f"%%%%%%% Installing... AUXILE", foreground="vcyan")
933 | # secretum inc
934 | os.system('apt install git python2 && python2 -m pip install requests bs4 pexpect')
935 | os.system('git clone https://github.com/CiKu370/AUXILE')
936 | os.system('mv AUXILE {}'.format(homeDir))
937 | echo('###### Done')
938 | backtomenu_option()
939 |
940 | def inther():
941 | echo(f"%%%%%%% Installing... inther", foreground="vcyan")
942 | # secretum inc
943 | os.system('apt install git ruby')
944 | os.system('git clone https://github.com/Gameye98/inther')
945 | os.system('mv inther {}'.format(homeDir))
946 | echo('###### Done')
947 | backtomenu_option()
948 |
949 | def hpb():
950 | echo(f"%%%%%%% Installing... HPB", foreground="vcyan")
951 | # secretum inc
952 | os.system('apt install dpkg wget')
953 | os.system('wget https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/package/html_0.1_all.deb')
954 | os.system('dpkg -i html_0.1_all.deb')
955 | os.system('rm html_0.1_all.deb')
956 | echo('###### Done')
957 | echo(f"###### Type 'hpb' to start.")
958 | backtomenu_option()
959 |
960 | def fmbrute():
961 | echo(f"%%%%%%% Installing... FMBrute", foreground="vcyan")
962 | # secretum inc
963 | os.system('apt install git python && python -m pip install requests')
964 | os.system('git clone https://github.com/Gameye98/FMBrute')
965 | os.system('mv FMBrute {}'.format(homeDir))
966 | echo('###### Done')
967 | backtomenu_option()
968 |
969 | def hashid():
970 | echo(f"%%%%%%% Installing... HashID", foreground="vcyan")
971 | # secretum inc
972 | os.system('apt install python2 && python2 -m pip install hashid')
973 | echo(f"###### Done")
974 | echo(f"###### Type 'hashid -h' to show usage of hashid")
975 | backtomenu_option()
976 |
977 | def gpstr():
978 | echo(f"%%%%%%% Installing... GPS Tracking", foreground="vcyan")
979 | # secretum inc
980 | os.system('apt install php git')
981 | os.system('git clone https://github.com/indosecid/gps_tracking')
982 | os.system('mv gps_tracking {}'.format(homeDir))
983 | echo(f"###### Done")
984 | backtomenu_option()
985 |
986 | def pret():
987 | echo(f"%%%%%%% Installing... PRET", foreground="vcyan")
988 | # secretum inc
989 | os.system('apt install python2 imagemagick git')
990 | os.system('python2 -m pip install colorama pysnmp')
991 | os.system('git clone https://github.com/RUB-NDS/PRET')
992 | os.system('mv PRET {}'.format(homeDir))
993 | echo(f"###### Done")
994 | backtomenu_option()
995 |
996 | def atlas():
997 | echo(f"%%%%%%% Installing... Atlas", foreground="vcyan")
998 | # secretum inc
999 | os.system('apt install git python2 && python2 -m pip install urllib2')
1000 | os.system('git clone https://github.com/m4ll0k/Atlas')
1001 | os.system('mv Atlas {}'.format(homeDir))
1002 | echo(f"###### Done")
1003 | backtomenu_option()
1004 |
1005 | def hashcat():
1006 | echo(f"%%%%%%% Installing... Hashcat", foreground="vcyan")
1007 | # secretum inc
1008 | os.system('apt install unstable-repo')
1009 | os.system('apt install hashcat')
1010 | echo(f"###### Done")
1011 | echo(f"###### Type 'hashcat' to start.")
1012 | backtomenu_option()
1013 |
1014 | def liteotp():
1015 | echo(f"%%%%%%% Installing... LiteOTP", foreground="vcyan")
1016 | # secretum inc
1017 | os.system('apt install php wget')
1018 | os.system('wget https://raw.githubusercontent.com/Cvar1984/LiteOTP/master/build/main.phar -O $PREFIX/bin/lite')
1019 | echo(f"###### Done")
1020 | echo(f"###### Type 'lite' to start.")
1021 | backtomenu_option()
1022 |
1023 | def fbbrutex():
1024 | echo(f"%%%%%%% Installing... FBBrute", foreground="vcyan")
1025 | # secretum inc
1026 | os.system('apt install git python && python -m pip install requests')
1027 | os.system('git clone https://github.com/Gameye98/FBBrute')
1028 | os.system('mv FBBrute {}'.format(homeDir))
1029 | echo('###### Done')
1030 | backtomenu_option()
1031 |
1032 | def fim():
1033 | echo(f"%%%%%%% Installing... fim", foreground="vcyan")
1034 | # secretum inc
1035 | os.system('apt install git python && python -m pip install requests bs4')
1036 | os.system('git clone https://github.com/karjok/fim')
1037 | os.system('mv fim {}'.format(homeDir))
1038 | echo('###### Done')
1039 | backtomenu_option()
1040 |
1041 | def rshell():
1042 | echo(f"%%%%%%% Installing... RShell", foreground="vcyan")
1043 | # secretum inc
1044 | os.system('apt install git python && python -m pip install colorama')
1045 | os.system('git clone https://github.com/Jishu-Epic/RShell')
1046 | os.system('mv RShell {}'.format(homeDir))
1047 | echo('###### Done')
1048 | backtomenu_option()
1049 |
1050 | def termpyter():
1051 | echo(f"%%%%%%% Installing... TermPyter", foreground="vcyan")
1052 | # secretum inc
1053 | os.system('apt install git python')
1054 | os.system('git clone https://github.com/Jishu-Epic/TermPyter')
1055 | os.system('mv TermPyter {}'.format(homeDir))
1056 | echo('###### Done')
1057 | backtomenu_option()
1058 |
1059 | def maxsubdofinder():
1060 | echo(f"%%%%%%% Installing... MaxSubdoFinder", foreground="vcyan")
1061 | # secretum inc
1062 | os.system('apt install git python2')
1063 | os.system('python2 -m pip install requests')
1064 | os.system('git clone https://github.com/maxteroit/MaxSubdoFinder')
1065 | os.system('mv MaxSubdoFinder {}'.format(homeDir))
1066 | echo('###### Done')
1067 | backtomenu_option()
1068 |
1069 | def jadx():
1070 | echo(f"%%%%%%% Installing... jadx", foreground="vcyan")
1071 | # secretum inc
1072 | os.system('apt install dpkg wget')
1073 | os.system('wget https://github.com/Lexiie/Termux-Jadx/blob/master/jadx-0.6.1_all.deb?raw=true')
1074 | os.system('dpkg -i jadx-0.6.1_all.deb?raw=true')
1075 | os.system('rm -rf jadx-0.6.1_all.deb?raw=true')
1076 | echo('###### Done')
1077 | echo(f"###### Type 'jadx' to start.")
1078 | backtomenu_option()
1079 |
1080 | def pwnedornot():
1081 | echo(f"%%%%%%% Installing... pwnedOrNot", foreground="vcyan")
1082 | # secretum inc
1083 | os.system('apt install git python')
1084 | os.system('python -m pip install requests')
1085 | os.system('git clone https://github.com/thewhiteh4t/pwnedOrNot')
1086 | os.system('mv pwnedOrNot {}'.format(homeDir))
1087 | echo('###### Done')
1088 | backtomenu_option()
1089 |
1090 | def maclook():
1091 | echo(f"%%%%%%% Installing... Mac-Lookup", foreground="vcyan")
1092 | # secretum inc
1093 | os.system('apt install git python')
1094 | os.system('python -m pip install requests')
1095 | os.system('git clone https://github.com/T4P4N/Mac-Lookup')
1096 | os.system('mv Mac-Lookup {}'.format(homeDir))
1097 | echo('###### Done')
1098 | backtomenu_option()
1099 |
1100 | def f4k3():
1101 | echo(f"%%%%%%% Installing... F4K3", foreground="vcyan")
1102 | # secretum inc
1103 | os.system('apt install dpkg wget')
1104 | os.system('wget https://github.com/Gameye98/Gameye98.github.io/blob/master/package/f4k3_1.0_all.deb')
1105 | os.system('dpkg -i f4k3_1.0_all.deb')
1106 | os.system('rm -rf f4k3_1.0_all.deb')
1107 | echo('###### Done')
1108 | echo(f"###### Type 'f4k3' to start.")
1109 | backtomenu_option()
1110 |
1111 | def katak():
1112 | echo(f"%%%%%%% Installing... Katak", foreground="vcyan")
1113 | # secretum inc
1114 | os.system('apt install git python2')
1115 | os.system('python2 -m pip install requests progressbar')
1116 | os.system('git clone https://github.com/Gameye98/Katak')
1117 | os.system('mv Katak {}'.format(homeDir))
1118 | echo('###### Done')
1119 | backtomenu_option()
1120 |
1121 | def heroku():
1122 | echo(f"%%%%%%% Installing... heroku", foreground="vcyan")
1123 | # secretum inc
1124 | os.system('apt install nodejs')
1125 | os.system('npm install heroku -g')
1126 | echo('###### Done')
1127 | echo(f"###### Type 'heroku' to start.")
1128 | backtomenu_option()
1129 |
1130 | def google():
1131 | echo(f"%%%%%%% Installing... google", foreground="vcyan")
1132 | # secretum inc
1133 | os.system('apt install python')
1134 | os.system('python -m pip install google')
1135 | echo('###### Done')
1136 | echo(f"###### Type 'google' to start.")
1137 | backtomenu_option()
1138 |
1139 | def billcypher():
1140 | echo(f"%%%%%%% Installing... BillCypher", foreground="vcyan")
1141 | # secretum inc
1142 | os.system('apt install git python')
1143 | os.system('python -m pip install argparse dnspython requests urllib3 colorama')
1144 | os.system('git clone https://github.com/GitHackTools/BillCipher')
1145 | os.system('mv BillCypher {}'.format(homeDir))
1146 | echo('###### Done')
1147 | backtomenu_option()
1148 |
1149 | def vbug():
1150 | echo(f"%%%%%%% Installing... vbug", foreground="vcyan")
1151 | # secretum inc
1152 | os.system('apt install git python2')
1153 | os.system('git clone https://github.com/Gameye98/vbug')
1154 | os.system('mv vbug {}'.format(homeDir))
1155 | echo('###### Done')
1156 | backtomenu_option()
1157 |
1158 | def kojawafft():
1159 | echo(f"%%%%%%% Installing... kojawafft", foreground="vcyan")
1160 | # secretum inc
1161 | os.system('apt install git nodejs')
1162 | os.system('git clone https://github.com/sandalpenyok/kojawafft')
1163 | os.system('mv kojawafft {}'.format(homeDir))
1164 | os.system('cd $HOME/kojawafft && unzip node_modules.zip && cd -')
1165 | echo('###### Done')
1166 | backtomenu_option()
1167 |
1168 | def aircrackng():
1169 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted");
1170 | else:
1171 | echo(f"%%%%%%% Installing... aircrack-ng", foreground="vcyan")
1172 | # secretum inc
1173 | os.system('apt install root-repo aircrack-ng')
1174 | echo('###### Done')
1175 | echo(f"###### Type 'aircrack-ng' to start.")
1176 | backtomenu_option()
1177 |
1178 | def ettercap():
1179 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted");
1180 | else:
1181 | echo(f"%%%%%%% Installing... ettercap", foreground="vcyan")
1182 | # secretum inc
1183 | os.system('apt install root-repo ettercap')
1184 | echo('###### Done')
1185 | echo(f"###### Type 'ettercap' to start.")
1186 | backtomenu_option()
1187 |
1188 | def ccgen():
1189 | echo(f"%%%%%%% Installing... ccgen", foreground="vcyan")
1190 | # secretum inc
1191 | os.system('apt install git python')
1192 | os.system('git clone https://github.com/Gameye98/ccgen')
1193 | os.system('mv ccgen {}'.format(homeDir))
1194 | echo('###### Done')
1195 | backtomenu_option()
1196 |
1197 | def ddcrypt():
1198 | echo(f"%%%%%%% Installing... ddcrypt", foreground="vcyan")
1199 | # secretum inc
1200 | os.system('apt install git python')
1201 | os.system('git clone https://github.com/Gameye98/ddcrypt')
1202 | os.system('mv ddcrypt {}'.format(homeDir))
1203 | echo('###### Done')
1204 | backtomenu_option()
1205 |
1206 | def dnsrecon():
1207 | echo(f"%%%%%%% Installing... dnsrecon", foreground="vcyan")
1208 | # secretum inc
1209 | os.system('apt install git python')
1210 | os.system('git clone https://github.com/darkoperator/dnsrecon')
1211 | os.system('python -m pip install -r dnsrecon/requirements.txt')
1212 | os.system('mv dnsrecon {}'.format(homeDir))
1213 | echo('###### Done')
1214 | backtomenu_option()
1215 |
1216 | def zphisher():
1217 | echo(f"%%%%%%% Installing... zphisher", foreground="vcyan")
1218 | # secretum inc
1219 | os.system('apt install git php openssh curl')
1220 | os.system('git clone https://github.com/htr-tech/zphisher')
1221 | os.system('mv zphisher {}'.format(homeDir))
1222 | echo('###### Done')
1223 | backtomenu_option()
1224 |
1225 | def apktool():
1226 | echo(f"%%%%%%% Installing... apktool", foreground="vcyan")
1227 | # secretum inc
1228 | os.system('apt install git dpkg')
1229 | os.system('git clone https://github.com/Lexiie/Termux-Apktool')
1230 | os.system('mv Termux-Apktool {}'.format(homeDir))
1231 | os.system('cd {}/Termux-Apktool && dpkg -i *.deb'.format(homeDir))
1232 | echo('###### Done')
1233 | echo(f"###### Type 'apktool' to start.")
1234 | backtomenu_option()
1235 |
1236 | def uncompyle():
1237 | echo(f"%%%%%%% Installing... uncompyle6", foreground="vcyan")
1238 | # secretum inc
1239 | os.system('apt install python python2')
1240 | os.system('python2 -m pip install uncompyle6')
1241 | os.system('mv $PREFIX/bin/uncompyle6 $PREFIX/bin/uncompyle')
1242 | os.system('python -m pip install uncompyle6')
1243 | echo('###### Done')
1244 | echo('###### (py2) Usage: uncompyle')
1245 | echo('###### (py3) Usage: uncompyle6')
1246 | backtomenu_option()
1247 |
1248 | def wifite():
1249 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted");
1250 | else:
1251 | echo(f"%%%%%%% Installing... Wifite", foreground="vcyan")
1252 | # secretum inc
1253 | os.system('apt install git python2')
1254 | os.system('git clone https://github.com/derv82/wifite')
1255 | os.system('mv wifite {}'.format(homeDir))
1256 | echo('###### Done')
1257 | backtomenu_option()
1258 |
1259 | def parrot():
1260 | echo(f"%%%%%%% Installing... Parrot", foreground="vcyan")
1261 | # secretum inc
1262 | os.system('apt install wget openssl-tool proot -y && hash -r && cd {} && wget https://raw.githubusercontent.com/AndronixApp/AndronixOrigin/master/Installer/Parrot/parrot.sh && bash parrot.sh'.format(homeDir))
1263 | os.system('cd {} && bash start-parrot.sh'.format(homeDir))
1264 | echo('###### Done')
1265 | echo('###### Make sure visit: https://techriz.com/how-to-install-parrot-linux-on-android-without-root/')
1266 | os.system('am start -a android.intent.action.VIEW -d "https://techriz.com/how-to-install-parrot-linux-on-android-without-root/"')
1267 | backtomenu_option()
1268 |
1269 | def archlinux():
1270 | echo(f"%%%%%%% Installing... Arch Linux", foreground="vcyan")
1271 | # secretum inc
1272 | os.system('apt install git')
1273 | os.system('cd $HOME && git clone https://github.com/sdrausty/TermuxArch')
1274 | os.system('cd $HOME && bash TermuxArch/setupTermuxArch.sh')
1275 | echo('###### Done')
1276 | backtomenu_option()
1277 |
1278 | def tshark():
1279 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted");
1280 | else:
1281 | echo(f"%%%%%%% Installing... tshark", foreground="vcyan")
1282 | # secretum inc
1283 | os.system('apt install root-repo tshark')
1284 | echo('###### Done')
1285 | echo(f"###### Type 'tshark' to start.")
1286 | backtomenu_option()
1287 |
1288 | def dos2unix():
1289 | echo(f"%%%%%%% Installing... dos2unix", foreground="vcyan")
1290 | # secretum inc
1291 | os.system('apt install dos2unix')
1292 | echo('###### Done')
1293 | echo(f"###### Type 'dos2unix' to start.")
1294 | backtomenu_option()
1295 |
1296 | def exiftool():
1297 | echo(f"%%%%%%% Installing... exiftool", foreground="vcyan")
1298 | # secretum inc
1299 | os.system('apt install exiftool')
1300 | echo('###### Done')
1301 | echo(f"###### Type 'exiftool' to start.")
1302 | backtomenu_option()
1303 |
1304 | def iconv():
1305 | echo(f"%%%%%%% Installing... iconv", foreground="vcyan")
1306 | # secretum inc
1307 | os.system('apt install iconv')
1308 | echo('###### Done')
1309 | echo(f"###### Type 'iconv' to start.")
1310 | backtomenu_option()
1311 |
1312 | def mediainfo():
1313 | echo(f"%%%%%%% Installing... mediainfo", foreground="vcyan")
1314 | # secretum inc
1315 | os.system('apt install mediainfo')
1316 | echo('###### Done')
1317 | echo('###### Usage: mediainfo filename.pdf')
1318 | backtomenu_option()
1319 |
1320 | def pdfinfo():
1321 | echo(f"%%%%%%% Installing... pdfinfo", foreground="vcyan")
1322 | # secretum inc
1323 | os.system('apt install poppler')
1324 | echo('###### Done')
1325 | echo('###### Usage: pdfinfo filename.pdf')
1326 | backtomenu_option()
1327 |
1328 | def tcpdump():
1329 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted");
1330 | else:
1331 | echo(f"%%%%%%% Installing... tcpdump", foreground="vcyan")
1332 | # secretum inc
1333 | os.system('apt install root-repo tcpdump')
1334 | echo('###### Done')
1335 | echo(f"###### Type 'tcpdump' to start.")
1336 | backtomenu_option()
1337 |
1338 | def hping3():
1339 | if int(inputstream("id -u".split()).decode("utf8")) != 0: echo(f"ERROR: Make sure you're device has been rooted");
1340 | else:
1341 | echo(f"%%%%%%% Installing... hping3", foreground="vcyan")
1342 | # secretum inc
1343 | os.system('apt install root-repo hping3')
1344 | echo('###### Done')
1345 | echo(f"###### Type 'hping3' to start.")
1346 | backtomenu_option()
1347 |
1348 | def dbdat():
1349 | echo(f"%%%%%%% Installing... DbDat", foreground="vcyan")
1350 | # secretum inc
1351 | os.system('apt install git python2')
1352 | os.system('python2 -m pip install MySQL-python psycopg2 cx_Oracle pymssql ibm_db pymongo pyyaml couchdb')
1353 | os.system('git clone https://github.com/foospidy/DbDat')
1354 | os.system('mv DbDat {}'.format(homeDir))
1355 | echo('###### Done')
1356 | backtomenu_option()
1357 |
1358 | def nosqlmap():
1359 | echo(f"%%%%%%% Installing... NoSQLMap", foreground="vcyan")
1360 | # secretum inc
1361 | os.system('apt install git python2 unstable-repo metasploit')
1362 | os.system('python2 -m pip install pymongo httplib2')
1363 | os.system('git clone https://github.com/codingo/NoSQLMap')
1364 | os.system('mv NoSQLMap {}'.format(homeDir))
1365 | echo('###### Done')
1366 | backtomenu_option()
1367 |
1368 | def audit_couchdb():
1369 | echo(f"%%%%%%% Installing... audit_couchdb", foreground="vcyan")
1370 | # secretum inc
1371 | os.system('apt install git nodejs')
1372 | os.system('npm install -g npm@next audit_couchdb')
1373 | os.system('git clone https://github.com/iriscouch/audit_couchdb')
1374 | os.system('mv audit_couchdb {}'.format(homeDir))
1375 | echo('###### Done')
1376 | echo('###### Usage: audit_couchdb https://admin:secret@localhost:5984')
1377 | backtomenu_option()
1378 |
1379 | def mongoaudit():
1380 | echo(f"%%%%%%% Installing... mongoaudit", foreground="vcyan")
1381 | # secretum inc
1382 | os.system('apt install git python -y')
1383 | os.system('python -m pip install pymongo mongoaudit')
1384 | echo('###### Done')
1385 | echo(f"###### Type 'mongoaudit' to start.")
1386 | backtomenu_option()
1387 |
1388 | def wifiphisher():
1389 | echo(f"%%%%%%% Installing... Wifiphisher", foreground="vcyan")
1390 | # secretum inc
1391 | os.system('apt install git python -y')
1392 | os.system('python -m pip install setuptools scapy')
1393 | os.system('git clone https://github.com/wifiphisher/wifiphisher')
1394 | os.system('mv wifiphisher {0} && cd {0}/wifiphisher && python setup.py install'.format(homeDir))
1395 | echo('###### Done')
1396 | backtomenu_option()
1397 |
1398 | def sherlock():
1399 | echo(f"%%%%%%% Installing... sherlock", foreground="vcyan")
1400 | # secretum inc
1401 | os.system('apt install git python -y')
1402 | os.system('git clone https://github.com/sherlock-project/sherlock')
1403 | os.system('mv sherlock {0} && cd {0}/sherlock && python -m pip install -r requirements.txt'.format(homeDir))
1404 | echo('###### Done')
1405 | backtomenu_option()
1406 |
1407 | def shc():
1408 | echo(f"%%%%%%% Installing... shc", foreground="vcyan")
1409 | # secretum inc
1410 | os.system('apt install shc -y')
1411 | echo('###### Done')
1412 | echo(f"###### Type 'shc' to start.")
1413 | backtomenu_option()
1414 |
1415 | def steghide():
1416 | echo(f"%%%%%%% Installing... steghide", foreground="vcyan")
1417 | # secretum inc
1418 | os.system('apt install steghide -y')
1419 | echo('###### Done')
1420 | echo(f"###### Type 'steghide' to start.")
1421 | backtomenu_option()
1422 |
1423 | def tesseract():
1424 | echo(f"%%%%%%% Installing... tesseract", foreground="vcyan")
1425 | # secretum inc
1426 | os.system('apt install tesseract -y')
1427 | echo('###### Done')
1428 | echo(f"###### Type 'tesseract' to start.")
1429 | backtomenu_option()
1430 |
1431 | def sleuthkit():
1432 | echo(f"%%%%%%% Installing... sleuthkit", foreground="vcyan")
1433 | # secretum inc
1434 | os.system('apt install sleuthkit -y')
1435 | echo('###### Done')
1436 | echo(f"###### Type 'pkg files sleuthkit | grep usr/bin' to check executable file related to sleuthkit package.")
1437 | backtomenu_option()
1438 |
1439 | def octave():
1440 | echo(f"%%%%%%% Installing... Octave", foreground="vcyan")
1441 | # secretum inc
1442 | if not repo_check("pointless.list"):
1443 | pointless_repo()
1444 | os.system('apt install octave -y')
1445 | echo('###### Done')
1446 | echo(f"###### Type 'octave' to start.")
1447 | backtomenu_option()
1448 |
1449 | def fpcompiler():
1450 | echo(f"%%%%%%% Installing... fp-compiler", foreground="vcyan")
1451 | # secretum inc
1452 | if not repo_check("pointless.list"):
1453 | pointless_repo()
1454 | os.system('apt install fp-compiler -y')
1455 | echo('###### Done')
1456 | echo(f"###### Type 'fpc' to start.")
1457 | backtomenu_option()
1458 |
1459 | def numpy():
1460 | echo(f"%%%%%%% Installing... numpy", foreground="vcyan")
1461 | # secretum inc
1462 | if not repo_check("pointless.list"):
1463 | pointless_repo()
1464 | os.system('apt install numpy -y')
1465 | echo('###### Done')
1466 | echo(f"###### Type 'pkg files numpy | grep usr/bin' to check executable file related to numpy package.")
1467 | backtomenu_option()
1468 |
1469 | def userrecon():
1470 | echo(f"%%%%%%% Installing... userrecon", foreground="vcyan")
1471 | # secretum inc
1472 | os.system('apt install wget dpkg curl -y')
1473 | os.system('wget https://raw.githubusercontent.com/Gameye98/Gameye98.github.io/master/package/userrecon_1.0_all.deb')
1474 | os.system('dpkg -i userrecon_1.0_all.deb')
1475 | os.system('rm userrecon_1.0_all.deb')
1476 | echo('###### Done')
1477 | echo(f"###### Type 'userrecon' to start.")
1478 | backtomenu_option()
1479 |
1480 | def mrsip():
1481 | echo(f"%%%%%%% Installing... Mr.SIP", foreground="vcyan")
1482 | # secretum inc
1483 | os.system('apt install git python -y')
1484 | os.system('python -m pip install netifaces ipaddress scapy pyfiglet')
1485 | os.system('git clone https://github.com/meliht/Mr.SIP')
1486 | os.system('mv Mr.SIP {}'.format(homeDir))
1487 | echo('###### Done')
1488 | backtomenu_option()
1489 |
1490 | def tmscanner():
1491 | echo(f"%%%%%%% Installing... TM-scanner", foreground="vcyan")
1492 | # secretum inc
1493 | os.system('apt install python python2 nmap git -y')
1494 | os.system('python -m pip install colorama requests')
1495 | os.system('python2 -m pip install colorama requests')
1496 | os.system('git clone https://github.com/TechnicalMujeeb/TM-scanner')
1497 | os.system('mv TM-scanner {}'.format(homeDir))
1498 | echo('###### Done')
1499 | backtomenu_option()
1500 |
1501 | def xss_payload_list():
1502 | echo(f"%%%%%%% Installing... xss-payload-list", foreground="vcyan")
1503 | # secretum inc
1504 | os.system('apt install git -y')
1505 | os.system('git clone https://github.com/payloadbox/xss-payload-list')
1506 | os.system('mv xss-payload-list {}'.format(homeDir))
1507 | echo('###### Done')
1508 | backtomenu_option()
1509 |
1510 | def clickbot():
1511 | echo(f"%%%%%%% Installing... ClickBot", foreground="vcyan")
1512 | # secretum inc
1513 | os.system('apt install python git -y')
1514 | os.system('git clone https://github.com/ziziwho/clickbot')
1515 | os.system("python -m pip install asyncio colorama telethon rsa pyaes asyncio async_generator colorama bs4 requests")
1516 | os.system('mv clickbot {}'.format(homeDir))
1517 | echo('###### Done')
1518 | backtomenu_option()
1519 |
1520 | def phoneinfoga():
1521 | echo(f"%%%%%%% Installing... PhoneInfoga", foreground="vcyan")
1522 | # secretum inc
1523 | os.system('apt install python git -y')
1524 | os.system('git clone https://github.com/ExpertAnonymous/PhoneInfoga')
1525 | os.chdir("PhoneInfoga")
1526 | os.system("python -m pip install -r requirements.txt")
1527 | os.chdir("..")
1528 | os.system('mv PhoneInfoga {}'.format(homeDir))
1529 | echo('###### Done')
1530 | backtomenu_option()
1531 |
1532 | def btc2idr():
1533 | echo(f"%%%%%%% Installing... BTC-to-IDR-checker", foreground="vcyan")
1534 | # secretum inc
1535 | os.system('apt install python git -y')
1536 | os.system('git clone https://github.com/guruku/BTC-to-IDR-checker')
1537 | os.system('mv BTC-to-IDR-checker {}'.format(homeDir))
1538 | echo('###### Done')
1539 | backtomenu_option()
1540 |
1541 | def sitebroker():
1542 | echo(f"%%%%%%% Installing... SiteBroker", foreground="vcyan")
1543 | # secretum inc
1544 | os.system('apt install python php git -y')
1545 | os.system('git clone https://github.com/Anon-Exploiter/SiteBroker')
1546 | os.chdir("SiteBroker")
1547 | os.system('python -m pip install -r requirements.txt')
1548 | os.system('python -m pip install html5lib')
1549 | os.chdir("..")
1550 | os.system('mv SiteBroker {}'.format(homeDir))
1551 | echo('###### Done')
1552 | backtomenu_option()
1553 |
1554 | def dostattack():
1555 | echo(f"%%%%%%% Installing... dost-attack", foreground="vcyan")
1556 | # secretum inc
1557 | os.system('apt install git -y')
1558 | os.system('git clone https://github.com/verluchie/dost-attack')
1559 | os.system('mv dost-attack {}'.format(homeDir))
1560 | echo('###### Done')
1561 | backtomenu_option()
1562 |
1563 | def cfr():
1564 | echo(f"%%%%%%% Installing... CFR", foreground="vcyan")
1565 | # secretum inc
1566 | os.system('apt install dx wget -y')
1567 | os.system('mkdir $PREFIX/bin/lib')
1568 | os.system('wget https://www.benf.org/other/cfr/cfr-0.151.jar -O $PREFIX/bin/lib/cfr-0.151.jar')
1569 | os.chdir(prefix+"/bin/lib")
1570 | os.system('dx --dex --output=cfr-0.151.dex cfr-0.151.jar')
1571 | with open(prefix+"/bin/cfr","w") as f:
1572 | f.write("#!/usr/bin/bash\n")
1573 | f.write("dalvikvm -cp $PREFIX/bin/lib/cfr-0.151.dex org/benf/cfr/reader/Main \"$@\"")
1574 | os.system('chmod 755 $PREFIX/bin/cfr')
1575 | os.system('chmod 755 $PREFIX/bin/lib/cfr-0.151.dex')
1576 | os.chdir(current_dir)
1577 | echo('###### Done')
1578 | echo(f"###### Type 'cfr' to start.")
1579 | backtomenu_option()
1580 |
1581 | def upx():
1582 | echo(f"%%%%%%% Installing... UPX", foreground="vcyan")
1583 | # secretum inc
1584 | os.system('apt install wget tar -y')
1585 | os.system('wget https://github.com/upx/upx/releases/download/v3.96/upx-3.96-arm64_linux.tar.xz')
1586 | os.system('tar xf upx-3.96-arm64_linux.tar.xz')
1587 | os.system('mv upx-3.96-arm64_linux/upx $PREFIX/bin/upx')
1588 | os.system('rm -rf upx-3.96-arm64_linux upx-3.96-arm64_linux.tar.xz')
1589 | os.system('chmod 755 $PREFIX/bin/upx')
1590 | echo('###### Done')
1591 | echo(f"###### Type 'upx' to start.")
1592 | backtomenu_option()
1593 |
1594 | def pyinstxtractor():
1595 | echo(f"%%%%%%% Installing... pyinstxtractor", foreground="vcyan")
1596 | # secretum inc
1597 | os.system('apt install git python -y')
1598 | os.system('git clone https://github.com/extremecoders-re/pyinstxtractor')
1599 | os.system('mv pyinstxtractor {}'.format(homeDir))
1600 | echo('###### Done')
1601 | backtomenu_option()
1602 |
1603 | def innoextract():
1604 | echo(f"%%%%%%% Installing... innoextract", foreground="vcyan")
1605 | # secretum inc
1606 | os.system('apt install git clang -y')
1607 | os.system('git clone https://github.com/dscharrer/innoextract')
1608 | os.chdir("innoextract")
1609 | os.system('mkdir -p build')
1610 | os.chdir("build")
1611 | os.system('cmake .. && make')
1612 | os.system('mv innoextract $PREFIX/bin && chmod 755 $PREFIX/bin/innoextract')
1613 | os.chdir(current_dir)
1614 | os.system('rm -rf innoextract')
1615 | echo('###### Done')
1616 | echo(f"###### Type 'innoextract' to start.")
1617 | backtomenu_option()
1618 |
1619 | def lynis():
1620 | echo(f"%%%%%%% Installing... Lynis", foreground="vcyan")
1621 | # secretum inc
1622 | os.system('apt install git -y')
1623 | os.system('git clone https://github.com/CISOfy/lynis')
1624 | os.system('mv lynis {}'.format(homeDir))
1625 | echo('###### Done')
1626 | backtomenu_option()
1627 |
1628 | def chkrootkit():
1629 | echo(f"%%%%%%% Installing... Chkrootkit", foreground="vcyan")
1630 | # secretum inc
1631 | os.system('apt install clang git -y')
1632 | os.system('git clone https://github.com/Magentron/chkrootkit')
1633 | os.system('mv chkrootkit {}'.format(homeDir))
1634 | echo('###### Done')
1635 | backtomenu_option()
1636 |
1637 | def clamav():
1638 | echo(f"%%%%%%% Installing... ClamAV", foreground="vcyan")
1639 | # secretum inc
1640 | os.system('apt install clamav -y')
1641 | os.system('freshclam')
1642 | echo('###### Done')
1643 | echo(f"###### Type 'clamscan' to start.")
1644 | backtomenu_option()
1645 |
1646 | def yara():
1647 | echo(f"%%%%%%% Installing... Yara", foreground="vcyan")
1648 | # secretum inc
1649 | os.system('apt install yara -y')
1650 | echo('###### Done')
1651 | echo(f"###### Type 'yara' to start.")
1652 | backtomenu_option()
1653 |
1654 | def virustotal():
1655 | echo(f"%%%%%%% Installing... VirusTotal-CLI", foreground="vcyan")
1656 | # secretum inc
1657 | os.system('apt install virustotal-cli -y')
1658 | echo('###### Done')
1659 | echo(f"###### Type 'vt' to start.")
1660 | backtomenu_option()
1661 |
1662 | def maigret():
1663 | echo(f"%%%%%%% Installing... maigret", foreground="vcyan")
1664 | # secretum inc
1665 | os.system('apt install python -y')
1666 | os.system('python -m pip install maigret')
1667 | echo('###### Done')
1668 | echo(f"###### Usage: maigret ")
1669 | echo(f"###### Usage: maigret -h")
1670 | backtomenu_option()
1671 |
1672 | def xplsearch():
1673 | echo(f"%%%%%%% Installing... XPL-SEARCH", foreground="vcyan")
1674 | # secretum inc
1675 | os.system('apt install git php -y')
1676 | os.system('git clone https://github.com/r00tmars/XPL-SEARCH')
1677 | os.system('mv XPL-SEARCH {}'.format(homeDir))
1678 | echo('###### Done')
1679 | backtomenu_option()
1680 |
1681 | def xadmin():
1682 | echo(f"%%%%%%% Installing... Xadmin", foreground="vcyan")
1683 | # secretum inc
1684 | os.system('apt install git perl -y')
1685 | os.system('git clone https://github.com/Manisso/Xadmin')
1686 | os.system('mv Xadmin {}'.format(homeDir))
1687 | echo('###### Done')
1688 | backtomenu_option()
1689 |
1690 | def credmap():
1691 | echo(f"%%%%%%% Installing... Credmap", foreground="vcyan")
1692 | # secretum inc
1693 | os.system('apt install git python2 -y')
1694 | os.system('git clone https://github.com/lightos/credmap')
1695 | os.system('mv credmap {}'.format(homeDir))
1696 | echo('###### Done')
1697 | backtomenu_option()
1698 |
1699 | def mapeye():
1700 | echo(f"%%%%%%% Installing... MapEye", foreground="vcyan")
1701 | # secretum inc
1702 | os.system('apt install git php python -y')
1703 | os.system('python -m pip install requests')
1704 | os.system('git clone https://github.com/bhikandeshmukh/MapEye')
1705 | os.system('mv MapEye {}'.format(homeDir))
1706 | echo('###### Done')
1707 | backtomenu_option()
1708 |
1709 | def gathetool():
1710 | echo(f"%%%%%%% Installing... GatheTOOL", foreground="vcyan")
1711 | # secretum inc
1712 | os.system('apt install git php python -y')
1713 | os.system('python -m pip install requests')
1714 | os.system('git clone https://github.com/AngelSecurityTeam/GatheTOOL')
1715 | os.system('mv GatheTOOL {}'.format(homeDir))
1716 | echo('###### Done')
1717 | backtomenu_option()
1718 |
1719 | def avpass():
1720 | echo(f"%%%%%%% Installing... avpass", foreground="vcyan")
1721 | # secretum inc
1722 | os.system('apt install git python2 python -y')
1723 | os.system('git clone https://github.com/sslab-gatech/avpass')
1724 | os.system('mv avpass {}'.format(homeDir))
1725 | echo('###### Done')
1726 | backtomenu_option()
1727 |
1728 | def binwalk():
1729 | echo(f"%%%%%%% Installing... binwalk", foreground="vcyan")
1730 | # secretum inc
1731 | if not repo_check("pointless.list"):
1732 | pointless_repo()
1733 | os.system('apt install gzip bzip2 tar arj lhasa p7zip cabextract sleuthkit lzop mtd-utils cmake build-essential make numpy scipy python git -y')
1734 | os.system('git clone https://github.com/ReFirmLabs/binwalk')
1735 | os.chdir("binwalk")
1736 | os.system('python setup.py install')
1737 | os.chdir("..")
1738 | os.system('mv binwalk {}'.format(homeDir))
1739 | echo('###### Done')
1740 | echo(f"###### Type 'binwalk' to start.")
1741 | backtomenu_option()
1742 |
1743 | def arat():
1744 | echo(f"%%%%%%% Installing... A-Rat", foreground="vcyan")
1745 | # secretum inc
1746 | os.system('apt install python git -y')
1747 | os.system('git clone https://github.com/RexTheGod/A-Rat')
1748 | os.system('mv A-Rat {}'.format(homeDir))
1749 | echo('###### Done')
1750 | backtomenu_option()
1751 |
1752 | def adbtk():
1753 | echo(f"%%%%%%% Installing... ADB-Toolkit", foreground="vcyan")
1754 | # secretum inc
1755 | os.system('apt install git -y')
1756 | os.system('git clone https://github.com/ASHWIN990/ADB-Toolkit')
1757 | os.system('mv ADB-Toolkit {}'.format(homeDir))
1758 | echo('###### Done')
1759 | backtomenu_option()
1760 |
1761 | def androbugs():
1762 | echo(f"%%%%%%% Installing... AndroBugs_Framework", foreground="vcyan")
1763 | # secretum inc
1764 | os.system('apt install git python2 -y')
1765 | os.system('python2 -m pip install pymongo')
1766 | os.system('git clone https://github.com/AndroBugs/AndroBugs_Framework')
1767 | os.system('mv AndroBugs_Framework {}'.format(homeDir))
1768 | echo('###### Done')
1769 | backtomenu_option()
1770 |
1771 | def tekdefense():
1772 | echo(f"%%%%%%% Installing... TekDefense-Automater", foreground="vcyan")
1773 | # secretum inc
1774 | os.system('apt install git python2 -y')
1775 | os.system('python2 -m pip install requests')
1776 | os.system('git clone https://github.com/1aN0rmus/TekDefense-Automater')
1777 | os.system('mv TekDefense-Automater {}'.format(homeDir))
1778 | echo('###### Done')
1779 | backtomenu_option()
1780 |
1781 | def baf():
1782 | echo(f"%%%%%%% Installing... BAF", foreground="vcyan")
1783 | # secretum inc
1784 | os.system('apt install git python2 -y')
1785 | os.system('python2 -m pip install requests bs4 selenium colored termcolor')
1786 | os.system('git clone https://github.com/engMaher/BAF')
1787 | os.system('mv BAF {}'.format(homeDir))
1788 | echo('###### Done')
1789 | backtomenu_option()
1790 |
1791 | def brutex():
1792 | echo(f"%%%%%%% Installing... BruteX", foreground="vcyan")
1793 | # secretum inc
1794 | os.system('apt install git hydra -y')
1795 | os.system('git clone https://github.com/1N3/BruteX')
1796 | os.system('mv BruteX {}'.format(homeDir))
1797 | echo('###### Done')
1798 | backtomenu_option()
1799 |
1800 | def cmseek():
1801 | echo(f"%%%%%%% Installing... CMSeeK", foreground="vcyan")
1802 | # secretum inc
1803 | os.system('apt install git python -y')
1804 | os.system('python -m pip install requests')
1805 | os.system('git clone https://github.com/Tuhinshubhra/CMSeeK')
1806 | os.system('mv CMSeeK {}'.format(homeDir))
1807 | echo('###### Done')
1808 | backtomenu_option()
1809 |
1810 | ### Compiler/Interpreter
1811 | def python2():
1812 | echo(f"%%%%%%% Installing... Python2", foreground="vcyan")
1813 | # secretum inc
1814 | os.system('apt install python2 -y')
1815 | echo('###### Done')
1816 | echo(f"###### Type 'python2' to start.")
1817 | backtomenu_option()
1818 |
1819 | def ecj():
1820 | echo(f"%%%%%%% Installing... ecj", foreground="vcyan")
1821 | # secretum inc
1822 | os.system('apt install ecj -y')
1823 | echo('###### Done')
1824 | echo(f"###### Type 'ecj' to start.")
1825 | backtomenu_option()
1826 |
1827 | def golang():
1828 | echo(f"%%%%%%% Installing... Golang", foreground="vcyan")
1829 | # secretum inc
1830 | os.system('apt install golang -y')
1831 | echo('###### Done')
1832 | echo(f"###### Type 'go' to start.")
1833 | backtomenu_option()
1834 |
1835 | def ldc():
1836 | echo(f"%%%%%%% Installing... ldc", foreground="vcyan")
1837 | # secretum inc
1838 | os.system('apt install ldc -y')
1839 | echo('###### Done')
1840 | echo(f"###### Type 'ldc2' to start.")
1841 | backtomenu_option()
1842 |
1843 | def nim():
1844 | echo(f"%%%%%%% Installing... Nim", foreground="vcyan")
1845 | # secretum inc
1846 | os.system('apt install nim -y')
1847 | echo('###### Done')
1848 | echo(f"###### Type 'nim' to start.")
1849 | backtomenu_option()
1850 |
1851 | def shc():
1852 | echo(f"%%%%%%% Installing... shc", foreground="vcyan")
1853 | # secretum inc
1854 | os.system('apt install shc -y')
1855 | echo('###### Done')
1856 | echo(f"###### Type 'shc' to start.")
1857 | backtomenu_option()
1858 |
1859 | def tcc():
1860 | echo(f"%%%%%%% Installing... TCC", foreground="vcyan")
1861 | # secretum inc
1862 | os.system('apt install tcc -y')
1863 | echo('###### Done')
1864 | echo(f"###### Type 'tcc' to start.")
1865 | backtomenu_option()
1866 |
1867 | def php():
1868 | echo(f"%%%%%%% Installing... PHP", foreground="vcyan")
1869 | # secretum inc
1870 | os.system('apt install php -y')
1871 | echo('###### Done')
1872 | echo(f"###### Type 'php' to start.")
1873 | backtomenu_option()
1874 |
1875 | def ruby():
1876 | echo(f"%%%%%%% Installing... Ruby", foreground="vcyan")
1877 | # secretum inc
1878 | os.system('apt install ruby -y')
1879 | echo('###### Done')
1880 | echo(f"###### Type 'ruby' to start.")
1881 | backtomenu_option()
1882 |
1883 | def perl():
1884 | echo(f"%%%%%%% Installing... Perl", foreground="vcyan")
1885 | # secretum inc
1886 | os.system('apt install perl -y')
1887 | echo('###### Done')
1888 | echo(f"###### Type 'perl' to start.")
1889 | backtomenu_option()
1890 |
1891 | def vlang():
1892 | echo(f"%%%%%%% Installing... Vlang", foreground="vcyan")
1893 | # secretum inc
1894 | os.system('apt install vlang -y')
1895 | echo('###### Done')
1896 | echo(f"###### Type 'vlang' to start.")
1897 | backtomenu_option()
1898 |
1899 | def blogc():
1900 | echo(f"%%%%%%% Installing... BlogC", foreground="vcyan")
1901 | # secretum inc
1902 | os.system('apt install blogc -y')
1903 | echo('###### Done')
1904 | echo(f"###### Type 'blogc' to start.")
1905 | backtomenu_option()
1906 |
1907 | ### termux games
1908 | def street_car():
1909 | echo(f"%%%%%%% Installing... street-car", foreground="vcyan")
1910 | # secretum inc
1911 | os.system('apt install git python python2 -y')
1912 | os.system('git clone https://github.com/JustaHackers/street_car')
1913 | os.system('mv street_car {}'.format(homeDir))
1914 | echo('###### Done')
1915 | backtomenu_option()
1916 |
1917 | def flappy_bird():
1918 | echo(f"%%%%%%% Installing... flappy-bird", foreground="vcyan")
1919 | # secretum inc
1920 | os.system('apt install git python2 -y')
1921 | os.system('git clone https://github.com/JustAHackers/flappy_bird')
1922 | os.system('mv flappy_bird {}'.format(homeDir))
1923 | echo('###### Done')
1924 | backtomenu_option()
1925 |
1926 | def speed_typing():
1927 | echo(f"%%%%%%% Installing... Speed Typing", foreground="vcyan")
1928 | # secretum inc
1929 | os.system('apt install git python2 -y')
1930 | os.system('git clone https://github.com/JustAHackers/typing-speed-test')
1931 | os.system('mv typing-speed-test {}'.format(homeDir))
1932 | echo('###### Done')
1933 | backtomenu_option()
1934 |
1935 | def nsnake():
1936 | echo(f"%%%%%%% Installing... nsnake", foreground="vcyan")
1937 | # secretum inc
1938 | os.system('apt install nsnake -y')
1939 | echo('###### Done')
1940 | echo(f"###### Type 'nsnake' to start.")
1941 | backtomenu_option()
1942 |
1943 | def nudoku():
1944 | echo(f"%%%%%%% Installing... Sudoku", foreground="vcyan")
1945 | # secretum inc
1946 | os.system('apt install nudoku -y')
1947 | echo('###### Done')
1948 | echo(f"###### Type 'nudoku' to start.")
1949 | backtomenu_option()
1950 |
1951 | def moon_buggy():
1952 | echo(f"%%%%%%% Installing... Moon-Buggy", foreground="vcyan")
1953 | # secretum inc
1954 | os.system('apt install moon-buggy -y')
1955 | echo('###### Done')
1956 | echo(f"###### Type 'moon-buggy' to start.")
1957 | backtomenu_option()
1958 |
1959 | def ttysolitaire():
1960 | echo(f"%%%%%%% Installing... tty-solitaire", foreground="vcyan")
1961 | # secretum inc
1962 | os.system('apt install tty-solitaire -y')
1963 | echo('###### Done')
1964 | echo(f"###### Type 'ttysolitaire' to start.")
1965 | backtomenu_option()
1966 |
1967 | def pacman4console():
1968 | echo(f"%%%%%%% Installing... Pacman4Console", foreground="vcyan")
1969 | # secretum inc
1970 | os.system('apt install pacman4console -y')
1971 | echo('###### Done')
1972 | echo(f"###### Type 'pacman' to start.")
1973 | backtomenu_option()
1974 |
1975 | ### bash function ---
1976 | def fbvid():
1977 | echo(f"%%%%%%% Installing... fbvid", foreground="vcyan")
1978 | # secretum inc
1979 | os.system('apt install python ffmpeg -y')
1980 | os.system('python -m pip install youtube-dl')
1981 | fbvid_code = open(".myshfunc/fbvid.sh","r").read()
1982 | open(os.getenv("HOME")+"/.bashrc","a").write(fbvid_code)
1983 | os.system('source '+os.getenv("HOME")+"/.bashrc")
1984 | echo('###### Done')
1985 | echo('###### Usage: fbvid "POST_URL"')
1986 | backtomenu_option()
1987 |
1988 | def cast2video():
1989 | echo(f"%%%%%%% Installing... cast2video", foreground="vcyan")
1990 | # secretum inc
1991 | os.system('apt install clang python ffmpeg -y')
1992 | os.system('python -m pip install CPython ttygif')
1993 | cast2video_code = open(".myshfunc/cast2video.sh","r").read()
1994 | open(os.getenv("HOME")+"/.bashrc","a").write(cast2video_code)
1995 | os.system('source '+os.getenv("HOME")+"/.bashrc")
1996 | echo('###### Done')
1997 | echo('###### Usage: cast2video file.cast')
1998 | backtomenu_option()
1999 |
2000 | def iconset():
2001 | echo(f"%%%%%%% Installing... iconset", foreground="vcyan")
2002 | iconset_code = open(".myshfunc/iconset.sh","r").read()
2003 | open(os.getenv("HOME")+"/.bashrc","a").write(iconset_code)
2004 | os.system('source '+os.getenv("HOME")+"/.bashrc")
2005 | echo('###### Done')
2006 | echo('###### Usage: iconset project_name icon.png')
2007 | backtomenu_option()
2008 |
2009 | def readme():
2010 | echo(f"%%%%%%% Installing... readme", foreground="vcyan")
2011 | # secretum inc
2012 | os.system('apt install curl -y')
2013 | readme_code = open(".myshfunc/readme.sh","r").read()
2014 | open(os.getenv("HOME")+"/.bashrc","a").write(readme_code)
2015 | os.system('source '+os.getenv("HOME")+"/.bashrc")
2016 | echo('###### Done')
2017 | echo('###### Usage: readme User/Repo')
2018 | backtomenu_option()
2019 |
2020 | def makedeb():
2021 | echo(f"%%%%%%% Installing... makedeb", foreground="vcyan")
2022 | # secretum inc
2023 | os.system('apt install dpkg neovim -y')
2024 | makedeb_code = open(".myshfunc/makedeb.sh","r").read()
2025 | open(os.getenv("HOME")+"/.bashrc","a").write(makedeb_code)
2026 | os.system('source '+os.getenv("HOME")+"/.bashrc")
2027 | echo('###### Done')
2028 | echo('###### Usage: makedeb')
2029 | backtomenu_option()
2030 |
2031 | def quikfind():
2032 | echo(f"%%%%%%% Installing... quikfind", foreground="vcyan")
2033 | quikfind_code = open(".myshfunc/quikfind.sh","r").read()
2034 | open(os.getenv("HOME")+"/.bashrc","a").write(quikfind_code)
2035 | os.system('source '+os.getenv("HOME")+"/.bashrc")
2036 | echo('###### Done')
2037 | echo('###### Usage: quikfind')
2038 | backtomenu_option()
2039 |
2040 | def pranayama():
2041 | echo(f"%%%%%%% Installing... pranayama", foreground="vcyan")
2042 | # secretum inc
2043 | os.system('apt install termux-api -y')
2044 | pranayama_code = open(".myshfunc/pranayama.sh","r").read()
2045 | open(os.getenv("HOME")+"/.bashrc","a").write(pranayama_code)
2046 | os.system('source '+os.getenv("HOME")+"./bashrc")
2047 | echo('###### Done')
2048 | echo('###### Usage: pranayama')
2049 | echo('###### or')
2050 | echo('###### pranayama [n]')
2051 | backtomenu_option()
2052 |
2053 | def sqlc():
2054 | echo(f"%%%%%%% Installing... sqlc", foreground="vcyan")
2055 | # secretum inc
2056 | os.system('apt install python sqlite3 -y')
2057 | sqlc_code = open(".myshfunc/sqlc.sh","r").read()
2058 | open(os.getenv("HOME")+"/.bashrc","a").write(sqlc_code)
2059 | os.system('source '+os.getenv("HOME")+"/.bashrc")
2060 | echo('###### Done')
2061 | echo('###### Usage: sqlc db_file sql_script')
2062 | backtomenu_option()
2063 |
--------------------------------------------------------------------------------
/src/debonair/kickstart:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env bash
2 | #!/data/data/com.termux/files/usr/bin/sh
3 |
4 | # Get some needed tools. coreutils for mkdir command, gnugp for the signing key, and apt-transport-https to actually connect to the repo
5 | apt-get update
6 | apt-get --assume-yes install coreutils gnupg
7 | # Make the sources.list.d directory
8 | mkdir -p $PREFIX/etc/apt/sources.list.d
9 | # Write the needed source file
10 | if apt-cache policy | grep -q "termux.*24\|termux.org\|bintray.*24\|k51qzi5uqu5dg9vawh923wejqffxiu9bhqlze5f508msk0h7ylpac27fdgaskx" ; then
11 | echo "deb https://its-pointless.github.io/files/24 termux extras" > $PREFIX/etc/apt/sources.list.d/pointless.list
12 | else
13 | echo "deb https://its-pointless.github.io/files/21 termux extras" > $PREFIX/etc/apt/sources.list.d/pointless.list
14 | fi
15 | # Add signing key from https://its-pointless.github.io/pointless.gpg
16 | if [ -n $(command -v curl) ]; then
17 | curl -sLo $PREFIX/etc/apt/trusted.gpg.d/pointless.gpg --create-dirs https://its-pointless.github.io/pointless.gpg
18 | elif [ -n $(command -v wget) ]; then
19 | wget -qP $PREFIX/etc/apt/trusted.gpg.d https://its-pointless.github.io/pointless.gpg
20 | fi
21 | # Update apt
22 | apt update
23 |
--------------------------------------------------------------------------------
/src/debonair/uninstall.py:
--------------------------------------------------------------------------------
1 | import quo
2 | os.system("cd /etc/ && rm -rf debonair_ && cd /usr/bin && rm -rf dbnr && rm -rf debonair")
3 | quo.flair(f"Debonair has been uninstalled", foreground="vred", bold=True)
4 |
--------------------------------------------------------------------------------
/start.py:
--------------------------------------------------------------------------------
1 | import os
2 | import sys
3 | import quo
4 | import readline
5 | from time import sleep as timeout
6 | from src.debonair.core import *
7 |
8 | @command()
9 | @app("--list", help="--list contains the homepage section")
10 | def main(list):
11 | banner()
12 | echo(f" [01] Information Gathering", foreground="vred", bold=True)
13 | echo(f" [02] Vulnerability Analysis", foreground="vblue", bold=True)
14 | echo(f" [03] Web Hacking", foreground="vyellow", bold=True)
15 | echo(f" [04] Database Assessment", foreground="vgreen", bold=True)
16 | echo(f" [05] Password Attacks",foreground="vwhite", bold=True)
17 | echo(f" [06] Wireless Attacks", foreground="vcyan", bold=True)
18 | echo(f" [07] Reverse Engineering", foreground="vmagenta", bold=True)
19 | echo(f" [08] Exploitation Tools", foreground=(165, 42, 42), bold=True)
20 | echo(f" [09] Sniffing and Spoofing", foreground=(0, 128, 128), bold=True)
21 | echo(f" [10] Reporting Tools", foreground=(128, 128, 0), bold=True)
22 | echo(f" [11] Forensic Tools", foreground=(210, 105, 30), bold=True)
23 | echo(f" [12] Stress Testing", foreground=(188, 143, 143), bold=True)
24 | echo(f" [13] Install Linux Distro", foreground=(65, 105, 225), bold=True)
25 | echo(f" [14] Termux Utility", foreground=(255, 127, 80), bold=True)
26 | echo(f" [15] Shell Function [.bashrc]", bold=True)
27 | echo(f" [16] Install CLI Games", foreground=(255, 215, 0), bold=True)
28 | echo(f" [17] Malware Analysis", foreground=(175, 238, 238), bold=True)
29 | echo(f" [18] Compiler/Interpreter", foreground=(127, 255, 212), bold=True)
30 | echo(f" [19] Social Engineering Tools", foreground=(255, 20, 147), bold=True)
31 | echo(f" [00] Exit Debonair", foreground="black", background="yellow", bold=True)
32 | debonair = prompt("@dbnr >> install ")
33 |
34 | # 01 - Information Gathering
35 | if debonair.strip() == "1" or debonair.strip() == "01":
36 | print("\n [01] Nmap: Utility for network discovery and security auditing")
37 | print(" [02] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling")
38 | print(" [03] D-TECT: All-In-One Tool for Penetration Testing")
39 | print(" [04] sqlmap: Automatic SQL injection and database takeover tool")
40 | print(" [05] Infoga: Tool for Gathering Email Accounts Informations")
41 | print(" [06] ReconDog: Information Gathering and Vulnerability Scanner tool")
42 | print(" [07] AndroZenmap")
43 | print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
44 | print(" [09] AstraNmap: Security scanner used to find hosts and services on a computer network")
45 | print(" [10] MapEye: Accurate GPS Location Tracker (Android, IOS, Windows phones)")
46 | print(" [11] Easymap: Nmap Shortcut")
47 | print(" [12] BlackBox: A Penetration Testing Framework")
48 | print(" [13] XD3v: Powerful tool that lets you know all the essential details about your phone")
49 | print(" [14] Crips: This Tools is a collection of online IP Tools that can be used to quickly get information about IP Address's, Web Pages and DNS records")
50 | print(" [15] SIR: Resolve from the net the last known ip of a Skype Name")
51 | print(" [16] EvilURL: Generate unicode evil domains for IDN Homograph Attack and detect them")
52 | print(" [17] Striker: Recon & Vulnerability Scanning Suite")
53 | print(" [18] Xshell: ToolKit")
54 | print(" [19] OWScan: OVID Web Scanner")
55 | print(" [20] OSIF: Open Source Information Facebook")
56 | print(" [21] Devploit: Simple Information Gathering Tool")
57 | print(" [22] Namechk: Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks")
58 | print(" [23] AUXILE: Web Application Analysis Framework")
59 | print(" [24] inther: Information gathering using shodan, censys and hackertarget")
60 | print(" [25] GINF: GitHub Information Gathering Tool")
61 | print(" [26] GPS Tracking")
62 | print(" [27] ASU: Facebook Hacking ToolKit")
63 | print(" [28] fim: Facebook Image Downloader")
64 | print(" [29] MaxSubdoFinder: Tool for Discovering Subdomain")
65 | print(" [30] pwnedOrNot: OSINT Tool for Finding Passwords of Compromised Email Accounts")
66 | print(" [31] Mac-Lookup: Finds information about a Particular Mac address")
67 | print(" [32] BillCipher: Information Gathering tool for a Website or IP address")
68 | print(" [33] dnsrecon: Security assessment and network troubleshooting")
69 | print(" [34] zphisher: Automated Phishing Tool")
70 | print(" [35] Mr.SIP: SIP-Based Audit and Attack Tool")
71 | print(" [36] Sherlock: Hunt down social media accounts by username")
72 | print(" [37] userrecon: Find usernames across over 75 social networks")
73 | print(" [38] PhoneInfoga: One of the most advanced tools to scan phone numbers using only free resources")
74 | print(" [39] SiteBroker: A cross-platform python based utility for information gathering and penetration testing automation")
75 | print(" [40] maigret: Collect a dossier on a person by username from thousands of sites")
76 | print(" [41] GatheTOOL: Information Gathering - API hackertarget.com")
77 | print(" [42] ADB-ToolKit")
78 | print(" [43] TekDefense-Automater: Automater - IP URL and MD5 OSINT Analysis")
79 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
80 | infogathering = prompt("@dbnr >> install ")
81 | if infogathering == "@":
82 | infogathering = ""
83 | for x in range(1,201):
84 | infogathering += f"{x} "
85 | if len(infogathering.split()) > 1:
86 | writeStatus(1)
87 | # © Gerrishon Sirere
88 | # Secretum Inc
89 | for infox in infogathering.split():
90 | if infox.strip() == "01" or infox.strip() == "1": nmap()
91 | elif infox.strip() == "02" or infox.strip() == "2": red_hawk()
92 | elif infox.strip() == "03" or infox.strip() == "3": dtect()
93 | elif infox.strip() == "04" or infox.strip() == "4": sqlmap()
94 | elif infox.strip() == "05" or infox.strip() == "5": infoga()
95 | elif infox.strip() == "06" or infox.strip() == "6": reconDog()
96 | elif infox.strip() == "07" or infox.strip() == "7": androZenmap()
97 | elif infox.strip() == "08" or infox.strip() == "8": sqlmate()
98 | elif infox.strip() == "09" or infox.strip() == "9": astraNmap()
99 | elif infox.strip() == "10": mapeye()
100 | elif infox.strip() == "11": easyMap()
101 | elif infox.strip() == "12": blackbox()
102 | elif infox.strip() == "13": xd3v()
103 | elif infox.strip() == "14": crips()
104 | elif infox.strip() == "15": sir()
105 | elif infox.strip() == "16": evilURL()
106 | elif infox.strip() == "17": striker()
107 | elif infox.strip() == "18": xshell()
108 | elif infox.strip() == "19": owscan()
109 | elif infox.strip() == "20": osif()
110 | elif infox.strip() == "21": devploit()
111 | elif infox.strip() == "22": namechk()
112 | elif infox.strip() == "23": auxile()
113 | elif infox.strip() == "24": inther()
114 | elif infox.strip() == "25": ginf()
115 | elif infox.strip() == "26": gpstr()
116 | elif infox.strip() == "27": asu()
117 | elif infox.strip() == "28": fim()
118 | elif infox.strip() == "29": maxsubdofinder()
119 | elif infox.strip() == "30": pwnedOrNot()
120 | elif infox.strip() == "31": maclook()
121 | elif infox.strip() == "32": billcypher()
122 | elif infox.strip() == "33": dnsrecon()
123 | elif infox.strip() == "34": zphisher()
124 | elif infox.strip() == "35": mrsip()
125 | elif infox.strip() == "36": sherlock()
126 | elif infox.strip() == "37": userrecon()
127 | elif infox.strip() == "38": phoneinfoga()
128 | elif infox.strip() == "39": sitebroker()
129 | elif infox.strip() == "40": maigret()
130 | elif infox.strip() == "41": gathetool()
131 | elif infox.strip() == "42": adbtk()
132 | elif infox.strip() == "43": tekdefense()
133 | elif infox.strip() == "00" or infox.strip() == "0": restart_program()
134 | else: echo(f"ERROR: Wrong Input", foreground="red", bold=True);timeout(1);restart_program()
135 | if readStatus():
136 | writeStatus(0)
137 |
138 | # 02 - Vulnerability Analysis
139 | elif debonair.strip() == "2" or debonair.strip() == "02":
140 | print("\n [01] Nmap: Utility for network discovery and security auditing")
141 | print(" [02] AndroZenmap")
142 | print(" [03] AstraNmap: Security scanner used to find hosts and services on a computer network")
143 | print(" [04] Easymap: Nmap Shortcut")
144 | print(" [05] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling")
145 | print(" [06] D-TECT: All-In-One Tool for Penetration Testing")
146 | print(" [07] Damn Small SQLi Scanner: A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code")
147 | print(" [08] SQLiv: massive SQL injection vulnerability scanner")
148 | print(" [09] sqlmap: Automatic SQL injection and database takeover tool")
149 | print(" [10] sqlscan: Quick SQL Scanner, Dorker, Webshell injector PHP")
150 | print(" [11] Wordpresscan: WPScan rewritten in Python + some WPSeku ideas")
151 | print(" [12] WPScan: Free wordPress security scanner")
152 | print(" [13] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
153 | print(" [14] termux-wordpresscan")
154 | print(" [15] TM-scanner: websites vulnerability scanner for termux")
155 | print(" [16] Rang3r: Multi Thread IP + Port Scanner")
156 | print(" [17] Striker: Recon & Vulnerability Scanning Suite")
157 | print(" [18] Routersploit: Exploitation Framework for Embedded Devices")
158 | print(" [19] Xshell: ToolKit")
159 | print(" [20] SH33LL: Shell Scanner")
160 | print(" [21] BlackBox: A Penetration Testing Framework")
161 | print(" [22] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
162 | print(" [23] OWScan: OVID Web Scanner")
163 | print(" [24] XPL-SEARCH: Search exploits in multiple exploit databases")
164 | print(" [25] AndroBugs_Framework: An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications")
165 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
166 | vulnsys = prompt("@dbnr >> install ")
167 | if vulnsys == "@":
168 | vulnsys = ""
169 | for x in range(1,201):
170 | vulnsys += f"{x} "
171 | if len(vulnsys.split()) > 1:
172 | writeStatus(1)
173 | # © Gerrishon Sirere
174 | # Secretum Inc
175 | for vulnx in vulnsys.split():
176 | if vulnsys.strip() == "01" or vulnsys.strip() == "1": nmap()
177 | elif vulnsys.strip() == "02" or vulnsys.strip() == "2": androZenmap()
178 | elif vulnsys.strip() == "03" or vulnsys.strip() == "3": astraNmap()
179 | elif vulnsys.strip() == "04" or vulnsys.strip() == "4": easyMap()
180 | elif vulnsys.strip() == "05" or vulnsys.strip() == "5": red_hawk()
181 | elif vulnsys.strip() == "06" or vulnsys.strip() == "6": dtect()
182 | elif vulnsys.strip() == "07" or vulnsys.strip() == "7": dsss()
183 | elif vulnsys.strip() == "08" or vulnsys.strip() == "8": sqliv()
184 | elif vulnsys.strip() == "09" or vulnsys.strip() == "9": sqlmap()
185 | elif vulnsys.strip() == "10": sqlscan()
186 | elif vulnsys.strip() == "11": wordpreSScan()
187 | elif vulnsys.strip() == "12": wpscan()
188 | elif vulnsys.strip() == "13": sqlmate()
189 | elif vulnsys.strip() == "14": wordpresscan()
190 | elif vulnsys.strip() == "15": tmscanner()
191 | elif vulnsys.strip() == "16": rang3r()
192 | elif vulnsys.strip() == "17": striker()
193 | elif vulnsys.strip() == "18": routersploit()
194 | elif vulnsys.strip() == "19": xshell()
195 | elif vulnsys.strip() == "20": sh33ll()
196 | elif vulnsys.strip() == "21": blackbox()
197 | elif vulnsys.strip() == "22": xattacker()
198 | elif vulnsys.strip() == "23": owscan()
199 | elif vulnsys.strip() == "24": xplsearch()
200 | elif vulnsys.strip() == "25": androbugs()
201 | elif vulnsys.strip() == "00" or vulnsys.strip() == "0": restart_program()
202 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
203 | if readStatus():
204 | writeStatus(0)
205 |
206 | # 03 - Web Hacking
207 | elif debonair.strip() == "3" or debonair.strip() == "03":
208 | print("\n [01] sqlmap: Automatic SQL injection and database takeover tool")
209 | print(" [02] WebDAV: WebDAV File Upload Exploiter")
210 | print(" [03] MaxSubdoFinder: Tool for Discovering Subdomain")
211 | print(" [04] Webdav Mass Exploit")
212 | print(" [05] Atlas: Quick SQLMap Tamper Suggester")
213 | print(" [06] sqldump: Dump sql result sites with easy")
214 | print(" [07] Websploit: An advanced MiTM Framework")
215 | print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
216 | print(" [09] inther: Information gathering using shodan, censys and hackertarget")
217 | print(" [10] HPB: HTML Pages Builder")
218 | print(" [11] Xshell: ToolKit")
219 | print(" [12] SH33LL: Shell Scanner")
220 | print(" [13] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
221 | print(" [14] XSStrike: Most advanced XSS Scanner")
222 | print(" [15] Breacher: An advanced multithreaded admin panel finder")
223 | print(" [16] OWScan: OVID Web Scanner")
224 | print(" [17] ko-dork: A simple vuln web scanner")
225 | print(" [18] ApSca: Powerful web penetration application")
226 | print(" [19] amox: Find backdoor or shell planted on a site via dictionary attack")
227 | print(" [20] FaDe: Fake deface with kindeditor, fckeditor and webdav")
228 | print(" [21] AUXILE: Auxile Framework")
229 | print(" [22] xss-payload-list: Cross Site Scripting ( XSS ) Vulnerability Payload List")
230 | print(" [23] Xadmin: Admin Panel Finder")
231 | print(" [24] CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs")
232 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
233 | webhack = prompt("@dbnr >> install ")
234 | if webhack == "@":
235 | webhack = ""
236 | for x in range(1,201):
237 | webhack += f"{x} "
238 | if len(webhack.split()) > 1:
239 | writeStatus(1)
240 | # © Gerrishon Sirere
241 | # Secretum Inc
242 | for webhx in webhack.split():
243 | if webhx.strip() == "01" or webhx.strip() == "1": sqlmap()
244 | elif webhx.strip() == "02" or webhx.strip() == "2": webdav()
245 | elif webhx.strip() == "03" or webhx.strip() == "3": maxsubdofinder()
246 | elif webhx.strip() == "04" or webhx.strip() == "4": webmassploit()
247 | elif webhx.strip() == "05" or webhx.strip() == "5": atlas()
248 | elif webhx.strip() == "06" or webhx.strip() == "6": sqldump()
249 | elif webhx.strip() == "07" or webhx.strip() == "7": websploit()
250 | elif webhx.strip() == "08" or webhx.strip() == "8": sqlmate()
251 | elif webhx.strip() == "09" or webhx.strip() == "9": inther()
252 | elif webhx.strip() == "10": hpb()
253 | elif webhx.strip() == "11": xshell()
254 | elif webhx.strip() == "12": sh33ll()
255 | elif webhx.strip() == "13": xattacker()
256 | elif webhx.strip() == "14": xsstrike()
257 | elif webhx.strip() == "15": breacher()
258 | elif webhx.strip() == "16": owscan()
259 | elif webhx.strip() == "17": kodork()
260 | elif webhx.strip() == "18": apsca()
261 | elif webhx.strip() == "19": amox()
262 | elif webhx.strip() == "20": fade()
263 | elif webhx.strip() == "21": auxile()
264 | elif webhx.strip() == "22": xss_payload_list()
265 | elif webhx.strip() == "23": xadmin()
266 | elif webhx.strip() == "24": cmseek()
267 | elif webhx.strip() == "00" or webhx.strip() == "0": restart_program()
268 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
269 | if readStatus():
270 | writeStatus(0)
271 |
272 | # 04 - Database Assessment
273 | elif debonair.strip() == "4" or debonair.strip() == "04":
274 | print("\n [01] DbDat: DbDat performs numerous checks on a database to evaluate security")
275 | print(" [02] sqlmap: Automatic SQL injection and database takeover tool")
276 | print(" [03] NoSQLMap: Automated NoSQL database enumeration and web application exploitation tool")
277 | print(" [04] audit_couchdb: Detect security issues, large or small, in a CouchDB server")
278 | print(" [05] mongoaudit: An automated pentesting tool that lets you know if your MongoDB instances are properly secured")
279 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
280 | dbssm = prompt("@dbnr >> install ")
281 | if dbssm == "@":
282 | dbssm = ""
283 | for x in range(1,201):
284 | dbssm += f"{x} "
285 | if len(dbssm.split()) > 1:
286 | writeStatus(1)
287 | # © Gerrishon Sirere
288 | # Secretum Inc
289 | for dbsx in dbssm.split():
290 | if dbsx.strip() == "01" or dbsx.strip() == "1": dbdat()
291 | elif dbsx.strip() == "02" or dbsx.strip() == "2": sqlmap()
292 | elif dbsx.strip() == "03" or dbsx.strip() == "3": nosqlmap
293 | elif dbsx.strip() == "04" or dbsx.strip() == "4": audit_couchdb()
294 | elif dbsx.strip() == "05" or dbsx.strip() == "5": mongoaudit()
295 | elif dbsx.strip() == "00" or dbsx.strip() == "0": restart_program()
296 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
297 | if readStatus():
298 | writeStatus(0)
299 |
300 | # 05 - Password Attacks
301 | elif debonair.strip() == "5" or debonair.strip() == "05":
302 | print("\n [01] Hydra: Network logon cracker supporting different services")
303 | print(" [02] FMBrute: Facebook Multi Brute Force")
304 | print(" [03] HashID: Software to identify the different types of hashes")
305 | print(" [04] Facebook Brute Force 3")
306 | print(" [05] Black Hydra: A small program to shorten brute force sessions on hydra")
307 | print(" [06] Hash Buster: Crack hashes in seconds")
308 | print(" [07] FBBrute: Facebook Brute Force")
309 | print(" [08] Cupp: Common User Passwords Profiler")
310 | print(" [09] InstaHack: Instagram Brute Force")
311 | print(" [10] Indonesian Wordlist")
312 | print(" [11] Xshell")
313 | print(" [12] Aircrack-ng: WiFi security auditing tools suite")
314 | print(" [13] BlackBox: A Penetration Testing Framework")
315 | print(" [14] Katak: An open source software login brute-forcer toolkit and hash decrypter")
316 | print(" [15] Hasher: Hash cracker with auto detect hash")
317 | print(" [16] Hash-Generator: Beautiful Hash Generator")
318 | print(" [17] nk26: Nkosec Encode")
319 | print(" [18] Hasherdotid: A tool for find an encrypted text")
320 | print(" [19] Crunch: Highly customizable wordlist generator")
321 | print(" [20] Hashcat: World's fastest and most advanced password recovery utility")
322 | print(" [21] ASU: Facebook Hacking ToolKit")
323 | print(" [22] Credmap: An open source tool that was created to bring awareness to the dangers of credential reuse")
324 | print(" [23] BruteX: Automatically brute force all services running on a target")
325 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
326 | passtak = prompt("@dbnr >> install ")
327 | if passtak == "@":
328 | passtak = ""
329 | for x in range(1,201):
330 | passtak += f"{x} "
331 | if len(passtak.split()) > 1:
332 | writeStatus(1)
333 | # © Gerrishon Sirere
334 | # Secretum Inc
335 | for passx in passtak.split():
336 | if passx.strip() == "01" or passx.strip() == "1": hydra()
337 | elif passx.strip() == "02" or passx.strip() == "2": fmbrute()
338 | elif passx.strip() == "03" or passx.strip() == "3": hashid()
339 | elif passx.strip() == "04" or passx.strip() == "4": fbBrute()
340 | elif passx.strip() == "05" or passx.strip() == "5": black_hydra()
341 | elif passx.strip() == "06" or passx.strip() == "6": hash_buster()
342 | elif passx.strip() == "07" or passx.strip() == "7": fbbrutex()
343 | elif passx.strip() == "08" or passx.strip() == "8": cupp()
344 | elif passx.strip() == "09" or passx.strip() == "9": instaHack()
345 | elif passx.strip() == "10": indonesian_wordlist()
346 | elif passx.strip() == "11": xshell()
347 | elif passx.strip() == "12": aircrackng()
348 | elif passx.strip() == "13": blackbox()
349 | elif passx.strip() == "14": katak()
350 | elif passx.strip() == "15": hasher()
351 | elif passx.strip() == "16": hashgenerator()
352 | elif passx.strip() == "17": nk26()
353 | elif passx.strip() == "18": hasherdotid()
354 | elif passx.strip() == "19": crunch()
355 | elif passx.strip() == "20": hashcat()
356 | elif passx.strip() == "21": asu()
357 | elif passx.strip() == "22": credmap()
358 | elif passx.strip() == "23": brutex()
359 | elif passx.strip() == "00" or passx.strip() == "0": restart_program()
360 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
361 | if readStatus():
362 | writeStatus(0)
363 |
364 | # 06 - Wireless Attacks
365 | elif debonair.strip() == "6" or debonair.strip() == "06":
366 | print("\n [01] Aircrack-ng: WiFi security auditing tools suite")
367 | print(" [02] Wifite: An automated wireless attack tool")
368 | print(" [03] Wifiphisher: The Rogue Access Point Framework")
369 | print(" [04] Routersploit: Exploitation Framework for Embedded Devices")
370 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
371 | wiretak = prompt("@dbnr >> install ")
372 | if wiretak == "@":
373 | wiretak = ""
374 | for x in range(1,201):
375 | wiretak += f"{x} "
376 | if len(wiretak.split()) > 1:
377 | writeStatus(1)
378 | # © Gerrishon Sirere
379 | # Secretum Inc
380 | for wirex in wiretak.split():
381 | if wirex.strip() == "01" or wirex.strip() == "1": aircrackng()
382 | elif wirex.strip() == "02" or wirex.strip() == "2": wifite()
383 | elif wirex.strip() == "03" or wirex.strip() == "3": wifiphisher()
384 | elif wirex.strip() == "04" or wirex.strip() == "4": routersploit()
385 | elif wirex.strip() == "00" or wirex.strip() == "0": restart_program()
386 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
387 | if readStatus():
388 | writeStatus(0)
389 |
390 | # 07 - Reverse Engineering
391 | elif debonair.strip() == "7" or debonair.strip() == "07":
392 | print("\n [01] Binary Exploitation")
393 | print(" [02] jadx: DEX to JAVA Decompiler")
394 | print(" [03] apktool: A utility that can be used for reverse engineering Android applications")
395 | print(" [04] uncompyle6: Python cross-version byte-code decompiler")
396 | print(" [05] ddcrypt: DroidScript APK Deobfuscator")
397 | print(" [06] CFR: Yet another java decompiler")
398 | print(" [07] UPX: Ultimate Packer for eXecutables")
399 | print(" [08] pyinstxtractor: PyInstaller Extractor")
400 | print(" [09] innoextract: A tool to unpack installers created by Inno Setup")
401 | print(" [10] binwalk: Firmware analysis tool")
402 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
403 | reversi = prompt("@dbnr >> install ")
404 | if reversi == "@":
405 | reversi = ""
406 | for x in range(1,201):
407 | reversi += f"{x} "
408 | if len(reversi.split()) > 1:
409 | writeStatus(1)
410 | # © Gerrishon Sirere
411 | # Secretum Inc
412 | for revex in reversi.split():
413 | if revex.strip() == "01" or revex.strip() == "1": binploit()
414 | elif revex.strip() == "02" or revex.strip() == "2": jadx()
415 | elif revex.strip() == "03" or revex.strip() == "3": apktool()
416 | elif revex.strip() == "04" or revex.strip() == "4": uncompyle()
417 | elif revex.strip() == "05" or revex.strip() == "5": ddcrypt()
418 | elif revex.strip() == "06" or revex.strip() == "6": cfr()
419 | elif revex.strip() == "07" or revex.strip() == "7": upx()
420 | elif revex.strip() == "08" or revex.strip() == "8": pyinstxtractor()
421 | elif revex.strip() == "09" or revex.strip() == "9": innoextract()
422 | elif revex.strip() == "10": binwalk()
423 | elif revex.strip() == "00" or revex.strip() == "0": restart_program()
424 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
425 | if readStatus():
426 | writeStatus(0)
427 |
428 | # 08 - Exploitation Tools
429 | elif debonair.strip() == "8" or debonair.strip() == "08":
430 | print("\n [01] Metasploit: Advanced open-source platform for developing, testing and using exploit code")
431 | print(" [02] commix: Automated All-in-One OS Command Injection and Exploitation Tool")
432 | print(" [03] BlackBox: A Penetration Testing Framework")
433 | print(" [04] Brutal: Payload for teensy like a rubber ducky but the syntax is different")
434 | print(" [05] TXTool: An easy pentesting tool")
435 | print(" [06] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
436 | print(" [07] Websploit: An advanced MiTM Framework")
437 | print(" [08] Routersploit: Exploitation Framework for Embedded Devices")
438 | print(" [09] A-Rat: Remote Administration Tool")
439 | print(" [10] BAF: Blind Attacking Framework")
440 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
441 | exploitool = prompt("@dbnr >> install ")
442 | if exploitool == "@":
443 | exploitool = ""
444 | for x in range(1,201):
445 | exploitool += f"{x} "
446 | if len(exploitool.split()) > 1:
447 | writeStatus(1)
448 | # © Gerrishon Sirere
449 | # Secretum Inc
450 | for explx in exploitool.split():
451 | if explx.strip() == "01" or explx.strip() == "1": metasploit()
452 | elif explx.strip() == "02" or explx.strip() == "2": commix()
453 | elif explx.strip() == "03" or explx.strip() == "3": blackbox()
454 | elif explx.strip() == "04" or explx.strip() == "4": brutal()
455 | elif explx.strip() == "05" or explx.strip() == "5": txtool()
456 | elif explx.strip() == "06" or explx.strip() == "6": xattacker()
457 | elif explx.strip() == "07" or explx.strip() == "7": websploit()
458 | elif explx.strip() == "08" or explx.strip() == "8": routersploit()
459 | elif explx.strip() == "09" or explx.strip() == "9": arat()
460 | elif explx.strip() == "10": baf()
461 | elif explx.strip() == "00" or explx.strip() == "0": restart_program()
462 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
463 | if readStatus():
464 | writeStatus(0)
465 |
466 | # 09 - Sniffing and Spoofing
467 | elif debonair.strip() == "9" or debonair.strip() == "09":
468 | print("\n [01] KnockMail: Verify if Email Exists")
469 | print(" [02] tcpdump: A powerful command-line packet analyzer")
470 | print(" [03] Ettercap: Comprehensive suite for MITM attacks, can sniff live connections, do content filtering on the fly and much more")
471 | print(" [04] hping3: hping is a command-line oriented TCP/IP packet assembler/analyzer")
472 | print(" [05] tshark: Network protocol analyzer and sniffer")
473 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
474 | sspoof = prompt("@dbnr >> install ")
475 | if sspoof == "@":
476 | sspoof = ""
477 | for x in range(1,201):
478 | sspoof += f"{x} "
479 | if len(sspoof.split()) > 1:
480 | writeStatus(1)
481 | # © Gerrishon Sirere
482 | # Secretum Inc
483 | for sspx in sspoof.split():
484 | if sspx.strip() == "01" or sspx.strip() == "1": knockmail()
485 | elif sspx.strip() == "02" or sspx.strip() == "2": tcpdump()
486 | elif sspx.strip() == "03" or sspx.strip() == "3": ettercap()
487 | elif sspx.strip() == "04" or sspx.strip() == "4": hping3()
488 | elif sspx.strip() == "05" or sspx.strip() == "5": tshark()
489 | elif sspx.strip() == "00" or sspx.strip() == "0": restart_program()
490 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
491 | if readStatus():
492 | writeStatus(0)
493 |
494 | # 10 - Reporting Tools
495 | elif debonair.strip() == "10":
496 | print("\n [01] dos2unix: Converts between DOS and Unix text files")
497 | print(" [02] exiftool: Utility for reading, writing and editing meta information in a wide variety of files")
498 | print(" [03] iconv: Utility converting between different character encodings")
499 | print(" [04] mediainfo: Command-line utility for reading information from media files")
500 | print(" [05] pdfinfo: PDF document information extractor")
501 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
502 | reportls = prompt("@dbnr >> install ")
503 | if reportls == "@":
504 | reportls = ""
505 | for x in range(1,201):
506 | reportls += f"{x} "
507 | if len(reportls.split()) > 1:
508 | writeStatus(1)
509 | # © Gerrishon Sirere
510 | # Secretum Inc
511 | for reportx in reportls.split():
512 | if reportx.strip() == "01" or reportx.strip() == "1": dos2unix()
513 | elif reportx.strip() == "02" or reportx.strip() == "2": exiftool()
514 | elif reportx.strip() == "03" or reportx.strip() == "3": iconv()
515 | elif reportx.strip() == "04" or reportx.strip() == "4": mediainfo()
516 | elif reportx.strip() == "05" or reportx.strip() == "5": pdfinfo()
517 | elif reportx.strip() == "00" or reportx.strip() == "0": restart_program()
518 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
519 | if readStatus():
520 | writeStatus(0)
521 |
522 | # 11 - Forensic Tools
523 | elif debonair.strip() == "11":
524 | print("\n [01] steghide: Embeds a message in a file by replacing some of the least significant bits")
525 | print(" [02] tesseract: Tesseract is probably the most accurate open source OCR engine available")
526 | print(" [03] sleuthkit: The Sleuth Kit (TSK) is a library for digital forensics tools")
527 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
528 | forensc = prompt("@dbnr >> install ")
529 | if forensc == "@":
530 | forensc = ""
531 | for x in range(1,201):
532 | forensc += f"{x} "
533 | if len(forensc.split()) > 1:
534 | writeStatus(1)
535 | # © Gerrishon Sirere
536 | # Secretum Inc
537 | for forenx in forensc.split():
538 | if forenx.strip() == "01" or forenx.strip() == "1": steghide()
539 | elif forenx.strip() == "02" or forenx.strip() == "2": tesseract()
540 | elif forenx.strip() == "03" or forenx.strip() == "3": sleuthkit()
541 | elif forenx.strip() == "00" or forenx.strip() == "0": restart_program()
542 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
543 | if readStatus():
544 | writeStatus(0)
545 |
546 | # 12 - Stress Testing
547 | elif debonair.strip() == "12":
548 | print("\n [01] Torshammer: Slow post DDOS tool")
549 | print(" [02] Slowloris: Low bandwidth DoS tool")
550 | print(" [03] Fl00d & Fl00d2: UDP Flood tool")
551 | print(" [04] GoldenEye: GoldenEye Layer 7 (KeepAlive+NoCache) DoS test tool")
552 | print(" [05] Xerxes: The most powerful DoS tool")
553 | print(" [06] Planetwork-DDOS")
554 | print(" [07] Xshell")
555 | print(" [08] santet-online: Social Engineering Tool")
556 | print(" [09] dost-attack: WebServer Attacking Tools")
557 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
558 | stresstest = prompt("@dbnr >> install ")
559 | if stresstest == "@":
560 | stresstest = ""
561 | for x in range(1,201):
562 | stresstest += f"{x} "
563 | if len(stresstest.split()) > 1:
564 | writeStatus(1)
565 | # © Gerrishon Sirere
566 | # Secretum Inc
567 | for stressx in stresstest.split():
568 | if stressx.strip() == "01" or stressx.strip() == "1": torshammer()
569 | elif stressx.strip() == "02" or stressx.strip() == "2": slowloris()
570 | elif stressx.strip() == "03" or stressx.strip() == "3": fl00d12()
571 | elif stressx.strip() == "04" or stressx.strip() == "4": goldeneye()
572 | elif stressx.strip() == "05" or stressx.strip() == "5": xerxes()
573 | elif stressx.strip() == "06" or stressx.strip() == "6": planetwork_ddos()
574 | elif stressx.strip() == "07" or stressx.strip() == "7": xshell()
575 | elif stressx.strip() == "08" or stressx.strip() == "8": sanlen()
576 | elif stressx.strip() == "09" or stressx.strip() == "9": dostattack()
577 | elif stressx.strip() == "00" or stressx.strip() == "0": restart_program()
578 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
579 | if readStatus():
580 | writeStatus(0)
581 |
582 | # 13 - Install Linux Distro
583 | elif debonair.strip() == "13":
584 | print("\n [01] Ubuntu")
585 | print(" [02] Fedora")
586 | print(" [03] Kali Nethunter")
587 | print(" [04] Parrot")
588 | print(" [05] Arch Linux")
589 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
590 | innudis = prompt("@dbnr >> install ")
591 | if innudis == "@":
592 | innudis = ""
593 | for x in range(1,201):
594 | innudis += f"{x} "
595 | if len(innudis.split()) > 1:
596 | writeStatus(1)
597 | # © Gerrishon Sirere
598 | # Secretum Inc
599 | for innux in innudis.split():
600 | if innux.strip() == "01" or innux.strip() == "1": ubuntu()
601 | elif innux.strip() == "02" or innux.strip() == "2": fedora()
602 | elif innux.strip() == "03" or innux.strip() == "3": nethunter()
603 | elif innux.strip() == "04" or innux.strip() == "4": parrot()
604 | elif innux.strip() == "05" or innux.strip() == "5": archlinux()
605 | elif innux.strip() == "00" or innux.strip() == "0": restart_program()
606 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
607 | if readStatus():
608 | writeStatus(0)
609 |
610 | # 14 - Termux Utility
611 | elif debonair.strip() == "14":
612 | print("\n [01] SpiderBot: Curl website using random proxy and user agent")
613 | print(" [02] Ngrok: tunnel local ports to public URLs and inspect traffic")
614 | print(" [03] Sudo: sudo installer for Android")
615 | print(" [04] google: Python bindings to the Google search engine")
616 | print(" [05] kojawafft")
617 | print(" [06] ccgen: Credit Card Generator")
618 | print(" [07] VCRT: Virus Creator")
619 | print(" [08] E-Code: PHP Script Encoder")
620 | print(" [09] Termux-Styling")
621 | print(" [11] xl-py: XL Direct Purchase Package")
622 | print(" [12] BeanShell: A small, free, embeddable Java source interpreter with object scripting language features, written in Java")
623 | print(" [13] vbug: Virus Maker")
624 | print(" [14] Crunch: Highly customizable wordlist generator")
625 | print(" [15] Textr: Simple tool for running text")
626 | print(" [16] heroku: CLI to interact with Heroku")
627 | print(" [17] RShell: Reverse shell for single listening")
628 | print(" [18] TermPyter: Fix all error Jupyter installation on termux")
629 | print(" [19] Numpy: The fundamental package for scientific computing with Python")
630 | print(" [20] BTC-to-IDR-checker: Check the exchange rate virtual money currency to Indonesia Rupiah from Bitcoin.co.id API")
631 | print(" [21] ClickBot: Earn money using telegram bot")
632 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
633 | moretool = prompt("@dbnr >> install ")
634 | if moretool == "@":
635 | moretool = ""
636 | for x in range(1,201):
637 | moretool += f"{x} "
638 | if len(moretool.split()) > 1:
639 | writeStatus(1)
640 | # © Gerrishon Sirere
641 | # Secretum Inc
642 | for moret in moretool.split():
643 | if moret.strip() == "01" or moret.strip() == "1": spiderbot()
644 | elif moret.strip() == "02" or moret.strip() == "2": ngrok()
645 | elif moret.strip() == "03" or moret.strip() == "3": sudo()
646 | elif moret.strip() == "04" or moret.strip() == "4": google()
647 | elif moret.strip() == "05" or moret.strip() == "5": kojawafft()
648 | elif moret.strip() == "06" or moret.strip() == "6": ccgen()
649 | elif moret.strip() == "07" or moret.strip() == "7": vcrt()
650 | elif moret.strip() == "08" or moret.strip() == "8": ecode()
651 | elif moret.strip() == "09" or moret.strip() == "9": stylemux()
652 | elif moret.strip() == "10": passgencvar()
653 | elif moret.strip() == "11": xlPy()
654 | elif moret.strip() == "12": beanshell()
655 | elif moret.strip() == "13": vbug()
656 | elif moret.strip() == "14": crunch()
657 | elif moret.strip() == "15": textr()
658 | elif moret.strip() == "16": heroku()
659 | elif moret.strip() == "17": rshell()
660 | elif moret.strip() == "18": termpyter()
661 | elif moret.strip() == "19": numpy()
662 | elif moret.strip() == "20": btc2idr()
663 | elif moret.strip() == "21": clickbot()
664 | elif moret.strip() == "00" or moret.strip() == "0": restart_program()
665 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
666 | if readStatus():
667 | writeStatus(0)
668 |
669 | # 15 - Shell Function [.bashrc]
670 | elif debonair.strip() == "15":
671 | print("\n [01] FBVid (FB Video Downloader)")
672 | print(" [02] cast2video (Asciinema Cast Converter)")
673 | print(" [03] iconset (AIDE App Icon)")
674 | print(" [04] readme (GitHub README.md)")
675 | print(" [05] makedeb (DEB Package Builder)")
676 | print(" [06] quikfind (Search Files)")
677 | print(" [07] pranayama (4-7-8 Relax Breathing)")
678 | print(" [08] sqlc (SQLite Query Processor)")
679 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
680 | myshf = prompt("@dbnr >> install ")
681 | if myshf == "@":
682 | myshf = ""
683 | for x in range(1,201):
684 | myshf += f"{x} "
685 | if len(myshf.split()) > 1:
686 | writeStatus(1)
687 | # © Gerrishon Sirere
688 | # Secretum Inc
689 | for mysh in myshf.split():
690 | if mysh.strip() == "01" or mysh.strip() == "1": fbvid()
691 | elif mysh.strip() == "02" or mysh.strip() == "2": cast2video()
692 | elif mysh.strip() == "03" or mysh.strip() == "3": iconset()
693 | elif mysh.strip() == "04" or mysh.strip() == "4": readme()
694 | elif mysh.strip() == "05" or mysh.strip() == "5": makedeb()
695 | elif mysh.strip() == "06" or mysh.strip() == "6": quikfind()
696 | elif mysh.strip() == "07" or mysh.strip() == "7": pranayama()
697 | elif mysh.strip() == "08" or mysh.strip() == "8": sqlc()
698 | elif mysh.strip() == "00" or mysh.strip() == "0": restart_program()
699 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
700 | if readStatus():
701 | writeStatus(0)
702 |
703 | # 16 - Install CLI Games
704 | elif debonair.strip() == "16":
705 | print("\n [01] Flappy Bird")
706 | print(" [02] Street Car")
707 | print(" [03] Speed Typing")
708 | print(" [04] NSnake: The classic snake game with textual interface")
709 | print(" [05] Moon buggy: Simple game where you drive a car across the moon's surface")
710 | print(" [06] Nudoku: ncurses based sudoku game")
711 | print(" [07] tty-solitaire")
712 | print(" [08] Pacman4Console")
713 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
714 | cligam = prompt("@dbnr >> install ")
715 | if cligam == "@":
716 | cligam = ""
717 | for x in range(1,201):
718 | cligam += f"{x} "
719 | if len(cligam.split()) > 1:
720 | writeStatus(1)
721 | # © Gerrishon Sirere
722 | # Secretum Inc
723 | for clig in cligam.split():
724 | if clig.strip() == "01" or clig.strip() == "1": flappy_bird()
725 | elif clig.strip() == "02" or clig.strip() == "2": street_car()
726 | elif clig.strip() == "03" or clig.strip() == "3": speed_typing()
727 | elif clig.strip() == "04" or clig.strip() == "4": nsnake()
728 | elif clig.strip() == "05" or clig.strip() == "5": moon_buggy()
729 | elif clig.strip() == "06" or clig.strip() == "6": nudoku()
730 | elif clig.strip() == "07" or clig.strip() == "7": ttysolitaire()
731 | elif clig.strip() == "08" or clig.strip() == "8": pacman4console()
732 | elif clig.strip() == "00" or clig.strip() == "0": restart_program()
733 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
734 | if readStatus():
735 | writeStatus(0)
736 |
737 | # 17 - Malware Analysis
738 | elif debonair.strip() == "17":
739 | print("\n [01] Lynis: Security Auditing and Rootkit Scanner")
740 | print(" [02] Chkrootkit: A Linux Rootkit Scanners")
741 | print(" [03] ClamAV: Antivirus Software Toolkit")
742 | print(" [04] Yara: Tool aimed at helping malware researchers to identify and classify malware samples")
743 | print(" [05] VirusTotal-CLI: Command line interface for VirusTotal")
744 | print(" [06] avpass: Tool for leaking and bypassing Android malware detection system")
745 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
746 | malsys = prompt("@dbnr >> install ")
747 | if malsys == "@":
748 | malsys = ""
749 | for x in range(1,201):
750 | malsys += f"{x} "
751 | if len(malsys.split()) > 1:
752 | writeStatus(1)
753 | # © Gerrishon Sirere
754 | # Secretum Inc
755 | for malx in malsys.split():
756 | if malx.strip() == "01" or malx.strip() == "1": lynis()
757 | elif malx.strip() == "02" or malx.strip() == "2": chkrootkit()
758 | elif malx.strip() == "03" or malx.strip() == "3": clamav()
759 | elif malx.strip() == "04" or malx.strip() == "4": yara()
760 | elif malx.strip() == "05" or malx.strip() == "5": virustotal()
761 | elif malx.strip() == "06" or malx.strip() == "6": avpass()
762 | elif malx.strip() == "00" or malx.strip() == "0": restart_program()
763 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
764 | if readStatus():
765 | writeStatus(0)
766 |
767 | # 18 - Compiler/Interpreter
768 | elif debonair.strip() == "18":
769 | print("\n [01] Python2: Python 2 programming language intended to enable clear programs")
770 | print(" [02] ecj: Eclipse Compiler for Java")
771 | print(" [03] Golang: Go programming language compiler")
772 | print(" [04] ldc: D programming language compiler, built with LLVM")
773 | print(" [05] Nim: Nim programming language compiler")
774 | print(" [06] shc: Shell script compiler")
775 | print(" [07] TCC: Tiny C Compiler")
776 | print(" [08] PHP: Server-side, HTML-embedded scripting language")
777 | print(" [09] Ruby: Dynamic programming language with a focus on simplicity and productivity")
778 | print(" [10] Perl: Capable, feature-rich programming language")
779 | print(" [11] Vlang: Simple, fast, safe, compiled language for developing maintainable software")
780 | print(" [12] BeanShell: Small, free, embeddable, source level Java interpreter with object based scripting language features written in Java")
781 | print(" [13] fp-compiler: Free Pascal is a 32, 64 and 16 bit professional Pascal compiler")
782 | print(" [14] Octave: Scientific Programming Language")
783 | print(" [15] BlogC: A blog compiler")
784 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
785 | compter = prompt("@dbnr >> install ")
786 | if compter == "@":
787 | compter = ""
788 | for x in range(1,201):
789 | compter += f"{x} "
790 | if len(compter.split()) > 1:
791 | writeStatus(1)
792 | # © Gerrishon Sirere
793 | # Secretum Inc
794 | for compt in compter.split():
795 | if compt.strip() == "01" or compt.strip() == "1": python2()
796 | elif compt.strip() == "02" or compt.strip() == "2": ecj()
797 | elif compt.strip() == "03" or compt.strip() == "3": golang()
798 | elif compt.strip() == "04" or compt.strip() == "4": ldc()
799 | elif compt.strip() == "05" or compt.strip() == "5": nim()
800 | elif compt.strip() == "06" or compt.strip() == "6": shc()
801 | elif compt.strip() == "07" or compt.strip() == "7": tcc()
802 | elif compt.strip() == "08" or compt.strip() == "8": php()
803 | elif compt.strip() == "09" or compt.strip() == "9": ruby()
804 | elif compt.strip() == "10": perl()
805 | elif compt.strip() == "11": vlang()
806 | elif compt.strip() == "12": beanshell()
807 | elif compt.strip() == "13": fpcompiler()
808 | elif compt.strip() == "14": octave()
809 | elif compt.strip() == "15": blogc()
810 | elif compt.strip() == "00" or compt.strip() == "0": restart_program()
811 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
812 | if readStatus():
813 | writeStatus(0)
814 |
815 | # 19 - Social Engineering Tools
816 | elif debonair.strip() == "19":
817 | print("\n [01] weeman: HTTP server for phishing in python")
818 | print(" [02] SocialFish: Educational Phishing Tool & Information Collector")
819 | print(" [03] santet-online: Social Engineering Tool")
820 | print(" [04] SpazSMS: Send unsolicited messages repeatedly on the same phone number")
821 | print(" [05] LiteOTP: Multi Spam SMS OTP")
822 | print(" [06] F4K3: Fake User Data Generator")
823 | print(" [07] Hac")
824 | echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
825 | soceng = prompt("@dbnr >> install ")
826 | if soceng == "@":
827 | soceng = ""
828 | for x in range(1,201):
829 | soceng += f"{x} "
830 | if len(soceng.split()) > 1:
831 | writeStatus(1)
832 | # © Gerrishon Sirere
833 | # Secretum Inc
834 | for socng in soceng.split():
835 | if socng.strip() == "01" or socng.strip() == "1": weeman()
836 | elif socng.strip() == "02" or socng.strip() == "2": socfish()
837 | elif socng.strip() == "03" or socng.strip() == "3": sanlen()
838 | elif socng.strip() == "04" or socng.strip() == "4": spazsms()
839 | elif socng.strip() == "05" or socng.strip() == "5": liteotp()
840 | elif socng.strip() == "06" or socng.strip() == "6": f4k3()
841 | elif socng.strip() == "07" or socng.strip() == "7": hac()
842 | elif socng.strip() == "00" or socng.strip() == "0": restart_program()
843 | else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
844 | if readStatus():
845 | writeStatus(0)
846 | elif debonair.strip() == "00":
847 | sys.exit()
848 |
849 | else:
850 | echo(f"ERROR: Invalid Input", foreground="vred", bold=True)
851 | timeout(1)
852 | restart_program()
853 |
854 | if __name__ == "__main__":
855 | os.system("clear")
856 | main()
857 |
--------------------------------------------------------------------------------