Bane
The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, and CMS vulnerability scanning and more..
Install / Use
/learn @AlaBouali/BaneQuality Score
Category
Development & EngineeringSupported Platforms
Tags
README
"Oh, you think darkness is your ally. But you merely adopted the dark; I was born in it, molded by it. I didn't see the light until I was already a man, by then it was nothing to me but BLINDING! The shadows betray you, because they belong to me!" -Bane (Dark Knight)
.///` `.--::::::---.`` `///.
h-.-s+++/--<br>.---/+o++s:.-h
++..-. `:../s
-+ydm-..: :..-dmho:`
:odmNNNNs..-. `:..+MNNNmmy/. `
.odmNNNNMMMN`..: -..`mMMMMNNNNmy:
+mNNNNMMMMMMMo`.:` :``/MMMMMMMMNNNmy.
.yNNNNMMMMMMMMMd` `-<br>```````..-` `yMMMMMMMMMMNNNd:
-dNNNMMMMMMMMMMMN` ..-` `-`- mMMMMMMMMMMMMNNmo
:mNNNMMMMMMMMMMMMM: . `.` -MMMMMMMMMMMMMMNNNs`
/mNNNMMMMMMMMMMMMMMy --- .-- oMMMMMMMMMMMMMMMNNNy`
:mNNNMMMMMMMMMMMMMMMN```:.````````.:```dMMMMMMMMMMMMMMMMNNNy`
-mNNNNMMMMMMMMMMMMMMMMo`.-` `-.`+MMMMMMMMMMMMMMMMMNNNNo
hNNNNNMMMMMMMMMMMMMMMMm.``- .``.dMMMMMMMMMMMMMMMMMMNNNm-
-NNNNNMMMMMMMMMMMMMMMMMM-..: -<br>NMMMMMMMMMMMMMMMMMMNNNNs
oNNNNNMMMMMMMMMMMMMMMMMMo``.` -` +MMMMMMMMMMMMMMMMMMMNNNNm
:dNNNNNNMMMMMMMMMMMMMMMMMd<br>-``````<br>.hMMMMMMMMMMMMMMMMMMMNNNNNs.
.ssmNNNNNNMMMMMMMMMMMMMMMMMM.``/:. .-/```NMMMMMMMMMMMMMMMMMMNNNNNNyy+` `
`oy: mNNNNNNMMMMMMMMMMMMMMMMMM/``-` `-``:MMMMMMMMMMMMMMMMMMMNNNNNN/`+y: `
+y` dNNNNNNMMMMMMMMMMMMMMMMMMy..-:- --:..oMMMMMMMMMMMMMMMMMMMNNNNNN: -N`
m- hNNNNNNMMMNdhhyyhddmMMMMMd```:.``.:```hMMMMNdhso++++shmNMMMNNNNN: yo `
/d yNNNNNMMh/-````````.-/ydNM.``- -```NNds:.`..-----..-sNMMNNNNN- -m`
h+ sNNNNNMMmsyhddmmmdhs:` `-o/../` `/-.:+-` `:yhddmNNNNmmNMMMNNNNN. d/
m/ oNNNNNMMMMMMMNdyssoooo:` `:..``.+```.-. :o++//+yydMMMMMMMMNNNNN` .so
d-- /NNNNNNMMMMMmyhm// ymy.`- o `- odm:- .ddssNMMMMMNNNNNm /:s
.h / :NNNNNNNMMMmhshhy+++ohy/. .: `o` `/``-shysssyddddNMMMMNNNNNNd --.h
-y `: .NNNNNNNMMMMMMMMNNmmmhys/:.`..``.``..`-:syhhdmNNMMMMMMMMMMNNNNNy / `d
:s :` dNNNNNMMMMMMMMMNNNmmNNh- `.` `.` `+mMNNNNNMMMMMMMMMMNNNNN+ :` m `
/o /` oNNNNMMMMMMMMMMMMMMmd+.. `.:- -` - -:.. -sddmNMMMMMMMMMMMMNNNm. .: m `
++ `:``dNNNMMMMMMMMMMMNo+/.`./-. o` --` o `-/.``/+omMMMMMMMMMMNNNo .: d` `
-h `:`:mNNMMMMMMMMMMd-.+.+--:.`.+.-.::.-./-`.:--/:+..hMMMMMMMMMNNh`.: -h `
s: `:`+mNMMMMMMMMMm- `/:` o/://++:++++:+/+/:/o``:+` .mMMMMMMMMNd..: y-
.h `:`/hNMMMMMMd+: -::<br>s-:+`.+:+-.+:+:`/:-+:-.-:- :NMMMMMMNy.-- :y
o/ ` `:``:ymMNh:`- /:-+`o::/` +:/. +:+` /::o./--+ /omMNdo- -- ` h.
`d` `+.` :.` -s: -` ./:::`/::/ +-/. +-+` :::/`-:::- `-`++.``-. `-+ :s
o+ /`-:``.-. `- /--/ /:-: +-/. +-+ :-:+ /--/ .. `--. .:..: h.
`d` :` +h+. - `+-:: .+-:+..-+://-+:+-../:-+-`-:-/. -` -yd. / /s
o+ `:. -ydo. -` //::..o/-:o:.//:/++/:/+.:+/-/+: /::o : :yd+``-- d.
`d .:. -sy .. .o--+ -.+-.`.-/<br>:/<br>/--`.-+.: +--o- `/d+``--`:s
s/ .:` :.:```-o--o.-.:-` `:/ .: /:` `-/ / s:-o-```+``.-` h.
.h -:`/.///`/..`:-.:`<br> <br><br><br>. <br>`: /--../ //:o.:.-y
s: -o/::/:--.-.-.: : /`:.---/::+. y-
`h. ``/. `/ ` -.:``` <br><br>..` ```: / ` :` ./. +o
.y. -.-- -.:.``- -```::```: ..`./ : .-.-` /s
.y- -.:```: :/::o+/::/ : ``: : `+o
`s+` -..- -.o/:/: `+::+//:+. -/::o`: ..`-` .s/
:s- ./- `- -.o//o. /:::-::+ `o//o : -` ./.`+o.
`/o:+..+`.` -.://+<br>+--//:-+<br>////`: `../-.ss-
/h /` ..-` .-o/+:..+--//:-+..-o/+:.` `-.- `+ y-
o+``.-+-.::<br>o//o- /--::--+ .o//s<br>:/.-//:``:s
-o:```.//: :+::+.o--oo:-o.+::+/ :/o.```:o:
-o++oy.: .- /`o::oo:-+-/ -- /o++++o:
`os .. /..//../ ..` `s:
`o+. `:`:-.-. `.++-
`/+/.` `. .` `-++:`
`:+++/:-<br>-:+++/-
`.-::--`
`
<h1>Table of contents</h1>
<ul>
<li><a href="#introduction">Introduction</a></li>
<li><a href="#documentation">Documentation</a></li>
<li><a href="#why-you-should-use-bane">Why you should use "bane"</a></li>
<li><a href="#installation">Installation</a></li>
<li><a href="#special-speech">Special Speech</a></li>
</ul>
<h1 id="introduction">Introduction:</h1>
The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, and CMS vulnerability scanning, among others. The library's capabilities extend from performing bruteforce login attempts to analyzing web pages for vulnerabilities, managing botnets, and conducting thorough network discovery. Noteworthy is its rich selection of modules, which encompass encryption tools, security testing utilities, network scanning features, and other essential functions. This comprehensive library, written in pure Python, operates seamlessly on both Python 2 and 3, as well as Jython and IronPython. Maintained diligently since April 2018 by its sole developer <a href='https://alabouali.medium.com/'>Ala Bouali</a>, "bane" continues to evolve, offering cybersecurity professionals and network administrators a powerful and self-contained toolkit for their operations.
This library is intended exclusively for educational purposes and ethical use with the explicit permission from the people who this tool is used against. The author of this code expressly disclaims any responsibility for any misuse or improper application of this library. It is imperative to emphasize that the user, and the user alone, bears full accountability for their actions when utilizing this library. Any legal ramifications stemming from the misuse of this library are solely the responsibility of the user, and the author shall not be held liable for any such consequences. By utilizing this library, users are acknowledging their understanding and acceptance of these terms and conditions.
<h1 id="Documentation">Documentation:</h1> <ul> <li><a href="https://github.com/AlaBouali/bane#installation">Installation</a></li> <br> <!-- Root Directory --> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane">Home</a> </li> <br> <!-- bruteforce Directory --> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce"><b>Bruteforce:</b></a> </li> <br> <ul> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#Admin_Panel_Finder-class">Admin_Panel_Finder :</a> used to search for potential admin panel URLs on a website using a predefined list of extensions.</li> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#Decryptor-class">Decryptor :</a> used for performing various cryptographic hash decryption attempts.</li> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#Files_Manager_Finder-class">Files_Manager_Finder :</a> used to search for a filemanager on a website.</li> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#Force_Browsing-class">Force_Browsing :</a> used to perform force browsing on a website by attempting to access various URLs with different extensions.</li> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#HTTP_Auth_Bruteforce-class">HTTP_Auth_Bruteforce :</a> used to perform HTTP authentication bruteforce attacks on a website.</li> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#jwt_manager-class">JWT_Manager :</a> provides functionality for analyzing, encoding, decoding, and guessing secret keys for JSON Web Tokens (JWT). JWTs are widely used in web applications for secure data exchange and authentication.</li> <li><a href="https://github.com/AlaBouali/bane/tree/master/bane/bruteforce#Hydra-class">Hydra :</a> used for performing brute-force login attempts on various services, including SSH, Telnet,Related Skills
node-connect
334.9kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
82.3kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
334.9kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
82.3kCommit, push, and open a PR
