mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-23 00:49:59 +00:00
Phase 7: Tool install command fixes
- Replace setup.py install → pip install --user . (explo, takeover, reconspider, infoga) - Mark Blazy as ARCHIVED: Python 2 only (pip2.7/python2.7) - Replace sudo git clone → git clone everywhere (no root needed for user tools dir) - Replace sudo pip install → pip install --user everywhere - Fix dalfox: git clone + cd approach → go install github.com/hahwul/dalfox/v2@latest - Add apt -y flag to ReconSpider apt install
This commit is contained in:
parent
4271cb8ef6
commit
fc5951500f
21 changed files with 86 additions and 84 deletions
|
|
@ -13,7 +13,7 @@ class AnonymouslySurf(HackingTool):
|
|||
# Deleting the source on install means there is no retry if install fails.
|
||||
# Now kept in a separate step so failure does not destroy the source.
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git",
|
||||
"git clone https://github.com/Und3rf10w/kali-anonsurf.git",
|
||||
"cd kali-anonsurf && sudo ./installer.sh",
|
||||
]
|
||||
RUN_COMMANDS = ["sudo anonsurf start"]
|
||||
|
|
@ -32,7 +32,7 @@ class Multitor(HackingTool):
|
|||
TITLE = "Multitor"
|
||||
DESCRIPTION = "How to stay in multi places at the same time."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/trimstray/multitor.git",
|
||||
"git clone https://github.com/trimstray/multitor.git",
|
||||
"cd multitor && sudo bash setup.sh install",
|
||||
]
|
||||
RUN_COMMANDS = [
|
||||
|
|
|
|||
|
|
@ -78,7 +78,7 @@ class UFONet(HackingTool):
|
|||
"that allows performing DoS and DDoS attacks."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/epsylon/ufonet.git",
|
||||
"git clone https://github.com/epsylon/ufonet.git",
|
||||
"cd ufonet && pip install --user .",
|
||||
]
|
||||
RUN_COMMANDS = ["python3 ufonet --gui"]
|
||||
|
|
@ -93,7 +93,7 @@ class GoldenEye(HackingTool):
|
|||
"Usage: ./goldeneye.py <url> [OPTIONS]"
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/jseidl/GoldenEye.git",
|
||||
"git clone https://github.com/jseidl/GoldenEye.git",
|
||||
"chmod -R 755 GoldenEye",
|
||||
]
|
||||
PROJECT_URL = "https://github.com/jseidl/GoldenEye"
|
||||
|
|
@ -111,7 +111,7 @@ class Saphyra(HackingTool):
|
|||
DESCRIPTION = "A Python DDoS script for SECURITY TESTING PURPOSES ONLY."
|
||||
INSTALL_COMMANDS = [
|
||||
# Bug 7 fix: removed "sudo su" (first step was dropping into interactive root shell)
|
||||
"sudo git clone https://github.com/anonymous24x7/Saphyra-DDoS.git",
|
||||
"git clone https://github.com/anonymous24x7/Saphyra-DDoS.git",
|
||||
"chmod +x Saphyra-DDoS/saphyra.py",
|
||||
]
|
||||
PROJECT_URL = "https://github.com/anonymous24x7/Saphyra-DDoS"
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@ class RouterSploit(HackingTool):
|
|||
DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \
|
||||
"framework dedicated to embedded devices"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/threat9/routersploit.git",
|
||||
"git clone https://github.com/threat9/routersploit.git",
|
||||
"cd routersploit && sudo python3 -m pip install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"]
|
||||
|
|
@ -22,7 +22,7 @@ class WebSploit(HackingTool):
|
|||
TITLE = "WebSploit"
|
||||
DESCRIPTION = "Websploit is an advanced MITM framework."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/The404Hacking/websploit.git;cd websploit/Setup;sudo chmod +x install.sh && sudo bash install.sh"
|
||||
"git clone https://github.com/The404Hacking/websploit.git;cd websploit/Setup;sudo chmod +x install.sh && sudo bash install.sh"
|
||||
]
|
||||
RUN_COMMANDS = ["sudo websploit"]
|
||||
PROJECT_URL = "https://github.com/The404Hacking/websploit "
|
||||
|
|
|
|||
|
|
@ -50,7 +50,7 @@ class BulkExtractor(HackingTool):
|
|||
def gui_mode(self):
|
||||
console.print(Panel(Text(self.TITLE, justify="center"), style="bold magenta"))
|
||||
console.print("[bold magenta]Cloning repository and attempting to run GUI...[/]")
|
||||
os.system("sudo git clone https://github.com/simsong/bulk_extractor.git")
|
||||
os.system("git clone https://github.com/simsong/bulk_extractor.git")
|
||||
os.system("ls src/ && cd .. && cd java_gui && ./BEViewer")
|
||||
console.print(
|
||||
"[magenta]If you get an error after clone go to /java_gui/src/ and compile the .jar file && run ./BEViewer[/]")
|
||||
|
|
|
|||
|
|
@ -16,7 +16,7 @@ class NMAP(HackingTool):
|
|||
TITLE = "Network Map (nmap)"
|
||||
DESCRIPTION = "Free and open source utility for network discovery and security auditing"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/nmap/nmap.git",
|
||||
"git clone https://github.com/nmap/nmap.git",
|
||||
"sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/nmap/nmap"
|
||||
|
|
@ -30,7 +30,7 @@ class Dracnmap(HackingTool):
|
|||
DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
|
||||
"exploit the network and gathering information with nmap help."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
|
||||
"git clone https://github.com/Screetsec/Dracnmap.git",
|
||||
"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
|
||||
|
|
@ -92,8 +92,8 @@ class ReconSpider(HackingTool):
|
|||
"Websites, Organizations and find out information from" \
|
||||
" different sources.\n"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/bhavsec/reconspider.git",
|
||||
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
|
||||
"git clone https://github.com/bhavsec/reconspider.git",
|
||||
"sudo apt install -y python3 python3-pip && cd reconspider && pip install --user ."
|
||||
]
|
||||
RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
|
||||
PROJECT_URL = "https://github.com/bhavsec/reconspider"
|
||||
|
|
@ -118,7 +118,7 @@ class Infoga(HackingTool):
|
|||
"(ip, hostname, country,...) from different public source"
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/m4ll0k/Infoga.git",
|
||||
"cd Infoga;sudo python3 setup.py install"
|
||||
"cd Infoga && pip install --user ."
|
||||
]
|
||||
RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
|
||||
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
|
||||
|
|
@ -185,7 +185,7 @@ class PortScannerRanger(HackingTool):
|
|||
"all alive hosts within your range that you specify."
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/floriankunushevci/rang3r.git;"
|
||||
"sudo pip install termcolor"]
|
||||
"pip install --user termcolor"]
|
||||
PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
|
||||
|
||||
def run(self):
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@ class Keydroid(HackingTool):
|
|||
DESCRIPTION = "Android Keylogger + Reverse Shell\n" \
|
||||
"[!] You have to install Some Manually Refer Below Link:\n " \
|
||||
"[+] https://github.com/F4dl0/keydroid"
|
||||
INSTALL_COMMANDS = ["sudo git clone https://github.com/F4dl0/keydroid.git"]
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/F4dl0/keydroid.git"]
|
||||
RUN_COMMANDS = ["cd keydroid && bash keydroid.sh"]
|
||||
PROJECT_URL = "https://github.com/F4dl0/keydroid"
|
||||
|
||||
|
|
@ -21,7 +21,7 @@ class MySMS(HackingTool):
|
|||
"[!] You have to install Some Manually Refer Below Link:\n\t " \
|
||||
"[+] https://github.com/papusingh2sms/mysms"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/papusingh2sms/mysms.git"]
|
||||
"git clone https://github.com/papusingh2sms/mysms.git"]
|
||||
RUN_COMMANDS = ["cd mysms && bash mysms.sh"]
|
||||
PROJECT_URL = "https://github.com/papusingh2sms/mysms"
|
||||
|
||||
|
|
@ -32,7 +32,7 @@ class LockPhish(HackingTool):
|
|||
"lock screen, designed to\n Grab Windows credentials,Android" \
|
||||
" PIN and iPhone Passcode using a https link."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/JasonJerry/lockphish.git"]
|
||||
"git clone https://github.com/JasonJerry/lockphish.git"]
|
||||
RUN_COMMANDS = ["cd lockphish && bash lockphish.sh"]
|
||||
PROJECT_URL = "https://github.com/JasonJerry/lockphish"
|
||||
|
||||
|
|
@ -42,7 +42,7 @@ class Droidcam(HackingTool):
|
|||
DESCRIPTION = "Powerful Tool For Grab Front Camera Snap Using A Link"
|
||||
INSTALL_COMMANDS = [
|
||||
# Bug 16 fix: missing comma caused two strings to be implicitly concatenated into one
|
||||
"sudo git clone https://github.com/kinghacker0/WishFish.git",
|
||||
"git clone https://github.com/kinghacker0/WishFish.git",
|
||||
"sudo apt install -y php wget openssh-client",
|
||||
]
|
||||
RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"]
|
||||
|
|
@ -54,7 +54,7 @@ class EvilApp(HackingTool):
|
|||
DESCRIPTION = "EvilApp is a script to generate Android App that can " \
|
||||
"hijack authenticated sessions in cookies."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/crypticterminal/EvilApp.git"]
|
||||
"git clone https://github.com/crypticterminal/EvilApp.git"]
|
||||
RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"]
|
||||
PROJECT_URL = "https://github.com/crypticterminal/EvilApp"
|
||||
|
||||
|
|
|
|||
|
|
@ -9,7 +9,7 @@ class DebInject(HackingTool):
|
|||
TITLE = "Debinject"
|
||||
DESCRIPTION = "Debinject is a tool that inject malicious code into *.debs"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/UndeadSec/Debinject.git"]
|
||||
"git clone https://github.com/UndeadSec/Debinject.git"]
|
||||
RUN_COMMANDS = ["cd Debinject;python debinject.py"]
|
||||
PROJECT_URL = "https://github.com/UndeadSec/Debinject"
|
||||
|
||||
|
|
@ -20,7 +20,7 @@ class Pixload(HackingTool):
|
|||
"Pixload is Set of tools for creating/injecting payload into images."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl",
|
||||
"sudo git clone https://github.com/chinarulezzz/pixload.git"
|
||||
"git clone https://github.com/chinarulezzz/pixload.git"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/chinarulezzz/pixload"
|
||||
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ class BruteForce(HackingTool):
|
|||
DESCRIPTION = "Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n" \
|
||||
"[!] python3 Brute_Force.py -g <Account@gmail.com> -l <File_list>"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
|
||||
"git clone https://github.com/Matrix07ksa/Brute_Force.git",
|
||||
"cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Brute_Force;python3 Brute_Force.py -h"]
|
||||
|
|
@ -39,7 +39,7 @@ class Faceshell(HackingTool):
|
|||
TITLE = "Facebook Attack"
|
||||
DESCRIPTION = "Facebook BruteForcer"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Matrix07ksa/Brute_Force.git",
|
||||
"git clone https://github.com/Matrix07ksa/Brute_Force.git",
|
||||
"cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force"
|
||||
|
|
@ -59,7 +59,7 @@ class AppCheck(HackingTool):
|
|||
TITLE = "Application Checker"
|
||||
DESCRIPTION = "Tool to check if an app is installed on the target device through a link."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/jakuta-tech/underhanded.git",
|
||||
"git clone https://github.com/jakuta-tech/underhanded.git",
|
||||
"cd underhanded && sudo chmod +x underhanded.sh"
|
||||
]
|
||||
RUN_COMMANDS = ["cd underhanded;sudo bash underhanded.sh"]
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@ class FacialFind(HackingTool):
|
|||
INSTALL_COMMANDS = [
|
||||
"sudo apt install -y software-properties-common",
|
||||
"sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade",
|
||||
"sudo git clone https://github.com/Greenwolf/social_mapper.git",
|
||||
"git clone https://github.com/Greenwolf/social_mapper.git",
|
||||
"sudo apt install -y build-essential cmake libgtk-3-dev libboost-all-dev",
|
||||
"cd social_mapper/setup",
|
||||
"sudo python3 -m pip install --no-cache-dir -r requirements.txt",
|
||||
|
|
@ -42,7 +42,7 @@ class FindUser(HackingTool):
|
|||
TITLE = "Find SocialMedia By UserName"
|
||||
DESCRIPTION = "Find usernames across over 75 social networks"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/xHak9x/finduser.git",
|
||||
"git clone https://github.com/xHak9x/finduser.git",
|
||||
"cd finduser && sudo chmod +x finduser.sh"
|
||||
]
|
||||
RUN_COMMANDS = ["cd finduser && sudo bash finduser.sh"]
|
||||
|
|
@ -75,7 +75,7 @@ class SocialScan(HackingTool):
|
|||
TITLE = "SocialScan | Username or Email"
|
||||
DESCRIPTION = "Check email address and username availability on online " \
|
||||
"platforms with 100% accuracy"
|
||||
INSTALL_COMMANDS = ["sudo pip install socialscan"]
|
||||
INSTALL_COMMANDS = ["pip install --user socialscan"]
|
||||
PROJECT_URL = "https://github.com/iojw/socialscan"
|
||||
|
||||
def run(self):
|
||||
|
|
|
|||
|
|
@ -9,8 +9,8 @@ class WifiJammerNG(HackingTool):
|
|||
TITLE = "WifiJammer-NG"
|
||||
DESCRIPTION = "Continuously jam all wifi clients and access points within range."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/MisterBianco/wifijammer-ng.git",
|
||||
"cd wifijammer-ng;sudo pip install -r requirements.txt"
|
||||
"git clone https://github.com/MisterBianco/wifijammer-ng.git",
|
||||
"cd wifijammer-ng;pip install --user -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = [
|
||||
'echo "python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]"| boxes | lolcat',
|
||||
|
|
@ -24,7 +24,7 @@ class KawaiiDeauther(HackingTool):
|
|||
DESCRIPTION = "Kawaii Deauther is a pentest toolkit whose goal is to perform \n " \
|
||||
"jam on WiFi clients/routers and spam many fake AP for testing purposes."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/aryanrtm/KawaiiDeauther.git",
|
||||
"git clone https://github.com/aryanrtm/KawaiiDeauther.git",
|
||||
"cd KawaiiDeauther;sudo bash install.sh"
|
||||
]
|
||||
RUN_COMMANDS = ["cd KawaiiDeauther;sudo bash KawaiiDeauther.sh"]
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@ class TheFatRat(HackingTool):
|
|||
"which can bypass most anti-virus."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Screetsec/TheFatRat.git",
|
||||
"git clone https://github.com/Screetsec/TheFatRat.git",
|
||||
"cd TheFatRat && chmod +x setup.sh",
|
||||
]
|
||||
RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"]
|
||||
|
|
@ -36,7 +36,7 @@ class Brutal(HackingTool):
|
|||
"virus attacks and launch listener for a Human Interface Device."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Screetsec/Brutal.git",
|
||||
"git clone https://github.com/Screetsec/Brutal.git",
|
||||
"cd Brutal && chmod +x Brutal.sh",
|
||||
]
|
||||
RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"]
|
||||
|
|
@ -60,7 +60,7 @@ class Stitch(HackingTool):
|
|||
"[!] Refer to the project link for Windows & macOS support."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/nathanlopez/Stitch.git",
|
||||
"git clone https://github.com/nathanlopez/Stitch.git",
|
||||
"cd Stitch && pip install --user -r lnx_requirements.txt",
|
||||
]
|
||||
RUN_COMMANDS = ["cd Stitch && sudo python3 main.py"]
|
||||
|
|
@ -74,7 +74,7 @@ class MSFVenom(HackingTool):
|
|||
"types of payloads, based on user choice."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/g0tmi1k/msfpc.git",
|
||||
"git clone https://github.com/g0tmi1k/msfpc.git",
|
||||
"cd msfpc && chmod +x msfpc.sh",
|
||||
]
|
||||
RUN_COMMANDS = ["cd msfpc && sudo bash msfpc.sh -h -v"]
|
||||
|
|
@ -85,7 +85,7 @@ class Venom(HackingTool):
|
|||
TITLE = "Venom Shellcode Generator"
|
||||
DESCRIPTION = "Venom exploits apache2 webserver to deliver LAN payloads via fake webpages."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/r00t-3xp10it/venom.git",
|
||||
"git clone https://github.com/r00t-3xp10it/venom.git",
|
||||
# Removed "sudo ./venom.sh -u" from install — interactive, runs the tool during install
|
||||
"sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh",
|
||||
]
|
||||
|
|
@ -97,7 +97,7 @@ class Spycam(HackingTool):
|
|||
TITLE = "Spycam"
|
||||
DESCRIPTION = "Generates a Win32 payload that captures webcam images every 1 minute."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/indexnotfound404/spycam.git",
|
||||
"git clone https://github.com/indexnotfound404/spycam.git",
|
||||
"cd spycam && bash install.sh && chmod +x spycam",
|
||||
]
|
||||
RUN_COMMANDS = ["cd spycam && ./spycam"]
|
||||
|
|
@ -115,7 +115,7 @@ class MobDroid(HackingTool):
|
|||
class Enigma(HackingTool):
|
||||
TITLE = "Enigma"
|
||||
DESCRIPTION = "Enigma is a Multiplatform payload dropper."
|
||||
INSTALL_COMMANDS = ["sudo git clone https://github.com/UndeadSec/Enigma.git"]
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/Enigma.git"]
|
||||
RUN_COMMANDS = ["cd Enigma && sudo python3 enigma.py"]
|
||||
PROJECT_URL = "https://github.com/UndeadSec/Enigma"
|
||||
|
||||
|
|
|
|||
|
|
@ -7,7 +7,7 @@ class Autophisher(HackingTool):
|
|||
TITLE = "Autophisher RK"
|
||||
DESCRIPTION = "Automated Phishing Toolkit"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/CodingRanjith/autophisher.git",
|
||||
"git clone https://github.com/CodingRanjith/autophisher.git",
|
||||
]
|
||||
RUN_COMMANDS = ["cd autophisher && sudo bash autophisher.sh"]
|
||||
PROJECT_URL = "https://github.com/CodingRanjith/autophisher"
|
||||
|
|
@ -30,7 +30,7 @@ class AdvPhishing(HackingTool):
|
|||
TITLE = "AdvPhishing"
|
||||
DESCRIPTION = "This is Advance Phishing Tool ! OTP PHISHING"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Ignitetch/AdvPhishing.git",
|
||||
"git clone https://github.com/Ignitetch/AdvPhishing.git",
|
||||
# Vuln 2 fix: chmod 777 → chmod +x
|
||||
"cd AdvPhishing && chmod +x Linux-Setup.sh && bash Linux-Setup.sh",
|
||||
]
|
||||
|
|
@ -56,7 +56,7 @@ class SocialFish(HackingTool):
|
|||
TITLE = "SocialFish"
|
||||
DESCRIPTION = "Automated Phishing Tool & Information Collector NOTE: username is 'root' and password is 'pass'"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y",
|
||||
"git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y",
|
||||
"cd SocialFish && sudo python3 -m pip install -r requirements.txt",
|
||||
]
|
||||
RUN_COMMANDS = ["cd SocialFish && sudo python3 SocialFish.py root pass"]
|
||||
|
|
@ -71,7 +71,7 @@ class HiddenEye(HackingTool):
|
|||
)
|
||||
INSTALL_COMMANDS = [
|
||||
# Vuln 2 fix: chmod 777 → chmod 755
|
||||
"sudo git clone https://github.com/Morsmalleo/HiddenEye.git && chmod -R 755 HiddenEye",
|
||||
"git clone https://github.com/Morsmalleo/HiddenEye.git && chmod -R 755 HiddenEye",
|
||||
"cd HiddenEye && sudo pip3 install -r requirements.txt && pip3 install pyngrok",
|
||||
]
|
||||
RUN_COMMANDS = ["cd HiddenEye && sudo python3 HiddenEye.py"]
|
||||
|
|
@ -102,7 +102,7 @@ class ISeeYou(HackingTool):
|
|||
"[!] Expose local servers to the internet and decode location from log file."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Viralmaniar/I-See-You.git",
|
||||
"git clone https://github.com/Viralmaniar/I-See-You.git",
|
||||
"cd I-See-You && sudo chmod u+x ISeeYou.sh",
|
||||
]
|
||||
RUN_COMMANDS = ["cd I-See-You && sudo bash ISeeYou.sh"]
|
||||
|
|
@ -112,7 +112,7 @@ class ISeeYou(HackingTool):
|
|||
class SayCheese(HackingTool):
|
||||
TITLE = "SayCheese"
|
||||
DESCRIPTION = "Take webcam shots from target just by sending a malicious link"
|
||||
INSTALL_COMMANDS = ["sudo git clone https://github.com/hangetzzu/saycheese"]
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/hangetzzu/saycheese"]
|
||||
RUN_COMMANDS = ["cd saycheese && sudo bash saycheese.sh"]
|
||||
PROJECT_URL = "https://github.com/hangetzzu/saycheese"
|
||||
|
||||
|
|
@ -121,7 +121,7 @@ class QRJacking(HackingTool):
|
|||
TITLE = "QR Code Jacking"
|
||||
DESCRIPTION = "QR Code Jacking (Any Website)"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt -y install scrot",
|
||||
"git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt -y install scrot",
|
||||
]
|
||||
RUN_COMMANDS = ["cd ohmyqr && sudo bash ohmyqr.sh"]
|
||||
PROJECT_URL = "https://github.com/cryptedwolf/ohmyqr"
|
||||
|
|
@ -134,7 +134,7 @@ class BlackEye(HackingTool):
|
|||
TITLE = "BlackEye"
|
||||
DESCRIPTION = "The ultimate phishing tool with 38 websites available!"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/thelinuxchoice/blackeye",
|
||||
"git clone https://github.com/thelinuxchoice/blackeye",
|
||||
]
|
||||
RUN_COMMANDS = ["cd blackeye && sudo bash blackeye.sh"]
|
||||
PROJECT_URL = "https://github.com/An0nUD4Y/blackeye"
|
||||
|
|
@ -152,7 +152,7 @@ class Thanos(HackingTool):
|
|||
TITLE = "Thanos"
|
||||
DESCRIPTION = "Browser to Browser Phishing toolkit"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/TridevReddy/Thanos.git",
|
||||
"git clone https://github.com/TridevReddy/Thanos.git",
|
||||
# Vuln 2 fix: chmod -R 777 → chmod +x
|
||||
"cd Thanos && chmod +x Thanos.sh",
|
||||
]
|
||||
|
|
@ -179,7 +179,7 @@ class Maskphish(HackingTool):
|
|||
TITLE = "Maskphish"
|
||||
DESCRIPTION = "Hide phishing URL under a normal looking URL (google.com or facebook.com)"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/jaykali/maskphish.git",
|
||||
"git clone https://github.com/jaykali/maskphish.git",
|
||||
]
|
||||
RUN_COMMANDS = ["cd maskphish && sudo bash maskphish.sh"]
|
||||
PROJECT_URL = "https://github.com/jaykali/maskphish"
|
||||
|
|
@ -188,7 +188,7 @@ class Maskphish(HackingTool):
|
|||
class BlackPhish(HackingTool):
|
||||
TITLE = "BlackPhish"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/iinc0gnit0/BlackPhish.git",
|
||||
"git clone https://github.com/iinc0gnit0/BlackPhish.git",
|
||||
"cd BlackPhish && sudo bash install.sh",
|
||||
]
|
||||
RUN_COMMANDS = ["cd BlackPhish && sudo python3 blackphish.py"]
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@ class Vegile(HackingTool):
|
|||
"hidden your specific process,unlimited your session in " \
|
||||
"metasploit and transparent."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Screetsec/Vegile.git",
|
||||
"git clone https://github.com/Screetsec/Vegile.git",
|
||||
"cd Vegile && sudo chmod +x Vegile"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
|
||||
|
|
@ -30,7 +30,7 @@ class ChromeKeyLogger(HackingTool):
|
|||
TITLE = "Chrome Keylogger"
|
||||
DESCRIPTION = "Hera Chrome Keylogger"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/UndeadSec/HeraKeylogger.git",
|
||||
"git clone https://github.com/UndeadSec/HeraKeylogger.git",
|
||||
"cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
|
||||
|
|
|
|||
|
|
@ -13,8 +13,8 @@ class Pyshell(HackingTool):
|
|||
DESCRIPTION = "Pyshell is a Rat Tool that can be able to download & upload " \
|
||||
"files,\n Execute OS Command and more.."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/knassar702/Pyshell.git;"
|
||||
"sudo pip install pyscreenshot python-nmap requests"
|
||||
"git clone https://github.com/knassar702/Pyshell.git;"
|
||||
"pip install --user pyscreenshot python-nmap requests"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Pyshell;./Pyshell"]
|
||||
PROJECT_URL = "https://github.com/knassar702/pyshell"
|
||||
|
|
|
|||
|
|
@ -21,7 +21,7 @@ class Apk2Gold(HackingTool):
|
|||
TITLE = "Apk2Gold"
|
||||
DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/lxdvs/apk2gold.git",
|
||||
"git clone https://github.com/lxdvs/apk2gold.git",
|
||||
"cd apk2gold;sudo bash make.sh"
|
||||
]
|
||||
PROJECT_URL = "https://github.com/lxdvs/apk2gold "
|
||||
|
|
@ -39,7 +39,7 @@ class Jadx(HackingTool):
|
|||
"[*] decode AndroidManifest.xml and other resources from " \
|
||||
"resources.arsc"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/skylot/jadx.git",
|
||||
"git clone https://github.com/skylot/jadx.git",
|
||||
# Bug 30 fix: gradlew dist requires Java — check first
|
||||
"java -version 2>&1 | grep -q 'version' && cd jadx && ./gradlew dist || echo '[ERROR] Java not found. Install: sudo apt install default-jdk'",
|
||||
]
|
||||
|
|
|
|||
|
|
@ -9,7 +9,7 @@ class Sqlmap(HackingTool):
|
|||
DESCRIPTION = "sqlmap is an open source penetration testing tool that " \
|
||||
"automates the process of detecting and exploiting SQL injection flaws " \
|
||||
"and taking over database servers. [!] python3 sqlmap.py -u [http://example.com] --batch --banner. More usage: https://github.com/sqlmapproject/sqlmap/wiki/Usage"
|
||||
INSTALL_COMMANDS = ["sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
|
||||
INSTALL_COMMANDS = ["git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
|
||||
RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"]
|
||||
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
|
||||
|
||||
|
|
@ -40,8 +40,10 @@ class SQLiScanner(HackingTool):
|
|||
class Explo(HackingTool):
|
||||
TITLE = "Explo"
|
||||
DESCRIPTION = "Explo is a simple tool to describe web security issues in human and machine readable format. Usage: explo [--verbose|-v] testcase.yaml | explo [--verbose|-v] examples/*.yaml"
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/dtag-dev-sec/explo.git",
|
||||
"cd explo;sudo python setup.py install"]
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/dtag-dev-sec/explo.git",
|
||||
"cd explo && pip install --user .",
|
||||
]
|
||||
PROJECT_URL = "https://github.com/dtag-dev-sec/explo"
|
||||
|
||||
def __init__(self):
|
||||
|
|
@ -62,7 +64,7 @@ class Leviathan(HackingTool):
|
|||
TITLE = "Leviathan - Wide Range Mass Audit Toolkit"
|
||||
DESCRIPTION = "Leviathan is a mass audit toolkit with service discovery, brute force, SQL injection detection, and custom exploit capabilities. Requires API keys."
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/leviathan-framework/leviathan.git",
|
||||
"cd leviathan;sudo pip install -r requirements.txt"]
|
||||
"cd leviathan;pip install --user -r requirements.txt"]
|
||||
RUN_COMMANDS = ["cd leviathan;python leviathan.py"]
|
||||
PROJECT_URL = "https://github.com/leviathan-framework/leviathan"
|
||||
|
||||
|
|
|
|||
|
|
@ -51,7 +51,7 @@ class StegoCracker(HackingTool):
|
|||
TITLE = "StegoCracker"
|
||||
DESCRIPTION = "StegoCracker lets you hide and retrieve data in image or audio files"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/W1LDN16H7/StegoCracker.git",
|
||||
"git clone https://github.com/W1LDN16H7/StegoCracker.git",
|
||||
"sudo chmod -R 755 StegoCracker"
|
||||
]
|
||||
RUN_COMMANDS = [
|
||||
|
|
@ -65,7 +65,7 @@ class Whitespace(HackingTool):
|
|||
TITLE = "Whitespace"
|
||||
DESCRIPTION = "Use whitespace and unicode characters for steganography"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/beardog108/snow10.git",
|
||||
"git clone https://github.com/beardog108/snow10.git",
|
||||
"sudo chmod -R 755 snow10"
|
||||
]
|
||||
RUN_COMMANDS = ["cd snow10 && ./install.sh"]
|
||||
|
|
|
|||
|
|
@ -9,7 +9,7 @@ class Web2Attack(HackingTool):
|
|||
TITLE = "Web2Attack"
|
||||
DESCRIPTION = "Web hacking framework with tools, exploits by python"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/santatic/web2attack.git"
|
||||
"git clone https://github.com/santatic/web2attack.git"
|
||||
]
|
||||
RUN_COMMANDS = ["cd web2attack && sudo python3 w2aconsole"]
|
||||
PROJECT_URL = "https://github.com/santatic/web2attack"
|
||||
|
|
@ -41,7 +41,7 @@ class SubDomainFinder(HackingTool):
|
|||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo pip3 install requests argparse dnspython",
|
||||
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
|
||||
"git clone https://github.com/aboul3la/Sublist3r.git",
|
||||
"cd Sublist3r && sudo pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"]
|
||||
|
|
@ -54,7 +54,7 @@ class CheckURL(HackingTool):
|
|||
"Detect evil urls that uses IDN Homograph Attack.\n\t"
|
||||
"[!] python3 checkURL.py --url google.com"
|
||||
)
|
||||
INSTALL_COMMANDS = ["sudo git clone https://github.com/UndeadSec/checkURL.git"]
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/checkURL.git"]
|
||||
RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"]
|
||||
PROJECT_URL = "https://github.com/UndeadSec/checkURL"
|
||||
|
||||
|
|
@ -62,12 +62,14 @@ class CheckURL(HackingTool):
|
|||
class Blazy(HackingTool):
|
||||
TITLE = "Blazy(Also Find ClickJacking)"
|
||||
DESCRIPTION = "Blazy is a modern login page bruteforcer"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
|
||||
"cd Blazy && sudo pip2.7 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"]
|
||||
INSTALL_COMMANDS = []
|
||||
RUN_COMMANDS = []
|
||||
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
|
||||
ARCHIVED = True
|
||||
ARCHIVED_REASON = "Python 2 only (pip2.7/python2.7). Repo archived/unmaintained."
|
||||
|
||||
def __init__(self):
|
||||
super().__init__(installable=False, runnable=False)
|
||||
|
||||
|
||||
class SubDomainTakeOver(HackingTool):
|
||||
|
|
@ -80,7 +82,7 @@ class SubDomainTakeOver(HackingTool):
|
|||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"git clone https://github.com/edoardottt/takeover.git",
|
||||
"cd takeover;sudo python3 setup.py install"
|
||||
"cd takeover && pip install --user ."
|
||||
]
|
||||
PROJECT_URL = "https://github.com/edoardottt/takeover"
|
||||
|
||||
|
|
@ -97,7 +99,7 @@ class Dirb(HackingTool):
|
|||
"attack against \n a web server and analyzing the response."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
|
||||
"git clone https://gitlab.com/kalilinux/packages/dirb.git",
|
||||
"cd dirb;sudo bash configure;make"
|
||||
]
|
||||
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@ class WIFIPumpkin(HackingTool):
|
|||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo apt install -y libssl-dev libffi-dev build-essential python3-pyqt5",
|
||||
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
|
||||
"git clone https://github.com/P0cL4bs/wifipumpkin3.git",
|
||||
"chmod -R 755 wifipumpkin3",
|
||||
"cd wifipumpkin3 && pip install --user .",
|
||||
]
|
||||
|
|
@ -30,7 +30,7 @@ class pixiewps(HackingTool):
|
|||
)
|
||||
INSTALL_COMMANDS = [
|
||||
# Bug 29 fix: removed wget https://pastebin.com/... (insecure download from pastebin)
|
||||
"sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
|
||||
"git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
|
||||
"cd pixiewps && make",
|
||||
"cd pixiewps && sudo make install",
|
||||
]
|
||||
|
|
@ -99,7 +99,7 @@ class Wifite(HackingTool):
|
|||
TITLE = "Wifite"
|
||||
DESCRIPTION = "Wifite is an automated wireless attack tool."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/derv82/wifite2.git",
|
||||
"git clone https://github.com/derv82/wifite2.git",
|
||||
"cd wifite2 && pip install --user .",
|
||||
]
|
||||
RUN_COMMANDS = ["sudo wifite"]
|
||||
|
|
@ -114,7 +114,7 @@ class EvilTwin(HackingTool):
|
|||
"Fakeap — perform Evil Twin Attack by getting credentials "
|
||||
"using a Fake page and Fake Access Point."
|
||||
)
|
||||
INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"]
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/Z4nzu/fakeap.git"]
|
||||
RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
|
||||
PROJECT_URL = "https://github.com/Z4nzu/fakeap"
|
||||
SUPPORTED_OS = ["linux"]
|
||||
|
|
@ -128,7 +128,7 @@ class Fastssh(HackingTool):
|
|||
"using the most commonly used credentials."
|
||||
)
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && chmod +x fastssh.sh",
|
||||
"git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && chmod +x fastssh.sh",
|
||||
"sudo apt-get install -y sshpass netcat",
|
||||
]
|
||||
RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ class WlCreator(HackingTool):
|
|||
DESCRIPTION = "WlCreator is a C program that can create all possibilities" \
|
||||
" of passwords,\n and you can choose Length, Lowercase, " \
|
||||
"Capital, Numbers and Special Chars"
|
||||
INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/wlcreator.git"]
|
||||
INSTALL_COMMANDS = ["git clone https://github.com/Z4nzu/wlcreator.git"]
|
||||
RUN_COMMANDS = [
|
||||
"cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5"]
|
||||
PROJECT_URL = "https://github.com/Z4nzu/wlcreator"
|
||||
|
|
@ -52,7 +52,7 @@ class GoblinWordGenerator(HackingTool):
|
|||
TITLE = "Goblin WordGenerator"
|
||||
DESCRIPTION = "Goblin WordGenerator"
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git"]
|
||||
"git clone https://github.com/UndeadSec/GoblinWordGenerator.git"]
|
||||
RUN_COMMANDS = ["cd GoblinWordGenerator && python3 goblin.py"]
|
||||
PROJECT_URL = "https://github.com/UndeadSec/GoblinWordGenerator.git"
|
||||
|
||||
|
|
@ -75,7 +75,7 @@ class showme(HackingTool):
|
|||
"part of BreachCompilation leak. This database makes " \
|
||||
"finding passwords faster and easier than ever before."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git",
|
||||
"git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git",
|
||||
"cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt"
|
||||
]
|
||||
RUN_COMMANDS = ["cd SMWYG-Show-Me-What-You-Got && python SMWYG.py"]
|
||||
|
|
|
|||
|
|
@ -10,13 +10,11 @@ class Dalfox(HackingTool):
|
|||
TITLE = "DalFox (Finder of XSS)"
|
||||
DESCRIPTION = "XSS Scanning and Parameter Analysis tool."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo apt-get install golang",
|
||||
"sudo git clone https://github.com/hahwul/dalfox",
|
||||
"cd dalfox;go install"
|
||||
"sudo apt-get install -y golang",
|
||||
"go install github.com/hahwul/dalfox/v2@latest",
|
||||
]
|
||||
RUN_COMMANDS = [
|
||||
"~/go/bin/dalfox",
|
||||
'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"'
|
||||
"~/go/bin/dalfox --help",
|
||||
]
|
||||
PROJECT_URL = "https://github.com/hahwul/dalfox"
|
||||
|
||||
|
|
@ -128,7 +126,7 @@ class RVuln(HackingTool):
|
|||
TITLE = "RVuln"
|
||||
DESCRIPTION = "Multi-threaded and Automated Web Vulnerability Scanner written in Rust."
|
||||
INSTALL_COMMANDS = [
|
||||
"sudo git clone https://github.com/iinc0gnit0/RVuln.git;"
|
||||
"git clone https://github.com/iinc0gnit0/RVuln.git;"
|
||||
"curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;"
|
||||
"source $HOME/.cargo/env;"
|
||||
"sudo apt install librust-openssl-dev;"
|
||||
|
|
|
|||
Loading…
Reference in a new issue