diff --git a/tools/anonsurf.py b/tools/anonsurf.py index ee49ffc..4ac0a7a 100644 --- a/tools/anonsurf.py +++ b/tools/anonsurf.py @@ -13,7 +13,7 @@ class AnonymouslySurf(HackingTool): # Deleting the source on install means there is no retry if install fails. # Now kept in a separate step so failure does not destroy the source. INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Und3rf10w/kali-anonsurf.git", + "git clone https://github.com/Und3rf10w/kali-anonsurf.git", "cd kali-anonsurf && sudo ./installer.sh", ] RUN_COMMANDS = ["sudo anonsurf start"] @@ -32,7 +32,7 @@ class Multitor(HackingTool): TITLE = "Multitor" DESCRIPTION = "How to stay in multi places at the same time." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/trimstray/multitor.git", + "git clone https://github.com/trimstray/multitor.git", "cd multitor && sudo bash setup.sh install", ] RUN_COMMANDS = [ diff --git a/tools/ddos.py b/tools/ddos.py index 9c63ae0..75e2273 100644 --- a/tools/ddos.py +++ b/tools/ddos.py @@ -78,7 +78,7 @@ class UFONet(HackingTool): "that allows performing DoS and DDoS attacks." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/epsylon/ufonet.git", + "git clone https://github.com/epsylon/ufonet.git", "cd ufonet && pip install --user .", ] RUN_COMMANDS = ["python3 ufonet --gui"] @@ -93,7 +93,7 @@ class GoldenEye(HackingTool): "Usage: ./goldeneye.py [OPTIONS]" ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/jseidl/GoldenEye.git", + "git clone https://github.com/jseidl/GoldenEye.git", "chmod -R 755 GoldenEye", ] PROJECT_URL = "https://github.com/jseidl/GoldenEye" @@ -111,7 +111,7 @@ class Saphyra(HackingTool): DESCRIPTION = "A Python DDoS script for SECURITY TESTING PURPOSES ONLY." INSTALL_COMMANDS = [ # Bug 7 fix: removed "sudo su" (first step was dropping into interactive root shell) - "sudo git clone https://github.com/anonymous24x7/Saphyra-DDoS.git", + "git clone https://github.com/anonymous24x7/Saphyra-DDoS.git", "chmod +x Saphyra-DDoS/saphyra.py", ] PROJECT_URL = "https://github.com/anonymous24x7/Saphyra-DDoS" diff --git a/tools/exploit_frameworks.py b/tools/exploit_frameworks.py index cd09a25..f66e72f 100644 --- a/tools/exploit_frameworks.py +++ b/tools/exploit_frameworks.py @@ -11,7 +11,7 @@ class RouterSploit(HackingTool): DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \ "framework dedicated to embedded devices" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/threat9/routersploit.git", + "git clone https://github.com/threat9/routersploit.git", "cd routersploit && sudo python3 -m pip install -r requirements.txt" ] RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"] @@ -22,7 +22,7 @@ class WebSploit(HackingTool): TITLE = "WebSploit" DESCRIPTION = "Websploit is an advanced MITM framework." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/The404Hacking/websploit.git;cd websploit/Setup;sudo chmod +x install.sh && sudo bash install.sh" + "git clone https://github.com/The404Hacking/websploit.git;cd websploit/Setup;sudo chmod +x install.sh && sudo bash install.sh" ] RUN_COMMANDS = ["sudo websploit"] PROJECT_URL = "https://github.com/The404Hacking/websploit " diff --git a/tools/forensics.py b/tools/forensics.py index 8f6566d..c26fe9f 100644 --- a/tools/forensics.py +++ b/tools/forensics.py @@ -50,7 +50,7 @@ class BulkExtractor(HackingTool): def gui_mode(self): console.print(Panel(Text(self.TITLE, justify="center"), style="bold magenta")) console.print("[bold magenta]Cloning repository and attempting to run GUI...[/]") - os.system("sudo git clone https://github.com/simsong/bulk_extractor.git") + os.system("git clone https://github.com/simsong/bulk_extractor.git") os.system("ls src/ && cd .. && cd java_gui && ./BEViewer") console.print( "[magenta]If you get an error after clone go to /java_gui/src/ and compile the .jar file && run ./BEViewer[/]") diff --git a/tools/information_gathering.py b/tools/information_gathering.py index 4d9dfd8..3ada283 100644 --- a/tools/information_gathering.py +++ b/tools/information_gathering.py @@ -16,7 +16,7 @@ class NMAP(HackingTool): TITLE = "Network Map (nmap)" DESCRIPTION = "Free and open source utility for network discovery and security auditing" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/nmap/nmap.git", + "git clone https://github.com/nmap/nmap.git", "sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install" ] PROJECT_URL = "https://github.com/nmap/nmap" @@ -30,7 +30,7 @@ class Dracnmap(HackingTool): DESCRIPTION = "Dracnmap is an open source program which is using to \n" \ "exploit the network and gathering information with nmap help." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Screetsec/Dracnmap.git", + "git clone https://github.com/Screetsec/Dracnmap.git", "cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh" ] RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"] @@ -92,8 +92,8 @@ class ReconSpider(HackingTool): "Websites, Organizations and find out information from" \ " different sources.\n" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/bhavsec/reconspider.git", - "sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install" + "git clone https://github.com/bhavsec/reconspider.git", + "sudo apt install -y python3 python3-pip && cd reconspider && pip install --user ." ] RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"] PROJECT_URL = "https://github.com/bhavsec/reconspider" @@ -118,7 +118,7 @@ class Infoga(HackingTool): "(ip, hostname, country,...) from different public source" INSTALL_COMMANDS = [ "git clone https://github.com/m4ll0k/Infoga.git", - "cd Infoga;sudo python3 setup.py install" + "cd Infoga && pip install --user ." ] RUN_COMMANDS = ["cd Infoga;python3 infoga.py"] PROJECT_URL = "https://github.com/m4ll0k/Infoga" @@ -185,7 +185,7 @@ class PortScannerRanger(HackingTool): "all alive hosts within your range that you specify." INSTALL_COMMANDS = [ "git clone https://github.com/floriankunushevci/rang3r.git;" - "sudo pip install termcolor"] + "pip install --user termcolor"] PROJECT_URL = "https://github.com/floriankunushevci/rang3r" def run(self): diff --git a/tools/others/android_attack.py b/tools/others/android_attack.py index f79c3c3..9e3afdb 100644 --- a/tools/others/android_attack.py +++ b/tools/others/android_attack.py @@ -10,7 +10,7 @@ class Keydroid(HackingTool): DESCRIPTION = "Android Keylogger + Reverse Shell\n" \ "[!] You have to install Some Manually Refer Below Link:\n " \ "[+] https://github.com/F4dl0/keydroid" - INSTALL_COMMANDS = ["sudo git clone https://github.com/F4dl0/keydroid.git"] + INSTALL_COMMANDS = ["git clone https://github.com/F4dl0/keydroid.git"] RUN_COMMANDS = ["cd keydroid && bash keydroid.sh"] PROJECT_URL = "https://github.com/F4dl0/keydroid" @@ -21,7 +21,7 @@ class MySMS(HackingTool): "[!] You have to install Some Manually Refer Below Link:\n\t " \ "[+] https://github.com/papusingh2sms/mysms" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/papusingh2sms/mysms.git"] + "git clone https://github.com/papusingh2sms/mysms.git"] RUN_COMMANDS = ["cd mysms && bash mysms.sh"] PROJECT_URL = "https://github.com/papusingh2sms/mysms" @@ -32,7 +32,7 @@ class LockPhish(HackingTool): "lock screen, designed to\n Grab Windows credentials,Android" \ " PIN and iPhone Passcode using a https link." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/JasonJerry/lockphish.git"] + "git clone https://github.com/JasonJerry/lockphish.git"] RUN_COMMANDS = ["cd lockphish && bash lockphish.sh"] PROJECT_URL = "https://github.com/JasonJerry/lockphish" @@ -42,7 +42,7 @@ class Droidcam(HackingTool): DESCRIPTION = "Powerful Tool For Grab Front Camera Snap Using A Link" INSTALL_COMMANDS = [ # Bug 16 fix: missing comma caused two strings to be implicitly concatenated into one - "sudo git clone https://github.com/kinghacker0/WishFish.git", + "git clone https://github.com/kinghacker0/WishFish.git", "sudo apt install -y php wget openssh-client", ] RUN_COMMANDS = ["cd WishFish && sudo bash wishfish.sh"] @@ -54,7 +54,7 @@ class EvilApp(HackingTool): DESCRIPTION = "EvilApp is a script to generate Android App that can " \ "hijack authenticated sessions in cookies." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/crypticterminal/EvilApp.git"] + "git clone https://github.com/crypticterminal/EvilApp.git"] RUN_COMMANDS = ["cd EvilApp && bash evilapp.sh"] PROJECT_URL = "https://github.com/crypticterminal/EvilApp" diff --git a/tools/others/payload_injection.py b/tools/others/payload_injection.py index af3f327..922e166 100644 --- a/tools/others/payload_injection.py +++ b/tools/others/payload_injection.py @@ -9,7 +9,7 @@ class DebInject(HackingTool): TITLE = "Debinject" DESCRIPTION = "Debinject is a tool that inject malicious code into *.debs" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/UndeadSec/Debinject.git"] + "git clone https://github.com/UndeadSec/Debinject.git"] RUN_COMMANDS = ["cd Debinject;python debinject.py"] PROJECT_URL = "https://github.com/UndeadSec/Debinject" @@ -20,7 +20,7 @@ class Pixload(HackingTool): "Pixload is Set of tools for creating/injecting payload into images." INSTALL_COMMANDS = [ "sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl", - "sudo git clone https://github.com/chinarulezzz/pixload.git" + "git clone https://github.com/chinarulezzz/pixload.git" ] PROJECT_URL = "https://github.com/chinarulezzz/pixload" diff --git a/tools/others/socialmedia.py b/tools/others/socialmedia.py index f61432e..b52e11b 100644 --- a/tools/others/socialmedia.py +++ b/tools/others/socialmedia.py @@ -28,7 +28,7 @@ class BruteForce(HackingTool): DESCRIPTION = "Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix \n" \ "[!] python3 Brute_Force.py -g -l " INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git", + "git clone https://github.com/Matrix07ksa/Brute_Force.git", "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize" ] RUN_COMMANDS = ["cd Brute_Force;python3 Brute_Force.py -h"] @@ -39,7 +39,7 @@ class Faceshell(HackingTool): TITLE = "Facebook Attack" DESCRIPTION = "Facebook BruteForcer" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Matrix07ksa/Brute_Force.git", + "git clone https://github.com/Matrix07ksa/Brute_Force.git", "cd Brute_Force;sudo pip3 install proxylist;pip3 install mechanize" ] PROJECT_URL = "https://github.com/Matrix07ksa/Brute_Force" @@ -59,7 +59,7 @@ class AppCheck(HackingTool): TITLE = "Application Checker" DESCRIPTION = "Tool to check if an app is installed on the target device through a link." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/jakuta-tech/underhanded.git", + "git clone https://github.com/jakuta-tech/underhanded.git", "cd underhanded && sudo chmod +x underhanded.sh" ] RUN_COMMANDS = ["cd underhanded;sudo bash underhanded.sh"] diff --git a/tools/others/socialmedia_finder.py b/tools/others/socialmedia_finder.py index 47b3914..460ecca 100644 --- a/tools/others/socialmedia_finder.py +++ b/tools/others/socialmedia_finder.py @@ -15,7 +15,7 @@ class FacialFind(HackingTool): INSTALL_COMMANDS = [ "sudo apt install -y software-properties-common", "sudo add-apt-repository ppa:mozillateam/firefox-next && sudo apt update && sudo apt upgrade", - "sudo git clone https://github.com/Greenwolf/social_mapper.git", + "git clone https://github.com/Greenwolf/social_mapper.git", "sudo apt install -y build-essential cmake libgtk-3-dev libboost-all-dev", "cd social_mapper/setup", "sudo python3 -m pip install --no-cache-dir -r requirements.txt", @@ -42,7 +42,7 @@ class FindUser(HackingTool): TITLE = "Find SocialMedia By UserName" DESCRIPTION = "Find usernames across over 75 social networks" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/xHak9x/finduser.git", + "git clone https://github.com/xHak9x/finduser.git", "cd finduser && sudo chmod +x finduser.sh" ] RUN_COMMANDS = ["cd finduser && sudo bash finduser.sh"] @@ -75,7 +75,7 @@ class SocialScan(HackingTool): TITLE = "SocialScan | Username or Email" DESCRIPTION = "Check email address and username availability on online " \ "platforms with 100% accuracy" - INSTALL_COMMANDS = ["sudo pip install socialscan"] + INSTALL_COMMANDS = ["pip install --user socialscan"] PROJECT_URL = "https://github.com/iojw/socialscan" def run(self): diff --git a/tools/others/wifi_jamming.py b/tools/others/wifi_jamming.py index 87aed68..1a10ddc 100644 --- a/tools/others/wifi_jamming.py +++ b/tools/others/wifi_jamming.py @@ -9,8 +9,8 @@ class WifiJammerNG(HackingTool): TITLE = "WifiJammer-NG" DESCRIPTION = "Continuously jam all wifi clients and access points within range." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/MisterBianco/wifijammer-ng.git", - "cd wifijammer-ng;sudo pip install -r requirements.txt" + "git clone https://github.com/MisterBianco/wifijammer-ng.git", + "cd wifijammer-ng;pip install --user -r requirements.txt" ] RUN_COMMANDS = [ 'echo "python wifijammer.py [-a AP MAC] [-c CHANNEL] [-d] [-i INTERFACE] [-m MAXIMUM] [-k] [-p PACKETS] [-s SKIP] [-t TIME INTERVAL] [-D]"| boxes | lolcat', @@ -24,7 +24,7 @@ class KawaiiDeauther(HackingTool): DESCRIPTION = "Kawaii Deauther is a pentest toolkit whose goal is to perform \n " \ "jam on WiFi clients/routers and spam many fake AP for testing purposes." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/aryanrtm/KawaiiDeauther.git", + "git clone https://github.com/aryanrtm/KawaiiDeauther.git", "cd KawaiiDeauther;sudo bash install.sh" ] RUN_COMMANDS = ["cd KawaiiDeauther;sudo bash KawaiiDeauther.sh"] diff --git a/tools/payload_creator.py b/tools/payload_creator.py index 8baa51a..e675ded 100644 --- a/tools/payload_creator.py +++ b/tools/payload_creator.py @@ -10,7 +10,7 @@ class TheFatRat(HackingTool): "which can bypass most anti-virus." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Screetsec/TheFatRat.git", + "git clone https://github.com/Screetsec/TheFatRat.git", "cd TheFatRat && chmod +x setup.sh", ] RUN_COMMANDS = ["cd TheFatRat && sudo bash setup.sh"] @@ -36,7 +36,7 @@ class Brutal(HackingTool): "virus attacks and launch listener for a Human Interface Device." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Screetsec/Brutal.git", + "git clone https://github.com/Screetsec/Brutal.git", "cd Brutal && chmod +x Brutal.sh", ] RUN_COMMANDS = ["cd Brutal && sudo bash Brutal.sh"] @@ -60,7 +60,7 @@ class Stitch(HackingTool): "[!] Refer to the project link for Windows & macOS support." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/nathanlopez/Stitch.git", + "git clone https://github.com/nathanlopez/Stitch.git", "cd Stitch && pip install --user -r lnx_requirements.txt", ] RUN_COMMANDS = ["cd Stitch && sudo python3 main.py"] @@ -74,7 +74,7 @@ class MSFVenom(HackingTool): "types of payloads, based on user choice." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/g0tmi1k/msfpc.git", + "git clone https://github.com/g0tmi1k/msfpc.git", "cd msfpc && chmod +x msfpc.sh", ] RUN_COMMANDS = ["cd msfpc && sudo bash msfpc.sh -h -v"] @@ -85,7 +85,7 @@ class Venom(HackingTool): TITLE = "Venom Shellcode Generator" DESCRIPTION = "Venom exploits apache2 webserver to deliver LAN payloads via fake webpages." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/r00t-3xp10it/venom.git", + "git clone https://github.com/r00t-3xp10it/venom.git", # Removed "sudo ./venom.sh -u" from install — interactive, runs the tool during install "sudo chmod -R 775 venom*/ && cd venom*/ && cd aux && sudo bash setup.sh", ] @@ -97,7 +97,7 @@ class Spycam(HackingTool): TITLE = "Spycam" DESCRIPTION = "Generates a Win32 payload that captures webcam images every 1 minute." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/indexnotfound404/spycam.git", + "git clone https://github.com/indexnotfound404/spycam.git", "cd spycam && bash install.sh && chmod +x spycam", ] RUN_COMMANDS = ["cd spycam && ./spycam"] @@ -115,7 +115,7 @@ class MobDroid(HackingTool): class Enigma(HackingTool): TITLE = "Enigma" DESCRIPTION = "Enigma is a Multiplatform payload dropper." - INSTALL_COMMANDS = ["sudo git clone https://github.com/UndeadSec/Enigma.git"] + INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/Enigma.git"] RUN_COMMANDS = ["cd Enigma && sudo python3 enigma.py"] PROJECT_URL = "https://github.com/UndeadSec/Enigma" diff --git a/tools/phishing_attack.py b/tools/phishing_attack.py index 16e3d59..8a7704b 100644 --- a/tools/phishing_attack.py +++ b/tools/phishing_attack.py @@ -7,7 +7,7 @@ class Autophisher(HackingTool): TITLE = "Autophisher RK" DESCRIPTION = "Automated Phishing Toolkit" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/CodingRanjith/autophisher.git", + "git clone https://github.com/CodingRanjith/autophisher.git", ] RUN_COMMANDS = ["cd autophisher && sudo bash autophisher.sh"] PROJECT_URL = "https://github.com/CodingRanjith/autophisher" @@ -30,7 +30,7 @@ class AdvPhishing(HackingTool): TITLE = "AdvPhishing" DESCRIPTION = "This is Advance Phishing Tool ! OTP PHISHING" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Ignitetch/AdvPhishing.git", + "git clone https://github.com/Ignitetch/AdvPhishing.git", # Vuln 2 fix: chmod 777 → chmod +x "cd AdvPhishing && chmod +x Linux-Setup.sh && bash Linux-Setup.sh", ] @@ -56,7 +56,7 @@ class SocialFish(HackingTool): TITLE = "SocialFish" DESCRIPTION = "Automated Phishing Tool & Information Collector NOTE: username is 'root' and password is 'pass'" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y", + "git clone https://github.com/UndeadSec/SocialFish.git && sudo apt-get install python3 python3-pip python3-dev -y", "cd SocialFish && sudo python3 -m pip install -r requirements.txt", ] RUN_COMMANDS = ["cd SocialFish && sudo python3 SocialFish.py root pass"] @@ -71,7 +71,7 @@ class HiddenEye(HackingTool): ) INSTALL_COMMANDS = [ # Vuln 2 fix: chmod 777 → chmod 755 - "sudo git clone https://github.com/Morsmalleo/HiddenEye.git && chmod -R 755 HiddenEye", + "git clone https://github.com/Morsmalleo/HiddenEye.git && chmod -R 755 HiddenEye", "cd HiddenEye && sudo pip3 install -r requirements.txt && pip3 install pyngrok", ] RUN_COMMANDS = ["cd HiddenEye && sudo python3 HiddenEye.py"] @@ -102,7 +102,7 @@ class ISeeYou(HackingTool): "[!] Expose local servers to the internet and decode location from log file." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Viralmaniar/I-See-You.git", + "git clone https://github.com/Viralmaniar/I-See-You.git", "cd I-See-You && sudo chmod u+x ISeeYou.sh", ] RUN_COMMANDS = ["cd I-See-You && sudo bash ISeeYou.sh"] @@ -112,7 +112,7 @@ class ISeeYou(HackingTool): class SayCheese(HackingTool): TITLE = "SayCheese" DESCRIPTION = "Take webcam shots from target just by sending a malicious link" - INSTALL_COMMANDS = ["sudo git clone https://github.com/hangetzzu/saycheese"] + INSTALL_COMMANDS = ["git clone https://github.com/hangetzzu/saycheese"] RUN_COMMANDS = ["cd saycheese && sudo bash saycheese.sh"] PROJECT_URL = "https://github.com/hangetzzu/saycheese" @@ -121,7 +121,7 @@ class QRJacking(HackingTool): TITLE = "QR Code Jacking" DESCRIPTION = "QR Code Jacking (Any Website)" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt -y install scrot", + "git clone https://github.com/cryptedwolf/ohmyqr.git && sudo apt -y install scrot", ] RUN_COMMANDS = ["cd ohmyqr && sudo bash ohmyqr.sh"] PROJECT_URL = "https://github.com/cryptedwolf/ohmyqr" @@ -134,7 +134,7 @@ class BlackEye(HackingTool): TITLE = "BlackEye" DESCRIPTION = "The ultimate phishing tool with 38 websites available!" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/thelinuxchoice/blackeye", + "git clone https://github.com/thelinuxchoice/blackeye", ] RUN_COMMANDS = ["cd blackeye && sudo bash blackeye.sh"] PROJECT_URL = "https://github.com/An0nUD4Y/blackeye" @@ -152,7 +152,7 @@ class Thanos(HackingTool): TITLE = "Thanos" DESCRIPTION = "Browser to Browser Phishing toolkit" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/TridevReddy/Thanos.git", + "git clone https://github.com/TridevReddy/Thanos.git", # Vuln 2 fix: chmod -R 777 → chmod +x "cd Thanos && chmod +x Thanos.sh", ] @@ -179,7 +179,7 @@ class Maskphish(HackingTool): TITLE = "Maskphish" DESCRIPTION = "Hide phishing URL under a normal looking URL (google.com or facebook.com)" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/jaykali/maskphish.git", + "git clone https://github.com/jaykali/maskphish.git", ] RUN_COMMANDS = ["cd maskphish && sudo bash maskphish.sh"] PROJECT_URL = "https://github.com/jaykali/maskphish" @@ -188,7 +188,7 @@ class Maskphish(HackingTool): class BlackPhish(HackingTool): TITLE = "BlackPhish" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/iinc0gnit0/BlackPhish.git", + "git clone https://github.com/iinc0gnit0/BlackPhish.git", "cd BlackPhish && sudo bash install.sh", ] RUN_COMMANDS = ["cd BlackPhish && sudo python3 blackphish.py"] diff --git a/tools/post_exploitation.py b/tools/post_exploitation.py index 5ecee32..2252705 100644 --- a/tools/post_exploitation.py +++ b/tools/post_exploitation.py @@ -13,7 +13,7 @@ class Vegile(HackingTool): "hidden your specific process,unlimited your session in " \ "metasploit and transparent." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Screetsec/Vegile.git", + "git clone https://github.com/Screetsec/Vegile.git", "cd Vegile && sudo chmod +x Vegile" ] RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"] @@ -30,7 +30,7 @@ class ChromeKeyLogger(HackingTool): TITLE = "Chrome Keylogger" DESCRIPTION = "Hera Chrome Keylogger" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/UndeadSec/HeraKeylogger.git", + "git clone https://github.com/UndeadSec/HeraKeylogger.git", "cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt" ] RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"] diff --git a/tools/remote_administration.py b/tools/remote_administration.py index 0e33f4b..bceacf6 100644 --- a/tools/remote_administration.py +++ b/tools/remote_administration.py @@ -13,8 +13,8 @@ class Pyshell(HackingTool): DESCRIPTION = "Pyshell is a Rat Tool that can be able to download & upload " \ "files,\n Execute OS Command and more.." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/knassar702/Pyshell.git;" - "sudo pip install pyscreenshot python-nmap requests" + "git clone https://github.com/knassar702/Pyshell.git;" + "pip install --user pyscreenshot python-nmap requests" ] RUN_COMMANDS = ["cd Pyshell;./Pyshell"] PROJECT_URL = "https://github.com/knassar702/pyshell" diff --git a/tools/reverse_engineering.py b/tools/reverse_engineering.py index f3d45c7..aea7145 100644 --- a/tools/reverse_engineering.py +++ b/tools/reverse_engineering.py @@ -21,7 +21,7 @@ class Apk2Gold(HackingTool): TITLE = "Apk2Gold" DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/lxdvs/apk2gold.git", + "git clone https://github.com/lxdvs/apk2gold.git", "cd apk2gold;sudo bash make.sh" ] PROJECT_URL = "https://github.com/lxdvs/apk2gold " @@ -39,7 +39,7 @@ class Jadx(HackingTool): "[*] decode AndroidManifest.xml and other resources from " \ "resources.arsc" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/skylot/jadx.git", + "git clone https://github.com/skylot/jadx.git", # Bug 30 fix: gradlew dist requires Java — check first "java -version 2>&1 | grep -q 'version' && cd jadx && ./gradlew dist || echo '[ERROR] Java not found. Install: sudo apt install default-jdk'", ] diff --git a/tools/sql_injection.py b/tools/sql_injection.py index b6b2fc8..c7a3b9a 100644 --- a/tools/sql_injection.py +++ b/tools/sql_injection.py @@ -9,7 +9,7 @@ class Sqlmap(HackingTool): DESCRIPTION = "sqlmap is an open source penetration testing tool that " \ "automates the process of detecting and exploiting SQL injection flaws " \ "and taking over database servers. [!] python3 sqlmap.py -u [http://example.com] --batch --banner. More usage: https://github.com/sqlmapproject/sqlmap/wiki/Usage" - INSTALL_COMMANDS = ["sudo git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"] + INSTALL_COMMANDS = ["git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"] RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"] PROJECT_URL = "https://github.com/sqlmapproject/sqlmap" @@ -40,8 +40,10 @@ class SQLiScanner(HackingTool): class Explo(HackingTool): TITLE = "Explo" DESCRIPTION = "Explo is a simple tool to describe web security issues in human and machine readable format. Usage: explo [--verbose|-v] testcase.yaml | explo [--verbose|-v] examples/*.yaml" - INSTALL_COMMANDS = ["git clone https://github.com/dtag-dev-sec/explo.git", - "cd explo;sudo python setup.py install"] + INSTALL_COMMANDS = [ + "git clone https://github.com/dtag-dev-sec/explo.git", + "cd explo && pip install --user .", + ] PROJECT_URL = "https://github.com/dtag-dev-sec/explo" def __init__(self): @@ -62,7 +64,7 @@ class Leviathan(HackingTool): TITLE = "Leviathan - Wide Range Mass Audit Toolkit" DESCRIPTION = "Leviathan is a mass audit toolkit with service discovery, brute force, SQL injection detection, and custom exploit capabilities. Requires API keys." INSTALL_COMMANDS = ["git clone https://github.com/leviathan-framework/leviathan.git", - "cd leviathan;sudo pip install -r requirements.txt"] + "cd leviathan;pip install --user -r requirements.txt"] RUN_COMMANDS = ["cd leviathan;python leviathan.py"] PROJECT_URL = "https://github.com/leviathan-framework/leviathan" diff --git a/tools/steganography.py b/tools/steganography.py index 6dd6186..bccc075 100644 --- a/tools/steganography.py +++ b/tools/steganography.py @@ -51,7 +51,7 @@ class StegoCracker(HackingTool): TITLE = "StegoCracker" DESCRIPTION = "StegoCracker lets you hide and retrieve data in image or audio files" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/W1LDN16H7/StegoCracker.git", + "git clone https://github.com/W1LDN16H7/StegoCracker.git", "sudo chmod -R 755 StegoCracker" ] RUN_COMMANDS = [ @@ -65,7 +65,7 @@ class Whitespace(HackingTool): TITLE = "Whitespace" DESCRIPTION = "Use whitespace and unicode characters for steganography" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/beardog108/snow10.git", + "git clone https://github.com/beardog108/snow10.git", "sudo chmod -R 755 snow10" ] RUN_COMMANDS = ["cd snow10 && ./install.sh"] diff --git a/tools/web_attack.py b/tools/web_attack.py index 6ab75fe..bb17d62 100644 --- a/tools/web_attack.py +++ b/tools/web_attack.py @@ -9,7 +9,7 @@ class Web2Attack(HackingTool): TITLE = "Web2Attack" DESCRIPTION = "Web hacking framework with tools, exploits by python" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/santatic/web2attack.git" + "git clone https://github.com/santatic/web2attack.git" ] RUN_COMMANDS = ["cd web2attack && sudo python3 w2aconsole"] PROJECT_URL = "https://github.com/santatic/web2attack" @@ -41,7 +41,7 @@ class SubDomainFinder(HackingTool): ) INSTALL_COMMANDS = [ "sudo pip3 install requests argparse dnspython", - "sudo git clone https://github.com/aboul3la/Sublist3r.git", + "git clone https://github.com/aboul3la/Sublist3r.git", "cd Sublist3r && sudo pip3 install -r requirements.txt" ] RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"] @@ -54,7 +54,7 @@ class CheckURL(HackingTool): "Detect evil urls that uses IDN Homograph Attack.\n\t" "[!] python3 checkURL.py --url google.com" ) - INSTALL_COMMANDS = ["sudo git clone https://github.com/UndeadSec/checkURL.git"] + INSTALL_COMMANDS = ["git clone https://github.com/UndeadSec/checkURL.git"] RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"] PROJECT_URL = "https://github.com/UndeadSec/checkURL" @@ -62,12 +62,14 @@ class CheckURL(HackingTool): class Blazy(HackingTool): TITLE = "Blazy(Also Find ClickJacking)" DESCRIPTION = "Blazy is a modern login page bruteforcer" - INSTALL_COMMANDS = [ - "sudo git clone https://github.com/UltimateHackers/Blazy.git", - "cd Blazy && sudo pip2.7 install -r requirements.txt" - ] - RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"] + INSTALL_COMMANDS = [] + RUN_COMMANDS = [] PROJECT_URL = "https://github.com/UltimateHackers/Blazy" + ARCHIVED = True + ARCHIVED_REASON = "Python 2 only (pip2.7/python2.7). Repo archived/unmaintained." + + def __init__(self): + super().__init__(installable=False, runnable=False) class SubDomainTakeOver(HackingTool): @@ -80,7 +82,7 @@ class SubDomainTakeOver(HackingTool): ) INSTALL_COMMANDS = [ "git clone https://github.com/edoardottt/takeover.git", - "cd takeover;sudo python3 setup.py install" + "cd takeover && pip install --user ." ] PROJECT_URL = "https://github.com/edoardottt/takeover" @@ -97,7 +99,7 @@ class Dirb(HackingTool): "attack against \n a web server and analyzing the response." ) INSTALL_COMMANDS = [ - "sudo git clone https://gitlab.com/kalilinux/packages/dirb.git", + "git clone https://gitlab.com/kalilinux/packages/dirb.git", "cd dirb;sudo bash configure;make" ] PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb" diff --git a/tools/wireless_attack.py b/tools/wireless_attack.py index 5914e09..172ce75 100644 --- a/tools/wireless_attack.py +++ b/tools/wireless_attack.py @@ -11,7 +11,7 @@ class WIFIPumpkin(HackingTool): ) INSTALL_COMMANDS = [ "sudo apt install -y libssl-dev libffi-dev build-essential python3-pyqt5", - "sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git", + "git clone https://github.com/P0cL4bs/wifipumpkin3.git", "chmod -R 755 wifipumpkin3", "cd wifipumpkin3 && pip install --user .", ] @@ -30,7 +30,7 @@ class pixiewps(HackingTool): ) INSTALL_COMMANDS = [ # Bug 29 fix: removed wget https://pastebin.com/... (insecure download from pastebin) - "sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential", + "git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential", "cd pixiewps && make", "cd pixiewps && sudo make install", ] @@ -99,7 +99,7 @@ class Wifite(HackingTool): TITLE = "Wifite" DESCRIPTION = "Wifite is an automated wireless attack tool." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/derv82/wifite2.git", + "git clone https://github.com/derv82/wifite2.git", "cd wifite2 && pip install --user .", ] RUN_COMMANDS = ["sudo wifite"] @@ -114,7 +114,7 @@ class EvilTwin(HackingTool): "Fakeap — perform Evil Twin Attack by getting credentials " "using a Fake page and Fake Access Point." ) - INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"] + INSTALL_COMMANDS = ["git clone https://github.com/Z4nzu/fakeap.git"] RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"] PROJECT_URL = "https://github.com/Z4nzu/fakeap" SUPPORTED_OS = ["linux"] @@ -128,7 +128,7 @@ class Fastssh(HackingTool): "using the most commonly used credentials." ) INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && chmod +x fastssh.sh", + "git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && chmod +x fastssh.sh", "sudo apt-get install -y sshpass netcat", ] RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"] diff --git a/tools/wordlist_generator.py b/tools/wordlist_generator.py index 30a9f12..325f296 100644 --- a/tools/wordlist_generator.py +++ b/tools/wordlist_generator.py @@ -32,7 +32,7 @@ class WlCreator(HackingTool): DESCRIPTION = "WlCreator is a C program that can create all possibilities" \ " of passwords,\n and you can choose Length, Lowercase, " \ "Capital, Numbers and Special Chars" - INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/wlcreator.git"] + INSTALL_COMMANDS = ["git clone https://github.com/Z4nzu/wlcreator.git"] RUN_COMMANDS = [ "cd wlcreator && sudo gcc -o wlcreator wlcreator.c && ./wlcreator 5"] PROJECT_URL = "https://github.com/Z4nzu/wlcreator" @@ -52,7 +52,7 @@ class GoblinWordGenerator(HackingTool): TITLE = "Goblin WordGenerator" DESCRIPTION = "Goblin WordGenerator" INSTALL_COMMANDS = [ - "sudo git clone https://github.com/UndeadSec/GoblinWordGenerator.git"] + "git clone https://github.com/UndeadSec/GoblinWordGenerator.git"] RUN_COMMANDS = ["cd GoblinWordGenerator && python3 goblin.py"] PROJECT_URL = "https://github.com/UndeadSec/GoblinWordGenerator.git" @@ -75,7 +75,7 @@ class showme(HackingTool): "part of BreachCompilation leak. This database makes " \ "finding passwords faster and easier than ever before." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git", + "git clone https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git", "cd SMWYG-Show-Me-What-You-Got && pip3 install -r requirements.txt" ] RUN_COMMANDS = ["cd SMWYG-Show-Me-What-You-Got && python SMWYG.py"] diff --git a/tools/xss_attack.py b/tools/xss_attack.py index 397622a..124b71a 100644 --- a/tools/xss_attack.py +++ b/tools/xss_attack.py @@ -10,13 +10,11 @@ class Dalfox(HackingTool): TITLE = "DalFox (Finder of XSS)" DESCRIPTION = "XSS Scanning and Parameter Analysis tool." INSTALL_COMMANDS = [ - "sudo apt-get install golang", - "sudo git clone https://github.com/hahwul/dalfox", - "cd dalfox;go install" + "sudo apt-get install -y golang", + "go install github.com/hahwul/dalfox/v2@latest", ] RUN_COMMANDS = [ - "~/go/bin/dalfox", - 'echo "You Need To Run manually by using [!]~/go/bin/dalfox [options]"' + "~/go/bin/dalfox --help", ] PROJECT_URL = "https://github.com/hahwul/dalfox" @@ -128,7 +126,7 @@ class RVuln(HackingTool): TITLE = "RVuln" DESCRIPTION = "Multi-threaded and Automated Web Vulnerability Scanner written in Rust." INSTALL_COMMANDS = [ - "sudo git clone https://github.com/iinc0gnit0/RVuln.git;" + "git clone https://github.com/iinc0gnit0/RVuln.git;" "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh;" "source $HOME/.cargo/env;" "sudo apt install librust-openssl-dev;"