mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-23 08:58:22 +00:00
Mark bash-script and apt-dependent tools as linux-only so they are hidden automatically on macOS via _active_tools() filter in core.py: - phishing_attack.py: 14 tools (all bash-script based) - ddos.py: all 6 tools (Linux network stack required) - post_exploitation.py: Vegile, ChromeKeyLogger - payload_creator.py: all 7 tools (bash setup scripts) - exploit_frameworks.py: WebSploit (bash install) - reverse_engineering.py: Apk2Gold (bash build) - xss_attack.py: RVuln (Rust + apt deps)
65 lines
2.4 KiB
Python
65 lines
2.4 KiB
Python
from core import HackingTool, HackingToolsCollection, console
|
|
from tools.web_attack import Web2Attack
|
|
|
|
from rich.panel import Panel
|
|
from rich.text import Text
|
|
from rich.prompt import Prompt
|
|
|
|
|
|
class RouterSploit(HackingTool):
|
|
TITLE = "RouterSploit"
|
|
DESCRIPTION = "The RouterSploit Framework is an open-source exploitation " \
|
|
"framework dedicated to embedded devices"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/threat9/routersploit.git",
|
|
"cd routersploit && sudo python3 -m pip install -r requirements.txt"
|
|
]
|
|
RUN_COMMANDS = ["cd routersploit && sudo python3 rsf.py"]
|
|
PROJECT_URL = "https://github.com/threat9/routersploit"
|
|
|
|
|
|
class WebSploit(HackingTool):
|
|
TITLE = "WebSploit"
|
|
SUPPORTED_OS = ["linux"]
|
|
DESCRIPTION = "Websploit is an advanced MITM framework."
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/The404Hacking/websploit.git;cd websploit/Setup;sudo chmod +x install.sh && sudo bash install.sh"
|
|
]
|
|
RUN_COMMANDS = ["sudo websploit"]
|
|
PROJECT_URL = "https://github.com/The404Hacking/websploit "
|
|
|
|
|
|
class Commix(HackingTool):
|
|
TITLE = "Commix"
|
|
DESCRIPTION = "Automated All-in-One OS command injection and exploitation " \
|
|
"tool.\nCommix can be used from web developers, penetration " \
|
|
"testers or even security researchers\n in order to test " \
|
|
"web-based applications with the view to find bugs,\n " \
|
|
"errors or vulnerabilities related to command injection " \
|
|
"attacks.\n Usage: python commix.py [option(s)]"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/commixproject/commix.git commix",
|
|
# Bug 26 fix: was "sudo python setup.py install" (Python 2)
|
|
"cd commix && pip install --user .",
|
|
]
|
|
# Bug 26 fix: was "sudo python commix.py --wizard" (Python 2)
|
|
RUN_COMMANDS = ["cd commix && sudo python3 commix.py --wizard"]
|
|
PROJECT_URL = "https://github.com/commixproject/commix"
|
|
|
|
def __init__(self):
|
|
# Py3-4 fix: super(Commix, self) → super()
|
|
super().__init__(runnable=False)
|
|
|
|
|
|
class ExploitFrameworkTools(HackingToolsCollection):
|
|
TITLE = "Exploit framework"
|
|
TOOLS = [
|
|
RouterSploit(),
|
|
WebSploit(),
|
|
Commix(),
|
|
Web2Attack()
|
|
]
|
|
|
|
if __name__ == "__main__":
|
|
tools = ExploitFrameworkTools()
|
|
tools.show_options()
|