mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-22 16:39:40 +00:00
post_exploitation.py: - Rename INSTALL_OS -> SUPPORTED_OS in Havoc class (typo, field was ignored) - Sliver: replace curl|sudo bash pipe with download-then-execute pattern ddos.py: - Add DDoSTool() to DDOSTools.TOOLS list (was defined but unreachable) phishing_attack.py: - Rename class Evilginx2 -> Evilginx3 (installs v3 via go install) - Update instance in TOOLS list to match - Fix stale comment: wireless_attack_tools.py -> wireless_attack.py forensics.py: - Remove installable=False from Guymager (conflicted with INSTALL_COMMANDS) tool_manager.py: - Skip sudo prefix when already root (os.geteuid() == 0), matching the pattern already used in install.py install.py: - Add chown -R root:root after cp -a to prevent git "dubious ownership" errors when the source clone has different ownership update.sh: - Add git config safe.directory before pull to prevent dubious ownership - Add --upgrade flag to pip install so dependencies actually update os_detect.py: - Add pkg (FreeBSD) entries to PACKAGE_INSTALL_CMDS, PACKAGE_UPDATE_CMDS, and REQUIRED_PACKAGES — was detected but had no command mappings (KeyError) Skipped (not applicable): - #1 subprocess import: already fixed in prior commit - #11 Path.home() under sudo: by design (installer runs as root)
156 lines
5.2 KiB
Python
156 lines
5.2 KiB
Python
import os
|
|
|
|
from core import HackingTool, HackingToolsCollection, console
|
|
|
|
from rich.panel import Panel
|
|
from rich.prompt import Prompt
|
|
|
|
|
|
class Vegile(HackingTool):
|
|
TITLE = "Vegile - Ghost In The Shell"
|
|
SUPPORTED_OS = ["linux"]
|
|
DESCRIPTION = "This tool will set up your backdoor/rootkits when " \
|
|
"backdoor is already setup it will be \n" \
|
|
"hidden your specific process,unlimited your session in " \
|
|
"metasploit and transparent."
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/Screetsec/Vegile.git",
|
|
"cd Vegile && sudo chmod +x Vegile"
|
|
]
|
|
RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
|
|
PROJECT_URL = "https://github.com/Screetsec/Vegile"
|
|
|
|
def before_run(self):
|
|
console.print(
|
|
"[bold magenta]Vegile commands:[/]\n"
|
|
" Vegile -i / --inject [backdoor/rootkit]\n"
|
|
" Vegile -u / --unlimited [backdoor/rootkit]\n"
|
|
" Vegile -h / --help"
|
|
)
|
|
|
|
|
|
class ChromeKeyLogger(HackingTool):
|
|
TITLE = "Chrome Keylogger"
|
|
SUPPORTED_OS = ["linux"]
|
|
DESCRIPTION = "Hera Chrome Keylogger"
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/UndeadSec/HeraKeylogger.git",
|
|
"cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
|
|
]
|
|
RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
|
|
PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger"
|
|
|
|
|
|
class PwncatCS(HackingTool):
|
|
TITLE = "pwncat-cs (Reverse Shell Handler)"
|
|
DESCRIPTION = (
|
|
"Post-exploitation platform — manages reverse/bind shells with automation.\n"
|
|
"Handles file upload/download, persistence, privilege escalation.\n"
|
|
"Usage: pwncat-cs -lp 4444"
|
|
)
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
INSTALL_COMMANDS = ["pip install --user pwncat-cs"]
|
|
RUN_COMMANDS = ["pwncat-cs --help"]
|
|
PROJECT_URL = "https://github.com/calebstewart/pwncat"
|
|
|
|
|
|
class Sliver(HackingTool):
|
|
TITLE = "Sliver (C2 Framework)"
|
|
DESCRIPTION = "Cross-platform adversary emulation/red team C2 framework — mTLS, HTTP(S), DNS, WireGuard."
|
|
INSTALL_COMMANDS = [
|
|
"curl -sSf https://sliver.sh/install -o /tmp/sliver-install.sh",
|
|
"sudo bash /tmp/sliver-install.sh",
|
|
]
|
|
RUN_COMMANDS = ["sliver --help"]
|
|
PROJECT_URL = "https://github.com/BishopFox/sliver"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class Havoc(HackingTool):
|
|
TITLE = "Havoc (C2 Framework)"
|
|
DESCRIPTION = "Modern post-exploitation C2 framework with EDR evasion. Cobalt Strike alternative."
|
|
SUPPORTED_OS = ["linux"]
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/HavocFramework/Havoc.git",
|
|
"cd Havoc && make",
|
|
]
|
|
RUN_COMMANDS = ["cd Havoc && ./havoc --help"]
|
|
PROJECT_URL = "https://github.com/HavocFramework/Havoc"
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
class PEASSng(HackingTool):
|
|
TITLE = "PEASS-ng — LinPEAS/WinPEAS (Priv Esc)"
|
|
DESCRIPTION = "Privilege escalation enumeration scripts for Linux and Windows."
|
|
INSTALL_COMMANDS = [
|
|
"curl -sSL https://github.com/peass-ng/PEASS-ng/releases/latest/download/linpeas.sh -o linpeas.sh",
|
|
"chmod +x linpeas.sh",
|
|
]
|
|
RUN_COMMANDS = ["./linpeas.sh --help"]
|
|
PROJECT_URL = "https://github.com/peass-ng/PEASS-ng"
|
|
|
|
|
|
class LigoloNg(HackingTool):
|
|
TITLE = "Ligolo-ng (Tunneling/Pivoting)"
|
|
DESCRIPTION = "Advanced tunneling/pivoting tool using TUN interfaces — no SOCKS needed."
|
|
REQUIRES_GO = True
|
|
INSTALL_COMMANDS = [
|
|
"go install github.com/nicocha30/ligolo-ng@latest",
|
|
]
|
|
RUN_COMMANDS = ["ligolo-ng --help"]
|
|
PROJECT_URL = "https://github.com/nicocha30/ligolo-ng"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class ChiselTunnel(HackingTool):
|
|
TITLE = "Chisel (HTTP Tunnel)"
|
|
DESCRIPTION = "Fast TCP/UDP tunnel over HTTP, secured via SSH — pivoting and port forwarding."
|
|
REQUIRES_GO = True
|
|
INSTALL_COMMANDS = [
|
|
"go install github.com/jpillora/chisel@latest",
|
|
]
|
|
RUN_COMMANDS = ["chisel --help"]
|
|
PROJECT_URL = "https://github.com/jpillora/chisel"
|
|
|
|
|
|
class EvilWinRM(HackingTool):
|
|
TITLE = "Evil-WinRM (Windows Remote Shell)"
|
|
DESCRIPTION = "Ultimate WinRM shell for hacking/pentesting Windows machines."
|
|
REQUIRES_RUBY = True
|
|
INSTALL_COMMANDS = ["gem install evil-winrm"]
|
|
RUN_COMMANDS = ["evil-winrm --help"]
|
|
PROJECT_URL = "https://github.com/Hackplayers/evil-winrm"
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
class Mythic(HackingTool):
|
|
TITLE = "Mythic (C2 Platform)"
|
|
DESCRIPTION = "Collaborative, multi-payload C2 platform designed for red team operations."
|
|
REQUIRES_DOCKER = True
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/its-a-feature/Mythic.git",
|
|
"cd Mythic && sudo make",
|
|
]
|
|
RUN_COMMANDS = ["cd Mythic && sudo ./mythic-cli start"]
|
|
PROJECT_URL = "https://github.com/its-a-feature/Mythic"
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
class PostExploitationTools(HackingToolsCollection):
|
|
TITLE = "Post exploitation tools"
|
|
TOOLS = [
|
|
Vegile(),
|
|
ChromeKeyLogger(),
|
|
PwncatCS(),
|
|
Sliver(),
|
|
Havoc(),
|
|
PEASSng(),
|
|
LigoloNg(),
|
|
ChiselTunnel(),
|
|
EvilWinRM(),
|
|
Mythic(),
|
|
]
|
|
|
|
if __name__ == "__main__":
|
|
tools = PostExploitationTools()
|
|
tools.show_options()
|