Path: blob/master/tools/information_gathering_tools.py
1268 views
# coding=utf-81import os2import socket3import subprocess4import webbrowser56from core import HackingTool7from core import HackingToolsCollection8from core import clear_screen91011class NMAP(HackingTool):12TITLE = "Network Map (nmap)"13DESCRIPTION = "Free and open source utility for network discovery and security auditing"14INSTALL_COMMANDS = [15"sudo git clone https://github.com/nmap/nmap.git",16"sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"17]18PROJECT_URL = "https://github.com/nmap/nmap"1920def __init__(self):21super(NMAP, self).__init__(runnable = False)222324class Dracnmap(HackingTool):25TITLE = "Dracnmap"26DESCRIPTION = "Dracnmap is an open source program which is using to \n" \27"exploit the network and gathering information with nmap help."28INSTALL_COMMANDS = [29"sudo git clone https://github.com/Screetsec/Dracnmap.git",30"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"31]32RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]33PROJECT_URL = "https://github.com/Screetsec/Dracnmap"3435# def __init__(self):36# super(Dracnmap, self).__init__(runnable = False)373839class PortScan(HackingTool):40TITLE = "Port scanning"4142def __init__(self):43super(PortScan, self).__init__(installable = False)4445def run(self):46clear_screen()47target = input('Select a Target IP: ')48subprocess.run(["sudo", "nmap", "-O", "-Pn", target])495051class Host2IP(HackingTool):52TITLE = "Host to IP "5354def __init__(self):55super(Host2IP, self).__init__(installable = False)5657def run(self):58clear_screen()59host = input("Enter host name (e.g. www.google.com):- ")60ips = socket.gethostbyname(host)61print(ips)626364class XeroSploit(HackingTool):65TITLE = "Xerosploit"66DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \67"man-in-the-middle attacks for testing purposes"68INSTALL_COMMANDS = [69"git clone https://github.com/LionSec/xerosploit.git",70"cd xerosploit && sudo python install.py"71]72RUN_COMMANDS = ["sudo xerosploit"]73PROJECT_URL = "https://github.com/LionSec/xerosploit"747576class RedHawk(HackingTool):77TITLE = "RED HAWK (All In One Scanning)"78DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."79INSTALL_COMMANDS = [80"git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]81RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]82PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"838485class ReconSpider(HackingTool):86TITLE = "ReconSpider(For All Scanning)"87DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \88" Framework for scanning IP Address, Emails, \n" \89"Websites, Organizations and find out information from" \90" different sources.\n"91INSTALL_COMMANDS = [92"sudo git clone https://github.com/bhavsec/reconspider.git",93"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"94]95RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]96PROJECT_URL = "https://github.com/bhavsec/reconspider"9798# def __init__(self):99# super(ReconSpider, self).__init__(runnable = False)100101102class IsItDown(HackingTool):103TITLE = "IsItDown (Check Website Down/Up)"104DESCRIPTION = "Check Website Is Online or Not"105106def __init__(self):107super(IsItDown, self).__init__(108[('Open', self.open)], installable = False, runnable = False)109110def open(self):111webbrowser.open_new_tab("https://www.isitdownrightnow.com/")112113114class Infoga(HackingTool):115TITLE = "Infoga - Email OSINT"116DESCRIPTION = "Infoga is a tool gathering email accounts information\n" \117"(ip, hostname, country,...) from different public source"118INSTALL_COMMANDS = [119"git clone https://github.com/m4ll0k/Infoga.git",120"cd Infoga;sudo python3 setup.py install"121]122RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]123PROJECT_URL = "https://github.com/m4ll0k/Infoga"124125126class ReconDog(HackingTool):127TITLE = "ReconDog"128DESCRIPTION = "ReconDog Information Gathering Suite"129INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]130RUN_COMMANDS = ["cd ReconDog;sudo python dog"]131PROJECT_URL = "https://github.com/s0md3v/ReconDog"132133134class Striker(HackingTool):135TITLE = "Striker"136DESCRIPTION = "Recon & Vulnerability Scanning Suite"137INSTALL_COMMANDS = [138"git clone https://github.com/s0md3v/Striker.git",139"cd Striker && pip3 install -r requirements.txt"140]141PROJECT_URL = "https://github.com/s0md3v/Striker"142143def run(self):144site = input("Enter Site Name (example.com) >> ")145os.chdir("Striker")146subprocess.run(["sudo", "python3", "striker.py", site])147148149class SecretFinder(HackingTool):150TITLE = "SecretFinder (like API & etc)"151DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \152"like apikeys, accesstoken, authorizations, jwt,..etc \n " \153"and search anything on javascript files.\n\n " \154"Usage: python SecretFinder.py -h"155INSTALL_COMMANDS = [156"git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",157"cd secretfinder; sudo pip3 install -r requirements.txt"158]159PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"160161def __init__(self):162super(SecretFinder, self).__init__(runnable = False)163164165class Shodan(HackingTool):166TITLE = "Find Info Using Shodan"167DESCRIPTION = "Get ports, vulnerabilities, information, banners,..etc \n " \168"for any IP with Shodan (no apikey! no rate limit!)\n" \169"[X] Don't use this tool because your ip will be blocked by Shodan!"170INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]171PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"172173def __init__(self):174super(Shodan, self).__init__(runnable = False)175176177class PortScannerRanger(HackingTool):178TITLE = "Port Scanner - rang3r"179DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \180"all alive hosts within your range that you specify."181INSTALL_COMMANDS = [182"git clone https://github.com/floriankunushevci/rang3r.git;"183"sudo pip install termcolor"]184PROJECT_URL = "https://github.com/floriankunushevci/rang3r"185186def run(self):187ip = input("Enter Ip >> ")188os.chdir("rang3r")189subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])190191192class Breacher(HackingTool):193TITLE = "Breacher"194DESCRIPTION = "An advanced multithreaded admin panel finder written in python."195INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]196PROJECT_URL = "https://github.com/s0md3v/Breacher"197198def run(self):199domain = input("Enter domain (example.com) >> ")200os.chdir("Breacher")201subprocess.run(["python3", "breacher.py", "-u", domain])202203class InformationGatheringTools(HackingToolsCollection):204TITLE = "Information gathering tools"205TOOLS = [206NMAP(),207Dracnmap(),208PortScan(),209Host2IP(),210XeroSploit(),211RedHawk(),212ReconSpider(),213IsItDown(),214Infoga(),215ReconDog(),216Striker(),217SecretFinder(),218Shodan(),219PortScannerRanger(),220Breacher()221]222223224