Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/information_gathering_tools.py
1268 views
1
# coding=utf-8
2
import os
3
import socket
4
import subprocess
5
import webbrowser
6
7
from core import HackingTool
8
from core import HackingToolsCollection
9
from core import clear_screen
10
11
12
class NMAP(HackingTool):
13
TITLE = "Network Map (nmap)"
14
DESCRIPTION = "Free and open source utility for network discovery and security auditing"
15
INSTALL_COMMANDS = [
16
"sudo git clone https://github.com/nmap/nmap.git",
17
"sudo chmod -R 755 nmap && cd nmap && sudo ./configure && make && sudo make install"
18
]
19
PROJECT_URL = "https://github.com/nmap/nmap"
20
21
def __init__(self):
22
super(NMAP, self).__init__(runnable = False)
23
24
25
class Dracnmap(HackingTool):
26
TITLE = "Dracnmap"
27
DESCRIPTION = "Dracnmap is an open source program which is using to \n" \
28
"exploit the network and gathering information with nmap help."
29
INSTALL_COMMANDS = [
30
"sudo git clone https://github.com/Screetsec/Dracnmap.git",
31
"cd Dracnmap && chmod +x dracnmap-v2.2-dracOs.sh dracnmap-v2.2.sh"
32
]
33
RUN_COMMANDS = ["cd Dracnmap;sudo ./dracnmap-v2.2.sh"]
34
PROJECT_URL = "https://github.com/Screetsec/Dracnmap"
35
36
# def __init__(self):
37
# super(Dracnmap, self).__init__(runnable = False)
38
39
40
class PortScan(HackingTool):
41
TITLE = "Port scanning"
42
43
def __init__(self):
44
super(PortScan, self).__init__(installable = False)
45
46
def run(self):
47
clear_screen()
48
target = input('Select a Target IP: ')
49
subprocess.run(["sudo", "nmap", "-O", "-Pn", target])
50
51
52
class Host2IP(HackingTool):
53
TITLE = "Host to IP "
54
55
def __init__(self):
56
super(Host2IP, self).__init__(installable = False)
57
58
def run(self):
59
clear_screen()
60
host = input("Enter host name (e.g. www.google.com):- ")
61
ips = socket.gethostbyname(host)
62
print(ips)
63
64
65
class XeroSploit(HackingTool):
66
TITLE = "Xerosploit"
67
DESCRIPTION = "Xerosploit is a penetration testing toolkit whose goal is to perform\n" \
68
"man-in-the-middle attacks for testing purposes"
69
INSTALL_COMMANDS = [
70
"git clone https://github.com/LionSec/xerosploit.git",
71
"cd xerosploit && sudo python install.py"
72
]
73
RUN_COMMANDS = ["sudo xerosploit"]
74
PROJECT_URL = "https://github.com/LionSec/xerosploit"
75
76
77
class RedHawk(HackingTool):
78
TITLE = "RED HAWK (All In One Scanning)"
79
DESCRIPTION = "All in one tool for Information Gathering and Vulnerability Scanning."
80
INSTALL_COMMANDS = [
81
"git clone https://github.com/Tuhinshubhra/RED_HAWK.git"]
82
RUN_COMMANDS = ["cd RED_HAWK;php rhawk.php"]
83
PROJECT_URL = "https://github.com/Tuhinshubhra/RED_HAWK"
84
85
86
class ReconSpider(HackingTool):
87
TITLE = "ReconSpider(For All Scanning)"
88
DESCRIPTION = "ReconSpider is most Advanced Open Source Intelligence (OSINT)" \
89
" Framework for scanning IP Address, Emails, \n" \
90
"Websites, Organizations and find out information from" \
91
" different sources.\n"
92
INSTALL_COMMANDS = [
93
"sudo git clone https://github.com/bhavsec/reconspider.git",
94
"sudo apt install python3 python3-pip && cd reconspider && sudo python3 setup.py install"
95
]
96
RUN_COMMANDS = ["cd reconspider;python3 reconspider.py"]
97
PROJECT_URL = "https://github.com/bhavsec/reconspider"
98
99
# def __init__(self):
100
# super(ReconSpider, self).__init__(runnable = False)
101
102
103
class IsItDown(HackingTool):
104
TITLE = "IsItDown (Check Website Down/Up)"
105
DESCRIPTION = "Check Website Is Online or Not"
106
107
def __init__(self):
108
super(IsItDown, self).__init__(
109
[('Open', self.open)], installable = False, runnable = False)
110
111
def open(self):
112
webbrowser.open_new_tab("https://www.isitdownrightnow.com/")
113
114
115
class Infoga(HackingTool):
116
TITLE = "Infoga - Email OSINT"
117
DESCRIPTION = "Infoga is a tool gathering email accounts information\n" \
118
"(ip, hostname, country,...) from different public source"
119
INSTALL_COMMANDS = [
120
"git clone https://github.com/m4ll0k/Infoga.git",
121
"cd Infoga;sudo python3 setup.py install"
122
]
123
RUN_COMMANDS = ["cd Infoga;python3 infoga.py"]
124
PROJECT_URL = "https://github.com/m4ll0k/Infoga"
125
126
127
class ReconDog(HackingTool):
128
TITLE = "ReconDog"
129
DESCRIPTION = "ReconDog Information Gathering Suite"
130
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/ReconDog.git"]
131
RUN_COMMANDS = ["cd ReconDog;sudo python dog"]
132
PROJECT_URL = "https://github.com/s0md3v/ReconDog"
133
134
135
class Striker(HackingTool):
136
TITLE = "Striker"
137
DESCRIPTION = "Recon & Vulnerability Scanning Suite"
138
INSTALL_COMMANDS = [
139
"git clone https://github.com/s0md3v/Striker.git",
140
"cd Striker && pip3 install -r requirements.txt"
141
]
142
PROJECT_URL = "https://github.com/s0md3v/Striker"
143
144
def run(self):
145
site = input("Enter Site Name (example.com) >> ")
146
os.chdir("Striker")
147
subprocess.run(["sudo", "python3", "striker.py", site])
148
149
150
class SecretFinder(HackingTool):
151
TITLE = "SecretFinder (like API & etc)"
152
DESCRIPTION = "SecretFinder - A python script for find sensitive data \n" \
153
"like apikeys, accesstoken, authorizations, jwt,..etc \n " \
154
"and search anything on javascript files.\n\n " \
155
"Usage: python SecretFinder.py -h"
156
INSTALL_COMMANDS = [
157
"git clone https://github.com/m4ll0k/SecretFinder.git secretfinder",
158
"cd secretfinder; sudo pip3 install -r requirements.txt"
159
]
160
PROJECT_URL = "https://github.com/m4ll0k/SecretFinder"
161
162
def __init__(self):
163
super(SecretFinder, self).__init__(runnable = False)
164
165
166
class Shodan(HackingTool):
167
TITLE = "Find Info Using Shodan"
168
DESCRIPTION = "Get ports, vulnerabilities, information, banners,..etc \n " \
169
"for any IP with Shodan (no apikey! no rate limit!)\n" \
170
"[X] Don't use this tool because your ip will be blocked by Shodan!"
171
INSTALL_COMMANDS = ["git clone https://github.com/m4ll0k/Shodanfy.py.git"]
172
PROJECT_URL = "https://github.com/m4ll0k/Shodanfy.py"
173
174
def __init__(self):
175
super(Shodan, self).__init__(runnable = False)
176
177
178
class PortScannerRanger(HackingTool):
179
TITLE = "Port Scanner - rang3r"
180
DESCRIPTION = "rang3r is a python script which scans in multi thread\n " \
181
"all alive hosts within your range that you specify."
182
INSTALL_COMMANDS = [
183
"git clone https://github.com/floriankunushevci/rang3r.git;"
184
"sudo pip install termcolor"]
185
PROJECT_URL = "https://github.com/floriankunushevci/rang3r"
186
187
def run(self):
188
ip = input("Enter Ip >> ")
189
os.chdir("rang3r")
190
subprocess.run(["sudo", "python", "rang3r.py", "--ip", ip])
191
192
193
class Breacher(HackingTool):
194
TITLE = "Breacher"
195
DESCRIPTION = "An advanced multithreaded admin panel finder written in python."
196
INSTALL_COMMANDS = ["git clone https://github.com/s0md3v/Breacher.git"]
197
PROJECT_URL = "https://github.com/s0md3v/Breacher"
198
199
def run(self):
200
domain = input("Enter domain (example.com) >> ")
201
os.chdir("Breacher")
202
subprocess.run(["python3", "breacher.py", "-u", domain])
203
204
class InformationGatheringTools(HackingToolsCollection):
205
TITLE = "Information gathering tools"
206
TOOLS = [
207
NMAP(),
208
Dracnmap(),
209
PortScan(),
210
Host2IP(),
211
XeroSploit(),
212
RedHawk(),
213
ReconSpider(),
214
IsItDown(),
215
Infoga(),
216
ReconDog(),
217
Striker(),
218
SecretFinder(),
219
Shodan(),
220
PortScannerRanger(),
221
Breacher()
222
]
223
224