Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/webattack.py
1269 views
1
# coding=utf-8
2
import subprocess
3
4
from core import HackingTool
5
from core import HackingToolsCollection
6
7
8
class Web2Attack(HackingTool):
9
TITLE = "Web2Attack"
10
DESCRIPTION = "Web hacking framework with tools, exploits by python"
11
INSTALL_COMMANDS = [
12
"sudo git clone https://github.com/santatic/web2attack.git"]
13
RUN_COMMANDS = ["cd web2attack && sudo python3 w2aconsole"]
14
PROJECT_URL = "https://github.com/santatic/web2attack"
15
16
17
class Skipfish(HackingTool):
18
TITLE = "Skipfish"
19
DESCRIPTION = "Skipfish – Fully automated, active web application " \
20
"security reconnaissance tool \n " \
21
"Usage: skipfish -o [FolderName] targetip/site"
22
RUN_COMMANDS = [
23
"sudo skipfish -h",
24
'echo "skipfish -o [FolderName] targetip/site"|boxes -d headline | lolcat'
25
]
26
27
def __init__(self):
28
super(Skipfish, self).__init__(installable = False)
29
30
31
class SubDomainFinder(HackingTool):
32
TITLE = "SubDomain Finder"
33
DESCRIPTION = "Sublist3r is a python tool designed to enumerate " \
34
"subdomains of websites using OSINT \n " \
35
"Usage:\n\t" \
36
"[1] python3 sublist3r.py -d example.com \n" \
37
"[2] python3 sublist3r.py -d example.com -p 80,443"
38
INSTALL_COMMANDS = [
39
"sudo pip3 install requests argparse dnspython",
40
"sudo git clone https://github.com/aboul3la/Sublist3r.git",
41
"cd Sublist3r && sudo pip3 install -r requirements.txt"
42
]
43
RUN_COMMANDS = ["cd Sublist3r && python3 sublist3r.py -h"]
44
PROJECT_URL = "https://github.com/aboul3la/Sublist3r"
45
46
47
class CheckURL(HackingTool):
48
TITLE = "CheckURL"
49
DESCRIPTION = "Detect evil urls that uses IDN Homograph Attack.\n\t" \
50
"[!] python3 checkURL.py --url google.com"
51
INSTALL_COMMANDS = [
52
"sudo git clone https://github.com/UndeadSec/checkURL.git"]
53
RUN_COMMANDS = ["cd checkURL && python3 checkURL.py --help"]
54
PROJECT_URL = "https://github.com/UndeadSec/checkURL"
55
56
57
class Blazy(HackingTool):
58
TITLE = "Blazy(Also Find ClickJacking)"
59
DESCRIPTION = "Blazy is a modern login page bruteforcer"
60
INSTALL_COMMANDS = [
61
"sudo git clone https://github.com/UltimateHackers/Blazy.git",
62
"cd Blazy && sudo pip2.7 install -r requirements.txt"
63
]
64
RUN_COMMANDS = ["cd Blazy && sudo python2.7 blazy.py"]
65
PROJECT_URL = "https://github.com/UltimateHackers/Blazy"
66
67
68
class SubDomainTakeOver(HackingTool):
69
TITLE = "Sub-Domain TakeOver"
70
DESCRIPTION = "Sub-domain takeover vulnerability occur when a sub-domain " \
71
"\n (subdomain.example.com) is pointing to a service " \
72
"(e.g: GitHub, AWS/S3,..)\n" \
73
"that has been removed or deleted.\n" \
74
"Usage:python3 takeover.py -d www.domain.com -v"
75
INSTALL_COMMANDS = [
76
"git clone https://github.com/edoardottt/takeover.git",
77
"cd takeover;sudo python3 setup.py install"
78
]
79
PROJECT_URL = "https://github.com/edoardottt/takeover"
80
81
def __init__(self):
82
super(SubDomainTakeOver, self).__init__(runnable = False)
83
84
class Dirb(HackingTool):
85
TITLE = "Dirb"
86
DESCRIPTION = "DIRB is a Web Content Scanner. It looks for existing " \
87
"(and/or hidden) Web Objects.\n" \
88
"It basically works by launching a dictionary based " \
89
"attack against \n a web server and analyzing the response."
90
INSTALL_COMMANDS = [
91
"sudo git clone https://gitlab.com/kalilinux/packages/dirb.git",
92
"cd dirb;sudo bash configure;make"
93
]
94
PROJECT_URL = "https://gitlab.com/kalilinux/packages/dirb"
95
96
def run(self):
97
uinput = input("Enter Url >> ")
98
subprocess.run(["sudo", "dirb", uinput])
99
100
101
class WebAttackTools(HackingToolsCollection):
102
TITLE = "Web Attack tools"
103
DESCRIPTION = ""
104
TOOLS = [
105
Web2Attack(),
106
Skipfish(),
107
SubDomainFinder(),
108
CheckURL(),
109
Blazy(),
110
SubDomainTakeOver(),
111
Dirb()
112
]
113
114