PytheM is a python pentesting framework. Same has been developed in the hope that it will be useful and i don't take responsabillity of any misapplication of it. Only for GNU/Linux OS, check wiki to see examples:
https://github.com/m4n3dw0lf/PytheM/wiki
#Installation
-
$sudo apt-get update
-
$sudo apt-get install libasound-dev libjack-jackd2-dev portaudio19-dev python-pyaudio build-essential python-dev libnetfilter-queue-dev libespeak1 libffi-dev libssl-dev
-
$sudo git clone https://github.com/m4n3dw0lf/PytheM/
-
$cd PytheM
-
$sudo pip install -r requirements.txt
Now you are ready to rock:
- $sudo ./pythem
#Features
[ PytheM - Penetration Testing Framework v0.3.3 ]
[*] help: Print this help message.
[*] exit/quit: Leave the program.
[*] set Set a variable value.
parameters:
- interface
- gateway
- target
- file
- arpmode
examples:
pythem> set interface | open input to set
or
pythem> set interface wlan0 | don't open input to set value
[*] print Print variable value.
examples:
pythem> print gateway
[*] scan Make a tcp/manualport/arp scan.
(Should be called after setting interface and target)
examples:
pythem> scan
or
pythem> scan tcp
[*] arpspoof Start or stop a arpspoofing attack.
(Optional setting arpmode to select arpspoofing mode should be filled with rep or req)
(rep to spoof responses, req to spoof requests)
arguments:
start
stop
examples:
arpspoof start
arpspoof stop
[*] dnsspoof Start a dnsspoofing attack.
(Should be called after a arpspoofing attack have been started)
examples:
pythem> dnsspoof start
pythem> dnsspoof stop
[*] sniff Start sniffing packets.
(Should be called after setting interface)
examples:
pythem> sniff http
or
pythem> sniff
[+] Enter the filter: port 1337 and host 10.0.1.5 | tcpdump like format or http,dns specific filter.
[*] pforensic Start a packet-analyzer
(Should be called after setting interface and file with a .pcap file)
examples:
pythem> pforensic
pforensic> help
[*] fuzz Start a local file stdin fuzzer or a tcp fuzzer
(The stdin should be called after setting file)
(The tcp should be called after setting target)
arguments:
stdin | set file before
tcp | set target before
examples:
pythem> fuzz stdin
pythem> fuzz tcp
[*] brute-force Start a brute-force attack.
(Should be called after setting target and wordlist file path)
arguments:
ssh | ip address as target
url | url (with http:// or https://) as target
webform | url (with http:// or https://)as target
examples:
pythem> brute-force webform
pythem> brute-force ssh
[*] geoip Geolocalizate approximately the location of a IP address.
(Should be called after setting target (Ip address))
examples:
pythem> geoip
or
pythem> geoip 8.8.8.8
[*] decode and encode Decode or encode a string with choosen pattern
examples:
pythem> decode base64
pythem> encode ascii
[*] cookiedecode Decode a base64 url encoded cookie value.
example:
pythem> cookiedecode
* Anything else will be executed in the terminal like cd, ls, nano, cat, etc. *
link: https://github.com/m4n3dw0lf/Jarvis
[*] jarvis
type jarvis-help to see the jarvis help page.
examples:
pythem> jarvis (Call Jarvis in speech recognition mode)
pythem> jarvis-help (Print Jarvis help message)
pythem> jarvis-log (Check Jarvis log)
or
pythem> jarvis-log err
pythem> jarvis-say (Ask Jarvis to say something)
or
pythem> jarvis-say hello my name is jarvis.
pythem> jarvis-read (If no file specified, should be called after setting file)
or
pythem> jarvis-read file.txt
by: m4n3dw0lf