Skip to content

wflk/PytheM

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PytheM

PytheM is a python pentesting framework. Same has been developed in the hope that it will be useful and i don't take responsabillity of any misapplication of it. Only for GNU/Linux OS, check wiki to see examples:
https://github.com/m4n3dw0lf/PytheM/wiki

#Installation

$sudo git clone https://github.com/m4n3dw0lf/PytheM/

(OPTIONAL)
plug your Arduino Leonardo
open the arduino IDE > Tools > Board then select Arduino Leonardo
go to Tools> Serial port and check the serial port of the Arduino Leonardo
press CTRL+O
navigate to the directory: path/../PytheM/core/heart/jarvis/
select the jarvis.ino file then upload to the Arduino Leonardo.
(CLOSE OPTIONAL)

$cd PytheM
$sudo pip install -r requirements.txt
$sudo ./pythem

#Features

  • help: Print this help message.

  • exit/quit: Leave the program.

  • set: Set a parameter value.

parameters:

  • interface
  • gateway
  • target
  • file
  • arpmode

examples:

pythem> set interface |open input to set

  • scan Make a tcp/manualport/arp scan.

(Should be called after setting interface and target)

examples:

pythem> scan

  • arpspoof Start or stop a arpspoofing attack.

(Optional setting arpmode to select arpspoofing mode should be filled with rep or req)
(rep to spoof responses, req to spoof requests)

arguments:

  • start
  • stop

examples:
arpspoof start
arpspoof stop

  • dnsspoof Start a dnsspoofing attack.

(Should be called after a arpspoofing attack have been started)

examples:

pythem> dnsspoof start
pythem> dnsspoof stop

  • sniff Start sniffing packets.

(Should be called after setting interface)

examples:

pythem> sniff
[+] Enter the filter: port 1337 and host 10.0.1.5 | tcpdump like format

  • pforensic Start a packet-analyzer

(Should be called after setting interface and file with a .pcap file)

examples:

pythem> pforensic
pforensic> help

  • brute-force Start a brute-force attack.

(Should be called after setting target and wordlist file path)

arguments:

  • ssh | ip address as target
  • url | url (with http:// or https://) as target
  • webform | url (with http:// or https://)as target

examples:

pythem> brute-force webform
pythem> brute-force ssh

  • geoip Geolocalizate approximately the location of a IP address.

(Should be called after setting target (Ip address))

examples:

pythem> geoip

  • decode and encode: Decode or encode a string with choosen pattern

    examples:

    pythem> decode base64
    pythem> encode ascii

  • cookiedecode Decode a base64 url encoded cookie value.

    example:

    pythem> cookiedecode

  • Anything else will be executed in the terminal like cd, ls, nano, cat, etc. *

(+) Call the voice-controlled assistant Jarvis

link: https://github.com/m4n3dw0lf/Jarvis

  • jarvis

type jarvis-help to see the jarvis help page.

examples:

pythem> jarvis
pythem> jarvis-help

by: m4n3dw0lf

About

PytheM - Python penetration testing framework

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 97.0%
  • Other 3.0%