def passive_recon(info): from core.build_menu import set_menu module = 'Passive Reconnaissance & OSINT' art = '' menu = [ # '#' : ['module', 'description', 'function'] ['HackerTarget','(Run all HackerTarget.com passive checks)','modules.recon.passive.hackertarget','hackertarget'],\ ['dig lookup','(DIG SCAN)','modules.recon.passive.dig','dig'],\ ['WhoIS lookup','(Gather via Interaction)','modules.recon.passive.whois','whois'],\ ['NPING','(NPING Target)','modules.recon.passive.nping','nping'],\ ['GeoIP Lookup','(Geographic IP Lookup)','modules.recon.passive.getgeoip','getgeoip'],\ ['Reverse DNS Lookup','(Reverse DNS Lookup)','modules.recon.passive.revdns','revdns'],\ ['Subnet Enumeration','(Enumerate subnets)','modules.recon.passive.subnet','subnet'],\ ['Reverse IP Lookup','(Reverse IP Lookup)','modules.recon.passive.revip','revip'],\ ['IP History','(Lookup previous IP addresses)','modules.recon.passive.iphistory','iphistory'],\ ['Google Search','(Google Search)','modules.recon.passive.gsearch','gsearch'],\ ['Check Username','(Check 160+ social media sites for username)','modules.recon.passive.checkuser','checkuser'],\ ['LinkedIn Gathering','(Lookup LinkedIn Profiles)','modules.recon.passive.linkedin','linkedin'],\ ['Public Contact Info','(all fullcontact.com information)','modules.recon.passive.getconinfo','getconinfo'],\ ['CENSYS Gathering','(Gather CENSYS data if API not used up)','modules.recon.passive.censysdom','censysdom'],\ # '5':['DNS Lookup','','dnschk'],\ # '6':['Subdomain Scan','','subdom'],\ # '11':['Page Links','','links'],\ # '13':['Google Dorker','','googledorker'],\ # '14':['Wayback Machine','','webarchive'],\ # '15':['Hacked Email Check','','hackedmail'],\ # '16':['Mail to Domain','','mailtodom'],\ # '17':['Google Groups Enum','','googlegroups'],\ # '19':['PasteBin Posts','','pastebin'],\ # '21':['Google Plus Gathering','','googlenum'],\ # '24':['Threat Intel Gathering','','threatintel'],\ ] set_menu(info, menu, module, art) # build menu
def nmap_menu(info): from core.build_menu import set_menu menu = [ # '#' : ['module', 'description', 'function'] ['Run NMAP','Run your nmap string','modules.enumeration.nmap','nmap'],\ ['Edit NMAP String','Create or Edit your NMAP String','modules.enumeration.nmap_editor','nmap_editor'] ] set_menu(info,menu,'NMAP Configuration','') # build menu
def recon(info): from core.build_menu import set_menu menu = [ # '#' : ['module', 'description', 'function'] ['Passive Reconnaissance','(Open Source Intelligence)','modules.recon.passive_recon','passive_recon'],\ ['Active Reconnaissance','(Gather via Interaction)','modules.recon.active_recon','active_recon'],\ ['Information Disclosure','(Errors, Emails, etc)','modules.recon.infodisc','info_disclosure'],\ ] set_menu(info, menu, 'Reconnaissance & OSINT', '')
def vulnysis(info): from core.build_menu import set_menu menu = [ # '#' : ['module', 'description', 'function'] ['Basic Bugs & Misconfigurations','(Low Priority [P0x3-P0x4])','modules.vulnysis.misconfig_bugs','misconfig'],\ ['Critical Vulnerabilities','(High Priority [P0x1-P0x2])','modules.vulnysis.critical_bugs','critical'],\ ['Others','(Bruter Force Tools)','modules.vulnysis.other_bugs','other'],\ ] set_menu(info, menu, 'Vulnerability Analysis', '') # build menu
def exploitation(info): from core.build_menu import set_menu menu = [ # '#' : ['module', 'description', 'function'] ['Shellshock','Exploits!','modules.exploitation.shellshock_exp','shellshock_exp'],\ #'2':['xxx','xxx','xxx'],\ #'3':['xxx','xxx','xxx'],\ ] set_menu(info,menu,'Exploitation','') # build menu
def aux(info): from core.build_menu import set_menu menu = [ # '#' : ['module', 'description', 'function'] ['Generate Hashes','Generate Hashes from String','modules.aux.hashes','hashes'],\ ['Encode/Decode Strings','Base64, Base32, Base16/Hex, URL','modules.aux.encodeall','encodeall'],\ # '3':['Extract Metadata','','modules.aux.imgext','imgext'],\ ['Honeypot Detector','Shodan Honeypot Check','modules.aux.honeypot','honeypot'],\ ] set_menu(info, menu, 'Aux Modules', '') # build menu
def scanenum(target): from core.build_menu import set_menu menu = [ # '#' : ['module', 'description', 'function'] #['Ping Sweep','(Scan a range of targets/IPs)','modules.enumeration.misconfig_bugs','xxx'],\ ['Port Scanning','(Various port scan types)','modules.enumeration.nmap_menu','nmap_menu'],\ ['Crawling','(Public and Brute Force methods)','modules.enumeration.photon_menu','photon_menu'],\ ['Nikto Menu','(Web Server Vulnerability Scans Menu)','modules.enumeration.nikto_menu','nikto_menu'],\ # '5':['Windows Enumeration','(Windows Specific Enumeration)','windows_enum'],\ ] set_menu(target, menu, 'Scanning and Enumeration', '') # build menu
def other(info): from core.build_menu import set_menu module = 'Brute Force Tools' art = '' menu = [ # '#' : ['module', 'description', 'function'] ['FTP Brute','xxx','modules.vulnysis.other.ftpbrute','ftpbrute'],\ ['SSH Brute','xxx','modules.vulnysis.other.sshbrute','sshbrute'],\ ['SQL Brute','xxx','modules.vulnysis.other.sqlbrute','sqlbrute'],\ ['POP 3/2 Brute','xxx','modules.vulnysis.other.popbrute','popbrute'],\ ['SMTP Brute','xxx','modules.vulnysis.other.smtpbrute','smtpbrute'],\ ['TELNET Brute','xxx','modules.vulnysis.other.telnetbrute','telnetbrute'],\ ['XMPP Brute','xxx','modules.vulnysis.other.xmppbrute','xmppbrute'],\ #['Other Bugs','xxx','modules.vulnysis.other.othbugs.othbugs','othbugs'],\ ] set_menu(info, menu, module, art) # build menu
def info_disclosure(info): from core.build_menu import set_menu module = 'Information Disclosure' art = '' menu = [ # '#' : ['module', 'description', 'function'] ['Credit Card Enumeration','(If disclosed in plain text)','modules.recon.info.creditcards','creditcards'],\ # '2':['Extract All Emails','(Absolute)','emailext'],\ ['Enumerate Errors + FPD','(Includes Full Path Disclosure)','modules.recon.info.errors','errors'],\ # '4':['Internal IP disclosure','(Find out any leaks of internal IP addresses)','internalip'],\ # '5':['Extract out all Phone Numbers','(If plaintext disclosure)','phone'],\ # '6':['Extract out all Social Security Numbers','(US Based)','ssn'] ] set_menu(info, menu, module, art) # build menu
def misconfig(info): from core.build_menu import set_menu module = 'Misconfigurations and Lower Priority Vulnerabilities' art = '' menu = [ # '#' : ['module', 'description', 'function'] ['iCORS','xxx','modules.vulnysis.misconfig.icors','icors'],\ ['Same Site Scripting','xxx','modules.vulnysis.misconfig.ssscript','ssscript'],\ ['Clickjack','xxx','modules.vulnysis.misconfig.clickjack','clickjack'],\ ['Zone Transfer','xxx','modules.vulnysis.misconfig.zone','zone'],\ ['Cookie Check','xxx','modules.vulnysis.misconfig.cookiecheck','cookiecheck'],\ ['Sec. Headers','xxx','modules.vulnysis.misconfig.headers','headers'],\ ['Cloudflare Misconfig','xxx','modules.vulnysis.misconfig.cloudflaremisc','cloudflaremisc'],\ ['HSTS Check','xxx','modules.vulnysis.misconfig.hsts','hsts'],\ ['Cross Site Tracing','xxx','modules.vulnysis.misconfig.xsstrace','xsstrace'],\ ['Telnet Enabled','xxx','modules.vulnysis.misconfig.netmisc','netmisc'],\ ['Email Spoof','xxx','modules.vulnysis.misconfig.mailspoof','mailspoof'],\ ['Host Header Injection','xxx','modules.vulnysis.misconfig.hhi','hhi'],\ ['Cookie Injection','xxx','modules.vulnysis.misconfig.sessionfix','sessionfix'],\ ] set_menu(info, menu, module, art) # build menu
def active_recon(info): from core.build_menu import set_menu module = 'Active Reconnaissance' art = '' menu = [ # '#' : ['module', 'description', 'function'] # '1':['Ping/NPing Enumeration','xxx','piwebenum'],\ # '2':['Grab HTTP Headers','xxx','grabhead'],\ # '3':['HTTP Allowed Methods','xxx','httpmethods'],\ ['robots.txt/sitemap.xml Hunt','Checks for public site data','modules.recon.active.robot','robot'],\ # '5':['Scrape Comments','xxx','commentssrc'],\ # '6':['Traceroute','xxx','traceroute'],\ # '7':['DNS Hosts','xxx','sharedns'],\ # '8':['SSL Certificate','xxx','sslcert'],\ # '9':['CMS Detection','xxx','cms'],\ # '10':['Apache Status','xxx','apachestat'],\ # '11':['WebDAV HTTP Enumeration','xxx','dav'],\ # '12':['PHPInfo Enumeration','xxx','phpinfo'],\ # '13':['Server Detection','xxx','serverdetect'],\ ['Alternate Sites','Check for alternate sites based on browser','modules.recon.active.altsites','altsites'],\ # '15':['File Bruteforcers','xxx','filebrute'],\ ] set_menu(info, menu, module, art) # build menu
def critical(info): from core.build_menu import set_menu module = 'Critical Vulnerabilities' art = '' menu = [ # '#' : ['module', 'description', 'function'] ['LFI','xxx','modules.vulnysis.critical.lfi','lfi'],\ ['RFI','xxx','modules.vulnysis.critical.rfi','rfi'],\ ['RCE','xxx','modules.vulnysis.critical.rce','rce'],\ ['Path Traversal','xxx','modules.vulnysis.critical.pathtrav','pathtrav'],\ ['CSRF','xxx','modules.vulnysis.critical.csrf','csrf'],\ ['XSS','xxx','modules.vulnysis.critical.xss','xss'],\ ['SQLi','xxx','modules.vulnysis.critical.sqli','sqli'],\ ['LDAP Injection','xxx','modules.vulnysis.critical.ldap','ldap'],\ ['HTML Code Injection','xxx','modules.vulnysis.critical.htmli','htmli'],\ ['HTTP Response Splitting','xxx','modules.vulnysis.critical.crlf','crlf'],\ ['PHP Code Injection','xxx','modules.vulnysis.critical.phpi','phpi'],\ ['XPATH Injection','xxx','modules.vulnysis.critical.xpathi','xpathi'],\ ['Shellshock','xxx','modules.vulnysis.critical.shellshock','shellshock'],\ ['Apache Struts Shock','xxx','modules.vulnysis.critical.strutsshock','strutsshock'],\ #['URL Validation','xxx','modules.vulnysis.critical.redirect','redirect'],\ ['Subdomain Takeover','xxx','modules.vulnysis.critical.subdomover','subdomover'],\ ] set_menu(info, menu, module, art) # build menu