Example #1
0
def passive_recon(info):
    from core.build_menu import set_menu
    module = 'Passive Reconnaissance & OSINT'
    art = ''
    menu = [ # '#' : ['module', 'description', 'function']
        ['HackerTarget','(Run all HackerTarget.com passive checks)','modules.recon.passive.hackertarget','hackertarget'],\
        ['dig lookup','(DIG SCAN)','modules.recon.passive.dig','dig'],\
        ['WhoIS lookup','(Gather via Interaction)','modules.recon.passive.whois','whois'],\
        ['NPING','(NPING Target)','modules.recon.passive.nping','nping'],\
        ['GeoIP Lookup','(Geographic IP Lookup)','modules.recon.passive.getgeoip','getgeoip'],\
        ['Reverse DNS Lookup','(Reverse DNS Lookup)','modules.recon.passive.revdns','revdns'],\
        ['Subnet Enumeration','(Enumerate subnets)','modules.recon.passive.subnet','subnet'],\
        ['Reverse IP Lookup','(Reverse IP Lookup)','modules.recon.passive.revip','revip'],\
        ['IP History','(Lookup previous IP addresses)','modules.recon.passive.iphistory','iphistory'],\
        ['Google Search','(Google Search)','modules.recon.passive.gsearch','gsearch'],\
        ['Check Username','(Check 160+ social media sites for username)','modules.recon.passive.checkuser','checkuser'],\
        ['LinkedIn Gathering','(Lookup LinkedIn Profiles)','modules.recon.passive.linkedin','linkedin'],\
        ['Public Contact Info','(all fullcontact.com information)','modules.recon.passive.getconinfo','getconinfo'],\
        ['CENSYS Gathering','(Gather CENSYS data if API not used up)','modules.recon.passive.censysdom','censysdom'],\
        # '5':['DNS Lookup','','dnschk'],\
        # '6':['Subdomain Scan','','subdom'],\
        # '11':['Page Links','','links'],\
        # '13':['Google Dorker','','googledorker'],\
        # '14':['Wayback Machine','','webarchive'],\
        # '15':['Hacked Email Check','','hackedmail'],\
        # '16':['Mail to Domain','','mailtodom'],\
        # '17':['Google Groups Enum','','googlegroups'],\
        # '19':['PasteBin Posts','','pastebin'],\
        # '21':['Google Plus Gathering','','googlenum'],\
        # '24':['Threat Intel Gathering','','threatintel'],\
    ]
    set_menu(info, menu, module, art)  # build menu
Example #2
0
def nmap_menu(info):
    from core.build_menu import set_menu
    menu = [ # '#' : ['module', 'description', 'function']
        ['Run NMAP','Run your nmap string','modules.enumeration.nmap','nmap'],\
        ['Edit NMAP String','Create or Edit your NMAP String','modules.enumeration.nmap_editor','nmap_editor']
    ]

    set_menu(info,menu,'NMAP Configuration','')          # build menu
Example #3
0
def recon(info):
    from core.build_menu import set_menu
    menu = [ # '#' : ['module', 'description', 'function']
        ['Passive Reconnaissance','(Open Source Intelligence)','modules.recon.passive_recon','passive_recon'],\
        ['Active Reconnaissance','(Gather via Interaction)','modules.recon.active_recon','active_recon'],\
        ['Information Disclosure','(Errors, Emails, etc)','modules.recon.infodisc','info_disclosure'],\
    ]
    set_menu(info, menu, 'Reconnaissance & OSINT', '')
Example #4
0
def vulnysis(info):
    from core.build_menu import set_menu
    menu = [ # '#' : ['module', 'description', 'function']
        ['Basic Bugs & Misconfigurations','(Low Priority [P0x3-P0x4])','modules.vulnysis.misconfig_bugs','misconfig'],\
        ['Critical Vulnerabilities','(High Priority [P0x1-P0x2])','modules.vulnysis.critical_bugs','critical'],\
        ['Others','(Bruter Force Tools)','modules.vulnysis.other_bugs','other'],\
    ]
    set_menu(info, menu, 'Vulnerability Analysis', '')  # build menu
Example #5
0
def exploitation(info):
    from core.build_menu import set_menu
    menu = [ # '#' : ['module', 'description', 'function']
        ['Shellshock','Exploits!','modules.exploitation.shellshock_exp','shellshock_exp'],\
        #'2':['xxx','xxx','xxx'],\
        #'3':['xxx','xxx','xxx'],\
    ]
    set_menu(info,menu,'Exploitation','')          # build menu
Example #6
0
def aux(info):
    from core.build_menu import set_menu
    menu = [ # '#' : ['module', 'description', 'function']
        ['Generate Hashes','Generate Hashes from String','modules.aux.hashes','hashes'],\
        ['Encode/Decode Strings','Base64, Base32, Base16/Hex, URL','modules.aux.encodeall','encodeall'],\
        # '3':['Extract Metadata','','modules.aux.imgext','imgext'],\
        ['Honeypot Detector','Shodan Honeypot Check','modules.aux.honeypot','honeypot'],\
    ]
    set_menu(info, menu, 'Aux Modules', '')  # build menu
Example #7
0
def scanenum(target):
    from core.build_menu import set_menu
    menu = [ # '#' : ['module', 'description', 'function']
        #['Ping Sweep','(Scan a range of targets/IPs)','modules.enumeration.misconfig_bugs','xxx'],\
        ['Port Scanning','(Various port scan types)','modules.enumeration.nmap_menu','nmap_menu'],\
        ['Crawling','(Public and Brute Force methods)','modules.enumeration.photon_menu','photon_menu'],\
        ['Nikto Menu','(Web Server Vulnerability Scans Menu)','modules.enumeration.nikto_menu','nikto_menu'],\
        # '5':['Windows Enumeration','(Windows Specific Enumeration)','windows_enum'],\
    ]
    set_menu(target, menu, 'Scanning and Enumeration', '')  # build menu
Example #8
0
def other(info):
    from core.build_menu import set_menu
    module = 'Brute Force Tools'
    art = ''
    menu = [ # '#' : ['module', 'description', 'function']
        ['FTP Brute','xxx','modules.vulnysis.other.ftpbrute','ftpbrute'],\
        ['SSH Brute','xxx','modules.vulnysis.other.sshbrute','sshbrute'],\
        ['SQL Brute','xxx','modules.vulnysis.other.sqlbrute','sqlbrute'],\
        ['POP 3/2 Brute','xxx','modules.vulnysis.other.popbrute','popbrute'],\
        ['SMTP Brute','xxx','modules.vulnysis.other.smtpbrute','smtpbrute'],\
        ['TELNET Brute','xxx','modules.vulnysis.other.telnetbrute','telnetbrute'],\
        ['XMPP Brute','xxx','modules.vulnysis.other.xmppbrute','xmppbrute'],\
        #['Other Bugs','xxx','modules.vulnysis.other.othbugs.othbugs','othbugs'],\
    ]
    set_menu(info, menu, module, art)  # build menu
Example #9
0
def info_disclosure(info):
    from core.build_menu import set_menu
    module = 'Information Disclosure'
    art = ''
    menu = [ # '#' : ['module', 'description', 'function']
        ['Credit Card Enumeration','(If disclosed in plain text)','modules.recon.info.creditcards','creditcards'],\
        # '2':['Extract All Emails','(Absolute)','emailext'],\
        ['Enumerate Errors + FPD','(Includes Full Path Disclosure)','modules.recon.info.errors','errors'],\
        # '4':['Internal IP disclosure','(Find out any leaks of internal IP addresses)','internalip'],\
        # '5':['Extract out all Phone Numbers','(If plaintext disclosure)','phone'],\
        # '6':['Extract out all Social Security Numbers','(US Based)','ssn']



    ]
    set_menu(info, menu, module, art)  # build menu
Example #10
0
def misconfig(info):
    from core.build_menu import set_menu
    module = 'Misconfigurations and Lower Priority Vulnerabilities'
    art = ''
    menu = [ # '#' : ['module', 'description', 'function']
        ['iCORS','xxx','modules.vulnysis.misconfig.icors','icors'],\
        ['Same Site Scripting','xxx','modules.vulnysis.misconfig.ssscript','ssscript'],\
        ['Clickjack','xxx','modules.vulnysis.misconfig.clickjack','clickjack'],\
        ['Zone Transfer','xxx','modules.vulnysis.misconfig.zone','zone'],\
        ['Cookie Check','xxx','modules.vulnysis.misconfig.cookiecheck','cookiecheck'],\
        ['Sec. Headers','xxx','modules.vulnysis.misconfig.headers','headers'],\
        ['Cloudflare Misconfig','xxx','modules.vulnysis.misconfig.cloudflaremisc','cloudflaremisc'],\
        ['HSTS Check','xxx','modules.vulnysis.misconfig.hsts','hsts'],\
        ['Cross Site Tracing','xxx','modules.vulnysis.misconfig.xsstrace','xsstrace'],\
        ['Telnet Enabled','xxx','modules.vulnysis.misconfig.netmisc','netmisc'],\
        ['Email Spoof','xxx','modules.vulnysis.misconfig.mailspoof','mailspoof'],\
        ['Host Header Injection','xxx','modules.vulnysis.misconfig.hhi','hhi'],\
        ['Cookie Injection','xxx','modules.vulnysis.misconfig.sessionfix','sessionfix'],\
    ]
    set_menu(info, menu, module, art)  # build menu
Example #11
0
def active_recon(info):
    from core.build_menu import set_menu
    module = 'Active Reconnaissance'
    art = ''
    menu = [ # '#' : ['module', 'description', 'function']
        # '1':['Ping/NPing Enumeration','xxx','piwebenum'],\
        # '2':['Grab HTTP Headers','xxx','grabhead'],\
        # '3':['HTTP Allowed Methods','xxx','httpmethods'],\
        ['robots.txt/sitemap.xml Hunt','Checks for public site data','modules.recon.active.robot','robot'],\
        # '5':['Scrape Comments','xxx','commentssrc'],\
        # '6':['Traceroute','xxx','traceroute'],\
        # '7':['DNS Hosts','xxx','sharedns'],\
        # '8':['SSL Certificate','xxx','sslcert'],\
        # '9':['CMS Detection','xxx','cms'],\
        # '10':['Apache Status','xxx','apachestat'],\
        # '11':['WebDAV HTTP Enumeration','xxx','dav'],\
        # '12':['PHPInfo Enumeration','xxx','phpinfo'],\
        # '13':['Server Detection','xxx','serverdetect'],\
        ['Alternate Sites','Check for alternate sites based on browser','modules.recon.active.altsites','altsites'],\
        # '15':['File Bruteforcers','xxx','filebrute'],\
    ]
    set_menu(info, menu, module, art)  # build menu
Example #12
0
def critical(info):
    from core.build_menu import set_menu
    module = 'Critical Vulnerabilities'
    art = ''
    menu = [ # '#' : ['module', 'description', 'function']
        ['LFI','xxx','modules.vulnysis.critical.lfi','lfi'],\
        ['RFI','xxx','modules.vulnysis.critical.rfi','rfi'],\
        ['RCE','xxx','modules.vulnysis.critical.rce','rce'],\
        ['Path Traversal','xxx','modules.vulnysis.critical.pathtrav','pathtrav'],\
        ['CSRF','xxx','modules.vulnysis.critical.csrf','csrf'],\
        ['XSS','xxx','modules.vulnysis.critical.xss','xss'],\
        ['SQLi','xxx','modules.vulnysis.critical.sqli','sqli'],\
        ['LDAP Injection','xxx','modules.vulnysis.critical.ldap','ldap'],\
        ['HTML Code Injection','xxx','modules.vulnysis.critical.htmli','htmli'],\
        ['HTTP Response Splitting','xxx','modules.vulnysis.critical.crlf','crlf'],\
        ['PHP Code Injection','xxx','modules.vulnysis.critical.phpi','phpi'],\
        ['XPATH Injection','xxx','modules.vulnysis.critical.xpathi','xpathi'],\
        ['Shellshock','xxx','modules.vulnysis.critical.shellshock','shellshock'],\
        ['Apache Struts Shock','xxx','modules.vulnysis.critical.strutsshock','strutsshock'],\
        #['URL Validation','xxx','modules.vulnysis.critical.redirect','redirect'],\
        ['Subdomain Takeover','xxx','modules.vulnysis.critical.subdomover','subdomover'],\
    ]
    set_menu(info, menu, module, art)  # build menu