Example #1
0
 def __init__(self,torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
     self.setPluginDetails('NessusPlugin', 'Plugin developed to interact with the REST API of Nessus. Uses pynessus-rest library', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.nessusClient = NessusClient(config.nessusHost, config.nessusPort)
         self.nessusClient.login(config.nessusUser, config.nessusPass)
         self.info("[*] NessusPlugin Initialized!")
Example #2
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'w3afPlugin')
     self.info("[*] w3afPlugin Initialized!")
     self.w3afCorePlugin = w3afCore()
     self.w3afCorePlugin.plugins.init_plugins()
     self.w3afCorePlugin.plugins.zero_enabled_plugins()
     self.miscSettings = MiscSettings()
Example #3
0
    def __init__(self, torNodes=[]):
        BasePlugin.__init__(self, torNodes, 'heartBleedPlugin')
        self.setPluginDetails('heartBleed', 'Performs the HeartBleed vulnerability test against a single target or all TOR exit nodes found.', '1.0', 'Adastra: @jdaanial')
        if len(torNodes) > 0:
            self.info("[*] heartBleedPlugin Initialized!")

        self.pluginConfigs= {}
Example #4
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'infoGatheringPlugin')
     self.setPluginDetails('infoGathering',
                           'Information Gathering of Tor relays.', '1.0',
                           'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] infoGatheringPlugin Initialized!")
     self.pluginConfigs = {}
Example #5
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'examplePlugin')
     self.setPluginDetails('examplePlugin',
                           'Example of a plugin in Tortazo.', '1.0',
                           'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] examplePlugin Initialized!")
     self.pluginConfigs = {}
Example #6
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebCrawlerPlugin')
     self.setPluginDetails('deepWebFinderPlugin', 'Basic crawling tasks against web sites in the TOR network', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebFinderPlugin Initialized!")
     self.extractorRules=[r'^/*']
     self.crawlRulesLinks = '//a/@href'
     self.crawlRulesImages = '//img/@src'
Example #7
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'deepWebPlugin')
     self.setSocksProxy()
     #self.prepocessor = Preprocessor()
     #self.matrix = Matrix()
     #self.metric = Metrics()
     self.info("[*] deepWebStemmingPlugin Initialized!")
     self.webPorts = [80, 443, 8080]
Example #8
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'deepWebPlugin')
     self.setSocksProxy()
     #self.prepocessor = Preprocessor()
     #self.matrix = Matrix()
     #self.metric = Metrics()
     self.info("[*] deepWebStemmingPlugin Initialized!")
     self.webPorts = [80,443,8080]
Example #9
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'w3afPlugin')
     self.setPluginDetails('w3afPlugin', 'Plugin to load the W3AF context in Tortazo. You can execute W3AF against the TOR deep web.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] w3afPlugin Initialized!")
         self.w3afCorePlugin = w3afCore()
         self.w3afCorePlugin.plugins.init_plugins()
         self.w3afCorePlugin.plugins.zero_enabled_plugins()
         self.miscSettings = MiscSettings()
Example #10
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'maliciousHiddenServicePlugin')
     self.setPluginDetails(
         'hiddenService',
         'Creates a malicious hidden service in TOR network and tries to de-anonimyze the users.',
         '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] maliciousHiddenServicePlugin Initialized!")
     self.pluginConfigs = {}
Example #11
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'shodanPlugin')
     self.setPluginDetails(
         'shodan',
         'Plugin to gather information using the Shodan Database.', '1.0',
         'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] shodanPlugin Initialized!")
     self.pluginConfigs = {}
Example #12
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'feedOnionRepositoryPlugin')
     self.setPluginDetails(
         'feedOnionRepositoryPlugin',
         'Try to search for hidden services in searchers of deep web like TorCH or AhMIA. The information gathered will be validated and then inserted in the onion repository tables.',
         '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] feedOnionRepositoryPlugin Initialized!")
     self.pluginConfigs = {}
Example #13
0
    def __init__(self, torNodes=[]):
        BasePlugin.__init__(self, torNodes, 'heartBleedPlugin')
        self.setPluginDetails(
            'heartBleed',
            'Performs the HeartBleed vulnerability test against a single target or all TOR exit nodes found.',
            '1.0', 'Adastra: @jdaanial')
        if len(torNodes) > 0:
            self.info("[*] heartBleedPlugin Initialized!")

        self.pluginConfigs = {}
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebStemmingPlugin')
     self.setPluginDetails('stemming', 'Basic stemming tasks against hidden services in the TOR network. Uses IRL library to find terms in hidden services in the TOR network.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.serviceConnector.setSocksProxy()
         #self.prepocessor = Preprocessor()
         #self.matrix = Matrix()
         #self.metric = Metrics()
         self.info("[*] deepWebStemmingPlugin Initialized!")
         self.webPorts = [80,443,8080]
     self.pluginConfigs= {"timeOutRequests":config.timeOutRequests}
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebDirBruterPlugin')
     self.setPluginDetails('deepWebDirBruterPlugin', 'Find directories in the specified onion url.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebDirBruterPlugin Initialized!")
     self.bruteForceData = {}
     for torNode in self.torNodes:
         openPorts = []
         for port in torNode.openPorts:
             openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.bruteForceData[torNode.host] = openPorts
     self.separator = ":"
Example #16
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'bruterPlugin')
     self.setPluginDetails('bruterPlugin', "Bruteforce plugin for services in the deep web. TIP: If you run this plugin in SSH Brute force mode, don't activate the -v/..verbose. If you use that option, you'll see a lot of debug message traced by Paramiko library.", '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] bruterPlugin Initialized!")
     self.bruteForceData = {}
     for torNode in self.torNodes:
         openPorts = []
         for port in torNode.openPorts:
             openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.bruteForceData[torNode.host] = openPorts
     self.separator = ":"
Example #17
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebCrawlerPlugin')
     self.setPluginDetails(
         'crawler',
         'Basic crawling tasks against web sites in the TOR network', '1.0',
         'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebFinderPlugin Initialized!")
     self.extractorRulesAllow = [r'^/*']
     self.extractorRulesDeny = ['']
     self.crawlRulesLinks = '//a/@href'
     self.crawlRulesImages = '//img/@src'
     self.dictFile = None
     self.pluginConfigs = {}
Example #18
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebStemmingPlugin')
     self.setPluginDetails(
         'stemming',
         'Basic stemming tasks against hidden services in the TOR network. Uses IRL library to find terms in hidden services in the TOR network.',
         '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.serviceConnector.setSocksProxy()
         #self.prepocessor = Preprocessor()
         #self.matrix = Matrix()
         #self.metric = Metrics()
         self.info("[*] deepWebStemmingPlugin Initialized!")
         self.webPorts = [80, 443, 8080]
     self.pluginConfigs = {"timeOutRequests": config.timeOutRequests}
Example #19
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'niktoPlugin')
     self.setPluginDetails('nikto', 'Plugin to execute tests with nikto.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] NiktoPlugin Initialized!")
         self.niktoData = {}
         for torNode in self.torNodes:
             openPorts = []
             for port in torNode.openPorts:
                 openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.niktoData[torNode.host] = openPorts
         print self.niktoData
     self.pluginConfigs= {}
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebDirBruterPlugin')
     self.setPluginDetails('dirBruter',
                           'Find directories in the specified onion url.',
                           '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebDirBruterPlugin Initialized!")
     self.bruteForceData = {}
     for torNode in self.torNodes:
         openPorts = []
         for port in torNode.openPorts:
             openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.bruteForceData[torNode.host] = openPorts
     self.separator = ":"
     self.pluginConfigs = {}
Example #21
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'shodanPlugin')
     self.info("[*] shodanPlugin Initialized!")
Example #22
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'niktoPlugin')
     self.info("[*] NiktoPlugin Initialized!")
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'maliciousHiddenServicePlugin')
     self.setPluginDetails('hiddenService', 'Creates a malicious hidden service in TOR network and tries to de-anonimyze the users.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] maliciousHiddenServicePlugin Initialized!")
     self.pluginConfigs= {}
Example #24
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebDirBruterPlugin')
     self.setPluginDetails('deepWebDirBruterPlugin', 'Find directories in the specified onion url.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebDirBruterPlugin Initialized!")
Example #25
0
 def processPluginArguments(self):
     BasePlugin.processPluginArguments(self)
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'feedOnionRepositoryPlugin')
     self.setPluginDetails('feedOnionRepositoryPlugin', 'Try to search for hidden services in searchers of deep web like TorCH or AhMIA. The information gathered will be validated and then inserted in the onion repository tables.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] feedOnionRepositoryPlugin Initialized!")
     self.pluginConfigs= {}
Example #27
0
 def processPluginArguments(self):
     BasePlugin.processPluginArguments(self)
Example #28
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
Example #29
0
 def __init__(self,torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
     self.nessusClient = NessusClient(config.nessusHost, config.nessusPort)
     self.nessusClient.login(config.nessusUser, config.nessusPass)
     self.info("[*] NessusPlugin Initialized!")
Example #30
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'shodanPlugin')
     self.setPluginDetails('shodanPlugin', 'Plugin to gather information using the Shodan Database.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] shodanPlugin Initialized!")
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, "infoGatheringPlugin")
     self.setPluginDetails("infoGathering", "Information Gathering of Tor relays.", "1.0", "Adastra: @jdaanial")
     if len(torNodes) > 0:
         self.info("[*] infoGatheringPlugin Initialized!")
     self.pluginConfigs = {}
Example #32
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'niktoPlugin')
     self.info("[*] NiktoPlugin Initialized!")
Example #33
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'deepWebStemmingPlugin')
     self.setSocksProxy()
     self.info("[*] DeepWebPlugin Initialized!")
Example #34
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'infoGatheringPlugin')
     self.setPluginDetails('infoGatheringPlugin', 'Information Gathering of Tor relays.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] infoGatheringPlugin Initialized!")
Example #36
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'examplePlugin')
     self.setPluginDetails('examplePlugin', 'Example of a plugin in Tortazo.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] examplePlugin Initialized!")
     self.pluginConfigs= {}
Example #37
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'simplePrinter')
     self.info("[*] simplePrinter Initialized!")
Example #38
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
     self.nessusClient = NessusClient(config.nessusHost, config.nessusPort)
     self.nessusClient.login(config.nessusUser, config.nessusPass)
     self.info("[*] NessusPlugin Initialized!")