#version 1.1 import sys import os if sys.platform == 'linux': import readline path = os.path.abspath('.') if 'tools' in path.replace('\\', '/').split('/'): path = path.split('tools', maxsplit=1)[0] + 'Library/utils' else: path = path + '/Library/utils' if not path in (p.replace('\\', '/') for p in sys.path): sys.path.append(path) from py_env_util import PY_ENV_CL pyenv = PY_ENV_CL(None, 2).get_pyenv() sqlmap_config = './Library/sqlmap/config.ini' def read_config(): global sqlmap_config if os.path.exists(sqlmap_config): f = open(sqlmap_config, 'r', encoding='utf-8') config = f.read().strip().split('\n')[0] return config return None def check_config(config): if os.path.exists(config): return True
#coding=utf-8 #version 1.0 import sys import os path = os.path.abspath('.') if 'tools' in path.replace('\\', '/').split('/'): #这里是为了便于开发调试 path = path.split('tools', maxsplit=1)[0] + 'Library/utils' else: path = path + '/Library/utils' if not path in (p.replace('\\', '/') for p in sys.path): sys.path.append(path) from py_env_util import PY_ENV_CL, PY_PIP_CI pyenv = PY_ENV_CL('upload-fuzz-dic-builder').get_pyenv() if len(sys.argv) > 1: arg = '' for i in range(1, len(sys.argv)): arg = arg + ' ' + sys.argv[i] #print(pyenv+' ./Library/upload-fuzz-dic-builder/upload-fuzz-dic-builder.py'+arg) os.system(pyenv + ' ./Library/upload-fuzz-dic-builder/upload-fuzz-dic-builder.py' + arg) exit() notice = ''' author: c0ny1<*****@*****.**> github: https://github.com/c0ny1/upload-fuzz-dic-builder date: 2018-11-04 23:16
import os if sys.platform == 'linux': import readline path = os.path.abspath('.') if 'tools' in path.replace('\\', '/').split('/'): path = path.split('tools', maxsplit=1)[0] + 'Library/utils' else: path = path + '/Library/utils' if not path in (p.replace('\\', '/') for p in sys.path): sys.path.append(path) #print(path) from py_env_util import PY_ENV_CL from auto_input import autokbex_input pyenv = PY_ENV_CL('abuse-ssl-bypass-waf', 2).get_pyenv() abusepy = './Library/abuse-ssl-bypass-waf/abuse-ssl-bypass-waf.py' def run(args): os.system(pyenv + ' ' + abusepy + ' ' + args) def banner(): print('[+]这里是使用ssl协议绕过waf的工具') print('[+]使用了github里的abuse-ssl-bypass-waf') def inputargs(): target = autokbex_input('target(the host ip or domain):') regex = autokbex_input('regex(hit waf keyword or regex)')
#version 2.0 import requests import sys import os path=os.path.abspath('.') if 'tools' in path.replace('\\','/').split('/'): path=path.split('tools',maxsplit=1)[0]+'Library/utils' else: path=path+'/Library/utils' if not path in (p.replace('\\','/') for p in sys.path): sys.path.append(path) #print(path) from py_env_util import PY_ENV_CL pyenv=PY_ENV_CL('linux-soft-exploit-suggester',2).get_pyenv() expsuggesterpy='./Library/linux-soft-exploit-suggester/linux-soft-exploit-suggester.py' from download_util import Aria2_Downloader from pbar import Pbar def run(args): os.system(pyenv+' '+expsuggesterpy+' '+args) def banner(): print('[+]这里是使用linux软件包提权的建议工具') print('[+]使用了github里的linux-soft-exploit-suggester') a=''' Get Package List: debian/ubuntu: dpkg -l > package_list redhat/centos: rpm -qa > package_list''' print('[+]首先需要'+a)
import os import sys from fuzzywuzzy import fuzz from fuzzywuzzy import process path = os.path.abspath('.') if 'tools' in path.replace('\\', '/').split('/'): path = path.split('tools', maxsplit=1)[0] + 'Library/utils' else: path = path + '/Library/utils' if not path in (p.replace('\\', '/') for p in sys.path): sys.path.append(path) from py_env_util import PY_ENV_CL, PY_PIP_CI python2_env = PY_ENV_CL('cves', 2).get_pyenv() python3_env = PY_ENV_CL('cves', 3).get_pyenv() PY_PIP_CI(python2_env).ensure('paramiko') #base='C:\\Tools\\pytools' base = '.' cvebase = base + '/Library/cves/' guess_list = [] #cache def scan_files(directory, prefix=None, postfix=None): files_list = [] for root, sub_dirs, files in os.walk(directory): for special_file in files:
import os import time import shutil if sys.platform == 'linux': import readline path = os.path.abspath('.') if 'tools' in path.replace('\\', '/').split('/'): path = path.split('tools', maxsplit=1)[0] + 'Library/utils' else: path = path + '/Library/utils' if not path in (p.replace('\\', '/') for p in sys.path): sys.path.append(path) from py_env_util import PY_ENV_CL, PY_PIP_CI from auto_input import autokbex_input pyenv = PY_ENV_CL('Windows-Exploit-Suggester', 2).get_pyenv() expsuggesterpy = './Library/Windows-Exploit-Suggester/Windows-Exploit-Suggester.py' PY_PIP_CI(pyenv).ensure('xlrd') def run(args): os.system(pyenv + ' ' + expsuggesterpy + ' ' + args) def banner(): print('[+]这里是使用windows内核信息提权的建议工具') print('[+]使用了github里的Windows-Exploit-Suggester') print('[+]首先需要目标机的systeminfo文件') print('[+]支持自动检测数据库过期情况')
def read_files(flist): result=[] for l in flist: with open(l,'r',encoding='utf-8') as f: for line in f: if line.startswith('#'): result.append((l,line[1:].strip())) break return result def show_files(flist): for index,f in enumerate(flist): print(index+1,'->',f[1]) if __name__ == "__main__": pypath=PY_ENV_CL(None,3).get_pyenv() r=read_files(scan_file()) print('[+]找到',len(r),'个转换脚本') show_files(r) while 1: uin=input('WebcastRealUrl-index>').strip() if uin=='':continue if uin=='exit()':exit(0) index=int(uin) target=r[index-1] os.system(pypath+' '+target[0])