Exemplo n.º 1
0
def init():
	init.Author             ="RedToor"
	init.Version            ="1.0"
	init.Description        ="DNS fake Server Spoof."
	init.CodeName           ="net/dns.fake"
	init.DateCreation       ="21/07/2016"      
	init.LastModification   ="21/07/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME    VALUE              RQ     DESCRIPTION
		'dnspoof'  :[get_local_ip() ,False,'DNS/IP spoofed'],
		'dnstarget':["www.test.com" ,True ,'DNS Target\'s']
	}
	# EXTRA OPTIONS MODULE
	init.extra = {
		# NAME    VALUE              RQ     DESCRIPTION
		'ip_server':[get_local_ip() ,True ,'Ip Server']
	}
	# AUX INFORMATION MODULE
	init.aux = """
 dnstarget [Separate DNS with (,)] example : google.com, gmail.com
 """
	return init
Exemplo n.º 2
0
def init():
    init.Author = "RedToor"
    init.Version = "1.0"
    init.Description = "DNS fake Server Spoof."
    init.CodeName = "net/dns.fake"
    init.DateCreation = "21/07/2016"
    init.LastModification = "21/07/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME    VALUE              RQ     DESCRIPTION
        "dnspoof": [get_local_ip(), False, "DNS/IP spoofed"],
        "dnstarget": ["www.test.com", True, "DNS Target's"],
    }
    # EXTRA OPTIONS MODULE
    init.extra = {
        # NAME    VALUE              RQ     DESCRIPTION
        "ip_server": [get_local_ip(), True, "Ip Server"]
    }
    # AUX INFORMATION MODULE
    init.aux = """
 dnstarget [Separate DNS with (,)] example : google.com, gmail.com
 """
    return init
Exemplo n.º 3
0
def init():
    init.Author = "RedToor"
    init.Version = "2.0"
    init.Description = "Ports, OS, Etc Scan to host."
    init.CodeName = "net/sc.scan"
    init.DateCreation = "28/11/2015"
    init.LastModification = "18/05/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME    VALUE          RQ     DESCRIPTION
        'target': [get_local_ip(), True, 'Host Target'],
        'mode': ["mode-0", False, 'Port Target'],
    }

    init.aux = """
 (mode) options
 -> [mode-0] Intense scan
 -> [mode-1] Intense scan plus UDP 
 -> [mode-2] Intense scan, all TCP ports
 -> [mode-3] Intense scan, no ping
 -> [mode-4] Ping scan
 -> [mode-5] Quick scan
 -> [mode-6] Quick scan plus                  	
 -> [mode-7] Quick traceroute 
 -> [mode-8] Regular scan
 -> [mode-9] Slow comprehensive scan
	"""
    return init
Exemplo n.º 4
0
def init():
	init.Author             ="RedToor"
	init.Version            ="2.0"
	init.Description        ="Ports, OS, Etc Scan to host."
	init.CodeName           ="net/sc.scan"
	init.DateCreation       ="28/11/2015"      
	init.LastModification   ="18/05/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME    VALUE          RQ     DESCRIPTION
		'target':[get_local_ip(),True ,'Host Target'],
		'mode'  :["mode-0"      ,False,'Port Target'],
	}

	init.aux = """
 (mode) options
 -> [mode-0] Intense scan
 -> [mode-1] Intense scan plus UDP 
 -> [mode-2] Intense scan, all TCP ports
 -> [mode-3] Intense scan, no ping
 -> [mode-4] Ping scan
 -> [mode-5] Quick scan
 -> [mode-6] Quick scan plus                  	
 -> [mode-7] Quick traceroute 
 -> [mode-8] Regular scan
 -> [mode-9] Slow comprehensive scan
	"""
	return init
Exemplo n.º 5
0
def main(run):
	printAlert(3,"Computer")
	print "       | IP Local   : ",get_local_ip()
	print "       | Ip Externa : ",get_external_ip()
	print "       | Interfaces : ",get_interfaces()
	print "       | Gateway    : ",get_gateway()
	print "       | Machaddress: ",get_my_mac_address()	
	print "       | Username   : "******"       | OS         : ",commands.getoutput('uname')
	print "       | Version    : ",commands.getoutput('uname -r')
	printAlert(3,"Katana")
	print "       | Core       : ",Information.version
	print "       | Build      : ",Information.build
	Space()
Exemplo n.º 6
0
def init():
	init.Author             ="RedToor"
	init.Version            ="2.1"
	init.Description        ="Host's live scanner in LAN"
	init.CodeName           ="net/sc.hosts"
	init.DateCreation       ="22/08/2015"      
	init.LastModification   ="16/05/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME    VALUE     RQ     DESCRIPTION
		'range':[get_local_ip()+"/24" ,True ,'Range Scan'],
	}
	return init
Exemplo n.º 7
0
def init():
	init.Author             ="RedToor"
	init.Version            ="2.1"
	init.Description        ="Host's live scanner in LAN"
	init.CodeName           ="net/sc.hosts"
	init.DateCreation       ="22/08/2015"      
	init.LastModification   ="16/05/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME    VALUE     RQ     DESCRIPTION
		'range':[get_local_ip()+"/24" ,True ,'Range Scan'],
	}
	return init
Exemplo n.º 8
0
def init():
    init.Author = "RedToor"
    init.Version = "1.0"
    init.Description = "Generator's payload with Metasploit"
    init.CodeName = "msf/back.door"
    init.DateCreation = "07/10/2016"
    init.LastModification = "07/10/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME    VALUE                       RQ     DESCRIPTION
        'host': [get_local_ip(), True, 'Output path'],
        'port': ["4444", True, 'Output path'],
        'output': ["/home/backdoor.exe", True, 'Output path'],
        'platform': ["windows", True, 'Plataform'],
        'payload': ["windows/shell/bind_tcp", True, 'Payload'],
        'encoder': ["x86/shikata_ga_nai", True, 'Encoder type'],
        'arch': ["x86", False, 'Architecture'],
        'format': ["exe", False, 'Output format']
    }

    init.extra = {
        # NAME       VALUE                    RQ     DESCRIPTION
        'iterations': ["3", False, 'Output path'],
        'badchars': ["\\x00\\xff", False, 'Number to re-encode']
    }

    init.aux = " \n PLATAFORMS {windows,linux,android,java,ruby,netware,unix,php,aix, \n"
    init.aux += " nodejs,netbsd,openbsd,freebsd,firefox,bsd,solaris,cisco,javascript}\n"
    init.aux += " \n ARCHUTECTURE {x86,x64}\n"
    init.aux += " \n ENCODERS\n"
    init.aux += " {cmd/generic_sh,cmd/ifs,cmd/printf_php_mq,generic/none,php/base64,x86/alpha_upper,\n"
    init.aux += " ppc/longxor,ppc/longxor_tag,sparc/longxor_tag,x64/xor,x86/alpha_mixed,x86/context_cpuid,\n"
    init.aux += " x86/avoid_underscore_tolower,x86/avoid_utf8_tolower,x86/bloxor,x86/call4_dword_xor,\n"
    init.aux += " x86/context_stat,x86/context_time,x86/countdown,x86/fnstenv_mov,x86/jmp_call_additive,\n"
    init.aux += " x86/nonalpha,x86/nonupper,x86/shikata_ga_nai,x86/single_static_bit,x86/unicode_mixed,x86/unicode_upper}\n"

    return init