PytheM is a python pentesting framework. Same has been developed in the hope that it will be useful and i don't take responsabillity of any misapplication of it. Only for GNU/Linux OS, check wiki to see examples:
https://github.com/m4n3dw0lf/PytheM/wiki
#Installation
$sudo git clone https://github.com/m4n3dw0lf/PytheM/
(OPTIONAL)
plug your Arduino Leonardo
open the arduino IDE > Tools > Board then select Arduino Leonardo
go to Tools> Serial port and check the serial port of the Arduino Leonardo
press CTRL+O
navigate to the directory: path/../PytheM/core/heart/jarvis/
select the jarvis.ino file then upload to the Arduino Leonardo.
(CLOSE OPTIONAL)
$cd PytheM
$sudo pip install -r requirements.txt
$sudo ./pythem
#Features
-
help: Print this help message.
-
exit/quit: Leave the program.
-
set: Set a parameter value.
parameters:
- interface
- gateway
- target
- file
- arpmode
examples:
pythem> set interface |open input to set
- scan Make a tcp/manualport/arp scan.
(Should be called after setting interface and target)
examples:
pythem> scan
- arpspoof Start or stop a arpspoofing attack.
(Optional setting arpmode to select arpspoofing mode should be filled with rep or req)
(rep to spoof responses, req to spoof requests)
arguments:
- start
- stop
examples:
arpspoof start
arpspoof stop
- dnsspoof Start a dnsspoofing attack.
(Should be called after a arpspoofing attack have been started)
examples:
pythem> dnsspoof start
pythem> dnsspoof stop
- sniff Start sniffing packets.
(Should be called after setting interface)
examples:
pythem> sniff
[+] Enter the filter: port 1337 and host 10.0.1.5 | tcpdump like format
- pforensic Start a packet-analyzer
(Should be called after setting interface and file with a .pcap file)
examples:
pythem> pforensic
pforensic> help
- brute-force Start a brute-force attack.
(Should be called after setting target and wordlist file path)
arguments:
- ssh | ip address as target
- url | url (with http:// or https://) as target
- webform | url (with http:// or https://)as target
examples:
pythem> brute-force webform
pythem> brute-force ssh
- geoip Geolocalizate approximately the location of a IP address.
(Should be called after setting target (Ip address))
examples:
pythem> geoip
-
decode and encode: Decode or encode a string with choosen pattern
examples:
pythem> decode base64
pythem> encode ascii -
cookiedecode Decode a base64 url encoded cookie value.
example:
pythem> cookiedecode
- Anything else will be executed in the terminal like cd, ls, nano, cat, etc. *
(+) Call the voice-controlled assistant Jarvis
link: https://github.com/m4n3dw0lf/Jarvis
- jarvis
type jarvis-help to see the jarvis help page.
examples:
pythem> jarvis
pythem> jarvis-help
by: m4n3dw0lf