Пример #1
0
def tid_alt(web):

    while True:

        try:

            dispmenu()
            zop = raw_input('' + GR + ' [#] \033[1;4mTID\033[0m' + GR +
                            ' :> ' + color.END)

            if zop == '1':

                print '\n'
                print G + ' [+] Module loaded : Reconnaissance'
                footprintban()
                footprint(web)

            elif zop == '2':

                print '\n'
                print G + ' [+] Module loaded : Scanning & Enumeration'
                scanenumban()
                sca_alt(web)

            elif zop == '3':

                print '\n'
                vulnban()
                vuln(web)

            elif zop == '4':

                print '\n'
                exploitsban()
                exploits(web)

        except KeyboardInterrupt:
            print R + "\n [!] " + color.UNDERLINE + "User Interruption detected!" + color.END
            print GR + ' [!] Stopping jobs...'
            time.sleep(0.4)
            print C + ' [!] Goodbye, see ya!\n'
            sys.exit(0)

            #except Exception as e:
            print R + ' [-] Something happened! :('
            print R + ' [!] Error : ' + str(e)
Пример #2
0
def infodisc(web):

    print " [!] Module Selected : Information Disclosure\n\n"
    infodiscban()
    print ''
    time.sleep(0.3)
    v = raw_input('' + GR + '  [#] \033[1;4mTID\033[0m' + GR + ' :> ' +
                  color.END)
    print ''
    if v == '1':
        print C + ' [!] Type Selected :' + B + ' Credit Card Enumeration'
        credit(web)
        print '\n\n'
        time.sleep(2)
        infodisc(web)

    elif v == '2':
        print C + ' [!] Type Selected :' + B + ' Extract All Emails'
        emailext(web)
        print '\n\n'
        time.sleep(2)
        infodisc(web)

    elif v == '3':
        print C + ' [!] Type Selected :' + B + ' Enumerate Errors + FPD'
        errors(web)
        print '\n\n'
        time.sleep(2)
        infodisc(web)

    elif v == '4':
        print C + ' [!] Type Selected :' + B + ' Internal IP disclosure'
        internalip(web)
        print '\n\n'
        time.sleep(2)
        infodisc(web)

    elif v == '5':
        print C + ' [!] Type Selected :' + B + ' Phone Numbers Extract'
        phone(web)
        print '\n\n'
        time.sleep(2)
        infodisc(web)

    elif v == '6':
        print C + ' [!] Type Selected :' + B + ' Social Security Numbers'
        ssn(web)
        print '\n\n'
        time.sleep(2)
        infodisc(web)

    elif v == 'A':
        print C + ' [!] Type Selected :' + B + ' All Modules'
        time.sleep(0.5)
        print C + ' [*] Firing up module -->' + B + ' Credit Cards'
        credit(web)
        print C + ' [!] Module Completed -->' + B + ' Credit Cards\n'

        time.sleep(1)
        print C + ' [*] Firing up module -->' + B + ' Email Extraction'
        emailext(web)
        print C + ' [!] Module Completed -->' + B + ' Email Hunt\n'

        time.sleep(1)
        print C + ' [*] Firing up module -->' + B + ' Errors Enumeration + FPD'
        errors(web)
        print C + ' [!] Module Completed -->' + B + ' Errors Enumeration\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' Extract Phone Numbers'
        phone(web)
        print C + ' [!] Module Completed -->' + B + ' Extract Phone Numbers\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' Extract Social Security Numbers'
        ssn(web)
        print C + ' [!] Module Completed -->' + B + ' Extract SSN\n'
        time.sleep(1)

        print C + ' [!] All scantypes have been tested on target...'
        time.sleep(1)
        print C + ' [*] Going back to menu...'
        footprintban1()
        footprint(web)

    elif v == '99':
        print C + ' [*] Back to the menu !'
        footprintban1()
        footprint(web)

    else:
        dope = [
            'You high dude?', 'Shit! Enter a valid option',
            'Whoops! Thats not an option', 'Sorry! You just typed shit'
        ]
        print dope[randint(0, 3)]
        time.sleep(0.7)
        os.system('clear')
        infodisc(web)
Пример #3
0
def activeo(web):

    print " [!] Module Selected : Active Reconnaissance\n\n"
    activeban()
    print ''
    time.sleep(0.3)
    v = raw_input('' + GR + '  [#] \033[1;4mTID\033[0m' + GR + ' :> ' +
                  color.END)
    print ''
    if v.strip() == '1':
        print C + ' [!] Type Selected : Ping/NPing Enumeration'
        piwebenum(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '2':
        print C + ' [!] Type Selected : Grab HTTP Headers'
        grabhead(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '3':
        print C + ' [!] Type Selected : HTTP Allowed Methods'
        httpmethods(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '4':
        print C + ' [!] Type Selected : robots.txt and sitemap.xml Hunt'
        robot(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '5':
        print C + ' [!] Type Selected : Subnet Enumeration'
        subnet(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '6':
        print C + ' [!] Type Selected ' + B + ': Traceroute'
        traceroute(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '7':
        print C + ' [!] Type Selected : DNS Hosts'
        sharedns(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '8':
        print C + ' [!] Type Selected : SSL Certificate'
        sslcert(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '9':
        print C + ' [!] Type Selected : CMS Detection'
        cms(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '10':
        print C + ' [!] Type Selected : Server Detection'
        serverdetect(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == '11':
        print C + ' [!] Type Selected : Operating System Fingerprinting'
        osdetect(web)
        print '\n\n'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        activeo(web)

    elif v.strip() == 'A':
        print C + ' [!] Type Selected : All Modules'
        time.sleep(0.5)
        print C + ' [*] Firing up module -->' + B + ' Ping Enum'
        piwebenum(web)
        print C + ' [!] Module Completed -->' + B + ' PIng\n'

        time.sleep(1)
        print C + ' [*] Firing up module -->' + B + ' Grab Headers'
        grabhead(web)
        print C + '\n [!] Module Completed -->' + B + ' Grabhead\n'

        time.sleep(1)
        print C + ' [*] Firing up module -->' + B + ' Robots.txt Hunter'
        robot(web)
        print C + '\n [!] Module Completed -->' + B + ' Robot Hunter\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' Subnet Enumeration'
        subnet(web)
        print C + '\n [!] Module Completed -->' + B + ' Subnet Enumeration\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' Traceroute'
        traceroute(web)
        print C + '\n [!] Module Completed -->' + B + ' Traceroute\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' Shared DNS Servers'
        sharedns(web)
        print C + '\n [!] Module Completed -->' + B + ' Shared DNS Servers\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' SSl Certificate Info'
        sslcert(web)
        print C + '\n [!] Module Completed -->' + B + ' SSl Cert\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' CMS Detection'
        cms(web)
        print C + '\n [!] Module Completed -->' + B + ' CMS Detect\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' Server Detection'
        serverdetect(web)
        print C + '\n [!] Module Completed -->' + B + ' Server Detect\n'
        time.sleep(1)

        print C + ' [*] Firing up module -->' + B + ' OS Fingerprinting'
        osdetect(web)
        print C + '\n [!] Module Completed -->' + B + ' OS Detect\n'
        time.sleep(1)

        print C + '\n [!] All scantypes have been tested on target...'
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print C + ' [*] Going back to menu...'
        time.sleep(3)
        os.system('clear')
        footprintban1()
        footprint(web)

    elif v.strip() == '99':
        print C + ' [*] Back to the menu !'
        os.system('clear')
        footprintban1()
        footprint(web)

    else:
        dope = [
            'You high dude?', 'Shit! Enter a valid option',
            'Whoops! Thats not an option', 'Sorry! You just typed shit'
        ]
        print dope[randint(0, 3)]
        time.sleep(0.7)
        os.system('clear')
        activeo(web)