Пример #1
0
def auxil(web):

    print ''
    time.sleep(0.3)
    print W+'\n [*] Type Selected : Auxillaries...\n'
    auxilban()
    v = raw_input (''+GR+'  [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END)
    print ''
    if v == '1':
	print ' [!] Type Selected : Bruteforce Modules'
	brutemods(web)
	print '\n\n'
	auxil(web)

    elif v == '2':
	print ' [!] Type Selected : Encode Strings'
	encodeall()
	print '\n\n'
	auxil(web)

    elif v == '99':
	print GR+' [*] Going back!'
	vulnban1()
	vuln_dup(web)
	time.sleep(0.6)
Пример #2
0
def vuln(web):

    v = raw_input(''+O+' \033[4mTID\033[1;0m '+GR+':> ' + color.END)
    print '\n'

    if v == '1':
	webbugs_alt(web)

    elif v == '2':
	serbugs(web)

    elif v == '3':
	auxil(web)

    elif v == '99':
	print '[!] Back'
	time.sleep(0.7)

    else:
	dope = ['You high dude?','Hey there! Enter a valid option','Whoops! Thats not an option','Sorry fam! You just typed shit']
	print dope[randint(0,3)]
	time.sleep(0.7)
	os.system('clear')
	vulnban1()
	vuln(web)
Пример #3
0
def serbugs(web):

    print GR + '\n [*] Loading module...'
    serbugsban()
    v = raw_input('' + O + ' \033[4mTID\033[1;0m ' + GR + ':> ' + color.END)
    print '\n'
    if v == '1':
        print ' Type Selected : LFI'
        lfi(web)
        time.sleep(1)
        serbugs(web)

    elif v == '2':
        print ' Type Selected : RFI'
        rfi(web)
        time.sleep(1)
        serbugs(web)

    elif v == '3':
        print ' Type Selected : RCE'
        rce(web)
        time.sleep(1)
        serbugs(web)

    elif v == '4':
        print ' Type Selected : Path Traversal'
        pathtrav(web)
        time.sleep(1)
        serbugs(web)

    elif v == '5':
        print ' Type Selected : CSRF'
        csrf(web)
        time.sleep(1)
        serbugs(web)

#   elif v == '6':
#	print ' Type Selected : XSS'
#	xss(web)
#	time.sleep(1)
#	serbugs(web)

    elif v == '7':
        print ' Type Selected : SQLi'
        sqli(web)
        time.sleep(1)
        serbugs(web)

    elif v == '8':
        print ' Type Selected : HTTP Response Splitting'
        crlf(web)
        time.sleep(1)
        serbugs(web)

    elif v == '9':
        print ' Type Selected : Host Header Injection'
        hhi(web)
        time.sleep(1)
        serbugs(web)

    elif v == '10':
        print ' Type Selected : Shellshock'
        shellshock(web)
        time.sleep(1)
        serbugs(web)

    elif v == '11':
        print ' Type Selected : URL Validation'
        redirect(web)
        time.sleep(1)
        serbugs(web)

    elif v == 'A':
        print ' [!] Type Selected : All Modules'
        time.sleep(0.5)

        print ' [*] Firing up module --> LFI'
        lfi(web)
        print ' [!] Module Completed --> LFI\n'
        time.sleep(1)

        print ' [*] Firing up module --> RFI '
        rfi(web)
        print ' [!] Module Completed --> RFI \n'
        time.sleep(1)

        print ' [*] Firing up module --> RCE'
        rce(web)
        print ' [!] Module Completed --> RCE\n'
        time.sleep(1)

        print ' [*] Firing up module --> Path Traversal'
        pathtrav(web)
        print ' [!] Module Completed --> Path Traversal\n'
        time.sleep(1)

        print ' [*] Firing up module --> CSRF'
        csrf(web)
        print ' [!] Module Completed --> CSRF\n'
        time.sleep(1)

        #	print ' [*] Firing up module --> XSS '
        #	xss(web)
        #	print ' [!] Module Completed --> XSS \n'
        #	time.sleep(1)

        print ' [*] Firing up module --> SQLi'
        sqli(web)
        print ' [!] Module Completed --> SQLi\n'
        time.sleep(1)

        print ' [*] Firing up module --> CRLF'
        crlf(web)
        print ' [!] Module Completed --> CRLF\n'
        time.sleep(1)

        print ' [*] Firing up module --> Host Header Injection'
        hhi(web)
        print ' [!] Module Completed --> Host Header Injection\n'
        time.sleep(0.5)

        print ' [*] Firing up module --> ShellShock'
        shellshock(web)
        print ' [!] Module Completed --> ShellShock\n'
        time.sleep(1)

        print ' [*] Firing up module --> URL Forwards'
        redirect(web)
        print ' [!] Module Completed --> Url Forwards\n'
        time.sleep(0.5)
        print G + ' [+] All modules successfully completed!'
        time.sleep(4)
        vulnban1()
        vuln(web)

    elif v == '99':
        print '[!] Back'
        time.sleep(0.7)
        vulnban1()
        vuln(web)

    else:
        print ''
        dope = [
            'You high dude?', 'Hey there! Enter a valid option',
            'Whoops! Thats not an option', 'Sorry fam! You just typed shit'
        ]
        print dope[randint(0, 3)]
        time.sleep(0.7)
        os.system('clear')

        time.sleep(1)
        serbugs(web)