def init(): init.Author ="RedToor" init.Version ="1.0" init.Description ="DNS fake Server Spoof." init.CodeName ="net/dns.fake" init.DateCreation ="21/07/2016" init.LastModification ="21/07/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'dnspoof' :[get_local_ip() ,False,'DNS/IP spoofed'], 'dnstarget':["www.test.com" ,True ,'DNS Target\'s'] } # EXTRA OPTIONS MODULE init.extra = { # NAME VALUE RQ DESCRIPTION 'ip_server':[get_local_ip() ,True ,'Ip Server'] } # AUX INFORMATION MODULE init.aux = """ dnstarget [Separate DNS with (,)] example : google.com, gmail.com """ return init
def init(): init.Author = "RedToor" init.Version = "1.0" init.Description = "DNS fake Server Spoof." init.CodeName = "net/dns.fake" init.DateCreation = "21/07/2016" init.LastModification = "21/07/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION "dnspoof": [get_local_ip(), False, "DNS/IP spoofed"], "dnstarget": ["www.test.com", True, "DNS Target's"], } # EXTRA OPTIONS MODULE init.extra = { # NAME VALUE RQ DESCRIPTION "ip_server": [get_local_ip(), True, "Ip Server"] } # AUX INFORMATION MODULE init.aux = """ dnstarget [Separate DNS with (,)] example : google.com, gmail.com """ return init
def init(): init.Author = "RedToor" init.Version = "2.0" init.Description = "Ports, OS, Etc Scan to host." init.CodeName = "net/sc.scan" init.DateCreation = "28/11/2015" init.LastModification = "18/05/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'target': [get_local_ip(), True, 'Host Target'], 'mode': ["mode-0", False, 'Port Target'], } init.aux = """ (mode) options -> [mode-0] Intense scan -> [mode-1] Intense scan plus UDP -> [mode-2] Intense scan, all TCP ports -> [mode-3] Intense scan, no ping -> [mode-4] Ping scan -> [mode-5] Quick scan -> [mode-6] Quick scan plus -> [mode-7] Quick traceroute -> [mode-8] Regular scan -> [mode-9] Slow comprehensive scan """ return init
def init(): init.Author ="RedToor" init.Version ="2.0" init.Description ="Ports, OS, Etc Scan to host." init.CodeName ="net/sc.scan" init.DateCreation ="28/11/2015" init.LastModification ="18/05/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'target':[get_local_ip(),True ,'Host Target'], 'mode' :["mode-0" ,False,'Port Target'], } init.aux = """ (mode) options -> [mode-0] Intense scan -> [mode-1] Intense scan plus UDP -> [mode-2] Intense scan, all TCP ports -> [mode-3] Intense scan, no ping -> [mode-4] Ping scan -> [mode-5] Quick scan -> [mode-6] Quick scan plus -> [mode-7] Quick traceroute -> [mode-8] Regular scan -> [mode-9] Slow comprehensive scan """ return init
def main(run): printAlert(3,"Computer") print " | IP Local : ",get_local_ip() print " | Ip Externa : ",get_external_ip() print " | Interfaces : ",get_interfaces() print " | Gateway : ",get_gateway() print " | Machaddress: ",get_my_mac_address() print " | Username : "******" | OS : ",commands.getoutput('uname') print " | Version : ",commands.getoutput('uname -r') printAlert(3,"Katana") print " | Core : ",Information.version print " | Build : ",Information.build Space()
def init(): init.Author ="RedToor" init.Version ="2.1" init.Description ="Host's live scanner in LAN" init.CodeName ="net/sc.hosts" init.DateCreation ="22/08/2015" init.LastModification ="16/05/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'range':[get_local_ip()+"/24" ,True ,'Range Scan'], } return init
def init(): init.Author = "RedToor" init.Version = "1.0" init.Description = "Generator's payload with Metasploit" init.CodeName = "msf/back.door" init.DateCreation = "07/10/2016" init.LastModification = "07/10/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'host': [get_local_ip(), True, 'Output path'], 'port': ["4444", True, 'Output path'], 'output': ["/home/backdoor.exe", True, 'Output path'], 'platform': ["windows", True, 'Plataform'], 'payload': ["windows/shell/bind_tcp", True, 'Payload'], 'encoder': ["x86/shikata_ga_nai", True, 'Encoder type'], 'arch': ["x86", False, 'Architecture'], 'format': ["exe", False, 'Output format'] } init.extra = { # NAME VALUE RQ DESCRIPTION 'iterations': ["3", False, 'Output path'], 'badchars': ["\\x00\\xff", False, 'Number to re-encode'] } init.aux = " \n PLATAFORMS {windows,linux,android,java,ruby,netware,unix,php,aix, \n" init.aux += " nodejs,netbsd,openbsd,freebsd,firefox,bsd,solaris,cisco,javascript}\n" init.aux += " \n ARCHUTECTURE {x86,x64}\n" init.aux += " \n ENCODERS\n" init.aux += " {cmd/generic_sh,cmd/ifs,cmd/printf_php_mq,generic/none,php/base64,x86/alpha_upper,\n" init.aux += " ppc/longxor,ppc/longxor_tag,sparc/longxor_tag,x64/xor,x86/alpha_mixed,x86/context_cpuid,\n" init.aux += " x86/avoid_underscore_tolower,x86/avoid_utf8_tolower,x86/bloxor,x86/call4_dword_xor,\n" init.aux += " x86/context_stat,x86/context_time,x86/countdown,x86/fnstenv_mov,x86/jmp_call_additive,\n" init.aux += " x86/nonalpha,x86/nonupper,x86/shikata_ga_nai,x86/single_static_bit,x86/unicode_mixed,x86/unicode_upper}\n" return init