def wp_menu(): global ch mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} WP sites that are running the Wordfence WAF [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Search for WP configuration files [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Finds config files for MySQL, ABSPATH, WP [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Search for backed-up database.sql files [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Log information for vulnerable WP sites [5] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Debug log in vulnerable WP sites [6] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} SQL dump files of WP sites [7] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Webshell Upload. WordPress Levo-Slideshow [8] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} MAC OS X WP Information [9] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} wp-config Database password of vulnerable WP sites [10] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find vulnerable wp-config.php files [11] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Search for misconfigured WP sites [12] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Search for sensitive data, db in public folders [13] ''') ch = int(input(" --> ")) print('\n\n')
def url_menu(): global ch2 mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find with specific terms in website titles [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find with specific terms in website URL's [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find Website [3] ''') ch2 = int(input(" --> ")) print('\n\n')
def information_menu(): global ch5 mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Definition [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Information [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Stocks [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Maps [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Weather [5] ''') ch5 = int(input(" --> ")) print('\n\n')
def dorkify_menu(): global ch mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Google Search [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} URL Search [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Books [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Music Downloads [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Information [5] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Dork Hacks! [6] ''') ch = int(input(" --> ")) print('\n\n')
def ftp_menu(): global ch mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Detect vulnerable FTP sites [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Finding potential log files in FTP servers [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find open FTP Servers [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find admin folders on FTP servers [4] ''') ch = int(input(" --> ")) print('\n\n')
def hacking_menu(): global ch6 mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Wordpress Site Dorks [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find WordPress websites that are running the Wordfence WAF [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find vulnerable Usernames and Passwords [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find vulnerable CCTV cameras [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find vulnerable Web Servers [5] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Search for Log files [6] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Find open FTP Servers [7] ''') ch6 = int(input(" --> ")) print('\n\n')
def camera_menu(): global ch mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Camera 1 [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Camera 2 [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Liveapplet Cam [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Public CCTV 1 [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Public CCTV 2 [5] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Public CCTV 3 [6] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Multiple CCTV gallery [7] ' ''') ch = int(input(" --> ")) print('\n\n')
def userpass_menu(): global ch mods.clear_screen() logo.dorkify_logo() print(f''' CHOOSE OPTION : {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Vulnerable log files containing passwords [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Less secured password files [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Vulnerable passwords list [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Vulnerable password DAT files [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} SQL files vulnerable passwords [5] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Vulnerable password text files [6] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Vulnerable password files [7] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Web pages with User lists [8] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Search for database password files [9] ''') ch = int(input(" --> ")) print('\n\n')
{colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Google Search [1] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} URL Search [2] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Books [3] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Music Downloads [4] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Information [5] {colors.bcolors.OKBLUE}[~]{colors.bcolors.ENDC} Dork Hacks! [6] ''') ch = int(input(" --> ")) print('\n\n') # WordPress if args['wp']: logo.dorkify_logo() print(notice) yn = input() if yn == 'y' or yn == 'Y': wp.wordpress() else: print('YOU MUST AGREE TO THE TERMS') sys.exit() # Username & Passwords if args['up']: logo.dorkify_logo() print(notice) yn = input() if yn == 'y' or yn == 'Y':