Пример #1
0
 def __init__(self,torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
     self.setPluginDetails('NessusPlugin', 'Plugin developed to interact with the REST API of Nessus. Uses pynessus-rest library', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.nessusClient = NessusClient(config.nessusHost, config.nessusPort)
         self.nessusClient.login(config.nessusUser, config.nessusPass)
         self.info("[*] NessusPlugin Initialized!")
Пример #2
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'w3afPlugin')
     self.info("[*] w3afPlugin Initialized!")
     self.w3afCorePlugin = w3afCore()
     self.w3afCorePlugin.plugins.init_plugins()
     self.w3afCorePlugin.plugins.zero_enabled_plugins()
     self.miscSettings = MiscSettings()
Пример #3
0
    def __init__(self, torNodes=[]):
        BasePlugin.__init__(self, torNodes, 'heartBleedPlugin')
        self.setPluginDetails('heartBleed', 'Performs the HeartBleed vulnerability test against a single target or all TOR exit nodes found.', '1.0', 'Adastra: @jdaanial')
        if len(torNodes) > 0:
            self.info("[*] heartBleedPlugin Initialized!")

        self.pluginConfigs= {}
Пример #4
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'infoGatheringPlugin')
     self.setPluginDetails('infoGathering',
                           'Information Gathering of Tor relays.', '1.0',
                           'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] infoGatheringPlugin Initialized!")
     self.pluginConfigs = {}
Пример #5
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'examplePlugin')
     self.setPluginDetails('examplePlugin',
                           'Example of a plugin in Tortazo.', '1.0',
                           'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] examplePlugin Initialized!")
     self.pluginConfigs = {}
Пример #6
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebCrawlerPlugin')
     self.setPluginDetails('deepWebFinderPlugin', 'Basic crawling tasks against web sites in the TOR network', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebFinderPlugin Initialized!")
     self.extractorRules=[r'^/*']
     self.crawlRulesLinks = '//a/@href'
     self.crawlRulesImages = '//img/@src'
Пример #7
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'deepWebPlugin')
     self.setSocksProxy()
     #self.prepocessor = Preprocessor()
     #self.matrix = Matrix()
     #self.metric = Metrics()
     self.info("[*] deepWebStemmingPlugin Initialized!")
     self.webPorts = [80, 443, 8080]
Пример #8
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'deepWebPlugin')
     self.setSocksProxy()
     #self.prepocessor = Preprocessor()
     #self.matrix = Matrix()
     #self.metric = Metrics()
     self.info("[*] deepWebStemmingPlugin Initialized!")
     self.webPorts = [80,443,8080]
Пример #9
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'w3afPlugin')
     self.setPluginDetails('w3afPlugin', 'Plugin to load the W3AF context in Tortazo. You can execute W3AF against the TOR deep web.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] w3afPlugin Initialized!")
         self.w3afCorePlugin = w3afCore()
         self.w3afCorePlugin.plugins.init_plugins()
         self.w3afCorePlugin.plugins.zero_enabled_plugins()
         self.miscSettings = MiscSettings()
Пример #10
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'maliciousHiddenServicePlugin')
     self.setPluginDetails(
         'hiddenService',
         'Creates a malicious hidden service in TOR network and tries to de-anonimyze the users.',
         '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] maliciousHiddenServicePlugin Initialized!")
     self.pluginConfigs = {}
Пример #11
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'shodanPlugin')
     self.setPluginDetails(
         'shodan',
         'Plugin to gather information using the Shodan Database.', '1.0',
         'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] shodanPlugin Initialized!")
     self.pluginConfigs = {}
Пример #12
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'feedOnionRepositoryPlugin')
     self.setPluginDetails(
         'feedOnionRepositoryPlugin',
         'Try to search for hidden services in searchers of deep web like TorCH or AhMIA. The information gathered will be validated and then inserted in the onion repository tables.',
         '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] feedOnionRepositoryPlugin Initialized!")
     self.pluginConfigs = {}
Пример #13
0
    def __init__(self, torNodes=[]):
        BasePlugin.__init__(self, torNodes, 'heartBleedPlugin')
        self.setPluginDetails(
            'heartBleed',
            'Performs the HeartBleed vulnerability test against a single target or all TOR exit nodes found.',
            '1.0', 'Adastra: @jdaanial')
        if len(torNodes) > 0:
            self.info("[*] heartBleedPlugin Initialized!")

        self.pluginConfigs = {}
Пример #14
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebStemmingPlugin')
     self.setPluginDetails('stemming', 'Basic stemming tasks against hidden services in the TOR network. Uses IRL library to find terms in hidden services in the TOR network.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.serviceConnector.setSocksProxy()
         #self.prepocessor = Preprocessor()
         #self.matrix = Matrix()
         #self.metric = Metrics()
         self.info("[*] deepWebStemmingPlugin Initialized!")
         self.webPorts = [80,443,8080]
     self.pluginConfigs= {"timeOutRequests":config.timeOutRequests}
Пример #15
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebDirBruterPlugin')
     self.setPluginDetails('deepWebDirBruterPlugin', 'Find directories in the specified onion url.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebDirBruterPlugin Initialized!")
     self.bruteForceData = {}
     for torNode in self.torNodes:
         openPorts = []
         for port in torNode.openPorts:
             openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.bruteForceData[torNode.host] = openPorts
     self.separator = ":"
Пример #16
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'bruterPlugin')
     self.setPluginDetails('bruterPlugin', "Bruteforce plugin for services in the deep web. TIP: If you run this plugin in SSH Brute force mode, don't activate the -v/..verbose. If you use that option, you'll see a lot of debug message traced by Paramiko library.", '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] bruterPlugin Initialized!")
     self.bruteForceData = {}
     for torNode in self.torNodes:
         openPorts = []
         for port in torNode.openPorts:
             openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.bruteForceData[torNode.host] = openPorts
     self.separator = ":"
Пример #17
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebCrawlerPlugin')
     self.setPluginDetails(
         'crawler',
         'Basic crawling tasks against web sites in the TOR network', '1.0',
         'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebFinderPlugin Initialized!")
     self.extractorRulesAllow = [r'^/*']
     self.extractorRulesDeny = ['']
     self.crawlRulesLinks = '//a/@href'
     self.crawlRulesImages = '//img/@src'
     self.dictFile = None
     self.pluginConfigs = {}
Пример #18
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebStemmingPlugin')
     self.setPluginDetails(
         'stemming',
         'Basic stemming tasks against hidden services in the TOR network. Uses IRL library to find terms in hidden services in the TOR network.',
         '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.serviceConnector.setSocksProxy()
         #self.prepocessor = Preprocessor()
         #self.matrix = Matrix()
         #self.metric = Metrics()
         self.info("[*] deepWebStemmingPlugin Initialized!")
         self.webPorts = [80, 443, 8080]
     self.pluginConfigs = {"timeOutRequests": config.timeOutRequests}
Пример #19
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'niktoPlugin')
     self.setPluginDetails('nikto', 'Plugin to execute tests with nikto.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] NiktoPlugin Initialized!")
         self.niktoData = {}
         for torNode in self.torNodes:
             openPorts = []
             for port in torNode.openPorts:
                 openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.niktoData[torNode.host] = openPorts
         print self.niktoData
     self.pluginConfigs= {}
Пример #20
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebDirBruterPlugin')
     self.setPluginDetails('dirBruter',
                           'Find directories in the specified onion url.',
                           '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebDirBruterPlugin Initialized!")
     self.bruteForceData = {}
     for torNode in self.torNodes:
         openPorts = []
         for port in torNode.openPorts:
             openPorts.append(port.port)
             if len(openPorts) > 0:
                 self.bruteForceData[torNode.host] = openPorts
     self.separator = ":"
     self.pluginConfigs = {}
Пример #21
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'shodanPlugin')
     self.info("[*] shodanPlugin Initialized!")
Пример #22
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'niktoPlugin')
     self.info("[*] NiktoPlugin Initialized!")
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'maliciousHiddenServicePlugin')
     self.setPluginDetails('hiddenService', 'Creates a malicious hidden service in TOR network and tries to de-anonimyze the users.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] maliciousHiddenServicePlugin Initialized!")
     self.pluginConfigs= {}
Пример #24
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'deepWebDirBruterPlugin')
     self.setPluginDetails('deepWebDirBruterPlugin', 'Find directories in the specified onion url.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] deepWebDirBruterPlugin Initialized!")
Пример #25
0
 def processPluginArguments(self):
     BasePlugin.processPluginArguments(self)
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'feedOnionRepositoryPlugin')
     self.setPluginDetails('feedOnionRepositoryPlugin', 'Try to search for hidden services in searchers of deep web like TorCH or AhMIA. The information gathered will be validated and then inserted in the onion repository tables.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] feedOnionRepositoryPlugin Initialized!")
     self.pluginConfigs= {}
Пример #27
0
 def processPluginArguments(self):
     BasePlugin.processPluginArguments(self)
Пример #28
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
Пример #29
0
 def __init__(self,torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
     self.nessusClient = NessusClient(config.nessusHost, config.nessusPort)
     self.nessusClient.login(config.nessusUser, config.nessusPass)
     self.info("[*] NessusPlugin Initialized!")
Пример #30
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'shodanPlugin')
     self.setPluginDetails('shodanPlugin', 'Plugin to gather information using the Shodan Database.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] shodanPlugin Initialized!")
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, "infoGatheringPlugin")
     self.setPluginDetails("infoGathering", "Information Gathering of Tor relays.", "1.0", "Adastra: @jdaanial")
     if len(torNodes) > 0:
         self.info("[*] infoGatheringPlugin Initialized!")
     self.pluginConfigs = {}
Пример #32
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'niktoPlugin')
     self.info("[*] NiktoPlugin Initialized!")
Пример #33
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'deepWebStemmingPlugin')
     self.setSocksProxy()
     self.info("[*] DeepWebPlugin Initialized!")
Пример #34
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
Пример #35
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'infoGatheringPlugin')
     self.setPluginDetails('infoGatheringPlugin', 'Information Gathering of Tor relays.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] infoGatheringPlugin Initialized!")
Пример #36
0
 def __init__(self, torNodes=[]):
     BasePlugin.__init__(self, torNodes, 'examplePlugin')
     self.setPluginDetails('examplePlugin', 'Example of a plugin in Tortazo.', '1.0', 'Adastra: @jdaanial')
     if len(torNodes) > 0:
         self.info("[*] examplePlugin Initialized!")
     self.pluginConfigs= {}
Пример #37
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'simplePrinter')
     self.info("[*] simplePrinter Initialized!")
Пример #38
0
 def __init__(self, torNodes):
     BasePlugin.__init__(self, torNodes, 'nessusPlugin')
     self.nessusClient = NessusClient(config.nessusHost, config.nessusPort)
     self.nessusClient.login(config.nessusUser, config.nessusPass)
     self.info("[*] NessusPlugin Initialized!")