#!/usr/bin/env python try: import readline except: pass from src.core.setcore import bcolors, get_version, check_os, meta_path # grab version of SET define_version = get_version() # check operating system operating_system = check_os() # grab metasploit path msf_path = meta_path() PORT_NOT_ZERO = "Port cannot be zero!" PORT_TOO_HIGH = "Let's stick with the LOWER 65,535 ports..." main_text = " Select from the menu:\n" main_menu = ['Social-Engineering Attacks', 'Fast-Track Penetration Testing', 'Third Party Modules', 'Update the Metasploit Framework', 'Update the Social-Engineer Toolkit', 'Update SET configuration', 'Help, Credits, and About'] main = ['Spear-Phishing Attack Vectors', 'Website Attack Vectors',
#!/usr/bin/env python ######################################################################## # # text menu for set menu stuff # ######################################################################## from src.core.setcore import bcolors, get_version, check_os, meta_path # grab version of SET define_version = get_version() # check operating system operating_system = check_os() # grab metasploit path msf_path = meta_path() PORT_NOT_ZERO = "Port cannot be zero!" PORT_TOO_HIGH = "Let's stick with the LOWER 65,535 ports..." main_text = " Select from the menu:\n" main_menu = [ 'Social-Engineering Attacks', 'Fast-Track Penetration Testing', 'Third Party Modules', 'Update the Metasploit Framework', 'Update the Social-Engineer Toolkit', 'Update SET configuration', 'Help, Credits, and About' ] main = [ 'Spear-Phishing Attack Vectors', 'Website Attack Vectors',