示例#1
0
def othbugs(web):

    print(" [!] Module Selected : Bruteforce Modules\n\n")
    othbugsban()
    print('')
    time.sleep(0.3)
    v = raw_input(GR + '  [#] \033[1;4mTID\033[0m' + GR + ' :> ' + color.END)
    print('')
    if v == '1':
        print(B + ' [!] Type Selected :' + C + ' FTP Brute')
        ftpbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == '2':
        print(B + ' [!] Type Selected :' + C + ' SSH Brute')
        sshbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == '3':
        print(B + ' [!] Type Selected :' + C + ' SQL Brute')
        sqlbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == '4':
        print(B + ' [!] Type Selected :' + C + ' POP 3/2 Brute')
        popbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == '5':
        print(B + ' [!] Type Selected :' + C + ' SMTP Brute')
        smtpbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == '6':
        print(B + ' [!] Type Selected :' + C + ' TELNET Brute')
        telnetbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == '7':
        print(B + ' [!] Type Selected :' + C + ' XMPP Brute')
        xmppbrute(web)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print('\n\n')
        othbugs(web)

    elif v == 'A':
        print(B + ' [!] Type Selected :' + C + ' All Modules')
        time.sleep(0.5)
        print(B + ' [*] Firing up module -->' + C + ' FTP Brute')
        ftpbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' FTP Brute\n')
        time.sleep(2)

        print(B + ' [*] Firing up module -->' + C + ' SSH Brute')
        sshbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' SSH Brute\n')
        time.sleep(2)

        print(B + ' [*] Firing up module -->' + C + ' SQL Brute')
        sqlbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' SQL Brute\n')
        time.sleep(2)

        print(B + ' [*] Firing up module -->' + C + ' POP Brute')
        popbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' POP Brute\n')
        time.sleep(2)

        print(B + ' [*] Firing up module -->' + C + ' SMTP Brute')
        smtpbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' SMTP Brute\n')
        time.sleep(2)

        print(B + ' [*] Firing up module -->' + C + ' TElNET Brute')
        telnetbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' TELNET Brute\n')
        time.sleep(2)

        print(B + ' [*] Firing up module -->' + C + ' XMPP Brute')
        xmppbrute(web)
        print(B + ' [!] Module Completed -->' + C + ' XMPP Brute\n')
        time.sleep(2)

        print(B + ' [!] All scantypes have been tested on target...')
        time.sleep(4)
        raw_input(O + ' [#] Press ' + GR + 'Enter' + O + ' to continue...')
        print(B + ' [*] Going back to menu...')
        othbugs(web)

    elif v == '99':
        print(GR + ' [*] Going back...')
        time.sleep(0.5)
        os.system('clear')

    else:
        dope = [
            'You high dude?', 'Shit! Enter a valid option',
            'Whoops! Thats not an option', 'Sorry! You just typed shit'
        ]
        print(dope[randint(0, 3)])
        time.sleep(0.7)
        os.system('clear')
        othbugs(web)
示例#2
0
def brutemods(web):

    print " [!] Module Selected : Bruteforce Modules\n\n"
    brutemodsban()
    print ''
    time.sleep(0.3)
    v = raw_input('' + GR + '  [#] \033[1;4mTID\033[0m' + GR + ' :> ' +
                  color.END)
    print ''
    if v == '1':
        print B + ' [!] Type Selected :' + C + ' FTP Brute'
        ftpbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == '2':
        print B + ' [!] Type Selected :' + C + ' SSH Brute'
        sshbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == '3':
        print B + ' [!] Type Selected :' + C + ' SQL Brute'
        sqlbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == '4':
        print B + ' [!] Type Selected :' + C + ' POP 3/2 Brute'
        popbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == '5':
        print B + ' [!] Type Selected :' + C + ' SMTP Brute'
        smtpbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == '6':
        print B + ' [!] Type Selected :' + C + ' TELNET Brute'
        telnetbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == '7':
        print B + ' [!] Type Selected :' + C + ' XMPP Brute'
        xmppbrute(web)
        time.sleep(2)
        print '\n\n'
        auxil_alt(web)

    elif v == 'A':
        print B + ' [!] Type Selected :' + C + ' All Modules'
        time.sleep(0.5)
        print B + ' [*] Firing up module -->' + C + ' FTP Brute'
        ftpbrute(web)
        print B + ' [!] Module Completed -->' + C + ' FTP Brute\n'

        print B + ' [*] Firing up module -->' + C + ' SSH Brute'
        sshbrute(web)
        print B + ' [!] Module Completed -->' + C + ' SSH Brute\n'
        time.sleep(2)

        print B + ' [*] Firing up module -->' + C + ' SQL Brute'
        sqlbrute(web)
        print B + ' [!] Module Completed -->' + C + ' SQL Brute\n'
        time.sleep(2)

        print B + ' [*] Firing up module -->' + C + ' POP Brute'
        popbrute(web)
        print B + ' [!] Module Completed -->' + C + ' POP Brute\n'
        time.sleep(2)

        print B + ' [*] Firing up module -->' + C + ' SMTP Brute'
        smtpbrute(web)
        print B + ' [!] Module Completed -->' + C + ' SMTP Brute\n'
        time.sleep(2)

        print B + ' [*] Firing up module -->' + C + ' TElNET Brute'
        telnetbrute(web)
        print B + ' [!] Module Completed -->' + C + ' TELNET Brute\n'
        time.sleep(2)

        print B + ' [*] Firing up module -->' + C + ' XMPP Brute'
        xmppbrute(web)
        print B + ' [!] Module Completed -->' + C + ' XMPP Brute\n'
        time.sleep(2)

        print B + ' [!] All scantypes have been tested on target...'
        time.sleep(4)
        print B + ' [*] Going back to menu...'
        auxil_alt(web)

    elif v == '99':
        print B + ' [*] Back to the menu !'
        auxil_alt(web)

    else:
        dope = [
            'You high dude?', 'Shit! Enter a valid option',
            'Whoops! Thats not an option', 'Sorry! You just typed shit'
        ]
        print dope[randint(0, 3)]
        time.sleep(0.7)
        os.system('clear')
        brutemods(web)