def init(): init.Author ="RedToor" init.Version ="1.0" init.Description ="Wifi Phising (evil twin)" init.CodeName ="wifi/ev.twin" init.DateCreation ="31/05/2016" init.LastModification ="09/07/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'drive' :[INTERFACE_DEVICE ,True ,'Interface'], 'driveMon':[INTERFACE_MONITOR ,True ,'Monitor Interface'], 'essid' :["movil_wifi" ,True ,'AP Essid'], 'bssid' :[MAC_TARGET ,True ,'AP Mac Address'], 'template':["files/wifi/tmp/neutral/" ,True ,'Files Phising'], 'channel' :["11" ,True ,'Channel AP'] } # EXTRA OPTIONS MODULE init.extra = { # NAME VALUE RQ DESCRIPTION 'ip_range':["192.168.1.1" ,False,'Ip Range'], } # AUX INFORMATION MODULE init.aux = """ Devices Founds: """+str(get_interfaces())+""" Monitors Inter: """+str(get_monitors_mode())+""" Functions : For Scan Ap's, type 'f::get_aps(Monitor_Interface,Time)' For Start Monitor Mode, type 'f::start_monitor(Interface)' """ return init
def init(): init.Author ="RedToor" init.Version ="1.0" init.Description ="Network Sniffer" init.CodeName ="net/sc.sniff" init.DateCreation ="22/03/2016" init.LastModification ="18/05/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface' :[INTERFACE_ETHERNET,True ,'Monitor Interface'], 'filter' :["ALL" ,False,'Filter sniff'] } init.aux = """ (filter) options -> [ALL] Whatever -> [DNS] Domains Name Service -> [FTP] File Transfer Protocol -> [POP] Post Office Protocol Devices Founds: """+str(get_interfaces())+""" Monitors Inter: """+str(get_monitors_mode())+""" Functions : For Start Monitor Mode, type 'f::start_monitor(Interface)' """ return init
def init(): init.Author = "Thomas TJ 2016 (TTJ)" init.Version = "1.0" init.Description = "HTTP sniffer" init.CodeName = "net/sc.sniffhttp" init.DateCreation = "09/11/2016" init.LastModification = "09/11/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface': [INTERFACE_ETHERNET, True, 'Monitor Interface'], 'filter': ["ALL", False, 'Filter sniff'], 'onlycreds': ["n", False, 'Only show creds (y/n)'], 'hideempty': ["y", False, 'Hide empty pkts (y/n)'], 'ignore': ["n", False, 'Ignore js etc. (y/n)'] } init.aux = """ (filter) options -> [ALL] Whatever -> [DNS] Domains Name Service -> [FTP] File Transfer Protocol -> [POP] Post Office Protocol -> [HTTP] HTTP -> [MAIL] Mail (25, 110, 143) Devices Founds: """ + str(get_interfaces()) + """ Monitors Inter: """ + str(get_monitors_mode()) + """ Functions : For Start Monitor Mode, type 'f::start_monitor(Interface)' """ return init
def init(): init.Author = "RedToor" init.Version = "1.0" init.Description = "Network Sniffer" init.CodeName = "net/sc.sniff" init.DateCreation = "22/03/2016" init.LastModification = "18/05/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface': [INTERFACE_ETHERNET, True, 'Monitor Interface'], 'filter': ["ALL", False, 'Filter sniff'] } init.aux = """ (filter) options -> [ALL] Whatever -> [DNS] Domains Name Service -> [FTP] File Transfer Protocol -> [POP] Post Office Protocol Devices Founds: """ + str(get_interfaces()) + """ Monitors Inter: """ + str(get_monitors_mode()) + """ Functions : For Start Monitor Mode, type 'f::start_monitor(Interface)' """ return init
def init(): init.Author ="RedToor" init.Version ="2.1" init.Description ="Wifi Denegation of service" init.CodeName ="wifi/ap.dos" init.DateCreation ="11/06/2015" init.LastModification ="24/05/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'drive' :[INTERFACE_MONITOR,True ,'Interface'], 'bssid' :[MAC_TARGET ,True ,'AP Mac Address'], 'target' :["ALL" ,True ,'Targes'], } # AUX INFORMATION MODULE init.aux = """ (target) options -> [ALL] all wireless clients. -> [MAC] a single client access. Devices Founds: """+str(get_interfaces())+""" Monitors Inter: """+str(get_monitors_mode())+""" Functions : For Scan Ap's, type 'f::get_aps(Monitor_Interface,Time)' For Start Monitor Mode, type 'f::start_monitor(Interface)' """ return init
def main(run): printAlert(3,"Computer") print " | IP Local : ",get_local_ip() print " | Ip Externa : ",get_external_ip() print " | Interfaces : ",get_interfaces() print " | Gateway : ",get_gateway() print " | Machaddress: ",get_my_mac_address() print " | Username : "******" | OS : ",commands.getoutput('uname') print " | Version : ",commands.getoutput('uname -r') printAlert(3,"Katana") print " | Core : ",Information.version print " | Build : ",Information.build Space()
def init(): init.Author ="RedToor" init.Version ="1.0" init.Description ="Web D.O.S Attack in LAN." init.CodeName ="net/web.dos" init.DateCreation ="31/07/2016" init.LastModification ="31/07/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface':[INTERFACE_ETHERNET,True ,'Interface'], 'target' :["www.test.com" ,True ,'DNS Target'] } init.aux = """ Devices Founds: """+str(get_interfaces())+""" """ return init
def init(): init.Author ="RedToor" init.Version ="1.0" init.Description ="DNS Spoofing" init.CodeName ="net/dns.spoof" init.DateCreation ="29/07/2016" init.LastModification ="29/07/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface':[INTERFACE_ETHERNET,True ,'Interface'], 'hostfile' :["files/test/host" ,True ,'DNS\'s Spoofed File'] } init.aux = """ Devices Founds: """+str(get_interfaces())+""" Functions : to edit the DNS rules. 'x::nano """+init.options['hostfile'][0]+"""' """ return init
def init(): init.Author = "RedToor" init.Version = "3.1" init.Description = "ARP Poisoning" init.CodeName = "net/arp.pson" init.DateCreation = "26/08/2015" init.LastModification = "27/07/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface': [INTERFACE_ETHERNET, True, 'Interface'], 'target': ["192.168.1.223", True, 'Target IP'], 'gateway': [get_gateway(), True, 'Gateway IP'], 'https': ["true", False, 'HTTP/s Capture'] } init.aux = """ Devices Founds: """ + str(get_interfaces()) + """ """ return init
def init(): init.Author = "RedToor" init.Version = "1.0" init.Description = "DNS Spoofing" init.CodeName = "net/dns.spoof" init.DateCreation = "29/07/2016" init.LastModification = "29/07/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface': [INTERFACE_ETHERNET, True, 'Interface'], 'hostfile': ["files/test/host", True, 'DNS\'s Spoofed File'] } init.aux = """ Devices Founds: """ + str(get_interfaces()) + """ Functions : to edit the DNS rules. 'x::nano """ + init.options[ 'hostfile'][0] + """' """ return init
def init(): init.Author ="RedToor" init.Version ="3.1" init.Description ="ARP Poisoning" init.CodeName ="net/arp.pson" init.DateCreation ="26/08/2015" init.LastModification ="27/07/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface':[INTERFACE_ETHERNET,True ,'Interface'], 'target' :["192.168.1.223" ,True ,'Target IP'], 'gateway' :[get_gateway() ,True ,'Gateway IP'], 'https' :[True ,False,'HTTP/s Capture'] } init.aux = """ Devices Founds: """+str(get_interfaces())+""" """ return init