示例#1
0
def shellshock_exp(web):

    print(GR + '\n [*] Loading module...')
    time.sleep(0.5)
    #print(R+'\n    ================================')
    #print(R+'     S H E L L S H O C K  (Exploit)')
    #print(R+'    ================================\n')
    from core.methods.print import psploit
    psploit("shellshock")
    shellshock0x00(web)
示例#2
0
def search(inp):
    names = []
    descs = []

    passivenames = []
    passivedescs = []
    activenames = []
    activedescs = []
    discnames = []
    discdescs = []
    scannames = []
    scandescs = []
    portnames = []
    portdescs = []
    crawlnames = []
    crawldescs = []
    misnames = []
    misdescs = []
    brutenames = []
    brutedescs = []
    severenames = []
    severedescs = []
    sploitnames = []
    sploitdescs = []
    aidnames = []
    aiddescs = []

    def filematch(id, filenames):
        patt = '.*{}.*'.format(id)
        found = []
        for filename in filenames:
            if (re.match(patt, os.path.basename(filename))):
                found.append(filename)
        return found

    filenames = []
    foundfiles = []

    idlist = inp.split(" ")
    for filen in Path(vars.modir).glob("**/*.py"):
        filenames.append(str(filen))
    for id in idlist:
        foundfiles += filematch(id, filenames)
    for filen in filenames:
        module1 = filen.split(".py")[0]
        if os.name == 'nt':
            module2 = module1.split("modules/")[-1]
        else:
            module2 = module1.split("modules/")[-1]
        module2 = module2.replace("/", ".")
        module2 = module2.replace("\\", ".")
        module2 = "modules." + module2
        # print(module2)
        try:
            if ("__init__" not in module2 and "colors" not in module2
                    and "wafimpo" not in module2
                    and "DNSDumpsterAPI" not in module2
                    and "Form" not in module2 and "uri" not in module2
                    and "Crawler" not in module2
                    and "subdom0x00" not in module2
                    and "errorsql" not in module2 and "blindsql" not in module2
                    and "files.subdom" not in module2
                    and "fileo.subdom" not in module2
                    and "signatures" not in module2):
                module = imp.import_module(module2)
                j = module.info
                for id in idlist:
                    if id.lower() in str(j).lower():
                        if filen not in foundfiles:
                            foundfiles.append(str(filen))
        except ImportError:
            pass
    for file in foundfiles:
        if os.name == 'nt':
            list1 = file.split("\\modules\\")
        else:
            list1 = file.split("/modules/")
        if len(list1) != 2:
            print("[-] PathError. Length: {}, expected: 2".format(len(list1)))
        else:
            parsedfile = list1[1].split(".py")[0]
            parsedfile = "modules." + parsedfile
            parsedfile = parsedfile.replace("/", ".")
            parsedfile = parsedfile.replace("\\", ".")
            try:
                if ("__init__" not in parsedfile and "colors" not in parsedfile
                        and "wafimpo" not in parsedfile
                        and "DNSDumpsterAPI" not in parsedfile
                        and "Form" not in parsedfile
                        and "uri" not in parsedfile
                        and "Crawler" not in parsedfile
                        and "subdom0x00" not in parsedfile
                        and "errorsql" not in parsedfile
                        and "blindsql" not in parsedfile
                        and "files.subdom" not in parsedfile
                        and "fileo.subdom" not in parsedfile
                        and "signatures" not in parsedfile):
                    j = imp.import_module(parsedfile)
                    i = j.searchinfo
                    names.append(parsedfile.split(".")[-1])
                    descs.append(i)
                    if "ActiveRecon" in parsedfile:
                        activenames.append(parsedfile.split(".")[-1])
                        activedescs.append(i)
                    elif "PassiveRecon" in parsedfile:
                        passivenames.append(parsedfile.split(".")[-1])
                        passivedescs.append(i)
                    elif "InfoDisclose" in parsedfile:
                        discnames.append(parsedfile.split(".")[-1])
                        discdescs.append(i)
                    elif "ScanningEnumeration" in parsedfile and "0x01-PortScanning" not in parsedfile and "0x02-WebCrawling" not in parsedfile:
                        scannames.append(parsedfile.split(".")[-1])
                        scandescs.append(i)
                    elif "ScanningEnumeration" in parsedfile and "0x01-PortScanning" in parsedfile:
                        portnames.append(parsedfile.split(".")[-1])
                        portdescs.append(i)
                    elif "ScanningEnumeration" in parsedfile and "0x02-WebCrawling" in parsedfile:
                        crawlnames.append(parsedfile.split(".")[-1])
                        crawldescs.append(i)
                    elif "PassiveRecon" in parsedfile:
                        names.append(parsedfile.split(".")[-1])
                        descs.append(i)
                    elif "SploitLoot" in parsedfile:
                        sploitnames.append(parsedfile.split(".")[-1])
                        sploitdescs.append(i)
                    elif "Aid" in parsedfile:
                        aidnames.append(parsedfile.split(".")[-1])
                        aiddescs.append(i)
                    elif "VlnAnalysis.Severe" in parsedfile:
                        severenames.append(parsedfile.split(".")[-1])
                        severedescs.append(i)
                    elif "VlnAnalysis.Other" in parsedfile:
                        brutenames.append(parsedfile.split(".")[-1])
                        brutedescs.append(i)
                    elif "VlnAnalysis.Misconfig" in parsedfile:
                        misnames.append(parsedfile.split(".")[-1])
                        misdescs.append(i)
            except ImportError:
                pass

    if len(passivenames) > 0 or len(activenames) > 0 or len(discdescs) > 0:
        prnt.posint("Phase 1")
        if len(passivenames) > 0:
            cprint("OSINT/Footprinting: ", "Passive Recon")
            listdisplay(passivenames, passivedescs)
        if len(activenames) > 0:
            cprint("OSINT/Footprinting: ", "Active Recon")
            listdisplay(activenames, activedescs)
        if len(discnames) > 0:
            cprint("OSINT/Footprinting: ", "Information Disclosure")
            listdisplay(discnames, discdescs)
    if len(scannames) > 0 or len(portnames) > 0 or len(crawldescs) > 0:
        prnt.pscan("Phase 2")
        if len(scannames) > 0:
            cprint("Scanning/Enumeration: ", "General Scanning")
            listdisplay(scannames, scandescs)
        if len(portnames) > 0:
            cprint("Scanning/Enumeration: ", "Port Scanners")
            listdisplay(portnames, portdescs)
        if len(crawldescs) > 0:
            cprint("Scanning/Enumeration: ", "Web Crawlers")
            listdisplay(crawlnames, crawldescs)
    if len(severenames) > 0 or len(misnames) > 0 or len(brutedescs) > 0:
        prnt.pvln("Phase 3")
        if len(misnames) > 0:
            cprint("Vulnerability Analysis: ", "Misconfiguration")
            listdisplay(misnames, misdescs)
        if len(severenames) > 0:
            cprint("Vulnerability Analysis: ", "Severe Issues")
            listdisplay(severenames, severedescs)
        if len(brutedescs) > 0:
            cprint("Vulnerability Analysis: ", "Weak Credentials")
            listdisplay(brutenames, brutedescs)
    if len(sploitdescs) > 0:
        prnt.psploit("Phase 4")
        cprint("Exploitation: ", "Exploits")
        listdisplay(sploitnames, sploitdescs)
    if len(aidnames) > 0:
        print("\nAdditional Modules")
        listdisplay(aidnames, aiddescs)
示例#3
0
def list(arg, display, single=True):
    names = []
    descs = []
    dir = ""

    passivenames = []
    passivedescs = []
    activenames = []
    activedescs = []
    discnames = []
    discdescs = []
    scannames = []
    scandescs = []
    portnames = []
    portdescs = []
    crawlnames = []
    crawldescs = []
    misnames = []
    misdescs = []
    brutenames = []
    brutedescs = []
    severenames = []
    severedescs = []
    sploitnames = []
    sploitdescs = []
    aidnames = []
    aiddescs = []

    if arg == "all":
        dir = vars.modir
    elif arg == "aid":
        dir = vars.aidir
    elif arg == "osint-passive":
        dir = vars.pasdir
    elif arg == "osint-active":
        dir = vars.acdir
    elif arg == "scan":
        dir = vars.scadir
    elif arg == "sploit":
        dir = vars.sploidir
    elif arg == "vlnysis":
        dir = vars.vlndir
    elif arg == "infdisc":
        dir = vars.infdir
    else:
        print(catlist)
        return

    for filen in sorted(Path(dir).glob("**/*.py")):
        module1 = str(filen).split(".py")[0]
        if os.name == 'nt':
            module2 = module1.split("modules/")[-1]
        else:
            module2 = module1.split("modules/")[-1]
        module2 = module2.replace("/", ".")
        module2 = module2.replace("\\", ".")
        module2 = "modules." + module2
        try:
            if ("__init__" not in module2 and "colors" not in module2
                    and "wafimpo" not in module2
                    and "DNSDumpsterAPI" not in module2
                    and "Form" not in module2 and "uri" not in module2
                    and "Crawler" not in module2
                    and "subdom0x00" not in module2
                    and "errorsql" not in module2 and "blindsql" not in module2
                    and "files.subdom" not in module2
                    and "fileo.subdom" not in module2
                    and "signatures" not in module2):
                j = imp.import_module(module2)
                i = j.searchinfo
                #names.append(module2.split(".")[-1])
                names.append(module2)
                descs.append(i)
                if "ActiveRecon" in module2:
                    activenames.append(module2.split(".")[-1])
                    activedescs.append(i)
                elif "PassiveRecon" in module2:
                    passivenames.append(module2.split(".")[-1])
                    passivedescs.append(i)
                elif "InfoDisclose" in module2:
                    discnames.append(module2.split(".")[-1])
                    discdescs.append(i)
                elif "ScanningEnumeration" in module2 and "0x01-PortScanning" not in module2 and "0x02-WebCrawling" not in module2:
                    scannames.append(module2.split(".")[-1])
                    scandescs.append(i)
                elif "ScanningEnumeration" in module2 and "0x01-PortScanning" in module2:
                    portnames.append(module2.split(".")[-1])
                    portdescs.append(i)
                elif "ScanningEnumeration" in module2 and "0x02-WebCrawling" in module2:
                    crawlnames.append(module2.split(".")[-1])
                    crawldescs.append(i)
                elif "PassiveRecon" in module2:
                    names.append(module2.split(".")[-1])
                    descs.append(i)
                elif "SploitLoot" in module2:
                    sploitnames.append(module2.split(".")[-1])
                    sploitdescs.append(i)
                elif "Aid" in module2:
                    aidnames.append(module2.split(".")[-1])
                    aiddescs.append(i)
                elif "VlnAnalysis.Severe" in module2:
                    severenames.append(module2.split(".")[-1])
                    severedescs.append(i)
                elif "VlnAnalysis.Other" in module2:
                    brutenames.append(module2.split(".")[-1])
                    brutedescs.append(i)
                elif "VlnAnalysis.Misconfig" in module2:
                    misnames.append(module2.split(".")[-1])
                    misdescs.append(i)

        except ImportError:
            pass
    if display:
        if len(passivenames) > 0 or len(activenames) > 0 or len(discdescs) > 0:
            prnt.posint("Phase 1")
            if len(passivenames) > 0:
                cprint("OSINT/Footprinting: ", "Passive Recon")
                listdisplay(passivenames, passivedescs)
            if len(activenames) > 0:
                cprint("OSINT/Footprinting: ", "Active Recon")
                listdisplay(activenames, activedescs)
            if len(discnames) > 0:
                cprint("OSINT/Footprinting: ", "Information Disclosure")
                listdisplay(discnames, discdescs)
        if len(scannames) > 0 or len(portnames) > 0 or len(crawldescs) > 0:
            prnt.pscan("Phase 2")
            if len(scannames) > 0:
                cprint("Scanning/Enumeration: ", "General Scanning")
                listdisplay(scannames, scandescs)
            if len(portnames) > 0:
                cprint("Scanning/Enumeration: ", "Port Scanners")
                listdisplay(portnames, portdescs)
            if len(crawldescs) > 0:
                cprint("Scanning/Enumeration: ", "Web Crawlers")
                listdisplay(crawlnames, crawldescs)
        if len(severenames) > 0 or len(misnames) > 0 or len(brutedescs) > 0:
            prnt.pvln("Phase 3")
            if len(misnames) > 0:
                cprint("Vulnerability Analysis: ", "Misconfiguration")
                listdisplay(misnames, misdescs)
            if len(severenames) > 0:
                cprint("Vulnerability Analysis: ", "Severe Issues")
                listdisplay(severenames, severedescs)
            if len(brutedescs) > 0:
                cprint("Vulnerability Analysis: ", "Weak Credentials")
                listdisplay(brutenames, brutedescs)
        if len(sploitdescs) > 0:
            prnt.psploit("Phase 4")
            cprint("Exploitation: ", "Exploits")
            listdisplay(sploitnames, sploitdescs)
        if len(aidnames) > 0:
            print("\nAdditional Modules")
            listdisplay(aidnames, aiddescs)
    if single:
        return names
    else:
        return (passivenames, activenames, discnames, scannames, portnames,
                crawlnames, misnames, severenames, brutenames, sploitnames,
                aidnames)