def wordpresscantor(): checker.cRojo("Desea Guardar el logs de la informacion? y/n : ") resp = raw_input("Introduce tu Respuesta y/n : ") if resp == "y": web = portsmod.host() logsalida = logs.randomarch("wpscan/", "WPSCAN", ".log") web = portsmod.host() checker.cAmarillo( "Buscando vulnerabilidades en el sitio web usando wpscan...") subprocess.call([ "sudo", "wpscan", "-u", web, "--enumerate", "p", "--enumerate", "t", "--enumerate", "u", "--proxy", "socks5://127.0.0.1:9050", "--log", logsalida ]) print "" checker.cAmarillo( "--------------------------------------------------------") checker.cRojo(["Tu log se ha Guardado en la ruta: ", logsalida]) checker.cAmarillo( "--------------------------------------------------------") print "" elif resp == "n": web = portsmod.host() subprocess.call([ "sudo", "wpscan", "-u", web, "--enumerate", "p", "--enumerate", "t", "--enumerate", "u", "--proxy", "socks5://127.0.0.1:9050" ]) execute()
def nickscan(): checker.cRojo("Desea Guardar el logs de la informacion? y/n : ") resp = raw_input("Introduce tu Respuesta y/n : ") if resp == "y": web = portsmod.host() checker.cAmarillo( "Buscando vulnerabilidades en el sitio web usando nikto...") logsalida = logs.randomarch("nikto/", "NIKTO", ".html") subprocess.call([ "perl", HOME + "/.nikto/program/nikto.pl", "-no404", "-host", web, "-o", logsalida ]) print "" checker.cAmarillo( "--------------------------------------------------------") checker.cRojo(["Tu log se ha Guardado en la ruta: ", logsalida]) checker.cAmarillo( "--------------------------------------------------------") print "" elif resp == "n": web = portsmod.host() checker.cAmarillo( "Buscando vulnerabilidades en el sitio web usando nikto...") subprocess.call([ "perl", HOME + "/.nikto/program/nikto.pl", "-no404", "-host", web ]) execute()
def whatw(): checker.cRojo("Desea Guardar el logs de la informacion? y/n : ") resp = raw_input("Introduce tu Respuesta y/n : ") if resp == "y": web = portsmod.host() checker.cAmarillo("Obteniendo informacion del sitio web.") print "" logsalida = logs.randomarch("whatweb/", "WHATWEB", ".log") subprocess.call([ "perl", HOME + "/.whatweb/whatweb", "-v", web, "--log-verbose", logsalida ]) print "" checker.cAmarillo( "--------------------------------------------------------") checker.cRojo(["Tu log se ha Guardado en la ruta: ", logsalida]) checker.cAmarillo( "--------------------------------------------------------") print "" elif resp == "n": web = portsmod.host() checker.cAmarillo("Obteniendo informacion del sitio web.") print "" subprocess.call(["perl", HOME + "/.whatweb/whatweb", "-v", web]) execute()
def wordpresscan(): checker.cRojo("Desea Guardar el logs de la informacion? y/n : ") resp = raw_input("Introduce tu Respuesta y/n : ") if resp == "y": web = portsmod.host() logsalida = logs.randomarch("wpscan/", "WPSCAN", ".log") owd = os.getcwd() os.chdir("/data/data/com.termux/files/home/.wpscan") subprocess.call([ "ruby", "wpscan.rb", "-u", web, "--enumerate", "p", "--enumerate", "t", "--enumerate", "u", "--log", logsalida ]) print "" checker.cAmarillo( "--------------------------------------------------------") checker.cRojo(["Tu log se ha Guardado en la ruta: ", logsalida]) checker.cAmarillo( "--------------------------------------------------------") os.chdir(owd) print "" elif resp == "n": web = portsmod.host() owd = os.getcwd() os.chdir("/data/data/com.termux/files/home/.wpscan") subprocess.call([ "ruby", "wpscan.rb", "-u", web, "--enumerate", "p", "--enumerate", "t", "--enumerate", "u" ]) os.chdir(owd) execute()
def joomsctor(): web = host = portsmod.host() checker.cAmarillo( "Buscando vulnerabilidades en el sitio web usando joomlavs usando TOR..." ) subprocess.call([ "ruby", "joomlavs", "-u", web, "--proxy", "SOCKS5://127.0.0.1:9050", "-a" ]) execute()
def wordpresscan(): checker.cRojo("Desea Guardar el logs de la informacion? y/n : ") resp = raw_input("Introduce tu Respuesta y/n : ") if resp == "y": web = portsmod.host() logsalida = logs.randomarch("wpscan/", "WPSCAN", ".log") subprocess.call([ "sudo", "wpscan", "-u", web, "--enumerate", "p", "--enumerate", "t", "--enumerate", "u", "--log", logsalida ]) print "" checker.cAmarillo( "--------------------------------------------------------") checker.cRojo(["Tu log se ha Guardado en la ruta: ", logsalida]) checker.cAmarillo( "--------------------------------------------------------") print "" elif resp == "n": web = portsmod.host() subprocess.call([ "sudo", "wpscan", "-u", web, "--enumerate", "p", "--enumerate", "t", "--enumerate", "u" ]) execute()
def joomsc(): web = portsmod.host() checker.cAmarillo( "Buscando vulnerabilidades en el sitio web usando joomlavs...") subprocess.call(["ruby", "joomlavs", "-u", web, "-a"]) execute()