Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/python
- #Greets:SEC4EVER Members.
- import hashlib
- import base64
- import socket
- import urllib2, re
- print"""
- \033[1;32m
- __ __ _ _______ _ _
- | \/ | | |__ __| || |
- | \ / | | | | | || |_
- | |\/| | | | | |__ _|
- | | | | |____| | | |
- |_| |_|______|_| |_| Beta
- [+]MultiTools Script
- [+]Coded By miutex
- [+]Sites: sec4ever.com,exploit4arab.net
- \033[1;m
- """
- print"""
- \033[1;31m
- [+]Usage:
- 1 - SHA1 Decrypter
- 2 - MD5 Decrypter
- 3 - Base64 Decrypter
- 4 - /etc/passwd users Extractor
- 5 - Port Scanner
- 6 - Reverse IP
- \033[1;m
- """
- def sha1():
- try:
- sha1 = raw_input("\t\n\nSHA1 Hash:")
- dictionary = open("pwds.txt","r")
- for passwd in dictionary.read().split('\n'):
- if hashlib.sha1(passwd).hexdigest() == sha1:
- print("\n\t[OK]"+sha1+" : "+passwd+"\n")
- else:
- print "\n\tFailed; Password not found in dictionary"
- except(IOError):
- print "pwds.txt not found!"
- def extr():
- print '\n'.join(re.findall( '(.*):x:', open('user.txt').read()))
- def rev ():
- ip=raw_input('IP: ')
- req = urllib2.Request("http://domains.yougetsignal.com/domains.php?remoteAddress=" +ip, headers={'User-Agent' : "Magic Browser"})
- con = urllib2.urlopen(req).read()
- find = re.findall('"(.*?)"',con)
- for i in range(len(find)):
- print find[i]
- def prt():
- sec4=raw_input('IP Address:')
- for port in range(1,400):
- s0ck = socket.socket()
- s0ck.settimeout(0.5)
- ip=sec4
- response = s0ck.connect_ex((ip, port))
- if response:
- print ("%d\tclose" %port)
- else:
- print ("%d\topen" %port)
- s0ck.close()
- def md5():
- try:
- md5 = raw_input("\t\n\nMD5 Hash:")
- dictionary = open("pwds.txt","r")
- for passwd in dictionary.read().split('\n'):
- if hashlib.md5(passwd).hexdigest() == md5:
- print("\n\t[OK]"+md5+" : "+passwd+"\n")
- else:
- print "\n\tFailed; Password not found in dictionary"
- except(IOError):
- print "pwds.txt not found!"
- def main():
- select = input("Select :")
- if select==1:
- sha1()
- elif select==2:
- md5()
- elif select==3:
- be64()
- elif select ==4:
- extr()
- elif select ==5:
- prt()
- elif select ==6:
- rev()
- if __name__ == "__main__":
- main()
- if __name__ == "__main__":
- main()
- if __name__ == "__main__":
- main()
- def be64():
- code = raw_input('\n\nYour Text To decode:\n\n')
- deco = base64.b64decode(code)
- print '\nDecoded!:\n\n',deco,'\n'
- if __name__ == "__main__":
- main()
Add Comment
Please, Sign In to add comment