miutextun

Multi-Tools Beta

May 7th, 2014
203
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.60 KB | None | 0 0
  1. #!/usr/bin/python
  2. #Greets:SEC4EVER Members.
  3. import hashlib
  4. import base64
  5. import socket
  6. import urllib2, re
  7.  
  8. print"""
  9. \033[1;32m
  10.  __  __ _   _______ _  _
  11. |  \/  | | |__   __| || |
  12. | \ / | |    | |  | || |_
  13. | |\/| | |    | |  |__   _|
  14. | |  | | |____| |     | |
  15. |_|  |_|______|_|     |_|  Beta
  16.  
  17. [+]MultiTools Script
  18. [+]Coded By miutex
  19. [+]Sites: sec4ever.com,exploit4arab.net
  20. \033[1;m
  21. """
  22. print"""
  23. \033[1;31m
  24. [+]Usage:
  25. 1 - SHA1  Decrypter
  26. 2 - MD5  Decrypter
  27. 3 - Base64 Decrypter
  28. 4 - /etc/passwd users Extractor
  29. 5 - Port Scanner
  30. 6 - Reverse IP
  31. \033[1;m
  32. """
  33.  
  34. def sha1():
  35.     try:
  36.         sha1 = raw_input("\t\n\nSHA1 Hash:")
  37.         dictionary = open("pwds.txt","r")
  38.  
  39.         for passwd in dictionary.read().split('\n'):
  40.             if hashlib.sha1(passwd).hexdigest() == sha1:
  41.  
  42.                 print("\n\t[OK]"+sha1+" : "+passwd+"\n")
  43.  
  44.  
  45.         else:
  46.             print "\n\tFailed; Password not found in dictionary"
  47.  
  48.  
  49.     except(IOError):
  50.         print "pwds.txt not found!"
  51.  
  52. def  extr():
  53.  print '\n'.join(re.findall( '(.*):x:', open('user.txt').read()))
  54. def rev ():
  55.  ip=raw_input('IP: ')
  56.  req = urllib2.Request("http://domains.yougetsignal.com/domains.php?remoteAddress=" +ip, headers={'User-Agent' : "Magic Browser"})
  57.  con = urllib2.urlopen(req).read()
  58.  find = re.findall('"(.*?)"',con)
  59.  
  60.  for i in range(len(find)):
  61.             print find[i]
  62.  
  63. def prt():
  64.  sec4=raw_input('IP Address:')
  65.  for port in range(1,400):
  66.   s0ck = socket.socket()
  67.   s0ck.settimeout(0.5)
  68.   ip=sec4
  69.   response = s0ck.connect_ex((ip, port))
  70.  if response:
  71.     print ("%d\tclose" %port)
  72.  
  73.  else:
  74.       print ("%d\topen" %port)
  75.  s0ck.close()
  76.  
  77. def md5():
  78.     try:
  79.         md5 = raw_input("\t\n\nMD5 Hash:")
  80.         dictionary = open("pwds.txt","r")
  81.         for passwd in dictionary.read().split('\n'):
  82.             if hashlib.md5(passwd).hexdigest() == md5:
  83.                 print("\n\t[OK]"+md5+" : "+passwd+"\n")
  84.  
  85.  
  86.         else:
  87.             print "\n\tFailed; Password not found in dictionary"
  88.  
  89.  
  90.     except(IOError):
  91.         print "pwds.txt not found!"
  92.  
  93. def main():
  94.  
  95.  select = input("Select :")
  96.  
  97.  if select==1:
  98.       sha1()
  99.  elif select==2:
  100.       md5()
  101.  elif select==3:
  102.       be64()
  103.  elif select ==4:
  104.       extr()
  105.  elif select ==5:
  106.       prt()
  107.  elif select ==6:
  108.       rev()
  109. if __name__ == "__main__":
  110.     main()
  111.  
  112. if __name__ == "__main__":
  113.     main()
  114.  
  115. if __name__ == "__main__":
  116.     main()
  117. def be64():
  118.  
  119.      code = raw_input('\n\nYour Text To decode:\n\n')
  120.      deco = base64.b64decode(code)
  121.      print '\nDecoded!:\n\n',deco,'\n'
  122. if __name__ == "__main__":
  123.  main()
Add Comment
Please, Sign In to add comment