Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- # Script By Ari Apridana #
- # monx2 - Multi-pentest-forensik #
- # www.facebook.com/ari.monx2 #
- # script just for Kalilinux #
- # forgive me if the code is a mess, #
- # you can contact me through my email ariapridana@gmail.com #
- # if you help me in designing and adding the latest features then you will be my display name in the script. #
- OS=`uname -o`
- DATE=`date`
- author="Ari Apridana"
- version="1.0.0 [BETA]"
- echo -e "\e[00;32m##################################################################################\e[00m"
- echo -e " "versi : $version" # Script By Ari $author# "
- echo -e "\e[00;32m##################################################################################\e[00m"
- echo -e "\e[00;32m## _ _ _ _ _ _ _ ##\e[00m"
- echo -e "\e[00;32m## /\_\/\_\ _ /\ \ /\ \ _ /_/\ /\ \ /\ \ ##\e[00m"
- echo -e "\e[00;32m## / / / / //\_\ / \ \ / \ \ /\_\\ \ \ \ \_\ / \ \ ##\e[00m"
- echo -e "\e[00;32m## /\ \/ \ \/ / // /\ \ \ / /\ \ \_/ / / \ \ \__/ / / / /\ \ \ ##\e[00m"
- echo -e "\e[00;32m## / \____\__/ // / /\ \ \ / / /\ \___/ / \ \__ \/_/ \/_/\ \ \ ##\e[00m"
- echo -e "\e[00;32m## / /\/________// / / \ \_\ / / / \/____/ \/_/\__/\ / / / ##\e[00m"
- echo -e "\e[00;32m## / / /\/_// / // / / / / // / / / / / _/\/__\ \ / / / ##\e[00m"
- echo -e "\e[00;32m## / / / / / // / / / / // / / / / / / _/_/\ \ \ / / / _ ##\e[00m"
- echo -e "\e[00;32m##/ / / / / // / /___/ / // / / / / / / / / \ \ \ / / /_/\_\ ##\e[00m"
- echo -e "\e[00;32m##\/_/ / / // / /____\/ // / / / / / / / / /_/ // /_____/ / ##\e[00m"
- echo -e "\e[00;32m## \/_/ \/_________/ \/_/ \/_/ \/_/ \_\/ \________/ ##\e[00m"
- echo -e "\e[00;32m##################################################################################\e[00m"
- echo -e " $DATE #monx2-multi pentest# "
- echo -e "\e[00;32m##################################################################################\e[00m"
- echo -e "\e[00;32m---> $OS <----\e[00m"
- echo -e "\e[00;36m ==PENTEST==\e[00m"
- echo -e "\e[00;36m1. wpscan\e[00m"
- echo -e "\e[00;34m2. joomscan\e[00m"
- echo -e "\e[00;34m3. sqlmap\e[00m"
- echo -e "\e[00;34m4. dirbuster\e[00m"
- echo -e "\e[00;36m ===FORENSIK==\e[00m"
- echo -e "\e[00;34m5. crack md5\e[00m"
- echo -e "\e[00;34m6. decode base64\e[00m"
- echo -e "\e[00;34m7. bongkar file / identifikasi file\e[00m"
- echo -e "\e[00;34m8. bruteforce ekstrak file\e[00m"
- echo -e "\e[00;34m9. exiftool identifikasi file\e[00m"
- echo -e "\e[00;34m10. Bantuan \e[00m"
- echo -en ">>"
- read PILIHAN
- if [ "$PILIHAN" = "1" ]; then
- echo "1.full scan"
- echo "2.themes"
- echo "3.plugins"
- echo "4.back"
- echo -ne ">>"
- read PILIHAN1
- fi
- if [[ $PILIHAN1 = "1" || $PILIHAN1 = "1" ]]; then
- echo "Masukan url target contoh http://web.com "
- echo -ne ">>"
- read URL1
- wpscan --url $URL1
- fi
- if [[ $PILIHAN1 = "2" || $PILIHAN1 = "2" ]]; then
- echo "Masukan url target contoh http://web.com"
- echo -ne ">>"
- read URL2
- wpscan --url $URL2 --enumerate t
- fi
- if [[ $PILIHAN1 = "3" || $PILIHAN1 = "3" ]]; then
- echo "Masukan url target contoh http://web.com"
- echo -ne ">>"
- read URL3
- wpscan --url $URL3 --enumerate p
- fi
- if [[ $PILIHAN1 = "4" || $PILIHAN1 = "4" ]]; then
- echo "Tekan Y jika ingin Kembali"
- echo -ne ">>"
- read asu
- clear
- ./monx2.sh
- fi
- if [ "$PILIHAN" = "2" ]; then
- echo "masukan url target contoh: web.com ::"
- echo -ne ">>"
- read URL2
- joomscan -u $URL2
- fi
- if [ "$PILIHAN" = "3" ]; then
- echo "Masukan url target contoh :http://web.php/file.php?id=12 ::"
- echo -ne ">>"
- read URL3
- echo "Masukan parameter ::"
- echo -ne ">>"
- read PARAMETER
- sqlmap -u "$URL3" -p $PARAMETER --dbs
- echo "Masukan Database::"
- echo -ne ">>"
- read DATABASE
- sqlmap -u "$URL3" -p $PARAMETER -D $DATABASE --tables
- echo "Masukan Table yang ingin di dump::"
- echo -ne ">>"
- read table
- sqlmap -u "$URL3" -p $PARAMETER -D $DATABASE -T $table --dump
- fi
- if [ "$PILIHAN" = "5" ]; then
- echo "1.online"
- echo "2.john"
- echo "3.hashcat"
- echo "4.back"
- echo -ne ">>"
- read crack
- fi
- if [[ $crack = "1" || $crack = "1" ]]; then
- echo "Masukan code md5 :"
- echo -ne ">>"
- read md51
- findmyhash MD5 -h $md51
- fi
- if [[ $cracrk = "2" || $crack = "2" ]]; then
- echo "Masukan code md5::[nb:hapus file hash.txt jika sudah mencrack]"
- echo -ne ">>"
- read md52
- echo "$md52" > hash.txt
- john --format=raw-md5 hash.txt
- fi
- if [[ $cracrk = "3" || $crack = "3" ]]; then
- echo "Masukan code md5::"
- echo -ne ">>"
- read md5
- echo "Masukan tempat Dictionary hash :: [/root/dictionary.txt]"
- echo -ne ">>"
- read md6
- hashcat -m 0 $md5 $md6
- fi
- if [[ $cracrk = "3" || $crack = "4" ]]; then
- echo "Tekan Y jika ingin kembali"
- echo -ne ">>"
- read md52
- clear
- ./monx2.sh
- fi
- if [ "$PILIHAN" = "6" ]; then
- echo "Masukan code base64:"
- echo -ne ">>"
- read CODE
- echo "hasil:"
- base64=`echo $CODE | base64 --decode`
- echo -e $base64
- fi
- if [ "$PILIHAN" = "4" ]; then
- echo "Masukan URL target [ contoh http://web.com ] :"
- echo -ne ">>"
- read urldirb
- dirb $urldirb
- fi
- if [ "$PILIHAN" = "7" ]; then
- echo "locate file:"
- echo "[contoh : /root/file.jpg ]"
- echo -ne ">>"
- read filestrings
- touch filter
- strings $filestrings > filter
- echo -e "hasil identifikasi :"
- cat filter | grep user
- cat filter | grep pass
- cat filter | grep zip
- cat filter | grep zip
- cat filter | grep Tar
- cat filter | grep untar
- cat filter | grep JPG
- cat filter | grep Base64
- cat filter | grep Pass
- cat filter | grep User
- cat filter | grep Rar
- cat filter | grep create
- cat filter | grep photo
- cat filter | grep txt
- cat filter | grep jpg
- cat filter | grep docx
- cat filter | grep photoshop
- cat filter | grep base64
- cat filter | grep png
- cat filter | grep mp3
- cat filter | grep clue
- cat filter | grep berhasil
- cat filter | grep succes
- cat filter | grep code
- cat filter | grep CODE
- cat filter | grep done
- cat filter | grep Photoshop
- cat filter | grep Selamat
- cat filter | grep Cong
- cat filter | grep CLue
- rm filter
- fi
- if [ $PILIHAN = "8" ]; then
- echo "locate file : "
- echo " contoh : /root/file.jpg "
- echo -ne ">>"
- read bongkar
- unzip $bongkar
- tar -xvf $bongkar
- unrar e $bongkar
- fi
- if [ $PILIHAN = "9" ]; then
- echo "locate file : "
- echo " contoh : /root/file.jpg "
- echo -ne ">>"
- read identifikasi
- exiftool $identifikasi
- fi
- if [ $PILIHAN = "10" ]; then
- echo -e "\e[00;36m ==PENTEST==\e[00m"
- echo -e "\e[00;36m1. wpscan = tools pentest untuk CMS Wordpress\e[00m"
- echo -e "\e[00;34m2. joomscan = tools pentest untuk CMS Wordpress\e[00m"
- echo -e "\e[00;34m3. sqlmap = tools pentest untuk vulner SQL Injection\e[00m"
- echo -e "\e[00;34m4. dirbuster = tools pentest untuk brutoforce file/folder didalam target\e[00m"
- echo -e "\e[00;36m ===FORENSIK==\e[00m"
- echo -e "\e[00;34m5. crack md5 = tools forensik untuk crack md5\e[00m"
- echo -e "\e[00;34m6. decode base64 = tools forensik untuk decode base64\e[00m"
- echo -e "\e[00;34m7. bongkar file = tools forensik untuk menemukan file/kata rahasia dalam file\e[00m"
- echo -e "\e[00;34m8. bruteforce ekstrak file = tools forensik untuk brutoforce ekstrak suatu file\e[00m"
- echo -e "\e[00;34m9. exiftool identifikasi file = tools forensik untuk mengidentifikasi suatu file\e[00m"
- echo ""
- echo -e "Tekan Angka 1 untuk Kembali"
- echo -ne ">>"
- read balik
- if [ $balik = "1" ]; then
- clear
- bash monx2.sh
- fi
- fi
- if [[ $PILIHAN = "back" || $PILIHAN1 = "back" ]]; then
- clear
- ./monx2.sh
- fi
- if [[ $URL1 = "back" || $URL2 = "back" ]]; then
- clear
- ./monx2.sh
- fi
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement