View difference between Paste ID: 2smr7RPG and QYMxqCM9
SHOW: | | - or go back to the newest paste.
1
#!/usr/bin/env python2.7
2
#
3
#          All In One Tool For Penetration Testing 
4
#           Authors : Fedy Wesleti , Mohamed Nour 
5
#
6
import sys
7
import os
8
import subprocess
9
from commands import *
10
########################## 
11
#Variables
12
yes = set(['yes','y', 'ye', ''])
13
no = set(['no','n'])
14
15
16
17
##########################
18
19
#this is the big menu funtion 
20
def menu():
21
    print """
22
  ########  ######## ##    ## ########   #######  ##     ## 
23
  ##     ## ##       ###   ## ##     ## ##     ##  ##   ##  
24
  ##     ## ##       ####  ## ##     ## ##     ##   ## ##   
25
  ########  ######   ## ## ## ########  ##     ##    ###    
26
  ##        ##       ##  #### ##     ## ##     ##   ## ##   
27
  ##        ##       ##   ### ##     ## ##     ##  ##   ##  
28
  ##        ######## ##    ## ########   #######  ##     ##  v1.0  
29
                                  Pentesting Tools Auto-Downloader 
30
 
31
  [+]       reCoded  LulzTigre ooopsdead end 
32
  [+]             Greetz To All Pentesters              [+] 
33
34
Select from the menu:
35
36
1 : Information Gathering
37
2 : Password Attacks
38
3 : Wireless Testing
39
4 : Exploitation Tools
40
5 : Sniffing & Spoofing
41
99 : Exit
42
43
"""
44
    choice = input("selet a number :")
45
    choice = int(choice)
46
    if choice == 1:
47
        info()
48
    elif choice == 2:
49
        passwd()
50
    elif choice == 3:
51
        wire()
52
    elif choice == 4:
53
        exp()
54
    elif choice == 5:
55
        snif()
56
    elif choice == 99:
57
        os.system('clear'),sys.exit();
58
#end of function
59
##########################
60
#nmap function 
61
def nmap():
62
    print("this step will download and install nmap ")
63
    print("yes or no ")
64
    choice7 = raw_input()
65
    if choice7 in yes :
66
        os.system("wget https://nmap.org/dist/nmap-7.01.tar.bz2")
67
        os.system("bzip2 -cd nmap-7.01.tar.bz2 | tar xvf -")
68
        os.system("cd nmap-7.01")
69
        os.system("./configure")
70
        os.system("make")
71
        os.system("su root")
72
        os.system("make install")
73
    elif choice7 in no :
74
        info()
75
####################################
76
#jboss-autopwn
77
def jboss():
78
    os.system('clear')
79
    print ("This JBoss script deploys a JSP shell on the target JBoss AS server. Once")
80
    print ("deployed, the script uses its upload and command execution capability to")
81
    print ("provide an interactive session.")
82
    print ("")
83
    print (" this will install jboss-autopwn") 
84
    print ("usage : ./e.sh target_ip tcp_port ")
85
    choice9 = raw_input("yes / no :")
86
    if choice9 in yes:
87
        os.system("git clone https://github.com/SpiderLabs/jboss-autopwn.git"),sys.exit();
88
    elif choice9 in no:
89
        os.system('clear'); exp()
90
#sqlmap 
91
def sqlmap():
92
    print (" this will install sqlmap ")
93
    print ("usage : python sqlmap.py -h")
94
    choice8 = input("yes or no :")
95
    if choice8 in yes:
96
        os.system("git clone https://github.com/sqlmapproject/sqlmap.git sqlmap-dev")
97
    elif choice8 in no:
98
        os.system('clear'); info()
99
100
#setoolkit 
101
def setoolkit():
102
    print ("The Social-Engineer Toolkit is an open-source penetration testing framework")
103
    print(") designed for social engineering. SET has a number of custom attack vectors that ")
104
    print(" allow you to make a believable attack quickly. SET is a product of TrustedSec, LLC  ")
105
    print("an information security consulting firm located in Cleveland, Ohio.")
106
    print("")
107
    choiceset = raw_input("y / n :")
108
    if choiceset in yes:
109
        os.system("git clone https://github.com/trustedsec/social-engineer-toolkit.git");os.system("cd social-engineer-toolkit");os.system("python setup.py")
110
    if choiceset in no:
111
        os.system("clear"); info()
112
#cupp 
113
def cupp():
114
    print("cupp is a password list generator ")
115
    print("Usage: python cupp.py -h")
116
    print("yes or now")
117
    choicecupp = raw_input("y / n :")
118
    
119
    if choicecupp in yes:
120
        os.system("git clone https://github.com/Mebus/cupp.git");os.system("cd cupp")
121
    elif choicecupp in no:
122
        os.system("clear"); passwd()
123
#ncrack 
124
def ncrack():
125
    print("A Ruby interface to Ncrack, Network authentication cracking tool.")
126
    print("requires : nmap >= 0.3ALPHA / rprogram ~> 0.3")
127
    print("1 to accept / 0 to decline")
128
    choicencrack = raw_input("y / n :")
129
    if choicencrack in yes:
130
        os.system("git clone https://github.com/sophsec/ruby-ncrack.git");os.system("cd ruby-ncrack");os.systemgem("install ruby-ncrack")
131
    elif choicencrack in no:
132
        os.system("clear"); passwd()
133
#reaver
134
def reaver():
135
    print("Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup")
136
    print(" WPS registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a")
137
    print(") wide variety of access points and WPS implementations")
138
    print("1 to accept / 0 to decline")
139
    creaver = input("y / n :")
140
    if creaver in yes:
141
        os.system("apt-get -y install build-essential libpcap-dev sqlite3 libsqlite3-dev aircrack-ng pixiewps");os.system("git clone https://github.com/t6x/reaver-wps-fork-t6x.git");os.system("cd reaver-wps-fork-t6x");os.system("cd src/");os.system("./configure");os.system("make")
142
    elif creaver in no:
143
        os.system("clear"); wire()
144
145
#####################################
146
#information gathering function
147
def info():
148
    print("1 : nmap ")
149
    print("3 : SET tool kit")
150
    print("99 :Go Back To Main Menu")
151
    choice2 = input("selet a number :")
152
    choice2 = int(choice2)
153
    if choice2 ==1:
154
        os.system('clear'); nmap()
155
    if choice2 ==3:
156
        os.system("clear"); setoolkit()
157
158
    elif choice2 ==99:
159
        os.system("clear"); menu()
160
#end of menu 
161
##########################
162
#password attacks menu 
163
def passwd():
164
    print("1 : cupp ")
165
    print("2 : Ncrack")
166
    print("99:Back To Main Menu")
167
    choice3 = input("selet a number :")
168
    choice3 = int(choice3)
169
    if choice3 ==1:
170
     os.system("clear"); cupp()
171
    elif choice3 ==2:
172
        os.system("clear"); ncrack()
173
    elif choice3 ==99:
174
        os.system("clear"); menu()
175
#end of menu 
176
##########################
177
#wireless attacks
178
def wire():
179
    print("1 : reaver ")
180
    print("99: Go Back To The Main Menu")
181
    choice4 = input("selet a number :")
182
    choice4 = int(choice4)
183
    if choice4 ==1:
184
     os.system("clear");reaver()
185
    elif choice4 ==99:
186
        menu()
187
##########################
188
#exploitation tools
189
def exp():
190
    print("1 : jboss-autopwn ")
191
    print("2 : sqlmap")
192
    print("99 : Go Back To Main Menu")
193
    choice5 = input("selet a number :")
194
    choice5 = int(choice5)
195
    if choice5 ==2:
196
        os.system("clear"); sqlmap()
197
    if choice5 ==1:
198
     os.system('clear'); jboss()
199
    elif choice5 ==99:
200
        menu()
201
###########################
202
#sniffing tools
203
def snif():
204
    print("1 : Set Tool kit ")
205
    print("99: Back To Main Menu")
206
    choice6 = input("selet a number :")
207
    choice6 = int(choice6)
208
    if choice6 ==1:
209
     os.system("clear"); setoolkit()
210
    if choice6 ==99:
211
       os.system("clear"); menu()
212
#end of menu 
213
##########################
214
  #Check use OS
215
def OS():
216
    print(
217
    """
218
    Choose Operating System : 
219
    1) Max OSX
220
    2) Linux
221
    3) Windows
222
    """)
223
    system = input(":")
224
    system = str(system)
225
    if system ==2:
226
        root()
227
    else :
228
        menu()
229
230
############################
231
#check root if linux 
232
def root():
233
    if os.getuid() != 0:
234
        print("Are you root? Please execute as root")
235
        exit() 
236
#############################
237
#begin :D 
238
OS()