Skip to content

Commit

Permalink
Update hackingtoolkit
Browse files Browse the repository at this point in the history
  • Loading branch information
shliu888 authored Jan 9, 2025
1 parent 6c3fb17 commit d41d4bb
Showing 1 changed file with 54 additions and 49 deletions.
103 changes: 54 additions & 49 deletions hackingtoolkit
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,8 @@ def maltego():
print('Encountered an error: ',str(error))
#----OSINT main menu------
def osint():
print('''
while True:
print('''
1. Maltego
2. theHarvester
3. Recon-ng
Expand All @@ -20,23 +21,23 @@ def osint():
RECON_MENU. Return to Scanning and Reconnaissance menu
BACK. Back to main menu
''')
osintOption=input('Select an option: ')
if osintOption=='1':
maltego()
elif osintOption=='2':
the_harvester()
elif osintOption=='3':
recon_ng()
elif osintOption=='4':
whois()
elif osintOption=='5':
nikto()
elif osintOption=='RECON_MENU':
recon()
elif osintOption=='BACK':
main()
else:
print('Invalid option')
osintOption=input('Select an option: ')
if osintOption=='1':
maltego()
elif osintOption=='2':
the_harvester()
elif osintOption=='3':
recon_ng()
elif osintOption=='4':
whois()
elif osintOption=='5':
nikto()
elif osintOption=='RECON_MENU':
recon()
elif osintOption=='BACK':
main()
else:
print('Invalid option')
#-------Zenmap------
def zenmap_menu():
try:
Expand All @@ -62,8 +63,8 @@ def scan(nmap_choice,target,port_range,if_service_detection): # tcp scan
print("The tool 'nmap' is not installed or not in system PATH.")

def nmap_menu():

print('''
while True:
print('''
1. TCP SYN scan (stealth scan) (-sS)
2. TCP connect scan (-sT)
3. UDP scan (-sU)
Expand All @@ -73,36 +74,36 @@ Note: More options will be added in the future
RECON_MENU. Return to Scanning and Reconnaissance menu
BACK. Back to main menu
''')
nmap_choice=input('Choose an option: ')
target=input('Enter the IP of the host/network you want to scan: ')
port_range=input("Input ports to scan (all ports is 1-65535, 'top' for top 1000 ports (default) ): ")
if_version_detection=input('Do you want version detection [y/n]: ')
if nmap_choice=='1':
nmap_choice='-sS'
elif nmap_choice=='2':
nmap_choice='-sT'
elif nmap_choice=='3':
nmap_choice='-sU'
elif nmap_choice=='4':
nmap_choice='-sA'
elif nmap_choice=='RECON_MENU':
recon()
elif nmap_choice=='BACK':
main()
else:
print('Invalid option')
if if_version_detection=='y':
if_version_detection='-sV'
if port_range=='top':
port_range='--top-ports 1000'
if nmap_choice=='1':
scan(nmap_choice,target,port_range,if_service_detection)
if nmap_choice=='2':
nmap_choice=input('Choose an option: ')
target=input('Enter the IP of the host/network you want to scan: ')
port_range=input("Input ports to scan (all ports is 1-65535, 'top' for top 1000 ports (default) ): ")
if_version_detection=input('Do you want version detection [y/n]: ')
if nmap_choice=='1':
nmap_choice='-sS'
elif nmap_choice=='2':
nmap_choice='-sT'
elif nmap_choice=='3':
nmap_choice='-sU'
elif nmap_choice=='4':
nmap_choice='-sA'
elif nmap_choice=='RECON_MENU':
recon()
elif nmap_choice=='BACK':
main()
else:
print('Invalid option')
if if_version_detection=='y':
if_version_detection='-sV'
if port_range=='top':
port_range='--top-ports 1000'
if nmap_choice=='1':
scan(nmap_choice,target,port_range,if_service_detection)
if nmap_choice=='2':
scan(nmap_choice,target,port_range,if_service_detection)(nmap_choice,target,port_range,if_service_detection)
if nmap_choice=='3':
scan(nmap_choice,target,port_range,if_service_detection)
if nmap_choice=='4':
scan(nmap_choice,target,port_range,if_service_detection)
if nmap_choice=='3':
scan(nmap_choice,target,port_range,if_service_detection)
if nmap_choice=='4':
scan(nmap_choice,target,port_range,if_service_detection)

#---------Recon main menu------------------
def recon():
Expand All @@ -120,6 +121,10 @@ def recon():
zenmap_menu()
elif reconOption=='3':
osint()
elif reconOption=='BACK':
main()
else:
print('Invalid option')

#-----------------------------------
def crack_wifi_password(cap_file, wordlist):
Expand Down

0 comments on commit d41d4bb

Please sign in to comment.