Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
def Zphisher():
location = os.getcwd()
if not os.path.isdir('tools/Phishing/zphisher'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Phishing && git clone https://github.com/htr-tech/zphisher.git && cd zphisher && chmod +x zphisher.sh')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Phishing/zphisher".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Phishing && cd zphisher && bash zphisher.sh')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def Spykey():
location = os.getcwd()
if not os.path.isdir('tools/Windows/spykey'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Windows && git clone https://github.com/thelinuxchoice/spykey.git')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Windows/spykey".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Windows && cd spykey && bash spykey.sh')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def Hashcat():
location = os.getcwd()
if not os.path.isdir('tools/Passwords/hashcat'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Passwords && git clone https://github.com/hashcat/hashcat.git && cd hashcat && make && sudo make install')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Passwords/hashcat".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('hashcat -h')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def KnockMail():
location = os.getcwd()
if not os.path.isdir('tools/Others/KnockMail'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Others && git clone https://github.com/4w4k3/KnockMail.git && cd KnockMail && sudo su && pip install -r requeriments.txt')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Others/KnockMail".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Others && cd KnockMail && python knock.py')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def SQLmap():
location = os.getcwd()
if not os.path.isdir('tools/Web/sqlmap-dev'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Web && git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Web/sqlmap-dev".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Web && cd sqlmap-dev && python sqlmap.py -h')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def QRLjacker():
location = os.getcwd()
if not os.path.isdir('tools/Others/QRLJacking'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('sudo apt-get install python3.7 && cd tools && cd Others && git clone https://github.com/OWASP/QRLJacking.git && cd QRLJacking && cd QRLJacker && pip install -r requirements.txt')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Others/QRLJacking".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Others && cd QRLJacking && cd QRLJacker && python3 QrlJacker.py')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def AndroidExploits():
location = os.getcwd()
if not os.path.isdir('tools/Android/Android-Exploits'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Android && git clone https://github.com/sundaysec/Android-Exploits.git')
print("\n{0}[✔] Done.{1}\nExploits guardados en {2}/tools/Android/Android-Exploits".format(GREEN, DEFAULT, location))
pause("\n{}Presione una tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def Ransomware():
location = os.getcwd()
if not os.path.isdir('tools/Others/ransomware'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Others && mkdir ransomware && cd ransomware && wget https://www50.zippyshare.com/d/AXhWKmtC/45706/ransomware.zip && unzip ransomware.zip')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Others/ransomware".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Others && cd ransomware && python ransomware.py -v')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def Infog():
location = os.getcwd()
if not os.path.isdir('tools/InformationGathering/infog'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd InformationGathering && git clone https://github.com/thelinuxchoice/infog.git')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/InformationGathering/infog".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd InformationGathering && cd infog && bash infog.sh')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
def Ps1encode():
location = os.getcwd()
if not os.path.isdir('tools/Windows/ps1encode'):
print("\n{0}[*] Downloading tool...{1}".format(GREEN, DEFAULT))
time.sleep(4)
os.system('cd tools && cd Windows && git clone https://github.com/CroweCybersecurity/ps1encode.git')
print("\n{0}[✔] Done.{1}\nHerramienta guardada en {2}/tools/Windows/ps1encode".format(GREEN, DEFAULT, location))
if raw_input("\n{0}[!] ¿Desea ejecutarla? (y/n)\n{1}KitHack >>{2} ".format(GREEN, RED, DEFAULT)).upper() != "Y":
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()
else:
os.system('cd tools && cd Windows && cd ps1encode && ./ps1encode.rb')
else:
print("\n{}[X] Esta herramienta ya existe...".format(RED))
time.sleep(2)
pause("\n{}Presione cualquier tecla para continuar...".format(GREEN))
os.system('clear')
KitHack.banner(), KitHack.menu(), KitHack.options()