-
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathstart.py
856 lines (834 loc) · 42.1 KB
/
start.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
import os
import sys
import quo
import readline
from time import sleep as timeout
from src.debonair.core import *
@command()
@app("--list", help="--list contains the homepage section")
def main(list):
banner()
echo(f" [01] Information Gathering", foreground="vred", bold=True)
echo(f" [02] Vulnerability Analysis", foreground="vblue", bold=True)
echo(f" [03] Web Hacking", foreground="vyellow", bold=True)
echo(f" [04] Database Assessment", foreground="vgreen", bold=True)
echo(f" [05] Password Attacks",foreground="vwhite", bold=True)
echo(f" [06] Wireless Attacks", foreground="vcyan", bold=True)
echo(f" [07] Reverse Engineering", foreground="vmagenta", bold=True)
echo(f" [08] Exploitation Tools", foreground=(165, 42, 42), bold=True)
echo(f" [09] Sniffing and Spoofing", foreground=(0, 128, 128), bold=True)
echo(f" [10] Reporting Tools", foreground=(128, 128, 0), bold=True)
echo(f" [11] Forensic Tools", foreground=(210, 105, 30), bold=True)
echo(f" [12] Stress Testing", foreground=(188, 143, 143), bold=True)
echo(f" [13] Install Linux Distro", foreground=(65, 105, 225), bold=True)
echo(f" [14] Termux Utility", foreground=(255, 127, 80), bold=True)
echo(f" [15] Shell Function [.bashrc]", bold=True)
echo(f" [16] Install CLI Games", foreground=(255, 215, 0), bold=True)
echo(f" [17] Malware Analysis", foreground=(175, 238, 238), bold=True)
echo(f" [18] Compiler/Interpreter", foreground=(127, 255, 212), bold=True)
echo(f" [19] Social Engineering Tools", foreground=(255, 20, 147), bold=True)
echo(f" [00] Exit Debonair", foreground="black", background="yellow", bold=True)
debonair = prompt("@dbnr >> install ")
# 01 - Information Gathering
if debonair.strip() == "1" or debonair.strip() == "01":
print("\n [01] Nmap: Utility for network discovery and security auditing")
print(" [02] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling")
print(" [03] D-TECT: All-In-One Tool for Penetration Testing")
print(" [04] sqlmap: Automatic SQL injection and database takeover tool")
print(" [05] Infoga: Tool for Gathering Email Accounts Informations")
print(" [06] ReconDog: Information Gathering and Vulnerability Scanner tool")
print(" [07] AndroZenmap")
print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
print(" [09] AstraNmap: Security scanner used to find hosts and services on a computer network")
print(" [10] MapEye: Accurate GPS Location Tracker (Android, IOS, Windows phones)")
print(" [11] Easymap: Nmap Shortcut")
print(" [12] BlackBox: A Penetration Testing Framework")
print(" [13] XD3v: Powerful tool that lets you know all the essential details about your phone")
print(" [14] Crips: This Tools is a collection of online IP Tools that can be used to quickly get information about IP Address's, Web Pages and DNS records")
print(" [15] SIR: Resolve from the net the last known ip of a Skype Name")
print(" [16] EvilURL: Generate unicode evil domains for IDN Homograph Attack and detect them")
print(" [17] Striker: Recon & Vulnerability Scanning Suite")
print(" [18] Xshell: ToolKit")
print(" [19] OWScan: OVID Web Scanner")
print(" [20] OSIF: Open Source Information Facebook")
print(" [21] Devploit: Simple Information Gathering Tool")
print(" [22] Namechk: Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks")
print(" [23] AUXILE: Web Application Analysis Framework")
print(" [24] inther: Information gathering using shodan, censys and hackertarget")
print(" [25] GINF: GitHub Information Gathering Tool")
print(" [26] GPS Tracking")
print(" [27] ASU: Facebook Hacking ToolKit")
print(" [28] fim: Facebook Image Downloader")
print(" [29] MaxSubdoFinder: Tool for Discovering Subdomain")
print(" [30] pwnedOrNot: OSINT Tool for Finding Passwords of Compromised Email Accounts")
print(" [31] Mac-Lookup: Finds information about a Particular Mac address")
print(" [32] BillCipher: Information Gathering tool for a Website or IP address")
print(" [33] dnsrecon: Security assessment and network troubleshooting")
print(" [34] zphisher: Automated Phishing Tool")
print(" [35] Mr.SIP: SIP-Based Audit and Attack Tool")
print(" [36] Sherlock: Hunt down social media accounts by username")
print(" [37] userrecon: Find usernames across over 75 social networks")
print(" [38] PhoneInfoga: One of the most advanced tools to scan phone numbers using only free resources")
print(" [39] SiteBroker: A cross-platform python based utility for information gathering and penetration testing automation")
print(" [40] maigret: Collect a dossier on a person by username from thousands of sites")
print(" [41] GatheTOOL: Information Gathering - API hackertarget.com")
print(" [42] ADB-ToolKit")
print(" [43] TekDefense-Automater: Automater - IP URL and MD5 OSINT Analysis")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
infogathering = prompt("@dbnr >> install ")
if infogathering == "@":
infogathering = ""
for x in range(1,201):
infogathering += f"{x} "
if len(infogathering.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for infox in infogathering.split():
if infox.strip() == "01" or infox.strip() == "1": nmap()
elif infox.strip() == "02" or infox.strip() == "2": red_hawk()
elif infox.strip() == "03" or infox.strip() == "3": dtect()
elif infox.strip() == "04" or infox.strip() == "4": sqlmap()
elif infox.strip() == "05" or infox.strip() == "5": infoga()
elif infox.strip() == "06" or infox.strip() == "6": reconDog()
elif infox.strip() == "07" or infox.strip() == "7": androZenmap()
elif infox.strip() == "08" or infox.strip() == "8": sqlmate()
elif infox.strip() == "09" or infox.strip() == "9": astraNmap()
elif infox.strip() == "10": mapeye()
elif infox.strip() == "11": easyMap()
elif infox.strip() == "12": blackbox()
elif infox.strip() == "13": xd3v()
elif infox.strip() == "14": crips()
elif infox.strip() == "15": sir()
elif infox.strip() == "16": evilURL()
elif infox.strip() == "17": striker()
elif infox.strip() == "18": xshell()
elif infox.strip() == "19": owscan()
elif infox.strip() == "20": osif()
elif infox.strip() == "21": devploit()
elif infox.strip() == "22": namechk()
elif infox.strip() == "23": auxile()
elif infox.strip() == "24": inther()
elif infox.strip() == "25": ginf()
elif infox.strip() == "26": gpstr()
elif infox.strip() == "27": asu()
elif infox.strip() == "28": fim()
elif infox.strip() == "29": maxsubdofinder()
elif infox.strip() == "30": pwnedOrNot()
elif infox.strip() == "31": maclook()
elif infox.strip() == "32": billcypher()
elif infox.strip() == "33": dnsrecon()
elif infox.strip() == "34": zphisher()
elif infox.strip() == "35": mrsip()
elif infox.strip() == "36": sherlock()
elif infox.strip() == "37": userrecon()
elif infox.strip() == "38": phoneinfoga()
elif infox.strip() == "39": sitebroker()
elif infox.strip() == "40": maigret()
elif infox.strip() == "41": gathetool()
elif infox.strip() == "42": adbtk()
elif infox.strip() == "43": tekdefense()
elif infox.strip() == "00" or infox.strip() == "0": restart_program()
else: echo(f"ERROR: Wrong Input", foreground="red", bold=True);timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 02 - Vulnerability Analysis
elif debonair.strip() == "2" or debonair.strip() == "02":
print("\n [01] Nmap: Utility for network discovery and security auditing")
print(" [02] AndroZenmap")
print(" [03] AstraNmap: Security scanner used to find hosts and services on a computer network")
print(" [04] Easymap: Nmap Shortcut")
print(" [05] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling")
print(" [06] D-TECT: All-In-One Tool for Penetration Testing")
print(" [07] Damn Small SQLi Scanner: A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code")
print(" [08] SQLiv: massive SQL injection vulnerability scanner")
print(" [09] sqlmap: Automatic SQL injection and database takeover tool")
print(" [10] sqlscan: Quick SQL Scanner, Dorker, Webshell injector PHP")
print(" [11] Wordpresscan: WPScan rewritten in Python + some WPSeku ideas")
print(" [12] WPScan: Free wordPress security scanner")
print(" [13] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
print(" [14] termux-wordpresscan")
print(" [15] TM-scanner: websites vulnerability scanner for termux")
print(" [16] Rang3r: Multi Thread IP + Port Scanner")
print(" [17] Striker: Recon & Vulnerability Scanning Suite")
print(" [18] Routersploit: Exploitation Framework for Embedded Devices")
print(" [19] Xshell: ToolKit")
print(" [20] SH33LL: Shell Scanner")
print(" [21] BlackBox: A Penetration Testing Framework")
print(" [22] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
print(" [23] OWScan: OVID Web Scanner")
print(" [24] XPL-SEARCH: Search exploits in multiple exploit databases")
print(" [25] AndroBugs_Framework: An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
vulnsys = prompt("@dbnr >> install ")
if vulnsys == "@":
vulnsys = ""
for x in range(1,201):
vulnsys += f"{x} "
if len(vulnsys.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for vulnx in vulnsys.split():
if vulnsys.strip() == "01" or vulnsys.strip() == "1": nmap()
elif vulnsys.strip() == "02" or vulnsys.strip() == "2": androZenmap()
elif vulnsys.strip() == "03" or vulnsys.strip() == "3": astraNmap()
elif vulnsys.strip() == "04" or vulnsys.strip() == "4": easyMap()
elif vulnsys.strip() == "05" or vulnsys.strip() == "5": red_hawk()
elif vulnsys.strip() == "06" or vulnsys.strip() == "6": dtect()
elif vulnsys.strip() == "07" or vulnsys.strip() == "7": dsss()
elif vulnsys.strip() == "08" or vulnsys.strip() == "8": sqliv()
elif vulnsys.strip() == "09" or vulnsys.strip() == "9": sqlmap()
elif vulnsys.strip() == "10": sqlscan()
elif vulnsys.strip() == "11": wordpreSScan()
elif vulnsys.strip() == "12": wpscan()
elif vulnsys.strip() == "13": sqlmate()
elif vulnsys.strip() == "14": wordpresscan()
elif vulnsys.strip() == "15": tmscanner()
elif vulnsys.strip() == "16": rang3r()
elif vulnsys.strip() == "17": striker()
elif vulnsys.strip() == "18": routersploit()
elif vulnsys.strip() == "19": xshell()
elif vulnsys.strip() == "20": sh33ll()
elif vulnsys.strip() == "21": blackbox()
elif vulnsys.strip() == "22": xattacker()
elif vulnsys.strip() == "23": owscan()
elif vulnsys.strip() == "24": xplsearch()
elif vulnsys.strip() == "25": androbugs()
elif vulnsys.strip() == "00" or vulnsys.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 03 - Web Hacking
elif debonair.strip() == "3" or debonair.strip() == "03":
print("\n [01] sqlmap: Automatic SQL injection and database takeover tool")
print(" [02] WebDAV: WebDAV File Upload Exploiter")
print(" [03] MaxSubdoFinder: Tool for Discovering Subdomain")
print(" [04] Webdav Mass Exploit")
print(" [05] Atlas: Quick SQLMap Tamper Suggester")
print(" [06] sqldump: Dump sql result sites with easy")
print(" [07] Websploit: An advanced MiTM Framework")
print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
print(" [09] inther: Information gathering using shodan, censys and hackertarget")
print(" [10] HPB: HTML Pages Builder")
print(" [11] Xshell: ToolKit")
print(" [12] SH33LL: Shell Scanner")
print(" [13] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
print(" [14] XSStrike: Most advanced XSS Scanner")
print(" [15] Breacher: An advanced multithreaded admin panel finder")
print(" [16] OWScan: OVID Web Scanner")
print(" [17] ko-dork: A simple vuln web scanner")
print(" [18] ApSca: Powerful web penetration application")
print(" [19] amox: Find backdoor or shell planted on a site via dictionary attack")
print(" [20] FaDe: Fake deface with kindeditor, fckeditor and webdav")
print(" [21] AUXILE: Auxile Framework")
print(" [22] xss-payload-list: Cross Site Scripting ( XSS ) Vulnerability Payload List")
print(" [23] Xadmin: Admin Panel Finder")
print(" [24] CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
webhack = prompt("@dbnr >> install ")
if webhack == "@":
webhack = ""
for x in range(1,201):
webhack += f"{x} "
if len(webhack.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for webhx in webhack.split():
if webhx.strip() == "01" or webhx.strip() == "1": sqlmap()
elif webhx.strip() == "02" or webhx.strip() == "2": webdav()
elif webhx.strip() == "03" or webhx.strip() == "3": maxsubdofinder()
elif webhx.strip() == "04" or webhx.strip() == "4": webmassploit()
elif webhx.strip() == "05" or webhx.strip() == "5": atlas()
elif webhx.strip() == "06" or webhx.strip() == "6": sqldump()
elif webhx.strip() == "07" or webhx.strip() == "7": websploit()
elif webhx.strip() == "08" or webhx.strip() == "8": sqlmate()
elif webhx.strip() == "09" or webhx.strip() == "9": inther()
elif webhx.strip() == "10": hpb()
elif webhx.strip() == "11": xshell()
elif webhx.strip() == "12": sh33ll()
elif webhx.strip() == "13": xattacker()
elif webhx.strip() == "14": xsstrike()
elif webhx.strip() == "15": breacher()
elif webhx.strip() == "16": owscan()
elif webhx.strip() == "17": kodork()
elif webhx.strip() == "18": apsca()
elif webhx.strip() == "19": amox()
elif webhx.strip() == "20": fade()
elif webhx.strip() == "21": auxile()
elif webhx.strip() == "22": xss_payload_list()
elif webhx.strip() == "23": xadmin()
elif webhx.strip() == "24": cmseek()
elif webhx.strip() == "00" or webhx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 04 - Database Assessment
elif debonair.strip() == "4" or debonair.strip() == "04":
print("\n [01] DbDat: DbDat performs numerous checks on a database to evaluate security")
print(" [02] sqlmap: Automatic SQL injection and database takeover tool")
print(" [03] NoSQLMap: Automated NoSQL database enumeration and web application exploitation tool")
print(" [04] audit_couchdb: Detect security issues, large or small, in a CouchDB server")
print(" [05] mongoaudit: An automated pentesting tool that lets you know if your MongoDB instances are properly secured")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
dbssm = prompt("@dbnr >> install ")
if dbssm == "@":
dbssm = ""
for x in range(1,201):
dbssm += f"{x} "
if len(dbssm.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for dbsx in dbssm.split():
if dbsx.strip() == "01" or dbsx.strip() == "1": dbdat()
elif dbsx.strip() == "02" or dbsx.strip() == "2": sqlmap()
elif dbsx.strip() == "03" or dbsx.strip() == "3": nosqlmap
elif dbsx.strip() == "04" or dbsx.strip() == "4": audit_couchdb()
elif dbsx.strip() == "05" or dbsx.strip() == "5": mongoaudit()
elif dbsx.strip() == "00" or dbsx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 05 - Password Attacks
elif debonair.strip() == "5" or debonair.strip() == "05":
print("\n [01] Hydra: Network logon cracker supporting different services")
print(" [02] FMBrute: Facebook Multi Brute Force")
print(" [03] HashID: Software to identify the different types of hashes")
print(" [04] Facebook Brute Force 3")
print(" [05] Black Hydra: A small program to shorten brute force sessions on hydra")
print(" [06] Hash Buster: Crack hashes in seconds")
print(" [07] FBBrute: Facebook Brute Force")
print(" [08] Cupp: Common User Passwords Profiler")
print(" [09] InstaHack: Instagram Brute Force")
print(" [10] Indonesian Wordlist")
print(" [11] Xshell")
print(" [12] Aircrack-ng: WiFi security auditing tools suite")
print(" [13] BlackBox: A Penetration Testing Framework")
print(" [14] Katak: An open source software login brute-forcer toolkit and hash decrypter")
print(" [15] Hasher: Hash cracker with auto detect hash")
print(" [16] Hash-Generator: Beautiful Hash Generator")
print(" [17] nk26: Nkosec Encode")
print(" [18] Hasherdotid: A tool for find an encrypted text")
print(" [19] Crunch: Highly customizable wordlist generator")
print(" [20] Hashcat: World's fastest and most advanced password recovery utility")
print(" [21] ASU: Facebook Hacking ToolKit")
print(" [22] Credmap: An open source tool that was created to bring awareness to the dangers of credential reuse")
print(" [23] BruteX: Automatically brute force all services running on a target")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
passtak = prompt("@dbnr >> install ")
if passtak == "@":
passtak = ""
for x in range(1,201):
passtak += f"{x} "
if len(passtak.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for passx in passtak.split():
if passx.strip() == "01" or passx.strip() == "1": hydra()
elif passx.strip() == "02" or passx.strip() == "2": fmbrute()
elif passx.strip() == "03" or passx.strip() == "3": hashid()
elif passx.strip() == "04" or passx.strip() == "4": fbBrute()
elif passx.strip() == "05" or passx.strip() == "5": black_hydra()
elif passx.strip() == "06" or passx.strip() == "6": hash_buster()
elif passx.strip() == "07" or passx.strip() == "7": fbbrutex()
elif passx.strip() == "08" or passx.strip() == "8": cupp()
elif passx.strip() == "09" or passx.strip() == "9": instaHack()
elif passx.strip() == "10": indonesian_wordlist()
elif passx.strip() == "11": xshell()
elif passx.strip() == "12": aircrackng()
elif passx.strip() == "13": blackbox()
elif passx.strip() == "14": katak()
elif passx.strip() == "15": hasher()
elif passx.strip() == "16": hashgenerator()
elif passx.strip() == "17": nk26()
elif passx.strip() == "18": hasherdotid()
elif passx.strip() == "19": crunch()
elif passx.strip() == "20": hashcat()
elif passx.strip() == "21": asu()
elif passx.strip() == "22": credmap()
elif passx.strip() == "23": brutex()
elif passx.strip() == "00" or passx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 06 - Wireless Attacks
elif debonair.strip() == "6" or debonair.strip() == "06":
print("\n [01] Aircrack-ng: WiFi security auditing tools suite")
print(" [02] Wifite: An automated wireless attack tool")
print(" [03] Wifiphisher: The Rogue Access Point Framework")
print(" [04] Routersploit: Exploitation Framework for Embedded Devices")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
wiretak = prompt("@dbnr >> install ")
if wiretak == "@":
wiretak = ""
for x in range(1,201):
wiretak += f"{x} "
if len(wiretak.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for wirex in wiretak.split():
if wirex.strip() == "01" or wirex.strip() == "1": aircrackng()
elif wirex.strip() == "02" or wirex.strip() == "2": wifite()
elif wirex.strip() == "03" or wirex.strip() == "3": wifiphisher()
elif wirex.strip() == "04" or wirex.strip() == "4": routersploit()
elif wirex.strip() == "00" or wirex.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 07 - Reverse Engineering
elif debonair.strip() == "7" or debonair.strip() == "07":
print("\n [01] Binary Exploitation")
print(" [02] jadx: DEX to JAVA Decompiler")
print(" [03] apktool: A utility that can be used for reverse engineering Android applications")
print(" [04] uncompyle6: Python cross-version byte-code decompiler")
print(" [05] ddcrypt: DroidScript APK Deobfuscator")
print(" [06] CFR: Yet another java decompiler")
print(" [07] UPX: Ultimate Packer for eXecutables")
print(" [08] pyinstxtractor: PyInstaller Extractor")
print(" [09] innoextract: A tool to unpack installers created by Inno Setup")
print(" [10] binwalk: Firmware analysis tool")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
reversi = prompt("@dbnr >> install ")
if reversi == "@":
reversi = ""
for x in range(1,201):
reversi += f"{x} "
if len(reversi.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for revex in reversi.split():
if revex.strip() == "01" or revex.strip() == "1": binploit()
elif revex.strip() == "02" or revex.strip() == "2": jadx()
elif revex.strip() == "03" or revex.strip() == "3": apktool()
elif revex.strip() == "04" or revex.strip() == "4": uncompyle()
elif revex.strip() == "05" or revex.strip() == "5": ddcrypt()
elif revex.strip() == "06" or revex.strip() == "6": cfr()
elif revex.strip() == "07" or revex.strip() == "7": upx()
elif revex.strip() == "08" or revex.strip() == "8": pyinstxtractor()
elif revex.strip() == "09" or revex.strip() == "9": innoextract()
elif revex.strip() == "10": binwalk()
elif revex.strip() == "00" or revex.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 08 - Exploitation Tools
elif debonair.strip() == "8" or debonair.strip() == "08":
print("\n [01] Metasploit: Advanced open-source platform for developing, testing and using exploit code")
print(" [02] commix: Automated All-in-One OS Command Injection and Exploitation Tool")
print(" [03] BlackBox: A Penetration Testing Framework")
print(" [04] Brutal: Payload for teensy like a rubber ducky but the syntax is different")
print(" [05] TXTool: An easy pentesting tool")
print(" [06] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
print(" [07] Websploit: An advanced MiTM Framework")
print(" [08] Routersploit: Exploitation Framework for Embedded Devices")
print(" [09] A-Rat: Remote Administration Tool")
print(" [10] BAF: Blind Attacking Framework")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
exploitool = prompt("@dbnr >> install ")
if exploitool == "@":
exploitool = ""
for x in range(1,201):
exploitool += f"{x} "
if len(exploitool.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for explx in exploitool.split():
if explx.strip() == "01" or explx.strip() == "1": metasploit()
elif explx.strip() == "02" or explx.strip() == "2": commix()
elif explx.strip() == "03" or explx.strip() == "3": blackbox()
elif explx.strip() == "04" or explx.strip() == "4": brutal()
elif explx.strip() == "05" or explx.strip() == "5": txtool()
elif explx.strip() == "06" or explx.strip() == "6": xattacker()
elif explx.strip() == "07" or explx.strip() == "7": websploit()
elif explx.strip() == "08" or explx.strip() == "8": routersploit()
elif explx.strip() == "09" or explx.strip() == "9": arat()
elif explx.strip() == "10": baf()
elif explx.strip() == "00" or explx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 09 - Sniffing and Spoofing
elif debonair.strip() == "9" or debonair.strip() == "09":
print("\n [01] KnockMail: Verify if Email Exists")
print(" [02] tcpdump: A powerful command-line packet analyzer")
print(" [03] Ettercap: Comprehensive suite for MITM attacks, can sniff live connections, do content filtering on the fly and much more")
print(" [04] hping3: hping is a command-line oriented TCP/IP packet assembler/analyzer")
print(" [05] tshark: Network protocol analyzer and sniffer")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
sspoof = prompt("@dbnr >> install ")
if sspoof == "@":
sspoof = ""
for x in range(1,201):
sspoof += f"{x} "
if len(sspoof.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for sspx in sspoof.split():
if sspx.strip() == "01" or sspx.strip() == "1": knockmail()
elif sspx.strip() == "02" or sspx.strip() == "2": tcpdump()
elif sspx.strip() == "03" or sspx.strip() == "3": ettercap()
elif sspx.strip() == "04" or sspx.strip() == "4": hping3()
elif sspx.strip() == "05" or sspx.strip() == "5": tshark()
elif sspx.strip() == "00" or sspx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 10 - Reporting Tools
elif debonair.strip() == "10":
print("\n [01] dos2unix: Converts between DOS and Unix text files")
print(" [02] exiftool: Utility for reading, writing and editing meta information in a wide variety of files")
print(" [03] iconv: Utility converting between different character encodings")
print(" [04] mediainfo: Command-line utility for reading information from media files")
print(" [05] pdfinfo: PDF document information extractor")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
reportls = prompt("@dbnr >> install ")
if reportls == "@":
reportls = ""
for x in range(1,201):
reportls += f"{x} "
if len(reportls.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for reportx in reportls.split():
if reportx.strip() == "01" or reportx.strip() == "1": dos2unix()
elif reportx.strip() == "02" or reportx.strip() == "2": exiftool()
elif reportx.strip() == "03" or reportx.strip() == "3": iconv()
elif reportx.strip() == "04" or reportx.strip() == "4": mediainfo()
elif reportx.strip() == "05" or reportx.strip() == "5": pdfinfo()
elif reportx.strip() == "00" or reportx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 11 - Forensic Tools
elif debonair.strip() == "11":
print("\n [01] steghide: Embeds a message in a file by replacing some of the least significant bits")
print(" [02] tesseract: Tesseract is probably the most accurate open source OCR engine available")
print(" [03] sleuthkit: The Sleuth Kit (TSK) is a library for digital forensics tools")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
forensc = prompt("@dbnr >> install ")
if forensc == "@":
forensc = ""
for x in range(1,201):
forensc += f"{x} "
if len(forensc.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for forenx in forensc.split():
if forenx.strip() == "01" or forenx.strip() == "1": steghide()
elif forenx.strip() == "02" or forenx.strip() == "2": tesseract()
elif forenx.strip() == "03" or forenx.strip() == "3": sleuthkit()
elif forenx.strip() == "00" or forenx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 12 - Stress Testing
elif debonair.strip() == "12":
print("\n [01] Torshammer: Slow post DDOS tool")
print(" [02] Slowloris: Low bandwidth DoS tool")
print(" [03] Fl00d & Fl00d2: UDP Flood tool")
print(" [04] GoldenEye: GoldenEye Layer 7 (KeepAlive+NoCache) DoS test tool")
print(" [05] Xerxes: The most powerful DoS tool")
print(" [06] Planetwork-DDOS")
print(" [07] Xshell")
print(" [08] santet-online: Social Engineering Tool")
print(" [09] dost-attack: WebServer Attacking Tools")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
stresstest = prompt("@dbnr >> install ")
if stresstest == "@":
stresstest = ""
for x in range(1,201):
stresstest += f"{x} "
if len(stresstest.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for stressx in stresstest.split():
if stressx.strip() == "01" or stressx.strip() == "1": torshammer()
elif stressx.strip() == "02" or stressx.strip() == "2": slowloris()
elif stressx.strip() == "03" or stressx.strip() == "3": fl00d12()
elif stressx.strip() == "04" or stressx.strip() == "4": goldeneye()
elif stressx.strip() == "05" or stressx.strip() == "5": xerxes()
elif stressx.strip() == "06" or stressx.strip() == "6": planetwork_ddos()
elif stressx.strip() == "07" or stressx.strip() == "7": xshell()
elif stressx.strip() == "08" or stressx.strip() == "8": sanlen()
elif stressx.strip() == "09" or stressx.strip() == "9": dostattack()
elif stressx.strip() == "00" or stressx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 13 - Install Linux Distro
elif debonair.strip() == "13":
print("\n [01] Ubuntu")
print(" [02] Fedora")
print(" [03] Kali Nethunter")
print(" [04] Parrot")
print(" [05] Arch Linux")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
innudis = prompt("@dbnr >> install ")
if innudis == "@":
innudis = ""
for x in range(1,201):
innudis += f"{x} "
if len(innudis.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for innux in innudis.split():
if innux.strip() == "01" or innux.strip() == "1": ubuntu()
elif innux.strip() == "02" or innux.strip() == "2": fedora()
elif innux.strip() == "03" or innux.strip() == "3": nethunter()
elif innux.strip() == "04" or innux.strip() == "4": parrot()
elif innux.strip() == "05" or innux.strip() == "5": archlinux()
elif innux.strip() == "00" or innux.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 14 - Termux Utility
elif debonair.strip() == "14":
print("\n [01] SpiderBot: Curl website using random proxy and user agent")
print(" [02] Ngrok: tunnel local ports to public URLs and inspect traffic")
print(" [03] Sudo: sudo installer for Android")
print(" [04] google: Python bindings to the Google search engine")
print(" [05] kojawafft")
print(" [06] ccgen: Credit Card Generator")
print(" [07] VCRT: Virus Creator")
print(" [08] E-Code: PHP Script Encoder")
print(" [09] Termux-Styling")
print(" [11] xl-py: XL Direct Purchase Package")
print(" [12] BeanShell: A small, free, embeddable Java source interpreter with object scripting language features, written in Java")
print(" [13] vbug: Virus Maker")
print(" [14] Crunch: Highly customizable wordlist generator")
print(" [15] Textr: Simple tool for running text")
print(" [16] heroku: CLI to interact with Heroku")
print(" [17] RShell: Reverse shell for single listening")
print(" [18] TermPyter: Fix all error Jupyter installation on termux")
print(" [19] Numpy: The fundamental package for scientific computing with Python")
print(" [20] BTC-to-IDR-checker: Check the exchange rate virtual money currency to Indonesia Rupiah from Bitcoin.co.id API")
print(" [21] ClickBot: Earn money using telegram bot")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
moretool = prompt("@dbnr >> install ")
if moretool == "@":
moretool = ""
for x in range(1,201):
moretool += f"{x} "
if len(moretool.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for moret in moretool.split():
if moret.strip() == "01" or moret.strip() == "1": spiderbot()
elif moret.strip() == "02" or moret.strip() == "2": ngrok()
elif moret.strip() == "03" or moret.strip() == "3": sudo()
elif moret.strip() == "04" or moret.strip() == "4": google()
elif moret.strip() == "05" or moret.strip() == "5": kojawafft()
elif moret.strip() == "06" or moret.strip() == "6": ccgen()
elif moret.strip() == "07" or moret.strip() == "7": vcrt()
elif moret.strip() == "08" or moret.strip() == "8": ecode()
elif moret.strip() == "09" or moret.strip() == "9": stylemux()
elif moret.strip() == "10": passgencvar()
elif moret.strip() == "11": xlPy()
elif moret.strip() == "12": beanshell()
elif moret.strip() == "13": vbug()
elif moret.strip() == "14": crunch()
elif moret.strip() == "15": textr()
elif moret.strip() == "16": heroku()
elif moret.strip() == "17": rshell()
elif moret.strip() == "18": termpyter()
elif moret.strip() == "19": numpy()
elif moret.strip() == "20": btc2idr()
elif moret.strip() == "21": clickbot()
elif moret.strip() == "00" or moret.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 15 - Shell Function [.bashrc]
elif debonair.strip() == "15":
print("\n [01] FBVid (FB Video Downloader)")
print(" [02] cast2video (Asciinema Cast Converter)")
print(" [03] iconset (AIDE App Icon)")
print(" [04] readme (GitHub README.md)")
print(" [05] makedeb (DEB Package Builder)")
print(" [06] quikfind (Search Files)")
print(" [07] pranayama (4-7-8 Relax Breathing)")
print(" [08] sqlc (SQLite Query Processor)")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
myshf = prompt("@dbnr >> install ")
if myshf == "@":
myshf = ""
for x in range(1,201):
myshf += f"{x} "
if len(myshf.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for mysh in myshf.split():
if mysh.strip() == "01" or mysh.strip() == "1": fbvid()
elif mysh.strip() == "02" or mysh.strip() == "2": cast2video()
elif mysh.strip() == "03" or mysh.strip() == "3": iconset()
elif mysh.strip() == "04" or mysh.strip() == "4": readme()
elif mysh.strip() == "05" or mysh.strip() == "5": makedeb()
elif mysh.strip() == "06" or mysh.strip() == "6": quikfind()
elif mysh.strip() == "07" or mysh.strip() == "7": pranayama()
elif mysh.strip() == "08" or mysh.strip() == "8": sqlc()
elif mysh.strip() == "00" or mysh.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 16 - Install CLI Games
elif debonair.strip() == "16":
print("\n [01] Flappy Bird")
print(" [02] Street Car")
print(" [03] Speed Typing")
print(" [04] NSnake: The classic snake game with textual interface")
print(" [05] Moon buggy: Simple game where you drive a car across the moon's surface")
print(" [06] Nudoku: ncurses based sudoku game")
print(" [07] tty-solitaire")
print(" [08] Pacman4Console")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
cligam = prompt("@dbnr >> install ")
if cligam == "@":
cligam = ""
for x in range(1,201):
cligam += f"{x} "
if len(cligam.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for clig in cligam.split():
if clig.strip() == "01" or clig.strip() == "1": flappy_bird()
elif clig.strip() == "02" or clig.strip() == "2": street_car()
elif clig.strip() == "03" or clig.strip() == "3": speed_typing()
elif clig.strip() == "04" or clig.strip() == "4": nsnake()
elif clig.strip() == "05" or clig.strip() == "5": moon_buggy()
elif clig.strip() == "06" or clig.strip() == "6": nudoku()
elif clig.strip() == "07" or clig.strip() == "7": ttysolitaire()
elif clig.strip() == "08" or clig.strip() == "8": pacman4console()
elif clig.strip() == "00" or clig.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 17 - Malware Analysis
elif debonair.strip() == "17":
print("\n [01] Lynis: Security Auditing and Rootkit Scanner")
print(" [02] Chkrootkit: A Linux Rootkit Scanners")
print(" [03] ClamAV: Antivirus Software Toolkit")
print(" [04] Yara: Tool aimed at helping malware researchers to identify and classify malware samples")
print(" [05] VirusTotal-CLI: Command line interface for VirusTotal")
print(" [06] avpass: Tool for leaking and bypassing Android malware detection system")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
malsys = prompt("@dbnr >> install ")
if malsys == "@":
malsys = ""
for x in range(1,201):
malsys += f"{x} "
if len(malsys.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for malx in malsys.split():
if malx.strip() == "01" or malx.strip() == "1": lynis()
elif malx.strip() == "02" or malx.strip() == "2": chkrootkit()
elif malx.strip() == "03" or malx.strip() == "3": clamav()
elif malx.strip() == "04" or malx.strip() == "4": yara()
elif malx.strip() == "05" or malx.strip() == "5": virustotal()
elif malx.strip() == "06" or malx.strip() == "6": avpass()
elif malx.strip() == "00" or malx.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 18 - Compiler/Interpreter
elif debonair.strip() == "18":
print("\n [01] Python2: Python 2 programming language intended to enable clear programs")
print(" [02] ecj: Eclipse Compiler for Java")
print(" [03] Golang: Go programming language compiler")
print(" [04] ldc: D programming language compiler, built with LLVM")
print(" [05] Nim: Nim programming language compiler")
print(" [06] shc: Shell script compiler")
print(" [07] TCC: Tiny C Compiler")
print(" [08] PHP: Server-side, HTML-embedded scripting language")
print(" [09] Ruby: Dynamic programming language with a focus on simplicity and productivity")
print(" [10] Perl: Capable, feature-rich programming language")
print(" [11] Vlang: Simple, fast, safe, compiled language for developing maintainable software")
print(" [12] BeanShell: Small, free, embeddable, source level Java interpreter with object based scripting language features written in Java")
print(" [13] fp-compiler: Free Pascal is a 32, 64 and 16 bit professional Pascal compiler")
print(" [14] Octave: Scientific Programming Language")
print(" [15] BlogC: A blog compiler")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
compter = prompt("@dbnr >> install ")
if compter == "@":
compter = ""
for x in range(1,201):
compter += f"{x} "
if len(compter.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for compt in compter.split():
if compt.strip() == "01" or compt.strip() == "1": python2()
elif compt.strip() == "02" or compt.strip() == "2": ecj()
elif compt.strip() == "03" or compt.strip() == "3": golang()
elif compt.strip() == "04" or compt.strip() == "4": ldc()
elif compt.strip() == "05" or compt.strip() == "5": nim()
elif compt.strip() == "06" or compt.strip() == "6": shc()
elif compt.strip() == "07" or compt.strip() == "7": tcc()
elif compt.strip() == "08" or compt.strip() == "8": php()
elif compt.strip() == "09" or compt.strip() == "9": ruby()
elif compt.strip() == "10": perl()
elif compt.strip() == "11": vlang()
elif compt.strip() == "12": beanshell()
elif compt.strip() == "13": fpcompiler()
elif compt.strip() == "14": octave()
elif compt.strip() == "15": blogc()
elif compt.strip() == "00" or compt.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 19 - Social Engineering Tools
elif debonair.strip() == "19":
print("\n [01] weeman: HTTP server for phishing in python")
print(" [02] SocialFish: Educational Phishing Tool & Information Collector")
print(" [03] santet-online: Social Engineering Tool")
print(" [04] SpazSMS: Send unsolicited messages repeatedly on the same phone number")
print(" [05] LiteOTP: Multi Spam SMS OTP")
print(" [06] F4K3: Fake User Data Generator")
print(" [07] Hac")
echo(f" [00] Back to main menu", foreground="black", background="yellow", bold=True)
soceng = prompt("@dbnr >> install ")
if soceng == "@":
soceng = ""
for x in range(1,201):
soceng += f"{x} "
if len(soceng.split()) > 1:
writeStatus(1)
# © Gerrishon Sirere
# Secretum Inc
for socng in soceng.split():
if socng.strip() == "01" or socng.strip() == "1": weeman()
elif socng.strip() == "02" or socng.strip() == "2": socfish()
elif socng.strip() == "03" or socng.strip() == "3": sanlen()
elif socng.strip() == "04" or socng.strip() == "4": spazsms()
elif socng.strip() == "05" or socng.strip() == "5": liteotp()
elif socng.strip() == "06" or socng.strip() == "6": f4k3()
elif socng.strip() == "07" or socng.strip() == "7": hac()
elif socng.strip() == "00" or socng.strip() == "0": restart_program()
else: echo(f"ERROR: Invalid Input", foreground="vred", bold=True) ;timeout(1);restart_program()
if readStatus():
writeStatus(0)
elif debonair.strip() == "00":
sys.exit()
else:
echo(f"ERROR: Invalid Input", foreground="vred", bold=True)
timeout(1)
restart_program()
if __name__ == "__main__":
os.system("clear")
main()