forked from vipulvyas/HaskySpot
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.py
executable file
·196 lines (180 loc) · 7.29 KB
/
main.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
import pyfiglet as fi
import os
import click
import sys
import platform
import time
import datetime
import info.emailfootprint as emailfootprint
import info.dnsfootprint as dnsfootprint
import scan.macspoof as macspf
import info.whoisInfo as whois
import info.infobanner as infobanner
import scan.preproxy as preproxy
import scan.scanbanner as scanbanner
import scan.networkscan as networkscan
import scan.firewallcheck as firewallcheck
import social.socialbanner as socialbanner
import social.googlehacking as googlehacking
import social.hiddenfield as hiddenfield
import sniff.sniffbanner as sniffbanner
import dos.dosbanner as dosbanner
import dos.portchange as pc
class color:
PURPLE = '\033[95m'
CYAN = '\033[96m'
DARKCYAN = '\033[36m'
BLUE = '\033[94m'
GREEN = '\033[92m'
YELLOW = '\033[93m'
RED = '\033[91m'
BOLD = '\033[1m'
UNDERLINE = '\033[4m'
END = '\033[0m'
class Hasky:
def clear(self):
if platform.system() == 'Linux':
os.system("clear")
if platform.system() == 'Windows':
os.system('cls')
os.system('color a')
else:
pass
def spot(self):
self.clear()
print("\n\n")
print(os.system(
"toilet -f ivrit 'Hasky Spot !' | boxes -d dog -a hc -p h8 | lolcat -a -d 1 -s 300"))
print(color.BOLD + color.RED +
" I am NOT responsible for any damages caused or any crimes committed by using this tool.")
print("\n")
print(color.GREEN + " version = 0.1 ")
print(" author = Vipul (Hasky)")
print(" Github = https://github.com/vipulvyas/HaskySpot")
print(" date = " + str(datetime.datetime.now()))
print("\n")
try:
print(color.YELLOW + " [1] Information Gathering")
print(" [2] Scaning")
print(" [3] Social Engineering")
print(" [4] Sniffing")
print(" [5] Denial Of Service Attack")
print(" [6] exit")
print('\n')
option = input(color.GREEN + "Select: ")
if option == '1':
self.clear()
infobanner.info_banner()
print(color.CYAN + " [1] Email Extracter")
print(" [2] Whois Information")
print(" [3] DNS Foot Printing")
print(" [4] Sub Domain")
print(" [5] Back")
info_option = input(color.YELLOW + "Select: ")
if info_option == '1':
emailfootprint.emailfoot.emailfootprint(self)
elif info_option == '2':
whois.WhoisInfo.whoisInfo(self)
elif info_option == '3':
dnsfootprint.DNSfoot.DNSfootprint(self)
elif info_option == '4':
os.system("python3 ./info/subdomain.py")
# subdomain.subdomainclass()
elif info_option == '5':
self.spot()
else:
print("[!] invalid Selection")
self.spot()
elif option == '2':
self.clear()
scanbanner.scanbanner()
print(color.CYAN + " [1] Prepare Proxy")
print(" [2] Mac Spoofing")
print(" [3] Network Scanning")
print(" [4] Fire Wall Check (wefw00f)")
print(" [5] Back")
scan_option = input(color.YELLOW + "Select: ")
if scan_option == '1':
preproxy.preproxy.torproxy(self)
elif scan_option == '2':
macspf.macspoof.change_mac(self)
elif scan_option == '3':
networkscan.networkscan.networkscaning(self)
elif scan_option == '4':
firewallcheck.firewallcheck.firewall(self)
elif scan_option == '5':
self.spot()
else:
print("[!] invalid Selection")
self.spot()
elif option == '3':
self.clear()
socialbanner.socialbanner()
print(color.CYAN +
" [1] Google Hackinng(Goodle Dorking)")
print(" [2] Find Hidden Fields")
print(" [3] Email Spoof")
print(" [4] Back")
social_option = input(color.YELLOW + "Select: ")
if social_option == '1':
googlehacking.googlehacking.googlehack(self)
elif social_option == '2':
hiddenfield.hiddenfield.hidden(self)
elif social_option == '3':
self.clear()
os.system("python Send_mail.py")
elif social_option == '4':
self.spot()
else:
print("[!] invalid Selection")
self.spot()
elif option == '4':
self.clear()
sniffbanner.sniffbanner()
print(color.CYAN + " [1] Sniff TCP/UDP/ICMP/HTTP traffic")
print(color.CYAN + " [2] Credential Sniff")
print(color.CYAN + " [3] Back")
sniff_option = input(color.YELLOW + "Select: ")
if sniff_option == '1':
os.system("sudo python3 ./sniff/sniffer.py")
elif sniff_option == '2':
os.system("sudo python ./sniff/cred.py")
elif sniff_option == '3':
self.spot()
else:
print("[!] invalid Selection")
self.spot()
print("4")
elif option == '5':
self.clear()
dosbanner.dosbanner()
print(color.CYAN + " [1] Memcrashed DDOS")
print(" [2] Ping Of Death")
print(" [3] Port Changeing DDOS")
print(" [4] Back")
dos_option = input(color.YELLOW + "Select: ")
if dos_option == '1':
os.system("sudo python3 ./dos/Memcrashed.py")
elif dos_option == '2':
os.system("sudo python3 ./dos/pingofdeath.py")
elif dos_option == '3':
pc.portchange.attack(self)
elif dos_option == '4':
self.spot()
else:
print("[!] invalid Selection")
self.spot()
elif option == '6':
print(color.GREEN + "Bye Bye")
sys.exit(2)
else:
print(color.RED+"\n[!] Invalid Selection.")
self.spot()
except KeyboardInterrupt:
print(color.RED+"\n[!] You Press Ctrl + C! To Quit.")
sys.exit(1)
except Exception as e:
print(e)
if __name__ == "__main__":
hasky = Hasky()
hasky.spot()