diff --git a/CHANGELOG b/CHANGELOG index f2f42af1..5f2c7619 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -194,3 +194,13 @@ - Efficiency of InfoDisc Phase modules highly uplifted. - Migration from Python2 to Python3 is on the roll. - Small bug fixes (as usual). + + * v1.7.0 + + Some major changes to pre-existing code infrastructure. + + Changelog: + - The best part of it is that, TIDoS now has all API keys set by default! + - Basic changes to code structure. + - Included Travis CI integration to TIDoS. + - Some major bug fixes and other stuff (as usual). diff --git a/README.md b/README.md index fcb6b2ad..0581750e 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ - + @@ -27,7 +27,7 @@ - +

@@ -93,7 +93,11 @@ python2 tidos.py TIDoS is built to be a comprehensive, flexible and versatile framework where you just have to select and use modules. -So to get started, you need to set your own `API KEYS` for various OSINT & Scanning and Enumeration purposes. To do so, open up `API_KEYS.py` under `files/` directory and set your own keys and access tokens for `SHODAN`, `CENSYS`, `FULL CONTACT`, `GOOGLE` and `WHATCMS`. Public `API KEYS` and `ACCESS TOKENS` for `SHODAN` and `WHATCMS` have been provided with the TIDoS release itself. You can still add your own... `no harm!` +So to get started, you need to set your own `API KEYS` for various OSINT & Scanning and Enumeration purposes. To do so, open up `API_KEYS.py` under `files/` directory and set your own keys and access tokens for `SHODAN`, `CENSYS`, `FULL CONTACT`, `GOOGLE` and `WHATCMS`. + +> __GOOD NEWS__: +> +> The latest release of TIDoS includes all API KEYS and ACCESS TOKENS for `SHODAN`, `CENSYS`, `FULL CONTACT`, `GOOGLE` and `WHATCMS` by default. I found these tokens on various repositories on GitHub itself. __You can now use all the modules__ which use the API KEYS. :) Finally, as the framework opens up, enter the website name `eg. http://www.example.com` and let TIDoS lead you. Thats it! Its as easy as that. @@ -302,7 +306,7 @@ Lets see some screenshots of TIDoS in real world pentesting action: ### Version: ``` -v1.6.2 [latest release] [#stable] +v1.7 [latest release] [#stable] ``` ### Upcoming: diff --git a/doc/Version_Num b/doc/Version_Num index d4f6e2c5..7d9c8bd1 100644 --- a/doc/Version_Num +++ b/doc/Version_Num @@ -1 +1 @@ -v1.6.2 +v1.7 diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/auxil.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/auxil.py deleted file mode 100644 index 4cc3863c..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/auxil.py +++ /dev/null @@ -1,76 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import os -import time -import subprocess -import random -from random import randint -from subprocess import call -sys.path.append('modules/0x05-Auxillaries+PF6/') -from encodeall import * -from honeypot import * -from hashes import * -from imgext import * -from core.Auxillaries.auxilban import * - -def auxil(web): - - auxilban() - print('') - time.sleep(0.3) - v = raw_input(GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('') - if v == '1': - print(' [!] Type Selected : Generate Hashes') - hashes() - print('\n\n') - raw_input(O+' [+] Press '+GR+'Enter'+O+' to Continue...') - auxilban() - auxil(web) - - elif v == '2': - print(' [!] Type Selected : Encode Strings') - encodeall() - print('\n\n') - raw_input(O+' [+] Press '+GR+'Enter'+O+' to Continue...') - auxilban() - auxil(web) - - elif v == '3': - print(' [!] Type Selected : Extract Metadata') - imgext() - print('\n\n') - raw_input(O+' [+] Press '+GR+'Enter'+O+' to Continue...') - auxilban() - auxil(web) - - elif v == '4': - print(' [!] Type Selected : Honeypot Detector') - honeypot() - print('\n\n') - raw_input(O+' [+] Press '+GR+'Enter'+O+' to Continue...') - auxilban() - auxil(web) - - elif v == '99': - print(GR+' [*] Going back!') - time.sleep(0.7) - os.system('clear') - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - auxilban() - auxil(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/auxilban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/auxilban.py deleted file mode 100644 index fd32d930..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/auxilban.py +++ /dev/null @@ -1,33 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -import os -from core.Core.colors import * -from core.Core.arts import auxilban_art - -def auxilban(): - - os.system('clear') - print(" [!] Module Selected : Auxillary Modules\n") - time.sleep(0.4) - print(auxilban_art) - time.sleep(0.3) - print('') - print(B+' [1]'+C+' Generate Hashes from Strings'+W+'(4 Types) ') - time.sleep(0.1) - print(B+' [2]'+C+' Encode Payload or Strings'+W+' (7 Types)') - time.sleep(0.1) - print(B+' [3]'+C+' Extract Metadata from Images'+W+' (EXIF Data)') - time.sleep(0.1) - print(B+' [4]'+C+' HoneyPot Probability'+W+' (ShodanLabs HoneyScore)\n') - time.sleep(0.1) - print(B+' [99]'+C+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/colors.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/colors.py deleted file mode 100644 index 5818d90e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/colors.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -############################### -class color: - PURPLE = '\033[95m' - CYAN = '\033[96m' - DARKCYAN = '\033[36m' - BLUE = '\033[94m' - GREEN = '\033[92m' - YELLOW = '\033[93m' - RED = '\033[91m' - BOLD = '\033[1m' - UNDERLINE = '\033[4m' - END = '\033[0m' - HEADER = '\033[95m' - OKBLUE = '\033[94m' - OKGREEN = '\033[92m' - WARNING = '\033[93m' - FAIL = '\033[91m' - -W = '\033[1;0m' # white (normal) -R = '\033[1;31m' # red -G = '\033[1;32m' # green -O = '\033[1;33m' # orange -B = '\033[1;34m' # blue -P = '\033[1;35m' # purple -C = '\033[1;36m' # cyan -GR = '\033[1;37m' # gray -T = '\033[1;93m' # tan -############################### diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/module_index.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Auxillaries/module_index.py deleted file mode 100644 index e69de29b..00000000 diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/agree.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/agree.py deleted file mode 100644 index f2830f30..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/agree.py +++ /dev/null @@ -1,40 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os -import sys -import platform -import time -from core.Core.agreement import * -from core.Core.colors import * - -def agree(): - - os.system('clear') - if str(platform.system()) != "Linux": - sys.exit(R+" [!] " + color.UNDERLINE + "\033[91m" + "You are not using a Linux Based OS! Linux is a must-have for this script!" + color.END) - if not os.geteuid() == 0: - sys.exit(" [!] " + color.UNDERLINE + "\033[91m" + "Must be run as root. :) " + color.END) - if 'no' in open('agree').read(): - agreement() - - a1 = raw_input(O+' [0x00] '+G+'Do you agree to these terms and conditions? :> '+C) - if a1 == "yes" or a1 == 'y' or a1 == 'Y' or a1 == 'Yes' or a1 == 'yo' or a1 == 'YES' or a1 == 'yep' or a1 == 'Yep' or a1 == 'YEP': - print(G+' [0x01] '+O+'Thats awesome! Move on...') - time.sleep(3) - FILE = open("agree","w") - FILE.write('yes') - FILE.close() - - else: - print(O+' [0x0F] '+R+'You have to agree!') - time.sleep(1) - sys.exit(0) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/agreement.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/agreement.py deleted file mode 100644 index 634c3afb..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/agreement.py +++ /dev/null @@ -1,30 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -def agreement(): - - print(""" -\033[1;95m - ================================== - T I D O S F R A M E W O R K - ================================== -\033[1;37m - TIDoS is an open-source toolkit developed as a comprehensive web-application penetration testing framework. - - TIDoS was developed by \033[1;36m@_tID\033[1;37m aka \033[1;36mThe Infected Drake.\033[1;37m - - This is for you to note that TIDoS Framework has capable modules in various phases which can unveil potential dangerous flaws in various web-applications, which can further be exploited maliciously. Therefore the author as well as the contrbutors assume no liability for misuse of this toolkit. Usage of TIDoS Framework for testing or exploiting websites without prior mutual consistency can be considered as an illegal activity. It is the end user's responsibility to obey all applicable local, state and federal laws. - - You can edit these scripts within this tool as per your own needs, provided you use it only for yourself. If you're using some source-code from here, give the developer some credits. :) \033[1;91m - - P.S. - If you find any bugs with this tool, report it. - -""") diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/arts.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/arts.py deleted file mode 100644 index 2df6ee59..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/arts.py +++ /dev/null @@ -1,153 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author : @_tID -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from core.Core.colors import * - -auxilban_art = C+''' -\033[1;37m - ' . + . . ' + ' . . - . ' + . * . - + ' . + - . * . . . * . * - . \033[1;33m _\033[1;37m . . . . - . . \033[1;33m _ / | \033[1;37m . . * \033[1;33m _ \033[1;37m . . + - \033[1;33m| \_| | \033[1;37m + . \033[1;33m| | __ - \033[1;33m _ | |\033[1;37m . _ \033[1;33m| |/ | - + \033[1;33m| \ | \033[1;36m _/\_ \033[1;33m| | / | \ \033[1;37m + / - \033[1;33m| | \ \033[1;36m+/_\/_\+ \033[1;33m| | / | \ \033[1;37m . |\033[1;34m - ____\033[1;33m/____\--...\___ \033[1;36m\_||_/\033[1;34m ___...\033[1;33m|__\_\033[1;34m..\033[1;33m|____\____/\033[1;34m_______/_\033[1;34m - . . \033[1;36m|_|__|_| \033[1;34m . . . - . . . \033[1;36m_/ /__\ \_\033[1;34m . . . . - . . . . . . - . ' ' ' ' - ' \033[1;33m-=[\033[1;31m A U X I L L A R I E S \033[1;33m]=-\033[1;34m . ' . - . ' . . ' . -''' - -scanenumban_art = """ - \033[1;33m,-. . \033[1;37m + . + -\033[1;37m * \033[1;33m / \ `. \033[1;31m __..-,O \033[1;37m + * . -\033[1;37m + \033[1;33m: \ \033[1;31m--''_..-'.' -\033[1;37m \033[1;33m| . \033[1;31m.-' `. '.\033[1;37m + . . + + -\033[1;37m . \033[1;33m: . \033[1;31m.`.' \033[1;37m -\033[1;37m \033[1;33m \ `. \033[1;31m/ .. \033[1;37m . + + . -\033[1;37m + \033[1;33m \ `. \033[1;31m' \033[1;33m. \033[1;37m * . -\033[1;37m \033[1;33m `, `. \ \033[1;37m + + -\033[1;37m . \033[1;36m,|,\033[1;33m`. `-.\ \033[1;37m * . -\033[1;37m + \033[1;36m'.|| \033[1;33m ``-...__..-` \033[1;37m ' -\033[1;37m + \033[1;36m| | \033[1;37m . * + -\033[1;37m * \033[1;36m|__| \033[1;37m + * . -\033[1;37m . \033[1;36m/||\ \033[1;37m . -\033[1;37m . \033[1;36m//||\\ \033[1;37m + \033[1;33m-=[ \033[1;31mP R O B E & E N U M E R A T E \033[1;33m]=-\033[1;37m -\033[1;37m + \033[1;36m// || \\ \033[1;37m + -\033[1;37m \033[1;36m __//__||__\\_ \033[1;37m . . * . + -\033[1;33m ____________\033[1;36m'--------------'\033[1;33m____________________________________________ """ - -exploitsban_art = ''' - \033[1;33m|\ \033[1;33m/) -\033[1;37m /\_\033[1;33m\\\033[1;37m__ \033[1;33m(_// -\033[1;37m| `>\-` \033[1;36m_._ \033[1;33m//`) -\033[1;37m \ /` \033[1;33m\\\033[1;36m _.-\033[1;34m:::\033[1;36m`-._ \033[1;33m// -\033[1;37m ` \033[1;33m\|\033[1;36m` \033[1;34m::: \033[1;36m `|\033[1;33m// \033[1;37m[0x00] \033[1;31mE X P L O I T S -\033[1;36m | \033[1;34m ::: \033[1;36m|\033[1;33m/ -\033[1;36m |\033[1;34m.....:::.....\033[1;36m| \033[1;31mC A S T L E \033[1;37m[0x00] -\033[1;36m |\033[1;34m:::::::::::::\033[1;36m| -\033[1;36m | \033[1;34m::: \033[1;36m| -\033[1;36m \ \033[1;34m ::: \033[1;36m/ -\033[1;36m \ \033[1;34m ::: \033[1;36m / \033[1;37m" [0x00] \033[1;33mCode the Exploits -\033[1;36m `-. \033[1;34m:::\033[1;36m .-' \033[1;33mand - \033[1;33m//\033[1;36m`:::`\033[1;33m\\ \033[1;33mExploit the Codes \033[1;37m[0x00] " - \033[1;33m// \033[1;36m' \033[1;33m\\ - |/ \033[1;33m\| ''' - -footprintban_art = """ -\033[1;36m - -\033[1;37m . . - * . . . . * . - . . . . . \033[1;35m ### - \033[1;35mo \033[1;33m-=[ \033[1;31mR E C O N N A I S S A N C E \033[1;33m]=- \033[1;35m > ######-\033[1;37m --0 - + . . . \033[1;35m### - \033[1;35m0\033[37m . . . - . . + , , , - . \033[1;35m\ \033[37m . . + . - . \033[1;35m\ \033[36m . . \033[1;36m###\033[1;37m . - . \033[1;35mo \033[36m . \033[1;33m> \033[1;36m###########- --0\033[1;37m . + - . \033[36m\ \033[1;36m########\033[1;37m . . - \033[34m#\##\##. \033[1;33m> \033[1;36m###########- --0\033[1;37m . . - + \033[34m# #O##\### \033[1;36m###\033[1;37m . + . - . \033[34m#*# #\##\###\033[37m . + . - . \033[34m##*# #\##\##\033[37m + . - . \033[34m##*# #o##\# \033[37m . * , . - . \033[34m**# #\# \033[37m . . . - + \ . \033[33m/\^ \033[37m \033[1;33m.". \033[1;33m/ -\033[1;33m____^/\___^--____/\____\033[1;31mO\033[1;33m_____________/ \/\___________/\/ \______________ - /\^ ^ ^ ^ ^^ ^ '\ ^ ^ --- - -- - -- - - --- __ ^ - -- __ ___-- ^ ^ -- __""" - -vulnban_art = R+r""" - ..... - .:noONNNNNNNOon:. - .:NNNNNNNmddddNNNNNNN:. - :NNNNmy+:. + .:+ymNNNN: - NNNNy:` + `:yNNNN - NNNNy. -!NNNN - NNNN/ + \NNNN - NNNm- .:#####:. -mNNN \033[1;37m[0x00] \033[1;33mV U L N E R A B I L I T Y \033[1;31m - :NNN+ # + # +NNN: - NNNm # + # mNNN \033[1;33mE N U M E R A T I O N\033[1;31m \033[1;37m[0x00] - NNNh+++ ++#+++++++++++#++ +++hNNN - NNNm # + # mNNN - :NNN+ # + # +NNN: - NNNm- *:#####:* -mNNN - NNNN\ + /NNNN - NNNNy. -yNNNN - NNNNy:` + `:yNNNN" - :NNNNmy+:. + .:+ymNNNN: - *:NNNNNNNmddddNNNNNNNN* - *:!NNNNNNNNNNN!:* - '''*''' - -""" - -bugsban_art = C+''' -\033[1;34m - +------------------------------------------------------+ - | \033[1;37mTIDoS Dialog \033[1;33m[-] [口] [×] \033[1;34m| - | ---------------------------------------------------- | -\033[1;36m | | - | \033[1;33mTIDoS has detected that you want to hunt for bugs! \033[1;36m | - | \033[1;33mDo you wish to continue? \033[1;36m | - | | - | \033[1;37m.----------. .----------. .----------. \033[1;36m| - | \033[1;37m| Yes \033[1;37m| | No \033[1;37m| | Maybe \033[1;37m| \033[1;36m| - | \033[1;37m'----------' '----------' '----------' \033[1;36m | - |______________________________________________________| - -''' - -tidosrules_art = """ - _nnnn_ - dGGGGMMb - @p~qp~~qMb {}TIDoS Rules!!! - M(\033[37m@\033[96m)(\033[37m@\033[96m) M| {}_; - @\033[33m,----.\033[96mJM| {}-' - JS^\033[33m\__/ \033[96mqKL - dZP qKRb - dZP qKKb - fZP SMMb - HZM MMMM - FqM MMMM - \033[33m_| '. |\033[96mdS'qML' - \033[33m| `. | `' \_\033[96mZq' - \033[33m_) \.___.,| .' - \033[33m\________)\033[96mMMMMM\033[33m| .'""".format(O, GR, GR) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/banner.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/banner.py deleted file mode 100644 index 3670820e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/banner.py +++ /dev/null @@ -1,143 +0,0 @@ -# coding: utf-8 -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os -from random import randint -from core.Core.colors import * - -def banner(): - - header = """ -\033[1;31m - T H E - - ▄▀▀▀█▀▀▄ ▄▀▀█▀▄ ▄▀▀█▄▄ ▄▀▀▀▀▄ ▄▀▀▀▀▄ \033[1;37m - █ █ ▐ █ █ █ █ ▄▀ █ █ █ ██ ▐ - ▐ █ ▐ █ ▐ ▐ █ █ █ █ ▀▄ - █ █ █ █ ▀▄ ▄▀ ▀▄ █ \033[1;31m - ▄▀ ▄▀▀▀▀▀▄ ▄▀▄▄▄▄▀ ▀▀▀▀ █▀▀▀ - █ █ █ █ ▐ ▐ - ▐ ▐ ▐ ▐ - F R A M E W O R K - -""" - - - oblique = C + """ -\033[1;36m - T H E - - ███ ▄█ ████████▄ ▄██████▄ ▄████████ - ▀█████████▄ ███ ███ ▀███ ███ ███ ███ ███ \033[1;37m - ▀███▀▀██ ███▌ ███ ███ ███ ███ ███ █▀ - ███ ▀ ███▌ ███ ███ ███ ███ ███ - ███ ███▌ ███ ███ ███ ███ ▀███████████ - ███ ███ ███ ███ ███ ███ ███ \033[1;36m - ███ ███ ███ ▄███ ███ ███ ▄█ ███ - ▄████▀ █▀ ████████▀ ▀██████▀ ▄████████▀ - - F R A M E W O R K -""" - - modular = O + """ -\033[1;33m - ___________________________ - |\_________________________/|\ - || || \ - || \033[1;36mThe \033[1;33m|| | - || \033[1;36m TIDoS \033[1;33m|| | - || \033[1;36m Framework \033[1;33m|| | - || \033[1;33m|| | - || \033[1;34mWeb Application Audit \033[1;33m|| | - || \033[1;34m Framework \033[1;33m|| | - || \033[1;33m|| | - || \033[1;37mFrom: CodeSploit \033[1;33m|| / - ||_________________________|| / - |/_________________________\|/ - __\_________________/__/| - |_______________________|/ - ________________________ - /\033[0m\033[37moooo oooo oooo oooo \033[1;33m/| - /\033[0m\033[37mooooooooooooooooooooooo\033[1;33m/ / - /\033[0m\033[37mooooooooooooooooooooooo\033[1;33m/ / - /C=_____________________/_/ -""" - - fb = C + """ -\033[1;36m - ,------,-------------------------------------,------. - | | | | - | | \033[1;37mThe TIDoS Framework | | - | | \033[1;34m< CodeSploit > \033[1;36m | | - | | | | - | |-------------------------------------| | - | ||...................................|| | - | || || | - | || \033[1;33mHack Facebook? (y/n) \033[1;36m|| | - | || \033[1;34m---------------------- \033[1;36m|| | - | ||_______ \033[1;33m$ > (Input) \033[1;36m_______|| | - | || \033[1;32m$$$$$ \033[1;36m| | \033[1;32m$$$$$\033[1;36m || | - | ||-------'-------------------'-------|| | - `------'|___________________________________|`------' - -""" - codesploit = GR + """ - - MMMMMNMNMMMM$%&. - .DMMM lM$%. - .MMN \M$%,. - MN \M%$.. - .M. \033[1;36mXXXXXXXXXXXXX \033[1;37m\M%$M - .M \033[1;36m XXXXXXXXXXXXX \033[1;37m\l$%M. - M \033[1;36m XXX \033[1;37m\M$%M:. - M \033[1;36m XXX \033[1;37m\$MMM: - M \033[1;36m XXX \033[1;34mXXXXXXX \033[1;37m:$%MM: - :M \033[1;36m XXX \033[1;34mXX \033[1;37m :$%MMM: - M \033[1;36m XXX \033[1;34mXXXXXXX \033[1;37m M%$MM: - :M: \033[1;36m XXX \033[1;34m XX \033[1;37m M$%M:' - NM \033[1;36m XXXXXX\033[1;34mXXXXXXX\033[1;36mm \033[1;37m .M$%MM: - IMM. \033[1;36m XXXXXXXXXXXXX\033[1;36mm \033[1;37m.MD%4M' - :MM . .MM$%M' - $MM .MMM$%"' - MMMM. MMMMMM" - MMMMMMMMMMMMMMMMMM:*" -\033[1;33m - ╔═════════════════════════╗ - █ \033[1;31mC O D E S P L O I T\033[1;33m █ - ╚═════════════════════════╝ -""" - swan = """ -\033[1;33m - ...,ooooooooo...... - .o8888888888888888888888888o. - .o888888888888888888888888888888888o. - o8888888888A88"V888888888888888888888888o - o88888887"8" V V888 88888888888888888888o - o88888888 VV0 888888888888888888888 - o888888888 !/ 88888888888888888888o - .88888888888 88888V" "V8888888888. - o88888888888v \033[1;37mT H E \033[1;33m 8888" v8 8888888888o - 88888888888v 8888v v88 88888888888 - 888888888888 \033[1;37mT I D O S\033[1;33m 88888v "8888888888888 - 88888888888V ""M888 "888P8888888 - 88888888888v \033[1;37mF R A M E W O R K \033[1;33m 88P8888888 -\033[1;36m ______\033[1;33m8888888888888v.........................VF8888888\033[1;36m_______ - :::::::::::::::::::' :::::::::::::::: - ::::::::::::::::: .::::::: .:::::::::::::::::\033[1;34m - ::::::::::::::: \033[1;36mFrom:\033[1;34m ::::::: .::::::::::::::::::: - ::::::::::::::: \033[1;37mCodeSploit\033[1;34m :::::: ::: :::::::::::::::: - :::::::::::::::. ::::::. :: .::::::::::::::::\033[1;36m - :::::::::::::::: :::::::. .::::::::::::::::: - :::::::::::::::. . :::::::::::::::::::::::::::: -""" - headers = [header, oblique, modular, codesploit, fb, swan] - os.system('clear') - print(headers[randint(0,5)]) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/bannerbelow.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/bannerbelow.py deleted file mode 100644 index 811e8c97..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/bannerbelow.py +++ /dev/null @@ -1,32 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -from time import sleep -from core.Core.colors import * - -def bannerbelow(): - - print(B+'[---] '+C+'The TIDoS Framework \033[36m| \033[1;37mVersion v1.6 \033[1;34m[---]') - sleep(0.2) - print(B+'[---] [---]') - print(B+'[---] \033[1;31m~ Author \033[1;31m: \033[1;33m@_tID ~ \033[1;34m[---]') - sleep(0.2) - print(B+'[---] '+O+'~ github.com / \033[1;32m0xInfection ~ \033[1;34m[---]') - sleep(0.2) - print(B+'[---] [---]') - sleep(0.2) - print(B+'[---] \033[1;35m5 Phases | \033[1;31m14 Sub-Phases | \033[1;37m108 Modules \033[1;34m[---]') - sleep(0.2) - print('') - print(B+' Welcome to '+C+'The TIDoS Framework (TTF)') - sleep(0.2) - print(GR+' The TIDoS Framework is a project by '+R+'Team CodeSploit\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/colors.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/colors.py deleted file mode 100644 index 5818d90e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/colors.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -############################### -class color: - PURPLE = '\033[95m' - CYAN = '\033[96m' - DARKCYAN = '\033[36m' - BLUE = '\033[94m' - GREEN = '\033[92m' - YELLOW = '\033[93m' - RED = '\033[91m' - BOLD = '\033[1m' - UNDERLINE = '\033[4m' - END = '\033[0m' - HEADER = '\033[95m' - OKBLUE = '\033[94m' - OKGREEN = '\033[92m' - WARNING = '\033[93m' - FAIL = '\033[91m' - -W = '\033[1;0m' # white (normal) -R = '\033[1;31m' # red -G = '\033[1;32m' # green -O = '\033[1;33m' # orange -B = '\033[1;34m' # blue -P = '\033[1;35m' # purple -C = '\033[1;36m' # cyan -GR = '\033[1;37m' # gray -T = '\033[1;93m' # tan -############################### diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/dispmenu.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/dispmenu.py deleted file mode 100644 index 78257008..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/dispmenu.py +++ /dev/null @@ -1,49 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -from core.Core.colors import * - -def dispmenu(): - - print(''' - -\033[1;37m . + \033[1;34m ______ \033[1;37m . . - +. \033[1;34m / ==== \ \033[1;37m . + . . -. . \033[1;36m ,-~--------~-. \033[1;37m * + - \033[1;36m,^\033[1;33m ___ \033[1;36m^.\033[1;37m + * . . . -* * \033[1;36m / \033[1;33m.^ ^. \033[1;36m\ \033[1;37m . \033[1;32m _ | _ - \033[1;36m| \033[1;33m| o ! \033[1;36m|\033[1;37m . \033[1;32m __ \ /--. -. \033[1;36m|\033[1;34m_ \033[1;33m'.___.' \033[1;34m_\033[1;36m|\033[1;37m \033[1;32mI__/_\ / )}\033[1;36m======> \033[1;37m + - \033[1;36m| \033[1;34m"'----------------"\033[1;36m|\033[1;37m + \033[1;32m _[ _(\033[1;33m0\033[1;32m): ))\033[1;36m========> -+ . \033[1;36m! !\033[1;37m . \033[1;32mI__\ / \. ]}\033[1;36m======> \033[1;37m . - . \033[1;36m \ \033[1;37mTIDoS Prober \033[1;36m/ \033[1;37m \033[1;32m ~^-.--' - \033[1;36m^. .^ \033[1;37m . \033[1;32m | \033[1;37m +. * -. \033[1;36m "-..______.,-" \033[1;37m. . * - + . . + * . - \033[1;33m-=[ \033[1;31mL E T S S T A R T\033[1;33m ]=-\033[1;37m - + . ' . + + -* . + * . * . -''') - print(O+'\n Choose from the options below :\n') - time.sleep(0.2) - print(B+' [1] \033[1;36mReconnaissance & OSINT'+W+' (50 modules)') - time.sleep(0.1) - print(B+' [2] \033[1;36mScanning & Enumeration'+W+' (16 modules)') - time.sleep(0.1) - print(B+' [3] \033[1;36mVulnerability Analysis'+W+' (37 modules)') - time.sleep(0.1) - print(B+' [4] \033[1;36mExploitation (beta)'+W+' (1 modules)') - time.sleep(0.1) - print(B+' [5] \033[1;36mAuxillary Modules'+W+' (4 modules)\n') - time.sleep(0.1) - print(B+' [99] \033[1;36mSay "alvida"! (Exit TIDoS)\n') - time.sleep(0.1) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/inputin.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/inputin.py deleted file mode 100644 index 586ceb61..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/inputin.py +++ /dev/null @@ -1,57 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import socket -import time -import os -from core.Core.colors import * - -def inputin(): - - try: - global web - web = raw_input(''+O+' [#] Target web address :> '+C) - if not str(web).startswith('http'): - mo = raw_input(GR+' [#] Does this website use SSL? (y/n) :> ') - if mo == 'y' or mo == 'Y': - web = 'https://'+web - elif mo == 'n': - web = 'http://'+web - if 'http://' in web: - po = web.split('//')[1] - elif 'https://' in web: - po = web.split('//')[1] - if str(web).endswith('/'): - web = po[:-1] - po = po[:-1] - print(GR+' [*] Checking server status...') - time.sleep(0.6) - - try: - ip = socket.gethostbyname(po) - print(G+' [+] Site seems to be up...') - time.sleep(0.5) - print(G+' [+] IP Detected : '+O+ip) - time.sleep(0.5) - print('') - os.system('cd tmp/logs/ && rm -rf '+po+'-logs && mkdir '+po+'-logs/') - return web - - except socket.gaierror: - print(R+' [-] Site seems to be down...') - sys.exit(1) - - except KeyboardInterrupt: - print(R+' [-] Exiting...') - time.sleep(0.7) - print(C+' [#] Alvida, my friend!') - sys.exit(1) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/loadstyle.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/loadstyle.py deleted file mode 100644 index 532b7e02..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Core/loadstyle.py +++ /dev/null @@ -1,34 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os -import time -from core.Core.colors import * - -def loadstyle(): - - os.system('clear') - red_bold = R - reset = W - loading = "Loading the TIDoS Framework..." - action = 0 - while action < 1: - for i,char in enumerate(loading): - if i == 0: - print("%s%s%s%s" %(red_bold,char.upper(),reset,loading[1:])) - elif i == 1: - old_loading = loading[0].lower() - print("%s%s%s%s%s" %(old_loading,red_bold,char.upper(),reset,loading[2:])) - elif i == i: - old_loading = loading[-0:i].lower() - print("%s%s%s%s%s" %(old_loading,red_bold,char.upper(),reset,loading[i+1:])) - time.sleep(0.1) - os.system('clear') - action += 1 diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/crawlers.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/crawlers.py deleted file mode 100644 index b7b8c0f3..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/crawlers.py +++ /dev/null @@ -1,83 +0,0 @@ -#!/usr/bin/env python -# -*- coding : utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This script is a part of TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import platform -import os -import time -import random -import subprocess -from random import * -sys.path.append('modules/0x02-Scanning+Enumeration/0x02-WebCrawling/') - -# Import stuff -from crawler1 import * -from crawler2 import * -from crawler3 import * -from core.Core.colors import * -from core.Enumeration.Crawling.crawlersban import * - -def crawlers(web): - - time.sleep(0.3) - print(' [!] Module Selected : Crawlers') - time.sleep(0.4) - crawlersban() # banner - v = raw_input(O+' [#] TID :> ') - - if v.strip() == '1': # level 1 crawler - print(B+' [!] Module Selected :'+C+' Crawler (Depth 1)') - crawler1(web) - time.sleep(1) - crawlers(web) - - elif v.strip() == '2': # level 2 crawler - print(B+' [!] Module Selected :'+C+' Crawler (Depth 2)') - crawler2(web) - time.sleep(1) - crawlers(web) - - elif v.strip() == '3': # level 3 crawler - print(B+' [!] Module Selected :'+C+' Crawler (Depth 3)') - crawler3(web) - time.sleep(1) - crawlers(web) - - elif v.strip() == '99': # to go back - print(GR+' [*] Going back...') - time.sleep(0.5) - os.system('clear') - - elif v.strip() == 'A': - print(W+'\n [!] Module Automater Initialized...') - sleep(0.5) - print(B+' [*] Initializing Scan Type :'+C+' Crawler (Depth 1)') - crawler1(web) # unleash level 1 - - print(B+'\n [!] Scan Type Completed :'+C+' Crawler 1\n') - sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' Crawler (Depth 2)') - crawler2(web) # unleash level 2 - - print(B+'\n [!] Scan Type Completed :'+C+' Crawler 2\n') - sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' Crawler (Depth 3)') - crawler3(web) # unleash level 3 - - print(B+'\n [!] Scan Type Completed :'+C+' Crawler 3\n\n'+G+' [+] All modules successfully completed!') - raw_input(GR+' [+] Press '+O+'Enter '+GR+'to continue...') # for the user to take a breadth :/ - crawlers(web) # get back to menu - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(' [-] '+dope[randint(0,3)]) # troll stuffs :p - sleep(1) - crawlers(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/crawlersban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/crawlersban.py deleted file mode 100644 index dbde408e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/Crawling/crawlersban.py +++ /dev/null @@ -1,31 +0,0 @@ -#!/usr/bin/env python -# -*- coding : utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This script is a part of TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -from time import sleep -from core.Core.colors import * - -def crawlersban(): - - print(O+'\n +-----------------+') - print(O+' | '+G+' CRAWLER TYPES '+O+' |') - print(O+' +-----------------+\n') - print('') - sleep(0.2) - print(B+" [1] "+C+"Crawler \033[1;0m(Depth 1)") - sleep(0.2) - print(B+' [2] '+C+'Crawler \033[1;0m(Depth 2) ') - sleep(0.2) - print(B+' [3] '+C+'Crawler \033[1;0m(Depth 3) ') - sleep(0.2) - print(B+'\n [A] '+C+'Test both crawlers 1 by 1 ') - sleep(0.2) - print(B+'\n [99] '+C+'Back \n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/portscan.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/portscan.py deleted file mode 100644 index 680d9035..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/portscan.py +++ /dev/null @@ -1,154 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This script is a part of TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import os -import time -import random -from random import * -from time import sleep -sys.path.append('modules/0x02-Scanning+Enumeration/0x01-PortScanning/') - -from finscan import * -from servicedetect import * -#from nullscan import * -#from tcpack import * -from simpleport import * -from tcpconnectscan import * -from tcpstealthscan import * -#from tcpwindows import * -#from udpscan import * -from xmasscan import * -from core.Core.colors import * -from core.Enumeration.PortScans.portscanban import * - -def portscan(web): - - time.sleep(0.3) - print(W+' [!] Module Selected : Port Scanning') - time.sleep(0.4) - portscanban() - v = raw_input (GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - - if v.strip() == '1': - print(B+' [!] Module Selected :'+C+' Simple Port Scan') - simpleport(web) - time.sleep(1) - portscan(web) - - elif v.strip() == '2': - print(B+' [!] Module Selected :'+C+' TCP Connect Scan') - tcpconnectscan(web) - time.sleep(1) - portscan(web) - -# elif v.strip() == '3': -# print B+' [!] Module Selected :'+C+' TCP ACK Scan' -# tcpack(web) -# time.sleep(1) -# portscan(web) - - elif v.strip() == '4': - print(B+' [!] Module Selected :'+C+' TCP Stealth Scan') - tcpstealthscan(web) - time.sleep(1) - portscan(web) - -# elif v.strip() == '5': -# print B+' [!] Module Selected :'+C+' UDP Scan' -# udpscan(web) -# time.sleep(1) -# portscan(web) - - elif v.strip() == '6': - print(B+' [!] Module Selected :'+C+' XMAS Scan') - xmasscan(web) - time.sleep(1) - portscan(web) - -# elif v.strip() == '7': -# print B+' [!] Module Selected :'+C+' NULL Scan' -# nullscan(web) -# time.sleep(1) -# portscan(web) - - elif v.strip() == '8': - print(B+' [!] Module Selected :'+C+' FIN Scan') - finscan(web) - time.sleep(1) - portscan(web) - - elif v.strip() == '9': - print(B+' [!] Module Selected :'+C+' Service Detector') - servicedetect(web) - time.sleep(1) - portscan(web) - -# elif v.strip() == '10': -# print B+' [!] Module Selected :'+C+' TCP Windows' -# tcpwindowsscan(web) -# time.sleep(1) -# portscan(web) - - elif v.strip() == 'A': - print('\n [!] Module Automater Initialized...') - sleep(0.5) - print(B+' [*] Initializing Scan Type :'+C+' Simple Port Scan') - simpleport(web) - print(B+' [!] Scan Type Completed :'+C+' Simple Port Scan\n') - sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' TCP Connect Scan') - tcpconnectscan(web) - print(B+' [!] Scan Type Completed :'+C+' TCP Connect\n') - sleep(0.5) -# print B+' [!] Initializing Scan Type :'+C+' TCP ACK Scan' -# tcpack(web) -# print B+' [!] Scan Type Completed :'+C+' TCP ACK Scan\n' -# sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' TCP Stealth Scan') - tcpstealthscan(web) - print(B+' [!] Scan Type Completed :'+C+' TCP Stealth Scan\n') - sleep(0.5) -# print B+' [!] Initializing Scan Type :'+C+' UDP Scan' -# udpscan(web) -# print B+' [!] Scan Type Completed :'+C+' UDP Scan\n' -# sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' XMAS Scan') - xmasscan(web) - print(B+' [!] Scan Type Completed :'+C+' XMAS Scan\n') - sleep(0.5) -# print B+' [!] Initializing Scan Type :'+C+' NULL Scan' -# nullscan(web) -# print B+' [!] Scan Type Completed :'+C+' NULL Scan\n' -# sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' FIN Scan') - finscan(web) - print(B+' [!] Scan Type Completed :'+C+' FIN Scan\n') - sleep(0.5) - print(B+' [!] Initializing Scan Type :'+C+' Service Detection') - servicedetect(web) - print(B+' [!] Scan Type Completed :'+C+' Service Detection\n') - sleep(0.5) - print(B+' [!] All scantypes have been tested on target...') - print(C+' [!] Going back to menu...') - sleep(3) - portscan(web) - - elif v.strip() == '99': - print(GR+' [*] Going back...') - time.sleep(0.5) - os.system('clear') - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - portscan(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/portscanban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/portscanban.py deleted file mode 100644 index 2b58cfd9..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/PortScans/portscanban.py +++ /dev/null @@ -1,45 +0,0 @@ -#!/usr/bin/env python -# -*- coding : utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This script is a part of TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -import os -from time import sleep -from core.Core.colors import * - -def portscanban(): - - print(O+'\n +--------------+') - print(O+' | '+W+'SCAN TYPES'+O+' |') - print(O+' +--------------+\n') - sleep(0.1) - print(B+" [1]"+C+" A Simple Port Scan") - sleep(0.1) - print(B+" [2]"+C+" A TCP Connect Scan"+G+' (Highly Reliable)') - sleep(0.1) -# print B+" [3]"+C+" A TCP-ACK Scan" -# sleep(0.1) - print(B+" [4]"+C+" A TCP Stealth Scan"+G+' (Highly Reliable)') - sleep(0.1) -# print B+" [5]"+C+" A UDP Scan" -# sleep(0.1) - print(B+" [6]"+C+" A XMAS Flag Scan "+R+"(Reliable only in LANs)") - sleep(0.1) -# print B+" [7]"+C+" A NULL Scan" -# sleep(0.1) - print(B+" [8]"+C+" A FIN Flag Scan "+R+"(Reliable only in LANs)") - sleep(0.1) - print(B+" [9]"+C+" A Open Ports Services Detector") - sleep(0.1) -# print O+B+" [10]"+C+" A TCP Windows Scan" -# sleep(0.1) - print(B+" [A]"+C+" Automate all modules one by one\n") - sleep(0.1) - print(B+' [99]'+C+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/colors.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/colors.py deleted file mode 100644 index 5818d90e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/colors.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -############################### -class color: - PURPLE = '\033[95m' - CYAN = '\033[96m' - DARKCYAN = '\033[36m' - BLUE = '\033[94m' - GREEN = '\033[92m' - YELLOW = '\033[93m' - RED = '\033[91m' - BOLD = '\033[1m' - UNDERLINE = '\033[4m' - END = '\033[0m' - HEADER = '\033[95m' - OKBLUE = '\033[94m' - OKGREEN = '\033[92m' - WARNING = '\033[93m' - FAIL = '\033[91m' - -W = '\033[1;0m' # white (normal) -R = '\033[1;31m' # red -G = '\033[1;32m' # green -O = '\033[1;33m' # orange -B = '\033[1;34m' # blue -P = '\033[1;35m' # purple -C = '\033[1;36m' # cyan -GR = '\033[1;37m' # gray -T = '\033[1;93m' # tan -############################### diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/scanenum.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/scanenum.py deleted file mode 100644 index e386cb5a..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/scanenum.py +++ /dev/null @@ -1,154 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author: @_tID -#This script is a part of TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import time -import os -sys.path.append('modules/0x02-Scanning+Enumeration/') - -from nmapmain import * -from webscan import * -from bannergrab import * -from osdetect import * -from webtech import * -from waf import * -from ssltlsscan import * -from core.Core.colors import * -from core.Enumeration.scanenumban import * -from core.Enumeration.Crawling.crawlers import * -from core.Enumeration.PortScans.portscan import * - -def scanenum(web): - - print(B+' [+] Module Selected : '+C+'Scanning and Enumeation') - scanenumban() - v = raw_input(''+O+' \033[4mTID\033[1;0m '+GR+':> ' + color.END) - print('\n') - if v.strip() == '1': - print(B+' [!] Type Selected :'+C+' WAF Analysis'+O) - waf(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '2': - print(B+' [!] Type Selected :'+C+' Port Scanning') - portscan(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '3': - print(B+' [!] Type Selected :'+C+' Interactive NMap') - nmapmain(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '4': - print(B+' [!] Type Selected :'+C+' WebTech Fingerprinting') - webtech(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '5': - print(B+' [!] Type Selected :'+C+' SSL Enumeration') - ssltlsscan(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '6': - print(B+' [!] Type Selected :'+C+' OS Fingerprinting') - osdetect(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '7': - print(B+' [!] Type Selected :'+C+' Banner Grab') - bannergrab(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == '8': - print(B+' [!] Type Selected :'+C+' IP Crawler') - webscan(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenumban() - scanenum(web) - - elif v.strip() == '9': - print(B+' [!] Type Selected :'+C+' Web Crawlers') - crawlers(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - scanenum(web) - - elif v.strip() == 'A': - print(' [!] Type Selected : All Modules') - time.sleep(0.5) - - print(B+' [*] Firing up module -->'+C+' WAF Analysis'+O) - waf(web) - print(B+' [!] Module Completed -->'+C+' WAF Analysis\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Port Scanning ') - portscan(web) - print(B+' [!] Module Completed -->'+C+' Port Scanning \n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Interactive NMap') - nmapmain(web) - print(B+' [!] Module Completed -->'+C+' NMap\n') - time.sleep(1) - - print(B + ' [*] Firing up module -->' + C + ' WebTech Fingerprinting') - webtech(web) - print(B + ' [!] Module Completed -->' + C + ' WebTech\n') - time.sleep(1) - - print(B + ' [*] Firing up module -->' + C + ' SSL Enumeration') - ssltlsscan(web) - print(B + ' [!] Module Completed -->' + C + ' SSL Enumeration\n') - time.sleep(1) - - print(B + ' [*] Firing up module -->' + C + ' OS Detect') - osdetect(web) - print(B + ' [!] Module Completed -->' + C + ' OS Detect\n') - time.sleep(1) - - print(B + ' [*] Firing up module -->' + C + ' Banner Grabbing') - bannergrab(web) - print(B + ' [!] Module Completed -->' + C + ' Banner Grabbing\n') - time.sleep(1) - - print(B + ' [*] Firing up module -->' + C + ' Webserver Scanning') - webscan(web) - print(B + ' [!] Module Completed -->' + C + ' Webserver Scanning\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Crawlers') - crawlers(web) - print(B+' [!] Module Completed -->'+C+' Crawlers\n') - time.sleep(0.5) - - print(G+' [+] All modules successfully completed!') - time.sleep(0.5) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print(GR+' [*] Going back...') - - elif v.strip() == '99': - print('[!] Back') - time.sleep(0.7) - - else: - dope = ['You high dude?','Hey there! Enter a valid option','Whoops! Thats not an option','Sorry fam! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - scanenum(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/scanenumban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/scanenumban.py deleted file mode 100644 index be68739c..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Enumeration/scanenumban.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This script is a part of TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os -import time -from core.Core.arts import scanenumban_art - -def scanenumban(): - - os.system('clear') - time.sleep(0.7) - print(scanenumban_art) - print(""" - Choose from the following options: - -\033[1;34m [1] \033[1;36mRemote Server WAF Enumeration \033[0m(Generic) (54 WAFs) -\033[1;34m [2] \033[1;36mPort Scanning and Analysis \033[0m(Several Types) -\033[1;34m [3] \033[1;36mInteractive Scanning with NMap \033[0m(16 Preloaded modules) -\033[1;34m [4] \033[1;36mWeb Technologies Enumeration\033[0m(FrontEnd Technologies) -\033[1;34m [5] \033[1;36mRemote Server SSL Enumeration\033[0m(Absolute) -\033[1;34m [6] \033[1;36mOperating System Enumeration \033[0m(Absolute) -\033[1;34m [7] \033[1;36mGrab Banners on Services \033[0m(via Open Ports) -\033[1;34m [8] \033[1;36mScan all IP Addresses Linked to Domain \033[0m(CENSYS) -\033[1;34m [9] \033[1;36mLet loose Crawlers on the target \033[0m(Depth 1, 2 & 3) - -\033[1;34m [A] \033[1;36mAutomate all one by one on target - -\033[1;34m [99] \033[1;36mBack -""") diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/exploits.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/exploits.py deleted file mode 100644 index 2dd21493..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/exploits.py +++ /dev/null @@ -1,35 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import time -import os -from core.Exploitation.exploitsban import * -from core.Core.colors import * -sys.path.append('modules/0x04-Exploitation+Loot/') - -from shellshock_exp import * - -def exploits(web): - - print('') - print(B+' [+] Module Selected : '+C+'Exploitation') - exploitsban() - time.sleep(0.3) - v = raw_input(GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('') - if v == '1': - print(' [!] Type Selected : Shellshock Exploit') - shellshock_exp(web) - print(O+' [!] Completed!') - time.sleep(1) - print('\n\n') - os.system('clear') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/exploitsban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/exploitsban.py deleted file mode 100644 index 4762d8cb..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Exploitation/exploitsban.py +++ /dev/null @@ -1,24 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os, time -from core.Core.arts import exploitsban_art - -def exploitsban(): - - os.system('clear') - print(" [!] Module Selected : Exploits\n\n") - time.sleep(0.5) - print(exploitsban_art) - print(''' -\033[1;36m [1] \033[1;34mShellShock Exploit\n -\033[1;36m [!info] \033[1;34m This module is still being worked on... -''') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/activeban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/activeban.py deleted file mode 100644 index 7fdbc736..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/activeban.py +++ /dev/null @@ -1,55 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -from core.Core.colors import * -import time - -def activeban(): - - time.sleep(0.4) - print(G+' +----------------+') - print(G+' | '+O+'ACTIVE RECON'+G+' |') - print(G+' +----------------+') - time.sleep(0.3) - print('') - print(B+' [1]'+C+' Ping/NPing Enumeration'+W+' (Adaptative+Debug)') - time.sleep(0.04) - print(B+' [2]'+C+' Grab HTTP Headers'+W+' (Live Capture)') - time.sleep(0.04) - print(B+' [3]'+C+' Find Allowed HTTP Methods'+W+' (Via OPTIONS)') - time.sleep(0.04) - print(B+' [4]'+C+' Examine robots.txt and sitemap.xml') - time.sleep(0.04) - print(B+' [5]'+C+' Scrape Comments from Webpage'+W+' (Regex Based)') - time.sleep(0.04) - print(B+' [6]'+C+' Perform Advanced Traceroute'+W+' (TTL Based)') - time.sleep(0.04) - print(B+' [7]'+C+' Find Shared DNS Hosts'+W+' (NameServer Based)') - time.sleep(0.04) - print(B+' [8]'+C+' Examine SSL Certificate'+W+' (Absolute)') - time.sleep(0.04) - print(B+' [9]'+C+' CMS Detection '+W+'(185+ CMSs supported)') - time.sleep(0.04) - print(B+' [10]'+C+' Apache Status Disclosure'+W+' (File Based)') - time.sleep(0.04) - print(B+' [11]'+C+' WebDAV HTTP Enumeration'+W+' (SEARCH, PROFIND)') - time.sleep(0.04) - print(B+' [12]'+C+' Find PHPInfo File'+W+' (Regular Bruteforce)') - time.sleep(0.04) - print(B+' [13]'+C+' Enumerate Server behind website'+W) - time.sleep(0.04) - print(B+' [14]'+C+' Alternate Sites'+W+' (User-Agent Based)') - time.sleep(0.04) - print(B+' [15]'+C+' Common File Bruteforce'+W+' (5 modules)\n') - time.sleep(0.04) - print(B+' [A]'+C+' The Auto-Awesome Module\n') - time.sleep(0.04) - print(B+' [99]'+C+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/activeo.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/activeo.py deleted file mode 100644 index 54b99012..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Active_Recon/activeo.py +++ /dev/null @@ -1,245 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import os -import time -import subprocess -import random -from random import randint -sys.path.append('modules/0x01-OSINT+Footprinting/0x02-ActiveReconnaissance/') - -from piwebenum import * -from grabhead import * -from httpmethods import * -from robot import * -from apachestat import * -from dav import * -from sharedns import * -from commentssrc import * -from sslcert import * -from filebrute import * -from traceroute import * -from phpinfo import * -from cms import * -from serverdetect import * -from altsites import * -from core.Footprinting.Active_Recon.activeban import * -from core.Core.colors import * - -def activeo(web): - - print(" [!] Module Selected : Active Reconnaissance\n\n") - activeban() - print('') - time.sleep(0.3) - v = raw_input (''+GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('') - if v.strip() == '1': - print(C+' [!] Type Selected : Ping/NPing Enumeration') - piwebenum(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '2': - print(C+' [!] Type Selected : Grab HTTP Headers') - grabhead(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '3': - print(C+' [!] Type Selected : HTTP Allowed Methods') - httpmethods(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '4': - print(C+' [!] Type Selected : robots.txt and sitemap.xml Hunt') - robot(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '5': - print(C+' [!] Type Selected : Scrape Comments') - commentssrc(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '6': - print(C+' [!] Type Selected '+B+': Traceroute') - traceroute(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '7': - print(C+' [!] Type Selected : DNS Hosts') - sharedns(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '8': - print(C+' [!] Type Selected : SSL Certificate') - sslcert(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '9': - print(C+' [!] Type Selected : CMS Detection') - cms(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '10': - print(C+' [!] Type Selected : Apache Status') - apachestat(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '11': - print(C+' [!] Type Selected : WebDAV HTTP Enumeration') - dav(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '12': - print(C+' [!] Type Selected : PHPInfo Enumeration') - phpinfo(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '13': - print(C+' [!] Type Selected : Server Detection') - serverdetect(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '14': - print(C+' [!] Type Selected : Alternate Sites ') - altsites(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == '15': - print(C+' [!] Type Selected : File Bruteforcers') - filebrute(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - activeo(web) - - elif v.strip() == 'A': - print(C+' [!] Type Selected : All Modules') - time.sleep(0.5) - print(C+' [*] Firing up module -->'+B+' Ping Enum') - piwebenum(web) - print(C+' [!] Module Completed -->'+B+' PIng\n') - - time.sleep(1) - print(C+' [*] Firing up module -->'+B+' Grab Headers') - grabhead(web) - print(C+'\n [!] Module Completed -->'+B+' Grabhead\n') - - time.sleep(1) - print(C+' [*] Firing up module -->'+B+' Robots.txt Hunter') - robot(web) - print(C+'\n [!] Module Completed -->'+B+' Robot Hunter\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Comments Scraper') - commentssrc(web) - print(C+'\n [!] Module Completed -->'+B+' Comments Src\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Traceroute') - traceroute(web) - print(C+'\n [!] Module Completed -->'+B+' Traceroute\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Shared DNS Servers') - sharedns(web) - print(C+'\n [!] Module Completed -->'+B+' Shared DNS Servers\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' SSl Certificate Info') - sslcert(web) - print(C+'\n [!] Module Completed -->'+B+' SSl Cert\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' CMS Detection') - cms(web) - print(C+'\n [!] Module Completed -->'+B+' CMS Detect\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' WebDAV HTTP Profiling') - dav(web) - print(C+'\n [!] Module Completed -->'+B+' WebDAV HTTP Profiling\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Apache Status') - apachestat(web) - print(C+'\n [!] Module Completed -->'+B+' Apache Status\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' PHPInfo') - phpinfo(web) - print(C+'\n [!] Module Completed -->'+B+' PHPInfo\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' OS Fingerprinting') - osdetect(web) - print(C+'\n [!] Module Completed -->'+B+' OS Detect\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' File bruteforcer') - filebrute(web) - print(C+'\n [!] Module Completed -->'+B+' File Bruteforcer\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Server Detection') - serverdetect(web) - print(C+'\n [!] Module Completed -->'+B+' Server Detect\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Alt. Sites') - altsites(web) - print(C+'\n [!] Module Completed -->'+B+' Alt. Sites\n') - time.sleep(1) - - print(C+'\n [!] All scantypes have been tested on target...') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print(C+' [*] Going back to menu...') - time.sleep(3) - os.system('clear') - activeo(web) - - elif v.strip() == '99': - print(C+' [*] Back to the menu !') - os.system('clear') - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - activeo(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/infodisc.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/infodisc.py deleted file mode 100644 index 10d0517a..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/infodisc.py +++ /dev/null @@ -1,121 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import os -import time -import subprocess -import random -from random import randint -sys.path.append('modules/0x01-OSINT+Footprinting/0x03-InformationDisclosure/') -from creditcards import * -from emailext import * -from errors import * -from phone import * -from ssn import * -from internalip import * -from core.Core.colors import * -from core.Footprinting.Info_Disc.infodiscban import * - -def infodisc(web): - - print(" [!] Module Selected : Information Disclosure\n\n") - infodiscban() - print('') - time.sleep(0.3) - v = raw_input (''+GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('') - if v == '1': - print(C+' [!] Type Selected :'+B+' Credit Card Enumeration') - creditcards(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - infodisc(web) - - elif v == '2': - print(C+' [!] Type Selected :'+B+' Extract All Emails') - emailext(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - infodisc(web) - - elif v == '3': - print(C+' [!] Type Selected :'+B+' Enumerate Errors + FPD') - errors(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - infodisc(web) - - elif v == '4': - print(C+' [!] Type Selected :'+B+' Internal IP disclosure') - internalip(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - infodisc(web) - - elif v == '5': - print(C+' [!] Type Selected :'+B+' Phone Numbers Extract') - phone(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - infodisc(web) - - elif v == '6': - print(C+' [!] Type Selected :'+B+' Social Security Numbers') - ssn(web) - print('\n\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - infodisc(web) - - elif v == 'A': - print(C+' [!] Type Selected :'+B+' All Modules') - time.sleep(0.5) - print(C+' [*] Firing up module -->'+B+' Credit Cards') - creditcards(web) - print(C+' [!] Module Completed -->'+B+' Credit Cards\n') - - time.sleep(1) - print(C+' [*] Firing up module -->'+B+' Email Extraction') - emailext(web) - print(C+' [!] Module Completed -->'+B+' Email Hunt\n') - - time.sleep(1) - print(C+' [*] Firing up module -->'+B+' Errors Enumeration + FPD') - errors(web) - print(C+' [!] Module Completed -->'+B+' Errors Enumeration\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Extract Phone Numbers') - phone(web) - print(C+' [!] Module Completed -->'+B+' Extract Phone Numbers\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+B+' Extract Social Security Numbers') - ssn(web) - print(C+' [!] Module Completed -->'+B+' Extract SSN\n') - time.sleep(1) - - print(C+' [!] All scantypes have been tested on target...') - time.sleep(1) - print(C+' [*] Going back to menu...') - infodisc(web) - - elif v == '99': - print(C+' [*] Back to the menu !') - time.sleep(0.8) - os.system('clear') - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - infodisc(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/infodiscban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/infodiscban.py deleted file mode 100644 index 526ae520..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Info_Disc/infodiscban.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -from core.Core.colors import * -import time - -def infodiscban(): - - time.sleep(0.4) - print(G+'\n +-------------------+') - print(G+' | '+O+'INFO DISCLOSURE'+G+' |') - print(G+' +-------------------+') - time.sleep(0.3) - print('') - print(B+' [1]'+C+' Find out Credit Cards '+W+'(if disclosed in plain text)') - time.sleep(0.1) - print(B+' [2]'+C+' Extract out all existing emails'+W+' (Absolute)') - time.sleep(0.1) - print(B+' [3]'+C+' Enumerate Errors '+W+'(Includes Full Path Disclosure)') - time.sleep(0.1) - print(B+' [4]'+C+' Find out any leaks of internal IP addresses') - time.sleep(0.1) - print(B+' [5]'+C+' Extract out all Phone Numbers '+W+'(if plaintext disclosure)') - time.sleep(0.1) - print(B+' [6]'+C+' Extract out all Social Security Numbers '+W+'(US Based)\n') - time.sleep(0.1) - print(B+' [A]'+C+' Start up ALL modules 1 by 1\n') - time.sleep(0.1) - print(B+' [99]'+C+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/passiveban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/passiveban.py deleted file mode 100644 index e85a1bdf..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/passiveban.py +++ /dev/null @@ -1,73 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author: @_tID -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -from core.Core.colors import * - -def passiveban(): - - time.sleep(0.4) - print(G+' +-----------------+') - print(G+' | '+O+'PASSIVE RECON '+G+'|') - print(G+' +-----------------+') - time.sleep(0.6) - print('') - print(B+' [1] '+C+'Ping Check '+W+'(Using external APi)') - time.sleep(0.04) - print(B+' [2] '+C+'WhoIS Lookup '+W+'(Get domain info)') - time.sleep(0.04) - print(B+' [3] '+C+'GeoIP Lookup '+W+'(Pinpoint Server Location)') - time.sleep(0.04) - print(B+' [4]'+C+' DNS Configuration Lookup'+W+' (DNSDump)') - time.sleep(0.04) - print(B+' [5]'+C+' Gather Subdomains '+W+'(Only indexed ones)') - time.sleep(0.04) - print(B+' [6]'+C+' Reverse DNS Configuration Lookup ') - time.sleep(0.04) - print(B+' [7]'+C+' Subnet Enumeration '+W+'(Class Based)') - time.sleep(0.04) - print(B+' [8]'+C+' Reverse IP Lookup '+W+'(Hosts on same server)') - time.sleep(0.04) - print(B+' [9]'+C+' Domain IP History '+W+'(IP History Instances)') - time.sleep(0.04) - print(B+' [10]'+C+' Gather All Links from WebPage '+W+'(Indexed ones)') - time.sleep(0.04) - print(B+' [11]'+C+' Google Search '+W+'(Search your own Query or Dork)') - time.sleep(0.04) - print(B+' [12] '+C+'Google Dorking '+W+'(Multiple Modules)') - time.sleep(0.04) - print(B+' [13] '+C+'Wayback Machine Lookup '+W+'(pure backups)') - time.sleep(0.04) - print(B+' [14] '+C+'Hacked Email Check '+W+'(Breached/leaked emails)') - time.sleep(0.04) - print(B+' [15] '+C+'Email to Domain Resolver '+W+'(Email whois)') - time.sleep(0.04) - print(B+' [16] '+C+'Email Enumeration via Google Groups '+W+'') - time.sleep(0.04) - print(B+' [17] '+C+'Check Alias Availability '+W+'(Social Networks)') - time.sleep(0.04) - print(B+' [18] '+C+'Find PasteBin Posts '+W+'(Domain Based)') - time.sleep(0.04) - print(B+' [19] '+C+'LinkedIn Gathering '+W+'(Employees, Companies)') - time.sleep(0.04) - print(B+' [20] '+C+'Google Plus Gathering '+W+'(Profiles Crawling)') - time.sleep(0.04) - print(B+' [21] '+C+'Public Contact Info Gathering '+W+'(Full Contact)') - time.sleep(0.04) - print(B+' [22] '+C+'CENSYS Domain Reconnaissance '+W+'(CENSYS.IO)') - time.sleep(0.04) - print(B+' [23] '+C+'Threat Intelligence Gathering '+W+'(Bad IPs)\n') - time.sleep(0.04) - print(B+' [A] '+C+'The Auto-Awesome Module '+W+'(Unleash the Beast)\n') - time.sleep(0.04) - print(B+' [99] '+C+'Back'+W+'\n') - time.sleep(0.3) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/passiveo.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/passiveo.py deleted file mode 100644 index d2dba71b..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/Passive_Recon/passiveo.py +++ /dev/null @@ -1,323 +0,0 @@ -#!/usr/bin/env python -#-*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import time -import os -from random import randint -sys.path.append('modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/') - -from dnschk import * -from piweb import * -from getgeoip import * -from revip import * -from revdns import * -from getconinfo import * -from subdom import * -from googlenum import * -from links import * -from censysdom import * -from subnet import * -from hackedmail import * -from iphistory import * -from mailtodom import * -from checkuser import * -from googlegroups import * -from threatintel import * -from webarchive import * -from googledorker import * -from googleSearch import * -from whoischeckup import * -from pastebin import * -from linkedin import * -from core.Core.colors import * -from core.Footprinting.Passive_Recon.passiveban import * - -def passiveo(web): - - print(" [!] Module Selected : Passive Reconnaissance\n") - passiveban() - v = raw_input (''+GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('\n\n') - if v.strip() == '1': - print(C+' [!] Type Selected '+B+': Ping Check') - piweb(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '2': - print(C+' [!] Type Selected '+B+': WhoIS Checkup') - whoischeckup(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '3': - print(C+' [!] Type Selected '+B+': GeoIP Lookup') - getgeoip(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '4': - print(C+' [!] Type Selected '+B+': DNS Lookup') - dnschk(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '5': - print(C+' [!] Type Selected '+B+': Subdomain Scan') - subdom(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '6': - print(C+' [!] Type Selected '+B+': Reverse DNS Lookup') - revdns(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '7': - print(C+' [!] Type Selected : Subnet Enumeration') - subnet(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '8': - print(C+' [!] Type Selected '+B+': Reverse IP Lookup') - revip(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '9': - print(C+' [!] Type Selected '+B+': IP History') - iphistory(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '10': - print(C+' [!] Type Selected '+B+': Page Links') - links(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '11': - print(C+' [!] Type Selected '+B+': Google Search') - googleSearch() - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '12': - print(C+' [!] Type Selected '+B+': Google Dorker') - googledorker(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '13': - print(C+' [!] Type Selected '+B+': Wayback Machine') - webarchive(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '14': - print(C+' [!] Type Selected '+B+': Hacked Email Check') - hackedmail() - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '15': - print(C+' [!] Type Selected '+B+': Mail to Domain') - mailtodom() - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '16': - print(C+' [!] Type Selected '+B+': Google Groups Enum') - googlegroups(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '17': - print(C+' [!] Type Selected '+B+': Check Username') - checkuser(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '18': - print(C+' [!] Type Selected '+B+': PasteBin Posts') - pastebin(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '19': - print(C+' [!] Type Selected '+B+': LinkedIn Gathering') - linkedin(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '20': - print(C+' [!] Type Selected '+B+': Google Plus Gathering') - googlenum(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '21': - print(C+' [!] Type Selected '+B+': Public Contact Info') - getconinfo(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '22': - print(C+' [!] Type Selected '+B+': CENSYS Gathering') - censysdom(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '23': - print(C+' [!] Type Selected '+B+': Threat Intel Gathering') - threatintel(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - passiveo(web) - - elif v.strip() == '99': - print(C+' [*] Back!') - time.sleep(0.7) - os.system('clear') - - elif v.strip() == 'A': - print(C+' [!] Type Selected '+B+': All Modules\n') - time.sleep(0.5) - - print(C+' [*] Firing up module -->'+O+' Ping Check') - piweb(web) - print(C+'\n [!] Module Completed -->'+O+' Piweb\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' WHOIS ') - whoischeckup(web) - print(C+'\n [!] Module Completed -->'+O+' WHOIS\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' GeoIP Lookup ') - getgeoip(web) - print(C+'\n [!] Module Completed -->'+O+' GeoIP\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' DNS Enumeration ') - dnschk(web) - print(C+'\n [!] Module Completed -->'+O+' DNS Enum\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Subdomain Scan ') - subdom(web) - print(C+'\n [!] Module Completed -->'+O+' Subdom\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Subnet Calc. ') - subnet(web) - print(C+'\n [!] Module Completed -->'+O+' Subnet Calculation\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Reverse DNS Lookup ') - revdns(web) - print(C+'\n [!] Module Completed -->'+O+' RevDNS\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' IP History Lookup ') - iphistory(web) - print(C+'\n [!] Module Completed -->'+O+' RevIP\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Reverse IP Lookup ') - revip(web) - print(C+'\n [!] Module Completed -->'+O+' RevIP\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Web Links ') - links(web) - print(C+'\n [!] Module Completed -->'+O+' Web Links\n') - time.sleep(1) - - print(C+' [!] Firing up module -->'+O+' Google Search') - googleSearch() - print(C+'\n [!] Module Completed -->'+O+' GSearch\n') - time.sleep(1) - - print(C+' [!] Firing up module -->'+O+' WayBack Machine') - webarchive(web) - print(C+'\n [!] Module Completed -->'+O+' WayBack Machine\n') - time.sleep(1) - - print(C+' [!] Firing up module -->'+O+' Hacked Email Checker') - hackedmail() - print(C+'\n [!] Module Completed -->'+O+' Hacked Email\n') - time.sleep(1) - - print(C+' [!] Firing up module -->'+O+' Mail to Domain') - mailtodom() - print(C+'\n [!] Module Completed -->'+O+' Mail to Domain\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Google Groups Enum') - googlegroups(web) - print(C+'\n [!] Module Completed -->'+O+' GGroups\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Check Username') - checkuser(web) - print(C+'\n [!] Module Completed -->'+O+' Username\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' LinkedIn gathering') - linkedin(web) - print(C+'\n [!] Module Completed -->'+O+' LinkedIn\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Pastebin Posts') - pastebin(web) - print(C+'\n [!] Module Completed -->'+O+' Pastebin\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Google Plus Gathering') - googlenum(web) - print(C+'\n [!] Module Completed -->'+O+' Google Plus Gathering\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Google Dorker') - googledorker(web) - print(C+'\n [!] Module Completed -->'+O+' GDorker\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Public Contact Info') - getconinfo(web) - print(C+'\n [!] Module Completed -->'+O+' Public Contact info\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Gathering via CENSYS') - censysdom(web) - print(C+'\n [!] Module Completed -->'+O+' CENSYS Gathering\n') - time.sleep(1) - - print(C+' [*] Firing up module -->'+O+' Threat Intelligence') - threatintel(web) - print(C+'\n [!] Module Completed -->'+O+' Threat Intelligence\n') - time.sleep(1) - - print(G+' [+] All modules successfully completed!') - time.sleep(3) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print(GR+' [*] Going back...') - os.system('clear') - passiveo(web) - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(C+'\n [!] '+dope[randint(0,3)]) - os.system('clear') - passiveo(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/colors.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/colors.py deleted file mode 100644 index 5818d90e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/colors.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -############################### -class color: - PURPLE = '\033[95m' - CYAN = '\033[96m' - DARKCYAN = '\033[36m' - BLUE = '\033[94m' - GREEN = '\033[92m' - YELLOW = '\033[93m' - RED = '\033[91m' - BOLD = '\033[1m' - UNDERLINE = '\033[4m' - END = '\033[0m' - HEADER = '\033[95m' - OKBLUE = '\033[94m' - OKGREEN = '\033[92m' - WARNING = '\033[93m' - FAIL = '\033[91m' - -W = '\033[1;0m' # white (normal) -R = '\033[1;31m' # red -G = '\033[1;32m' # green -O = '\033[1;33m' # orange -B = '\033[1;34m' # blue -P = '\033[1;35m' # purple -C = '\033[1;36m' # cyan -GR = '\033[1;37m' # gray -T = '\033[1;93m' # tan -############################### diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/footprint.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/footprint.py deleted file mode 100644 index e0e9e063..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/footprint.py +++ /dev/null @@ -1,56 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os -import time - -# Get module imports -from core.Core.colors import * -from core.Footprinting.footprintban import * -from core.Footprinting.Info_Disc.infodisc import * -from core.Footprinting.Active_Recon.activeo import * -from core.Footprinting.Passive_Recon.passiveo import * - -def footprint(web): - - print(B+' [+] Module Selected : '+C+'Footprinting') - footprintban() # banner - m = raw_input(O+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('') - - if m.strip() == '1': - passiveo(web) # passive recon module - print('\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - footprint(web) - - elif m.strip() == '2': - activeo(web) # active recon module - print('\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - footprint(web) - - elif m.strip() == '3': - infodisc(web) # information disclosure modules - print('\n') - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - footprint(web) - - elif m.strip() == '99': # get back to main module - print(' [+] Back!') - - else: - - print('') - dope = [' [*] You high dude?',' [*] Hey there! Enter a valid option',' [*] Whoops! Thats not an option',' [*] Sorry fam! You just typed shit'] # troll stuff :p - print(dope[randint(0,3)]) - time.sleep(0.5) - footprint(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/footprintban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/footprintban.py deleted file mode 100644 index 5618a0e6..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Footprinting/footprintban.py +++ /dev/null @@ -1,30 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os, time -from core.Core.colors import * -from core.Core.arts import footprintban_art - -def footprintban(): - - time.sleep(0.5) - os.system('clear') - print(G+' [!] Module Loaded : Reconnaissance\n') - print(footprintban_art) - print(""" -Choose from the following options: - -\033[1;34m [1] \033[1;36mPassive Footprinting \033[1;0m(Open Source Intelligence) -\033[1;34m [2] \033[1;36mActive Reconnaissance \033[1;0m(Gather via Interaction) -\033[1;34m [3] \033[1;36mInformation Disclosure \033[1;0m(Errors, Emails, etc) - -\033[1;34m [99] \033[1;36mBack -""") diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/webbugs.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/webbugs.py deleted file mode 100644 index 13991369..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/webbugs.py +++ /dev/null @@ -1,201 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -import os -import sys -sys.path.append('modules/0x03-Vulnerability+Analysis/0x02-MisconfigurationBugs/') - -from icors import * -from ssscript import * -from clickjack import * -from zone import * -from hhi import * -from netmisc import * -from cloudflaremisc import * -from hsts import * -from sessionfix import * -from headers import * -from xsstrace import * -from cookiecheck import * -from mailspoof import * -from core.Core.colors import * -from core.Vulnlysis.Misc_Bugs.webbugsban import * - -def webbugs(web): - - print(W+'\n [*] Type Selected : Basic Web Bugs and Misconfigurations...') - webbugsban() - v = raw_input(O+B+' [#] \033[4mTID\033[1;0m '+GR+':> ' + color.END) - print('\n') - if v.strip() == '1': - print(B+' [!] Type Selected :'+C+' iCORS') - icors(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '2': - print(B+' [!] Type Selected :'+C+' Same Site Scripting') - ssscript(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '3': - print(B+' [!] Type Selected :'+C+' Clickjack') - clickjack(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '4': - print(B+' [!] Type Selected :'+C+' Zone Transfer') - zone(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '5': - print(B+' [!] Type Selected :'+C+' Cookie Check') - cookiecheck(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '6': - print(B+' [!] Type Selected :'+C+' Sec. Headers') - headers(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '7': - print(B+' [!] Type Selected :'+C+' Cloudflare Misconfig.') - cloudflaremisc(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '8': - print(B+' [!] Type Selected :'+C+' HSTS Check') - hsts(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '9': - print(B+' [!] Type Selected :'+C+' Cross Site Tracing') - xsstrace(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '10': - print(B+' [!] Type Selected :'+C+' Telnet Enabled') - netmisc(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '11': - print(B+' [!] Type Selected :'+C+' Email Spoof') - mailspoof(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '12': - print(B+' [!] Type Selected :'+C+' Host Header Injection') - hhi(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '13': - print(B+' [!] Type Selected :'+C+' Cookie Injection') - sessionfix(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == 'A': - print(B+' [!] Type Selected : All Modules') - time.sleep(0.5) - - print(B+' [*] Firing up module -->'+C+' iCORS') - icors(web) - print(B+'\n [!] Module Completed -->'+C+' iCORS\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' SSS ') - ssscript(web) - print(B+'\n [!] Module Completed -->'+C+' SSS \n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' ClickJacking') - clickjack(web) - print(B+'\n [!] Module Completed -->'+C+' ClickJacking\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Zone Transfer') - zone(web) - print(B+'\n [!] Module Completed -->'+C+' Zone Transfer\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Cookie Check') - cookiecheck(web) - print(B+'\n [!] Module Completed -->'+C+' Cookie Check\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Security Headers ') - headers(web) - print(B+'\n [!] Module Completed -->'+C+' Security Headers \n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Cloudflare Misconfig.') - cloudflaremisc(web) - print(B+'\n [!] Module Completed -->'+C+' Cloudflare Misconfig.\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Mail Spoofing') - mailspoof(web) - print(B+'\n [!] Module Completed -->'+C+' Mail Spoofing\n') - time.sleep(0.5) - - print(B+' [*] Firing up module -->'+C+' HSTS Checker') - hsts(web) - print(B+'\n [!] Module Completed -->'+C+' HSTS Checker\n') - time.sleep(0.5) - - print(B+' [*] Firing up module -->'+C+' Cross Site Tracing') - xsstrace(web) - print(B+'\n [!] Module Completed -->'+C+' Cross Site Tracing\n') - time.sleep(0.5) - - print(B+' [*] Firing up module -->'+C+' Telnet Enabled') - netmisc(web) - print(B+'\n [!] Module Completed -->'+C+' Telnet Enabled\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Host Header Injection') - hhi(web) - print(B+'\n [!] Module Completed -->'+C+' Host Header Injection\n') - time.sleep(1) - - print(B+' [*] Firing up module -->'+C+' Cookie Injection') - sessionfix(web) - print(B+'\n [!] Module Completed -->'+C+' Cookie Injection\n') - time.sleep(1) - - print(G+' [+] All modules successfully completed!') - time.sleep(0.5) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - webbugs(web) - - elif v.strip() == '99': - print('[!] Back') - time.sleep(0.7) - - else: - print('') - dope = ['You high dude?','Hey there! Enter a valid option','Whoops! Thats not an option','Sorry fam! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - webbugs(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/webbugsban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/webbugsban.py deleted file mode 100644 index 0ed2f82b..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Misc_Bugs/webbugsban.py +++ /dev/null @@ -1,49 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -import os -from core.Core.colors import * -from core.Core.arts import bugsban_art - -def webbugsban(): - - os.system('clear') - print(bugsban_art) - print(O+' [1]'+GR+' Insecure Cross Origin Resource Sharing'+W+' (Absolute)') - time.sleep(0.1) - print(O+' [2]'+GR+' Same Site Scripting'+W+' (Sub-Domains Based)') - time.sleep(0.1) - print(O+' [3]'+GR+' Clickjackable Vulnerabilities '+W+'(Framable Response)') - time.sleep(0.1) - print(O+' [4]'+GR+' Zone Transfer Vulnerabilities'+W+' (DNS Based)') - time.sleep(0.1) - print(O+' [5]'+GR+' Security on Cookies '+W+'(HTTPOnly & Secure Flags)') - time.sleep(0.1) - print(O+' [6]'+GR+' Security Headers Analysis '+W+'(Absolute)') - time.sleep(0.1) - print(O+' [7]'+GR+' Cloudflare Misconfiguration '+W+'(Get Real IP) ') - time.sleep(0.1) - print(O+' [8]'+GR+' HTTP Strict Transport Security Usage ') - time.sleep(0.1) - print(O+' [9]'+GR+' Cross-Site Tracing '+W+'(Port Based)') - time.sleep(0.1) - print(O+' [10]'+GR+' Network Security Misconfig. '+W+'(Telnet Port Based)') - time.sleep(0.1) - print(O+' [11]'+GR+' Spoofable Emails '+W+'(Missing SPF & DMARC Records) ') - time.sleep(0.1) - print(O+' [12]'+GR+' Host Header Injection '+W+'(Port Based) ') - time.sleep(0.1) - print(O+' [13]'+GR+' Cookie Injection '+W+'(Session Fixation)\n ') - time.sleep(0.1) - print(O+' [A]'+GR+' Load all the modules 1 by 1\n') - time.sleep(0.1) - print(O+' [99]'+GR+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/othbugs.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/othbugs.py deleted file mode 100644 index 1b3f11b1..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/othbugs.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author : @_tID -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import os -import time -import subprocess -import random -from random import randint -sys.path.append('modules/0x03-Vulnerability+Analysis/0x03-OtherWebBugs/') -from popbrute import * -from ftpbrute import * -from sqlbrute import * -from sshbrute import * -from smtpbrute import * -from xmppbrute import * -from telnetbrute import * -from core.Core.colors import * -from core.Vulnlysis.Oth_Bugs.othbugsban import * - -def othbugs(web): - - print(" [!] Module Selected : Bruteforce Modules\n\n") - othbugsban() - print('') - time.sleep(0.3) - v = raw_input (GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - print('') - if v == '1': - print(B+' [!] Type Selected :'+C+' FTP Brute') - ftpbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == '2': - print(B+' [!] Type Selected :'+C+' SSH Brute') - sshbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == '3': - print(B+' [!] Type Selected :'+C+' SQL Brute') - sqlbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == '4': - print(B+' [!] Type Selected :'+C+' POP 3/2 Brute') - popbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == '5': - print(B+' [!] Type Selected :'+C+' SMTP Brute') - smtpbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == '6': - print(B+' [!] Type Selected :'+C+' TELNET Brute') - telnetbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == '7': - print(B+' [!] Type Selected :'+C+' XMPP Brute') - xmppbrute(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print('\n\n') - othbugs(web) - - elif v == 'A': - print(B+' [!] Type Selected :'+C+' All Modules') - time.sleep(0.5) - print(B+' [*] Firing up module -->'+C+' FTP Brute') - ftpbrute(web) - print(B+' [!] Module Completed -->'+C+' FTP Brute\n') - time.sleep(2) - - print(B+' [*] Firing up module -->'+C+' SSH Brute') - sshbrute(web) - print(B+' [!] Module Completed -->'+C+' SSH Brute\n') - time.sleep(2) - - print(B+' [*] Firing up module -->'+C+' SQL Brute') - sqlbrute(web) - print(B+' [!] Module Completed -->'+C+' SQL Brute\n') - time.sleep(2) - - print(B+' [*] Firing up module -->'+C+' POP Brute') - popbrute(web) - print(B+' [!] Module Completed -->'+C+' POP Brute\n') - time.sleep(2) - - print(B+' [*] Firing up module -->'+C+' SMTP Brute') - smtpbrute(web) - print(B+' [!] Module Completed -->'+C+' SMTP Brute\n') - time.sleep(2) - - print(B+' [*] Firing up module -->'+C+' TElNET Brute') - telnetbrute(web) - print(B+' [!] Module Completed -->'+C+' TELNET Brute\n') - time.sleep(2) - - print(B+' [*] Firing up module -->'+C+' XMPP Brute') - xmppbrute(web) - print(B+' [!] Module Completed -->'+C+' XMPP Brute\n') - time.sleep(2) - - print(B+' [!] All scantypes have been tested on target...') - time.sleep(4) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - print(B+' [*] Going back to menu...') - othbugs(web) - - elif v == '99': - print(GR+' [*] Going back...') - time.sleep(0.5) - os.system('clear') - - else: - dope = ['You high dude?','Shit! Enter a valid option','Whoops! Thats not an option','Sorry! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - othbugs(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/othbugsban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/othbugsban.py deleted file mode 100644 index d1b1da13..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Oth_Bugs/othbugsban.py +++ /dev/null @@ -1,39 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author : @_tID -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -from core.Core.arts import bugsban_art -from core.Core.colors import * -import time - -def othbugsban(): - - time.sleep(0.4) - os.system('clear') - print(bugsban_art) - time.sleep(0.3) - print(B+'\n [1]'+C+' FTP Protocol Bruteforce'+W+' (Default Credentials)') - time.sleep(0.1) - print(B+' [2]'+C+' SSH Protocol Bruteforce'+W+' (Default Credentials)') - time.sleep(0.1) - print(B+' [3]'+C+' SQL Protocol Bruteforce'+W+' (Default Credentials)') - time.sleep(0.1) - print(B+' [4]'+C+' POP 3/2 Protocol Bruteforce'+W+' (Default Credentials)') - time.sleep(0.1) - print(B+' [5]'+C+' SMTP Protocol Bruteforce'+W+' (Default Credentials)') - time.sleep(0.1) - print(B+' [6]'+C+' TELNET Protocol Bruteforce'+W+' (Default Credentials)') - time.sleep(0.1) - print(B+' [7]'+C+' XMPP Protocol Bruteforce'+W+' (Default Credentials)\n') - time.sleep(0.1) - print(B+' [A]'+C+' Start up ALL modules 1 by 1\n') - time.sleep(0.1) - print(B+' [99]'+C+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/serbugs.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/serbugs.py deleted file mode 100644 index ec2db7e1..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/serbugs.py +++ /dev/null @@ -1,224 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author: @_tID -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import sys -import time -import os -sys.path.append('modules/0x03-Vulnerability+Analysis/0x01-TopPriorityBugs/') - -from serbugsban import * -from lfi import * -from rfi import * -from ldap import * -from rce import * -from csrf import * -from sqli import * -from crlf import * -from subdomover import * -from strutsshock import * -from phpi import * -from htmli import * -from xpathi import * -from shellshock import * -from core.Core.colors import * -from xss import * -from openredirect import * -from pathtrav import * - -def serbugs(web): - - print(GR+'\n [*] Loading module...') - serbugsban() - v = raw_input(''+O+' \033[4mTID\033[1;0m '+GR+':> ' + color.END) - print('\n') - if v.strip() == '1': - print(' Type Selected : LFI') - lfi(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '2': - print(' Type Selected : RFI') - rfi(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '3': - print(' Type Selected : RCE') - rce(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '4': - print(' Type Selected : Path Traversal') - pathtrav(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '5': - print(' Type Selected : CSRF') - csrf(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '6': - print(' Type Selected : XSS') - xss(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '7': - print(' Type Selected : SQLi') - sqli(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '8': - print(' Type Selected : LDAP Injection') - ldap(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '9': - print(' Type Selected : HTML Code Injection') - htmli(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '10': - print(' Type Selected : HTTP Response Splitting') - crlf(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '11': - print(' Type Selected : PHP Code Injection') - phpi(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '12': - print(' Type Selected : XPATH Injection') - xpathi(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '13': - print(' Type Selected : Shellshock') - shellshock(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '14': - print(' Type Selected : Apache Struts Shock') - strutsshock(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '15': - print(' Type Selected : URL Validation') - redirect(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '16': - print(' Type Selected : Subdomain Takeover') - subdomover(web) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == 'A': - print(' [!] Type Selected : All Modules') - time.sleep(0.5) - - print(' [*] Firing up module --> LFI') - lfi(web) - print(' [!] Module Completed --> LFI\n') - time.sleep(1) - - print(' [*] Firing up module --> RFI ') - rfi(web) - print(' [!] Module Completed --> RFI \n') - time.sleep(1) - - print(' [*] Firing up module --> RCE') - rce(web) - print(' [!] Module Completed --> RCE\n') - time.sleep(1) - - print(' [*] Firing up module --> Path Traversal') - pathtrav(web) - print(' [!] Module Completed --> Path Traversal\n') - time.sleep(1) - - print(' [*] Firing up module --> CSRF') - csrf(web) - print(' [!] Module Completed --> CSRF\n') - time.sleep(1) - - print(' [*] Firing up module --> XSS ') - xss(web) - print(' [!] Module Completed --> XSS \n') - time.sleep(1) - - print(' [*] Firing up module --> SQLi') - sqli(web) - print(' [!] Module Completed --> SQLi\n') - time.sleep(1) - - print(' [*] Firing up module --> LDAPi') - ldap(web) - print(' [!] Module Completed --> LDAPi\n') - time.sleep(1) - - print(' [*] Firing up module --> CRLF') - crlf(web) - print(' [!] Module Completed --> CRLF\n') - time.sleep(1) - - print(' [*] Firing up module --> PHP Code Injection') - phpi(web) - print(' [!] Module Completed --> PHP Code Injection\n') - time.sleep(0.5) - - print(' [*] Firing up module --> XPATH Injection') - xpathi(web) - print(' [!] Module Completed --> XPATH Injection\n') - time.sleep(0.5) - - print(' [*] Firing up module --> ShellShock') - shellshock(web) - print(' [!] Module Completed --> ShellShock\n') - time.sleep(1) - - print(' [*] Firing up module --> URL Forwards') - redirect(web) - print(' [!] Module Completed --> Url Forwards\n') - time.sleep(0.5) - print(G+' [+] All modules successfully completed!') - time.sleep(4) - raw_input(O+' [#] Press '+GR+'Enter'+O+' to continue...') - serbugs(web) - - elif v.strip() == '99': - print('[!] Back') - time.sleep(0.7) - - else: - print('') - dope = ['You high dude?','Hey there! Enter a valid option','Whoops! Thats not an option','Sorry fam! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - - time.sleep(1) - serbugs(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/serbugsban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/serbugsban.py deleted file mode 100644 index c28a3282..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/Serio_Bugs/serbugsban.py +++ /dev/null @@ -1,56 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import time -from core.Core.colors import * -import os -from core.Core.arts import bugsban_art - -def serbugsban(): - - time.sleep(0.5) - os.system('clear') - print(bugsban_art) - print(B+' [1]'+C+' Local File Inclusion'+W+' (Root Directories)') - time.sleep(0.1) - print(B+' [2]'+C+' Remote File Inclusion'+W+' (Executable Scripts)') - time.sleep(0.1) - print(B+' [3]'+C+' OS Command Injection'+W+' (Windows & Linux)') - time.sleep(0.1) - print(B+' [4]'+C+' Path Traversal '+W+'(Sensitive Paths)') - time.sleep(0.1) - print(B+' [5]'+C+' Cross-Site Request Forgery '+W+'(Absolute)') - time.sleep(0.1) - print(B+' [6]'+C+' Cross-Site Scripting '+W+'(Absolute)') - time.sleep(0.1) - print(B+' [7]'+C+' SQL Injection '+W+'(Error & Blind Based)') - time.sleep(0.1) - print(B+' [8]'+C+' LDAP Entity Injection '+W+'(Error Enumeration)') - time.sleep(0.1) - print(B+' [9]'+C+' HTML Code Injection '+W+'(Tag Based)') - time.sleep(0.1) - print(B+' [10]'+C+' HTTP Response Splitting '+W+'(CRLF Injection)') - time.sleep(0.1) - print(B+' [11]'+C+' PHP Code Injection '+W+'(Windows + Linux)') - time.sleep(0.1) - print(B+' [12]'+C+' XPATH Injection '+W+'(Blind and Error Based)') - time.sleep(0.1) - print(B+' [13]'+C+' Shellshock Vulnerabilities'+W+' (Bash RCE)') - time.sleep(0.1) - print(B+' [14]'+C+' Apache Struts Shock'+W+' (Apache RCE)') - time.sleep(0.1) - print(B+' [15]'+C+' Unvalidated URL Redirects'+W+' (Open Redirects)') - time.sleep(0.1) - print(B+' [16]'+C+' Sub-domain Takeover'+W+' (50+ Services)\n') - time.sleep(0.1) - print(B+' [A]'+C+' Load all the modules 1 by 1\n') - time.sleep(0.1) - print(B+' [99]'+C+' Back\n') diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/colors.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/colors.py deleted file mode 100644 index 5818d90e..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/colors.py +++ /dev/null @@ -1,37 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -############################### -class color: - PURPLE = '\033[95m' - CYAN = '\033[96m' - DARKCYAN = '\033[36m' - BLUE = '\033[94m' - GREEN = '\033[92m' - YELLOW = '\033[93m' - RED = '\033[91m' - BOLD = '\033[1m' - UNDERLINE = '\033[4m' - END = '\033[0m' - HEADER = '\033[95m' - OKBLUE = '\033[94m' - OKGREEN = '\033[92m' - WARNING = '\033[93m' - FAIL = '\033[91m' - -W = '\033[1;0m' # white (normal) -R = '\033[1;31m' # red -G = '\033[1;32m' # green -O = '\033[1;33m' # orange -B = '\033[1;34m' # blue -P = '\033[1;35m' # purple -C = '\033[1;36m' # cyan -GR = '\033[1;37m' # gray -T = '\033[1;93m' # tan -############################### diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/vuln.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/vuln.py deleted file mode 100644 index ea306cfd..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/vuln.py +++ /dev/null @@ -1,48 +0,0 @@ -#!/usr/bin/env python - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os -import time -import random -from random import * -from core.Vulnlysis.vulnban import * -from core.Vulnlysis.Misc_Bugs.webbugs import * -from core.Vulnlysis.Oth_Bugs.othbugs import * -from core.Vulnlysis.Serio_Bugs.serbugs import * -from core.Core.colors import * - -def vuln(web): - - print(B+' [+] Module Loaded : '+C+'Vulnerability Analysis') - vulnban() - v = raw_input(''+O+' \033[4mTID\033[1;0m '+GR+':> ' + color.END) - print('\n') - - if v.strip() == '1': - webbugs(web) - - elif v.strip() == '2': - serbugs(web) - - elif v.strip() == '3': - othbugs(web) - - elif v.strip() == '99': - print('[!] Back') - time.sleep(0.7) - os.system('clear') - - else: - dope = ['You high dude?','Hey there! Enter a valid option','Whoops! Thats not an option','Sorry fam! You just typed shit'] - print(dope[randint(0,3)]) - time.sleep(0.7) - os.system('clear') - vulnban() - vuln(web) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/vulnban.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/vulnban.py deleted file mode 100644 index 3ba23536..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/Vulnlysis/vulnban.py +++ /dev/null @@ -1,29 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -from __future__ import print_function -import os, time -from core.Core.colors import * -from core.Core.arts import vulnban_art - -def vulnban(): - - time.sleep(0.3) - os.system('clear') - print(O+' [!] Module Selected : Vulnerability Analysis') - print(vulnban_art) - print(B+' [1] '+C+' Basic Bugs & Misconfigurations'+W+' (Low Priority [P0x3-P0x4])') - time.sleep(0.2) - print(B+' [2] '+C+' Critical Vulnerabilities '+W+'(High Priority [P0x1-P0x2])') - time.sleep(0.2) - print(B+' [3] '+C+' Others '+W+'(Bruters)\n') - time.sleep(0.2) - print(B+' [99] '+C+'Back\n') - time.sleep(0.2) diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/__init__.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/__init__.py deleted file mode 100644 index d493f670..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/__init__.py +++ /dev/null @@ -1,11 +0,0 @@ -#!/usr/bin/env python -# coding: utf-8 - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS-Framework - -pass diff --git a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/tidos_main.py b/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/tidos_main.py deleted file mode 100644 index 62abd7b4..00000000 --- a/modules/0x01-OSINT+Footprinting/0x01-PassiveReconnaissance/core/tidos_main.py +++ /dev/null @@ -1,116 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -#-:-:-:-:-:-:-:-:-:-:-:-:# -# TIDoS Framework # -#-:-:-:-:-:-:-:-:-:-:-:-:# - -#Author: @_tID -#This module requires TIDoS Framework -#https://github.com/0xInfection/TIDoS - -from __future__ import print_function -import sys -import platform -import os -import time -import warnings -from random import randint -from os import path -from time import sleep -from logging import getLogger, ERROR -getLogger("scapy.runtime").setLevel(ERROR) -warnings.filterwarnings("ignore") - -# All module imports -from core.Core.inputin import * -from core.Core.banner import * -from core.Core.dispmenu import * -from core.Core.agree import * -from core.Core.loadstyle import * -from core.Core.bannerbelow import * -from core.Auxillaries.auxil import * -from core.Core.colors import * -from core.Exploitation.exploits import * -from core.Footprinting.footprint import * -from core.Enumeration.scanenum import * -from core.Vulnlysis.vuln import * - -def tidos_main(): # To be called by external - - try: - agree() # the agreement (to appear only at time of installation) - loadstyle() # some swag stuff :p - banner() # main banner - bannerbelow() # banner 2 - web = inputin() # take the website as input - except Exception as e: - print(R+' [-] Exception encountered!') - print(R+' [-] Exception : '+str(e)) - sys.exit(1) - - print(P+' [+] Okay, so what to start with?') # lets start - time.sleep(1) - def tidosmain(web): # this is to be iterated repeatedly - - while True: - try: - os.system('clear') - dispmenu() # displaying the options - zop = raw_input(''+GR+' [#] \033[1;4mTID\033[0m'+GR+' :> ' + color.END) - zap = zop.strip() - - if zap == '1': # 1 - OSINT + Recon - - print(G+"\n [+] Module loaded : Reconnaissance") - footprint(web) - - elif zap == '2': # 2 - Scanning + Enumeration - - print(G+'\n [+] Module loaded : Scanning & Enumeration') - scanenum(web) - - elif zap == '3': # 3 - Vulnerability Analysis - - print(G+'\n [+] Module loaded : Vulnerability Analysis') - vuln(web) - - elif zap == '4': # Exploitation - - print(G+'\n [+] Module loaded : Exploits Castle') - exploits(web) - - elif zap == '5': # Auxillary modules - - print(G+'\n [+] Module loaded : Auxillaries') - auxil(web) - - elif zap == '99': # Say Goodbye! - - print(R+'\n [-] Exiting...') - time.sleep(0.6) - print(O+' [+] Goodluck mate, Alvida!\n') - sys.exit(0) - - else: # Troll for not selecting right option :p - - dope = ['You high dude?', 'Sorry fam! You just typed shit'] - print(R+' [-] ' + dope[randint(0,1)]) - time.sleep(0.5) - pass - - except KeyboardInterrupt: # Incase user wants to quit - - print(R+"\n [-] " + color.UNDERLINE+ "User Interruption detected!"+color.END) - time.sleep(0.4) - print(C+' [+] Alvida, see ya!\n') - sys.exit(0) - - except Exception: # Global Error Handling Stuff - print(R+' [-] Unhandled runtime exception while execution...') - time.sleep(1) - print(R+' [-] Returning back to main menu...') - time.sleep(1) - pass # (If user runs into a error, that would not quit this tool) - - tidosmain(web) # The true start of this program