Added first version of the script. Works with basic tools. Still needs more work.
This commit is contained in:
parent
bc6acc0940
commit
788f1e6b13
233
hackpack.sh
Executable file
233
hackpack.sh
Executable file
@ -0,0 +1,233 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Function to run a selected tool
|
||||
run_tool() {
|
||||
tool_name=$1
|
||||
case $tool_name in
|
||||
hydra)
|
||||
echo "Enter the target (IP or hostname):"
|
||||
read target
|
||||
echo "Enter the service to attack (e.g., ssh, ftp, http):"
|
||||
read service
|
||||
echo "Enter the wordlist path for brute-forcing:"
|
||||
read wordlist
|
||||
echo "Running Hydra attack on $service at $target with wordlist $wordlist..."
|
||||
hydra -l user -P $wordlist $target $service
|
||||
;;
|
||||
nmap)
|
||||
echo "Enter the target IP or hostname:"
|
||||
read target_ip
|
||||
echo "Running Nmap scan on $target_ip..."
|
||||
nmap -sS $target_ip
|
||||
;;
|
||||
metasploit)
|
||||
echo "Starting Metasploit framework..."
|
||||
msfconsole
|
||||
;;
|
||||
sqlmap)
|
||||
echo "Enter the URL for SQL injection testing:"
|
||||
read target_url
|
||||
echo "Running SQLMap against $target_url..."
|
||||
sqlmap -u $target_url --batch
|
||||
;;
|
||||
aircrack-ng)
|
||||
echo "Enter the path to the capture file (e.g., *.cap):"
|
||||
read capfile
|
||||
echo "Enter the wordlist for cracking:"
|
||||
read wordlist
|
||||
echo "Running Aircrack-ng on $capfile with $wordlist..."
|
||||
aircrack-ng $capfile -w $wordlist
|
||||
;;
|
||||
wireshark)
|
||||
echo "Starting Wireshark..."
|
||||
sudo wireshark
|
||||
;;
|
||||
hashcat)
|
||||
echo "Enter the hash to crack:"
|
||||
read hash
|
||||
echo "Enter the hash mode (e.g., 0 for MD5):"
|
||||
read mode
|
||||
echo "Enter the wordlist path for cracking:"
|
||||
read wordlist
|
||||
echo "Running Hashcat on hash $hash with wordlist $wordlist..."
|
||||
hashcat -m $mode -a 0 $hash $wordlist
|
||||
;;
|
||||
subfinder)
|
||||
echo "Enter the domain for subdomain enumeration:"
|
||||
read domain
|
||||
echo "Running Subfinder on $domain..."
|
||||
subfinder -d $domain
|
||||
;;
|
||||
bettercap)
|
||||
echo "Starting Bettercap for Man-in-the-Middle (MITM) attack..."
|
||||
sudo bettercap -T 192.168.1.0/24
|
||||
;;
|
||||
masscan)
|
||||
echo "Enter IP address range to scan:"
|
||||
read ip
|
||||
echo "Enter the port (80) or port range (80-8080) to scan:"
|
||||
read port
|
||||
echo "Enter rate to run the scan (pps):"
|
||||
read rate
|
||||
echo "Running scan of $ip on port $port at a rate of $rate..."
|
||||
sudo masscan -p$port $ip --rate=$rate --exclude=255.255.255.255
|
||||
;;
|
||||
gobuster)
|
||||
echo "Enter the target URL:"
|
||||
read target_url
|
||||
echo "Enter the wordlist for directory brute-forcing:"
|
||||
read wordlist
|
||||
echo "Running Gobuster on $target_url with wordlist $wordlist..."
|
||||
gobuster dir -u $target_url -w $wordlist
|
||||
;;
|
||||
theharvester)
|
||||
echo "Enter the domain for email and subdomain enumeration:"
|
||||
read domain
|
||||
echo "Running TheHarvester on $domain..."
|
||||
theharvester -d $domain -b google
|
||||
;;
|
||||
nikto)
|
||||
echo "Enter the target URL to scan for vulnerabilities:"
|
||||
read target_url
|
||||
echo "Running Nikto scan on $target_url..."
|
||||
nikto -h $target_url
|
||||
;;
|
||||
aircrack-ng)
|
||||
echo "Enter the path to the capture file (e.g., *.cap):"
|
||||
read capfile
|
||||
echo "Enter the wordlist for cracking:"
|
||||
read wordlist
|
||||
echo "Running Aircrack-ng on $capfile with $wordlist..."
|
||||
aircrack-ng $capfile -w $wordlist
|
||||
;;
|
||||
sublist3r)
|
||||
echo "Enter the domain for subdomain enumeration:"
|
||||
read domain
|
||||
echo "Running Sublist3r on $domain..."
|
||||
sublist3r -d $domain
|
||||
;;
|
||||
responder)
|
||||
echo "Starting Responder for network poisoning..."
|
||||
sudo responder -I eth0
|
||||
;;
|
||||
john)
|
||||
echo "Enter the hash to crack:"
|
||||
read hash
|
||||
echo "Enter the wordlist path for cracking:"
|
||||
read wordlist
|
||||
echo "Running John the Ripper on hash $hash with wordlist $wordlist..."
|
||||
john --wordlist=$wordlist $hash
|
||||
;;
|
||||
snort)
|
||||
echo "Running Snort network intrusion detection..."
|
||||
sudo snort -A console -i eth0 -c /etc/snort/snort.conf
|
||||
;;
|
||||
wpscan)
|
||||
echo "Enter the target URL for WordPress vulnerability scanning:"
|
||||
read target_url
|
||||
echo "Running WPScan on $target_url..."
|
||||
wpscan --url $target_url --enumerate u
|
||||
;;
|
||||
metasploit)
|
||||
echo "Starting Metasploit..."
|
||||
sudo msfconsole
|
||||
;;
|
||||
*)
|
||||
echo "Tool not recognized."
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
# Function to display menu
|
||||
show_menu() {
|
||||
clear
|
||||
echo "Network & Security Tools Menu"
|
||||
echo "-----------------------------"
|
||||
echo "1) Hydra (Brute Force)"
|
||||
echo "2) Nmap (Network Scan)"
|
||||
echo "3) Metasploit Framework"
|
||||
echo "4) SQLMap (SQL Injection)"
|
||||
echo "5) Aircrack-ng (WPA Cracking)"
|
||||
echo "6) Wireshark (Packet Capture)"
|
||||
echo "7) Hashcat (Hash Cracking)"
|
||||
echo "8) Subfinder (Subdomain Enumeration)"
|
||||
echo "9) Gobuster (Directory Brute Force)"
|
||||
echo "10) TheHarvester (Recon)"
|
||||
echo "11) Nikto (Web Vulnerability Scanner)"
|
||||
echo "12) Sublist3r (Subdomain Enumeration)"
|
||||
echo "13) Responder (MITM)"
|
||||
echo "14) John the Ripper (Password Cracking)"
|
||||
echo "15) Snort (IDS/IPS)"
|
||||
echo "16) WPScan (WordPress Scanner)"
|
||||
echo "17) masscan (Network Scan)"
|
||||
echo "q) Exit"
|
||||
echo -n "Please choose an option (1-17): "
|
||||
read choice
|
||||
}
|
||||
|
||||
# Main loop
|
||||
while true; do
|
||||
show_menu
|
||||
case $choice in
|
||||
1)
|
||||
run_tool "hydra"
|
||||
;;
|
||||
2)
|
||||
run_tool "nmap"
|
||||
;;
|
||||
3)
|
||||
run_tool "metasploit"
|
||||
;;
|
||||
4)
|
||||
run_tool "sqlmap"
|
||||
;;
|
||||
5)
|
||||
run_tool "aircrack-ng"
|
||||
;;
|
||||
6)
|
||||
run_tool "wireshark"
|
||||
;;
|
||||
7)
|
||||
run_tool "hashcat"
|
||||
;;
|
||||
8)
|
||||
run_tool "subfinder"
|
||||
;;
|
||||
9)
|
||||
run_tool "gobuster"
|
||||
;;
|
||||
10)
|
||||
run_tool "theharvester"
|
||||
;;
|
||||
11)
|
||||
run_tool "nikto"
|
||||
;;
|
||||
12)
|
||||
run_tool "sublist3r"
|
||||
;;
|
||||
13)
|
||||
run_tool "responder"
|
||||
;;
|
||||
14)
|
||||
run_tool "john"
|
||||
;;
|
||||
15)
|
||||
run_tool "snort"
|
||||
;;
|
||||
16)
|
||||
run_tool "wpscan"
|
||||
;;
|
||||
17)
|
||||
run_tool "masscan"
|
||||
;;
|
||||
q)
|
||||
echo "Exiting. Goodbye!"
|
||||
exit 0
|
||||
;;
|
||||
*)
|
||||
echo "Invalid option. Please try again."
|
||||
;;
|
||||
esac
|
||||
echo -n "Press Enter to continue..."
|
||||
read
|
||||
done
|
||||
14
paused.conf
Normal file
14
paused.conf
Normal file
@ -0,0 +1,14 @@
|
||||
|
||||
# resume information
|
||||
resume-index = 15748
|
||||
seed = 15888726770288414675
|
||||
rate = 1000
|
||||
shard = 1/1
|
||||
nocapture = servername
|
||||
|
||||
|
||||
adapter-ip = 192.168.120.27
|
||||
# TARGET SELECTION (IP, PORTS, EXCLUDES)
|
||||
ports = 5201
|
||||
range = 0.0.0.0-255.255.255.254
|
||||
|
||||
Loading…
Reference in New Issue
Block a user