From 788f1e6b13b67ec128c08e465ecfb1d9504cd195 Mon Sep 17 00:00:00 2001 From: Phil Date: Sun, 22 Mar 2026 00:48:21 +0000 Subject: [PATCH] Added first version of the script. Works with basic tools. Still needs more work. --- hackpack.sh | 233 ++++++++++++++++++++++++++++++++++++++++++++++++++++ paused.conf | 14 ++++ 2 files changed, 247 insertions(+) create mode 100755 hackpack.sh create mode 100644 paused.conf diff --git a/hackpack.sh b/hackpack.sh new file mode 100755 index 0000000..b7523d1 --- /dev/null +++ b/hackpack.sh @@ -0,0 +1,233 @@ +#!/bin/bash + +# Function to run a selected tool +run_tool() { + tool_name=$1 + case $tool_name in + hydra) + echo "Enter the target (IP or hostname):" + read target + echo "Enter the service to attack (e.g., ssh, ftp, http):" + read service + echo "Enter the wordlist path for brute-forcing:" + read wordlist + echo "Running Hydra attack on $service at $target with wordlist $wordlist..." + hydra -l user -P $wordlist $target $service + ;; + nmap) + echo "Enter the target IP or hostname:" + read target_ip + echo "Running Nmap scan on $target_ip..." + nmap -sS $target_ip + ;; + metasploit) + echo "Starting Metasploit framework..." + msfconsole + ;; + sqlmap) + echo "Enter the URL for SQL injection testing:" + read target_url + echo "Running SQLMap against $target_url..." + sqlmap -u $target_url --batch + ;; + aircrack-ng) + echo "Enter the path to the capture file (e.g., *.cap):" + read capfile + echo "Enter the wordlist for cracking:" + read wordlist + echo "Running Aircrack-ng on $capfile with $wordlist..." + aircrack-ng $capfile -w $wordlist + ;; + wireshark) + echo "Starting Wireshark..." + sudo wireshark + ;; + hashcat) + echo "Enter the hash to crack:" + read hash + echo "Enter the hash mode (e.g., 0 for MD5):" + read mode + echo "Enter the wordlist path for cracking:" + read wordlist + echo "Running Hashcat on hash $hash with wordlist $wordlist..." + hashcat -m $mode -a 0 $hash $wordlist + ;; + subfinder) + echo "Enter the domain for subdomain enumeration:" + read domain + echo "Running Subfinder on $domain..." + subfinder -d $domain + ;; + bettercap) + echo "Starting Bettercap for Man-in-the-Middle (MITM) attack..." + sudo bettercap -T 192.168.1.0/24 + ;; + masscan) + echo "Enter IP address range to scan:" + read ip + echo "Enter the port (80) or port range (80-8080) to scan:" + read port + echo "Enter rate to run the scan (pps):" + read rate + echo "Running scan of $ip on port $port at a rate of $rate..." + sudo masscan -p$port $ip --rate=$rate --exclude=255.255.255.255 + ;; + gobuster) + echo "Enter the target URL:" + read target_url + echo "Enter the wordlist for directory brute-forcing:" + read wordlist + echo "Running Gobuster on $target_url with wordlist $wordlist..." + gobuster dir -u $target_url -w $wordlist + ;; + theharvester) + echo "Enter the domain for email and subdomain enumeration:" + read domain + echo "Running TheHarvester on $domain..." + theharvester -d $domain -b google + ;; + nikto) + echo "Enter the target URL to scan for vulnerabilities:" + read target_url + echo "Running Nikto scan on $target_url..." + nikto -h $target_url + ;; + aircrack-ng) + echo "Enter the path to the capture file (e.g., *.cap):" + read capfile + echo "Enter the wordlist for cracking:" + read wordlist + echo "Running Aircrack-ng on $capfile with $wordlist..." + aircrack-ng $capfile -w $wordlist + ;; + sublist3r) + echo "Enter the domain for subdomain enumeration:" + read domain + echo "Running Sublist3r on $domain..." + sublist3r -d $domain + ;; + responder) + echo "Starting Responder for network poisoning..." + sudo responder -I eth0 + ;; + john) + echo "Enter the hash to crack:" + read hash + echo "Enter the wordlist path for cracking:" + read wordlist + echo "Running John the Ripper on hash $hash with wordlist $wordlist..." + john --wordlist=$wordlist $hash + ;; + snort) + echo "Running Snort network intrusion detection..." + sudo snort -A console -i eth0 -c /etc/snort/snort.conf + ;; + wpscan) + echo "Enter the target URL for WordPress vulnerability scanning:" + read target_url + echo "Running WPScan on $target_url..." + wpscan --url $target_url --enumerate u + ;; + metasploit) + echo "Starting Metasploit..." + sudo msfconsole + ;; + *) + echo "Tool not recognized." + ;; + esac +} + +# Function to display menu +show_menu() { + clear + echo "Network & Security Tools Menu" + echo "-----------------------------" + echo "1) Hydra (Brute Force)" + echo "2) Nmap (Network Scan)" + echo "3) Metasploit Framework" + echo "4) SQLMap (SQL Injection)" + echo "5) Aircrack-ng (WPA Cracking)" + echo "6) Wireshark (Packet Capture)" + echo "7) Hashcat (Hash Cracking)" + echo "8) Subfinder (Subdomain Enumeration)" + echo "9) Gobuster (Directory Brute Force)" + echo "10) TheHarvester (Recon)" + echo "11) Nikto (Web Vulnerability Scanner)" + echo "12) Sublist3r (Subdomain Enumeration)" + echo "13) Responder (MITM)" + echo "14) John the Ripper (Password Cracking)" + echo "15) Snort (IDS/IPS)" + echo "16) WPScan (WordPress Scanner)" + echo "17) masscan (Network Scan)" + echo "q) Exit" + echo -n "Please choose an option (1-17): " + read choice +} + +# Main loop +while true; do + show_menu + case $choice in + 1) + run_tool "hydra" + ;; + 2) + run_tool "nmap" + ;; + 3) + run_tool "metasploit" + ;; + 4) + run_tool "sqlmap" + ;; + 5) + run_tool "aircrack-ng" + ;; + 6) + run_tool "wireshark" + ;; + 7) + run_tool "hashcat" + ;; + 8) + run_tool "subfinder" + ;; + 9) + run_tool "gobuster" + ;; + 10) + run_tool "theharvester" + ;; + 11) + run_tool "nikto" + ;; + 12) + run_tool "sublist3r" + ;; + 13) + run_tool "responder" + ;; + 14) + run_tool "john" + ;; + 15) + run_tool "snort" + ;; + 16) + run_tool "wpscan" + ;; + 17) + run_tool "masscan" + ;; + q) + echo "Exiting. Goodbye!" + exit 0 + ;; + *) + echo "Invalid option. Please try again." + ;; + esac + echo -n "Press Enter to continue..." + read +done diff --git a/paused.conf b/paused.conf new file mode 100644 index 0000000..f1d997f --- /dev/null +++ b/paused.conf @@ -0,0 +1,14 @@ + +# resume information +resume-index = 15748 +seed = 15888726770288414675 +rate = 1000 +shard = 1/1 +nocapture = servername + + +adapter-ip = 192.168.120.27 +# TARGET SELECTION (IP, PORTS, EXCLUDES) +ports = 5201 +range = 0.0.0.0-255.255.255.254 +