forked from PowerScript/KatanaFramework
-
Notifications
You must be signed in to change notification settings - Fork 0
/
ktf.run.py
126 lines (122 loc) · 2.71 KB
/
ktf.run.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
#!/usr/bin/env python
### Katana Framework Runner
### you can redistribute it and/or modify
### it under the terms of the GNU General Public License as published by
### the Free Software Foundation, either version 3 of the License, or
### (at your option) any later version.
from core.design import *
from scripts import *
from core import colors
from core import info
import argparse
import time
import sys
CLASS_BANNER=DESIGN()
CLASS_BANNER.ktfrun(info.version,info.build)
parser = argparse.ArgumentParser()
parser.add_argument("-m", "--module", help=" Script module to run.")
args = parser.parse_args()
m=args.module
if __name__=="__main__":
if True:
if True:
print " ktf.run | "+time.strftime('%c')
if m == "web/httpbt":
BruteForceHTTP.httpbt(0)
exit()
if m == "web/cpfinder":
AdminFinder.adminfinder(0)
exit()
if m == "web/formbt":
BruteForceFormBase.httpformbasebruteforce(0)
exit()
if m == "net/arplook":
ARPLooking.arplook(0)
exit()
if m == "set/gdreport":
GetDataReport.getdatareport(0)
exit()
if m == "fle/brutezip":
BruteZIP.btzip(0)
exit()
if m == "fle/bruterar":
BruteRAR.btrar(0)
exit()
if m == "clt/ftp":
ClientFTP.cftp(0)
exit()
if m == "fbt/ftp":
BruteForceFTP.btftp(0)
exit()
if m == "wifi/hwifipwd":
WifiDetecter.hackerwifipwd()
exit()
if m == "fbt/ssh":
BruteForceSSH.btssh(0)
exit()
if m == "clt/sql":
ClientMYSQL.cmysql(0)
exit()
if m == "fbt/sql":
BruteForceSQL.btsql(0)
exit()
if m == "fbt/pop3":
BruteForcePOP3.btpop3(0)
exit()
if m == "clt/pop3":
ClientPOP3.cpop3(0)
exit()
if m == "mc/tlogin":
TLogin.tlogin(0)
exit()
if m == "fzz/ftp":
FuzzerFTP.fftp(0)
exit()
if m == "web/joomscan":
Joomscan.xjoomla(0)
exit()
if m == "ser/sql":
services.services('mysql')
exit()
if m == "ser/ssh":
services.services('ssh')
exit()
if m == "ser/apache":
services.services('apache2')
exit()
if m == "wifi/wpabtf":
WpaBTF.btwpa(0)
exit()
if m == "wifi/dos":
Wifi_DDOS.ddos(0)
exit()
if m == "mc/gendic":
GenDic.Gendic(0)
exit()
if m == "web/whois":
Whois.wuis(0)
exit()
if m == "net/lanlive":
LANScanner.hostl(0)
exit()
if m == "set/facebrok":
facebrok.facebrok(0)
exit()
if m == "net/arpspoof":
ARPPoisoning.arpp(0)
exit()
if m == "set/mailboom":
smtpBombing.smtpbombing(0)
exit()
if m == "mc/i":
Iandl.iandi()
exit()
if m == "for/imagen":
forenseIMAGE.exiftool(0)
exit()
if m == "net/portscan":
PortScanner.PortScanner(0)
exit()
if m == "web/lfd-con":
LFDconsole.LFDconsole(0)
exit()