234 lines
7.0 KiB
Bash
Executable File
234 lines
7.0 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
# Function to run a selected tool
|
|
run_tool() {
|
|
tool_name=$1
|
|
case $tool_name in
|
|
hydra)
|
|
echo "Enter the target (IP or hostname):"
|
|
read target
|
|
echo "Enter the service to attack (e.g., ssh, ftp, http):"
|
|
read service
|
|
echo "Enter the wordlist path for brute-forcing:"
|
|
read wordlist
|
|
echo "Running Hydra attack on $service at $target with wordlist $wordlist..."
|
|
hydra -l user -P $wordlist $target $service
|
|
;;
|
|
nmap)
|
|
echo "Enter the target IP or hostname:"
|
|
read target_ip
|
|
echo "Running Nmap scan on $target_ip..."
|
|
nmap -sS $target_ip
|
|
;;
|
|
metasploit)
|
|
echo "Starting Metasploit framework..."
|
|
msfconsole
|
|
;;
|
|
sqlmap)
|
|
echo "Enter the URL for SQL injection testing:"
|
|
read target_url
|
|
echo "Running SQLMap against $target_url..."
|
|
sqlmap -u $target_url --batch
|
|
;;
|
|
aircrack-ng)
|
|
echo "Enter the path to the capture file (e.g., *.cap):"
|
|
read capfile
|
|
echo "Enter the wordlist for cracking:"
|
|
read wordlist
|
|
echo "Running Aircrack-ng on $capfile with $wordlist..."
|
|
aircrack-ng $capfile -w $wordlist
|
|
;;
|
|
wireshark)
|
|
echo "Starting Wireshark..."
|
|
sudo wireshark
|
|
;;
|
|
hashcat)
|
|
echo "Enter the hash to crack:"
|
|
read hash
|
|
echo "Enter the hash mode (e.g., 0 for MD5):"
|
|
read mode
|
|
echo "Enter the wordlist path for cracking:"
|
|
read wordlist
|
|
echo "Running Hashcat on hash $hash with wordlist $wordlist..."
|
|
hashcat -m $mode -a 0 $hash $wordlist
|
|
;;
|
|
subfinder)
|
|
echo "Enter the domain for subdomain enumeration:"
|
|
read domain
|
|
echo "Running Subfinder on $domain..."
|
|
subfinder -d $domain
|
|
;;
|
|
bettercap)
|
|
echo "Starting Bettercap for Man-in-the-Middle (MITM) attack..."
|
|
sudo bettercap -T 192.168.1.0/24
|
|
;;
|
|
masscan)
|
|
echo "Enter IP address range to scan:"
|
|
read ip
|
|
echo "Enter the port (80) or port range (80-8080) to scan:"
|
|
read port
|
|
echo "Enter rate to run the scan (pps):"
|
|
read rate
|
|
echo "Running scan of $ip on port $port at a rate of $rate..."
|
|
sudo masscan -p$port $ip --rate=$rate --exclude=255.255.255.255
|
|
;;
|
|
gobuster)
|
|
echo "Enter the target URL:"
|
|
read target_url
|
|
echo "Enter the wordlist for directory brute-forcing:"
|
|
read wordlist
|
|
echo "Running Gobuster on $target_url with wordlist $wordlist..."
|
|
gobuster dir -u $target_url -w $wordlist
|
|
;;
|
|
theharvester)
|
|
echo "Enter the domain for email and subdomain enumeration:"
|
|
read domain
|
|
echo "Running TheHarvester on $domain..."
|
|
theharvester -d $domain -b google
|
|
;;
|
|
nikto)
|
|
echo "Enter the target URL to scan for vulnerabilities:"
|
|
read target_url
|
|
echo "Running Nikto scan on $target_url..."
|
|
nikto -h $target_url
|
|
;;
|
|
aircrack-ng)
|
|
echo "Enter the path to the capture file (e.g., *.cap):"
|
|
read capfile
|
|
echo "Enter the wordlist for cracking:"
|
|
read wordlist
|
|
echo "Running Aircrack-ng on $capfile with $wordlist..."
|
|
aircrack-ng $capfile -w $wordlist
|
|
;;
|
|
sublist3r)
|
|
echo "Enter the domain for subdomain enumeration:"
|
|
read domain
|
|
echo "Running Sublist3r on $domain..."
|
|
sublist3r -d $domain
|
|
;;
|
|
responder)
|
|
echo "Starting Responder for network poisoning..."
|
|
sudo responder -I eth0
|
|
;;
|
|
john)
|
|
echo "Enter the hash to crack:"
|
|
read hash
|
|
echo "Enter the wordlist path for cracking:"
|
|
read wordlist
|
|
echo "Running John the Ripper on hash $hash with wordlist $wordlist..."
|
|
john --wordlist=$wordlist $hash
|
|
;;
|
|
snort)
|
|
echo "Running Snort network intrusion detection..."
|
|
sudo snort -A console -i eth0 -c /etc/snort/snort.conf
|
|
;;
|
|
wpscan)
|
|
echo "Enter the target URL for WordPress vulnerability scanning:"
|
|
read target_url
|
|
echo "Running WPScan on $target_url..."
|
|
wpscan --url $target_url --enumerate u
|
|
;;
|
|
metasploit)
|
|
echo "Starting Metasploit..."
|
|
sudo msfconsole
|
|
;;
|
|
*)
|
|
echo "Tool not recognized."
|
|
;;
|
|
esac
|
|
}
|
|
|
|
# Function to display menu
|
|
show_menu() {
|
|
clear
|
|
echo "Network & Security Tools Menu"
|
|
echo "-----------------------------"
|
|
echo "1) Hydra (Brute Force)"
|
|
echo "2) Nmap (Network Scan)"
|
|
echo "3) Metasploit Framework"
|
|
echo "4) SQLMap (SQL Injection)"
|
|
echo "5) Aircrack-ng (WPA Cracking)"
|
|
echo "6) Wireshark (Packet Capture)"
|
|
echo "7) Hashcat (Hash Cracking)"
|
|
echo "8) Subfinder (Subdomain Enumeration)"
|
|
echo "9) Gobuster (Directory Brute Force)"
|
|
echo "10) TheHarvester (Recon)"
|
|
echo "11) Nikto (Web Vulnerability Scanner)"
|
|
echo "12) Sublist3r (Subdomain Enumeration)"
|
|
echo "13) Responder (MITM)"
|
|
echo "14) John the Ripper (Password Cracking)"
|
|
echo "15) Snort (IDS/IPS)"
|
|
echo "16) WPScan (WordPress Scanner)"
|
|
echo "17) masscan (Network Scan)"
|
|
echo "q) Exit"
|
|
echo -n "Please choose an option (1-17): "
|
|
read choice
|
|
}
|
|
|
|
# Main loop
|
|
while true; do
|
|
show_menu
|
|
case $choice in
|
|
1)
|
|
run_tool "hydra"
|
|
;;
|
|
2)
|
|
run_tool "nmap"
|
|
;;
|
|
3)
|
|
run_tool "metasploit"
|
|
;;
|
|
4)
|
|
run_tool "sqlmap"
|
|
;;
|
|
5)
|
|
run_tool "aircrack-ng"
|
|
;;
|
|
6)
|
|
run_tool "wireshark"
|
|
;;
|
|
7)
|
|
run_tool "hashcat"
|
|
;;
|
|
8)
|
|
run_tool "subfinder"
|
|
;;
|
|
9)
|
|
run_tool "gobuster"
|
|
;;
|
|
10)
|
|
run_tool "theharvester"
|
|
;;
|
|
11)
|
|
run_tool "nikto"
|
|
;;
|
|
12)
|
|
run_tool "sublist3r"
|
|
;;
|
|
13)
|
|
run_tool "responder"
|
|
;;
|
|
14)
|
|
run_tool "john"
|
|
;;
|
|
15)
|
|
run_tool "snort"
|
|
;;
|
|
16)
|
|
run_tool "wpscan"
|
|
;;
|
|
17)
|
|
run_tool "masscan"
|
|
;;
|
|
q)
|
|
echo "Exiting. Goodbye!"
|
|
exit 0
|
|
;;
|
|
*)
|
|
echo "Invalid option. Please try again."
|
|
;;
|
|
esac
|
|
echo -n "Press Enter to continue..."
|
|
read
|
|
done
|