hackpack.sh/hackpack.sh

234 lines
7.0 KiB
Bash
Executable File

#!/bin/bash
# Function to run a selected tool
run_tool() {
tool_name=$1
case $tool_name in
hydra)
echo "Enter the target (IP or hostname):"
read target
echo "Enter the service to attack (e.g., ssh, ftp, http):"
read service
echo "Enter the wordlist path for brute-forcing:"
read wordlist
echo "Running Hydra attack on $service at $target with wordlist $wordlist..."
hydra -l user -P $wordlist $target $service
;;
nmap)
echo "Enter the target IP or hostname:"
read target_ip
echo "Running Nmap scan on $target_ip..."
nmap -sS $target_ip
;;
metasploit)
echo "Starting Metasploit framework..."
msfconsole
;;
sqlmap)
echo "Enter the URL for SQL injection testing:"
read target_url
echo "Running SQLMap against $target_url..."
sqlmap -u $target_url --batch
;;
aircrack-ng)
echo "Enter the path to the capture file (e.g., *.cap):"
read capfile
echo "Enter the wordlist for cracking:"
read wordlist
echo "Running Aircrack-ng on $capfile with $wordlist..."
aircrack-ng $capfile -w $wordlist
;;
wireshark)
echo "Starting Wireshark..."
sudo wireshark
;;
hashcat)
echo "Enter the hash to crack:"
read hash
echo "Enter the hash mode (e.g., 0 for MD5):"
read mode
echo "Enter the wordlist path for cracking:"
read wordlist
echo "Running Hashcat on hash $hash with wordlist $wordlist..."
hashcat -m $mode -a 0 $hash $wordlist
;;
subfinder)
echo "Enter the domain for subdomain enumeration:"
read domain
echo "Running Subfinder on $domain..."
subfinder -d $domain
;;
bettercap)
echo "Starting Bettercap for Man-in-the-Middle (MITM) attack..."
sudo bettercap -T 192.168.1.0/24
;;
masscan)
echo "Enter IP address range to scan:"
read ip
echo "Enter the port (80) or port range (80-8080) to scan:"
read port
echo "Enter rate to run the scan (pps):"
read rate
echo "Running scan of $ip on port $port at a rate of $rate..."
sudo masscan -p$port $ip --rate=$rate --exclude=255.255.255.255
;;
gobuster)
echo "Enter the target URL:"
read target_url
echo "Enter the wordlist for directory brute-forcing:"
read wordlist
echo "Running Gobuster on $target_url with wordlist $wordlist..."
gobuster dir -u $target_url -w $wordlist
;;
theharvester)
echo "Enter the domain for email and subdomain enumeration:"
read domain
echo "Running TheHarvester on $domain..."
theharvester -d $domain -b google
;;
nikto)
echo "Enter the target URL to scan for vulnerabilities:"
read target_url
echo "Running Nikto scan on $target_url..."
nikto -h $target_url
;;
aircrack-ng)
echo "Enter the path to the capture file (e.g., *.cap):"
read capfile
echo "Enter the wordlist for cracking:"
read wordlist
echo "Running Aircrack-ng on $capfile with $wordlist..."
aircrack-ng $capfile -w $wordlist
;;
sublist3r)
echo "Enter the domain for subdomain enumeration:"
read domain
echo "Running Sublist3r on $domain..."
sublist3r -d $domain
;;
responder)
echo "Starting Responder for network poisoning..."
sudo responder -I eth0
;;
john)
echo "Enter the hash to crack:"
read hash
echo "Enter the wordlist path for cracking:"
read wordlist
echo "Running John the Ripper on hash $hash with wordlist $wordlist..."
john --wordlist=$wordlist $hash
;;
snort)
echo "Running Snort network intrusion detection..."
sudo snort -A console -i eth0 -c /etc/snort/snort.conf
;;
wpscan)
echo "Enter the target URL for WordPress vulnerability scanning:"
read target_url
echo "Running WPScan on $target_url..."
wpscan --url $target_url --enumerate u
;;
metasploit)
echo "Starting Metasploit..."
sudo msfconsole
;;
*)
echo "Tool not recognized."
;;
esac
}
# Function to display menu
show_menu() {
clear
echo "Network & Security Tools Menu"
echo "-----------------------------"
echo "1) Hydra (Brute Force)"
echo "2) Nmap (Network Scan)"
echo "3) Metasploit Framework"
echo "4) SQLMap (SQL Injection)"
echo "5) Aircrack-ng (WPA Cracking)"
echo "6) Wireshark (Packet Capture)"
echo "7) Hashcat (Hash Cracking)"
echo "8) Subfinder (Subdomain Enumeration)"
echo "9) Gobuster (Directory Brute Force)"
echo "10) TheHarvester (Recon)"
echo "11) Nikto (Web Vulnerability Scanner)"
echo "12) Sublist3r (Subdomain Enumeration)"
echo "13) Responder (MITM)"
echo "14) John the Ripper (Password Cracking)"
echo "15) Snort (IDS/IPS)"
echo "16) WPScan (WordPress Scanner)"
echo "17) masscan (Network Scan)"
echo "q) Exit"
echo -n "Please choose an option (1-17): "
read choice
}
# Main loop
while true; do
show_menu
case $choice in
1)
run_tool "hydra"
;;
2)
run_tool "nmap"
;;
3)
run_tool "metasploit"
;;
4)
run_tool "sqlmap"
;;
5)
run_tool "aircrack-ng"
;;
6)
run_tool "wireshark"
;;
7)
run_tool "hashcat"
;;
8)
run_tool "subfinder"
;;
9)
run_tool "gobuster"
;;
10)
run_tool "theharvester"
;;
11)
run_tool "nikto"
;;
12)
run_tool "sublist3r"
;;
13)
run_tool "responder"
;;
14)
run_tool "john"
;;
15)
run_tool "snort"
;;
16)
run_tool "wpscan"
;;
17)
run_tool "masscan"
;;
q)
echo "Exiting. Goodbye!"
exit 0
;;
*)
echo "Invalid option. Please try again."
;;
esac
echo -n "Press Enter to continue..."
read
done