Langsung ke konten utama

Pinned Post

Rekomendasi Game Simulator Kendaraan 2020 yang Tak Kalah Seru dari Sebelumnya

Sekarang, banyak sekali jenis game online bertebaran. Mulai MMORPG sampai dengan Game Simulation atau yang lebih familiar dikenal game simulator. Belakangan yang banyak dimainkan adalah game simulator yang menawarkan pengalaman melakukan aktivitas dengan simulasi. Ada yang life-simulation games, vehicle simulation, dan masih banyak lagi lainnya. Tahun 2020 ini juga banyak bermunculan game simulator yang tidak kalah seru dari sebelum-sebelumnya. Bagi yang sedang mencari rekomendasi, berikut ini akan adalah daftar game simulator patut dicoba yang pertama, Bus Simulator Indonesia Pertama datang dari Tanah Air ada yang namanya Bus Simulator Indonesia atau biasa disingkat BUSSID. Game ini cocok sekali bagi yang ingin merasakan sensasi supir bus Indonesia apalagi bila menginstall mod yang didapat dari anonytun.com, di sana Anda bisa mendapatkan banyak pilihan bus, truk dan mobil yang seru secara gratis. A da simulasi bus antarkota, antarprovinsi,  bahkan antar pulau. Karena ada fi...

new sc termux

 Main functions

1) To use a module, run the command "use [module_call]", e.g. "use apsniff", to activate the module.
2) The modules options can be changed with "set [parameter] [value]".
3) Inside the modules, you always have the possibilty to view the options with the command "so".
4)Your environment settings is in core/config.ini. Please adjust them before running.

Screenshot:


Web menu
Run the command "www" from the console to activate a Flask server showing the modules in your browser. Access it from: 127.0.0.1:5000.
Modules are loaded directly into a xterm.
DEV: Try the SniffHTTP and APsniff module - define parameters in the browser.

Screenshot:

Modules
CAT:TYPE:CALL:NAME:DESCRIPTION:
bruteforcecredschangemeDefault creds scanScan IP's for services and try logging in with default credentials (Arthur: ztgrace)
bruteforceloginpathadminfinderAdmin FinderA Simple script to find admin-paths for webpages. (Arthur: Spaddex)
bruteforcerarbfrarBF RARBruteforce a RAR file
bruteforcesshbfsshBruteforce SSHBruteforce SSH login
bruteforcewebbfwebBruteforce weblogin formBruteforce a weblogin form with word- and passlist
bruteforcezipbfzipBF ZIPBruteforce a ZIP file
crackingautjohnJohn the RipperAs you know - kill the hash
crackinghashhashidIdentify hashIdentify a hash
crackingwpacrackwpaCrack WPA 4-way handshakeGather WPA 4-way handshake from accesspoint and crack it
exploitbrowserbrowserpwnBrowser Autopwn2This module will automatically serve browser exploits (Arthur: sinn3r[at]metasploit.com)
exploitsearchexploitdbExploitdbShell-style script to search exploit-db.com exploits. (Arthur: mattoufoutu)
mailsinmspoofcheckSpoofcheck email domainCheck if a domain can be spoofed for e.g. emailing
monitorarparpmonARP monitor alertMonitor ARP table and alert for changes
monitoripipmonIP monitor alertMonitor IP's and alert for changes
othersettingssettingsChange settingsChange your environment settings, e.g. interface
pentestingnipttspartaSPARTASPARTA is a python GUI application which simplifies network infrastructure penetration testing.
phishingapetphisEwil Twin phishingCreate a Evil Twin and redirect user to fake password page.
phishingwebpagewebphisWebpage phishingRun a local flask server with phishing pages.
recondnsdigDomain info groperUsing dig command you can query DNS name servers for your DNS lookup related tasks
recondnsdnsmapdnsmapDNS Network Mapper. Enumeration and bruteforcing.
recondnsdnsrecondnsreconMultiple DNS recon abilities.
routerframeworkrsploitRoutersploitFramework for routers with exploits and getting creds. (Arthur: Reverse Shell Security)
scansinlanscanLan scanScan local net - recon
sniffautapsniffAP sniffCreate AP and sniff HTTPS and avoid HSTS + Beef
sniffhttpsniffhttpSniff HTTPSniff HTTP packages. Extract username and passwords from traffic.
sniffsinbettercapBettercapBettercap integration for sniffing packets and bypass HSTS and HTTPS
socialenginstagraminstabotInstagram botInstagram bot for performing various activities (Arthur: LevPasha)
spoofarparpspoofARP spoofSpoofing ARP
sqlsqligdsqliGdork SQLiScrape net for urls and check if they are prone to SQL injection
sqlsqlisqlmapSQLmapJust an activation of SQLmap.
systemmacmaccMacchangerChange your MAC address
toolssearchsearchhtSearch hacktoolsSearchengine for hackingtools
wifiaccesspointcreateapCreate an AccesspointCreate an Accesspoint
wifiwifiwifiutilsWiFi utilsUtilities for WiFi, e.g. deauth, WiFi's, clients, probes, etc.

Run
Before your first run, please: 1. Adjust your environment settings in core/config.ini.default 2. Rename core/config.ini.default to core/config.ini
Start the console with: python3 wmd.py
Start a single module: python3 wmd.py -m [CALL]
Start webserver: python3 wmd.py -w
Start without checking requirements: python3 wmd.py -nc

Requirements
Before your first run, please: 1. Adjust your environment settings in core/config.ini.default 2. Rename core/config.ini.default to core/config.ini
Requirements:
  •  Linux operating system
  •  Python3
  •  Python libraries requirements in requirements.txt
Optional tools/software/GIT:
modules which needs them will inform you about it and just dont run..
  •  GIT: Admin-Finder
  •  Aircrack-ng
  •  Airomon-ng
  •  Airodump-ng
  •  Airolib-ng
  •  Arp
  •  Arpspoof
  •  Beef
  •  Bettercap
  •  GIT: changeme
  •  CrackMapExec
  •  Create_ap
  •  Dig
  •  Dnsmap
  •  GIT: Dnsrecon
  •  GIT: Exploitdb
  •  GIT: Hashid
  •  Hostapd
  •  GIT: Instabot
  •  John the Ripper
  •  Nmap
  •  GIT: Routersploit
  •  SPARTA
  •  GIT: Spoofcheck
  •  GIT: XSSER

Development

Structure
  •  core --> The core files with functions used all over the code
  •  files --> Static files, passwordlist, etc.
  •  logs --> Standard folder for saving logs into
  •  modules --> Containing the modules
  •  tmp --> Guess
  •  tools --> GIT tools
  •  www --> Files for the webserver

New module
Checkout the template in modules/module_template.py

Add module
Run python3 wmd.py -a modulePathName.py

Pull requests
  •  Only python3 code
  •  Code needs to follow pep8 flake8 (no need for linebreak)

Todo

First priority
  •  More modules
  •  Interactive webinterface. Set settings and get results in the browser <-- sniffhttp and apsniff done
  •  Rename config.ini to config.ini.default to avoid overriding userspecific config file

Various
  •  Proxychain
  •  Tor
  •  Threading on all BF
  •  Try/except on imports on modules for running with os.system
  •  Add run command with : in modules
  •  Add info about 'set para value' in modules (missing?!)
  •  Regenerate modules.xml (loop through modules)
  •  Design modules with core import and parser for design
  •  Check that there are enough credit to arthurs of tools, repos, etc.
  •  Split updatetools into local tools vs git
  •  When adding modules strip <> to ensuring XML format
  •  Change behavior of install and update tools
  •  Add invoke option inside all modules
  •  All modules - change options to Options
  •  Split files folder up into lists, etc
  •  Core network and wifi - merged?
  •  Original arthurs will be displayed below banner on modules. Todo.
  •  When showing modules indicate somehow what they require
  •  Set modules parameters in browser dialog
  •  Add args to all modules and create dialog HTML (automated tool in development)

core/tools.py
  •  Do a run through config.ini and extract names for the updatecommand instead of DRY in two functions

Internal code
  •  cleanup getLocalIP (local_ip) in functions
  •  PEP8/Flake8 for old modules

Modules
  •  SQLmap
  •  Sparta
  •  http sniff pwd <-- Done
  •  Evil Twin - deauth + info about unmanaging in NetworkManager
  •  Evil Twin - arg parse for landingpage / + logfunction
  •  monitor network auto
  •  xsser
  •  target attack website or ip
  •  system information
  •  dns fake
  •  grep, sed, awk
  •  scapy on all network activity
  •  Admin finder - checkout google/bing search before BF
  •  Changeme - Ztgrace
  •  Osint frame
  •  Bettercap modules. Implementation in other modules. Excellent performance.
  •  Create Access Point with hostapd and dnsmasq. Already implemented in Ewil Twin

Komentar